Re: [Trans] overview of remaining(?) DISCUSS items for draft-ietf-trans-rfc6962-bis-33

Paul Wouters <paul@nohats.ca> Thu, 19 September 2019 16:20 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29F2D12084B for <trans@ietfa.amsl.com>; Thu, 19 Sep 2019 09:20:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zZ18CJOZ2gAf for <trans@ietfa.amsl.com>; Thu, 19 Sep 2019 09:20:01 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D865120843 for <trans@ietf.org>; Thu, 19 Sep 2019 09:20:01 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 46Z2B620dRzD5w; Thu, 19 Sep 2019 18:19:58 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1568909998; bh=msTgo3cTZPROYhPEiePWQb7DMuxQ5Safz+rwld6bJk0=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=OQZ0Pw6783vN1tBLdXOrp4DZ8UpDIriJkXWAxr70eaT0ogelCFonGExLLvOOWTtmC 8EcQrycbL2Qr1UcKToKIQ5OYA036EI97h8+q5JDD83B0jeMqFAO4jhlf94lb3k5qKf wHpZRWYbTePqkBiFTQkxnT9uDxFH+RSLK8AVmbKI=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id LmOuna02fpw0; Thu, 19 Sep 2019 18:19:55 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Thu, 19 Sep 2019 18:19:54 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 8499B322DEA; Thu, 19 Sep 2019 12:19:53 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 bofh.nohats.ca 8499B322DEA
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 7260041799BC; Thu, 19 Sep 2019 12:19:53 -0400 (EDT)
Date: Thu, 19 Sep 2019 12:19:53 -0400
From: Paul Wouters <paul@nohats.ca>
To: Rob Stradling <rob@sectigo.com>
cc: Trans <trans@ietf.org>, Alissa Cooper <alissa@cooperw.in>
In-Reply-To: <b6ec6a38-a4c2-64b4-0584-d13deead2605@sectigo.com>
Message-ID: <alpine.LRH.2.21.1909191211080.29314@bofh.nohats.ca>
References: <alpine.LRH.2.21.1909181506160.11898@bofh.nohats.ca> <b6ec6a38-a4c2-64b4-0584-d13deead2605@sectigo.com>
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="ISO-8859-15"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/trans/ozHf6Iuh5RGRG2vq7KSz1DVz_Uo>
Subject: Re: [Trans] overview of remaining(?) DISCUSS items for draft-ietf-trans-rfc6962-bis-33
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Sep 2019 16:20:04 -0000

On Thu, 19 Sep 2019, Rob Stradling wrote:

> Hi Paul.
>
>> Alissa Cooper:
>>
>>      = Section 10.3 =
>>
>>      This section needs to state what the registry policy is for the code
>>      points not already registered (presumably Expert Review given 10.3.1,
>>      but it needs to be explicit).
>
> This was addressed by PR 309, in this commit:
> https://github.com/robstradling/certificate-transparency-rfcs/commit/7cd3471548c903fd891a99227bf081ca51939470

Alissa, is the resolution okay with you? I thought you might also wanted
text in the paragraph itself, and not just in the table, but perhaps
this is all you wnated?

>>      = Section 10.6.1 =
>>
>>      FCFS registries by definition can require additional information to be
>>      provided in order to get something registered. For avoidance of
>>      confusion I think the assignment policy should be listed as First Come
>>      First Served and the requirement that parameters be included in the
>>      application can use a normative MUST in the last paragraph if there is
>>      concern that the parameters won't be supplied.
>>
>>      However, I also wonder what will be done with the parameters that are
>>      supplied. Is IANA expected to just maintain them privately, or to
>>      publish them?
>>
>>      What is expected to appear in the 'Log' column in the registry?
>
> This was addressed by PR 309, in this commit:
> https://github.com/robstradling/certificate-transparency-rfcs/commit/704a71a18457b4558ce26fe4be519d6ea06a729a

Okay that seems clear to me now. Hopefully to Alissa as well. Alissa,
can you clear your DISCUSS if all your concerns are addressed?

>> And let me add my own question regarding 10.6.1. Should we expect these
>> registry entries can change over time? If so, is it definied anywhere what
>> consumers are supposed to do or how they are supposed to find out, that a
>> log base url has changed? Shouldn't such a change be done using a new OID?
>
> Since the OID (the Log ID) appears in each of the signed log artifacts
> (SCTs, STHs), I think trying to change the OID of an existing log would
> be pretty disastrous.
>
> However, I agree that there could be legitimate reasons for wanting to
> change a log's base URL.  For example, in the currently deployed CT v1
> ecosystem, it would be really nice if Sectigo could update the base URLs
> of our Mammoth and Sabre logs.  ({mammoth,sabre}.ct.comodo.com made
> sense when we set up these logs, but then Sectigo (formerly Comodo CA)
> was carved out of Comodo).
>
> Having said that though, I think the best approach would be to add a
> sentence to the document that says that log base URLs MUST NOT change.
> Nice and simple.

So this seems to contradict itself. You give a good reason why a base
url might change, then suggest to say MUST NOT. And you cannot add a
new entry with updated base url using the same OID I guess? So one would
have to replay the existing log into a new one. If that becomes a common
practise, how is this distinguishable from a log reply that removes an
entry and urges everyone to (automatically or not) update to the new
base url ?

> We have not yet made any attempt to respond to the DISCUSS/COMMENT items
> from Benjamin Kaduk, Mirja Kühlewind, and Alexey Melnikov.
>
> Now that the lengthy debate about BCP190 is over, I do intend to look at
> these remaining items soon.  I will be looking for help to address
> Benjamin's COMMENTs on section 2; I am not a cryptographer, and I want
> to ensure that these comments are satisfactorily addressed.

Okay. Hopefully this can be done very soon so we can re-issue a WGLC and
then have this done before IETF 106.

Paul