Re: [wpkops] I-D Action: draft-ietf-wpkops-trustmodel-02.txt

i-barreira@izenpe.net Fri, 06 June 2014 08:29 UTC

Return-Path: <i-barreira@izenpe.net>
X-Original-To: wpkops@ietfa.amsl.com
Delivered-To: wpkops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 591C11A0409 for <wpkops@ietfa.amsl.com>; Fri, 6 Jun 2014 01:29:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0
X-Spam-Level:
X-Spam-Status: No, score=0 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DQZyF7Ldni4m for <wpkops@ietfa.amsl.com>; Fri, 6 Jun 2014 01:29:07 -0700 (PDT)
Received: from ektmail1iron2.euskaltel.es (ektmail1iron2.euskaltel.es [212.142.144.27]) by ietfa.amsl.com (Postfix) with ESMTP id D19E61A00EC for <wpkops@ietf.org>; Fri, 6 Jun 2014 01:29:05 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AqAJAFl7kVPUNwh3/2dsb2JhbABZgkaBGVK6doFRAYZqUQGBHXWEAwEBAQQBAQEqAw0NCBwXBAIBCBEEAQELBhcBBgEmHwkIAgUSCAGIPQEDBbJ4mV8XjgcRAR8XFgsGgyWBFgSaFoFBkX+DPoF0
X-IPAS-Result: AqAJAFl7kVPUNwh3/2dsb2JhbABZgkaBGVK6doFRAYZqUQGBHXWEAwEBAQQBAQEqAw0NCBwXBAIBCBEEAQELBhcBBgEmHwkIAgUSCAGIPQEDBbJ4mV8XjgcRAR8XFgsGgyWBFgSaFoFBkX+DPoF0
X-IronPort-AV: E=Sophos;i="4.98,987,1392159600"; d="scan'208,217";a="173095466"
Received: from ektmail2mta2.euskaltel.es (HELO correo.euskaltel.es) ([212.55.8.119]) by ektmail1iron2.euskaltel.es with ESMTP; 06 Jun 2014 10:13:19 +0200
Received: from ejlp024.ejgv ([194.30.48.247]) by ektmail2mta2.euskaltel.es (Sun Java System Messaging Server 6.2-9.09 (built Jan 8 2008)) with ESMTP id <0N6Q004C3NK9G3L0@ektmail2mta2.euskaltel.es> for wpkops@ietf.org; Fri, 06 Jun 2014 10:28:57 +0200 (MEST)
Received: from afe01.ejsarea.net (afe01 [10.200.192.14]) by ejlp024.ejgv (8.13.1/8.13.1) with ESMTP id s568SvBg011115; Fri, 06 Jun 2014 10:28:57 +0200
Received: from AEX06.ejsarea.net ([10.200.198.15]) by afe01.ejsarea.net with Microsoft SMTPSVC(6.0.3790.4675); Fri, 06 Jun 2014 10:28:56 +0200
Date: Fri, 06 Jun 2014 10:28:55 +0200
From: i-barreira@izenpe.net
In-reply-to: <8bb8a25e698a450988b79c058705f1cb@THHSTE15D1BE5.hs20.net>
To: rob.horne@trustis.com, wpkops@ietf.org
Message-id: <763539E260C37C46A0D6B340B5434C3B099397E8@AEX06.ejsarea.net>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft Exchange V6.5
Content-type: multipart/alternative; boundary="Boundary_(ID_vxJHBkBrIwlM941J+7M1aQ)"
Content-class: urn:content-classes:message
Thread-topic: [wpkops] I-D Action: draft-ietf-wpkops-trustmodel-02.txt
Thread-index: AQHPeyZFDyYFwnLMcUy7s1i6Lj94AJtipRxAgAEXKhA=
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
References: <20140529101033.15865.72439.idtracker@ietfa.amsl.com> <8bb8a25e698a450988b79c058705f1cb@THHSTE15D1BE5.hs20.net>
X-OriginalArrivalTime: 06 Jun 2014 08:28:56.0479 (UTC) FILETIME=[5B8CAAF0:01CF8161]
Archived-At: http://mailarchive.ietf.org/arch/msg/wpkops/UlvR1aGZ9lJaswp0YZrYjp0Zykg
Subject: Re: [wpkops] I-D Action: draft-ietf-wpkops-trustmodel-02.txt
X-BeenThere: wpkops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <wpkops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/wpkops>, <mailto:wpkops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/wpkops/>
List-Post: <mailto:wpkops@ietf.org>
List-Help: <mailto:wpkops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/wpkops>, <mailto:wpkops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Jun 2014 08:29:11 -0000

Hi Rob,

 

In your email

 

 

Iñigo Barreira

Responsable del Área técnica

i-barreira@izenpe.net

945067705

 

 

ERNE! Baliteke mezu honen zatiren bat edo mezu osoa legez babestuta egotea. Mezua badu bere hartzailea. Okerreko helbidera heldu bada (helbidea gaizki idatzi, transmisioak huts egin) eman abisu igorleari, korreo honi erantzuna. KONTUZ!

ATENCION! Este mensaje contiene informacion privilegiada o confidencial a la que solo tiene derecho a acceder el destinatario. Si usted lo recibe por error le agradeceriamos que no hiciera uso de la informacion y que se pusiese en contacto con el remitente.

 

 

-----Mensaje original-----
De: wpkops [mailto:wpkops-bounces@ietf.org] En nombre de Horne, Rob
Enviado el: jueves, 05 de junio de 2014 16:54
Para: wpkops@ietf.org
Asunto: Re: [wpkops] I-D Action: draft-ietf-wpkops-trustmodel-02.txt

 

Hi, I've taken a look at this and have a few comments.

 

Although the security issues are addressed in section 5, I think it could benefit from a little more detail and clarification in sections 2 and 3.

 

2.1 Root store provider

 

Does the audit reporting and updating method described conform to any standard? I've seen auditors follow their own procedures which do not match this description.

 

IB: The Baseline Requirements developed by the CABF indicates which standards are suitable to be used by the auditors and also indicates a procedure to perform the audit but some auditors prefer to use their own procedure to perform audits which is valid meanwhile they follow what the standard requires.

 

3.2.1. One root CA cross-certifies another root CA

 

Is there a defined and agreed way for older CAs to cross certify newer CAs particularly if they're not owned by the same organisation? For example if the criterion for cross certification is less than that required by the root store for the original CA there could be some interesting issues. 3.2.2 refers to adherence to the root store policy so should that also be in 3.2.1?

 

IB: The Baseline Requirements indicates it in section 8.4 as in general. There´s no clear distinction if they shall be owned by the same organization. About the criterion is up to the root CA that signs the other root CA to define it but once is done it "belongs" to the organization and the same audit rules apply. For the second question is similar, but in this case by contract and it´s also indicated in how to audit delegated functions. Maybe a rewording is needed to clarify it 

 

3.2.5 to 3.2.7

 

I'd have expected more emphasis on technically constraining third party and subscriber RAs and CAs. For one thing legal contracts may be subject to non-disclosure which could make it difficult to audit properly but if they're not technically constrained that will be what's required.

 

IB: Will check it again

 

5.3. Root CA compromise

 

The last sentence is incomplete ;-)

 

IB: Yes, you´re right. Sean Mullan told me so. It´s already corrected but not published

 

 

A further thought: although potentially contentious should the scope be expanded to include other applications which use https but are not, in the traditional sense, web browsers? I'm thinking in particular of applications that utilise the protocol but don't have or use any form of trusted root store. To my mind this is a much bigger security issue than is covered in the draft as it stands. Of course this gets us into a discussion of how synonymous "web" is with "http/s".

 

IB: In the introduction is indicated that this trust model is to support the communication between the subscriber and the browser. This thought´s been discussed if the scope should be wider but it was decided to keep it as it is now. 

 

 

Regards, Rob

 

 

 

 

-----Original Message-----

From: wpkops [mailto:wpkops-bounces@ietf.org] On Behalf Of internet-drafts@ietf.org

Sent: 29 May 2014 11:11

To: i-d-announce@ietf.org

Cc: wpkops@ietf.org

Subject: [wpkops] I-D Action: draft-ietf-wpkops-trustmodel-02.txt

 

 

A New Internet-Draft is available from the on-line Internet-Drafts directories.

This draft is a work item of the Web PKI OPS Working Group of the IETF.

 

        Title           : Trust models of the Web PKI

        Authors         : Inigo Barreira

                          Bruce Morton

        Filename        : draft-ietf-wpkops-trustmodel-02.txt

        Pages           : 11

        Date            : 2014-05-29

 

Abstract:

   This is one of a set of documents to define the operation of the Web

   PKI.  It describes the currently deployed Web PKI trust.

 

 

The IETF datatracker status page for this draft is:

https://datatracker.ietf.org/doc/draft-ietf-wpkops-trustmodel/ <https://datatracker.ietf.org/doc/draft-ietf-wpkops-trustmodel/> 

 

There's also a htmlized version available at:

http://tools.ietf.org/html/draft-ietf-wpkops-trustmodel-02 <http://tools.ietf.org/html/draft-ietf-wpkops-trustmodel-02> 

 

A diff from the previous version is available at:

http://www.ietf.org/rfcdiff?url2=draft-ietf-wpkops-trustmodel-02 <http://www.ietf.org/rfcdiff?url2=draft-ietf-wpkops-trustmodel-02> 

 

 

Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

 

Internet-Drafts are also available by anonymous FTP at:

ftp://ftp.ietf.org/internet-drafts/ <ftp://ftp.ietf.org/internet-drafts/> 

 

_______________________________________________

wpkops mailing list

wpkops@ietf.org <mailto:wpkops@ietf.org> 

https://www.ietf.org/mailman/listinfo/wpkops <https://www.ietf.org/mailman/listinfo/wpkops> 

 

_______________________________________________

wpkops mailing list

wpkops@ietf.org <mailto:wpkops@ietf.org> 

https://www.ietf.org/mailman/listinfo/wpkops <https://www.ietf.org/mailman/listinfo/wpkops>