[Last-Call] Re: Secdir last call review of draft-ietf-lamps-im-keyusage-02

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Kyle,
Thanks for the review.

On Sun, Oct 27, 2024 at 3:51 PM Kyle Rose via Datatracker <noreply@xxxxxxxx> wrote:
Reviewer: Kyle Rose
Review result: Has Nits

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
 Document editors and WG chairs should treat these comments just like any other
last call comments.

The summary of this review is Ready with Nits. The spec itself seems
straightforward, but some of the text could be clarified.

I'm a little confused about this:

> Since IM clients could be very numerous, operators are reticent to issue
> certificates for these users that might accidentally be used to validate a
> TLS connection because it has the KeyPurposeId id-kp-serverAuth or
> id-kp-clientAuth.

First, what is an "operator" in this context?
An operator of instant messaging services ( i.e. a consumer or enterprise messaging system).
 
Second, is the worry that CAs might sign a certificate with the wrong
KeyPurposeId? I'm unsure how this specification would prevent that. Or is it
that absent this new purpose, there's nothing preventing a certificate from
being used in both contexts, creating cross-protocol attack risks (as outlined
in section 6 of RFC 9336)?
Absent a dedicated key purpose, a certificate with a more general key purpose could be abused in a cross-protocol attack.

I reworded the second paragraph as follows:
"Organizations may be unwilling to issue certificates for Instant Message client using a general KeyPurposeId such as `id-kp-serverAuth` or `id-kp-clientAuth`, because of the risk that such certificates could be abused in a cross-protocol attack."
 

It seems like this works only if every validator enforces a proper value for
KeyPurposeId in received certificates, in which case this is just another
purpose to be added to the registry so IM clients have a unique KeyPurposeId to
check for. Is that right?
exactly.
 
This text could use some wordsmithing:

> This specification defines the KeyPurposeId id-kp-imUri, which MAY be used
> for signing messages to prove the identity of an Instant Messaging client.

I don't think the KeyPurposeId is used for signing messages. You might want
something like "This specification defines the KeyPurposeId id-kp-imUri, which
MAY be included in certificates used to prove the identity of an Instant
Messaging Client."

I updated using your suggested wording, thank you.
 
Though I think to deal with the above concern, the entire
certificate ecosystem MUST enforce the presence of an appropriate value.
 
I wonder if the normative language even needs to be here, versus in the protocol
specification.

This was intentional. In order to pass idnits, the document needed to have at least one RFC2119 normative statement.

Thanks,
-rohan
-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux