RE: [lamps] Last Call: <draft-ietf-lamps-hash-of-root-key-cert-extn-02.txt> (Hash Of Root Key Certificate Extension) to Informational RFC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I'm not sure the comparison with pins is that useful, because existing pins
generally work out badly because they prevent changing keys, while this
mechanism provides the opportunity to change a key, where no such
opportunity otherwise exists.  If anything, this makes roots of trust _less_
like pinned keys, and in a good way.

But I agree that even if this is a minor issue, perhaps a few sentences
noting it is appropriate.  Just to help out anyone who might not have
thought about it.

-Tim

> -----Original Message-----
> From: Stephen Farrell <stephen.farrell@xxxxxxxxx>
> Sent: Wednesday, January 2, 2019 4:20 PM
> To: Tim Hollebeek <tim.hollebeek@xxxxxxxxxxxx>; Salz, Rich
> <rsalz@xxxxxxxxxx>; Paul Hoffman <paul.hoffman@xxxxxxxx>; Russ
> Housley <housley@xxxxxxxxxxxx>
> Cc: spasm@xxxxxxxx; draft-ietf-lamps-hash-of-root-key-cert-extn@xxxxxxxx;
> IETF <ietf@xxxxxxxx>
> Subject: Re: [lamps] Last Call: 
> <draft-ietf-lamps-hash-of-root-key-cert-extn-
> 02.txt> (Hash Of Root Key Certificate Extension) to Informational RFC
>
>
> Hiya,
>
> On 02/01/2019 20:57, Tim Hollebeek wrote:
> > I'm sympathetic to perhaps adding a sentence or two, but otherwise I'm
> > struggling to understand the risk as well.
>
> I assume Paul's pointing out that this is another form of key pinning, and
> other instances of pinning haven't worked out so well.
>
> > If an entity is incapable of managing and protecting a replacement
> > root key, perhaps they shouldn't be in the CA business.  And since, at
> > worst, they lose the ability to replace the root key, they aren't in a
> > worse situation than they were if this capability didn't exist.
>
> IIUC Paul's concern is for the relying party, not the CA.
>
> Compared to RPs who do not support this extension, RPs who do support this
> extension may have a harder time with a CA that mucks up pinning, e.g.
> because the CA's HSM vendor has gone out of business or something.
>
> I'm not sure how big a deal that is really but it seems like a fine LC 
> comment
> worthy of resolution to me.
>
> Having just read the draft (for the 1st time), I think it ought say (by 
> inclusion
> or reference) how RPs could handle bad pins, given that there are a small 
> set
> of trust store distributors (browsers, debian etc.) who aren't quite sync'd 
> up.
>
> Cheers,
> S.
>
>
> >
> > -Tim
> >
> >> -----Original Message-----
> >> From: Spasm <spasm-bounces@xxxxxxxx> On Behalf Of Salz, Rich
> >> Sent: Wednesday, January 2, 2019 3:32 PM
> >> To: Paul Hoffman <paul.hoffman@xxxxxxxx>; Russ Housley
> >> <housley@xxxxxxxxxxxx>
> >> Cc: spasm@xxxxxxxx;
> >> draft-ietf-lamps-hash-of-root-key-cert-extn@xxxxxxxx;
> > IETF
> >> <ietf@xxxxxxxx>
> >> Subject: Re: [lamps] Last Call:
> > <draft-ietf-lamps-hash-of-root-key-cert-extn-
> >> 02.txt> (Hash Of Root Key Certificate Extension) to Informational RFC
> >>
> >> I don't understand what the risk is.
> >>
> >> If a client sees and understands the extension, it can update its
> >> trust
> > store to
> >> have the new key.  If a client does not see, or does not understand,
> >> the extension, then the trust store will have to be updated out of
> >> band, just
> > like it
> >> is now.
> >>
> >> CA's that use this extension must take proper care to ensure that the
> > private
> >> key is not exposed.
> >>
> >>
> >> _______________________________________________
> >> Spasm mailing list
> >> Spasm@xxxxxxxx
> >> https://www.ietf.org/mailman/listinfo/spasm

<<attachment: smime.p7s>>


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux