From johnblack@adamsmith.ac.uk Wed Apr 1 04:48:07 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DF0293A68EE for ; Wed, 1 Apr 2009 04:48:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.029 X-Spam-Level: X-Spam-Status: No, score=-10.029 tagged_above=-999 required=5 tests=[BAYES_99=3.5, HELO_EQ_CZ=0.445, HOST_EQ_BROADBND=1.118, HOST_EQ_CZ=0.904, HTML_IMAGE_ONLY_28=1.561, HTML_IMAGE_RATIO_02=0.383, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, SARE_SUB_POOR_CREDIT=1.121, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aVllCvmdl1Ek for ; Wed, 1 Apr 2009 04:48:07 -0700 (PDT) Received: from 171.55.broadband3.iol.cz (171.55.broadband3.iol.cz [85.70.55.171]) by core3.amsl.com (Postfix) with SMTP id 4AF6D3A6784 for ; Wed, 1 Apr 2009 04:47:59 -0700 (PDT) To: Subject: Credit card balance transfer From: MensHealth.com MIME-Version: 1.0 Content-Type: text/html Message-Id: <20090401114801.4AF6D3A6784@core3.amsl.com> Date: Wed, 1 Apr 2009 04:47:59 -0700 (PDT)
Subscribe to Men's Health Today!



Subscribe to Men's Health Today!





To your health,


David Zinczenko
Editor-in-Chief



Subscribe to Men's Health Today!
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Dept., 33 East Minor Street, Emmaus, PA 18098
From owner-ietf-pkix@mail.imc.org Wed Apr 1 06:12:18 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 914E63A67F4 for ; Wed, 1 Apr 2009 06:12:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 2.431 X-Spam-Level: ** X-Spam-Status: No, score=2.431 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HELO_EQ_DK=1.009, HTML_MESSAGE=0.001, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B5fRqR8iQU7H for ; Wed, 1 Apr 2009 06:12:13 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id BE2CC3A6839 for ; Wed, 1 Apr 2009 06:12:10 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31CeEuc068671 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 05:40:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31CeExK068670; Wed, 1 Apr 2009 05:40:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail03.dandomain.dk (mail03.dandomain.dk [194.150.112.203]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31Ce1M5068632 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 1 Apr 2009 05:40:12 -0700 (MST) (envelope-from era@x500.eu) Received: from ERA1 ([95.209.226.245]) by mail03.dandomain.dk (DanDomain Mailserver) with ASMTP id IQO57056; Wed, 01 Apr 2009 14:39:56 +0200 From: "Erik Andersen" To: "Directory list" , "PKIX" Subject: Certificate definitions Date: Wed, 1 Apr 2009 14:39:56 +0200 Message-ID: <1C740690094340D3B49DADD21AD98606@ERA1> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0027_01C9B2D7.BAEC4950" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6838 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Thread-Index: AcmyxvW/KkzbCBxjQ/eyg7S7tJNM1w== Importance: Normal Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0027_01C9B2D7.BAEC4950 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0028_01C9B2D7.BAEC4950" ------=_NextPart_001_0028_01C9B2D7.BAEC4950 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi =20 I got a number of responses on user certificates, but quite little that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first time in = clause 7 as a public-key certificate. There are several other places where it = is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term = at all. It seems just to use the term "certificate" as a synonym for "end-entrity public key certificate". =20 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is also = used in X.511. RFC 5280 uses the term once without differenting it from just "certificate". =20 The term "cross-certificate" should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 "end-entity public-key certificate" "user certictate" as a synonym for "end-entity public-key certificate" "end-entity attrubute certificate" =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attrubute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------=_NextPart_001_0028_01C9B2D7.BAEC4950 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi

 

I got a number of responses on user = certificates, but quite little that actually answered my question.

 

I have tried to dig a little bit more in X.509 = to get hold of the terminology and then produced below figure. I will not = comment all the boxes.

 

 

I will like you to comments as to the = correctness of above figure.

 

The end-entity certificate is not defined in = the definition clause. However it is used widely in the main text. It is = mentioned the first time in clause 7 as a public-key certificate. There are = several other places where it is a public-key certificate. In 15.5.2.4 is used in the = context of attribute certificates. The conclusion must be that an end-entity = certificate can either be a end-entity public-key certificate or an end-entity = attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term at = all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.

 

The “User Certificate”  is = not defined in X.509, but is wide used. It seems to be a synonym for “end-entrity public key certificate”. It is also used in = X.511. RFC 5280 uses the term once without differenting it from just = “certificate”.

 

The term “cross-certificate” = should probably also be qualified.

 

I suggest to add in X.509 definitions = for:

 

“end-entity public-key = certificate”

“user certictate” as a synonym for “end-entity public-key certificate”

“end-entity attrubute = certificate”

 

The X.509 text should be updated to make use = of these definitions.

 

X.509 has four attribute types for holding certificates.

 

UserCertificate: For end-entity public-key certificates

cAcertificate: For CA = certificates

attributeCertificateAttribute: For end-entity attrubute certificates

aACertificate: For AA = Certificates

 

Any comments?

 

Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

 

------=_NextPart_001_0028_01C9B2D7.BAEC4950-- ------=_NextPart_000_0027_01C9B2D7.BAEC4950 Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_000_0027_01C9B2D7.BAEC4950-- From owner-ietf-pkix@mail.imc.org Wed Apr 1 06:25:36 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8C8843A6C65 for ; Wed, 1 Apr 2009 06:25:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.879 X-Spam-Level: X-Spam-Status: No, score=-2.879 tagged_above=-999 required=5 tests=[AWL=-0.280, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wANJ9n9Dv5SD for ; Wed, 1 Apr 2009 06:25:35 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A0C2B3A6B53 for ; Wed, 1 Apr 2009 06:25:34 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31CnK3T069348 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 05:49:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31CnK00069347; Wed, 1 Apr 2009 05:49:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from a.mx.secunet.com (a.mx.secunet.com [213.68.205.161]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31Cn9nH069330 for ; Wed, 1 Apr 2009 05:49:19 -0700 (MST) (envelope-from Johannes.Merkle@secunet.com) Received: from localhost (alg3 [127.0.0.1]) by a.mx.secunet.com (Postfix) with ESMTP id DCB4020C0C6; Wed, 1 Apr 2009 14:49:07 +0200 (CEST) X-Virus-Scanned: by secunet Received: from mail-srv1.secumail.de (unknown [10.53.40.200]) by a.mx.secunet.com (Postfix) with ESMTP id 6AD8A20C0BD; Wed, 1 Apr 2009 14:49:07 +0200 (CEST) Received: from [10.208.1.240] ([10.208.1.240]) by mail-srv1.secumail.de with Microsoft SMTPSVC(6.0.3790.3959); Wed, 1 Apr 2009 14:49:07 +0200 Message-ID: <49D362C2.8020303@secunet.com> Date: Wed, 01 Apr 2009 14:49:06 +0200 From: Johannes Merkle User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: swilson@lockstep.com.au CC: ietf-pkix@imc.org Subject: Re: Renew/Rekey/Modification References: <49D2D476.3030000@lockstep.com.au> In-Reply-To: <49D2D476.3030000@lockstep.com.au> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-OriginalArrivalTime: 01 Apr 2009 12:49:07.0439 (UTC) FILETIME=[3ED91FF0:01C9B2C8] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stephen, I do not know the FPKI documents but I think your questions generally refer to RFC 3647. > Re-key is said (in the FPKI CP) to be a good idea because the older a > key gets, the more susceptible it is to loss and compromise. Fair > enough, but why wouldn't that consideration be factored into the chosen > certificate validity period? > Typically, a certificate is re-keyed when or right before it expires. In this case, the maximum key lifetime is factored into the certificate. > > Is there ever a real world scenario when a Subject would of their own > accord request re-key because they feel the key is getting old? If so, Yes, right before the old certificate expires. An alternative scenario would be after revocation due to suspected key compromise, but in this case the application for the new cert can not be secured by the old one. > why wouldn't they revoke as well? The FPKI CA says that after re-key > "The old certificate may or may not be revoked". Why would you not > revoke, given the possibility that the key has got too old? I don't > think it would ever be sensible to keep using an old original key and a > fresh key. And if I were a Relying Party, I might like to know about > this possible quality difference, yet there would be nothing in a CRL or > anywhere else to mark the fact that the Subscriber has re-keyed. If the old certificate is going to expire very soon, revocation might not be necessary. However, it is considered good practice to revoke the old certificate in the process of re-keying. > The FPKI CA goes on to say that after re-key "The old certificate ... > must not be further re-keyed, renewed, or modified". This seems almost > oxymoronic. Consider that I have certificate A and then I re-key A to > create certificate B. And then I re-key B to create certificate C. I > would say that C is indistinguishable from a re-keyed A since A, B and C > will only differ by key value. So how is it meaningful to forbid > re-keying A more than once? > You are right, they are indistinguishable. However, the rule refers to the re-key application process. In this process the old certificate is used as a reference, typically to authenticate the certificate request and to verify the correctness of the certificate content data. I understand this rule to prohibit future certificate requests being authenticated and verified with the old certificate. In particular, if after a re-key a certificate modification has occured (e.g. because the subject attributes have changed), a re-key based on the re-keyed certificate could result in a certificate with the outdated attributes. > Finally, why does RFC 3647 bother to describe "Certificate Modification" > at all? The term is inherently confusing since one of the most obvious > characteristics of a digital certificate is that it cannot be tampered > with. I question the need for a special bit of counter intuitive jargon > (and a whole slab of the RFC) to cover what is really a mundane > scenario; viz a certificate Subject needs a certificate with different > details in it. That is, it's just a new certificate. Why is it treated > any differently from an original certificate application? > As far as I understand certificate modification covers any application for a new certificate where the data requested to include into the certificate differs from the old certificate in more than merely the public key. You are right, it is a new certificate for the subject, but this also holds for re-key or renewal. The reason why it is treated different from initial (original) certificate application is that registration process can be facilitated. For instance, subject identification and verification of unchanged data can be omitted. Furthermore, the old certificate can be used to authenticate and protect the certificate application process. I agree that the term "certificate modification" is a bit misleading. Johannes From owner-ietf-pkix@mail.imc.org Wed Apr 1 07:13:39 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CD1AC3A6830 for ; Wed, 1 Apr 2009 07:13:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.599 X-Spam-Level: X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aZWvcs7GI8NO for ; Wed, 1 Apr 2009 07:13:38 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 175B73A6D5A for ; Wed, 1 Apr 2009 07:13:37 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31DjrQj073473 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 06:45:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31DjrHs073472; Wed, 1 Apr 2009 06:45:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31DjgQG073446 for ; Wed, 1 Apr 2009 06:45:53 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: Renew/Rekey/Modification Date: Wed, 1 Apr 2009 09:45:42 -0400 Message-ID: <200904011345.n31Djgn4017097@stingray.missi.ncsc.mil> In-Reply-To: <49D2D476.3030000@lockstep.com.au> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmyeJ1hw/dR4nPHTv2WzSlFkRQG1wAVCi8Q References: <49D2D476.3030000@lockstep.com.au> From: "Kemp, David P." To: X-OriginalArrivalTime: 01 Apr 2009 13:40:33.0359 (UTC) FILETIME=[6E3325F0:01C9B2CF] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: You may be over-analyzing the terms. A certificate can be issued ab-initio, or it can be related to an existing certificate. If related, various things can be held constant while others are changed: * if only validity (and serial number, of course) changes, it's called renewal * if other information excluding the key changes, it's called an update or modification * if the key changes, it's called a rekey If a certificate is replaced because of a known key compromise, the cert is rekeyed and the old cert is revoked. If a cert is replaced because it is getting old (nearing the end of its validity) then the old cert may either be revoked or be allowed to expire. Key age is one factor in determining validity period, but so is other information - it may be useful to renew short-lived certificates many times without rekeying in order to avoid or minimize the burden of revocation. You are correct that if cert A is rekeyed twice, there isn't much difference between saying cert C is a rekey of B or of A. But there is a difference for renew and update - it is a management best practice not to renew or update A to produce C after rekeying A to produce B - once A's key has been replaced, no new certificates should be created with that key. It may also be good practice to say that if cert A has been rekeyed to produce B, then only B (and not A, even if still valid) should be used to authenticate the subject when rekeying to produce C. Dave -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Wilson Sent: Tuesday, March 31, 2009 10:42 PM To: ietf-pkix@imc.org Subject: Renew/Rekey/Modification Colleagues, There are a few things about certificate "renewal" and "re-key" that=20 have long confounded me. Things only seem to have got more convoluted=20 in RFC 3647 and -- no offence! -- in newer Certificate Policies like the US FPKI Policy Authority document. Can anyone help me understand the=20 rationale for the some of the following scenarios? Thanks in advance! Re-key is said (in the FPKI CP) to be a good idea because the older a=20 key gets, the more susceptible it is to loss and compromise. Fair=20 enough, but why wouldn't that consideration be factored into the chosen=20 certificate validity period? Is there ever a real world scenario when a Subject would of their own=20 accord request re-key because they feel the key is getting old? If so,=20 why wouldn't they revoke as well? The FPKI CA says that after re-key=20 "The old certificate may or may not be revoked". Why would you not=20 revoke, given the possibility that the key has got too old? I don't=20 think it would ever be sensible to keep using an old original key and a=20 fresh key. And if I were a Relying Party, I might like to know about=20 this possible quality difference, yet there would be nothing in a CRL or anywhere else to mark the fact that the Subscriber has re-keyed. The FPKI CA goes on to say that after re-key "The old certificate ...=20 must not be further re-keyed, renewed, or modified". This seems almost=20 oxymoronic. Consider that I have certificate A and then I re-key A to=20 create certificate B. And then I re-key B to create certificate C. I=20 would say that C is indistinguishable from a re-keyed A since A, B and C will only differ by key value. So how is it meaningful to forbid=20 re-keying A more than once?=20 Finally, why does RFC 3647 bother to describe "Certificate Modification" at all? The term is inherently confusing since one of the most obvious=20 characteristics of a digital certificate is that it cannot be tampered=20 with. I question the need for a special bit of counter intuitive jargon (and a whole slab of the RFC) to cover what is really a mundane=20 scenario; viz a certificate Subject needs a certificate with different=20 details in it. That is, it's just a new certificate. Why is it treated any differently from an original certificate application? Cheers, Stephen Wilson Lockstep Technologies www.lockstep.com.au/technologies. From owner-ietf-pkix@mail.imc.org Wed Apr 1 07:32:20 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 020CC28C1D0 for ; Wed, 1 Apr 2009 07:32:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.4 X-Spam-Level: X-Spam-Status: No, score=-1.4 tagged_above=-999 required=5 tests=[AWL=0.069, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DI+zDqBgsUw6 for ; Wed, 1 Apr 2009 07:32:19 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 68C9C28C1CB for ; Wed, 1 Apr 2009 07:32:18 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31E5cjo074994 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 07:05:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31E5cYN074993; Wed, 1 Apr 2009 07:05:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n31E5R4b074977 for ; Wed, 1 Apr 2009 07:05:37 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 13553 invoked from network); 1 Apr 2009 14:04:23 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 1 Apr 2009 14:04:23 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 10:05:24 -0400 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrA= References: <49D254C3.5030901@Dartmouth.edu> From: "Santosh Chokhani" To: "Massimiliano Pala" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: My resident ASN.1 expert apprised me of the fact that adding a choice will break backward compatibility. Thus, extension is a fifth option (probably third in the priority). Based on what I know of OCSP implementations, not changing anything in terms of bits on the wire and aligning the Key ID with SKID in 5280 is the best approach. I do not think it will hurt backward compatibility. OCSP Responder and OCSP client vendors should speak up if I am wrong. > -----Original Message----- > From: Santosh Chokhani=20 > Sent: Tuesday, March 31, 2009 12:51 PM > To: 'Massimiliano Pala'; IETF-pkix > Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > Max, >=20 > I do not see where and what extension we need to add for=20 > other digest algorithm. >=20 > For key id, we need to enhance or broaden the options.=20 >=20 > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Massimiliano Pala > > Sent: Tuesday, March 31, 2009 1:37 PM > > To: IETF-pkix > > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >=20 > > Hi all, > >=20 > > as I said during last meeting - as the use of SHA-1 does=20 > not have any=20 > > security implication in the OCSP, another viable way would be to=20 > > define an extension where other digest algorithms can be=20 > added to the=20 > > request/responses. > >=20 > > It is a simple addition and does not require any change in=20 > the RFC, it=20 > > can be done as a separate document for those who what to use other=20 > > digest algorithms. > >=20 > > After all, isn't this an example of why we allow extensions to the=20 > > messages ? > >=20 > > Later, > > Max > >=20 > >=20 > > Santosh Chokhani wrote: > > > Tom, > > >=20 > > > Adding a new choice and aligning it with 5280 SKID is fine. > > >=20 > > > I would not add anything about matching this field with > > anything since > > > RFC 2560 does not say anything about it. > > >=20 > > > If one were to add something, one should describe how this > > field can > > > be used to select from multiple Responder certificates. > > >=20 > > >> -----Original Message----- > > >> From: Tom Gindin [mailto:tgindin@us.ibm.com] > > >> Sent: Monday, March 30, 2009 7:46 PM > > >> To: Santosh Chokhani > > >> Cc: IETF-pkix > > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > >> > > >> Santosh: > > >> > > >> The RFC 5280 method just describes "two common=20 > methods for=20 > > >> generating key identifiers from the public key" > > >> and says that other methods are acceptable. The comment > > to KeyHash > > >> in RFC 2560 4.2.1 is not as permissive. Of course, it's=20 > the same=20 > > >> field as SKID, and I would support either stating "if the > > KeyHash is > > >> not precisely 20 octets long, it should be matched against the=20 > > >> Subject Key Identifier extension of the signing certificate" or=20 > > >> adding another choice like byID [3] OCTET STRING -- > > matches the value > > >> of SKID. > > >> > > >> Tom Gindin > > >> > > >> P.S. - The above opinions are mine, and not necessarily > > those of my > > >> employer > > >> > > >> > > >> > > >> > > >> "Santosh Chokhani" Sent by:=20 > > >> owner-ietf-pkix@mail.imc.org > > >> 03/26/2009 10:39 PM > > >> > > >> To > > >> "IETF-pkix" > > >> cc > > >> > > >> Subject > > >> OCSP RFC (RFC 2560) Dependence on SHA-1 > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> RFC 2560 dependence on SHA-1 does not appear to be > > difficult to deal > > >> with. > > >> > > >> Section 4.3 lists SHA-1 as mandatory and RSA as=20 > optional. We can=20 > > >> update this to add SHA-2 series as optional. > > >> > > >> The Responder ID has SHA-1 hardwired. But, that is no > > different than > > >> key ID extensions in RFC 5280. Here are some options in order of > > >> preference: > > >> > > >> 1. Align the language with subject key ID language in RFC 5280. > > >> > > >> 2. Keep on using SHA-1. This field is not security > > relevant. RFC > > >> 2560 does not even describe how to use this field. So, > > having SHA-1 > > >> and accidental or intentional collisions will not hurt the > > security > > >> of the protocol. > > >> > > >> 3. If you do not believe in KISS principle, you can > > define another > > >> response type and enhance the key ID ASN.1 syntax so that hash=20 > > >> algorithm is identified. > > >> > > >> 4. Another option is for the Responder to use the same hashing=20 > > >> algorithm as the one in the first certID entry. > > >> > > >> > > >> Santosh Chokhani > > >> CygnaCom Solutions > > >> > > >> > > >> > > >> > > >=20 > > >=20 > >=20 > >=20 > > -- > >=20 > > Best Regards, > >=20 > > Massimiliano Pala > >=20 > > --o----------------------------------------------------------- > > ------------- > > Massimiliano Pala [OpenCA Project Manager]=20 > > Massimiliano.Pala@dartmouth.edu > > =20 > > project.manager@openca.org > >=20 > > Dartmouth Computer Science Dept Home Phone: +1=20 > > (603) 369-9332 > > PKI/Trust Laboratory Work Phone: +1=20 > > (603) 646-9179 > > --o----------------------------------------------------------- > > ------------- > >=20 > > People who think they know everything are a great annoyance=20 > to those=20 > > of us who do. > > -- > > Isaac Asimov > >=20 >=20 From lind@alicml.lin.go.jp Wed Apr 1 07:33:18 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B1B663A6DB5 for ; Wed, 1 Apr 2009 07:33:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -21.065 X-Spam-Level: X-Spam-Status: No, score=-21.065 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR2=4.395, HTML_IMAGE_ONLY_28=1.561, HTML_IMAGE_RATIO_02=0.383, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W7HkLdIBnQgv for ; Wed, 1 Apr 2009 07:33:17 -0700 (PDT) Received: from 33-200-112-92.pool.ukrtel.net (33-200-112-92.pool.ukrtel.net [92.112.200.33]) by core3.amsl.com (Postfix) with SMTP id 9C0CB3A6DAE for ; Wed, 1 Apr 2009 07:33:16 -0700 (PDT) To: Subject: Transaction cancelled by request From: MensHealth.com MIME-Version: 1.0 Content-Type: text/html Message-Id: <20090401143316.9C0CB3A6DAE@core3.amsl.com> Date: Wed, 1 Apr 2009 07:33:16 -0700 (PDT)
Subscribe to Men's Health Today!



Subscribe to Men's Health Today!





To your health,


David Zinczenko
Editor-in-Chief



Subscribe to Men's Health Today!
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Dept., 33 East Minor Street, Emmaus, PA 18098
From owner-ietf-pkix@mail.imc.org Wed Apr 1 08:20:54 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1A0933A6AE1 for ; Wed, 1 Apr 2009 08:20:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.417 X-Spam-Level: X-Spam-Status: No, score=-6.417 tagged_above=-999 required=5 tests=[AWL=0.182, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8LGOIxm7Sd0R for ; Wed, 1 Apr 2009 08:20:53 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D28753A6949 for ; Wed, 1 Apr 2009 08:20:52 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31ErkXw078713 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 07:53:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31ErkGT078712; Wed, 1 Apr 2009 07:53:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31ErjZu078706 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 1 Apr 2009 07:53:46 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha2.nist.gov [129.6.16.198]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id n31Ersjh014107; Wed, 1 Apr 2009 10:53:55 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id n31ErUBl030443; Wed, 1 Apr 2009 10:53:31 -0400 Message-ID: <49D37FEA.8000200@nist.gov> Date: Wed, 01 Apr 2009 10:53:30 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.19 (X11/20090114) MIME-Version: 1.0 To: Stephen Wilson CC: ietf-pkix@imc.org Subject: Re: Renew/Rekey/Modification References: <49D2D476.3030000@lockstep.com.au> In-Reply-To: <49D2D476.3030000@lockstep.com.au> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stephen Wilson wrote: > The FPKI CA goes on to say that after re-key "The old certificate ... > must not be further re-keyed, renewed, or modified". This seems > almost oxymoronic. Consider that I have certificate A and then I > re-key A to create certificate B. And then I re-key B to create > certificate C. I would say that C is indistinguishable from a > re-keyed A since A, B and C will only differ by key value. So how is > it meaningful to forbid re-keying A more than once? Consider a scenario in which the private key corresponding to certificate A has been compromised (e.g., an attacker, without my knowledge, infects my computer with a virus, obtains a copy of the file containing the private key, and guesses the password used to encrypt the private key file). When certificate A is about to expire, if I wish to continue to have a certificate from this CA, then one of two scenarios may happen: 1) I perform re-key, authenticating myself using certificate A, and obtain certificate B. The attacker is now prevented from performing an on-line re-key to obtain a new certificate in my name, since the system will not permit any further re-key based on certificate A. Thus, the attacker's ability to impersonate me ends either immediately (if certificate A is revoked) or when certificate A expires. 2) The attacker performs a re-key, authenticating himself using the stolen private key, and obtains certificate B. Later, I attempt to perform a re-key and am unsuccessful, since the system will not permit any further re-key based on certificate A. I call the help desk and complain, which will (hopefully) result in certificate B being revoked. (It is unlikely that there would be a certificate C since many CAs will not allow re-key to be performed until the current certificate is approaching its expiration date. But, it wouldn't matter anyways, since presumably my help desk call would result (after authentication of my identity) in all of my certificates being revoked.) If the system permitted more than one re-key based on certificate A, then it would be more likely that the attacker could continue to impersonate me even after certificate A expired. Granted, this is not a foolproof, but I don't think it's moronic either. Dave From owner-ietf-pkix@mail.imc.org Wed Apr 1 12:02:06 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D799228C1FA for ; Wed, 1 Apr 2009 12:02:06 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.227 X-Spam-Level: X-Spam-Status: No, score=-1.227 tagged_above=-999 required=5 tests=[AWL=1.022, BAYES_00=-2.599, HELO_EQ_SE=0.35] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fOU7bB2xMuIw for ; Wed, 1 Apr 2009 12:02:05 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id E6BF53A68BF for ; Wed, 1 Apr 2009 12:01:52 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31IYK88016098 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 11:34:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31IYKBS016097; Wed, 1 Apr 2009 11:34:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31IY7kJ016039 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 1 Apr 2009 11:34:18 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 44914 invoked from network); 1 Apr 2009 18:34:13 -0000 Received: from s34.loopia.se (HELO s29.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 1 Apr 2009 18:34:13 -0000 Received: (qmail 23326 invoked from network); 1 Apr 2009 18:34:05 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s29.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 1 Apr 2009 18:34:05 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 01 Apr 2009 20:34:05 +0200 Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 From: Stefan Santesson To: Santosh Chokhani , Massimiliano Pala , IETF-pkix Message-ID: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2Q== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh, If you are talking about adding other options to calculate the KeyHash value in ResponderID then I strongly disagree. If you add unspecified options you change the properties of the field from deterministic to a completely unknown value. It does not matter if RFC2560 isn't explicit in its description of the use of the field. The fact is that OCSP explicitly defines this value and as such will allow a client to deterministically compare this value with the certificate selected to validate the response signature. If you allow other ways to calculate the value but do not provide any means to signal what method that was used, then this feature is lost. In worst case we will cause current implementation to fail. I really don't think its worth the effort to change this field. We have a very large base of implementations that we really don't want to mess up unless its absolutely necessary. As the only property of this field is to provide a convenient identifier, it is far from absolutely necessary to change it. Remember that there is a second choice to to identify responder by name. For names we have accepted the possibility of collisions. In that comparison, upgrading from SHA-1 is really redundant. /Stefan On 4/1/09 4:05 PM, "Santosh Chokhani" wrote: > > My resident ASN.1 expert apprised me of the fact that adding a choice > will break backward compatibility. Thus, extension is a fifth option > (probably third in the priority). > > Based on what I know of OCSP implementations, not changing anything in > terms of bits on the wire and aligning the Key ID with SKID in 5280 is > the best approach. I do not think it will hurt backward compatibility. > > OCSP Responder and OCSP client vendors should speak up if I am wrong. > >> -----Original Message----- >> From: Santosh Chokhani >> Sent: Tuesday, March 31, 2009 12:51 PM >> To: 'Massimiliano Pala'; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >> >> Max, >> >> I do not see where and what extension we need to add for >> other digest algorithm. >> >> For key id, we need to enhance or broaden the options. >> >>> -----Original Message----- >>> From: owner-ietf-pkix@mail.imc.org >>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Massimiliano Pala >>> Sent: Tuesday, March 31, 2009 1:37 PM >>> To: IETF-pkix >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>> >>> Hi all, >>> >>> as I said during last meeting - as the use of SHA-1 does >> not have any >>> security implication in the OCSP, another viable way would be to >>> define an extension where other digest algorithms can be >> added to the >>> request/responses. >>> >>> It is a simple addition and does not require any change in >> the RFC, it >>> can be done as a separate document for those who what to use other >>> digest algorithms. >>> >>> After all, isn't this an example of why we allow extensions to the >>> messages ? >>> >>> Later, >>> Max >>> >>> >>> Santosh Chokhani wrote: >>>> Tom, >>>> >>>> Adding a new choice and aligning it with 5280 SKID is fine. >>>> >>>> I would not add anything about matching this field with >>> anything since >>>> RFC 2560 does not say anything about it. >>>> >>>> If one were to add something, one should describe how this >>> field can >>>> be used to select from multiple Responder certificates. >>>> >>>>> -----Original Message----- >>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] >>>>> Sent: Monday, March 30, 2009 7:46 PM >>>>> To: Santosh Chokhani >>>>> Cc: IETF-pkix >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> >>>>> Santosh: >>>>> >>>>> The RFC 5280 method just describes "two common >> methods for >>>>> generating key identifiers from the public key" >>>>> and says that other methods are acceptable. The comment >>> to KeyHash >>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's >> the same >>>>> field as SKID, and I would support either stating "if the >>> KeyHash is >>>>> not precisely 20 octets long, it should be matched against the >>>>> Subject Key Identifier extension of the signing certificate" or >>>>> adding another choice like byID [3] OCTET STRING -- >>> matches the value >>>>> of SKID. >>>>> >>>>> Tom Gindin >>>>> >>>>> P.S. - The above opinions are mine, and not necessarily >>> those of my >>>>> employer >>>>> >>>>> >>>>> >>>>> >>>>> "Santosh Chokhani" Sent by: >>>>> owner-ietf-pkix@mail.imc.org >>>>> 03/26/2009 10:39 PM >>>>> >>>>> To >>>>> "IETF-pkix" >>>>> cc >>>>> >>>>> Subject >>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> RFC 2560 dependence on SHA-1 does not appear to be >>> difficult to deal >>>>> with. >>>>> >>>>> Section 4.3 lists SHA-1 as mandatory and RSA as >> optional. We can >>>>> update this to add SHA-2 series as optional. >>>>> >>>>> The Responder ID has SHA-1 hardwired. But, that is no >>> different than >>>>> key ID extensions in RFC 5280. Here are some options in order of >>>>> preference: >>>>> >>>>> 1. Align the language with subject key ID language in RFC 5280. >>>>> >>>>> 2. Keep on using SHA-1. This field is not security >>> relevant. RFC >>>>> 2560 does not even describe how to use this field. So, >>> having SHA-1 >>>>> and accidental or intentional collisions will not hurt the >>> security >>>>> of the protocol. >>>>> >>>>> 3. If you do not believe in KISS principle, you can >>> define another >>>>> response type and enhance the key ID ASN.1 syntax so that hash >>>>> algorithm is identified. >>>>> >>>>> 4. Another option is for the Responder to use the same hashing >>>>> algorithm as the one in the first certID entry. >>>>> >>>>> >>>>> Santosh Chokhani >>>>> CygnaCom Solutions >>>>> >>>>> >>>>> >>>>> >>>> >>>> >>> >>> >>> -- >>> >>> Best Regards, >>> >>> Massimiliano Pala >>> >>> --o----------------------------------------------------------- >>> ------------- >>> Massimiliano Pala [OpenCA Project Manager] >>> Massimiliano.Pala@dartmouth.edu >>> >>> project.manager@openca.org >>> >>> Dartmouth Computer Science Dept Home Phone: +1 >>> (603) 369-9332 >>> PKI/Trust Laboratory Work Phone: +1 >>> (603) 646-9179 >>> --o----------------------------------------------------------- >>> ------------- >>> >>> People who think they know everything are a great annoyance >> to those >>> of us who do. >>> -- >>> Isaac Asimov >>> >> > From owner-ietf-pkix@mail.imc.org Wed Apr 1 13:18:14 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4E8BF3A6A9B for ; Wed, 1 Apr 2009 13:18:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.824 X-Spam-Level: X-Spam-Status: No, score=-1.824 tagged_above=-999 required=5 tests=[AWL=0.775, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rJ9KwcTZr+y6 for ; Wed, 1 Apr 2009 13:18:13 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7D0363A6C06 for ; Wed, 1 Apr 2009 13:18:06 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31JmPLU027469 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 12:48:26 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31JmPsC027468; Wed, 1 Apr 2009 12:48:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout1-sn1.fre.skanova.net (pne-smtpout1-sn1.fre.skanova.net [81.228.11.98]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31JmEIW027449 for ; Wed, 1 Apr 2009 12:48:25 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout1-sn1.fre.skanova.net (7.3.129) id 49CCDA0700083DB2 for ietf-pkix@imc.org; Wed, 1 Apr 2009 21:48:14 +0200 Message-ID: <9551C16907D34653BD44A9E308F773CE@AndersPC> From: "Anders Rundgren" To: Subject: WG Advice on Reviving a multikey certificate I-D Date: Wed, 1 Apr 2009 21:48:23 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Quite some time ago the following I-D was written and then left to expire (probably due to lack of interest): http://www.potaroo.net/ietf/all-ids/draft-lin-mpk-app-00.txt It seems that there is a class of applications that could use this scheme as an alternative to multiple certificates and that are devices that are to be pre-configured with device certificates. Such devices include mobile phones and routers (work is currently performed by IEEE). The router people are currently thinking in terms of hosting a single authentication certificate which in SOHO configurations would be used "as-is" as an easier alternative to shared secrets. However, for enterprise use, it is likely that corporate IT would like to unify the equipment to an in-house PKI. Although you could use the authentication certificate for credential bootstrapping, a better solution is making in-device key-generation with attested public keys. This calls for device attestation keys which in some way must be distinguishable from authentication keys. To avoid that devices get "split personalities" it would be nice to put the attestation key in the same certificate as normally used for authentications. Since attestations is something very specific not associated with standard applications, there is no impediment having to dig out the public key from a certificate in a slightly unusual way, it is just 20 lines extra to 2000 you already got :-) TrustedComputingGroup have addressed this topic using a virtual orgy of keys and certificates. I prefer simpler solutions. One Device => One Certificate => One ID I started with this issue (multiple keys) using DIAS scheme: http://webpki.org/papers/keygen2/keygen2-fips140-2.pdf but unfortunately DIAS does not translate well to ECDSA, but MPK certificates look like a *very* good alternative. So, how should I proceed with this I-D? Anybody out there interested? I don't intend to change anything in the expired I-D except for application space and minor stuff. One of the original authors have indicated interest in a revival. Anders From owner-ietf-pkix@mail.imc.org Wed Apr 1 13:54:30 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B49AD3A6988 for ; Wed, 1 Apr 2009 13:54:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.407 X-Spam-Level: X-Spam-Status: No, score=-1.407 tagged_above=-999 required=5 tests=[AWL=0.062, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p9qRPyGxo5kq for ; Wed, 1 Apr 2009 13:54:29 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 1293828C1C2 for ; Wed, 1 Apr 2009 13:54:28 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31KWFuv030379 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 13:32:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31KWFEq030378; Wed, 1 Apr 2009 13:32:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n31KW3xF030367 for ; Wed, 1 Apr 2009 13:32:13 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 16962 invoked from network); 1 Apr 2009 20:30:59 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 1 Apr 2009 20:30:58 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 16:31:58 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQ References: From: "Santosh Chokhani" To: "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan, See responses in-line. > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 > Sent: Wednesday, April 01, 2009 2:34 PM > To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > Santosh, >=20 > If you are talking about adding other options to calculate=20 > the KeyHash value in ResponderID then I strongly disagree. >=20 > If you add unspecified options you change the properties of=20 > the field from deterministic to a completely unknown value.=20 > It does not matter if RFC2560 isn't explicit in its=20 > description of the use of the field. The fact is that OCSP=20 > explicitly defines this value and as such will allow a client=20 > to deterministically compare this value with the certificate=20 > selected to validate the response signature. I hope no one is doing the matching of Responder ID with hash of a key in place of responder signature verification. That would be real bad. > If you allow=20 > other ways to calculate the value but do not provide any=20 > means to signal what method that was used, then this feature is lost. The most common use will be to use this field to prioritize the certificates of the responder to use for sigature verification on the response. >=20 > In worst case we will cause current implementation to fail. That is why I am asking what problems if any will the vendors have. >=20 > I really don't think its worth the effort to change this=20 > field. We have a very large base of implementations that we=20 > really don't want to mess up unless its absolutely necessary. So, we agree that leaving this field hard wired to SHA-1 is ok and 2560 can easily accommodate new hash functions. Right? My only reason to align with 5280 is that if some one were ever want to strip off SHA-1 altogether from their Responder or client, permitting other methods does it. >=20 > As the only property of this field is to provide a convenient=20 > identifier, it is far from absolutely necessary to change it.=20 > Remember that there is a second choice to to identify=20 > responder by name. For names we have accepted the possibility=20 > of collisions. In that comparison, upgrading from SHA-1 is=20 > really redundant. >=20 > /Stefan >=20 >=20 >=20 >=20 > On 4/1/09 4:05 PM, "Santosh Chokhani" wrote: >=20 > >=20 > > My resident ASN.1 expert apprised me of the fact that=20 > adding a choice=20 > > will break backward compatibility. Thus, extension is a=20 > fifth option=20 > > (probably third in the priority). > >=20 > > Based on what I know of OCSP implementations, not changing=20 > anything in=20 > > terms of bits on the wire and aligning the Key ID with SKID=20 > in 5280 is=20 > > the best approach. I do not think it will hurt backward=20 > compatibility. > >=20 > > OCSP Responder and OCSP client vendors should speak up if I=20 > am wrong. > >=20 > >> -----Original Message----- > >> From: Santosh Chokhani > >> Sent: Tuesday, March 31, 2009 12:51 PM > >> To: 'Massimiliano Pala'; IETF-pkix > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >> Max, > >>=20 > >> I do not see where and what extension we need to add for=20 > other digest=20 > >> algorithm. > >>=20 > >> For key id, we need to enhance or broaden the options. > >>=20 > >>> -----Original Message----- > >>> From: owner-ietf-pkix@mail.imc.org > >>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of=20 > Massimiliano Pala > >>> Sent: Tuesday, March 31, 2009 1:37 PM > >>> To: IETF-pkix > >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>=20 > >>> Hi all, > >>>=20 > >>> as I said during last meeting - as the use of SHA-1 does > >> not have any > >>> security implication in the OCSP, another viable way would be to=20 > >>> define an extension where other digest algorithms can be > >> added to the > >>> request/responses. > >>>=20 > >>> It is a simple addition and does not require any change in > >> the RFC, it > >>> can be done as a separate document for those who what to=20 > use other=20 > >>> digest algorithms. > >>>=20 > >>> After all, isn't this an example of why we allow=20 > extensions to the=20 > >>> messages ? > >>>=20 > >>> Later, > >>> Max > >>>=20 > >>>=20 > >>> Santosh Chokhani wrote: > >>>> Tom, > >>>>=20 > >>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>=20 > >>>> I would not add anything about matching this field with > >>> anything since > >>>> RFC 2560 does not say anything about it. > >>>>=20 > >>>> If one were to add something, one should describe how this > >>> field can > >>>> be used to select from multiple Responder certificates. > >>>>=20 > >>>>> -----Original Message----- > >>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>> To: Santosh Chokhani > >>>>> Cc: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>> Santosh: > >>>>>=20 > >>>>> The RFC 5280 method just describes "two common > >> methods for > >>>>> generating key identifiers from the public key" > >>>>> and says that other methods are acceptable. The comment > >>> to KeyHash > >>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >> the same > >>>>> field as SKID, and I would support either stating "if the > >>> KeyHash is > >>>>> not precisely 20 octets long, it should be matched against the=20 > >>>>> Subject Key Identifier extension of the signing certificate" or=20 > >>>>> adding another choice like byID [3] OCTET STRING -- > >>> matches the value > >>>>> of SKID. > >>>>>=20 > >>>>> Tom Gindin > >>>>>=20 > >>>>> P.S. - The above opinions are mine, and not necessarily > >>> those of my > >>>>> employer > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> "Santosh Chokhani" Sent by: > >>>>> owner-ietf-pkix@mail.imc.org > >>>>> 03/26/2009 10:39 PM > >>>>>=20 > >>>>> To > >>>>> "IETF-pkix" > >>>>> cc > >>>>>=20 > >>>>> Subject > >>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>> difficult to deal > >>>>> with. > >>>>>=20 > >>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >> optional. We can > >>>>> update this to add SHA-2 series as optional. > >>>>>=20 > >>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>> different than > >>>>> key ID extensions in RFC 5280. Here are some options=20 > in order of > >>>>> preference: > >>>>>=20 > >>>>> 1. Align the language with subject key ID language in RFC 5280. > >>>>>=20 > >>>>> 2. Keep on using SHA-1. This field is not security > >>> relevant. RFC > >>>>> 2560 does not even describe how to use this field. So, > >>> having SHA-1 > >>>>> and accidental or intentional collisions will not hurt the > >>> security > >>>>> of the protocol. > >>>>>=20 > >>>>> 3. If you do not believe in KISS principle, you can > >>> define another > >>>>> response type and enhance the key ID ASN.1 syntax so that hash=20 > >>>>> algorithm is identified. > >>>>>=20 > >>>>> 4. Another option is for the Responder to use the same hashing=20 > >>>>> algorithm as the one in the first certID entry. > >>>>>=20 > >>>>>=20 > >>>>> Santosh Chokhani > >>>>> CygnaCom Solutions > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>=20 > >>>>=20 > >>>=20 > >>>=20 > >>> -- > >>>=20 > >>> Best Regards, > >>>=20 > >>> Massimiliano Pala > >>>=20 > >>> --o----------------------------------------------------------- > >>> ------------- > >>> Massimiliano Pala [OpenCA Project Manager]=20 > >>> Massimiliano.Pala@dartmouth.edu > >>> =20 > >>> project.manager@openca.org > >>>=20 > >>> Dartmouth Computer Science Dept Home Phone: +1 > >>> (603) 369-9332 > >>> PKI/Trust Laboratory Work Phone: +1 > >>> (603) 646-9179 > >>> --o----------------------------------------------------------- > >>> ------------- > >>>=20 > >>> People who think they know everything are a great annoyance > >> to those > >>> of us who do. > >>> -- > >>> Isaac Asimov > >>>=20 > >>=20 > >=20 >=20 >=20 >=20 From owner-ietf-pkix@mail.imc.org Wed Apr 1 14:31:42 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 510043A68AA for ; Wed, 1 Apr 2009 14:31:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.413 X-Spam-Level: X-Spam-Status: No, score=-1.413 tagged_above=-999 required=5 tests=[AWL=0.056, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eZBlWfIB+g49 for ; Wed, 1 Apr 2009 14:31:41 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id ED1FA3A689F for ; Wed, 1 Apr 2009 14:31:40 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31L0qR5032312 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 14:00:52 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31L0qIK032311; Wed, 1 Apr 2009 14:00:52 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n31L0pJI032303 for ; Wed, 1 Apr 2009 14:00:52 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 17220 invoked from network); 1 Apr 2009 20:59:47 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 1 Apr 2009 20:59:47 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: Renew/Rekey/Modification Date: Wed, 1 Apr 2009 17:00:50 -0400 Message-ID: In-Reply-To: <49D2D476.3030000@lockstep.com.au> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSw References: <49D2D476.3030000@lockstep.com.au> From: "Santosh Chokhani" To: , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stephen, See responses in-line.=20 > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org=20 > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Wilson > Sent: Tuesday, March 31, 2009 10:42 PM > To: ietf-pkix@imc.org > Subject: Renew/Rekey/Modification >=20 >=20 >=20 > Colleagues, >=20 > There are a few things about certificate "renewal" and=20 > "re-key" that have long confounded me. Things only seem to=20 > have got more convoluted in RFC 3647 and -- no offence! -- in=20 > newer Certificate Policies like the=20 > US FPKI Policy Authority document. Can anyone help me=20 > understand the=20 > rationale for the some of the following scenarios? Thanks in advance! >=20 >=20 >=20 > Re-key is said (in the FPKI CP) to be a good idea because the=20 > older a key gets, the more susceptible it is to loss and=20 > compromise. Fair enough, but why wouldn't that consideration=20 > be factored into the chosen certificate validity period? It should be. The goal here is to use the current certificate to authenticate to create new certificates. >=20 >=20 > Is there ever a real world scenario when a Subject would of=20 > their own accord request re-key because they feel the key is=20 > getting old? PKI obligations and policy may require that subject perform the re-key and take some concrete action in order to be bound to the subscriber obligations and agreements. > If so, why wouldn't they revoke as well? Two reasons come to mind for not revoking. You do not want to invalidate existing, unexpired signatures. You do not want to have built in mechanism for large CRL. BTW, you can compensate for it by destroying the current key after re-key. > The=20 > FPKI CA says that after re-key "The old certificate may or=20 > may not be revoked". Why would you not revoke, given the=20 > possibility that the key has got too old? See previous response. > I don't think it=20 > would ever be sensible to keep using an old original key and=20 > a fresh key. And if I were a Relying Party, I might like to=20 > know about this possible quality difference, yet there would=20 > be nothing in a CRL or anywhere else to mark the fact that=20 > the Subscriber has re-keyed. >=20 You do not need to use the old authentication/signature key. You do not need to revoke it either. You can simply destroy it. You do need to keep old decryption keys. >=20 > The FPKI CA goes on to say that after re-key "The old certificate ...=20 > must not be further re-keyed, renewed, or modified". This=20 > seems almost oxymoronic. Consider that I have certificate A=20 > and then I re-key A to create certificate B. And then I=20 > re-key B to create certificate C. I would say that C is=20 > indistinguishable from a re-keyed A since A, B and C will=20 > only differ by key value. So how is it meaningful to forbid=20 > re-keying A more than once?=20 >=20 Certificates are not the only objects. CA and RA can keep other information that can be used to enforce that A is used to rekey only once. >=20 > Finally, why does RFC 3647 bother to describe "Certificate=20 > Modification"=20 > at all? The term is inherently confusing since one of the=20 > most obvious characteristics of a digital certificate is that=20 > it cannot be tampered with. I question the need for a=20 > special bit of counter intuitive jargon (and a whole slab of=20 > the RFC) to cover what is really a mundane scenario; viz a=20 > certificate Subject needs a certificate with different=20 > details in it. That is, it's just a new certificate. Why is=20 > it treated any differently from an original certificate application? Certificate Modification (like renewal and rekey) refer to the fact that a new certificate with different information is created. If you feel that the term is confusing, let us know of a better term. As to why deal with differently that original certificate is that the modification may be carried out using fully or partly automated process based on the current certificate to be modified. That is why framework identifies this. Of course, many certificate policies require initial process for certificate modification. For that matter, policies do not permit renewal and some require initial process for rekey as well. The framework tries to accommodate many plausible scenarios. >=20 >=20 > Cheers, >=20 > Stephen Wilson > Lockstep Technologies > www.lockstep.com.au/technologies. >=20 >=20 >=20 From owner-ietf-pkix@mail.imc.org Wed Apr 1 15:37:08 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3FAD23A6957 for ; Wed, 1 Apr 2009 15:37:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.756 X-Spam-Level: X-Spam-Status: No, score=-103.756 tagged_above=-999 required=5 tests=[AWL=2.843, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 03fFg-UfP+Ru for ; Wed, 1 Apr 2009 15:36:57 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id B71583A67B6 for ; Wed, 1 Apr 2009 15:36:56 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31M176E036211 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 15:01:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31M172n036210; Wed, 1 Apr 2009 15:01:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31M17dQ036204 for ; Wed, 1 Apr 2009 15:01:07 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id 19EDB3A6909; Wed, 1 Apr 2009 15:00:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D ACTION:draft-ietf-pkix-tac-03.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090401220006.19EDB3A6909@core3.amsl.com> Date: Wed, 1 Apr 2009 15:00:02 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Traceable Anonymous Certificate Author(s) : S. Park, H. Park, Y. Won, J. Lee, S. Kent Filename : draft-ietf-pkix-tac-03.txt Pages : 32 Date : 2009-3-31 Public Key Infrastructure (PKI) provides a powerful means of authenticating individuals, organizations, and computers(e.g., web servers). However, when individuals use certificates to access resources on the public Internet, there are legitimate concerns about personal privacy, and thus there are increasing demands for privacy enhancing techniques on the Internet. In a PKI, an authorized entity such as a certification Authority (CA) or a Registration Authority (RA) may be perceived, from a privacy perspective, as a "big brother," even when a CA issues a certificate containing a Subject name that is a pseudonym. This is because such entities can always map a pseudonym in a certificate they issued to the name of the real user to whom it was issued. This document defines a practical architecture and protocols for offering privacy for a user who requests and uses an X.509 certificate containing a pseudonym, while still retaining the ability to map such a certificate to the real user who requested it. The architecture is compatible with IETF certificate request formats such as PKCS10 [3]and CMC[4]. The architecture separates the authorities involved in issuing a certificate: one for verifying ownership of a private key (Blind Issuer) and the other for validating the contents of a certificate (Anonymous Issuer). The end-entity(EE) certificates issued under this model are called Traceable Anonymous Certificates (TACs). A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-tac-03.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-tac-03.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-4-1145650.I-D@ietf.org> --NextPart-- From owner-ietf-pkix@mail.imc.org Wed Apr 1 15:54:47 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6775D3A6A10 for ; Wed, 1 Apr 2009 15:54:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.482 X-Spam-Level: X-Spam-Status: No, score=-1.482 tagged_above=-999 required=5 tests=[AWL=0.767, BAYES_00=-2.599, HELO_EQ_SE=0.35] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6A1Rxqxg+Tpr for ; Wed, 1 Apr 2009 15:54:46 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 9ADEA3A6829 for ; Wed, 1 Apr 2009 15:54:45 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31MWJ3C037979 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 15:32:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31MWJB0037978; Wed, 1 Apr 2009 15:32:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31MW6a3037969 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 1 Apr 2009 15:32:17 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 72537 invoked from network); 1 Apr 2009 22:32:14 -0000 Received: from s34.loopia.se (HELO s42.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 1 Apr 2009 22:32:14 -0000 Received: (qmail 52688 invoked from network); 1 Apr 2009 22:32:05 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s42.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 1 Apr 2009 22:32:05 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 00:32:04 +0200 Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 From: Stefan Santesson To: Santosh Chokhani , IETF-pkix Message-ID: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKk= In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh, In-line On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > Stefan, > > See responses in-line. > >> -----Original Message----- >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] >> Sent: Wednesday, April 01, 2009 2:34 PM >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >> >> Santosh, >> >> If you are talking about adding other options to calculate >> the KeyHash value in ResponderID then I strongly disagree. >> >> If you add unspecified options you change the properties of >> the field from deterministic to a completely unknown value. >> It does not matter if RFC2560 isn't explicit in its >> description of the use of the field. The fact is that OCSP >> explicitly defines this value and as such will allow a client >> to deterministically compare this value with the certificate >> selected to validate the response signature. > > I hope no one is doing the matching of Responder ID with hash of a key > in place of responder signature verification. That would be real bad. > Yes it would. That is not at all what I talk about. But a client could use this value to locate a responder certificate. >> If you allow >> other ways to calculate the value but do not provide any >> means to signal what method that was used, then this feature is lost. > > The most common use will be to use this field to prioritize the > certificates of the responder to use for sigature verification on the > response. > Do you know this for a fact, or are you guessing? If a single implementation verifies that the certificate used to validate the response matches the ResponderID value, and choose to go into an error state because of mismatch, then we have created great problems. So we can't guess. We have to know that no single implementation will fail because of this. And that may be very hard. >> >> In worst case we will cause current implementation to fail. > > That is why I am asking what problems if any will the vendors have. > Even if no vendor speaks up here, it will not guarantee that this will not create any problems. >> >> I really don't think its worth the effort to change this >> field. We have a very large base of implementations that we >> really don't want to mess up unless its absolutely necessary. > > So, we agree that leaving this field hard wired to SHA-1 is ok and 2560 > can easily accommodate new hash functions. Right? > I fail to understand this sentence. Despite reading it many times over. > My only reason to align with 5280 is that if some one were ever want to > strip off SHA-1 altogether from their Responder or client, permitting > other methods does it. > I don't believe this argument is valid as I don't think it is possible to strip off SHA-1 in any reasonable future. In any case. If we compare the positive side with allowing this change and the negative consequences to make OCSP incompatible with itself, my choice is easy. /Stefan >> >> As the only property of this field is to provide a convenient >> identifier, it is far from absolutely necessary to change it. >> Remember that there is a second choice to to identify >> responder by name. For names we have accepted the possibility >> of collisions. In that comparison, upgrading from SHA-1 is >> really redundant. >> >> /Stefan >> >> >> >> >> On 4/1/09 4:05 PM, "Santosh Chokhani" wrote: >> >>> >>> My resident ASN.1 expert apprised me of the fact that >> adding a choice >>> will break backward compatibility. Thus, extension is a >> fifth option >>> (probably third in the priority). >>> >>> Based on what I know of OCSP implementations, not changing >> anything in >>> terms of bits on the wire and aligning the Key ID with SKID >> in 5280 is >>> the best approach. I do not think it will hurt backward >> compatibility. >>> >>> OCSP Responder and OCSP client vendors should speak up if I >> am wrong. >>> >>>> -----Original Message----- >>>> From: Santosh Chokhani >>>> Sent: Tuesday, March 31, 2009 12:51 PM >>>> To: 'Massimiliano Pala'; IETF-pkix >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>> >>>> Max, >>>> >>>> I do not see where and what extension we need to add for >> other digest >>>> algorithm. >>>> >>>> For key id, we need to enhance or broaden the options. >>>> >>>>> -----Original Message----- >>>>> From: owner-ietf-pkix@mail.imc.org >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of >> Massimiliano Pala >>>>> Sent: Tuesday, March 31, 2009 1:37 PM >>>>> To: IETF-pkix >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> >>>>> Hi all, >>>>> >>>>> as I said during last meeting - as the use of SHA-1 does >>>> not have any >>>>> security implication in the OCSP, another viable way would be to >>>>> define an extension where other digest algorithms can be >>>> added to the >>>>> request/responses. >>>>> >>>>> It is a simple addition and does not require any change in >>>> the RFC, it >>>>> can be done as a separate document for those who what to >> use other >>>>> digest algorithms. >>>>> >>>>> After all, isn't this an example of why we allow >> extensions to the >>>>> messages ? >>>>> >>>>> Later, >>>>> Max >>>>> >>>>> >>>>> Santosh Chokhani wrote: >>>>>> Tom, >>>>>> >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. >>>>>> >>>>>> I would not add anything about matching this field with >>>>> anything since >>>>>> RFC 2560 does not say anything about it. >>>>>> >>>>>> If one were to add something, one should describe how this >>>>> field can >>>>>> be used to select from multiple Responder certificates. >>>>>> >>>>>>> -----Original Message----- >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] >>>>>>> Sent: Monday, March 30, 2009 7:46 PM >>>>>>> To: Santosh Chokhani >>>>>>> Cc: IETF-pkix >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>> >>>>>>> Santosh: >>>>>>> >>>>>>> The RFC 5280 method just describes "two common >>>> methods for >>>>>>> generating key identifiers from the public key" >>>>>>> and says that other methods are acceptable. The comment >>>>> to KeyHash >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's >>>> the same >>>>>>> field as SKID, and I would support either stating "if the >>>>> KeyHash is >>>>>>> not precisely 20 octets long, it should be matched against the >>>>>>> Subject Key Identifier extension of the signing certificate" or >>>>>>> adding another choice like byID [3] OCTET STRING -- >>>>> matches the value >>>>>>> of SKID. >>>>>>> >>>>>>> Tom Gindin >>>>>>> >>>>>>> P.S. - The above opinions are mine, and not necessarily >>>>> those of my >>>>>>> employer >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> "Santosh Chokhani" Sent by: >>>>>>> owner-ietf-pkix@mail.imc.org >>>>>>> 03/26/2009 10:39 PM >>>>>>> >>>>>>> To >>>>>>> "IETF-pkix" >>>>>>> cc >>>>>>> >>>>>>> Subject >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be >>>>> difficult to deal >>>>>>> with. >>>>>>> >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as >>>> optional. We can >>>>>>> update this to add SHA-2 series as optional. >>>>>>> >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no >>>>> different than >>>>>>> key ID extensions in RFC 5280. Here are some options >> in order of >>>>>>> preference: >>>>>>> >>>>>>> 1. Align the language with subject key ID language in RFC 5280. >>>>>>> >>>>>>> 2. Keep on using SHA-1. This field is not security >>>>> relevant. RFC >>>>>>> 2560 does not even describe how to use this field. So, >>>>> having SHA-1 >>>>>>> and accidental or intentional collisions will not hurt the >>>>> security >>>>>>> of the protocol. >>>>>>> >>>>>>> 3. If you do not believe in KISS principle, you can >>>>> define another >>>>>>> response type and enhance the key ID ASN.1 syntax so that hash >>>>>>> algorithm is identified. >>>>>>> >>>>>>> 4. Another option is for the Responder to use the same hashing >>>>>>> algorithm as the one in the first certID entry. >>>>>>> >>>>>>> >>>>>>> Santosh Chokhani >>>>>>> CygnaCom Solutions >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>> >>>>>> >>>>> >>>>> >>>>> -- >>>>> >>>>> Best Regards, >>>>> >>>>> Massimiliano Pala >>>>> >>>>> --o----------------------------------------------------------- >>>>> ------------- >>>>> Massimiliano Pala [OpenCA Project Manager] >>>>> Massimiliano.Pala@dartmouth.edu >>>>> >>>>> project.manager@openca.org >>>>> >>>>> Dartmouth Computer Science Dept Home Phone: +1 >>>>> (603) 369-9332 >>>>> PKI/Trust Laboratory Work Phone: +1 >>>>> (603) 646-9179 >>>>> --o----------------------------------------------------------- >>>>> ------------- >>>>> >>>>> People who think they know everything are a great annoyance >>>> to those >>>>> of us who do. >>>>> -- >>>>> Isaac Asimov >>>>> >>>> >>> >> >> >> > From owner-ietf-pkix@mail.imc.org Wed Apr 1 18:08:36 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CAAE13A68B2 for ; Wed, 1 Apr 2009 18:08:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.417 X-Spam-Level: X-Spam-Status: No, score=-1.417 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n1YWe2XMzu0Y for ; Wed, 1 Apr 2009 18:08:35 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id F33173A697D for ; Wed, 1 Apr 2009 18:08:34 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n320dbMH044081 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 17:39:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n320dbrf044080; Wed, 1 Apr 2009 17:39:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n320dPQe044071 for ; Wed, 1 Apr 2009 17:39:36 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 18786 invoked from network); 2 Apr 2009 00:38:21 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 00:38:20 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 20:39:23 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQA== References: From: "Santosh Chokhani" To: "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > Santosh, >=20 > In-line >=20 >=20 > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: >=20 > >=20 > > Stefan, > >=20 > > See responses in-line. > >=20 > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >> Santosh, > >>=20 > >> If you are talking about adding other options to calculate the=20 > >> KeyHash value in ResponderID then I strongly disagree. > >>=20 > >> If you add unspecified options you change the properties=20 > of the field=20 > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of=20 > >> the use of the field. The fact is that OCSP explicitly=20 > defines this=20 > >> value and as such will allow a client to deterministically compare=20 > >> this value with the certificate selected to validate the response=20 > >> signature. > >=20 > > I hope no one is doing the matching of Responder ID with=20 > hash of a key=20 > > in place of responder signature verification. That would=20 > be real bad. > >=20 >=20 > Yes it would. That is not at all what I talk about. But a=20 > client could use this value to locate a responder certificate. >=20 > >> If you allow > >> other ways to calculate the value but do not provide any means to=20 > >> signal what method that was used, then this feature is lost. > >=20 > > The most common use will be to use this field to prioritize the=20 > > certificates of the responder to use for sigature=20 > verification on the=20 > > response. > >=20 >=20 > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used=20 > to validate the response matches the ResponderID value, and=20 > choose to go into an error state because of mismatch, then we=20 > have created great problems. So we can't guess. We have to=20 > know that no single implementation will fail because of this.=20 > And that may be very hard. >=20 >=20 > >>=20 > >> In worst case we will cause current implementation to fail. > >=20 > > That is why I am asking what problems if any will the vendors have. > >=20 >=20 > Even if no vendor speaks up here, it will not guarantee that=20 > this will not create any problems. >=20 > >>=20 > >> I really don't think its worth the effort to change this field. We=20 > >> have a very large base of implementations that we really=20 > don't want=20 > >> to mess up unless its absolutely necessary. > >=20 > > So, we agree that leaving this field hard wired to SHA-1 is ok and=20 > > 2560 can easily accommodate new hash functions. Right? > >=20 >=20 > I fail to understand this sentence. Despite reading it many=20 > times over. >=20 > > My only reason to align with 5280 is that if some one were=20 > ever want=20 > > to strip off SHA-1 altogether from their Responder or client,=20 > > permitting other methods does it. > >=20 >=20 > I don't believe this argument is valid as I don't think it is=20 > possible to strip off SHA-1 in any reasonable future. In any=20 > case. If we compare the positive side with allowing this=20 > change and the negative consequences to make OCSP=20 > incompatible with itself, my choice is easy. >=20 > /Stefan > =20 >=20 > >>=20 > >> As the only property of this field is to provide a convenient=20 > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by=20 > >> name. For names we have accepted the possibility of collisions. In=20 > >> that comparison, upgrading from SHA-1 is really redundant. > >>=20 > >> /Stefan > >>=20 > >>=20 > >>=20 > >>=20 > >> On 4/1/09 4:05 PM, "Santosh Chokhani"=20 > wrote: > >>=20 > >>>=20 > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>>=20 > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>>=20 > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>>=20 > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>=20 > >>>> Max, > >>>>=20 > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>>=20 > >>>> For key id, we need to enhance or broaden the options. > >>>>=20 > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org=20 > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>> Hi all, > >>>>>=20 > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way=20 > would be to=20 > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>>=20 > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>>=20 > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>>=20 > >>>>> Later, > >>>>> Max > >>>>>=20 > >>>>>=20 > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>>=20 > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>>=20 > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>>=20 > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>>=20 > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>>=20 > >>>>>>> Santosh: > >>>>>>>=20 > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched=20 > against the=20 > >>>>>>> Subject Key Identifier extension of the signing=20 > certificate" or=20 > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>>=20 > >>>>>>> Tom Gindin > >>>>>>>=20 > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>>=20 > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>>=20 > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>>=20 > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>>=20 > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>>=20 > >>>>>>> 1. Align the language with subject key ID language=20 > in RFC 5280. > >>>>>>>=20 > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>>=20 > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so=20 > that hash=20 > >>>>>>> algorithm is identified. > >>>>>>>=20 > >>>>>>> 4. Another option is for the Responder to use the=20 > same hashing=20 > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>>=20 > >>>>>>>=20 > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>=20 > >>>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> -- > >>>>>=20 > >>>>> Best Regards, > >>>>>=20 > >>>>> Massimiliano Pala > >>>>>=20 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager]=20 > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>>=20 > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>>=20 > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>>=20 > >>>>=20 > >>>=20 > >>=20 > >>=20 > >>=20 > >=20 >=20 >=20 >=20 From owner-ietf-pkix@mail.imc.org Wed Apr 1 22:21:35 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AD2E628C161 for ; Wed, 1 Apr 2009 22:21:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.402 X-Spam-Level: X-Spam-Status: No, score=-5.402 tagged_above=-999 required=5 tests=[AWL=-0.200, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NrFEiiKpmibD for ; Wed, 1 Apr 2009 22:21:33 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 47AEC3A6BD7 for ; Wed, 1 Apr 2009 22:21:32 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n324rG6l055520 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 21:53:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n324rFtQ055519; Wed, 1 Apr 2009 21:53:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n324r3g7055506 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Wed, 1 Apr 2009 21:53:14 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com [65.205.251.35]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id n324R7nm012537; Wed, 1 Apr 2009 21:27:07 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 1 Apr 2009 21:52:55 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B34E.E3525609" Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 21:52:55 -0700 Message-ID: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 thread-index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2 References: From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , "Stefan Santesson" , "IETF-pkix" X-OriginalArrivalTime: 02 Apr 2009 04:52:55.0843 (UTC) FILETIME=[E3434F30:01C9B34E] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B34E.E3525609 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable I think we have no choice but to leave the Key ID CHOICE to be SHA-1 = based. =20 But that does not preclude adding an extension that allows the KeyID to = be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that = uses weak crypto necessitates an (expensive) security review to prove = that there is no problem. And these must be performed repeatedly by many = different parties as relying on the analysis of others is a good way to = cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple = compressor collisions may not be a concern, there is no guarantee that = the attacks will stop at that point. MD4 has been broken repeatedly and = they are now at the stage of jumping up and down on the little pieces. = It will probably happen to MD5 and we should be cautious in case it = happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to = have my position characterized as stupid. My designs are not exactly = known for being verbose or overly elaborate. If I propose something it = is because there is a reason. It is very easy to defend the status quo = by derriding proposals as unnecessary, but the fact is that making OCSP = too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that = the core of PKIX as it now stands (the certificate profile and OCSP) be = capable of stand alone use. We cannot fix issues in OCSP with LTANS or = other layered-on protocols as some have proposed. It does not simplify = my OCSP deployment to have to graft on an entire different protocol in = addition or to re-engineer my document archival protocol to cover = defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve = security. You only improve security if you withdraw insecure algorithms = from use. =20 To make the system work you have to have a means of negotiating between = the client and the server. Otherwise there is no way for an OCSP = responder to ensure that it receives a secure, supported response to = querries for certificates that do not exist yet or are not known to the = responder. =20 In the case of an OCSP responder being driven by CRLs collected from = various sources, there is no way for the CA to know if a certificate = even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is = performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be = upgraded at will is simply not representative of large scale real world = deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > ------_=_NextPart_001_01C9B34E.E3525609 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1=0A= =0A= =0A= =0A=
=0A=
I think we = have no choice but to leave the Key ID CHOICE to be SHA-1 = based.
=0A=
 
=0A=
But that does not preclude = adding an extension that allows the KeyID to be specified using a = stronger algorithm. There are two reasons for this:
=0A=
 
=0A=
1) Optics, even if there is = no security implication, a protocol that uses weak crypto necessitates = an (expensive) security review to prove that there is no problem. And = these must be performed repeatedly by many different parties as relying = on the analysis of others is a good way to cause issues. Been there, = done that.
=0A=
 
=0A=
2) We are designing for long = time spans, ten years or more. While simple compressor collisions may = not be a concern, there is no guarantee that the attacks will stop at = that point. MD4 has been broken repeatedly and they are now at the stage = of jumping up and down on the little pieces. It will probably happen to = MD5 and we should be cautious in case it happens to SHA-1.
=0A=
 
=0A=
 
=0A=
On the claim of 'Keep it = simple STUPID', I find it rather offensive to have my position = characterized as stupid. My designs are not exactly known for being = verbose or overly elaborate. If I propose something it is because there = is a reason. It is very easy to defend the status quo by derriding = proposals as unnecessary, but the fact is that making OCSP too simple = will simply cause the complexity to blow out somewhere else.
=0A=
 
=0A=
There is an architectural = princple of modular design that demands that the core of PKIX as it now = stands (the certificate profile and OCSP) be capable of stand alone use. = We cannot fix issues in OCSP with LTANS or other layered-on protocols as = some have proposed. It does not simplify my OCSP deployment to have to = graft on an entire different protocol in addition or to re-engineer my = document archival protocol to cover defects in OCSP.
=0A=
 
=0A=
 
=0A=
Simply adding new algorithms = to a protocol does nothing to improve security. You only improve = security if you withdraw insecure algorithms from use.
=0A=
 
=0A=
To make the system work you = have to have a means of negotiating between the client and the server. = Otherwise there is no way for an OCSP responder to ensure that it = receives a secure, supported response to querries for certificates = that do not exist yet or are not known to the responder.
=0A=
 
=0A=
In the case of an OCSP = responder being driven by CRLs collected from various sources, there is = no way for the CA to know if a certificate even exists, all it knows is = if the status is definitively revoked.
=0A=
 
=0A=
In the case of many = transactional architectures the OCSP validation is performed = independently of certificate chain validation.
=0A=
 
=0A=
 
=0A=
Experience of small scale PKI = deployment in which any box can be upgraded at will is simply not = representative of large scale real world deployment.
=0A=
 
=0A=
=0A=

=0A=
=0A=
=0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed 4/1/2009 8:39 PM
To: Stefan = Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

=0A=

=0A=

I am saying that "Do you agree that 2560 can be left = alone for Responder
ID's key ID CHOICE being SHA-1 = based?"

> -----Original Message-----
> From: Stefan = Santesson [mailto:stefan@aaa-sec.com]
>= Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani; = IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on = SHA-1
>
> Santosh,
>
> = In-line
>
>
> On 4/1/09 10:31 PM, "Santosh Chokhani" = <SChokhani@cygnacom.com> wrote:
>
> >
> > = Stefan,
> >
> > See responses in-line.
> = >
> >> -----Original Message-----
> >> From: = Stefan Santesson [mailto:stefan@aaa-sec.com]
>= >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >> Santosh,
> >>
> >> If you are talking = about adding other options to calculate the
> >> KeyHash = value in ResponderID then I strongly disagree.
> >>
> = >> If you add unspecified options you change the = properties
> of the field
> >> from deterministic to a = completely unknown value.
> >> It does not matter if RFC2560 = isn't explicit in its description of
> >> the use of the = field. The fact is that OCSP explicitly
> defines this
> = >> value and as such will allow a client to deterministically = compare
> >> this value with the certificate selected to = validate the response
> >> signature.
> >
> = > I hope no one is doing the matching of Responder ID with
> = hash of a key
> > in place of responder signature = verification.  That would
> be real bad.
> = >
>
> Yes it would. That is not at all what I talk about. = But a
> client could use this value to locate a responder = certificate.
>
> >> If you allow
> >> = other ways to calculate the value but do not provide any means = to
> >> signal what method that was used, then this feature = is lost.
> >
> > The most common use will be to use = this field to prioritize the
> > certificates of the responder = to use for sigature
> verification on the
> > = response.
> >
>
> Do you know this for a fact, or = are you guessing?
> If a single implementation verifies that the = certificate used
> to validate the response matches the = ResponderID value, and
> choose to go into an error state because = of mismatch, then we
> have created great problems. So we can't = guess. We have to
> know that no single implementation will fail = because of this.
> And that may be very = hard.
>
>
> >>
> >> In worst case we = will cause current implementation to fail.
> >
> > = That is why I am asking what problems if any will the vendors = have.
> >
>
> Even if no vendor speaks up here, it = will not guarantee that
> this will not create any = problems.
>
> >>
> >> I really don't think = its worth the effort to change this field. We
> >> have a = very large base of implementations that we really
> don't = want
> >> to mess up unless its absolutely = necessary.
> >
> > So, we agree that leaving this = field hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite reading = it many
> times over.
>
> > My only reason to align = with 5280 is that if some one were
> ever want
> > to = strip off SHA-1 altogether from their Responder or client,
> > = permitting other methods does it.
> >
>
> I don't = believe this argument is valid as I don't think it is
> possible = to strip off SHA-1 in any reasonable future. In any
> case. If we = compare the positive side with allowing this
> change and the = negative consequences to make OCSP
> incompatible with itself, my = choice is easy.
>
> /Stefan

>
> = >>
> >> As the only property of this field is to = provide a convenient
> >> identifier, it is far from = absolutely necessary to change it.
> >> Remember that there = is a second choice to to identify responder by
> >> name. = For names we have accepted the possibility of collisions. In
> = >> that comparison, upgrading from SHA-1 is really = redundant.
> >>
> >> /Stefan
> = >>
> >>
> >>
> >>
> = >> On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com> wrote:
> >>
> = >>>
> >>> My resident ASN.1 expert apprised me = of the fact that
> >> adding a choice
> >>> = will break backward compatibility.  Thus, extension is a
> = >> fifth option
> >>> (probably third in the = priority).
> >>>
> >>> Based on what I = know of OCSP implementations, not changing
> >> anything = in
> >>> terms of bits on the wire and aligning the Key = ID with SKID
> >> in 5280 is
> >>> the best = approach.  I do not think it will hurt backward
> >> = compatibility.
> >>>
> >>> OCSP Responder = and OCSP client vendors should speak up if I
> >> am = wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh Chokhani
> = >>>> Sent: Tuesday, March 31, 2009 12:51 PM
> = >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>
> >>>> Max,
> = >>>>
> >>>> I do not see where and what = extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
> = >>>> For key id, we need to enhance or broaden the = options.
> >>>>
> >>>>> = -----Original Message-----
> >>>>> From: = owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> >> Massimiliano Pala
> = >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>>>>
> >>>>> Hi all,
> = >>>>>
> >>>>> as I said during last = meeting - as the use of SHA-1 does
> >>>> not have = any
> >>>>> security implication in the OCSP, = another viable way
> would be to
> >>>>> = define an extension where other digest algorithms can be
> = >>>> added to the
> >>>>> = request/responses.
> >>>>>
> = >>>>> It is a simple addition and does not require any = change in
> >>>> the RFC, it
> = >>>>> can be done as a separate document for those who = what to
> >> use other
> >>>>> digest = algorithms.
> >>>>>
> >>>>> = After all, isn't this an example of why we allow
> >> = extensions to the
> >>>>> messages ?
> = >>>>>
> >>>>> Later,
> = >>>>> Max
> >>>>>
> = >>>>>
> >>>>> Santosh Chokhani = wrote:
> >>>>>> Tom,
> = >>>>>>
> >>>>>> Adding a new = choice and aligning it with 5280 SKID is fine.
> = >>>>>>
> >>>>>> I would not = add anything about matching this field with
> >>>>> = anything since
> >>>>>> RFC 2560 does not say = anything about it.
> >>>>>>
> = >>>>>> If one were to add something, one should = describe how this
> >>>>> field can
> = >>>>>> be used to select from multiple Responder = certificates.
> >>>>>>
> = >>>>>>> -----Original Message-----
> = >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
> >>>>>>> To: Santosh Chokhani
> = >>>>>>> Cc: IETF-pkix
> = >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence = on SHA-1
> >>>>>>>
> = >>>>>>>       &nb= sp; Santosh:
> >>>>>>>
> = >>>>>>>       &nb= sp; The RFC 5280 method just describes "two common
> = >>>> methods for
> >>>>>>> = generating key identifiers from the public key"
> = >>>>>>> and says that other methods are = acceptable.  The comment
> >>>>> to = KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as = permissive.  Of course, it's
> >>>> the = same
> >>>>>>> field as SKID, and I would = support either stating "if the
> >>>>> KeyHash = is
> >>>>>>> not precisely 20 octets long, it = should be matched
> against the
> = >>>>>>> Subject Key Identifier extension of the = signing
> certificate" or
> >>>>>>> = adding another choice like byID [3] OCTET STRING --
> = >>>>> matches the value
> = >>>>>>> of SKID.
> = >>>>>>>
> = >>>>>>>       &nb= sp;         Tom Gindin
> = >>>>>>>
> >>>>>>> P.S. - = The above opinions are mine, and not necessarily
> = >>>>> those of my
> >>>>>>> = employer
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> = "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by:
> = >>>>>>> owner-ietf-pkix@mail.imc.org
> = >>>>>>> 03/26/2009 10:39 PM
> = >>>>>>>
> >>>>>>> = To
> >>>>>>> "IETF-pkix" = <ietf-pkix@imc.org>
> >>>>>>> = cc
> >>>>>>>
> = >>>>>>> Subject
> = >>>>>>> OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> RFC = 2560 dependence on SHA-1 does not appear to be
> = >>>>> difficult to deal
> = >>>>>>> with.
> = >>>>>>>
> >>>>>>> = Section 4.3 lists SHA-1 as mandatory and RSA as
> >>>> = optional.  We can
> >>>>>>> update this = to add SHA-2 series as optional.
> = >>>>>>>
> >>>>>>> The = Responder ID has SHA-1 hardwired.  But, that is no
> = >>>>> different than
> >>>>>>> = key ID extensions in RFC 5280.  Here are some options
> = >> in order of
> >>>>>>> = preference:
> >>>>>>>
> = >>>>>>> 1.  Align the language with subject = key ID language
> in RFC 5280.
> = >>>>>>>
> >>>>>>> = 2.  Keep on using SHA-1.  This field is not security
> = >>>>> relevant.  RFC
> = >>>>>>> 2560 does not even describe how to use this = field.  So,
> >>>>> having SHA-1
> = >>>>>>> and accidental or intentional collisions = will not hurt the
> >>>>> security
> = >>>>>>> of the protocol.
> = >>>>>>>
> >>>>>>> = 3.  If you do not believe in KISS principle, you can
> = >>>>> define another
> >>>>>>> = response type and enhance the key ID ASN.1 syntax so
> that = hash
> >>>>>>> algorithm is = identified.
> >>>>>>>
> = >>>>>>> 4.  Another option is for the = Responder to use the
> same hashing
> = >>>>>>> algorithm as the one in the first certID = entry.
> >>>>>>>
> = >>>>>>>
> >>>>>>> = Santosh Chokhani
> >>>>>>> CygnaCom = Solutions
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>
> = >>>>>>
> >>>>>
> = >>>>>
> >>>>> --
> = >>>>>
> >>>>> Best Regards,
> = >>>>>
> >>>>> Massimiliano = Pala
> >>>>>
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano Pala [OpenCA Project Manager]
> >>>>> = Massimiliano.Pala@dartmouth.edu
> = >>>>>         = ;    
> >>>>> = project.manager@openca.org
> >>>>>
> = >>>>> Dartmouth Computer Science = Dept           &nb= sp;   Home Phone: +1
> >>>>> (603) = 369-9332
> >>>>> PKI/Trust = Laboratory          &nb= sp;           &nbs= p;   Work Phone: +1
> >>>>> (603) = 646-9179
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>>
> = >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> >>>>> = of us who do.
> >>>>>   --
> = >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
> = >>
> >>
> = >
>
>
>

------_=_NextPart_001_01C9B34E.E3525609-- From moran@amcd.ie Wed Apr 1 23:11:54 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 660453A6BFE for ; Wed, 1 Apr 2009 23:11:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.174 X-Spam-Level: X-Spam-Status: No, score=-10.174 tagged_above=-999 required=5 tests=[BAYES_99=3.5, HELO_EQ_BR=0.955, HOST_EQ_BR=1.295, HTML_IMAGE_ONLY_28=1.561, HTML_IMAGE_RATIO_02=0.383, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, SARE_RECV_VIRTUACOMBR=1.193, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b2VBZBrv1fOE for ; Wed, 1 Apr 2009 23:11:53 -0700 (PDT) Received: from c951bbd6.virtua.com.br (c951bbd6.virtua.com.br [201.81.187.214]) by core3.amsl.com (Postfix) with SMTP id 80F8A3A6907 for ; Wed, 1 Apr 2009 23:11:52 -0700 (PDT) To: Subject: Update - Credit card blocked From: MensHealth.com MIME-Version: 1.0 Content-Type: text/html Message-Id: <20090402061152.80F8A3A6907@core3.amsl.com> Date: Wed, 1 Apr 2009 23:11:52 -0700 (PDT)
Subscribe to Men's Health Today!



Subscribe to Men's Health Today!





To your health,


David Zinczenko
Editor-in-Chief



Subscribe to Men's Health Today!
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Dept., 33 East Minor Street, Emmaus, PA 18098
From owner-ietf-pkix@mail.imc.org Thu Apr 2 04:19:52 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 069363A6CF0 for ; Thu, 2 Apr 2009 04:19:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.937 X-Spam-Level: X-Spam-Status: No, score=-0.937 tagged_above=-999 required=5 tests=[AWL=-0.085, BAYES_00=-2.599, HELO_EQ_SE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xt2KAebc20Ic for ; Thu, 2 Apr 2009 04:19:51 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 5B7FD3A6D0E for ; Thu, 2 Apr 2009 04:19:23 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32AqMws077247 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 03:52:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32AqM4l077244; Thu, 2 Apr 2009 03:52:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32Aq9cV077220 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 2 Apr 2009 03:52:21 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 33575 invoked from network); 2 Apr 2009 10:52:11 -0000 Received: from s34.loopia.se (HELO s19.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 2 Apr 2009 10:52:11 -0000 Received: (qmail 81579 invoked from network); 2 Apr 2009 10:52:07 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s19.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 2 Apr 2009 10:52:07 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 12:52:03 +0200 Subject: WG Last Call on draft-ietf-pkix-tac-03 From: Stefan Santesson To: IETF-pkix Message-ID: Thread-Topic: WG Last Call on draft-ietf-pkix-tac-03 Thread-Index: AcmzgQ5egTOzik0YFkGfRA2eOkK7rQ== Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321521527_11592793" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321521527_11592793 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit The authors of Traceable Anonymous Certificate draft-ietf-pkix-tac-03.txt has requested WGLC. http://tools.ietf.org/html/draft-ietf-pkix-tac-03 WG Last call on this document starts today and ends April 17 to give room for Easter holidays. /Stefan --B_3321521527_11592793 Content-type: text/html; charset="US-ASCII" Content-transfer-encoding: quoted-printable WG Last Call on draft-ietf-pkix-tac-03 The authors of Traceable Anonymous Certificate draft-ietf-pkix-tac-03.txt = has requested WGLC.

http://tools.ie= tf.org/html/draft-ietf-pkix-tac-03

WG Last call on this document starts today and ends April 17 to give room f= or Easter holidays.

/Stefan
--B_3321521527_11592793-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 05:33:42 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4F7463A684B for ; Thu, 2 Apr 2009 05:33:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.923 X-Spam-Level: X-Spam-Status: No, score=-0.923 tagged_above=-999 required=5 tests=[AWL=-0.071, BAYES_00=-2.599, HELO_EQ_SE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xOv0s+gwDvAC for ; Thu, 2 Apr 2009 05:33:38 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id E64AF3A683D for ; Thu, 2 Apr 2009 05:33:36 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CAnLb084468 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 05:10:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32CAnqr084467; Thu, 2 Apr 2009 05:10:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CAk2l084448 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 2 Apr 2009 05:10:48 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 28396 invoked from network); 2 Apr 2009 12:10:49 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 2 Apr 2009 12:10:49 -0000 Received: (qmail 41732 invoked from network); 2 Apr 2009 12:10:45 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 2 Apr 2009 12:10:45 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 14:10:44 +0200 Subject: Problem with draft-turner-caclearanceconstraints-02.txt From: Stefan Santesson To: IETF-pkix Message-ID: Thread-Topic: Problem with draft-turner-caclearanceconstraints-02.txt Thread-Index: AcmzjAxNtzBfJ61Ws0OScv3P3Q+ASg== Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321526245_11855927" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321526245_11855927 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable I found a problem with draft-turner-caclearanceconstraints-02.txt Section 4.1.1. Certification Path Processing states When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end certificate, PKC, the processing described in this section or an equivalent algorithm MUST be included in the certification path validation. It is problematic, and unnecessary to require ca clearance constraints processing to be =B3included=B2 in certification path validation. None of the clearance constraints information is needed to determine the validity of the certificate, and as such it does not be processed as an integrated process. It would be perfectly valid for an application who choose to rely on the clearance information, to process clearance constraints as a post process, i.e. after path validation is completed. A requirement to integrate caclearance constraints into path validation would make this a lot harder to implement as it would require modification to core security components. Stefan Santesson AAA-sec.com --B_3321526245_11855927 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Problem with draft-turner-caclearanceconstraints-02.txt I found a problem with draft-turner-caclearanceconstraints-02.txt

Section
4.1.1. Certification Path Processing<= /FONT>  states

  When processing Authority Clearance Constraint= s certificate extension
   for the purposes of validating Clearance attribute in the end certificate,<= /FONT> PKC,
  the processing described in this section or an equi= valent algorithm
   MUST be included in the certification path validation.
It is problematic, and unnecessary to require ca clea= rance constraints processing to be “included” in certification p= ath validation.
None of the clearance constraints information is needed to determine the va= lidity of the certificate, and as such it does not be processed as an integr= ated process.

It would be perfectly valid for an application who choose to rely on the cl= earance information, to process clearance constraints as a post process, i.e= . after path validation is completed.

A requirement to integrate caclearance constraints into path validation wou= ld make this a lot harder to implement as it would require modification to c= ore security components.

Stefan Santesson
AAA-sec.com



--B_3321526245_11855927-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 05:33:52 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9258E3A684B for ; Thu, 2 Apr 2009 05:33:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.421 X-Spam-Level: X-Spam-Status: No, score=-1.421 tagged_above=-999 required=5 tests=[AWL=0.047, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gVB9yIVVhsro for ; Thu, 2 Apr 2009 05:33:50 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2D30D3A683D for ; Thu, 2 Apr 2009 05:33:48 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32BsGsI082704 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 04:54:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32BsGVq082703; Thu, 2 Apr 2009 04:54:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32Bs4ZG082686 for ; Thu, 2 Apr 2009 04:54:15 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 25825 invoked from network); 2 Apr 2009 11:52:59 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 11:52:59 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B389.B83C96F2" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 07:54:02 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoA= References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B389.B83C96F2 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B389.B83C96F2 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
I have no objection to having an extension, but if = in the long=20 term SHA-1 will not be there, it seems defining a new response type (say = basic=20 2) would be the way to go so that SHA-1 based key ID can be stripped=20 off.
 
If SHA-1 is not getting ripped off in the long = term, I do=20 not see value in extension except that it may make every one happy: = those who do=20 not care will not include it on the Server side and/or will ignore = it on=20 the client side.
 
It would appear that the extension should be=20 NC.
 
Phil,
 
I would not respond to the arguments on KISS and = security=20 since in this case both are straightforward.  Also, in this thread, = the=20 comments were not meant for or directed at you.
 
As you know, I have provided extensive comments to = you when=20 you first posted the OCSP Agility I-D and my position and reasons are = matter of=20 PKIX archives for anyone to scrutinize.  When you ignore every = single=20 cogent point, there is no sense in me commenting on next = iteration.  I do=20 think that the OCSP Agility I-D is a solution looking for a problem that = I do=20 not see.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I think we = have no choice=20 but to leave the Key ID CHOICE to be SHA-1 based.
 
But that does not preclude = adding an=20 extension that allows the KeyID to be specified using a stronger = algorithm.=20 There are two reasons for this:
 
1) Optics, even if there is = no security=20 implication, a protocol that uses weak crypto necessitates an = (expensive)=20 security review to prove that there is no problem. And these must be = performed=20 repeatedly by many different parties as relying on the analysis of = others is a=20 good way to cause issues. Been there, done that.
 
2) We are designing for = long time spans,=20 ten years or more. While simple compressor collisions may not be a = concern,=20 there is no guarantee that the attacks will stop at that point. MD4 = has been=20 broken repeatedly and they are now at the stage of jumping up and down = on the=20 little pieces. It will probably happen to MD5 and we should be = cautious in=20 case it happens to SHA-1.
 
 
On the claim of 'Keep it = simple STUPID',=20 I find it rather offensive to have my position characterized as = stupid. My=20 designs are not exactly known for being verbose or overly elaborate. = If I=20 propose something it is because there is a reason. It is very easy to = defend=20 the status quo by derriding proposals as unnecessary, but the fact is = that=20 making OCSP too simple will simply cause the complexity to blow out = somewhere=20 else.
 
There is an architectural = princple of=20 modular design that demands that the core of PKIX as it now stands = (the=20 certificate profile and OCSP) be capable of stand alone use. We cannot = fix=20 issues in OCSP with LTANS or other layered-on protocols as some have = proposed.=20 It does not simplify my OCSP deployment to have to graft on an entire=20 different protocol in addition or to re-engineer my document archival = protocol=20 to cover defects in OCSP.
 
 
Simply adding new = algorithms to a=20 protocol does nothing to improve security. You only improve security = if you=20 withdraw insecure algorithms from use.
 
To make the system work you = have to have=20 a means of negotiating between the client and the server. Otherwise = there is=20 no way for an OCSP responder to ensure that it receives a secure,=20 supported response to querries for certificates that do not exist = yet or=20 are not known to the responder.
 
In the case of an OCSP = responder being=20 driven by CRLs collected from various sources, there is no way for the = CA to=20 know if a certificate even exists, all it knows is if the status is=20 definitively revoked.
 
In the case of many = transactional=20 architectures the OCSP validation is performed independently of = certificate=20 chain validation.
 
 
Experience of small scale = PKI deployment=20 in which any box can be upgraded at will is simply not representative = of large=20 scale real world deployment.
 


From:=20 owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed=20 4/1/2009 8:39 PM
To: Stefan Santesson; = IETF-pkix
Subject:=20 RE: OCSP RFC (RFC 2560) Dependence on SHA-1


I am saying that "Do you agree that 2560 can be left = alone for=20 Responder
ID's key ID CHOICE being SHA-1 based?"

> = -----Original=20 Message-----
> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= Sent:=20 Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani;=20 IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
>
> Santosh,
>
> = In-line
>
>
>=20 On 4/1/09 10:31 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>=20 wrote:
>
> >
> > Stefan,
> >
> = > See=20 responses in-line.
> >
> >> -----Original=20 Message-----
> >> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh=20 Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: Re: = OCSP RFC=20 (RFC 2560) Dependence on SHA-1
> >>
> >>=20 Santosh,
> >>
> >> If you are talking about = adding=20 other options to calculate the
> >> KeyHash value in = ResponderID=20 then I strongly disagree.
> >>
> >> If you add = unspecified options you change the properties
> of the = field
>=20 >> from deterministic to a completely unknown value.
> = >> It=20 does not matter if RFC2560 isn't explicit in its description = of
>=20 >> the use of the field. The fact is that OCSP = explicitly
>=20 defines this
> >> value and as such will allow a client to = deterministically compare
> >> this value with the = certificate=20 selected to validate the response
> >> signature.
>=20 >
> > I hope no one is doing the matching of Responder ID=20 with
> hash of a key
> > in place of responder = signature=20 verification.  That would
> be real bad.
>=20 >
>
> Yes it would. That is not at all what I talk = about. But=20 a
> client could use this value to locate a responder=20 certificate.
>
> >> If you allow
> >> = other ways=20 to calculate the value but do not provide any means to
> = >> signal=20 what method that was used, then this feature is lost.
> = >
>=20 > The most common use will be to use this field to prioritize = the
>=20 > certificates of the responder to use for sigature
> = verification on=20 the
> > response.
> >
>
> Do you know = this for a=20 fact, or are you guessing?
> If a single implementation verifies = that=20 the certificate used
> to validate the response matches the = ResponderID=20 value, and
> choose to go into an error state because of = mismatch, then=20 we
> have created great problems. So we can't guess. We have = to
>=20 know that no single implementation will fail because of this.
> = And that=20 may be very hard.
>
>
> >>
> >> In = worst=20 case we will cause current implementation to fail.
> = >
> >=20 That is why I am asking what problems if any will the vendors = have.
>=20 >
>
> Even if no vendor speaks up here, it will not = guarantee=20 that
> this will not create any problems.
>
>=20 >>
> >> I really don't think its worth the effort to = change=20 this field. We
> >> have a very large base of = implementations that=20 we really
> don't want
> >> to mess up unless its = absolutely=20 necessary.
> >
> > So, we agree that leaving this = field hard=20 wired to SHA-1 is ok and
> > 2560 can easily accommodate new = hash=20 functions.  Right?
> >
>
> I fail to = understand this=20 sentence. Despite reading it many
> times over.
>
> = > My=20 only reason to align with 5280 is that if some one were
> ever=20 want
> > to strip off SHA-1 altogether from their Responder = or=20 client,
> > permitting other methods does it.
>=20 >
>
> I don't believe this argument is valid as I don't = think=20 it is
> possible to strip off SHA-1 in any reasonable future. In = any
> case. If we compare the positive side with allowing = this
>=20 change and the negative consequences to make OCSP
> incompatible = with=20 itself, my choice is easy.
>
>=20 /Stefan

>
> >>
> >> As the = only=20 property of this field is to provide a convenient
> >> = identifier,=20 it is far from absolutely necessary to change it.
> >> = Remember=20 that there is a second choice to to identify responder by
> = >>=20 name. For names we have accepted the possibility of collisions. = In
>=20 >> that comparison, upgrading from SHA-1 is really = redundant.
>=20 >>
> >> /Stefan
> >>
> = >>
>=20 >>
> >>
> >> On 4/1/09 4:05 PM, "Santosh = Chokhani"
> <SChokhani@cygnacom.com> wrote:
>=20 >>
> >>>
> >>> My resident ASN.1 = expert=20 apprised me of the fact that
> >> adding a choice
>=20 >>> will break backward compatibility.  Thus, extension = is=20 a
> >> fifth option
> >>> (probably third = in the=20 priority).
> >>>
> >>> Based on what I = know of=20 OCSP implementations, not changing
> >> anything = in
>=20 >>> terms of bits on the wire and aligning the Key ID with=20 SKID
> >> in 5280 is
> >>> the best = approach. =20 I do not think it will hurt backward
> >> = compatibility.
>=20 >>>
> >>> OCSP Responder and OCSP client = vendors=20 should speak up if I
> >> am wrong.
> = >>>
>=20 >>>> -----Original Message-----
> >>>> = From:=20 Santosh Chokhani
> >>>> Sent: Tuesday, March 31, = 2009 12:51=20 PM
> >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
>=20 >>>>
> >>>> Max,
>=20 >>>>
> >>>> I do not see where and what=20 extension we need to add for
> >> other digest
>=20 >>>> algorithm.
> >>>>
> = >>>>=20 For key id, we need to enhance or broaden the options.
>=20 >>>>
> >>>>> -----Original=20 Message-----
> >>>>> From:=20 owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20 On Behalf Of
> >> Massimiliano Pala
> = >>>>>=20 Sent: Tuesday, March 31, 2009 1:37 PM
> >>>>> To: = IETF-pkix
> >>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on SHA-1
> >>>>>
> = >>>>>=20 Hi all,
> >>>>>
> >>>>> as I = said=20 during last meeting - as the use of SHA-1 does
> = >>>> not=20 have any
> >>>>> security implication in the = OCSP,=20 another viable way
> would be to
> >>>>> = define an=20 extension where other digest algorithms can be
> = >>>> added=20 to the
> >>>>> request/responses.
>=20 >>>>>
> >>>>> It is a simple = addition and=20 does not require any change in
> >>>> the RFC, = it
>=20 >>>>> can be done as a separate document for those who = what=20 to
> >> use other
> >>>>> digest=20 algorithms.
> >>>>>
> >>>>> = After=20 all, isn't this an example of why we allow
> >> extensions = to=20 the
> >>>>> messages ?
>=20 >>>>>
> >>>>> Later,
>=20 >>>>> Max
> >>>>>
>=20 >>>>>
> >>>>> Santosh Chokhani=20 wrote:
> >>>>>> Tom,
>=20 >>>>>>
> >>>>>> Adding a new = choice=20 and aligning it with 5280 SKID is fine.
>=20 >>>>>>
> >>>>>> I would not = add=20 anything about matching this field with
> >>>>> = anything=20 since
> >>>>>> RFC 2560 does not say anything = about=20 it.
> >>>>>>
> >>>>>> = If one=20 were to add something, one should describe how this
>=20 >>>>> field can
> >>>>>> be = used to=20 select from multiple Responder certificates.
>=20 >>>>>>
> >>>>>>> = -----Original=20 Message-----
> >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20 >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
>=20 >>>>>>> To: Santosh Chokhani
>=20 >>>>>>> Cc: IETF-pkix
>=20 >>>>>>> Subject: Re: OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 Santosh:
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 The RFC 5280 method just describes "two common
> = >>>>=20 methods for
> >>>>>>> generating key = identifiers=20 from the public key"
> >>>>>>> and says = that other=20 methods are acceptable.  The comment
> >>>>> = to=20 KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not = as=20 permissive.  Of course, it's
> >>>> the = same
>=20 >>>>>>> field as SKID, and I would support either = stating=20 "if the
> >>>>> KeyHash is
>=20 >>>>>>> not precisely 20 octets long, it should = be=20 matched
> against the
> >>>>>>> = Subject Key=20 Identifier extension of the signing
> certificate" or
>=20 >>>>>>> adding another choice like byID [3] OCTET = STRING=20 --
> >>>>> matches the value
>=20 >>>>>>> of SKID.
>=20 >>>>>>>
>=20 = >>>>>>>       &nb= sp;        =20 Tom Gindin
> >>>>>>>
>=20 >>>>>>> P.S. - The above opinions are mine, and = not=20 necessarily
> >>>>> those of my
>=20 >>>>>>> employer
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> "Santosh Chokhani" = <SChokhani@cygnacom.com>=20 Sent by:
> >>>>>>>=20 owner-ietf-pkix@mail.imc.org
> >>>>>>> = 03/26/2009=20 10:39 PM
> >>>>>>>
>=20 >>>>>>> To
> >>>>>>>=20 "IETF-pkix" <ietf-pkix@imc.org>
> = >>>>>>>=20 cc
> >>>>>>>
> = >>>>>>>=20 Subject
> >>>>>>> OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> RFC 2560 dependence on SHA-1 does not = appear to=20 be
> >>>>> difficult to deal
>=20 >>>>>>> with.
>=20 >>>>>>>
> >>>>>>> = Section 4.3=20 lists SHA-1 as mandatory and RSA as
> >>>> = optional. =20 We can
> >>>>>>> update this to add SHA-2 = series as=20 optional.
> >>>>>>>
>=20 >>>>>>> The Responder ID has SHA-1 = hardwired.  But,=20 that is no
> >>>>> different than
>=20 >>>>>>> key ID extensions in RFC 5280.  Here = are=20 some options
> >> in order of
> = >>>>>>>=20 preference:
> >>>>>>>
>=20 >>>>>>> 1.  Align the language with subject = key ID=20 language
> in RFC 5280.
> = >>>>>>>
>=20 >>>>>>> 2.  Keep on using SHA-1.  This = field is=20 not security
> >>>>> relevant.  RFC
>=20 >>>>>>> 2560 does not even describe how to use = this=20 field.  So,
> >>>>> having SHA-1
>=20 >>>>>>> and accidental or intentional collisions = will not=20 hurt the
> >>>>> security
>=20 >>>>>>> of the protocol.
>=20 >>>>>>>
> >>>>>>> = 3.  If=20 you do not believe in KISS principle, you can
> = >>>>>=20 define another
> >>>>>>> response type and = enhance=20 the key ID ASN.1 syntax so
> that hash
>=20 >>>>>>> algorithm is identified.
>=20 >>>>>>>
> >>>>>>> = 4. =20 Another option is for the Responder to use the
> same = hashing
>=20 >>>>>>> algorithm as the one in the first certID=20 entry.
> >>>>>>>
>=20 >>>>>>>
> >>>>>>> = Santosh=20 Chokhani
> >>>>>>> CygnaCom = Solutions
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>
> >>>>>>
>=20 >>>>>
> >>>>>
> = >>>>>=20 --
> >>>>>
> >>>>> Best=20 Regards,
> >>>>>
> >>>>>=20 Massimiliano Pala
> >>>>>
> = >>>>>=20 --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano=20 Pala [OpenCA Project Manager]
> >>>>>=20 Massimiliano.Pala@dartmouth.edu
>=20 = >>>>>         = ;    
>=20 >>>>> project.manager@openca.org
>=20 >>>>>
> >>>>> Dartmouth Computer = Science=20 = Dept           &nb= sp;  =20 Home Phone: +1
> >>>>> (603) 369-9332
>=20 >>>>> PKI/Trust=20 = Laboratory          &nb= sp;           &nbs= p;  =20 Work Phone: +1
> >>>>> (603) 646-9179
>=20 >>>>>=20 --o-----------------------------------------------------------
> = >>>>> -------------
> = >>>>>
>=20 >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> = >>>>> of us=20 who do.
> >>>>>   --
>=20 >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
>=20 >>
> >>
>=20 = >
>
>
>

= ------_=_NextPart_001_01C9B389.B83C96F2-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 05:42:07 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 350703A6952 for ; Thu, 2 Apr 2009 05:42:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.912 X-Spam-Level: X-Spam-Status: No, score=-0.912 tagged_above=-999 required=5 tests=[AWL=-0.061, BAYES_00=-2.599, HELO_EQ_SE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, WHOIS_NETSOLPR=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JvZJqzjhFer2 for ; Thu, 2 Apr 2009 05:41:58 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7292028C0FC for ; Thu, 2 Apr 2009 05:41:57 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CJ7El085209 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 05:19:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32CJ7FV085208; Thu, 2 Apr 2009 05:19:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CJ4Y4085201 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 2 Apr 2009 05:19:05 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 44178 invoked from network); 2 Apr 2009 12:18:34 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 2 Apr 2009 12:18:34 -0000 Received: (qmail 84293 invoked from network); 2 Apr 2009 12:18:29 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 2 Apr 2009 12:18:29 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 14:18:28 +0200 Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 From: Stefan Santesson To: Santosh Chokhani , "Hallam-Baker, Phillip" , IETF-pkix Message-ID: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAAATo3Rw== In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321526709_11892108" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321526709_11892108 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable I do agree to most things here. I don=B9t believe that implementations can strip off SHA-1 in any foreseeable future. It needs to be around, if nothing else, so for backwards compatibility. SHA-1 will continue to work in situations like this where no security properties are needed. IMO, The added extension, even though I will not fight hard against it, would just be redundant complexity. /Stefan On 4/2/09 1:54 PM, "Santosh Chokhani" wrote: > I have no objection to having an extension, but if in the long term SHA-1= will > not be there, it seems defining a new response type (say basic 2) would b= e the > way to go so that SHA-1 based key ID can be stripped off. > =20 > If SHA-1 is not getting ripped off in the long term, I do not see value i= n > extension except that it may make every one happy: those who do not care = will > not include it on the Server side and/or will ignore it on the client sid= e. > =20 > It would appear that the extension should be NC. > =20 > Phil, > =20 > I would not respond to the arguments on KISS and security since in this c= ase > both are straightforward. Also, in this thread, the comments were not me= ant > for or directed at you. > =20 > As you know, I have provided extensive comments to you when you first pos= ted > the OCSP Agility I-D and my position and reasons are matter of PKIX archi= ves > for anyone to scrutinize. When you ignore every single cogent point, the= re is > no sense in me commenting on next iteration. I do think that the OCSP Ag= ility > I-D is a solution looking for a problem that I do not see. >> =20 >> =20 >>=20 >> From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] >> Sent: Thursday, April 02, 2009 12:53 AM >> To: Santosh Chokhani; Stefan Santesson; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>=20 >> =20 >> =20 >> =20 >> I think we have no choice but to leave the Key ID CHOICE to be SHA-1 ba= sed. >> =20 >> =20 >> =20 >> But that does not preclude adding an extension that allows the KeyID to= be >> specified using a stronger algorithm. There are two reasons for this: >> =20 >> =20 >> =20 >> 1) Optics, even if there is no security implication, a protocol that us= es >> weak crypto necessitates an (expensive) security review to prove that t= here >> is no problem. And these must be performed repeatedly by many different >> parties as relying on the analysis of others is a good way to cause iss= ues. >> Been there, done that. >> =20 >> =20 >> =20 >> 2) We are designing for long time spans, ten years or more. While simpl= e >> compressor collisions may not be a concern, there is no guarantee that = the >> attacks will stop at that point. MD4 has been broken repeatedly and the= y are >> now at the stage of jumping up and down on the little pieces. It will >> probably happen to MD5 and we should be cautious in case it happens to >> SHA-1. >> =20 >> =20 >> =20 >> =20 >> =20 >> On the claim of 'Keep it simple STUPID', I find it rather offensive to = have >> my position characterized as stupid. My designs are not exactly known f= or >> being verbose or overly elaborate. If I propose something it is because >> there is a reason. It is very easy to defend the status quo by derridin= g >> proposals as unnecessary, but the fact is that making OCSP too simple w= ill >> simply cause the complexity to blow out somewhere else. >> =20 >> =20 >> =20 >> There is an architectural princple of modular design that demands that = the >> core of PKIX as it now stands (the certificate profile and OCSP) be cap= able >> of stand alone use. We cannot fix issues in OCSP with LTANS or other >> layered-on protocols as some have proposed. It does not simplify my OCS= P >> deployment to have to graft on an entire different protocol in addition= or >> to re-engineer my document archival protocol to cover defects in OCSP. >> =20 >> =20 >> =20 >> =20 >> =20 >> Simply adding new algorithms to a protocol does nothing to improve secu= rity. >> You only improve security if you withdraw insecure algorithms from use. >> =20 >> =20 >> =20 >> To make the system work you have to have a means of negotiating between= the >> client and the server. Otherwise there is no way for an OCSP responder = to >> ensure that it receives a secure, supported response to querries for >> certificates that do not exist yet or are not known to the responder. >> =20 >> =20 >> =20 >> In the case of an OCSP responder being driven by CRLs collected from va= rious >> sources, there is no way for the CA to know if a certificate even exist= s, >> all it knows is if the status is definitively revoked. >> =20 >> =20 >> =20 >> In the case of many transactional architectures the OCSP validation is >> performed independently of certificate chain validation. >> =20 >> =20 >> =20 >> =20 >> =20 >> Experience of small scale PKI deployment in which any box can be upgrad= ed at >> will is simply not representative of large scale real world deployment. >> =20 >> =20 >> =20 >> =20 >>=20 >> =20 >> =20 >>=20 >> =20 >> =20 >> From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani >> Sent: Wed 4/1/2009 8:39 PM >> To: Stefan Santesson; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>=20 >> =20 >>=20 >> =20 >>=20 >> I am saying that "Do you agree that 2560 can be left alone for Responde= r >> ID's key ID CHOICE being SHA-1 based?" >>=20 >>> > -----Original Message----- >>> > From: Stefan Santesson [mailto:stefan@aaa-sec.com] >>> > Sent: Wednesday, April 01, 2009 6:32 PM >>> > To: Santosh Chokhani; IETF-pkix >>> > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>> > >>> > Santosh, >>> > >>> > In-line >>> > >>> > >>> > On 4/1/09 10:31 PM, "Santosh Chokhani" wro= te: >>> > >>>> > > >>>> > > Stefan, >>>> > > >>>> > > See responses in-line. >>>> > > >>>>> > >> -----Original Message----- >>>>> > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] >>>>> > >> Sent: Wednesday, April 01, 2009 2:34 PM >>>>> > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix >>>>> > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> > >> >>>>> > >> Santosh, >>>>> > >> >>>>> > >> If you are talking about adding other options to calculate the >>>>> > >> KeyHash value in ResponderID then I strongly disagree. >>>>> > >> >>>>> > >> If you add unspecified options you change the properties >>> > of the field >>>>> > >> from deterministic to a completely unknown value. >>>>> > >> It does not matter if RFC2560 isn't explicit in its description= of >>>>> > >> the use of the field. The fact is that OCSP explicitly >>> > defines this >>>>> > >> value and as such will allow a client to deterministically comp= are >>>>> > >> this value with the certificate selected to validate the respon= se >>>>> > >> signature. >>>> > > >>>> > > I hope no one is doing the matching of Responder ID with >>> > hash of a key >>>> > > in place of responder signature verification. That would >>> > be real bad. >>>> > > >>> > >>> > Yes it would. That is not at all what I talk about. But a >>> > client could use this value to locate a responder certificate. >>> > >>>>> > >> If you allow >>>>> > >> other ways to calculate the value but do not provide any means = to >>>>> > >> signal what method that was used, then this feature is lost. >>>> > > >>>> > > The most common use will be to use this field to prioritize the >>>> > > certificates of the responder to use for sigature >>> > verification on the >>>> > > response. >>>> > > >>> > >>> > Do you know this for a fact, or are you guessing? >>> > If a single implementation verifies that the certificate used >>> > to validate the response matches the ResponderID value, and >>> > choose to go into an error state because of mismatch, then we >>> > have created great problems. So we can't guess. We have to >>> > know that no single implementation will fail because of this. >>> > And that may be very hard. >>> > >>> > >>>>> > >> >>>>> > >> In worst case we will cause current implementation to fail. >>>> > > >>>> > > That is why I am asking what problems if any will the vendors hav= e. >>>> > > >>> > >>> > Even if no vendor speaks up here, it will not guarantee that >>> > this will not create any problems. >>> > >>>>> > >> >>>>> > >> I really don't think its worth the effort to change this field.= We >>>>> > >> have a very large base of implementations that we really >>> > don't want >>>>> > >> to mess up unless its absolutely necessary. >>>> > > >>>> > > So, we agree that leaving this field hard wired to SHA-1 is ok an= d >>>> > > 2560 can easily accommodate new hash functions. Right? >>>> > > >>> > >>> > I fail to understand this sentence. Despite reading it many >>> > times over. >>> > >>>> > > My only reason to align with 5280 is that if some one were >>> > ever want >>>> > > to strip off SHA-1 altogether from their Responder or client, >>>> > > permitting other methods does it. >>>> > > >>> > >>> > I don't believe this argument is valid as I don't think it is >>> > possible to strip off SHA-1 in any reasonable future. In any >>> > case. If we compare the positive side with allowing this >>> > change and the negative consequences to make OCSP >>> > incompatible with itself, my choice is easy. >>> > >>> > /Stefan >>> >=20 >>> > >>>>> > >> >>>>> > >> As the only property of this field is to provide a convenient >>>>> > >> identifier, it is far from absolutely necessary to change it. >>>>> > >> Remember that there is a second choice to to identify responder= by >>>>> > >> name. For names we have accepted the possibility of collisions.= In >>>>> > >> that comparison, upgrading from SHA-1 is really redundant. >>>>> > >> >>>>> > >> /Stefan >>>>> > >> >>>>> > >> >>>>> > >> >>>>> > >> >>>>> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" >>> > wrote: >>>>> > >> >>>>>> > >>> >>>>>> > >>> My resident ASN.1 expert apprised me of the fact that >>>>> > >> adding a choice >>>>>> > >>> will break backward compatibility. Thus, extension is a >>>>> > >> fifth option >>>>>> > >>> (probably third in the priority). >>>>>> > >>> >>>>>> > >>> Based on what I know of OCSP implementations, not changing >>>>> > >> anything in >>>>>> > >>> terms of bits on the wire and aligning the Key ID with SKID >>>>> > >> in 5280 is >>>>>> > >>> the best approach. I do not think it will hurt backward >>>>> > >> compatibility. >>>>>> > >>> >>>>>> > >>> OCSP Responder and OCSP client vendors should speak up if I >>>>> > >> am wrong. >>>>>> > >>> >>>>>>> > >>>> -----Original Message----- >>>>>>> > >>>> From: Santosh Chokhani >>>>>>> > >>>> Sent: Tuesday, March 31, 2009 12:51 PM >>>>>>> > >>>> To: 'Massimiliano Pala'; IETF-pkix >>>>>>> > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>> > >>>> >>>>>>> > >>>> Max, >>>>>>> > >>>> >>>>>>> > >>>> I do not see where and what extension we need to add for >>>>> > >> other digest >>>>>>> > >>>> algorithm. >>>>>>> > >>>> >>>>>>> > >>>> For key id, we need to enhance or broaden the options. >>>>>>> > >>>> >>>>>>>> > >>>>> -----Original Message----- >>>>>>>> > >>>>> From: owner-ietf-pkix@mail.imc.org >>>>>>>> > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of >>>>> > >> Massimiliano Pala >>>>>>>> > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM >>>>>>>> > >>>>> To: IETF-pkix >>>>>>>> > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>> > >>>>> >>>>>>>> > >>>>> Hi all, >>>>>>>> > >>>>> >>>>>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does >>>>>>> > >>>> not have any >>>>>>>> > >>>>> security implication in the OCSP, another viable way >>> > would be to >>>>>>>> > >>>>> define an extension where other digest algorithms can be >>>>>>> > >>>> added to the >>>>>>>> > >>>>> request/responses. >>>>>>>> > >>>>> >>>>>>>> > >>>>> It is a simple addition and does not require any change i= n >>>>>>> > >>>> the RFC, it >>>>>>>> > >>>>> can be done as a separate document for those who what to >>>>> > >> use other >>>>>>>> > >>>>> digest algorithms. >>>>>>>> > >>>>> >>>>>>>> > >>>>> After all, isn't this an example of why we allow >>>>> > >> extensions to the >>>>>>>> > >>>>> messages ? >>>>>>>> > >>>>> >>>>>>>> > >>>>> Later, >>>>>>>> > >>>>> Max >>>>>>>> > >>>>> >>>>>>>> > >>>>> >>>>>>>> > >>>>> Santosh Chokhani wrote: >>>>>>>>> > >>>>>> Tom, >>>>>>>>> > >>>>>> >>>>>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is f= ine. >>>>>>>>> > >>>>>> >>>>>>>>> > >>>>>> I would not add anything about matching this field with >>>>>>>> > >>>>> anything since >>>>>>>>> > >>>>>> RFC 2560 does not say anything about it. >>>>>>>>> > >>>>>> >>>>>>>>> > >>>>>> If one were to add something, one should describe how t= his >>>>>>>> > >>>>> field can >>>>>>>>> > >>>>>> be used to select from multiple Responder certificates. >>>>>>>>> > >>>>>> >>>>>>>>>> > >>>>>>> -----Original Message----- >>>>>>>>>> > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] >>>>>>>>>> > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM >>>>>>>>>> > >>>>>>> To: Santosh Chokhani >>>>>>>>>> > >>>>>>> Cc: IETF-pkix >>>>>>>>>> > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Santosh: >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> The RFC 5280 method just describes "two comm= on >>>>>>> > >>>> methods for >>>>>>>>>> > >>>>>>> generating key identifiers from the public key" >>>>>>>>>> > >>>>>>> and says that other methods are acceptable. The comm= ent >>>>>>>> > >>>>> to KeyHash >>>>>>>>>> > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, i= t's >>>>>>> > >>>> the same >>>>>>>>>> > >>>>>>> field as SKID, and I would support either stating "i= f the >>>>>>>> > >>>>> KeyHash is >>>>>>>>>> > >>>>>>> not precisely 20 octets long, it should be matched >>> > against the >>>>>>>>>> > >>>>>>> Subject Key Identifier extension of the signing >>> > certificate" or >>>>>>>>>> > >>>>>>> adding another choice like byID [3] OCTET STRING -- >>>>>>>> > >>>>> matches the value >>>>>>>>>> > >>>>>>> of SKID. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Tom Gindin >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessar= ily >>>>>>>> > >>>>> those of my >>>>>>>>>> > >>>>>>> employer >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: >>>>>>>>>> > >>>>>>> owner-ietf-pkix@mail.imc.org >>>>>>>>>> > >>>>>>> 03/26/2009 10:39 PM >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> To >>>>>>>>>> > >>>>>>> "IETF-pkix" >>>>>>>>>> > >>>>>>> cc >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Subject >>>>>>>>>> > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be >>>>>>>> > >>>>> difficult to deal >>>>>>>>>> > >>>>>>> with. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as >>>>>>> > >>>> optional. We can >>>>>>>>>> > >>>>>>> update this to add SHA-2 series as optional. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is = no >>>>>>>> > >>>>> different than >>>>>>>>>> > >>>>>>> key ID extensions in RFC 5280. Here are some option= s >>>>> > >> in order of >>>>>>>>>> > >>>>>>> preference: >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> 1. Align the language with subject key ID language >>> > in RFC 5280. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security >>>>>>>> > >>>>> relevant. RFC >>>>>>>>>> > >>>>>>> 2560 does not even describe how to use this field. = So, >>>>>>>> > >>>>> having SHA-1 >>>>>>>>>> > >>>>>>> and accidental or intentional collisions will not hu= rt the >>>>>>>> > >>>>> security >>>>>>>>>> > >>>>>>> of the protocol. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can >>>>>>>> > >>>>> define another >>>>>>>>>> > >>>>>>> response type and enhance the key ID ASN.1 syntax so >>> > that hash >>>>>>>>>> > >>>>>>> algorithm is identified. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> 4. Another option is for the Responder to use the >>> > same hashing >>>>>>>>>> > >>>>>>> algorithm as the one in the first certID entry. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Santosh Chokhani >>>>>>>>>> > >>>>>>> CygnaCom Solutions >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>> > >>>>>> >>>>>>>>> > >>>>>> >>>>>>>> > >>>>> >>>>>>>> > >>>>> >>>>>>>> > >>>>> -- >>>>>>>> > >>>>> >>>>>>>> > >>>>> Best Regards, >>>>>>>> > >>>>> >>>>>>>> > >>>>> Massimiliano Pala >>>>>>>> > >>>>> >>>>>>>> > >>>>> --o------------------------------------------------------= ----- >>>>>>>> > >>>>> ------------- >>>>>>>> > >>>>> Massimiliano Pala [OpenCA Project Manager] >>>>>>>> > >>>>> Massimiliano.Pala@dartmouth.edu >>>>>>>> > >>>>> =20 >>>>>>>> > >>>>> project.manager@openca.org >>>>>>>> > >>>>> >>>>>>>> > >>>>> Dartmouth Computer Science Dept Home Phone= : +1 >>>>>>>> > >>>>> (603) 369-9332 >>>>>>>> > >>>>> PKI/Trust Laboratory Work Phon= e: +1 >>>>>>>> > >>>>> (603) 646-9179 >>>>>>>> > >>>>> =20 >>>>>>>> --o----------------------------------------------------------- >>>>>>>> > >>>>> ------------- >>>>>>>> > >>>>> >>>>>>>> > >>>>> People who think they know everything are a great annoya= nce >>>>>>> > >>>> to those >>>>>>>> > >>>>> of us who do. >>>>>>>> > >>>>> -- >>>>>>>> > >>>>> Isaac Asimov >>>>>>>> > >>>>> >>>>>>> > >>>> >>>>>> > >>> >>>>> > >> >>>>> > >> >>>>> > >> >>>> > > >>> > >>> > >>> > >>=20 >=20 --B_3321526709_11892108 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: OCSP RFC (RFC 2560) Dependence on SHA-1 I do agree to most things here.

I don’t believe that implementations can strip off SHA-1 in any fores= eeable future. It needs to be around, if nothing else, so for backwards comp= atibility. SHA-1 will continue to work in situations like this where no secu= rity properties are needed.

IMO, The added extension, even though I will not fight hard against it, &nb= sp;would just be redundant complexity.

/Stefan

On 4/2/09 1:54 PM, "Santosh Chokhani" <SChokhani@cygnacom.com> wrote:

I have no objection to having an extension, but if in t= he long term SHA-1 will not be there, it seems defining a new response type = (say basic 2) would be the way to go so that SHA-1 based key ID can be strip= ped off.

If SHA-1 is not getting rip= ped off in the long term, I do not see value in extension except that it may= make every one happy: those who do not care will not include it on the Serv= er side and/or will ignore it on the client side.

It would appear that the ex= tension should be NC.

Phil,

I would not respond to the = arguments on KISS and security since in this case both are straightforward. =  Also, in this thread, the comments were not meant for or directed at y= ou.

As you know, I have provide= d extensive comments to you when you first posted the OCSP Agility I-D and m= y position and reasons are matter of PKIX archives for anyone to scrutinize.=  When you ignore every single cogent point, there is no sense in me co= mmenting on next iteration.  I do think that the OCSP Agility I-D is a = solution looking for a problem that I do not see.

 

From: Hallam-Baker, Phillip  [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 12:53  AM
To: Santosh Chokhani; Stefan Santesson;  IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on  SHA-1

 
 
 
I think we have no choice  but to leave the = Key ID CHOICE to be SHA-1 based.

 
 
But that does not preclude adding an  extens= ion that allows the KeyID to be specified using a stronger algorithm.  = There are two reasons for this:

 
 
1) Optics, even if there is no security  imp= lication, a protocol that uses weak crypto necessitates an (expensive)  = ;security review to prove that there is no problem. And these must be perfor= med  repeatedly by many different parties as relying on the analysis of= others is a  good way to cause issues. Been there, done that.

 
 
2) We are designing for long time spans,  te= n years or more. While simple compressor collisions may not be a concern, &n= bsp;there is no guarantee that the attacks will stop at that point. MD4 has = been  broken repeatedly and they are now at the stage of jumping up and= down on the  little pieces. It will probably happen to MD5 and we shou= ld be cautious in  case it happens to SHA-1.

 
 
 
 
On the claim of 'Keep it simple STUPID',  I = find it rather offensive to have my position characterized as stupid. My &nb= sp;designs are not exactly known for being verbose or overly elaborate. If I=  propose something it is because there is a reason. It is very easy to= defend  the status quo by derriding proposals as unnecessary, but the = fact is that  making OCSP too simple will simply cause the complexity t= o blow out somewhere  else.

 
 
There is an architectural princple of  modul= ar design that demands that the core of PKIX as it now stands (the  cer= tificate profile and OCSP) be capable of stand alone use. We cannot fix &nbs= p;issues in OCSP with LTANS or other layered-on protocols as some have propo= sed.  It does not simplify my OCSP deployment to have to graft on an en= tire  different protocol in addition or to re-engineer my document arch= ival protocol  to cover defects in OCSP.

 
 
 
 
Simply adding new algorithms to a  protocol = does nothing to improve security. You only improve security if you  wit= hdraw insecure algorithms from use.

 
 
To make the system work you have to have  a = means of negotiating between the client and the server. Otherwise there is &= nbsp;no way for an OCSP responder to ensure that it receives a secure,  = ;supported response to querries for certificates that do not exist yet or &n= bsp;are not known to the responder.

 
 
In the case of an OCSP responder being  driv= en by CRLs collected from various sources, there is no way for the CA to &nb= sp;know if a certificate even exists, all it knows is if the status is  = ;definitively revoked.

 
 
In the case of many transactional  architect= ures the OCSP validation is performed independently of certificate  cha= in validation.

 
 
 
 
Experience of small scale PKI deployment  in= which any box can be upgraded at will is simply not representative of large=  scale real world deployment.

 
 
 

 
 


 
From:  owner-ietf-pkix@mail.imc.org on beh= alf of Santosh Chokhani
Sent: Wed  4/1/2009 8:39 PM
To: Stefan Santesson; IETF-pkix
Subject:  RE: OCSP RFC (RFC 2560) Dependence on SHA-1

 

 

I am saying that "Do you agree that 2560 can be left alone for  R= esponder
ID's key ID CHOICE being SHA-1 based?"

> -----Original  Message-----
> From: Stefan Santesson [mailto:ste= fan@aaa-sec.com]
> Sent:  Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani;  IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on  SHA-1
>
> Santosh,
>
> In-line
>
>
>  On 4/1/09 10:31 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>  wrote:
>
> >
> > Stefan,
> >
> > See  responses in-line.
> >
> >> -----Original  Message-----
> >> From: Stefan Santesson [m= ailto:stefan@aaa-sec.com]
>  >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: Santosh  Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: Re: OCSP RFC  (RFC 2560) Dependence on SHA-1 > >>
> >>  Santosh,
> >>
> >> If you are talking about adding  other options to calcul= ate the
> >> KeyHash value in ResponderID  then I strongly disagree.<= BR> > >>
> >> If you add  unspecified options you change the propertie= s
> of the field
>  >> from deterministic to a completely unknown value.
> >> It  does not matter if RFC2560 isn't explicit in its des= cription of
>  >> the use of the field. The fact is that OCSP explicitly<= BR> >  defines this
> >> value and as such will allow a client to  deterministica= lly compare
> >> this value with the certificate  selected to validate th= e response
> >> signature.
>  >
> > I hope no one is doing the matching of Responder ID  with > hash of a key
> > in place of responder signature  verification.  That wo= uld
> be real bad.
>  >
>
> Yes it would. That is not at all what I talk about. But  a
> client could use this value to locate a responder  certificate. >
> >> If you allow
> >> other ways  to calculate the value but do not provide an= y means to
> >> signal  what method that was used, then this feature is = lost.
> >
>  > The most common use will be to use this field to prioritize= the
>  > certificates of the responder to use for sigature
> verification on  the
> > response.
> >
>
> Do you know this for a  fact, or are you guessing?
> If a single implementation verifies that  the certificate used > to validate the response matches the ResponderID  value, and
> choose to go into an error state because of mismatch, then  we > have created great problems. So we can't guess. We have to
>  know that no single implementation will fail because of this. > And that  may be very hard.
>
>
> >>
> >> In worst  case we will cause current implementation to f= ail.
> >
> >  That is why I am asking what problems if any will the vendo= rs have.
>  >
>
> Even if no vendor speaks up here, it will not guarantee  that
> this will not create any problems.
>
>  >>
> >> I really don't think its worth the effort to change  thi= s field. We
> >> have a very large base of implementations that  we reall= y
> don't want
> >> to mess up unless its absolutely  necessary.
> >
> > So, we agree that leaving this field hard  wired to SHA-1 is= ok and
> > 2560 can easily accommodate new hash  functions.  Right= ?
> >
>
> I fail to understand this  sentence. Despite reading it many
> times over.
>
> > My  only reason to align with 5280 is that if some one were<= BR> > ever  want
> > to strip off SHA-1 altogether from their Responder or  clien= t,
> > permitting other methods does it.
>  >
>
> I don't believe this argument is valid as I don't think  it is > possible to strip off SHA-1 in any reasonable future. In  any
> case. If we compare the positive side with allowing this
>  change and the negative consequences to make OCSP
> incompatible with  itself, my choice is easy.
>
>  /Stefan
>
>
> >>
> >> As the only  property of this field is to provide a conv= enient
> >> identifier,  it is far from absolutely necessary to chan= ge it.
> >> Remember  that there is a second choice to to identify r= esponder by
> >>  name. For names we have accepted the possibility of col= lisions. In
>  >> that comparison, upgrading from SHA-1 is really redunda= nt.
>  >>
> >> /Stefan
> >>
> >>
>  >>
> >>
> >> On 4/1/09 4:05 PM, "Santosh  Chokhani"
> <SChokhani@cygnacom.com> wr= ote:
>  >>
> >>>
> >>> My resident ASN.1 expert  apprised me of the fact th= at
> >> adding a choice
>  >>> will break backward compatibility.  Thus, exte= nsion is  a
> >> fifth option
> >>> (probably third in the  priority).
> >>>
> >>> Based on what I know of  OCSP implementations, not c= hanging
> >> anything in
>  >>> terms of bits on the wire and aligning the Key ID w= ith  SKID
> >> in 5280 is
> >>> the best approach.   I do not think it will hur= t backward
> >> compatibility.
>  >>>
> >>> OCSP Responder and OCSP client vendors  should speak= up if I
> >> am wrong.
> >>>
>  >>>> -----Original Message-----
> >>>> From:  Santosh Chokhani
> >>>> Sent: Tuesday, March 31, 2009 12:51  PM
> >>>> To: 'Massimiliano Pala'; IETF-pkix
>  >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
>  >>>>
> >>>> Max,
>  >>>>
> >>>> I do not see where and what  extension we need t= o add for
> >> other digest
>  >>>> algorithm.
> >>>>
> >>>>  For key id, we need to enhance or broaden the o= ptions.
>  >>>>
> >>>>> -----Original  Message-----
> >>>>> From:  owner-ietf-pkix@mail.imc.org
> >>>>> [ma= ilto:owner-ietf-pkix@mail.imc.org]  On Behalf Of
> >> Massimiliano Pala
> >>>>>  Sent: Tuesday, March 31, 2009 1:37 PM
> >>>>> To:  IETF-pkix
> >>>>> Subject: Re: OCSP RFC (RFC 2560)  Dependence= on SHA-1
> >>>>>
> >>>>>  Hi all,
> >>>>>
> >>>>> as I said  during last meeting - as the use = of SHA-1 does
> >>>> not  have any
> >>>>> security implication in the OCSP,  another v= iable way
> would be to
> >>>>> define an  extension where other digest algo= rithms can be
> >>>> added  to the
> >>>>> request/responses.
>  >>>>>
> >>>>> It is a simple addition and  does not requir= e any change in
> >>>> the RFC, it
>  >>>>> can be done as a separate document for thos= e who what  to
> >> use other
> >>>>> digest  algorithms.
> >>>>>
> >>>>> After  all, isn't this an example of why we = allow
> >> extensions to  the
> >>>>> messages ?
>  >>>>>
> >>>>> Later,
>  >>>>> Max
> >>>>>
>  >>>>>
> >>>>> Santosh Chokhani  wrote:
> >>>>>> Tom,
>  >>>>>>
> >>>>>> Adding a new choice  and aligning it wit= h 5280 SKID is fine.
>  >>>>>>
> >>>>>> I would not add  anything about matching= this field with
> >>>>> anything  since
> >>>>>> RFC 2560 does not say anything about  it= .
> >>>>>>
> >>>>>> If one  were to add something, one shoul= d describe how this
>  >>>>> field can
> >>>>>> be used to  select from multiple Respond= er certificates.
>  >>>>>>
> >>>>>>> -----Original  Message-----
> >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>  >>>>>>> Sent: Monday, March 30, 2009 7:46 P= M
>  >>>>>>> To: Santosh Chokhani
>  >>>>>>> Cc: IETF-pkix
>  >>>>>>> Subject: Re: OCSP RFC (RFC 2560) De= pendence on  SHA-1
> >>>>>>>
>  >>>>>>>       = ;   Santosh:
> >>>>>>>
>  >>>>>>>       = ;   The RFC 5280 method just describes "two common
> >>>>  methods for
> >>>>>>> generating key identifiers  from the= public key"
> >>>>>>> and says that other  methods are acc= eptable.  The comment
> >>>>> to  KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as  permiss= ive.  Of course, it's
> >>>> the same
>  >>>>>>> field as SKID, and I would support = either stating  "if the
> >>>>> KeyHash is
>  >>>>>>> not precisely 20 octets long, it sh= ould be  matched
> against the
> >>>>>>> Subject Key  Identifier extension of= the signing
> certificate" or
>  >>>>>>> adding another choice like byID [3]= OCTET STRING  --
> >>>>> matches the value
>  >>>>>>> of SKID.
>  >>>>>>>
>  >>>>>>>       = ;           Tom Gindi= n
> >>>>>>>
>  >>>>>>> P.S. - The above opinions are mine,= and not  necessarily
> >>>>> those of my
>  >>>>>>> employer
>  >>>>>>>
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>> "Santosh Chokhani" <SChokhani@cygnacom.com>  Sent by:=
> >>>>>>>  owner-ietf-pkix@mail.imc.org
> >>>>>>> 03/26/2009  10:39 PM
> >>>>>>>
>  >>>>>>> To
> >>>>>>>  "IETF-pkix" <ietf-pkix@imc.org>
> >>>>>>>  cc
> >>>>>>>
> >>>>>>>  Subject
> >>>>>>> OCSP RFC (RFC 2560) Dependence on  S= HA-1
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>> RFC 2560 dependence on SHA-1 does n= ot appear to  be
> >>>>> difficult to deal
>  >>>>>>> with.
>  >>>>>>>
> >>>>>>> Section 4.3  lists SHA-1 as mandator= y and RSA as
> >>>> optional.   We can
> >>>>>>> update this to add SHA-2 series as  = optional.
> >>>>>>>
>  >>>>>>> The Responder ID has SHA-1 hardwire= d.  But,  that is no
> >>>>> different than
>  >>>>>>> key ID extensions in RFC 5280. &nbs= p;Here are  some options
> >> in order of
> >>>>>>>  preference:
> >>>>>>>
>  >>>>>>> 1.  Align the language with su= bject key ID  language
> in RFC 5280.
> >>>>>>>
>  >>>>>>> 2.  Keep on using SHA-1.  = ;This field is  not security
> >>>>> relevant.  RFC
>  >>>>>>> 2560 does not even describe how to = use this  field.  So,
> >>>>> having SHA-1
>  >>>>>>> and accidental or intentional colli= sions will not  hurt the
> >>>>> security
>  >>>>>>> of the protocol.
>  >>>>>>>
> >>>>>>> 3.  If  you do not believe in K= ISS principle, you can
> >>>>>  define another
> >>>>>>> response type and enhance  the key I= D ASN.1 syntax so
> that hash
>  >>>>>>> algorithm is identified.
>  >>>>>>>
> >>>>>>> 4.   Another option is for the = Responder to use the
> same hashing
>  >>>>>>> algorithm as the one in the first c= ertID  entry.
> >>>>>>>
>  >>>>>>>
> >>>>>>> Santosh  Chokhani
> >>>>>>> CygnaCom Solutions
>  >>>>>>>
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>
> >>>>>>
>  >>>>>
> >>>>>
> >>>>>  --
> >>>>>
> >>>>> Best  Regards,
> >>>>>
> >>>>>  Massimiliano Pala
> >>>>>
> >>>>>  --o----------------------------------------= -------------------
>  >>>>> -------------
> >>>>> Massimiliano  Pala [OpenCA Project Manager]<= BR> > >>>>>  M= assimiliano.Pala@dartmouth.edu
>  >>>>>        &= nbsp;    
>  >>>>> projec= t.manager@openca.org
>  >>>>>
> >>>>> Dartmouth Computer Science  Dept   = ;            &nb= sp;Home Phone: +1
> >>>>> (603) 369-9332
>  >>>>> PKI/Trust  Laboratory   &nbs= p;            &n= bsp;          Work Phone: = +1
> >>>>> (603) 646-9179
>  >>>>>  --o----------------------------------= -------------------------
>  >>>>> -------------
> >>>>>
>  >>>>> People who think they know everything are a= great  annoyance
> >>>> to those
> >>>>> of us  who do.
> >>>>>   --
>  >>>>> Isaac Asimov
> >>>>>
>  >>>>
> >>>
> >>
>  >>
> >>
>  >
>
>
>


--B_3321526709_11892108-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 06:07:45 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 53AC928C16C for ; Thu, 2 Apr 2009 06:07:45 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.424 X-Spam-Level: X-Spam-Status: No, score=-1.424 tagged_above=-999 required=5 tests=[AWL=0.043, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001, WHOIS_NETSOLPR=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PHhQj97wpvxZ for ; Thu, 2 Apr 2009 06:07:31 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8DAFE3A68C4 for ; Thu, 2 Apr 2009 06:07:30 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CfYlH087505 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 05:41:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32CfYUh087504; Thu, 2 Apr 2009 05:41:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32CfWx1087495 for ; Thu, 2 Apr 2009 05:41:32 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 26164 invoked from network); 2 Apr 2009 12:40:27 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 12:40:27 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B390.59C32388" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 08:41:31 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAAATo3RwAAzaKg References: From: "Santosh Chokhani" To: "Stefan Santesson" , "Hallam-Baker, Phillip" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B390.59C32388 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Agree ________________________________ From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 Sent: Thursday, April 02, 2009 8:18 AM To: Santosh Chokhani; Hallam-Baker, Phillip; IETF-pkix Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I do agree to most things here. =09 I don't believe that implementations can strip off SHA-1 in any foreseeable future. It needs to be around, if nothing else, so for backwards compatibility. SHA-1 will continue to work in situations like this where no security properties are needed. =09 IMO, The added extension, even though I will not fight hard against it, would just be redundant complexity. =09 /Stefan =09 On 4/2/09 1:54 PM, "Santosh Chokhani" wrote: =09 =09 I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =09 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =09 It would appear that the extension should be NC. =09 Phil, =09 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =09 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. =09 =09 =20 =09 ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =20 =20 =20 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =09 =20 =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =09 =20 =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =09 =20 =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =09 =20 =20 =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =09 =20 =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =09 =20 =20 =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =09 =20 =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =09 =20 =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =09 =20 =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =09 =20 =20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =09 =20 =20 =20 =09 =20 =20 =09 ________________________________ =20 From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =20 =09 =20 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 =09 =09 ------_=_NextPart_001_01C9B390.59C32388 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Re: OCSP RFC (RFC 2560) Dependence on SHA-1
Agree


From: Stefan Santesson=20 [mailto:stefan@aaa-sec.com]
Sent: Thursday, April 02, 2009 = 8:18=20 AM
To: Santosh Chokhani; Hallam-Baker, Phillip;=20 IETF-pkix
Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I do agree to most things here.

I = don’t believe=20 that implementations can strip off SHA-1 in any foreseeable future. It = needs=20 to be around, if nothing else, so for backwards compatibility. SHA-1 = will=20 continue to work in situations like this where no security properties = are=20 needed.

IMO, The added extension, even though I will not fight = hard=20 against it,  would just be redundant = complexity.

/Stefan

On=20 4/2/09 1:54 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>=20 wrote:

I have no objection to having an extension, but if in = the long=20 term SHA-1 will not be there, it seems defining a new response type = (say=20 basic 2) would be the way to go so that SHA-1 based key ID can be = stripped=20 off.

If SHA-1 is not getting ripped = off in the=20 long term, I do not see value in extension except that it may make = every one=20 happy: those who do not care will not include it on the Server side = and/or=20 will ignore it on the client side.

It would appear that the = extension should be=20 NC.

Phil,

I would not respond to the = arguments on KISS=20 and security since in this case both are straightforward. =  Also, in=20 this thread, the comments were not meant for or directed at=20 you.

As you know, I have provided = extensive=20 comments to you when you first posted the OCSP Agility I-D and my = position=20 and reasons are matter of PKIX archives for anyone to scrutinize. =  When=20 you ignore every single cogent point, there is no sense in me = commenting on=20 next iteration.  I do think that the OCSP Agility I-D is a = solution=20 looking for a problem that I do not see.

 

From:=20 Hallam-Baker, Phillip  [mailto:pbaker@verisign.com]=20
Sent: Thursday, April 02, 2009 12:53 =  AM
To:=20 Santosh Chokhani; Stefan Santesson; =  IETF-pkix
Subject: RE:=20 OCSP RFC (RFC 2560) Dependence on  SHA-1

 
 
 
I think we have no choice  but to leave the Key = ID CHOICE=20 to be SHA-1 based.

 
 
But that does not preclude adding an  extension = that=20 allows the KeyID to be specified using a stronger algorithm. =  There=20 are two reasons for this:

 
 
1) Optics, even if there is no security =  implication, a=20 protocol that uses weak crypto necessitates an (expensive) =  security=20 review to prove that there is no problem. And these must be = performed=20  repeatedly by many different parties as relying on the = analysis of=20 others is a  good way to cause issues. Been there, done=20 that.

 
 
2) We are designing for long time spans,  ten = years or=20 more. While simple compressor collisions may not be a concern, =  there=20 is no guarantee that the attacks will stop at that point. MD4 has = been=20  broken repeatedly and they are now at the stage of jumping = up and=20 down on the  little pieces. It will probably happen to MD5 = and we=20 should be cautious in  case it happens to = SHA-1.

 
 
 
 
On the claim of 'Keep it simple STUPID',  I find = it rather=20 offensive to have my position characterized as stupid. My =  designs=20 are not exactly known for being verbose or overly elaborate. If I=20  propose something it is because there is a reason. It is = very easy=20 to defend  the status quo by derriding proposals as = unnecessary, but=20 the fact is that  making OCSP too simple will simply cause = the=20 complexity to blow out somewhere  else.

 
 
There is an architectural princple of  modular = design that=20 demands that the core of PKIX as it now stands (the =  certificate=20 profile and OCSP) be capable of stand alone use. We cannot fix=20  issues in OCSP with LTANS or other layered-on protocols as = some have=20 proposed.  It does not simplify my OCSP deployment to have to = graft=20 on an entire  different protocol in addition or to = re-engineer my=20 document archival protocol  to cover defects in = OCSP.

 
 
 
 
Simply adding new algorithms to a  protocol does = nothing=20 to improve security. You only improve security if you =  withdraw=20 insecure algorithms from use.

 
 
To make the system work you have to have  a = means of=20 negotiating between the client and the server. Otherwise there is =  no=20 way for an OCSP responder to ensure that it receives a secure,=20  supported response to querries for certificates that do not = exist=20 yet or  are not known to the responder.

 
 
In the case of an OCSP responder being  driven = by CRLs=20 collected from various sources, there is no way for the CA to =  know=20 if a certificate even exists, all it knows is if the status is=20  definitively revoked.

 
 
In the case of many transactional  architectures = the OCSP=20 validation is performed independently of certificate  chain=20 validation.

 
 
 
 
Experience of small scale PKI deployment  in = which any box=20 can be upgraded at will is simply not representative of large =  scale=20 real world deployment.

 
 
 

 
 


 
From:  owner-ietf-pkix@mail.imc.org = on=20 behalf of Santosh Chokhani
Sent: Wed  4/1/2009 8:39 = PM
To: Stefan Santesson; IETF-pkix
Subject: =  RE:=20 OCSP RFC (RFC 2560) Dependence on SHA-1

 

 

I=20 am saying that "Do you agree that 2560 can be left alone for=20  Responder
ID's key ID CHOICE being SHA-1 = based?"

>=20 -----Original  Message-----
> From: Stefan Santesson = [mailto:stefan@aaa-sec.com]
>= =20 Sent:  Wednesday, April 01, 2009 6:32 PM
> To: Santosh=20 Chokhani;  IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) = Dependence on  SHA-1
>
> Santosh,
>
> = In-line
>
>
>  On 4/1/09 10:31 PM, "Santosh = Chokhani" <SChokhani@cygnacom.com>=20  wrote:
>
> >
> > Stefan,
>=20 >
> > See  responses in-line.
> = >
>=20 >> -----Original  Message-----
> >> From: = Stefan=20 Santesson [mailto:stefan@aaa-sec.com]
>= =20  >> Sent: Wednesday, April 01, 2009 2:34 PM
> = >>=20 To: Santosh  Chokhani; Massimiliano Pala; IETF-pkix
> = >>=20 Subject: Re: OCSP RFC  (RFC 2560) Dependence on SHA-1
> = >>
> >>  Santosh,
> >>
> = >>=20 If you are talking about adding  other options to calculate=20 the
> >> KeyHash value in ResponderID  then I = strongly=20 disagree.
> >>
> >> If you add =  unspecified=20 options you change the properties
> of the field
>=20  >> from deterministic to a completely unknown = value.
>=20 >> It  does not matter if RFC2560 isn't explicit in its = description of
>  >> the use of the field. The = fact is=20 that OCSP explicitly
>  defines this
> >> = value and=20 as such will allow a client to  deterministically = compare
>=20 >> this value with the certificate  selected to = validate the=20 response
> >> signature.
>  >
> = > I=20 hope no one is doing the matching of Responder ID =  with
> hash=20 of a key
> > in place of responder signature =  verification.=20  That would
> be real bad.
> =  >
>
>=20 Yes it would. That is not at all what I talk about. But =  a
>=20 client could use this value to locate a responder=20  certificate.
>
> >> If you allow
> = >>=20 other ways  to calculate the value but do not provide any = means=20 to
> >> signal  what method that was used, then = this=20 feature is lost.
> >
>  > The most common = use will=20 be to use this field to prioritize the
>  > = certificates of=20 the responder to use for sigature
> verification on=20  the
> > response.
> >
>
> Do = you know=20 this for a  fact, or are you guessing?
> If a single=20 implementation verifies that  the certificate used
> to = validate the response matches the ResponderID  value, = and
>=20 choose to go into an error state because of mismatch, then=20  we
> have created great problems. So we can't guess. = We have=20 to
>  know that no single implementation will fail = because of=20 this.
> And that  may be very = hard.
>
>
>=20 >>
> >> In worst  case we will cause = current=20 implementation to fail.
> >
> >  That is = why I am=20 asking what problems if any will the vendors have.
>=20  >
>
> Even if no vendor speaks up here, it = will not=20 guarantee  that
> this will not create any=20 problems.
>
>  >>
> >> I really = don't=20 think its worth the effort to change  this field. We
> = >>=20 have a very large base of implementations that  we = really
>=20 don't want
> >> to mess up unless its absolutely=20  necessary.
> >
> > So, we agree that = leaving this=20 field hard  wired to SHA-1 is ok and
> > 2560 can = easily=20 accommodate new hash  functions.  Right?
>=20 >
>
> I fail to understand this  sentence. = Despite=20 reading it many
> times over.
>
> > My =  only=20 reason to align with 5280 is that if some one were
> ever=20  want
> > to strip off SHA-1 altogether from their = Responder=20 or  client,
> > permitting other methods does = it.
>=20  >
>
> I don't believe this argument is valid = as I=20 don't think  it is
> possible to strip off SHA-1 in any = reasonable future. In  any
> case. If we compare the = positive=20 side with allowing this
>  change and the negative = consequences=20 to make OCSP
> incompatible with  itself, my choice is=20 easy.
>
>  /Stefan
>
>
>=20 >>
> >> As the only  property of this field = is to=20 provide a convenient
> >> identifier,  it is far = from=20 absolutely necessary to change it.
> >> Remember =  that=20 there is a second choice to to identify responder by
> = >>=20  name. For names we have accepted the possibility of = collisions.=20 In
>  >> that comparison, upgrading from SHA-1 is = really=20 redundant.
>  >>
> >> /Stefan
> = >>
> >>
>  >>
> = >>
>=20 >> On 4/1/09 4:05 PM, "Santosh  Chokhani"
> = <SChokhani@cygnacom.com>=20 wrote:
>  >>
> >>>
> = >>> My=20 resident ASN.1 expert  apprised me of the fact that
> = >>=20 adding a choice
>  >>> will break backward=20 compatibility.  Thus, extension is  a
> >> = fifth=20 option
> >>> (probably third in the=20  priority).
> >>>
> >>> Based = on what I=20 know of  OCSP implementations, not changing
> >> = anything=20 in
>  >>> terms of bits on the wire and = aligning the=20 Key ID with  SKID
> >> in 5280 is
> = >>>=20 the best approach.   I do not think it will hurt=20 backward
> >> compatibility.
>=20  >>>
> >>> OCSP Responder and OCSP = client=20 vendors  should speak up if I
> >> am = wrong.
>=20 >>>
>  >>>> -----Original=20 Message-----
> >>>> From:  Santosh = Chokhani
>=20 >>>> Sent: Tuesday, March 31, 2009 12:51 =  PM
>=20 >>>> To: 'Massimiliano Pala'; IETF-pkix
>=20  >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence = on=20 SHA-1
>  >>>>
> >>>> = Max,
>=20  >>>>
> >>>> I do not see where = and=20 what  extension we need to add for
> >> other=20 digest
>  >>>> algorithm.
>=20 >>>>
> >>>>  For key id, we = need to=20 enhance or broaden the options.
> =  >>>>
>=20 >>>>> -----Original  Message-----
>=20 >>>>> From:  owner-ietf-pkix@mail.imc.org>=20 >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20  On Behalf Of
> >> Massimiliano Pala
>=20 >>>>>  Sent: Tuesday, March 31, 2009 1:37 = PM
>=20 >>>>> To:  IETF-pkix
> = >>>>>=20 Subject: Re: OCSP RFC (RFC 2560)  Dependence on SHA-1
> = >>>>>
> >>>>>  Hi = all,
>=20 >>>>>
> >>>>> as I said =  during=20 last meeting - as the use of SHA-1 does
> >>>> = not=20  have any
> >>>>> security implication = in the=20 OCSP,  another viable way
> would be to
>=20 >>>>> define an  extension where other digest=20 algorithms can be
> >>>> added  to = the
>=20 >>>>> request/responses.
>=20  >>>>>
> >>>>> It is a = simple=20 addition and  does not require any change in
> = >>>>=20 the RFC, it
>  >>>>> can be done as a = separate=20 document for those who what  to
> >> use = other
>=20 >>>>> digest  algorithms.
>=20 >>>>>
> >>>>> After  all, = isn't=20 this an example of why we allow
> >> extensions to=20  the
> >>>>> messages ?
>=20  >>>>>
> >>>>> = Later,
>=20  >>>>> Max
> = >>>>>
>=20  >>>>>
> >>>>> Santosh = Chokhani=20  wrote:
> >>>>>> Tom,
>=20  >>>>>>
> >>>>>> = Adding a=20 new choice  and aligning it with 5280 SKID is fine.
>=20  >>>>>>
> >>>>>> I = would=20 not add  anything about matching this field with
>=20 >>>>> anything  since
> = >>>>>>=20 RFC 2560 does not say anything about  it.
>=20 >>>>>>
> >>>>>> If one=20  were to add something, one should describe how this
>=20  >>>>> field can
> = >>>>>> be=20 used to  select from multiple Responder certificates.
> =  >>>>>>
> = >>>>>>>=20 -----Original  Message-----
> = >>>>>>>=20 From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20  >>>>>>> Sent: Monday, March 30, 2009 = 7:46=20 PM
>  >>>>>>> To: Santosh = Chokhani
>=20  >>>>>>> Cc: IETF-pkix
>=20  >>>>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on  SHA-1
> = >>>>>>>
>=20  >>>>>>>=20 =          Santosh:
>=20 >>>>>>>
> =  >>>>>>>=20          The RFC 5280 = method=20 just describes "two common
> >>>>  methods=20 for
> >>>>>>> generating key = identifiers=20  from the public key"
> >>>>>>> = and says=20 that other  methods are acceptable.  The comment
> = >>>>> to  KeyHash
> = >>>>>>>=20 in RFC 2560 4.2.1 is not as  permissive.  Of course,=20 it's
> >>>> the same
>=20  >>>>>>> field as SKID, and I would = support=20 either stating  "if the
> >>>>> KeyHash=20 is
>  >>>>>>> not precisely 20 = octets=20 long, it should be  matched
> against the
>=20 >>>>>>> Subject Key  Identifier = extension of the=20 signing
> certificate" or
> =  >>>>>>>=20 adding another choice like byID [3] OCTET STRING  --
>=20 >>>>> matches the value
>=20  >>>>>>> of SKID.
>=20  >>>>>>>
>=20  >>>>>>>=20 =             &= nbsp;    Tom=20 Gindin
> >>>>>>>
>=20  >>>>>>> P.S. - The above opinions are = mine, and=20 not  necessarily
> >>>>> those of = my
>=20  >>>>>>> employer
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
> =  >>>>>>>=20 "Santosh Chokhani" <SChokhani@cygnacom.com> =  Sent=20 by:
> >>>>>>>  owner-ietf-pkix@mail.imc.org>=20 >>>>>>> 03/26/2009  10:39 PM
>=20 >>>>>>>
> =  >>>>>>>=20 To
> >>>>>>>  "IETF-pkix" <ietf-pkix@imc.org>
>=20 >>>>>>>  cc
>=20 >>>>>>>
> >>>>>>>=20  Subject
> >>>>>>> OCSP RFC (RFC = 2560)=20 Dependence on  SHA-1
> = >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
> =  >>>>>>>=20 RFC 2560 dependence on SHA-1 does not appear to  be
>=20 >>>>> difficult to deal
>=20  >>>>>>> with.
>=20  >>>>>>>
> = >>>>>>>=20 Section 4.3  lists SHA-1 as mandatory and RSA as
>=20 >>>> optional.   We can
>=20 >>>>>>> update this to add SHA-2 series as=20  optional.
> >>>>>>>
>=20  >>>>>>> The Responder ID has SHA-1 = hardwired.=20  But,  that is no
> >>>>> different = than
>  >>>>>>> key ID extensions = in RFC=20 5280.  Here are  some options
> >> in order=20 of
> >>>>>>>  preference:
>=20 >>>>>>>
> =  >>>>>>> 1.=20  Align the language with subject key ID =  language
> in RFC=20 5280.
> >>>>>>>
>=20  >>>>>>> 2.  Keep on using SHA-1.=20  This field is  not security
> = >>>>>=20 relevant.  RFC
>  >>>>>>> = 2560 does=20 not even describe how to use this  field.  So,
>=20 >>>>> having SHA-1
>=20  >>>>>>> and accidental or intentional=20 collisions will not  hurt the
> >>>>>=20 security
>  >>>>>>> of the=20 protocol.
>  >>>>>>>
>=20 >>>>>>> 3.  If  you do not believe = in KISS=20 principle, you can
> >>>>>  define=20 another
> >>>>>>> response type and = enhance=20  the key ID ASN.1 syntax so
> that hash
>=20  >>>>>>> algorithm is = identified.
>=20  >>>>>>>
> = >>>>>>> 4.=20   Another option is for the Responder to use the
> = same=20 hashing
>  >>>>>>> algorithm as = the one in=20 the first certID  entry.
> = >>>>>>>
>=20  >>>>>>>
> = >>>>>>>=20 Santosh  Chokhani
> >>>>>>> = CygnaCom=20 Solutions
>  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>
> = >>>>>>
>=20  >>>>>
> >>>>>
>=20 >>>>>  --
> >>>>>
> = >>>>> Best  Regards,
>=20 >>>>>
> >>>>> =  Massimiliano=20 Pala
> >>>>>
> >>>>>=20 =  --o-----------------------------------------------------------
&= gt;=20  >>>>> -------------
> = >>>>>=20 Massimiliano  Pala [OpenCA Project Manager]
>=20 >>>>>  Massimiliano.Pala@dartmouth.edu<= /A>
>=20  >>>>>=20 =             <= BR>>=20  >>>>> project.manager@openca.org
>= ;=20  >>>>>
> >>>>> Dartmouth = Computer=20 Science  Dept=20 =             &= nbsp;  Home=20 Phone: +1
> >>>>> (603) 369-9332
>=20  >>>>> PKI/Trust  Laboratory=20 =             &= nbsp;           &n= bsp; Work=20 Phone: +1
> >>>>> (603) 646-9179
>=20  >>>>>=20 =  --o-----------------------------------------------------------
&= gt;=20  >>>>> -------------
>=20 >>>>>
>  >>>>> People who = think=20 they know everything are a great  annoyance
> = >>>>=20 to those
> >>>>> of us  who do.
>=20 >>>>>   --
> =  >>>>>=20 Isaac Asimov
> >>>>>
>=20  >>>>
> >>>
> = >>
>=20  >>
> >>
>=20 =  >
>
>
>


------_=_NextPart_001_01C9B390.59C32388-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 07:17:34 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 53E103A68C4 for ; Thu, 2 Apr 2009 07:17:34 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.885 X-Spam-Level: X-Spam-Status: No, score=-2.885 tagged_above=-999 required=5 tests=[AWL=-0.286, BAYES_00=-2.599, J_BACKHAIR_42=1, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bF1L39AWN0T3 for ; Thu, 2 Apr 2009 07:17:33 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 279043A68E4 for ; Thu, 2 Apr 2009 07:17:32 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32DtYnf094401 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 06:55:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32DtYAw094400; Thu, 2 Apr 2009 06:55:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from WA4EHSOBE002.bigfish.com (wa4ehsobe002.messaging.microsoft.com [216.32.181.12]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32DtMSE094376 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=FAIL) for ; Thu, 2 Apr 2009 06:55:33 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from mail223-wa4-R.bigfish.com (10.8.14.252) by WA4EHSOBE002.bigfish.com (10.8.40.22) with Microsoft SMTP Server id 8.1.340.0; Thu, 2 Apr 2009 13:55:22 +0000 Received: from mail223-wa4 (localhost.localdomain [127.0.0.1]) by mail223-wa4-R.bigfish.com (Postfix) with ESMTP id 841D358834D for ; Thu, 2 Apr 2009 13:55:22 +0000 (UTC) X-BigFish: VPS-25(zz1432R98dR1805Mzz1202hzz1033ILz2dh6bh87il61h) X-Spam-TCS-SCL: 0:0 X-FB-DOMAIN-IP-MATCH: fail Received: by mail223-wa4 (MessageSwitch) id 1238680519758419_8562; Thu, 2 Apr 2009 13:55:19 +0000 (UCT) Received: from imx2.tcd.ie (imx2.tcd.ie [134.226.1.156]) by mail223-wa4.bigfish.com (Postfix) with ESMTP id 878CB7A0050 for ; Thu, 2 Apr 2009 13:55:19 +0000 (UTC) Received: from Vams.imx2 (imx2.tcd.ie [134.226.1.156]) by imx2.tcd.ie (Postfix) with SMTP id E9AE068002 for ; Thu, 2 Apr 2009 14:55:18 +0100 (IST) Received: from imx2.tcd.ie ([134.226.1.156]) by imx2.tcd.ie ([134.226.1.156]) with SMTP (gateway) id A0743EE5B0A; Thu, 02 Apr 2009 14:55:18 +0100 Received: from [134.226.36.180] (sfarrell.dsg.cs.tcd.ie [134.226.36.180]) by imx2.tcd.ie (Postfix) with ESMTP id D7B4B68002 for ; Thu, 2 Apr 2009 14:55:18 +0100 (IST) Message-ID: <49D4C40D.5040501@cs.tcd.ie> Date: Thu, 2 Apr 2009 14:56:29 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.21 (X11/20090302) MIME-Version: 1.0 To: IETF-pkix Subject: Re: WG Last Call on draft-ietf-pkix-tac-03 References: In-Reply-To: X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit X-AntiVirus-Status: MessageID = A1743EE5B0A X-AntiVirus-Status: Host: imx2.tcd.ie X-AntiVirus-Status: Action Taken: X-AntiVirus-Status: NONE X-AntiVirus-Status: Checked by TCD Vexira. (version=1.60.2 VDF=10.102.30) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan Santesson wrote: > The authors of Traceable Anonymous Certificate > draft-ietf-pkix-tac-03.txt has requested WGLC. > > http://tools.ietf.org/html/draft-ietf-pkix-tac-03 > A couple of comments: #1: Top of p7: "To effect issuance of the TAC, the AI interacts with the BI, over a secure channel, to jointly create the signature on the TAC, and sends the signed TAC to the user. The AI does this without learning the user's real identity (either from the user or from the BI)." If the AI sends the TAC to the user, then it will know some form of identity for that user, even if that's only an IP address. (And with the likes of SAVI, that could well be enough to establish a real identity.) I'd have thought it'd be much better to return the TAC via the BI and not require any user<->AI direct connections? #2: Section 5.2 claims that the AI can't unilaterally fool the BI into revealing the real identity. But the only thing that stops that seems to be the RP client identity verified by the BI when the RP establishes a mutual-auth TLS connection to the BI. So how can the BI really know that its not the AI making that connection? Stephen. From owner-ietf-pkix@mail.imc.org Thu Apr 2 07:20:40 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BE4B328C1C7 for ; Thu, 2 Apr 2009 07:20:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.399 X-Spam-Level: X-Spam-Status: No, score=-5.399 tagged_above=-999 required=5 tests=[AWL=-0.197, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3hnyNrYTUdby for ; Thu, 2 Apr 2009 07:20:38 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 10CFC28C1C2 for ; Thu, 2 Apr 2009 07:20:36 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32DpS45094055 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 06:51:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32DpSrG094054; Thu, 2 Apr 2009 06:51:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32DpH4M094037 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 06:51:28 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN03.vcorp.ad.vrsn.com (mailer6.verisign.com [65.205.251.33]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id n32DPJ3B026359; Thu, 2 Apr 2009 06:25:19 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 2 Apr 2009 06:51:09 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B39A.1397BF01" Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 06:47:45 -0700 Message-ID: <2788466ED3E31C418E9ACC5C3166155768B35F@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 thread-index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABFiEVA== References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , "Stefan Santesson" , "IETF-pkix" X-OriginalArrivalTime: 02 Apr 2009 13:51:09.0810 (UTC) FILETIME=[13F79D20:01C9B39A] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B39A.1397BF01 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable On the contrary, each time I asked for a substantive argument you used = exactly the same non argument you are using here. =20 I have put a substantive argument on the table here. "I am not = convinced" or "I answered the question some other time" with no links to = the specific points are not a substantive response. You may think that = you gave a substantive explanation of how a client that only supports = ECC can obtain a comprehensible response from a generic OCSP server that = also supports RSA. However I do not beleive that it is possible in the = current protocol. =20 If you think you have demonstrated this in the past then please point to = the email. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 I have no objection to having an extension, but if in the long term = SHA-1 will not be there, it seems defining a new response type (say = basic 2) would be the way to go so that SHA-1 based key ID can be = stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value = in extension except that it may make every one happy: those who do not = care will not include it on the Server side and/or will ignore it on the = client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this = case both are straightforward. Also, in this thread, the comments were = not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first = posted the OCSP Agility I-D and my position and reasons are matter of = PKIX archives for anyone to scrutinize. When you ignore every single = cogent point, there is no sense in me commenting on next iteration. I = do think that the OCSP Agility I-D is a solution looking for a problem = that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 = based. =20 But that does not preclude adding an extension that allows the KeyID to = be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that = uses weak crypto necessitates an (expensive) security review to prove = that there is no problem. And these must be performed repeatedly by many = different parties as relying on the analysis of others is a good way to = cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While = simple compressor collisions may not be a concern, there is no guarantee = that the attacks will stop at that point. MD4 has been broken repeatedly = and they are now at the stage of jumping up and down on the little = pieces. It will probably happen to MD5 and we should be cautious in case = it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to = have my position characterized as stupid. My designs are not exactly = known for being verbose or overly elaborate. If I propose something it = is because there is a reason. It is very easy to defend the status quo = by derriding proposals as unnecessary, but the fact is that making OCSP = too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that = the core of PKIX as it now stands (the certificate profile and OCSP) be = capable of stand alone use. We cannot fix issues in OCSP with LTANS or = other layered-on protocols as some have proposed. It does not simplify = my OCSP deployment to have to graft on an entire different protocol in = addition or to re-engineer my document archival protocol to cover = defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve = security. You only improve security if you withdraw insecure algorithms = from use. =20 To make the system work you have to have a means of negotiating between = the client and the server. Otherwise there is no way for an OCSP = responder to ensure that it receives a secure, supported response to = querries for certificates that do not exist yet or are not known to the = responder. =20 In the case of an OCSP responder being driven by CRLs collected from = various sources, there is no way for the CA to know if a certificate = even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is = performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be = upgraded at will is simply not representative of large scale real world = deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for = Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" = wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B39A.1397BF01 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1=0A= =0A= =0A= =0A=
=0A=
On the = contrary, each time I asked for a substantive argument you used exactly = the same non argument you are using here.
=0A=
 
=0A=
I have put a substantive = argument on the table here. "I am not convinced" or "I answered the = question some other time" with no links to the specific points are not a = substantive response. You may think that you gave a substantive = explanation of how a client that only supports ECC can obtain a = comprehensible response from a generic OCSP server that also supports = RSA. However I do not beleive that it is possible in the current = protocol.
=0A=
 
=0A=
If you think you have = demonstrated this in the past then please point to the = email.
=0A=
 
=0A=

=0A=
=0A= From: Santosh Chokhani = [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54 = AM
To: Hallam-Baker, Phillip; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
I have no objection to having an = extension, but if in the long term SHA-1 will not be there, it seems = defining a new response type (say basic 2) would be the way to go so = that SHA-1 based key ID can be stripped off.
=0A=
 
=0A=
If SHA-1 is not getting ripped off = in the long term, I do not see value in extension except that it = may make every one happy: those who do not care will not include it = on the Server side and/or will ignore it on the client = side.
=0A=
 
=0A=
It would appear that the extension = should be NC.
=0A=
 
=0A=
Phil,
=0A=
 
=0A=
I would not respond to the = arguments on KISS and security since in this case both are = straightforward.  Also, in this thread, the comments were not meant = for or directed at you.
=0A=
 
=0A=
As you know, I have provided = extensive comments to you when you first posted the OCSP Agility I-D and = my position and reasons are matter of PKIX archives for anyone to = scrutinize.  When you ignore every single cogent point, there is no = sense in me commenting on next iteration.  I do think that the OCSP = Agility I-D is a solution looking for a problem that I do not = see.
=0A=
=0A=
=0A=
=0A= From: Hallam-Baker, Phillip = [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53 AM
To: Santosh Chokhani; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
=0A=
I think we = have no choice but to leave the Key ID CHOICE to be SHA-1 = based.
=0A=
 
=0A=
But that does not preclude = adding an extension that allows the KeyID to be specified using a = stronger algorithm. There are two reasons for this:
=0A=
 
=0A=
1) Optics, even if there is = no security implication, a protocol that uses weak crypto necessitates = an (expensive) security review to prove that there is no problem. And = these must be performed repeatedly by many different parties as relying = on the analysis of others is a good way to cause issues. Been there, = done that.
=0A=
 
=0A=
2) We are designing for long = time spans, ten years or more. While simple compressor collisions may = not be a concern, there is no guarantee that the attacks will stop at = that point. MD4 has been broken repeatedly and they are now at the stage = of jumping up and down on the little pieces. It will probably happen to = MD5 and we should be cautious in case it happens to SHA-1.
=0A=
 
=0A=
 
=0A=
On the claim of 'Keep it = simple STUPID', I find it rather offensive to have my position = characterized as stupid. My designs are not exactly known for being = verbose or overly elaborate. If I propose something it is because there = is a reason. It is very easy to defend the status quo by derriding = proposals as unnecessary, but the fact is that making OCSP too simple = will simply cause the complexity to blow out somewhere else.
=0A=
 
=0A=
There is an architectural = princple of modular design that demands that the core of PKIX as it now = stands (the certificate profile and OCSP) be capable of stand alone use. = We cannot fix issues in OCSP with LTANS or other layered-on protocols as = some have proposed. It does not simplify my OCSP deployment to have to = graft on an entire different protocol in addition or to re-engineer my = document archival protocol to cover defects in OCSP.
=0A=
 
=0A=
 
=0A=
Simply adding new algorithms = to a protocol does nothing to improve security. You only improve = security if you withdraw insecure algorithms from use.
=0A=
 
=0A=
To make the system work you = have to have a means of negotiating between the client and the server. = Otherwise there is no way for an OCSP responder to ensure that it = receives a secure, supported response to querries for certificates = that do not exist yet or are not known to the responder.
=0A=
 
=0A=
In the case of an OCSP = responder being driven by CRLs collected from various sources, there is = no way for the CA to know if a certificate even exists, all it knows is = if the status is definitively revoked.
=0A=
 
=0A=
In the case of many = transactional architectures the OCSP validation is performed = independently of certificate chain validation.
=0A=
 
=0A=
 
=0A=
Experience of small scale PKI = deployment in which any box can be upgraded at will is simply not = representative of large scale real world deployment.
=0A=
 
=0A=
=0A=

=0A=
=0A=
=0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed 4/1/2009 8:39 PM
To: Stefan = Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

=0A=

=0A=

I am saying that "Do you agree that 2560 can be left = alone for Responder
ID's key ID CHOICE being SHA-1 = based?"

> -----Original Message-----
> From: Stefan = Santesson [mailto:stefan@aaa-sec.com]
>= Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani; = IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on = SHA-1
>
> Santosh,
>
> = In-line
>
>
> On 4/1/09 10:31 PM, "Santosh Chokhani" = <SChokhani@cygnacom.com> wrote:
>
> >
> > = Stefan,
> >
> > See responses in-line.
> = >
> >> -----Original Message-----
> >> From: = Stefan Santesson [mailto:stefan@aaa-sec.com]
>= >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >> Santosh,
> >>
> >> If you are talking = about adding other options to calculate the
> >> KeyHash = value in ResponderID then I strongly disagree.
> >>
> = >> If you add unspecified options you change the = properties
> of the field
> >> from deterministic to a = completely unknown value.
> >> It does not matter if RFC2560 = isn't explicit in its description of
> >> the use of the = field. The fact is that OCSP explicitly
> defines this
> = >> value and as such will allow a client to deterministically = compare
> >> this value with the certificate selected to = validate the response
> >> signature.
> >
> = > I hope no one is doing the matching of Responder ID with
> = hash of a key
> > in place of responder signature = verification.  That would
> be real bad.
> = >
>
> Yes it would. That is not at all what I talk about. = But a
> client could use this value to locate a responder = certificate.
>
> >> If you allow
> >> = other ways to calculate the value but do not provide any means = to
> >> signal what method that was used, then this feature = is lost.
> >
> > The most common use will be to use = this field to prioritize the
> > certificates of the responder = to use for sigature
> verification on the
> > = response.
> >
>
> Do you know this for a fact, or = are you guessing?
> If a single implementation verifies that the = certificate used
> to validate the response matches the = ResponderID value, and
> choose to go into an error state because = of mismatch, then we
> have created great problems. So we can't = guess. We have to
> know that no single implementation will fail = because of this.
> And that may be very = hard.
>
>
> >>
> >> In worst case we = will cause current implementation to fail.
> >
> > = That is why I am asking what problems if any will the vendors = have.
> >
>
> Even if no vendor speaks up here, it = will not guarantee that
> this will not create any = problems.
>
> >>
> >> I really don't think = its worth the effort to change this field. We
> >> have a = very large base of implementations that we really
> don't = want
> >> to mess up unless its absolutely = necessary.
> >
> > So, we agree that leaving this = field hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite reading = it many
> times over.
>
> > My only reason to align = with 5280 is that if some one were
> ever want
> > to = strip off SHA-1 altogether from their Responder or client,
> > = permitting other methods does it.
> >
>
> I don't = believe this argument is valid as I don't think it is
> possible = to strip off SHA-1 in any reasonable future. In any
> case. If we = compare the positive side with allowing this
> change and the = negative consequences to make OCSP
> incompatible with itself, my = choice is easy.
>
> /Stefan

>
> = >>
> >> As the only property of this field is to = provide a convenient
> >> identifier, it is far from = absolutely necessary to change it.
> >> Remember that there = is a second choice to to identify responder by
> >> name. = For names we have accepted the possibility of collisions. In
> = >> that comparison, upgrading from SHA-1 is really = redundant.
> >>
> >> /Stefan
> = >>
> >>
> >>
> >>
> = >> On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com> wrote:
> >>
> = >>>
> >>> My resident ASN.1 expert apprised me = of the fact that
> >> adding a choice
> >>> = will break backward compatibility.  Thus, extension is a
> = >> fifth option
> >>> (probably third in the = priority).
> >>>
> >>> Based on what I = know of OCSP implementations, not changing
> >> anything = in
> >>> terms of bits on the wire and aligning the Key = ID with SKID
> >> in 5280 is
> >>> the best = approach.  I do not think it will hurt backward
> >> = compatibility.
> >>>
> >>> OCSP Responder = and OCSP client vendors should speak up if I
> >> am = wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh Chokhani
> = >>>> Sent: Tuesday, March 31, 2009 12:51 PM
> = >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>
> >>>> Max,
> = >>>>
> >>>> I do not see where and what = extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
> = >>>> For key id, we need to enhance or broaden the = options.
> >>>>
> >>>>> = -----Original Message-----
> >>>>> From: = owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> >> Massimiliano Pala
> = >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>>>>
> >>>>> Hi all,
> = >>>>>
> >>>>> as I said during last = meeting - as the use of SHA-1 does
> >>>> not have = any
> >>>>> security implication in the OCSP, = another viable way
> would be to
> >>>>> = define an extension where other digest algorithms can be
> = >>>> added to the
> >>>>> = request/responses.
> >>>>>
> = >>>>> It is a simple addition and does not require any = change in
> >>>> the RFC, it
> = >>>>> can be done as a separate document for those who = what to
> >> use other
> >>>>> digest = algorithms.
> >>>>>
> >>>>> = After all, isn't this an example of why we allow
> >> = extensions to the
> >>>>> messages ?
> = >>>>>
> >>>>> Later,
> = >>>>> Max
> >>>>>
> = >>>>>
> >>>>> Santosh Chokhani = wrote:
> >>>>>> Tom,
> = >>>>>>
> >>>>>> Adding a new = choice and aligning it with 5280 SKID is fine.
> = >>>>>>
> >>>>>> I would not = add anything about matching this field with
> >>>>> = anything since
> >>>>>> RFC 2560 does not say = anything about it.
> >>>>>>
> = >>>>>> If one were to add something, one should = describe how this
> >>>>> field can
> = >>>>>> be used to select from multiple Responder = certificates.
> >>>>>>
> = >>>>>>> -----Original Message-----
> = >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
> >>>>>>> To: Santosh Chokhani
> = >>>>>>> Cc: IETF-pkix
> = >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence = on SHA-1
> >>>>>>>
> = >>>>>>>       &nb= sp; Santosh:
> >>>>>>>
> = >>>>>>>       &nb= sp; The RFC 5280 method just describes "two common
> = >>>> methods for
> >>>>>>> = generating key identifiers from the public key"
> = >>>>>>> and says that other methods are = acceptable.  The comment
> >>>>> to = KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as = permissive.  Of course, it's
> >>>> the = same
> >>>>>>> field as SKID, and I would = support either stating "if the
> >>>>> KeyHash = is
> >>>>>>> not precisely 20 octets long, it = should be matched
> against the
> = >>>>>>> Subject Key Identifier extension of the = signing
> certificate" or
> >>>>>>> = adding another choice like byID [3] OCTET STRING --
> = >>>>> matches the value
> = >>>>>>> of SKID.
> = >>>>>>>
> = >>>>>>>       &nb= sp;         Tom Gindin
> = >>>>>>>
> >>>>>>> P.S. - = The above opinions are mine, and not necessarily
> = >>>>> those of my
> >>>>>>> = employer
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> = "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by:
> = >>>>>>> owner-ietf-pkix@mail.imc.org
> = >>>>>>> 03/26/2009 10:39 PM
> = >>>>>>>
> >>>>>>> = To
> >>>>>>> "IETF-pkix" = <ietf-pkix@imc.org>
> >>>>>>> = cc
> >>>>>>>
> = >>>>>>> Subject
> = >>>>>>> OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> RFC = 2560 dependence on SHA-1 does not appear to be
> = >>>>> difficult to deal
> = >>>>>>> with.
> = >>>>>>>
> >>>>>>> = Section 4.3 lists SHA-1 as mandatory and RSA as
> >>>> = optional.  We can
> >>>>>>> update this = to add SHA-2 series as optional.
> = >>>>>>>
> >>>>>>> The = Responder ID has SHA-1 hardwired.  But, that is no
> = >>>>> different than
> >>>>>>> = key ID extensions in RFC 5280.  Here are some options
> = >> in order of
> >>>>>>> = preference:
> >>>>>>>
> = >>>>>>> 1.  Align the language with subject = key ID language
> in RFC 5280.
> = >>>>>>>
> >>>>>>> = 2.  Keep on using SHA-1.  This field is not security
> = >>>>> relevant.  RFC
> = >>>>>>> 2560 does not even describe how to use this = field.  So,
> >>>>> having SHA-1
> = >>>>>>> and accidental or intentional collisions = will not hurt the
> >>>>> security
> = >>>>>>> of the protocol.
> = >>>>>>>
> >>>>>>> = 3.  If you do not believe in KISS principle, you can
> = >>>>> define another
> >>>>>>> = response type and enhance the key ID ASN.1 syntax so
> that = hash
> >>>>>>> algorithm is = identified.
> >>>>>>>
> = >>>>>>> 4.  Another option is for the = Responder to use the
> same hashing
> = >>>>>>> algorithm as the one in the first certID = entry.
> >>>>>>>
> = >>>>>>>
> >>>>>>> = Santosh Chokhani
> >>>>>>> CygnaCom = Solutions
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>
> = >>>>>>
> >>>>>
> = >>>>>
> >>>>> --
> = >>>>>
> >>>>> Best Regards,
> = >>>>>
> >>>>> Massimiliano = Pala
> >>>>>
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano Pala [OpenCA Project Manager]
> >>>>> = Massimiliano.Pala@dartmouth.edu
> = >>>>>         = ;    
> >>>>> = project.manager@openca.org
> >>>>>
> = >>>>> Dartmouth Computer Science = Dept           &nb= sp;   Home Phone: +1
> >>>>> (603) = 369-9332
> >>>>> PKI/Trust = Laboratory          &nb= sp;           &nbs= p;   Work Phone: +1
> >>>>> (603) = 646-9179
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>>
> = >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> >>>>> = of us who do.
> >>>>>   --
> = >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
> = >>
> >>
> = >
>
>
>

<= /BODY> ------_=_NextPart_001_01C9B39A.1397BF01-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 07:44:26 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C9AF628C220 for ; Thu, 2 Apr 2009 07:44:26 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.396 X-Spam-Level: X-Spam-Status: No, score=-5.396 tagged_above=-999 required=5 tests=[AWL=-0.194, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2W+vx+tLaSQ1 for ; Thu, 2 Apr 2009 07:44:23 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D0B5A28C222 for ; Thu, 2 Apr 2009 07:44:20 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32EIbc4096367 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 07:18:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32EIb6q096366; Thu, 2 Apr 2009 07:18:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32EIaZj096357 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 07:18:36 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com [65.205.251.35]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id n32DqdH1027310; Thu, 2 Apr 2009 06:52:39 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 2 Apr 2009 07:18:28 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B39D.E4D38B09" Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 07:18:28 -0700 Message-ID: <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 thread-index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABIERYQ== References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , "Stefan Santesson" , "IETF-pkix" X-OriginalArrivalTime: 02 Apr 2009 14:18:28.0987 (UTC) FILETIME=[E4FE2CB0:01C9B39D] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B39D.E4D38B09 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Let us divide the problem into two. KEYID actually has two (separable) = uses: =20 =20 1) Client to server as a hash index to the cert 2) (Possibly implicit) Server to client as an authenticator of the = actual cert =20 The situation I see here is this: The client has obtained a cert, it = needs to know the status thereof. So it takes a digest of the = certificate using SHA1 and sends it to the server which then uses it as = a lookup key. =20 For this particular part of the problem, there does not appear to be any = security concern. We are using SHA1 because it is a large hash function = that has a minimal chance of accidental collision. But at this point we = have not actually relied on the hash function for authentication = purposes at either end. It is not being used as a cryptographic message = digest. =20 So this seems to fit into a class that EKR once mentioned of cases where = we use SHA1 or MD5 as a hash, not a message digest. =20 =20 The second half of the equation is where we can end up in (some) = difficulty. Particularly if we are working in an archival situation. = Imagine the case that we have an RSA1024-SHA1 signature on a document = signed using a key that was subsequently compromised and the question = the infrastructure needs to answer is whether the certificate was valid = at the point it was signed. This was one of the original core use cases = in the design of OCSP. =20 In this case there is little choice but to use the SHA1 hash as a = message digest and then we have the problem. =20 =20 The simple fix here is to allow the server to specify its own digest for = the actual cert whose status is being reported. You can think of it as = being like using 96 bits of a digest as a hash and then supplying the = full 256 bits to confirm that the located object was not subject to a = collision. =20 =20 The former Area Director, now the IETF chair has expressed concern as to = the long term management of cryptographic algorithms on many occasions. = I think that it would be very unwise for the rest of us to dismiss the = chance that he has a really, really good and specific reason for this = concern. =20 While the specific reason may not be imminent, the problem may well hit = many years down the line after infrastructure is widely deployed and = embedded. We should avoid creating additional Y2K type problems. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 I have no objection to having an extension, but if in the long term = SHA-1 will not be there, it seems defining a new response type (say = basic 2) would be the way to go so that SHA-1 based key ID can be = stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value = in extension except that it may make every one happy: those who do not = care will not include it on the Server side and/or will ignore it on the = client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this = case both are straightforward. Also, in this thread, the comments were = not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first = posted the OCSP Agility I-D and my position and reasons are matter of = PKIX archives for anyone to scrutinize. When you ignore every single = cogent point, there is no sense in me commenting on next iteration. I = do think that the OCSP Agility I-D is a solution looking for a problem = that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 = based. =20 But that does not preclude adding an extension that allows the KeyID to = be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that = uses weak crypto necessitates an (expensive) security review to prove = that there is no problem. And these must be performed repeatedly by many = different parties as relying on the analysis of others is a good way to = cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While = simple compressor collisions may not be a concern, there is no guarantee = that the attacks will stop at that point. MD4 has been broken repeatedly = and they are now at the stage of jumping up and down on the little = pieces. It will probably happen to MD5 and we should be cautious in case = it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to = have my position characterized as stupid. My designs are not exactly = known for being verbose or overly elaborate. If I propose something it = is because there is a reason. It is very easy to defend the status quo = by derriding proposals as unnecessary, but the fact is that making OCSP = too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that = the core of PKIX as it now stands (the certificate profile and OCSP) be = capable of stand alone use. We cannot fix issues in OCSP with LTANS or = other layered-on protocols as some have proposed. It does not simplify = my OCSP deployment to have to graft on an entire different protocol in = addition or to re-engineer my document archival protocol to cover = defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve = security. You only improve security if you withdraw insecure algorithms = from use. =20 To make the system work you have to have a means of negotiating between = the client and the server. Otherwise there is no way for an OCSP = responder to ensure that it receives a secure, supported response to = querries for certificates that do not exist yet or are not known to the = responder. =20 In the case of an OCSP responder being driven by CRLs collected from = various sources, there is no way for the CA to know if a certificate = even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is = performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be = upgraded at will is simply not representative of large scale real world = deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for = Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" = wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B39D.E4D38B09 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1=0A= =0A= =0A= =0A=
=0A=
Let us divide = the problem into two. KEYID actually has two (separable) = uses:
=0A=
 
=0A=
 
=0A=
1) Client to server as a hash = index to the cert
=0A=
2) (Possibly implicit) Server = to client as an authenticator of the actual cert
=0A=
 
=0A=
The situation I see here is = this: The client has obtained a cert, it needs to know the status = thereof. So it takes a digest of the certificate using SHA1 and sends it = to the server which then uses it as a lookup key.
=0A=
 
=0A=
For this particular part of = the problem, there does not appear to be any security concern. We are = using SHA1 because it is a large hash function that has a minimal chance = of accidental collision. But at this point we have not actually relied = on the hash function for authentication purposes at either end. It is = not being used as a cryptographic message digest.
=0A=
 
=0A=
So this seems to fit into a = class that EKR once mentioned of cases where we use SHA1 or MD5 as a = hash, not a message digest.
=0A=
 
=0A=
 
=0A=
The second half of the = equation is where we can end up in (some) difficulty. Particularly if we = are working in an archival situation. Imagine the case that we have an = RSA1024-SHA1 signature on a document signed using a key that was = subsequently compromised and the question the infrastructure needs to = answer is whether the certificate was valid at the point it was signed. = This was one of the original core use cases in the design of = OCSP.
=0A=
 
=0A=
In this case there is little = choice but to use the SHA1 hash as a message digest and then we have the = problem.
=0A=
 
=0A=
 
=0A=
The simple fix here is to = allow the server to specify its own digest for the actual cert whose = status is being reported. You can think of it as being like = using 96 bits of a digest as a hash and then supplying the full 256 = bits to confirm that the located object was not subject to a = collision.
=0A=
 
=0A=
 
=0A=
The former Area Director, now = the IETF chair has expressed concern as to the long term management of = cryptographic algorithms on many occasions. I think that it would be = very unwise for the rest of us to dismiss the chance that he has a = really, really good and specific reason for this concern.
=0A=
 
=0A=
While the specific reason may = not be imminent, the problem may well hit many years down the line after = infrastructure is widely deployed and embedded. We should avoid creating = additional Y2K type problems.
=0A=
 
=0A=

=0A=
=0A= From: Santosh Chokhani = [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54 = AM
To: Hallam-Baker, Phillip; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
I have no objection to having an = extension, but if in the long term SHA-1 will not be there, it seems = defining a new response type (say basic 2) would be the way to go so = that SHA-1 based key ID can be stripped off.
=0A=
 
=0A=
If SHA-1 is not getting ripped off = in the long term, I do not see value in extension except that it = may make every one happy: those who do not care will not include it = on the Server side and/or will ignore it on the client = side.
=0A=
 
=0A=
It would appear that the extension = should be NC.
=0A=
 
=0A=
Phil,
=0A=
 
=0A=
I would not respond to the = arguments on KISS and security since in this case both are = straightforward.  Also, in this thread, the comments were not meant = for or directed at you.
=0A=
 
=0A=
As you know, I have provided = extensive comments to you when you first posted the OCSP Agility I-D and = my position and reasons are matter of PKIX archives for anyone to = scrutinize.  When you ignore every single cogent point, there is no = sense in me commenting on next iteration.  I do think that the OCSP = Agility I-D is a solution looking for a problem that I do not = see.
=0A=
=0A=
=0A=
=0A= From: Hallam-Baker, Phillip = [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53 AM
To: Santosh Chokhani; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
=0A=
I think we = have no choice but to leave the Key ID CHOICE to be SHA-1 = based.
=0A=
 
=0A=
But that does not preclude = adding an extension that allows the KeyID to be specified using a = stronger algorithm. There are two reasons for this:
=0A=
 
=0A=
1) Optics, even if there is = no security implication, a protocol that uses weak crypto necessitates = an (expensive) security review to prove that there is no problem. And = these must be performed repeatedly by many different parties as relying = on the analysis of others is a good way to cause issues. Been there, = done that.
=0A=
 
=0A=
2) We are designing for long = time spans, ten years or more. While simple compressor collisions may = not be a concern, there is no guarantee that the attacks will stop at = that point. MD4 has been broken repeatedly and they are now at the stage = of jumping up and down on the little pieces. It will probably happen to = MD5 and we should be cautious in case it happens to SHA-1.
=0A=
 
=0A=
 
=0A=
On the claim of 'Keep it = simple STUPID', I find it rather offensive to have my position = characterized as stupid. My designs are not exactly known for being = verbose or overly elaborate. If I propose something it is because there = is a reason. It is very easy to defend the status quo by derriding = proposals as unnecessary, but the fact is that making OCSP too simple = will simply cause the complexity to blow out somewhere else.
=0A=
 
=0A=
There is an architectural = princple of modular design that demands that the core of PKIX as it now = stands (the certificate profile and OCSP) be capable of stand alone use. = We cannot fix issues in OCSP with LTANS or other layered-on protocols as = some have proposed. It does not simplify my OCSP deployment to have to = graft on an entire different protocol in addition or to re-engineer my = document archival protocol to cover defects in OCSP.
=0A=
 
=0A=
 
=0A=
Simply adding new algorithms = to a protocol does nothing to improve security. You only improve = security if you withdraw insecure algorithms from use.
=0A=
 
=0A=
To make the system work you = have to have a means of negotiating between the client and the server. = Otherwise there is no way for an OCSP responder to ensure that it = receives a secure, supported response to querries for certificates = that do not exist yet or are not known to the responder.
=0A=
 
=0A=
In the case of an OCSP = responder being driven by CRLs collected from various sources, there is = no way for the CA to know if a certificate even exists, all it knows is = if the status is definitively revoked.
=0A=
 
=0A=
In the case of many = transactional architectures the OCSP validation is performed = independently of certificate chain validation.
=0A=
 
=0A=
 
=0A=
Experience of small scale PKI = deployment in which any box can be upgraded at will is simply not = representative of large scale real world deployment.
=0A=
 
=0A=
=0A=

=0A=
=0A=
=0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed 4/1/2009 8:39 PM
To: Stefan = Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

=0A=

=0A=

I am saying that "Do you agree that 2560 can be left = alone for Responder
ID's key ID CHOICE being SHA-1 = based?"

> -----Original Message-----
> From: Stefan = Santesson [mailto:stefan@aaa-sec.com]
>= Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani; = IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on = SHA-1
>
> Santosh,
>
> = In-line
>
>
> On 4/1/09 10:31 PM, "Santosh Chokhani" = <SChokhani@cygnacom.com> wrote:
>
> >
> > = Stefan,
> >
> > See responses in-line.
> = >
> >> -----Original Message-----
> >> From: = Stefan Santesson [mailto:stefan@aaa-sec.com]
>= >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >> Santosh,
> >>
> >> If you are talking = about adding other options to calculate the
> >> KeyHash = value in ResponderID then I strongly disagree.
> >>
> = >> If you add unspecified options you change the = properties
> of the field
> >> from deterministic to a = completely unknown value.
> >> It does not matter if RFC2560 = isn't explicit in its description of
> >> the use of the = field. The fact is that OCSP explicitly
> defines this
> = >> value and as such will allow a client to deterministically = compare
> >> this value with the certificate selected to = validate the response
> >> signature.
> >
> = > I hope no one is doing the matching of Responder ID with
> = hash of a key
> > in place of responder signature = verification.  That would
> be real bad.
> = >
>
> Yes it would. That is not at all what I talk about. = But a
> client could use this value to locate a responder = certificate.
>
> >> If you allow
> >> = other ways to calculate the value but do not provide any means = to
> >> signal what method that was used, then this feature = is lost.
> >
> > The most common use will be to use = this field to prioritize the
> > certificates of the responder = to use for sigature
> verification on the
> > = response.
> >
>
> Do you know this for a fact, or = are you guessing?
> If a single implementation verifies that the = certificate used
> to validate the response matches the = ResponderID value, and
> choose to go into an error state because = of mismatch, then we
> have created great problems. So we can't = guess. We have to
> know that no single implementation will fail = because of this.
> And that may be very = hard.
>
>
> >>
> >> In worst case we = will cause current implementation to fail.
> >
> > = That is why I am asking what problems if any will the vendors = have.
> >
>
> Even if no vendor speaks up here, it = will not guarantee that
> this will not create any = problems.
>
> >>
> >> I really don't think = its worth the effort to change this field. We
> >> have a = very large base of implementations that we really
> don't = want
> >> to mess up unless its absolutely = necessary.
> >
> > So, we agree that leaving this = field hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite reading = it many
> times over.
>
> > My only reason to align = with 5280 is that if some one were
> ever want
> > to = strip off SHA-1 altogether from their Responder or client,
> > = permitting other methods does it.
> >
>
> I don't = believe this argument is valid as I don't think it is
> possible = to strip off SHA-1 in any reasonable future. In any
> case. If we = compare the positive side with allowing this
> change and the = negative consequences to make OCSP
> incompatible with itself, my = choice is easy.
>
> /Stefan

>
> = >>
> >> As the only property of this field is to = provide a convenient
> >> identifier, it is far from = absolutely necessary to change it.
> >> Remember that there = is a second choice to to identify responder by
> >> name. = For names we have accepted the possibility of collisions. In
> = >> that comparison, upgrading from SHA-1 is really = redundant.
> >>
> >> /Stefan
> = >>
> >>
> >>
> >>
> = >> On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com> wrote:
> >>
> = >>>
> >>> My resident ASN.1 expert apprised me = of the fact that
> >> adding a choice
> >>> = will break backward compatibility.  Thus, extension is a
> = >> fifth option
> >>> (probably third in the = priority).
> >>>
> >>> Based on what I = know of OCSP implementations, not changing
> >> anything = in
> >>> terms of bits on the wire and aligning the Key = ID with SKID
> >> in 5280 is
> >>> the best = approach.  I do not think it will hurt backward
> >> = compatibility.
> >>>
> >>> OCSP Responder = and OCSP client vendors should speak up if I
> >> am = wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh Chokhani
> = >>>> Sent: Tuesday, March 31, 2009 12:51 PM
> = >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>
> >>>> Max,
> = >>>>
> >>>> I do not see where and what = extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
> = >>>> For key id, we need to enhance or broaden the = options.
> >>>>
> >>>>> = -----Original Message-----
> >>>>> From: = owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> >> Massimiliano Pala
> = >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>>>>
> >>>>> Hi all,
> = >>>>>
> >>>>> as I said during last = meeting - as the use of SHA-1 does
> >>>> not have = any
> >>>>> security implication in the OCSP, = another viable way
> would be to
> >>>>> = define an extension where other digest algorithms can be
> = >>>> added to the
> >>>>> = request/responses.
> >>>>>
> = >>>>> It is a simple addition and does not require any = change in
> >>>> the RFC, it
> = >>>>> can be done as a separate document for those who = what to
> >> use other
> >>>>> digest = algorithms.
> >>>>>
> >>>>> = After all, isn't this an example of why we allow
> >> = extensions to the
> >>>>> messages ?
> = >>>>>
> >>>>> Later,
> = >>>>> Max
> >>>>>
> = >>>>>
> >>>>> Santosh Chokhani = wrote:
> >>>>>> Tom,
> = >>>>>>
> >>>>>> Adding a new = choice and aligning it with 5280 SKID is fine.
> = >>>>>>
> >>>>>> I would not = add anything about matching this field with
> >>>>> = anything since
> >>>>>> RFC 2560 does not say = anything about it.
> >>>>>>
> = >>>>>> If one were to add something, one should = describe how this
> >>>>> field can
> = >>>>>> be used to select from multiple Responder = certificates.
> >>>>>>
> = >>>>>>> -----Original Message-----
> = >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
> >>>>>>> To: Santosh Chokhani
> = >>>>>>> Cc: IETF-pkix
> = >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence = on SHA-1
> >>>>>>>
> = >>>>>>>       &nb= sp; Santosh:
> >>>>>>>
> = >>>>>>>       &nb= sp; The RFC 5280 method just describes "two common
> = >>>> methods for
> >>>>>>> = generating key identifiers from the public key"
> = >>>>>>> and says that other methods are = acceptable.  The comment
> >>>>> to = KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as = permissive.  Of course, it's
> >>>> the = same
> >>>>>>> field as SKID, and I would = support either stating "if the
> >>>>> KeyHash = is
> >>>>>>> not precisely 20 octets long, it = should be matched
> against the
> = >>>>>>> Subject Key Identifier extension of the = signing
> certificate" or
> >>>>>>> = adding another choice like byID [3] OCTET STRING --
> = >>>>> matches the value
> = >>>>>>> of SKID.
> = >>>>>>>
> = >>>>>>>       &nb= sp;         Tom Gindin
> = >>>>>>>
> >>>>>>> P.S. - = The above opinions are mine, and not necessarily
> = >>>>> those of my
> >>>>>>> = employer
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> = "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by:
> = >>>>>>> owner-ietf-pkix@mail.imc.org
> = >>>>>>> 03/26/2009 10:39 PM
> = >>>>>>>
> >>>>>>> = To
> >>>>>>> "IETF-pkix" = <ietf-pkix@imc.org>
> >>>>>>> = cc
> >>>>>>>
> = >>>>>>> Subject
> = >>>>>>> OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> RFC = 2560 dependence on SHA-1 does not appear to be
> = >>>>> difficult to deal
> = >>>>>>> with.
> = >>>>>>>
> >>>>>>> = Section 4.3 lists SHA-1 as mandatory and RSA as
> >>>> = optional.  We can
> >>>>>>> update this = to add SHA-2 series as optional.
> = >>>>>>>
> >>>>>>> The = Responder ID has SHA-1 hardwired.  But, that is no
> = >>>>> different than
> >>>>>>> = key ID extensions in RFC 5280.  Here are some options
> = >> in order of
> >>>>>>> = preference:
> >>>>>>>
> = >>>>>>> 1.  Align the language with subject = key ID language
> in RFC 5280.
> = >>>>>>>
> >>>>>>> = 2.  Keep on using SHA-1.  This field is not security
> = >>>>> relevant.  RFC
> = >>>>>>> 2560 does not even describe how to use this = field.  So,
> >>>>> having SHA-1
> = >>>>>>> and accidental or intentional collisions = will not hurt the
> >>>>> security
> = >>>>>>> of the protocol.
> = >>>>>>>
> >>>>>>> = 3.  If you do not believe in KISS principle, you can
> = >>>>> define another
> >>>>>>> = response type and enhance the key ID ASN.1 syntax so
> that = hash
> >>>>>>> algorithm is = identified.
> >>>>>>>
> = >>>>>>> 4.  Another option is for the = Responder to use the
> same hashing
> = >>>>>>> algorithm as the one in the first certID = entry.
> >>>>>>>
> = >>>>>>>
> >>>>>>> = Santosh Chokhani
> >>>>>>> CygnaCom = Solutions
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>
> = >>>>>>
> >>>>>
> = >>>>>
> >>>>> --
> = >>>>>
> >>>>> Best Regards,
> = >>>>>
> >>>>> Massimiliano = Pala
> >>>>>
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano Pala [OpenCA Project Manager]
> >>>>> = Massimiliano.Pala@dartmouth.edu
> = >>>>>         = ;    
> >>>>> = project.manager@openca.org
> >>>>>
> = >>>>> Dartmouth Computer Science = Dept           &nb= sp;   Home Phone: +1
> >>>>> (603) = 369-9332
> >>>>> PKI/Trust = Laboratory          &nb= sp;           &nbs= p;   Work Phone: +1
> >>>>> (603) = 646-9179
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>>
> = >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> >>>>> = of us who do.
> >>>>>   --
> = >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
> = >>
> >>
> = >
>
>
>

<= /BODY> ------_=_NextPart_001_01C9B39D.E4D38B09-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 08:09:31 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 23BD328C247 for ; Thu, 2 Apr 2009 08:09:31 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.905 X-Spam-Level: X-Spam-Status: No, score=-0.905 tagged_above=-999 required=5 tests=[AWL=-0.053, BAYES_00=-2.599, HELO_EQ_SE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5t+KFVMq7NP7 for ; Thu, 2 Apr 2009 08:09:26 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2BD8028C24A for ; Thu, 2 Apr 2009 08:08:32 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32ElFQ5098389 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 07:47:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32ElF5S098388; Thu, 2 Apr 2009 07:47:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32El2LB098369 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 2 Apr 2009 07:47:13 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 52585 invoked from network); 2 Apr 2009 14:47:06 -0000 Received: from s34.loopia.se (HELO s19.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 2 Apr 2009 14:47:06 -0000 Received: (qmail 17568 invoked from network); 2 Apr 2009 14:47:01 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s19.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 2 Apr 2009 14:47:01 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 16:47:00 +0200 Subject: Re: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 From: Stefan Santesson To: Stefan Santesson , IETF-pkix Message-ID: Thread-Topic: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 Thread-Index: AcmzjAxNtzBfJ61Ws0OScv3P3Q+ASgAFdSIf In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321535621_12455632" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321535621_12455632 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Small correction, I copied the text from the wrong draft, as you may see from the old title. The actual text from draft-ietf-pkix-authorityclearanceconstraints-02 Is almost the same and has the same problem: When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end PKC, the processing described in this section or an equivalent algorithm MUST be included in the certification path validation. The processing is presented as additions to the certification path validation algorithm described in section 6 of [RFC5280]. This is just a nit that could be fixed at any later update. I would suggest the following small change: When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end PKC, the processing described in this section or an equivalent algorithm MUST be performed in addition to the certification path validation algorithm described in section 6 of [RFC5280]. /Stefan On 4/2/09 2:10 PM, "Stefan Santesson" wrote: > I found a problem with draft-turner-caclearanceconstraints-02.txt >=20 > Section 4.1.1. Certification Path Processing states >=20 > When processing Authority Clearance Constraints certificate extension > for the purposes of validating Clearance attribute in the end certific= ate, > PKC, > the processing described in this section or an equivalent algorithm > MUST be included in the certification path validation. >=20 > It is problematic, and unnecessary to require ca clearance constraints > processing to be =B3included=B2 in certification path validation. > None of the clearance constraints information is needed to determine the > validity of the certificate, and as such it does not be processed as an > integrated process. >=20 > It would be perfectly valid for an application who choose to rely on the > clearance information, to process clearance constraints as a post process= , > i.e. after path validation is completed. >=20 > A requirement to integrate caclearance constraints into path validation w= ould > make this a lot harder to implement as it would require modification to c= ore > security components. >=20 > Stefan Santesson > AAA-sec.com >=20 >=20 >=20 >=20 --B_3321535621_12455632 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: Problem with draft-ietf-pkix-authorityclearanceconstraints-02</T= ITLE> </HEAD> <BODY> <FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:11pt= '>Small correction,<BR> <BR> I copied the text from the wrong draft, as you may see from the old title.<= BR> <BR> The actual text from  draft-ietf-pkix-authorityclearanceconstraints-02= Is almost the same and has the same problem:<BR> <BR> </SPAN></FONT><FONT SIZE=3D"2"><FONT FACE=3D"Courier, Courier New"><SPAN STYLE=3D= 'font-size:10pt'>   When processing Authority Clearance Constraint= s certificate extension<BR>    for the purposes of validating Clearance attribute in the= end PKC,<BR>    the processing described in this section or an equivalent= algorithm<BR>    MUST be <B>included</B> in the certification path validat= ion.  The<BR>    processing is presented as additions to the certification= path<BR>    validation algorithm described in <FONT COLOR=3D"#0F00EF"><= U>section 6 of [RFC5280]</U></FONT>.<BR> <BR> <BR> <BR> This is just a nit that could be fixed at any later update. I would suggest= the following small change:<BR> <BR> <BR>    When processing Authority Clearance Constraints certifica= te extension<BR>    for the purposes of validating Clearance attribute in the= end PKC,<BR>    the processing described in this section or an equivalent= algorithm<BR>    MUST be <B>performed in addition</B> to the certification= path<BR>    validation algorithm described in <FONT COLOR=3D"#0F00EF"><= U>section 6 of [RFC5280]</U></FONT>.<BR> <BR> <BR> <BR> /Stefan<BR> </SPAN></FONT></FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN = STYLE=3D'font-size:11pt'><BR> <BR> <BR> On 4/2/09 2:10 PM, "Stefan Santesson" <<a href=3D"stefan@aaa-sec= .com">stefan@aaa-sec.com</a>> wrote:<BR> <BR> </SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><= SPAN STYLE=3D'font-size:11pt'>I found a problem with draft-turner-caclearancec= onstraints-02.txt<BR> <BR> Section </SPAN></FONT><FONT SIZE=3D"2"><FONT FACE=3D"Courier, Courier New"><SPA= N STYLE=3D'font-size:10pt'>4.1.1. Certification Path Processing</SPAN></FONT><= /FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size= :11pt'>  states<BR> <BR> </SPAN></FONT><FONT SIZE=3D"2"><FONT FACE=3D"Courier, Courier New"><SPAN STYLE=3D= 'font-size:10pt'>   When processing Authority Clearance Constraint= s certificate extension<BR>    for the purposes of validating Clearance <FONT COLOR=3D"#14= 8000"><B>attribute</B></FONT> in the end <FONT COLOR=3D"#F91B09">certificate,<= /FONT> <FONT COLOR=3D"#148000"><B>PKC,<BR> </B></FONT>   the processing described in this section or an equi= valent algorithm<BR>    MUST be included in the certification path validation.<BR= > <BR> </SPAN></FONT></FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN = STYLE=3D'font-size:11pt'>It is problematic, and unnecessary to require ca clea= rance constraints processing to be “included” in certification p= ath validation.<BR> None of the clearance constraints information is needed to determine the va= lidity of the certificate, and as such it does not be processed as an integr= ated process.<BR> <BR> It would be perfectly valid for an application who choose to rely on the cl= earance information, to process clearance constraints as a post process, i.e= . after path validation is completed.<BR> <BR> A requirement to integrate caclearance constraints into path validation wou= ld make this a lot harder to implement as it would require modification to c= ore security components.<BR> </SPAN></FONT><FONT COLOR=3D"#333333"><FONT SIZE=3D"2"><FONT FACE=3D"Tahoma, Verd= ana, Helvetica, Arial"><SPAN STYLE=3D'font-size:10pt'><BR> </SPAN></FONT></FONT></FONT><FONT SIZE=3D"2"><SPAN STYLE=3D'font-size:10pt'><FO= NT COLOR=3D"#008080"><FONT FACE=3D"Cambria"><B>Stefan Santesson<BR> </B></FONT></FONT><FONT FACE=3D"Cambria">AAA-sec.com<BR> <BR> <BR> </FONT></SPAN></FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN = STYLE=3D'font-size:11pt'><BR> <BR> </SPAN></FONT></BLOCKQUOTE> </BODY> </HTML> --B_3321535621_12455632-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 08:13:14 2009 Return-Path: <owner-ietf-pkix@mail.imc.org> X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9046B3A6985 for <ietfarch-pkix-archive@core3.amsl.com>; Thu, 2 Apr 2009 08:13:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.599 X-Spam-Level: X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ywnf4VuXNlus for <ietfarch-pkix-archive@core3.amsl.com>; Thu, 2 Apr 2009 08:13:13 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 394503A689E for <pkix-archive@ietf.org>; Thu, 2 Apr 2009 08:13:12 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32Eoi24098617 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 07:50:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32EoiGN098616; Thu, 2 Apr 2009 07:50:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from sj-iport-1.cisco.com (sj-iport-1.cisco.com [171.71.176.70]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32EoXsO098605 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for <ietf-pkix@imc.org>; Thu, 2 Apr 2009 07:50:43 -0700 (MST) (envelope-from pritikin@cisco.com) X-IronPort-AV: E=Sophos;i="4.39,314,1235952000"; d="scan'208";a="165640440" Received: from sj-dkim-1.cisco.com ([171.71.179.21]) by sj-iport-1.cisco.com with ESMTP; 02 Apr 2009 14:47:18 +0000 Received: from sj-core-4.cisco.com (sj-core-4.cisco.com [171.68.223.138]) by sj-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id n32ElHP8028720 for <ietf-pkix@imc.org>; Thu, 2 Apr 2009 07:47:17 -0700 Received: from [10.0.1.195] (stealth-10-32-244-66.cisco.com [10.32.244.66]) by sj-core-4.cisco.com (8.13.8/8.13.8) with ESMTP id n32ElHlD015556 for <ietf-pkix@imc.org>; Thu, 2 Apr 2009 14:47:17 GMT Message-Id: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> From: max pritikin <pritikin@cisco.com> To: ietf-pkix@imc.org Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Normative reference for 'CA rollover'? Date: Thu, 2 Apr 2009 09:47:14 -0500 X-Mailer: Apple Mail (2.930.3) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=1784; t=1238683638; x=1239547638; c=relaxed/simple; s=sjdkim1004; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=pritikin@cisco.com; z=From:=20max=20pritikin=20<pritikin@cisco.com> |Subject:=20Normative=20reference=20for=20'CA=20rollover'? |Sender:=20; bh=c9kmybihHCjmRWIWPY/VBn/McBf/ieX3eYeWdzksZ44=; b=CAHzhiVcYfidrOo1P1w1s/nDgTqL7alHJTA/XYZz/GtrXB3VFnlw2u98rB f8WVdkh4SnpGdzL4kuFEgLkFeg+P7VK/U910ajws/xXqCn8zDWAYG8IM9dm6 BFB5efUlqE9J1o32ncyJnkOcVk/KHMG37ZH4ZpZkUzV3pTjuHcaos=; Authentication-Results: sj-dkim-1; header.From=pritikin@cisco.com; dkim=pass ( sig from cisco.com/sjdkim1004 verified; ); Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/> List-ID: <ietf-pkix.imc.org> List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe> Hi folks, I'm looking for a normative reference describing how a CA would 'rollover' to a new keypair or 'modified' certificate. RFC5280 includes the following statements about 'rollover', here quoted with minimal context: 4.2.1.10 Name Contraints: "Name constraints are not applied to self-issued certificates (unless the certificate is the final certificate in the path). (This could prevent CAs that use name constraints from employing self-issued certificates to implement key rollover.)" 6.1. Basic Path Validation: "A certificate is self-issued if the same DN appears in the subject and issuer fields (the two DNs are the same if they match according to the rules specified in Section 7.1). In general, the issuer and subject of the certificates that make up a path are different for each certificate. However, a CA may issue a certificate to itself to support key rollover or changes in certificate policies. These self-issued certificates are not counted when evaluating path length or name constraints." 8. Security Considerations: "Loss of a CA's private signing key may also be problematic. The CA would not be able to produce CRLs or perform normal key rollover." But it does not include a recommended description of this rollover process itself. RFC3647 does not mention rollover at all, although it does define 'renewal' and 'rekey'. I can find informative discussions of rollover for various CA's (thanks Google). Can somebody point me in the right direction? Is there a normative reference or should I be able to infer the "correct" behavior from end entity rekey discussions as per the above notes? Thank you, - max From owner-ietf-pkix@mail.imc.org Thu Apr 2 08:22:22 2009 Return-Path: <owner-ietf-pkix@mail.imc.org> X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2181228C231 for <ietfarch-pkix-archive@core3.amsl.com>; Thu, 2 Apr 2009 08:22:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.427 X-Spam-Level: X-Spam-Status: No, score=-1.427 tagged_above=-999 required=5 tests=[AWL=0.041, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SY6mlAbBmcba for <ietfarch-pkix-archive@core3.amsl.com>; Thu, 2 Apr 2009 08:22:16 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A8A7828C227 for <pkix-archive@ietf.org>; Thu, 2 Apr 2009 08:22:15 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32F0mdw099249 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 08:00:48 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32F0ml2099248; Thu, 2 Apr 2009 08:00:48 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32F0lOv099240 for <ietf-pkix@imc.org>; Thu, 2 Apr 2009 08:00:47 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 27361 invoked from network); 2 Apr 2009 14:59:42 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 14:59:41 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3A3.CD82FBBD" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 Date: Thu, 2 Apr 2009 11:00:46 -0400 Message-ID: <FAD1CF17F2A45B43ADE04E140BA83D48A9FEBB@scygexch1.cygnacom.com> In-Reply-To: <C5FA9C84.13AE%stefan@aaa-sec.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 Thread-Index: AcmzjAxNtzBfJ61Ws0OScv3P3Q+ASgAFdSIfAABzz5A= References: <C5FA77E4.1393%stefan@aaa-sec.com> <C5FA9C84.13AE%stefan@aaa-sec.com> From: "Santosh Chokhani" <SChokhani@cygnacom.com> To: "Stefan Santesson" <stefan@aaa-sec.com>, "IETF-pkix" <ietf-pkix@imc.org> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/> List-ID: <ietf-pkix.imc.org> List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe> This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B3A3.CD82FBBD Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable No objection. =20 Steve can direct us to change this now or later since the current text is unlikely to lead some one astray. ________________________________ From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan Santesson Sent: Thursday, April 02, 2009 10:47 AM To: Stefan Santesson; IETF-pkix Subject: Re: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 =09 =09 Small correction, =09 I copied the text from the wrong draft, as you may see from the old title. =09 The actual text from draft-ietf-pkix-authorityclearanceconstraints-02 Is almost the same and has the same problem: =09 When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end PKC, the processing described in this section or an equivalent algorithm MUST be included in the certification path validation. The processing is presented as additions to the certification path validation algorithm described in section 6 of [RFC5280]. =09 =09 =09 This is just a nit that could be fixed at any later update. I would suggest the following small change: =09 =09 When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end PKC, the processing described in this section or an equivalent algorithm MUST be performed in addition to the certification path validation algorithm described in section 6 of [RFC5280]. =09 =09 =09 /Stefan =09 =09 =09 On 4/2/09 2:10 PM, "Stefan Santesson" <stefan@aaa-sec.com> wrote: =09 =09 I found a problem with draft-turner-caclearanceconstraints-02.txt =09 Section 4.1.1. Certification Path Processing states =09 When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end certificate, PKC, the processing described in this section or an equivalent algorithm MUST be included in the certification path validation. =09 It is problematic, and unnecessary to require ca clearance constraints processing to be "included" in certification path validation. None of the clearance constraints information is needed to determine the validity of the certificate, and as such it does not be processed as an integrated process. =09 It would be perfectly valid for an application who choose to rely on the clearance information, to process clearance constraints as a post process, i.e. after path validation is completed. =09 A requirement to integrate caclearance constraints into path validation would make this a lot harder to implement as it would require modification to core security components. =09 Stefan Santesson AAA-sec.com =09 =09 =09 =09 =09 ------_=_NextPart_001_01C9B3A3.CD82FBBD Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD><TITLE>Re: Problem with = draft-ietf-pkix-authorityclearanceconstraints-02
No objection.
 
Steve can direct us to change this now or later = since the=20 current text is unlikely to lead some one = astray.


From: owner-ietf-pkix@mail.imc.org = [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan=20 Santesson
Sent: Thursday, April 02, 2009 10:47 = AM
To:=20 Stefan Santesson; IETF-pkix
Subject: Re: Problem with=20 draft-ietf-pkix-authorityclearanceconstraints-02

Small correction,

I copied the text = from the=20 wrong draft, as you may see from the old title.

The actual text = from=20  draft-ietf-pkix-authorityclearanceconstraints-02 Is almost the = same and=20 has the same problem:

  When=20 processing Authority Clearance Constraints certificate=20 extension
   for the purposes of validating = Clearance=20 attribute in the end PKC,
   the processing = described in=20 this section or an equivalent algorithm
   MUST be=20 included in the certification path validation.=20  The
   processing is presented as additions to = the=20 certification path
   validation algorithm described = in=20 section 6 of = [RFC5280].



This=20 is just a nit that could be fixed at any later update. I would suggest = the=20 following small change:


   When processing = Authority=20 Clearance Constraints certificate extension
   for = the=20 purposes of validating Clearance attribute in the end=20 PKC,
   the processing described in this section or = an=20 equivalent algorithm
   MUST be performed in = addition=20 to the certification path
   validation algorithm = described=20 in section 6 of=20 = [RFC5280].



/Stefan



On 4/2/09 2:10 PM, "Stefan = Santesson"=20 <stefan@aaa-sec.com>=20 wrote:

I found a problem with=20 draft-turner-caclearanceconstraints-02.txt

Section=20
4.1.1. Certification Path=20 Processing=20  states

  When=20 processing Authority Clearance Constraints certificate=20 extension
   for the purposes of validating = Clearance=20 attribute in the end certificate,
PKC,
  the processing = described in=20 this section or an equivalent algorithm
   MUST be = included in the certification path=20 validation.

It=20 is problematic, and unnecessary to require ca clearance constraints=20 processing to be “included” in certification path = validation.
None of the=20 clearance constraints information is needed to determine the = validity of the=20 certificate, and as such it does not be processed as an integrated=20 process.

It would be perfectly valid for an application who = choose to=20 rely on the clearance information, to process clearance constraints = as a=20 post process, i.e. after path validation is completed.

A = requirement=20 to integrate caclearance constraints into path validation would make = this a=20 lot harder to implement as it would require modification to core = security=20 components.

Stefan=20 Santesson
AAA-sec.com




------_=_NextPart_001_01C9B3A3.CD82FBBD-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 08:29:20 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 030643A68B2 for ; Thu, 2 Apr 2009 08:29:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.387 X-Spam-Level: X-Spam-Status: No, score=-1.387 tagged_above=-999 required=5 tests=[AWL=0.081, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MwJZNCmqWG77 for ; Thu, 2 Apr 2009 08:29:19 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id B3D593A689E for ; Thu, 2 Apr 2009 08:29:18 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32F5t15099570 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 08:05:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32F5t2g099569; Thu, 2 Apr 2009 08:05:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32F5rSq099563 for ; Thu, 2 Apr 2009 08:05:53 -0700 (MST) (envelope-from CWallace@cygnacom.com) Received: (qmail 27436 invoked from network); 2 Apr 2009 15:04:48 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 15:04:48 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3A4.843C68C1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 11:05:52 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABIERYQACTItw References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Carl Wallace" To: "Hallam-Baker, Phillip" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B3A4.843C68C1 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the case that we have an RSA1024-SHA1 signature on a document signed using a key that was subsequently compromised and the question the infrastructure needs to answer is whether the certificate was valid at the point it was signed. This was one of the original core use cases in the design of OCSP. =20 Ignoring hash algorithms for the moment, how does a client indicate its time of interest to the OCSP responder? ------_=_NextPart_001_01C9B3A4.843C68C1 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on SHA-1

The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the = case that we have an RSA1024-SHA1 signature on a document signed using a key that = was subsequently compromised and the question the infrastructure needs to = answer is whether the certificate was valid at the point it was signed. This was = one of the original core use cases in the design of OCSP.

 

Ignoring hash algorithms for the moment, how does a = client indicate its time of interest to the OCSP = responder?

------_=_NextPart_001_01C9B3A4.843C68C1-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 08:29:29 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AC5F13A689E for ; Thu, 2 Apr 2009 08:29:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.43 X-Spam-Level: X-Spam-Status: No, score=-1.43 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vjXnFR2MJwkt for ; Thu, 2 Apr 2009 08:29:27 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D3BD33A68B2 for ; Thu, 2 Apr 2009 08:29:25 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32Ex0jj099109 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 07:59:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32Ex0TD099108; Thu, 2 Apr 2009 07:59:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32EwmBI099098 for ; Thu, 2 Apr 2009 07:58:58 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 27334 invoked from network); 2 Apr 2009 14:57:43 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 14:57:43 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3A3.86E3D176" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 10:58:47 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABIERYQACKGjw References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B3A3.86E3D176 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Phil, =20 RFC 2560 already allows you to specify an algorithm for hash of cogent data in the request. BTW, that data is not certificate, but issuer DN and Issuer key hash separately. =20 So, I do not see an issue with respect to security in RFC 2560 except to add other algorithms to Section 4.3 ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 10:18 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 Let us divide the problem into two. KEYID actually has two (separable) uses: =20 =20 1) Client to server as a hash index to the cert 2) (Possibly implicit) Server to client as an authenticator of the actual cert =20 The situation I see here is this: The client has obtained a cert, it needs to know the status thereof. So it takes a digest of the certificate using SHA1 and sends it to the server which then uses it as a lookup key. =20 For this particular part of the problem, there does not appear to be any security concern. We are using SHA1 because it is a large hash function that has a minimal chance of accidental collision. But at this point we have not actually relied on the hash function for authentication purposes at either end. It is not being used as a cryptographic message digest. =20 So this seems to fit into a class that EKR once mentioned of cases where we use SHA1 or MD5 as a hash, not a message digest. =20 =20 The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the case that we have an RSA1024-SHA1 signature on a document signed using a key that was subsequently compromised and the question the infrastructure needs to answer is whether the certificate was valid at the point it was signed. This was one of the original core use cases in the design of OCSP. =20 In this case there is little choice but to use the SHA1 hash as a message digest and then we have the problem. =20 =20 The simple fix here is to allow the server to specify its own digest for the actual cert whose status is being reported. You can think of it as being like using 96 bits of a digest as a hash and then supplying the full 256 bits to confirm that the located object was not subject to a collision. =20 =20 The former Area Director, now the IETF chair has expressed concern as to the long term management of cryptographic algorithms on many occasions. I think that it would be very unwise for the rest of us to dismiss the chance that he has a really, really good and specific reason for this concern. =20 While the specific reason may not be imminent, the problem may well hit many years down the line after infrastructure is widely deployed and embedded. We should avoid creating additional Y2K type problems. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B3A3.86E3D176 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
Phil,
 
RFC 2560 already allows you to specify an = algorithm for hash=20 of cogent data in the request.  BTW, that data is not certificate, = but=20 issuer DN and Issuer key hash separately.
 
So, I do not see an issue with respect to security = in RFC 2560=20 except to add other algorithms to Section 4.3


From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 10:18=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

Let us = divide the problem=20 into two. KEYID actually has two (separable) uses:
 
 
1) Client to server as a = hash index to=20 the cert
2) (Possibly implicit) = Server to client=20 as an authenticator of the actual cert
 
The situation I see here is = this: The=20 client has obtained a cert, it needs to know the status thereof. So it = takes a=20 digest of the certificate using SHA1 and sends it to the server which = then=20 uses it as a lookup key.
 
For this particular part of = the problem,=20 there does not appear to be any security concern. We are using SHA1 = because it=20 is a large hash function that has a minimal chance of accidental = collision.=20 But at this point we have not actually relied on the hash function for = authentication purposes at either end. It is not being used as a = cryptographic=20 message digest.
 
So this seems to fit into a = class that=20 EKR once mentioned of cases where we use SHA1 or MD5 as a hash, not a = message=20 digest.
 
 
The second half of the = equation is where=20 we can end up in (some) difficulty. Particularly if we are working in = an=20 archival situation. Imagine the case that we have an RSA1024-SHA1 = signature on=20 a document signed using a key that was subsequently compromised and = the=20 question the infrastructure needs to answer is whether the certificate = was=20 valid at the point it was signed. This was one of the original core = use cases=20 in the design of OCSP.
 
In this case there is = little choice but=20 to use the SHA1 hash as a message digest and then we have the=20 problem.
 
 
The simple fix here is to = allow the=20 server to specify its own digest for the actual cert whose status is = being=20 reported. You can think of it as being like using 96 bits of a = digest as=20 a hash and then supplying the full 256 bits to confirm that the = located object=20 was not subject to a collision.
 
 
The former Area Director, = now the IETF=20 chair has expressed concern as to the long term management of = cryptographic=20 algorithms on many occasions. I think that it would be very unwise for = the=20 rest of us to dismiss the chance that he has a really, really good and = specific reason for this concern.
 
While the specific reason = may not be=20 imminent, the problem may well hit many years down the line after=20 infrastructure is widely deployed and embedded. We should avoid = creating=20 additional Y2K type problems.
 


From: Santosh Chokhani=20 [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54=20 AM
To: Hallam-Baker, Phillip; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I have no objection to having an extension, but = if in the=20 long term SHA-1 will not be there, it seems defining a new response = type (say=20 basic 2) would be the way to go so that SHA-1 based key ID can be = stripped=20 off.
 
If SHA-1 is not getting ripped off in the long = term, I=20 do not see value in extension except that it may make every one happy: = those=20 who do not care will not include it on the Server side and/or = will ignore=20 it on the client side.
 
It would appear that the extension should be=20 NC.
 
Phil,
 
I would not respond to the arguments on KISS and = security=20 since in this case both are straightforward.  Also, in this = thread, the=20 comments were not meant for or directed at you.
 
As you know, I have provided extensive comments = to you when=20 you first posted the OCSP Agility I-D and my position and reasons are = matter=20 of PKIX archives for anyone to scrutinize.  When you ignore every = single=20 cogent point, there is no sense in me commenting on next = iteration.  I do=20 think that the OCSP Agility I-D is a solution looking for a problem = that I do=20 not see.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, = 2009 12:53=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I think = we have no choice=20 but to leave the Key ID CHOICE to be SHA-1 based.
 
But that does not = preclude adding an=20 extension that allows the KeyID to be specified using a stronger = algorithm.=20 There are two reasons for this:
 
1) Optics, even if there = is no security=20 implication, a protocol that uses weak crypto necessitates an = (expensive)=20 security review to prove that there is no problem. And these must be = performed repeatedly by many different parties as relying on the = analysis of=20 others is a good way to cause issues. Been there, done = that.
 
2) We are designing for = long time=20 spans, ten years or more. While simple compressor collisions may not = be a=20 concern, there is no guarantee that the attacks will stop at that = point. MD4=20 has been broken repeatedly and they are now at the stage of jumping = up and=20 down on the little pieces. It will probably happen to MD5 and we = should be=20 cautious in case it happens to SHA-1.
 
 
On the claim of 'Keep it = simple=20 STUPID', I find it rather offensive to have my position = characterized as=20 stupid. My designs are not exactly known for being verbose or overly = elaborate. If I propose something it is because there is a reason. = It is=20 very easy to defend the status quo by derriding proposals as = unnecessary,=20 but the fact is that making OCSP too simple will simply cause the = complexity=20 to blow out somewhere else.
 
There is an architectural = princple of=20 modular design that demands that the core of PKIX as it now stands = (the=20 certificate profile and OCSP) be capable of stand alone use. We = cannot fix=20 issues in OCSP with LTANS or other layered-on protocols as some have = proposed. It does not simplify my OCSP deployment to have to graft = on an=20 entire different protocol in addition or to re-engineer my document = archival=20 protocol to cover defects in OCSP.
 
 
Simply adding new = algorithms to a=20 protocol does nothing to improve security. You only improve security = if you=20 withdraw insecure algorithms from use.
 
To make the system work = you have to=20 have a means of negotiating between the client and the server. = Otherwise=20 there is no way for an OCSP responder to ensure that it receives a = secure,=20 supported response to querries for certificates that do not = exist yet=20 or are not known to the responder.
 
In the case of an OCSP = responder being=20 driven by CRLs collected from various sources, there is no way for = the CA to=20 know if a certificate even exists, all it knows is if the status is=20 definitively revoked.
 
In the case of many = transactional=20 architectures the OCSP validation is performed independently of = certificate=20 chain validation.
 
 
Experience of small scale = PKI=20 deployment in which any box can be upgraded at will is simply not=20 representative of large scale real world deployment.
 


From:=20 owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent:=20 Wed 4/1/2009 8:39 PM
To: Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1


I am saying that "Do you agree that 2560 can be = left alone=20 for Responder
ID's key ID CHOICE being SHA-1 based?"

>=20 -----Original Message-----
> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh = Chokhani;=20 IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
>
> Santosh,
>
>=20 In-line
>
>
> On 4/1/09 10:31 PM, "Santosh = Chokhani"=20 <SChokhani@cygnacom.com> wrote:
>
> >
> = >=20 Stefan,
> >
> > See responses in-line.
>=20 >
> >> -----Original Message-----
> >> = From:=20 Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> = To:=20 Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> = Subject: Re:=20 OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >>=20 Santosh,
> >>
> >> If you are talking about = adding=20 other options to calculate the
> >> KeyHash value in = ResponderID=20 then I strongly disagree.
> >>
> >> If you = add=20 unspecified options you change the properties
> of the = field
>=20 >> from deterministic to a completely unknown value.
> = >>=20 It does not matter if RFC2560 isn't explicit in its description = of
>=20 >> the use of the field. The fact is that OCSP = explicitly
>=20 defines this
> >> value and as such will allow a client = to=20 deterministically compare
> >> this value with the = certificate=20 selected to validate the response
> >> = signature.
>=20 >
> > I hope no one is doing the matching of Responder = ID=20 with
> hash of a key
> > in place of responder = signature=20 verification.  That would
> be real bad.
>=20 >
>
> Yes it would. That is not at all what I talk = about. But=20 a
> client could use this value to locate a responder=20 certificate.
>
> >> If you allow
> >> = other=20 ways to calculate the value but do not provide any means to
> = >>=20 signal what method that was used, then this feature is lost.
> = >
> > The most common use will be to use this field to=20 prioritize the
> > certificates of the responder to use for = sigature
> verification on the
> > response.
>=20 >
>
> Do you know this for a fact, or are you=20 guessing?
> If a single implementation verifies that the = certificate=20 used
> to validate the response matches the ResponderID value, = and
> choose to go into an error state because of mismatch, = then=20 we
> have created great problems. So we can't guess. We have=20 to
> know that no single implementation will fail because of=20 this.
> And that may be very hard.
>
>
>=20 >>
> >> In worst case we will cause current = implementation=20 to fail.
> >
> > That is why I am asking what = problems if=20 any will the vendors have.
> >
>
> Even if no = vendor=20 speaks up here, it will not guarantee that
> this will not = create any=20 problems.
>
> >>
> >> I really don't = think its=20 worth the effort to change this field. We
> >> have a = very large=20 base of implementations that we really
> don't want
> = >>=20 to mess up unless its absolutely necessary.
> >
> = > So, we=20 agree that leaving this field hard wired to SHA-1 is ok and
> = >=20 2560 can easily accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite = reading it=20 many
> times over.
>
> > My only reason to = align with=20 5280 is that if some one were
> ever want
> > to = strip off=20 SHA-1 altogether from their Responder or client,
> > = permitting=20 other methods does it.
> >
>
> I don't believe = this=20 argument is valid as I don't think it is
> possible to strip = off SHA-1=20 in any reasonable future. In any
> case. If we compare the = positive=20 side with allowing this
> change and the negative consequences = to make=20 OCSP
> incompatible with itself, my choice is = easy.
>
>=20 /Stefan

>
> >>
> >> As = the only=20 property of this field is to provide a convenient
> >>=20 identifier, it is far from absolutely necessary to change = it.
>=20 >> Remember that there is a second choice to to identify = responder=20 by
> >> name. For names we have accepted the possibility = of=20 collisions. In
> >> that comparison, upgrading from = SHA-1 is=20 really redundant.
> >>
> >> /Stefan
>=20 >>
> >>
> >>
> >>
> = >>=20 On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com>=20 wrote:
> >>
> >>>
> >>> My = resident ASN.1 expert apprised me of the fact that
> >> = adding a=20 choice
> >>> will break backward compatibility.  = Thus,=20 extension is a
> >> fifth option
> >>> = (probably=20 third in the priority).
> >>>
> >>> = Based on=20 what I know of OCSP implementations, not changing
> >> = anything=20 in
> >>> terms of bits on the wire and aligning the = Key ID=20 with SKID
> >> in 5280 is
> >>> the best=20 approach.  I do not think it will hurt backward
> = >>=20 compatibility.
> >>>
> >>> OCSP = Responder and=20 OCSP client vendors should speak up if I
> >> am = wrong.
>=20 >>>
> >>>> -----Original = Message-----
>=20 >>>> From: Santosh Chokhani
> >>>> = Sent:=20 Tuesday, March 31, 2009 12:51 PM
> >>>> To: = 'Massimiliano=20 Pala'; IETF-pkix
> >>>> Subject: RE: OCSP RFC (RFC = 2560)=20 Dependence on SHA-1
> >>>>
> = >>>>=20 Max,
> >>>>
> >>>> I do not see = where=20 and what extension we need to add for
> >> other = digest
>=20 >>>> algorithm.
> >>>>
>=20 >>>> For key id, we need to enhance or broaden the=20 options.
> >>>>
> >>>>> = -----Original=20 Message-----
> >>>>> From:=20 owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20 On Behalf Of
> >> Massimiliano Pala
> = >>>>>=20 Sent: Tuesday, March 31, 2009 1:37 PM
> >>>>> = To:=20 IETF-pkix
> >>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on SHA-1
> >>>>>
>=20 >>>>> Hi all,
> >>>>>
>=20 >>>>> as I said during last meeting - as the use of = SHA-1=20 does
> >>>> not have any
> = >>>>>=20 security implication in the OCSP, another viable way
> would = be=20 to
> >>>>> define an extension where other = digest=20 algorithms can be
> >>>> added to the
>=20 >>>>> request/responses.
> = >>>>>
>=20 >>>>> It is a simple addition and does not require = any change=20 in
> >>>> the RFC, it
> >>>>> = can be=20 done as a separate document for those who what to
> >> = use=20 other
> >>>>> digest algorithms.
>=20 >>>>>
> >>>>> After all, isn't = this an=20 example of why we allow
> >> extensions to the
>=20 >>>>> messages ?
> >>>>>
> = >>>>> Later,
> >>>>> Max
> = >>>>>
> >>>>>
>=20 >>>>> Santosh Chokhani wrote:
>=20 >>>>>> Tom,
> = >>>>>>
>=20 >>>>>> Adding a new choice and aligning it with = 5280 SKID=20 is fine.
> >>>>>>
> = >>>>>> I=20 would not add anything about matching this field with
>=20 >>>>> anything since
> >>>>>> = RFC=20 2560 does not say anything about it.
>=20 >>>>>>
> >>>>>> If one = were to add=20 something, one should describe how this
> >>>>> = field=20 can
> >>>>>> be used to select from multiple = Responder certificates.
> >>>>>>
>=20 >>>>>>> -----Original Message-----
>=20 >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20 >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
>=20 >>>>>>> To: Santosh Chokhani
>=20 >>>>>>> Cc: IETF-pkix
>=20 >>>>>>> Subject: Re: OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 Santosh:
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 The RFC 5280 method just describes "two common
> = >>>>=20 methods for
> >>>>>>> generating key = identifiers=20 from the public key"
> >>>>>>> and says = that=20 other methods are acceptable.  The comment
> = >>>>>=20 to KeyHash
> >>>>>>> in RFC 2560 4.2.1 is = not as=20 permissive.  Of course, it's
> >>>> the = same
>=20 >>>>>>> field as SKID, and I would support = either=20 stating "if the
> >>>>> KeyHash is
>=20 >>>>>>> not precisely 20 octets long, it should = be=20 matched
> against the
> >>>>>>> = Subject Key=20 Identifier extension of the signing
> certificate" or
>=20 >>>>>>> adding another choice like byID [3] = OCTET=20 STRING --
> >>>>> matches the value
>=20 >>>>>>> of SKID.
>=20 >>>>>>>
>=20 = >>>>>>>       &nb= sp;        =20 Tom Gindin
> >>>>>>>
>=20 >>>>>>> P.S. - The above opinions are mine, and = not=20 necessarily
> >>>>> those of my
>=20 >>>>>>> employer
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> "Santosh Chokhani"=20 <SChokhani@cygnacom.com> Sent by:
> = >>>>>>>=20 owner-ietf-pkix@mail.imc.org
> >>>>>>> = 03/26/2009=20 10:39 PM
> >>>>>>>
>=20 >>>>>>> To
> >>>>>>> = "IETF-pkix" <ietf-pkix@imc.org>
> = >>>>>>>=20 cc
> >>>>>>>
> = >>>>>>>=20 Subject
> >>>>>>> OCSP RFC (RFC 2560) = Dependence=20 on SHA-1
> >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> RFC 2560 dependence on SHA-1 does not = appear to=20 be
> >>>>> difficult to deal
>=20 >>>>>>> with.
>=20 >>>>>>>
> >>>>>>> = Section=20 4.3 lists SHA-1 as mandatory and RSA as
> >>>>=20 optional.  We can
> >>>>>>> update = this to=20 add SHA-2 series as optional.
> = >>>>>>>
>=20 >>>>>>> The Responder ID has SHA-1 = hardwired. =20 But, that is no
> >>>>> different than
>=20 >>>>>>> key ID extensions in RFC 5280.  = Here are=20 some options
> >> in order of
>=20 >>>>>>> preference:
>=20 >>>>>>>
> >>>>>>> = 1. =20 Align the language with subject key ID language
> in RFC = 5280.
>=20 >>>>>>>
> >>>>>>> = 2. =20 Keep on using SHA-1.  This field is not security
>=20 >>>>> relevant.  RFC
>=20 >>>>>>> 2560 does not even describe how to use = this=20 field.  So,
> >>>>> having SHA-1
>=20 >>>>>>> and accidental or intentional = collisions will=20 not hurt the
> >>>>> security
>=20 >>>>>>> of the protocol.
>=20 >>>>>>>
> >>>>>>> = 3. =20 If you do not believe in KISS principle, you can
>=20 >>>>> define another
> = >>>>>>>=20 response type and enhance the key ID ASN.1 syntax so
> that=20 hash
> >>>>>>> algorithm is = identified.
>=20 >>>>>>>
> >>>>>>> = 4. =20 Another option is for the Responder to use the
> same = hashing
>=20 >>>>>>> algorithm as the one in the first = certID=20 entry.
> >>>>>>>
>=20 >>>>>>>
> >>>>>>> = Santosh=20 Chokhani
> >>>>>>> CygnaCom = Solutions
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>
> >>>>>>
>=20 >>>>>
> >>>>>
>=20 >>>>> --
> >>>>>
>=20 >>>>> Best Regards,
> = >>>>>
>=20 >>>>> Massimiliano Pala
> = >>>>>
>=20 >>>>>=20 = --o-----------------------------------------------------------
>=20 >>>>> -------------
> >>>>> = Massimiliano=20 Pala [OpenCA Project Manager]
> >>>>>=20 Massimiliano.Pala@dartmouth.edu
>=20 = >>>>>         = ;    
>=20 >>>>> project.manager@openca.org
>=20 >>>>>
> >>>>> Dartmouth Computer = Science=20 = Dept           &nb= sp;  =20 Home Phone: +1
> >>>>> (603) 369-9332
>=20 >>>>> PKI/Trust=20 = Laboratory          &nb= sp;           &nbs= p;  =20 Work Phone: +1
> >>>>> (603) 646-9179
>=20 >>>>>=20 = --o-----------------------------------------------------------
>=20 >>>>> -------------
> = >>>>>
>=20 >>>>> People who think they know everything are a = great=20 annoyance
> >>>> to those
> = >>>>> of=20 us who do.
> >>>>>   --
>=20 >>>>> Isaac Asimov
> = >>>>>
>=20 >>>>
> >>>
> >>
>=20 >>
> >>
>=20 = >
>
>
>

<= /BLOCKQUOTE> ------_=_NextPart_001_01C9B3A3.86E3D176-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 08:59:57 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 763703A6C13 for ; Thu, 2 Apr 2009 08:59:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.111 X-Spam-Level: X-Spam-Status: No, score=-2.111 tagged_above=-999 required=5 tests=[AWL=0.488, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K8mWnTeABByV for ; Thu, 2 Apr 2009 08:59:55 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 274C33A6DE8 for ; Thu, 2 Apr 2009 08:59:54 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32FYO7P001732 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 08:34:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32FYOMA001731; Thu, 2 Apr 2009 08:34:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp117.rog.mail.re2.yahoo.com (smtp117.rog.mail.re2.yahoo.com [68.142.225.233]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32FYDJx001708 for ; Thu, 2 Apr 2009 08:34:24 -0700 (MST) (envelope-from thierry.moreau@connotech.com) Received: (qmail 55146 invoked from network); 2 Apr 2009 15:34:13 -0000 Received: from unknown (HELO connotech.com) (thierry.moreau@209.148.165.15 with plain) by smtp117.rog.mail.re2.yahoo.com with SMTP; 2 Apr 2009 15:34:13 -0000 X-YMail-OSG: d7APHhgVM1mCDJi2Ogrx_VHWCsY.l14nkiq3OnSDlodr8899SeMo7KEqh2irbRHGWA-- X-Yahoo-Newman-Property: ymail-3 Message-ID: <49D4DD78.7000200@connotech.com> Date: Thu, 02 Apr 2009 10:44:56 -0500 From: Thierry Moreau User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:1.4) Gecko/20030624 Netscape/7.1 (ax) X-Accept-Language: en-us, en MIME-Version: 1.0 To: max pritikin CC: ietf-pkix@imc.org Subject: Re: Normative reference for 'CA rollover'? References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> In-Reply-To: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: max pritikin wrote: > > > Hi folks, > > I'm looking for a normative reference describing how a CA would > 'rollover' to a new keypair or 'modified' certificate. > > RFC5280 includes the following statements about 'rollover', here quoted > with minimal context: > > 4.2.1.10 Name Contraints: > "Name constraints are not applied to self-issued certificates (unless > the certificate is the final certificate in the path). (This could > prevent CAs that use name constraints from employing self-issued > certificates to implement key rollover.)" > > 6.1. Basic Path Validation: > "A certificate is self-issued if the same DN appears in the subject > and issuer fields (the two DNs are the same if they match according > to the rules specified in Section 7.1). In general, the issuer and > subject of the certificates that make up a path are different for > each certificate. However, a CA may issue a certificate to itself to > support key rollover or changes in certificate policies. These > self-issued certificates are not counted when evaluating path length > or name constraints." > > 8. Security Considerations: > "Loss of a CA's private signing key may also be problematic. The CA > would not be able to produce CRLs or perform normal key rollover." > > But it does not include a recommended description of this rollover > process itself. > > RFC3647 does not mention rollover at all, although it does define > 'renewal' and 'rekey'. > > I can find informative discussions of rollover for various CA's (thanks > Google). > > Can somebody point me in the right direction? Is there a normative > reference or should I be able to infer the "correct" behavior from end > entity rekey discussions as per the above notes? > This is a BIG issue from early days of e-commerce. VISA International had a patent (now extint due to non-payment of renewal fees) for essentially the RFC5011 solution that was selected by IETF for DNSSEC. You may have a look at http://www.watersprings.org/pub/id/draft-moreau-pkix-takrem-01.txt as the most sensible solution known to mankind (half jocking). Actually, there is no solution to this problem: either a) you admit that any key management scheme for top-level public key rollover has a "catastrophic failure mode" and you may agree with the preceding paragraph after some investigation, or b) you play the head-in-the-sand game, or security by management exhaustion (see last paragraph below) and then you may field an indefinite scheme. Obviously, b) has been emperically verified repeatedly. Security by management exhaustion: you recursively (or iteratively since we are speaking management) discuss the recourse to yet another security layer (crypto-based) as a means to lower the operating costs of having key custodians actually travelling with key material ... until the manager's attention time is elapsed. Then you field whatever technology is available, irrespective of the discussion. > Thank you, You are most welcome, regards, -- - Thierry Moreau From owner-ietf-pkix@mail.imc.org Thu Apr 2 09:43:15 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 097883A696D for ; Thu, 2 Apr 2009 09:43:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.599 X-Spam-Level: X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ntFQC982HzDd for ; Thu, 2 Apr 2009 09:43:14 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 965143A6DF3 for ; Thu, 2 Apr 2009 09:42:59 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32GO5pH004684 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 09:24:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32GO5dN004683; Thu, 2 Apr 2009 09:24:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stl-smtpout-01.boeing.com (stl-smtpout-01.boeing.com [130.76.96.56]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32GNskM004675 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 09:24:05 -0700 (MST) (envelope-from Dennis.P.Glatting@boeing.com) Received: from blv-av-01.boeing.com (blv-av-01.boeing.com [130.247.48.231]) by stl-smtpout-01.ns.cs.boeing.com (8.14.0/8.14.0/8.14.0/SMTPOUT) with ESMTP id n32GNpJg023845 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Thu, 2 Apr 2009 11:23:52 -0500 (CDT) Received: from blv-av-01.boeing.com (localhost [127.0.0.1]) by blv-av-01.boeing.com (8.14.0/8.14.0/DOWNSTREAM_RELAY) with ESMTP id n32GNp3I005739; Thu, 2 Apr 2009 09:23:51 -0700 (PDT) Received: from XCH-NWBH-11.nw.nos.boeing.com (xch-nwbh-11.nw.nos.boeing.com [130.247.55.84]) by blv-av-01.boeing.com (8.14.0/8.14.0/UPSTREAM_RELAY) with ESMTP id n32GNoau005700; Thu, 2 Apr 2009 09:23:50 -0700 (PDT) Received: from XCH-NW-10V2.nw.nos.boeing.com ([130.247.60.54]) by XCH-NWBH-11.nw.nos.boeing.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 2 Apr 2009 09:23:51 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: Renew/Rekey/Modification Date: Thu, 2 Apr 2009 09:23:43 -0700 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSwACiN0dA= References: <49D2D476.3030000@lockstep.com.au> From: "EXT-Glatting, Dennis P" To: "Santosh Chokhani" , , X-OriginalArrivalTime: 02 Apr 2009 16:23:51.0169 (UTC) FILETIME=[68900F10:01C9B3AF] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > > > > Colleagues, > > > > There are a few things about certificate "renewal" and > > "re-key" that have long confounded me. Things only seem to > > have got more convoluted in RFC 3647 and -- no offence! -- in > > newer Certificate Policies like the > > US FPKI Policy Authority document. Can anyone help me > > understand the > > rationale for the some of the following scenarios? Thanks in advance! > > > > > > > > Re-key is said (in the FPKI CP) to be a good idea because the > > older a key gets, the more susceptible it is to loss and > > compromise. Fair enough, but why wouldn't that consideration > > be factored into the chosen certificate validity period? >=20 > It should be. The goal here is to use the current certificate to > authenticate to create new certificates. >=20 I'm a little confused here. If we're getting rid of the key because it's getting old, then how is it young enough to validate a new key? A problem is there is an implicit "continuance of legacy" in the new key of the old key that doesn't end with the immediate generation but follows all generations of the original key. I'm not suggesting something is "wrong" but there seems like there is a logic error somewhere.=20 From owner-ietf-pkix@mail.imc.org Thu Apr 2 09:47:20 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 28B2A3A6CA8 for ; Thu, 2 Apr 2009 09:47:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.438 X-Spam-Level: X-Spam-Status: No, score=-102.438 tagged_above=-999 required=5 tests=[AWL=0.161, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hY-tQ4FERu5H for ; Thu, 2 Apr 2009 09:47:19 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id E91C13A696D for ; Thu, 2 Apr 2009 09:47:18 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32GMdji004624 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 09:22:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32GMdgg004623; Thu, 2 Apr 2009 09:22:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32GMSnQ004613 for ; Thu, 2 Apr 2009 09:22:39 -0700 (MST) (envelope-from housley@vigilsec.com) Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id E377F9A4797; Thu, 2 Apr 2009 12:22:31 -0400 (EDT) X-Virus-Scanned: amavisd-new at smetech.net Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id xfsTLmir1r32; Thu, 2 Apr 2009 12:22:27 -0400 (EDT) Received: from THINKPADR52.vigilsec.com (pool-71-191-197-15.washdc.fios.verizon.net [71.191.197.15]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id 3E53E9A476F; Thu, 2 Apr 2009 12:22:31 -0400 (EDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Thu, 02 Apr 2009 12:22:21 -0400 To: max pritikin , ietf-pkix@imc.org From: Russ Housley Subject: Re: Normative reference for 'CA rollover'? In-Reply-To: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Message-Id: <20090402162231.3E53E9A476F@odin.smetech.net> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Believe it or not, the new-in-old and old-in-new procedure is documented in CMP. Many people fail to find it there. Perhaps it should be extracted from there and published as a BCP. Russ At 10:47 AM 4/2/2009, max pritikin wrote: >Hi folks, > >I'm looking for a normative reference describing how a CA would >'rollover' to a new keypair or 'modified' certificate. > >RFC5280 includes the following statements about 'rollover', here >quoted with minimal context: > > 4.2.1.10 Name Contraints: > "Name constraints are not applied to self-issued certificates >(unless > the certificate is the final certificate in the path). (This could > prevent CAs that use name constraints from employing self-issued > certificates to implement key rollover.)" > > 6.1. Basic Path Validation: > "A certificate is self-issued if the same DN appears in the subject > and issuer fields (the two DNs are the same if they match according > to the rules specified in Section 7.1). In general, the issuer and > subject of the certificates that make up a path are different for > each certificate. However, a CA may issue a certificate to itself >to > support key rollover or changes in certificate policies. These > self-issued certificates are not counted when evaluating path length > or name constraints." > > 8. Security Considerations: > "Loss of a CA's private signing key may also be problematic. The CA > would not be able to produce CRLs or perform normal key rollover." > >But it does not include a recommended description of this rollover >process itself. > >RFC3647 does not mention rollover at all, although it does define >'renewal' and 'rekey'. > >I can find informative discussions of rollover for various CA's >(thanks Google). > >Can somebody point me in the right direction? Is there a normative >reference or should I be able to infer the "correct" behavior from end >entity rekey discussions as per the above notes? > >Thank you, > >- max > From owner-ietf-pkix@mail.imc.org Thu Apr 2 10:49:06 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B5AFB3A68E8 for ; Thu, 2 Apr 2009 10:49:06 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.599 X-Spam-Level: X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 495iVmXdOV+0 for ; Thu, 2 Apr 2009 10:49:06 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7C8703A67DA for ; Thu, 2 Apr 2009 10:49:05 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32HOker009120 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 10:24:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32HOkRO009119; Thu, 2 Apr 2009 10:24:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from sj-iport-3.cisco.com (sj-iport-3.cisco.com [171.71.176.72]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32HOZJu009103 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Thu, 2 Apr 2009 10:24:45 -0700 (MST) (envelope-from pritikin@cisco.com) X-IronPort-AV: E=Sophos;i="4.39,315,1235952000"; d="scan'208";a="149671683" Received: from sj-dkim-4.cisco.com ([171.71.179.196]) by sj-iport-3.cisco.com with ESMTP; 02 Apr 2009 17:24:34 +0000 Received: from sj-core-3.cisco.com (sj-core-3.cisco.com [171.68.223.137]) by sj-dkim-4.cisco.com (8.12.11/8.12.11) with ESMTP id n32HOYUA001539; Thu, 2 Apr 2009 10:24:34 -0700 Received: from [192.168.1.101] (sjc-vpn5-1659.cisco.com [10.21.94.123]) by sj-core-3.cisco.com (8.13.8/8.13.8) with ESMTP id n32HOXf7001816; Thu, 2 Apr 2009 17:24:34 GMT Cc: ietf-pkix@imc.org Message-Id: <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> From: max pritikin To: Russ Housley In-Reply-To: <20090402162231.3E53E9A476F@odin.smetech.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Normative reference for 'CA rollover'? Date: Thu, 2 Apr 2009 12:24:33 -0500 References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> X-Mailer: Apple Mail (2.930.3) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=2418; t=1238693074; x=1239557074; c=relaxed/simple; s=sjdkim4002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=pritikin@cisco.com; z=From:=20max=20pritikin=20 |Subject:=20Re=3A=20Normative=20reference=20for=20'CA=20rol lover'? |Sender:=20; bh=iVnriq0ZJB212pieNLLFFvdly3fxfQrH5CDY+DZa7dw=; b=QAV9Eyx+SmJMNlsO3k1ch1OPPjRw9gHZJlFo/F32zIBHj2j7oWJl51No7H QPMME2T5Ws2jcTHe11Zt+3P2MzDVhpXsdtPAxwwkA96Tj5KkxL/n/PDWXTry svjvXbkCRw; Authentication-Results: sj-dkim-4; header.From=pritikin@cisco.com; dkim=pass ( sig from cisco.com/sjdkim4002 verified; ); Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Thank you Russ. This is what I was looking for. I'll review and ask questions as necessary. I would support the idea of publishing this information independently from a specific enrollment protocol. - max On Apr 2, 2009, at 11:22 AM, Russ Housley wrote: > Believe it or not, the new-in-old and old-in-new procedure is > documented in CMP. Many people fail to find it there. Perhaps it > should be extracted from there and published as a BCP. > > Russ > > At 10:47 AM 4/2/2009, max pritikin wrote: > > >> Hi folks, >> >> I'm looking for a normative reference describing how a CA would >> 'rollover' to a new keypair or 'modified' certificate. >> >> RFC5280 includes the following statements about 'rollover', here >> quoted with minimal context: >> >> 4.2.1.10 Name Contraints: >> "Name constraints are not applied to self-issued certificates >> (unless >> the certificate is the final certificate in the path). (This could >> prevent CAs that use name constraints from employing self-issued >> certificates to implement key rollover.)" >> >> 6.1. Basic Path Validation: >> "A certificate is self-issued if the same DN appears in the subject >> and issuer fields (the two DNs are the same if they match according >> to the rules specified in Section 7.1). In general, the issuer and >> subject of the certificates that make up a path are different for >> each certificate. However, a CA may issue a certificate to itself >> to >> support key rollover or changes in certificate policies. These >> self-issued certificates are not counted when evaluating path >> length >> or name constraints." >> >> 8. Security Considerations: >> "Loss of a CA's private signing key may also be problematic. The >> CA >> would not be able to produce CRLs or perform normal key rollover." >> >> But it does not include a recommended description of this rollover >> process itself. >> >> RFC3647 does not mention rollover at all, although it does define >> 'renewal' and 'rekey'. >> >> I can find informative discussions of rollover for various CA's >> (thanks Google). >> >> Can somebody point me in the right direction? Is there a normative >> reference or should I be able to infer the "correct" behavior from >> end >> entity rekey discussions as per the above notes? >> >> Thank you, >> >> - max >> > From owner-ietf-pkix@mail.imc.org Thu Apr 2 12:08:50 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6EA023A6D27 for ; Thu, 2 Apr 2009 12:08:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.166 X-Spam-Level: X-Spam-Status: No, score=-2.166 tagged_above=-999 required=5 tests=[AWL=0.433, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F55-cxe-Fx4s for ; Thu, 2 Apr 2009 12:08:48 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 9E48F3A6D1C for ; Thu, 2 Apr 2009 12:08:47 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32IjmDC015366 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 11:45:48 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32IjmCN015365; Thu, 2 Apr 2009 11:45:48 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp122.rog.mail.re2.yahoo.com (smtp122.rog.mail.re2.yahoo.com [206.190.53.27]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32IjaEj015340 for ; Thu, 2 Apr 2009 11:45:47 -0700 (MST) (envelope-from thierry.moreau@connotech.com) Received: (qmail 23049 invoked from network); 2 Apr 2009 18:45:36 -0000 Received: from unknown (HELO connotech.com) (thierry.moreau@209.148.165.15 with plain) by smtp122.rog.mail.re2.yahoo.com with SMTP; 2 Apr 2009 18:45:36 -0000 X-YMail-OSG: X7WRd_sVM1kRKWF6bxp8KhGtFudFjBgZQp.1qny5WdgXz2cvp.fZ6URLaTH9zvH_Eg-- X-Yahoo-Newman-Property: ymail-3 Message-ID: <49D50A53.4070307@connotech.com> Date: Thu, 02 Apr 2009 13:56:19 -0500 From: Thierry Moreau User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:1.4) Gecko/20030624 Netscape/7.1 (ax) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Russ Housley CC: max pritikin , ietf-pkix@imc.org Subject: Re: Normative reference for 'CA rollover'? References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> In-Reply-To: <20090402162231.3E53E9A476F@odin.smetech.net> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Russ Housley wrote: > > Believe it or not, the new-in-old and old-in-new procedure is documented > in CMP. Many people fail to find it there. Perhaps it should be > extracted from there and published as a BCP. > Well, that's already a specifications-based "solution," i.e. better than nothing. I should have notice it before. If you follow the "catastrophic failure mode" analysis, you soon realize the equivalence between the failure mode that would trigger an emergency rollover and the very catastrophic failure mode (of the new-in-old and old-in-new procedure). Hence, not very secure. But you know because you are specifications-based. My suspicion is that if you attempt to make it a standalone document, you start another round of discussions on better alternate solutions (because you make security limitations more conspicuous than they are now), falling again in the "security by management exhaustion" vicious circle. But you (the community of which Max is representative by his question) do have a solution. Is there a need for a better slution? I guess not. (I actually think an equivalent procedure should be implemented in DNSSEC validating resolvers instead of comprehensive RFC5011 support, fulfilling the expectations of the vast majority of Internet users with respect to DNSSEC root key trustworthiness.) Regards, > Russ > > At 10:47 AM 4/2/2009, max pritikin wrote: > > >> Hi folks, >> >> I'm looking for a normative reference describing how a CA would >> 'rollover' to a new keypair or 'modified' certificate. >> >> RFC5280 includes the following statements about 'rollover', here >> quoted with minimal context: >> >> 4.2.1.10 Name Contraints: >> "Name constraints are not applied to self-issued certificates >> (unless >> the certificate is the final certificate in the path). (This could >> prevent CAs that use name constraints from employing self-issued >> certificates to implement key rollover.)" >> >> 6.1. Basic Path Validation: >> "A certificate is self-issued if the same DN appears in the subject >> and issuer fields (the two DNs are the same if they match according >> to the rules specified in Section 7.1). In general, the issuer and >> subject of the certificates that make up a path are different for >> each certificate. However, a CA may issue a certificate to itself >> to >> support key rollover or changes in certificate policies. These >> self-issued certificates are not counted when evaluating path length >> or name constraints." >> >> 8. Security Considerations: >> "Loss of a CA's private signing key may also be problematic. The CA >> would not be able to produce CRLs or perform normal key rollover." >> >> But it does not include a recommended description of this rollover >> process itself. >> >> RFC3647 does not mention rollover at all, although it does define >> 'renewal' and 'rekey'. >> >> I can find informative discussions of rollover for various CA's >> (thanks Google). >> >> Can somebody point me in the right direction? Is there a normative >> reference or should I be able to infer the "correct" behavior from end >> entity rekey discussions as per the above notes? >> >> Thank you, >> >> - max >> > > -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, Qc Canada H2M 2A1 Tel.: (514)385-5691 Fax: (514)385-5900 web site: http://www.connotech.com e-mail: thierry.moreau@connotech.com From owner-ietf-pkix@mail.imc.org Thu Apr 2 12:10:39 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8FADA3A63D3 for ; Thu, 2 Apr 2009 12:10:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RuafvfEsyCJm for ; Thu, 2 Apr 2009 12:10:38 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 175463A6C2B for ; Thu, 2 Apr 2009 12:10:37 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32ImE8A015560 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 11:48:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32ImEEi015559; Thu, 2 Apr 2009 11:48:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from relay.imagine.ie (dns1.dns.imagine.ie [87.232.1.40]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32Im1w8015540 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 11:48:13 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from mail2.int.imagine.ie (mail2 [87.232.1.153]) by relay.imagine.ie (Postfix) with ESMTP id 8488A32340; Thu, 2 Apr 2009 19:48:00 +0100 (IST) Received: from [10.87.48.2] (dsl-102-234.cust.imagine.ie [87.232.102.234]) by mail2.int.imagine.ie (8.13.4/8.13.4/Debian-3) with ESMTP id n32Ilvce008911 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 2 Apr 2009 19:47:57 +0100 Message-ID: <49D5089E.8000007@cs.tcd.ie> Date: Thu, 02 Apr 2009 19:49:02 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.21 (X11/20090302) MIME-Version: 1.0 To: max pritikin CC: Russ Housley , ietf-pkix@imc.org Subject: Re: Normative reference for 'CA rollover'? References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> In-Reply-To: <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Bayes-Prob: 0.0001 (Score 0) X-Canit-Stats-ID: 39390268 - 45b1a9638068 (trained as not-spam) X-CanItPRO-Stream: outgoing X-Scanned-By: CanIt (www . roaringpenguin . com) on 87.232.1.53 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Originally that text was something I wrote when all of PKIX was going to be done in a single RFC:-) When we split out the CMP stuff it probably ended up there just because I was a co-author. As for doing a BCP, that'd be a fine idea, though I'm not sure how many CAs actually do use this, so I'd wonder if the CMP text is correct or sufficient compared to what CAs actually do? Stephen. max pritikin wrote: > > > Thank you Russ. This is what I was looking for. I'll review and ask > questions as necessary. > > I would support the idea of publishing this information independently > from a specific enrollment protocol. > > - max > > On Apr 2, 2009, at 11:22 AM, Russ Housley wrote: > >> Believe it or not, the new-in-old and old-in-new procedure is >> documented in CMP. Many people fail to find it there. Perhaps it >> should be extracted from there and published as a BCP. >> >> Russ >> >> At 10:47 AM 4/2/2009, max pritikin wrote: >> >> >>> Hi folks, >>> >>> I'm looking for a normative reference describing how a CA would >>> 'rollover' to a new keypair or 'modified' certificate. >>> >>> RFC5280 includes the following statements about 'rollover', here >>> quoted with minimal context: >>> >>> 4.2.1.10 Name Contraints: >>> "Name constraints are not applied to self-issued certificates >>> (unless >>> the certificate is the final certificate in the path). (This could >>> prevent CAs that use name constraints from employing self-issued >>> certificates to implement key rollover.)" >>> >>> 6.1. Basic Path Validation: >>> "A certificate is self-issued if the same DN appears in the subject >>> and issuer fields (the two DNs are the same if they match according >>> to the rules specified in Section 7.1). In general, the issuer and >>> subject of the certificates that make up a path are different for >>> each certificate. However, a CA may issue a certificate to itself >>> to >>> support key rollover or changes in certificate policies. These >>> self-issued certificates are not counted when evaluating path length >>> or name constraints." >>> >>> 8. Security Considerations: >>> "Loss of a CA's private signing key may also be problematic. The CA >>> would not be able to produce CRLs or perform normal key rollover." >>> >>> But it does not include a recommended description of this rollover >>> process itself. >>> >>> RFC3647 does not mention rollover at all, although it does define >>> 'renewal' and 'rekey'. >>> >>> I can find informative discussions of rollover for various CA's >>> (thanks Google). >>> >>> Can somebody point me in the right direction? Is there a normative >>> reference or should I be able to infer the "correct" behavior from end >>> entity rekey discussions as per the above notes? >>> >>> Thank you, >>> >>> - max >>> >> > > From owner-ietf-pkix@mail.imc.org Thu Apr 2 12:37:07 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CA49228C259 for ; Thu, 2 Apr 2009 12:37:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.432 X-Spam-Level: X-Spam-Status: No, score=-1.432 tagged_above=-999 required=5 tests=[AWL=0.037, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BvHNKFAYuVzf for ; Thu, 2 Apr 2009 12:37:07 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 88D873A6AC9 for ; Thu, 2 Apr 2009 12:37:06 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32JGsMA018657 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 12:16:54 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32JGsSR018656; Thu, 2 Apr 2009 12:16:54 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32JGhjp018637 for ; Thu, 2 Apr 2009 12:16:53 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 29614 invoked from network); 2 Apr 2009 19:15:37 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 19:15:37 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: Normative reference for 'CA rollover'? Date: Thu, 2 Apr 2009 15:16:42 -0400 Message-ID: In-Reply-To: <49D5089E.8000007@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Normative reference for 'CA rollover'? Thread-Index: AcmzxQ6TiTA2624ySai5iVyy1yerogAAVouA References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> <49D5089E.8000007@cs.tcd.ie> From: "Santosh Chokhani" To: "Stephen Farrell" , "max pritikin" Cc: "Russ Housley" , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: In the real world, given nuances of MSFT CAPI (CRL to be signed using the same key as the certificate in question), what many deployments do for both Root and Sub CA is: have a new DN associated with the new key. Thus, technically there is no roll over. The certificate issuance is manual. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org=20 > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Farrell > Sent: Thursday, April 02, 2009 2:49 PM > To: max pritikin > Cc: Russ Housley; ietf-pkix@imc.org > Subject: Re: Normative reference for 'CA rollover'? >=20 >=20 >=20 > Originally that text was something I wrote when all of PKIX=20 > was going to be done in a single RFC:-) When we split out the=20 > CMP stuff it probably ended up there just because I was a co-author. >=20 > As for doing a BCP, that'd be a fine idea, though I'm not=20 > sure how many CAs actually do use this, so I'd wonder if the=20 > CMP text is correct or sufficient compared to what CAs actually do? >=20 > Stephen. >=20 > max pritikin wrote: > >=20 > >=20 > > Thank you Russ. This is what I was looking for. I'll review and ask=20 > > questions as necessary. > >=20 > > I would support the idea of publishing this information=20 > independently=20 > > from a specific enrollment protocol. > >=20 > > - max > >=20 > > On Apr 2, 2009, at 11:22 AM, Russ Housley wrote: > >=20 > >> Believe it or not, the new-in-old and old-in-new procedure is=20 > >> documented in CMP. Many people fail to find it there. Perhaps it=20 > >> should be extracted from there and published as a BCP. > >> > >> Russ > >> > >> At 10:47 AM 4/2/2009, max pritikin wrote: > >> > >> > >>> Hi folks, > >>> > >>> I'm looking for a normative reference describing how a CA would=20 > >>> 'rollover' to a new keypair or 'modified' certificate. > >>> > >>> RFC5280 includes the following statements about 'rollover', here=20 > >>> quoted with minimal context: > >>> > >>> 4.2.1.10 Name Contraints: > >>> "Name constraints are not applied to self-issued certificates=20 > >>> (unless > >>> the certificate is the final certificate in the path). =20 > (This could > >>> prevent CAs that use name constraints from employing self-issued > >>> certificates to implement key rollover.)" > >>> > >>> 6.1. Basic Path Validation: > >>> "A certificate is self-issued if the same DN appears in=20 > the subject > >>> and issuer fields (the two DNs are the same if they=20 > match according > >>> to the rules specified in Section 7.1). In general,=20 > the issuer and > >>> subject of the certificates that make up a path are=20 > different for > >>> each certificate. However, a CA may issue a=20 > certificate to itself=20 > >>> to > >>> support key rollover or changes in certificate policies. These > >>> self-issued certificates are not counted when=20 > evaluating path length > >>> or name constraints." > >>> > >>> 8. Security Considerations: > >>> "Loss of a CA's private signing key may also be=20 > problematic. The CA > >>> would not be able to produce CRLs or perform normal key=20 > rollover." > >>> > >>> But it does not include a recommended description of this=20 > rollover=20 > >>> process itself. > >>> > >>> RFC3647 does not mention rollover at all, although it does define=20 > >>> 'renewal' and 'rekey'. > >>> > >>> I can find informative discussions of rollover for various CA's=20 > >>> (thanks Google). > >>> > >>> Can somebody point me in the right direction? Is there a=20 > normative=20 > >>> reference or should I be able to infer the "correct"=20 > behavior from=20 > >>> end entity rekey discussions as per the above notes? > >>> > >>> Thank you, > >>> > >>> - max > >>> > >> > >=20 > >=20 >=20 >=20 From owner-ietf-pkix@mail.imc.org Thu Apr 2 13:34:52 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1F64E3A6CB3 for ; Thu, 2 Apr 2009 13:34:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.434 X-Spam-Level: X-Spam-Status: No, score=-1.434 tagged_above=-999 required=5 tests=[AWL=0.034, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EQhFSzddKUWE for ; Thu, 2 Apr 2009 13:34:49 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2EFBF3A695F for ; Thu, 2 Apr 2009 13:34:47 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32K21vx021761 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 13:02:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32K21bH021760; Thu, 2 Apr 2009 13:02:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32K1x72021750 for ; Thu, 2 Apr 2009 13:01:59 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 30006 invoked from network); 2 Apr 2009 20:00:53 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 20:00:53 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3CD.E106C77B" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 16:01:54 -0400 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABFiEVAAC4yzwAAcZhjA= References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <2788466ED3E31C418E9ACC5C3166155768B35F@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B3CD.E106C77B Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable The post and attached word document with comments on Phil's draft may not have made it to the list due to the word attachment. =20 So, the URL below can be used to download my commented version of 2007 draft from Phil. =20 http://www.orionsec.net/draft-hallambaker-ocspagility-sc-round%202.doc =20 ________________________________ From: Santosh Chokhani=20 Sent: Thursday, April 02, 2009 11:12 AM To: 'Hallam-Baker, Phillip'; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 Phil, =20 See the attached. =20 In addition, posts circa October 2007 on relevant thread from me will have the comments. =09 ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Thursday, April 02, 2009 9:48 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 On the contrary, each time I asked for a substantive argument you used exactly the same non argument you are using here. =20 I have put a substantive argument on the table here. "I am not convinced" or "I answered the question some other time" with no links to the specific points are not a substantive response. You may think that you gave a substantive explanation of how a client that only supports ECC can obtain a comprehensible response from a generic OCSP server that also supports RSA. However I do not beleive that it is possible in the current protocol. =20 If you think you have demonstrated this in the past then please point to the email. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B3CD.E106C77B Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
The post and attached word document with = comments on=20 Phil's draft may not have made it to the list due to the word=20 attachment.
 
So, the URL below can be used to download my = commented=20 version of 2007 draft from Phil.
 
http://www.orionsec.net/draft-hallambaker-ocspagility-sc-round%= 202.doc
 


From: Santosh Chokhani =
Sent:=20 Thursday, April 02, 2009 11:12 AM
To: 'Hallam-Baker, = Phillip';=20 Stefan Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

Phil,
 
See the attached.
 
In addition, posts circa October 2007 on = relevant thread=20 from me will have the comments.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, = 2009 9:48=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

On the = contrary, each=20 time I asked for a substantive argument you used exactly the same = non=20 argument you are using here.
 
I have put a substantive = argument on=20 the table here. "I am not convinced" or "I answered the question = some other=20 time" with no links to the specific points are not a substantive = response.=20 You may think that you gave a substantive explanation of how a = client that=20 only supports ECC can obtain a comprehensible response from a = generic OCSP=20 server that also supports RSA. However I do not beleive that it is = possible=20 in the current protocol.
 
If you think you have = demonstrated this=20 in the past then please point to the email.
 


From: Santosh Chokhani=20 [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54=20 AM
To: Hallam-Baker, Phillip; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I have no objection to having an extension, = but if in the=20 long term SHA-1 will not be there, it seems defining a new response = type=20 (say basic 2) would be the way to go so that SHA-1 based key ID can = be=20 stripped off.
 
If SHA-1 is not getting ripped off in the long = term, I do not see value in extension except that it may make = every one=20 happy: those who do not care will not include it on the Server = side=20 and/or will ignore it on the client side.
 
It would appear that the extension should be=20 NC.
 
Phil,
 
I would not respond to the arguments on KISS = and security=20 since in this case both are straightforward.  Also, in this = thread, the=20 comments were not meant for or directed at you.
 
As you know, I have provided extensive = comments to you=20 when you first posted the OCSP Agility I-D and my position and = reasons are=20 matter of PKIX archives for anyone to scrutinize.  When you = ignore=20 every single cogent point, there is no sense in me commenting on = next=20 iteration.  I do think that the OCSP Agility I-D is a solution = looking=20 for a problem that I do not see.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, = 2009=20 12:53 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

I think = we have no=20 choice but to leave the Key ID CHOICE to be SHA-1 = based.
 
But that does not = preclude adding an=20 extension that allows the KeyID to be specified using a stronger=20 algorithm. There are two reasons for this:
 
1) Optics, even if = there is no=20 security implication, a protocol that uses weak crypto = necessitates an=20 (expensive) security review to prove that there is no problem. And = these=20 must be performed repeatedly by many different parties as relying = on the=20 analysis of others is a good way to cause issues. Been there, done = that.
 
2) We are designing for = long time=20 spans, ten years or more. While simple compressor collisions may = not be a=20 concern, there is no guarantee that the attacks will stop at that = point.=20 MD4 has been broken repeatedly and they are now at the stage of = jumping up=20 and down on the little pieces. It will probably happen to MD5 and = we=20 should be cautious in case it happens to SHA-1.
 
 
On the claim of 'Keep = it simple=20 STUPID', I find it rather offensive to have my position = characterized as=20 stupid. My designs are not exactly known for being verbose or = overly=20 elaborate. If I propose something it is because there is a reason. = It is=20 very easy to defend the status quo by derriding proposals as = unnecessary,=20 but the fact is that making OCSP too simple will simply cause the=20 complexity to blow out somewhere else.
 
There is an = architectural princple of=20 modular design that demands that the core of PKIX as it now stands = (the=20 certificate profile and OCSP) be capable of stand alone use. We = cannot fix=20 issues in OCSP with LTANS or other layered-on protocols as some = have=20 proposed. It does not simplify my OCSP deployment to have to graft = on an=20 entire different protocol in addition or to re-engineer my = document=20 archival protocol to cover defects in OCSP.
 
 
Simply adding new = algorithms to a=20 protocol does nothing to improve security. You only improve = security if=20 you withdraw insecure algorithms from use.
 
To make the system work = you have to=20 have a means of negotiating between the client and the server. = Otherwise=20 there is no way for an OCSP responder to ensure that it receives a = secure,=20 supported response to querries for certificates that do not = exist yet=20 or are not known to the responder.
 
In the case of an OCSP = responder=20 being driven by CRLs collected from various sources, there is no = way for=20 the CA to know if a certificate even exists, all it knows is if = the status=20 is definitively revoked.
 
In the case of many = transactional=20 architectures the OCSP validation is performed independently of=20 certificate chain validation.
 
 
Experience of small = scale PKI=20 deployment in which any box can be upgraded at will is simply not=20 representative of large scale real world deployment.
 


From:=20 owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent:=20 Wed 4/1/2009 8:39 PM
To: Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1


I am saying that "Do you agree that 2560 can be = left alone=20 for Responder
ID's key ID CHOICE being SHA-1 = based?"

>=20 -----Original Message-----
> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh = Chokhani;=20 IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
>
> Santosh,
>
>=20 In-line
>
>
> On 4/1/09 10:31 PM, "Santosh = Chokhani"=20 <SChokhani@cygnacom.com> wrote:
>
> >
> = >=20 Stefan,
> >
> > See responses in-line.
>=20 >
> >> -----Original Message-----
> >> = From:=20 Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> = To:=20 Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> = Subject:=20 Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>
>=20 >> Santosh,
> >>
> >> If you are = talking=20 about adding other options to calculate the
> >> = KeyHash value=20 in ResponderID then I strongly disagree.
> >>
> = >>=20 If you add unspecified options you change the properties
> = of the=20 field
> >> from deterministic to a completely unknown=20 value.
> >> It does not matter if RFC2560 isn't = explicit in=20 its description of
> >> the use of the field. The fact = is that=20 OCSP explicitly
> defines this
> >> value and as = such=20 will allow a client to deterministically compare
> >> = this=20 value with the certificate selected to validate the = response
>=20 >> signature.
> >
> > I hope no one is = doing the=20 matching of Responder ID with
> hash of a key
> > = in place=20 of responder signature verification.  That would
> be = real=20 bad.
> >
>
> Yes it would. That is not at all = what I=20 talk about. But a
> client could use this value to locate a=20 responder certificate.
>
> >> If you = allow
>=20 >> other ways to calculate the value but do not provide any = means=20 to
> >> signal what method that was used, then this = feature is=20 lost.
> >
> > The most common use will be to use = this=20 field to prioritize the
> > certificates of the responder = to use=20 for sigature
> verification on the
> > = response.
>=20 >
>
> Do you know this for a fact, or are you=20 guessing?
> If a single implementation verifies that the = certificate=20 used
> to validate the response matches the ResponderID = value,=20 and
> choose to go into an error state because of mismatch, = then=20 we
> have created great problems. So we can't guess. We have = to
> know that no single implementation will fail because of = this.
> And that may be very hard.
>
>
>=20 >>
> >> In worst case we will cause current=20 implementation to fail.
> >
> > That is why I am = asking=20 what problems if any will the vendors have.
> = >
>
>=20 Even if no vendor speaks up here, it will not guarantee = that
> this=20 will not create any problems.
>
> >>
> = >> I=20 really don't think its worth the effort to change this field. = We
>=20 >> have a very large base of implementations that we = really
>=20 don't want
> >> to mess up unless its absolutely=20 necessary.
> >
> > So, we agree that leaving = this field=20 hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new=20 hash functions.  Right?
> >
>
> I fail = to=20 understand this sentence. Despite reading it many
> times=20 over.
>
> > My only reason to align with 5280 is = that if=20 some one were
> ever want
> > to strip off SHA-1 = altogether=20 from their Responder or client,
> > permitting other = methods does=20 it.
> >
>
> I don't believe this argument is = valid as=20 I don't think it is
> possible to strip off SHA-1 in any = reasonable=20 future. In any
> case. If we compare the positive side with = allowing=20 this
> change and the negative consequences to make = OCSP
>=20 incompatible with itself, my choice is easy.
>
>=20 /Stefan

>
> >>
> >> As = the=20 only property of this field is to provide a convenient
> = >>=20 identifier, it is far from absolutely necessary to change = it.
>=20 >> Remember that there is a second choice to to identify = responder=20 by
> >> name. For names we have accepted the = possibility of=20 collisions. In
> >> that comparison, upgrading from = SHA-1 is=20 really redundant.
> >>
> >> = /Stefan
>=20 >>
> >>
> >>
> = >>
>=20 >> On 4/1/09 4:05 PM, "Santosh Chokhani"
>=20 <SChokhani@cygnacom.com> wrote:
> >>
>=20 >>>
> >>> My resident ASN.1 expert = apprised me of=20 the fact that
> >> adding a choice
> = >>> will=20 break backward compatibility.  Thus, extension is a
> = >>=20 fifth option
> >>> (probably third in the=20 priority).
> >>>
> >>> Based on what = I know=20 of OCSP implementations, not changing
> >> anything = in
>=20 >>> terms of bits on the wire and aligning the Key ID = with=20 SKID
> >> in 5280 is
> >>> the best=20 approach.  I do not think it will hurt backward
> = >>=20 compatibility.
> >>>
> >>> OCSP = Responder=20 and OCSP client vendors should speak up if I
> >> am=20 wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh = Chokhani
>=20 >>>> Sent: Tuesday, March 31, 2009 12:51 PM
>=20 >>>> To: 'Massimiliano Pala'; IETF-pkix
>=20 >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
> >>>>
> >>>> = Max,
>=20 >>>>
> >>>> I do not see where and = what=20 extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
>=20 >>>> For key id, we need to enhance or broaden the=20 options.
> >>>>
> >>>>>=20 -----Original Message-----
> >>>>> From:=20 owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20 On Behalf Of
> >> Massimiliano Pala
>=20 >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> = Subject:=20 Re: OCSP RFC (RFC 2560) Dependence on SHA-1
>=20 >>>>>
> >>>>> Hi all,
>=20 >>>>>
> >>>>> as I said during = last=20 meeting - as the use of SHA-1 does
> >>>> not = have=20 any
> >>>>> security implication in the OCSP, = another=20 viable way
> would be to
> >>>>> define = an=20 extension where other digest algorithms can be
> = >>>>=20 added to the
> >>>>> = request/responses.
>=20 >>>>>
> >>>>> It is a simple = addition=20 and does not require any change in
> >>>> the = RFC,=20 it
> >>>>> can be done as a separate document = for=20 those who what to
> >> use other
> = >>>>>=20 digest algorithms.
> >>>>>
>=20 >>>>> After all, isn't this an example of why we=20 allow
> >> extensions to the
> = >>>>>=20 messages ?
> >>>>>
> = >>>>>=20 Later,
> >>>>> Max
>=20 >>>>>
> >>>>>
>=20 >>>>> Santosh Chokhani wrote:
>=20 >>>>>> Tom,
> = >>>>>>
>=20 >>>>>> Adding a new choice and aligning it with = 5280=20 SKID is fine.
> >>>>>>
>=20 >>>>>> I would not add anything about matching = this=20 field with
> >>>>> anything since
>=20 >>>>>> RFC 2560 does not say anything about = it.
>=20 >>>>>>
> >>>>>> If one = were to=20 add something, one should describe how this
> = >>>>>=20 field can
> >>>>>> be used to select from = multiple=20 Responder certificates.
> >>>>>>
>=20 >>>>>>> -----Original Message-----
>=20 >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20 >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
>=20 >>>>>>> To: Santosh Chokhani
>=20 >>>>>>> Cc: IETF-pkix
>=20 >>>>>>> Subject: Re: OCSP RFC (RFC 2560) = Dependence=20 on SHA-1
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 Santosh:
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 The RFC 5280 method just describes "two common
> = >>>>=20 methods for
> >>>>>>> generating key=20 identifiers from the public key"
> = >>>>>>> and=20 says that other methods are acceptable.  The comment
>=20 >>>>> to KeyHash
> = >>>>>>> in=20 RFC 2560 4.2.1 is not as permissive.  Of course, it's
> = >>>> the same
> >>>>>>> = field as=20 SKID, and I would support either stating "if the
>=20 >>>>> KeyHash is
> = >>>>>>> not=20 precisely 20 octets long, it should be matched
> against = the
>=20 >>>>>>> Subject Key Identifier extension of = the=20 signing
> certificate" or
> = >>>>>>>=20 adding another choice like byID [3] OCTET STRING --
>=20 >>>>> matches the value
>=20 >>>>>>> of SKID.
>=20 >>>>>>>
>=20 = >>>>>>>       &nb= sp;        =20 Tom Gindin
> >>>>>>>
>=20 >>>>>>> P.S. - The above opinions are mine, = and not=20 necessarily
> >>>>> those of my
>=20 >>>>>>> employer
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> "Santosh Chokhani"=20 <SChokhani@cygnacom.com> Sent by:
>=20 >>>>>>> owner-ietf-pkix@mail.imc.org
>=20 >>>>>>> 03/26/2009 10:39 PM
>=20 >>>>>>>
> >>>>>>>=20 To
> >>>>>>> "IETF-pkix"=20 <ietf-pkix@imc.org>
> >>>>>>> = cc
>=20 >>>>>>>
> >>>>>>>=20 Subject
> >>>>>>> OCSP RFC (RFC 2560)=20 Dependence on SHA-1
> >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> RFC 2560 dependence on SHA-1 does not = appear=20 to be
> >>>>> difficult to deal
>=20 >>>>>>> with.
>=20 >>>>>>>
> >>>>>>> = Section=20 4.3 lists SHA-1 as mandatory and RSA as
> >>>>=20 optional.  We can
> >>>>>>> update = this to=20 add SHA-2 series as optional.
> = >>>>>>>
>=20 >>>>>>> The Responder ID has SHA-1 = hardwired. =20 But, that is no
> >>>>> different = than
>=20 >>>>>>> key ID extensions in RFC 5280.  = Here are=20 some options
> >> in order of
>=20 >>>>>>> preference:
>=20 >>>>>>>
> >>>>>>> = 1. =20 Align the language with subject key ID language
> in RFC=20 5280.
> >>>>>>>
>=20 >>>>>>> 2.  Keep on using SHA-1.  = This=20 field is not security
> >>>>> relevant.  = RFC
> >>>>>>> 2560 does not even = describe how=20 to use this field.  So,
> >>>>> having=20 SHA-1
> >>>>>>> and accidental or = intentional=20 collisions will not hurt the
> >>>>> = security
>=20 >>>>>>> of the protocol.
>=20 >>>>>>>
> >>>>>>> = 3. =20 If you do not believe in KISS principle, you can
>=20 >>>>> define another
> = >>>>>>>=20 response type and enhance the key ID ASN.1 syntax so
> that=20 hash
> >>>>>>> algorithm is = identified.
>=20 >>>>>>>
> >>>>>>> = 4. =20 Another option is for the Responder to use the
> same=20 hashing
> >>>>>>> algorithm as the one = in the=20 first certID entry.
> >>>>>>>
>=20 >>>>>>>
> >>>>>>> = Santosh=20 Chokhani
> >>>>>>> CygnaCom = Solutions
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>
> >>>>>>
>=20 >>>>>
> >>>>>
>=20 >>>>> --
> >>>>>
>=20 >>>>> Best Regards,
> = >>>>>
>=20 >>>>> Massimiliano Pala
>=20 >>>>>
> >>>>>=20 = --o-----------------------------------------------------------
>=20 >>>>> -------------
> >>>>>=20 Massimiliano Pala [OpenCA Project Manager]
> = >>>>>=20 Massimiliano.Pala@dartmouth.edu
>=20 = >>>>>         = ;    
>=20 >>>>> project.manager@openca.org
>=20 >>>>>
> >>>>> Dartmouth = Computer=20 Science=20 = Dept           &nb= sp;  =20 Home Phone: +1
> >>>>> (603) 369-9332
> = >>>>> PKI/Trust=20 = Laboratory          &nb= sp;           &nbs= p;  =20 Work Phone: +1
> >>>>> (603) 646-9179
> = >>>>>=20 = --o-----------------------------------------------------------
>=20 >>>>> -------------
> = >>>>>
>=20 >>>>> People who think they know everything are a = great=20 annoyance
> >>>> to those
> = >>>>>=20 of us who do.
> >>>>>   --
>=20 >>>>> Isaac Asimov
> = >>>>>
>=20 >>>>
> >>>
> >>
>=20 >>
> >>
>=20 = >
>
>
>

<= /BLOCKQUOTE> ------_=_NextPart_001_01C9B3CD.E106C77B-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 14:31:35 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AB9933A6803 for ; Thu, 2 Apr 2009 14:31:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.599 X-Spam-Level: X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tt94QMngbO6d for ; Thu, 2 Apr 2009 14:31:35 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 89BFA3A6781 for ; Thu, 2 Apr 2009 14:31:34 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32L5kG0026605 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 14:05:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32L5k9k026604; Thu, 2 Apr 2009 14:05:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32L5ab6026580 for ; Thu, 2 Apr 2009 14:05:46 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: Renew/Rekey/Modification Date: Thu, 2 Apr 2009 17:05:34 -0400 Message-ID: <200904022105.n32L5ZXD014427@stingray.missi.ncsc.mil> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSwACiN0dAACdj+0A== References: <49D2D476.3030000@lockstep.com.au> From: "Kemp, David P." To: X-OriginalArrivalTime: 02 Apr 2009 21:00:25.0140 (UTC) FILETIME=[0B571740:01C9B3D6] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: As Santosh said, if the old key is compromised and used first by an adversary to rekey, then the subscriber will detect the compromise when he tries to rekey and is rejected. If the subscriber rekeys first, then the adversary is out of luck. The subscriber could be allowed to spawn multiple new rekeyed certificates (such as generating an email encryption certificate based on a signature certificate) as long as the validity is not extended from old to new, but should be allowed only one rekey with a new validity period. -----Original Message----- From: EXT-Glatting, Dennis P >>=20 >> It should be. The goal here is to use the current certificate to >> authenticate to create new certificates. >>=20 > > I'm a little confused here. If we're getting rid of the key because it's > getting old, then how is it young enough to validate a new key? A > problem is there is an implicit "continuance of legacy" in the new key > of the old key that doesn't end with the immediate generation but > follows all generations of the original key. >=20 > I'm not suggesting something is "wrong" but there seems like there is a > logic error somewhere.=20 From owner-ietf-pkix@mail.imc.org Thu Apr 2 19:09:23 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4F72828C266 for ; Thu, 2 Apr 2009 19:09:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 3.589 X-Spam-Level: *** X-Spam-Status: No, score=3.589 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, CHARSET_FARAWAY_HEADER=3.2, HTML_FONT_FACE_BAD=0.884, HTML_MESSAGE=0.001, J_BACKHAIR_42=1, MIME_8BIT_HEADER=0.3, MSGID_FROM_MTA_HEADER=0.803] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ira4MLMmpzuJ for ; Thu, 2 Apr 2009 19:09:22 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7BD0C28C1EE for ; Thu, 2 Apr 2009 19:09:21 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n331ftir041912 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 18:41:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n331ft1R041911; Thu, 2 Apr 2009 18:41:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from spam.kisa.or.kr (sniper.kisa.or.kr [211.252.150.22]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n331fdl2041897 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 18:41:51 -0700 (MST) (envelope-from shpark@kisa.or.kr) Message-Id: <200904030141.n331fdl2041897@balder-227.proper.com> Received: (snipe 745 invoked by alias); 3 Apr 2009 10:40:53 +0900 Received: from unknown (HELO ms.kisa.or.kr) (211.252.150.23) by 211.252.150.22 with SMTP; 3 Apr 2009 10:40:53 +0900 Received: (qmail 20693 invoked from network); 3 Apr 2009 01:36:56 -0000 Received: from unknown (HELO LocalHost) (172.16.7.93) by ms.kisa.or.kr with SMTP; 3 Apr 2009 01:36:56 -0000 From: =?ks_c_5601-1987?B?udq788iv?= To: Cc: , "'Stephen Kent'" Subject: Re: WG Last Call on draft-ietf-pkix-tac-03 Date: Fri, 3 Apr 2009 10:41:41 +0900 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_000E_01C9B448.C6868740" X-Mailer: Microsoft Office Outlook, Build 11.0.5510 Thread-Index: Acmz/VaHWyNzFQ9dTo+BOrGe56LV8A== X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_000E_01C9B448.C6868740 Content-Type: text/plain; charset="ks_c_5601-1987" Content-Transfer-Encoding: quoted-printable Dear Stephen, =20 Thank you for the comments. =20 I=A1=AFve included my responses inline below. =20 > A couple of comments: =20 >#1: Top of p7: > "To effect issuance of the TAC, the AI interacts with > the BI, over a secure channel, to jointly create the signature on > the TAC, and sends the signed TAC to the user. >=20 > The AI does this without learning the user's real identity > (either from the user or from the BI)." >=20 >If the AI sends the TAC to the user, then it will know some >form of identity for that user, even if that's only an IP >address. (And with the likes of SAVI, that could well be >enough to establish a real identity.) >=20 >I'd have thought it'd be much better to return the TAC >via the BI and not require any user<->AI direct connections? =20 According to the concept of separation of CA authorities in this = document, BI only identify user=A1=AFs real identity and AI only issue TAC with = the help of BI without disclosing user=A1=AFs real identity. As you suggested if = we allow BI to send TAC to users not from AI, BI can trace user=A1=AFs real identity unilaterally. It means it is against our concept. And AI = can=A1=AFt trace their real identity with IP address alone, collected in the = issuance process because AI does not have any identity information for users. For this reason, it makes sense to require AI to send TAC to users. =20 >#2: Section 5.2 claims that the AI can't unilaterally fool >the BI into revealing the real identity. But the only thing >that stops that seems to be the RP client identity verified >by the BI when the RP establishes a mutual-auth TLS connection >to the BI. =20 >So how can the BI really know that its not the AI making that >connection? =20 We have adopted two-way authentication channel, in order for BI to = identify and ensure communicating party=A1=AFs identity. It means BI can realize the communicating party is eligible for the = request for user=A1=AFs real identity.=20 For this reason, i don=A1=AFt think it is necessary to add the notes to = imply BI must reject AI=A1=AFs request for user=A1=AFs real identity. =20 Stephen. =20 ------------------- SangHwan Park=20 Senior Researcher / CISA / CISSP / ITIL Korea Information Security Agency(KISA) +82-2-405-5428, shpark@kisa.or.kr =20 ------=_NextPart_000_000E_01C9B448.C6868740 Content-Type: text/html; charset="ks_c_5601-1987" Content-Transfer-Encoding: quoted-printable

Dear Stephen,

 

Thank you for the = comments.

 

I=A1=AFve included my responses inline = below.

 

> A couple of = comments:

 

>#1: Top of = p7:

>  "To effect issuance of the = TAC, the AI interacts with

>   the BI, over a secure = channel, to jointly create the signature on

>   the TAC, and sends the signed = TAC to the user.

> 

>   The AI does this without = learning the user's real identity

>   (either from the user or from = the BI)."

> 

>If the AI sends the TAC to the user, then = it will know some

>form of identity for that user, even if = that's only an IP

>address. (And with the likes of SAVI, that = could well be

>enough to establish a real = identity.)

> 

>I'd have thought it'd be much better to = return the TAC

>via the BI and not require any = user<->AI direct connections?

 

According = to the concept of separation of CA authorities in this document, BI only identify = user=A1=AFs real identity and AI only issue TAC with the help of BI without disclosing = user=A1=AFs real identity. As you suggested if we allow BI to send TAC to users not from = AI, BI can trace user=A1=AFs real = identity unilaterally. It means it is against our concept. And AI can=A1=AFt trace their real identity with IP address alone, collected in the issuance = process because AI does not have any identity information for users. For this reason, it = makes sense to require AI to send TAC to users.

 

>#2: Section 5.2 claims that the AI can't = unilaterally fool

>the BI into revealing the real identity. = But the only thing

>that stops that seems to be the RP client = identity verified

>by the BI when the RP establishes a = mutual-auth TLS connection

>to the BI.

 

>So how can the BI really know that its not = the AI making that

>connection?

 

We have = adopted two-way authentication channel, in order for BI to identify and ensure = communicating party=A1=AFs = identity.

It means = BI can realize the communicating party is eligible for the request for user=A1=AFs real identity.

For this = reason, i don=A1=AFt think it is necessary to add the notes to imply BI must reject = AI=A1=AFs request for user=A1=AFs real = identity.

 

Stephen.

 

-------------------

SangHwan Park

Senior Researcher / CISA / CISSP / ITIL

Korea Information Security Agency(KISA)

+82-2-405-5428, shpark@kisa.or.kr

 

------=_NextPart_000_000E_01C9B448.C6868740-- From owner-ietf-pkix@mail.imc.org Thu Apr 2 19:23:14 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E53CE3A68CC for ; Thu, 2 Apr 2009 19:23:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 3.707 X-Spam-Level: *** X-Spam-Status: No, score=3.707 tagged_above=-999 required=5 tests=[AWL=0.118, BAYES_00=-2.599, CHARSET_FARAWAY_HEADER=3.2, HTML_FONT_FACE_BAD=0.884, HTML_MESSAGE=0.001, J_BACKHAIR_42=1, MIME_8BIT_HEADER=0.3, MSGID_FROM_MTA_HEADER=0.803] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y+E9PBVF7C5p for ; Thu, 2 Apr 2009 19:23:13 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2C48C28C0FA for ; Thu, 2 Apr 2009 19:22:57 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3320a33042577 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 19:00:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3320awB042576; Thu, 2 Apr 2009 19:00:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from spam.kisa.or.kr (sniper.kisa.or.kr [211.252.150.22]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3320XPA042570 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 19:00:34 -0700 (MST) (envelope-from shpark@kisa.or.kr) Message-Id: <200904030200.n3320XPA042570@balder-227.proper.com> Received: (snipe 3772 invoked by alias); 3 Apr 2009 10:59:49 +0900 Received: from unknown (HELO ms.kisa.or.kr) (211.252.150.23) by 211.252.150.22 with SMTP; 3 Apr 2009 10:59:49 +0900 Received: (qmail 25201 invoked from network); 3 Apr 2009 01:55:52 -0000 Received: from unknown (HELO LocalHost) (172.16.7.93) by ms.kisa.or.kr with SMTP; 3 Apr 2009 01:55:52 -0000 From: =?ks_c_5601-1987?B?udq788iv?= To: Subject: RE: WG Last Call on draft-ietf-pkix-tac-03 Date: Fri, 3 Apr 2009 11:00:37 +0900 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0019_01C9B44B.6BB7E310" X-Mailer: Microsoft Office Outlook, Build 11.0.5510 Thread-Index: Acmz//u9kIeAUIqTQsaOIo84VDru4A== X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0019_01C9B44B.6BB7E310 Content-Type: text/plain; charset="ks_c_5601-1987" Content-Transfer-Encoding: quoted-printable Dear Stephen, =20 Thank you for the comments. =20 I=A1=AFve included my responses inline below. =20 > A couple of comments: =20 >#1: Top of p7: > "To effect issuance of the TAC, the AI interacts with > the BI, over a secure channel, to jointly create the signature on > the TAC, and sends the signed TAC to the user. >=20 > The AI does this without learning the user's real identity > (either from the user or from the BI)." >=20 >If the AI sends the TAC to the user, then it will know some >form of identity for that user, even if that's only an IP >address. (And with the likes of SAVI, that could well be >enough to establish a real identity.) >=20 >I'd have thought it'd be much better to return the TAC >via the BI and not require any user<->AI direct connections? =20 According to the concept of separation of CA authorities in this = document, BI only identify user=A1=AFs real identity and AI only issue TAC with = the help of BI without disclosing user=A1=AFs real identity. As you suggested if = we allow BI to send TAC to users not from AI, BI can trace user=A1=AFs real identity unilaterally. It means it is against our concept. And AI = can=A1=AFt trace their real identity with IP address alone, collected in the = issuance process because AI does not have any identity information for users. For this reason, it makes sense to require AI to send TAC to users. =20 >#2: Section 5.2 claims that the AI can't unilaterally fool >the BI into revealing the real identity. But the only thing >that stops that seems to be the RP client identity verified >by the BI when the RP establishes a mutual-auth TLS connection >to the BI. =20 >So how can the BI really know that its not the AI making that >connection? =20 We have adopted two-way authentication channel, in order for BI to = identify and ensure communicating party=A1=AFs identity. It means BI can realize the communicating party is eligible for the = request for user=A1=AFs real identity.=20 For this reason, i don=A1=AFt think it is necessary to add the notes to = imply BI must reject AI=A1=AFs request for user=A1=AFs real identity. =20 Stephen. =20 ------------------- SangHwan Park=20 Senior Researcher / CISA / CISSP / ITIL Korea Information Security Agency(KISA) +82-2-405-5428, shpark@kisa.or.kr =20 =20 =20 ------------------- SangHwan Park=20 Senior Researcher / CISA / CISSP / ITIL Korea Information Security Agency(KISA) +82-2-405-5428, shpark@kisa.or.kr =20 ------=_NextPart_000_0019_01C9B44B.6BB7E310 Content-Type: text/html; charset="ks_c_5601-1987" Content-Transfer-Encoding: quoted-printable

Dear = Stephen,

 

Thank = you for the comments.

 

I=A1=AFve included my responses inline below.

 

> A = couple of comments:

 

>#1: = Top of p7:

>  "To = effect issuance of the TAC, the AI interacts with

>   the = BI, over a secure channel, to jointly create the signature = on

>   the = TAC, and sends the signed TAC to the user.

> =

>   The = AI does this without learning the user's real = identity

>   = (either from the user or from the BI)."

> =

>If = the AI sends the TAC to the user, then it will know some

>form of identity = for that user, even if that's only an IP

>address. (And = with the likes of SAVI, that could well be

>enough to = establish a real identity.)

> =

>I'd = have thought it'd be much better to return the TAC

>via = the BI and not require any user<->AI direct = connections?

 

According to the concept of separation of CA authorities in this document, BI only identify user=A1=AFs real = identity and AI only issue TAC with the help of BI without disclosing user=A1=AFs real identity. As you suggested if we allow BI to send TAC to users not from AI, BI can = trace user=A1=AFs real = identity unilaterally. It means it is against our concept. And AI can=A1=AFt trace their real identity with IP address alone, collected in the issuance = process because AI does not have any identity information for users. For this = reason, it makes sense to require AI to send TAC to users.

 

>#2: = Section 5.2 claims that the AI can't unilaterally fool

>the = BI into revealing the real identity. But the only thing

>that stops that = seems to be the RP client identity verified

>by = the BI when the RP establishes a mutual-auth TLS connection

>to = the BI.

 

>So = how can the BI really know that its not the AI making that

>connection?<= /o:p>

 

We have adopted two-way authentication channel, in order for BI to identify = and ensure communicating party=A1=AFs identity.

It means BI can realize the communicating party is eligible for the request = for user=A1=AFs real = identity.

For this reason, i don=A1=AFt think it is = necessary to add the notes to imply BI must reject AI=A1=AFs request for user=A1=AFs real = identity.

 

Stephen.

 

-------------------

SangHwan Park

Senior Researcher / CISA / CISSP = / ITIL

Korea Information Security = Agency(KISA)

+82-2-405-5428, shpark@kisa.or.kr

 

 

 

-------------------

SangHwan Park

Senior Researcher / CISA / CISSP / ITIL

Korea Information Security Agency(KISA)

+82-2-405-5428, shpark@kisa.or.kr

 

------=_NextPart_000_0019_01C9B44B.6BB7E310-- From owner-ietf-pkix@mail.imc.org Fri Apr 3 06:27:36 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CD9893A6DD3 for ; Fri, 3 Apr 2009 06:27:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.392 X-Spam-Level: X-Spam-Status: No, score=-1.392 tagged_above=-999 required=5 tests=[AWL=0.076, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YX8IfeRctnyI for ; Fri, 3 Apr 2009 06:27:36 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 9DEE03A6D96 for ; Fri, 3 Apr 2009 06:27:35 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33Ct0MO083600 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 05:55:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33Ct0sx083599; Fri, 3 Apr 2009 05:55:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n33CsnPO083582 for ; Fri, 3 Apr 2009 05:54:59 -0700 (MST) (envelope-from CWallace@cygnacom.com) Received: (qmail 7004 invoked from network); 3 Apr 2009 12:53:42 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 3 Apr 2009 12:53:42 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B45B.5EE05B7D" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: using TA constraints Date: Fri, 3 Apr 2009 08:54:47 -0400 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: using TA constraints Thread-Index: Acm0W1589UgdzM3iRxyRIAWqfL7mGQ== From: "Carl Wallace" To: "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B45B.5EE05B7D Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable As mentioned during the WG group meeting last week, the individual draft that describes the usage of TA-based constraints during path processing has been submitted and can be retrieved here: http://www.ietf.org/internet-drafts/draft-wallace-using-ta-constraints-0 0.txt.=20 ------_=_NextPart_001_01C9B45B.5EE05B7D Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

As mentioned during the WG group meeting last week, = the individual draft that describes the usage of TA-based constraints during = path processing has been submitted and can be retrieved here: http://www.ietf.org/internet-drafts/draft-wallace-using-ta-= constraints-00.txt.

------_=_NextPart_001_01C9B45B.5EE05B7D-- From owner-ietf-pkix@mail.imc.org Fri Apr 3 07:52:22 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 946103A67BD for ; Fri, 3 Apr 2009 07:52:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.282 X-Spam-Level: X-Spam-Status: No, score=-5.282 tagged_above=-999 required=5 tests=[AWL=-1.025, BAYES_00=-2.599, HTML_FONT_FACE_BAD=0.884, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yqsSvNuIO9Gb for ; Fri, 3 Apr 2009 07:52:21 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 0641A3A63C9 for ; Fri, 3 Apr 2009 07:52:20 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33ES959091918 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 07:28:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33ES9Rp091913; Fri, 3 Apr 2009 07:28:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33ERt8X091869 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 3 Apr 2009 07:28:07 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha2.nist.gov [129.6.16.198]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id n33ERbgn014609; Fri, 3 Apr 2009 10:27:37 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id n33ERR29029220; Fri, 3 Apr 2009 10:27:29 -0400 Message-ID: <49D61CCF.3020001@nist.gov> Date: Fri, 03 Apr 2009 10:27:27 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.19 (X11/20090114) MIME-Version: 1.0 To: =?windows-1252?Q?=3F=3F=3F?= , pkix , Stephen Farrell Subject: Re: WG Last Call on draft-ietf-pkix-tac-03 Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: 8bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I think that Stephen makes a great point.  Stephen's point is that in many cases it is possible to learn someone's true identity even if one is only provided the IP address from which the person was communicating.  So, it would not matter that the TAC protocol does not provide the AI with any identity information.

I also do not agree that the TAC cannot be sent directly from the BI to the user.  The protocol could be reworked to address Stephen's concern.  The basic idea for the protocol would be as follows:

step 1: The user creates a certificate request message and encrypts it with a session key, which is in turn encrypted using the AI's public key.

step 2: The user authenticates to the BI and provides the BI with the encrypted certificate request message.

step 3: The BI creates a Token for the user and sends the Token and the encrypted certificate request message to the AI over a channel that is protected using two-way authenticated TLS.

step 4: The AI decrypts the certificate request message and creates the TBSCertificate.

(If it is considered necessary): steps 5 and 6:  The AI and the BI jointly sign the TBSCertificate using the blinded, split signature scheme.

step 7: The AI encrypts the signed certificate (TAC) using the session key that was created by the user in step 1 and sends the encrypted TAC and the Token to the BI.

step 8: The BI sends the encrypted TAC to the user.

[Note that to maximize privacy, the encrypted certificate request message and the encrypted TAC could both be padded to a fixed length to ensure that the BI could not learn anything from the lengths of these messages.]

I wrote out this protocol fairly quickly, so I may not have gotten all of the details correct, but I think the basic idea is correct.  It seems to retain all of the properties of the current protocol while also helping to address the flaw that Stephen identified.

Dave

SangHwan Park wrote:

Dear Stephen,

 

Thank you for the comments.

 

Ive included my responses inline below.

 

> A couple of comments:

 

>#1: Top of p7:

>  "To effect issuance of the TAC, the AI interacts with

>   the BI, over a secure channel, to jointly create the signature on

>   the TAC, and sends the signed TAC to the user.

> 

>   The AI does this without learning the user's real identity

>   (either from the user or from the BI)."

> 

>If the AI sends the TAC to the user, then it will know some

>form of identity for that user, even if that's only an IP

>address. (And with the likes of SAVI, that could well be

>enough to establish a real identity.)

> 

>I'd have thought it'd be much better to return the TAC

>via the BI and not require any user<->AI direct connections?

 

According to the concept of separation of CA authorities in this document, BI only identify users real identity and AI only issue TAC with the help of BI without disclosing users real identity. As you suggested if we allow BI to send TAC to users not from AI, BI can trace users real identity unilaterally. It means it is against our concept. And AI cant trace their real identity with IP address alone, collected in the issuance process because AI does not have any identity information for users. For this reason, it makes sense to require AI to send TAC to users.

 


From owner-ietf-pkix@mail.imc.org Fri Apr 3 08:23:52 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 967AA28C284 for ; Fri, 3 Apr 2009 08:23:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 2.431 X-Spam-Level: ** X-Spam-Status: No, score=2.431 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HELO_EQ_DK=1.009, HTML_MESSAGE=0.001, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z86LdTenAM0g for ; Fri, 3 Apr 2009 08:23:47 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 4DFAF28C15E for ; Fri, 3 Apr 2009 08:23:46 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33F0Kk0094076 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 08:00:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33F0KdA094075; Fri, 3 Apr 2009 08:00:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail02.dandomain.dk (mail02.dandomain.dk [194.150.112.202]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33F07ck094052 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 3 Apr 2009 08:00:18 -0700 (MST) (envelope-from era@x500.eu) Received: from ERA1 ([212.27.29.184]) by mail02.dandomain.dk (DanDomain Mailserver) with ASMTP id KTD78801; Fri, 03 Apr 2009 17:00:01 +0200 From: "Erik Andersen" To: , "'PKIX'" Subject: RE: [x500standard] Certificate definitions Date: Fri, 3 Apr 2009 17:00:01 +0200 Message-ID: <3C35976D27EB42F590A0B142D903E7C7@ERA1> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0022_01C9B47D.A32BACF0" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6838 In-Reply-To: <1C740690094340D3B49DADD21AD98606@ERA1> X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Thread-Index: AcmyxvW/KkzbCBxjQ/eyg7S7tJNM1wBpdYcg Importance: Normal Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0022_01C9B47D.A32BACF0 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0023_01C9B47D.A32BACF0" ------=_NextPart_001_0023_01C9B47D.A32BACF0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first time in = clause 7 as a public-key certificate. There are several other places where it = is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term = at all. It seems just to use the term "certificate" as a synonym for "end-entrity public key certificate". =20 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is also = used in X.511. RFC 5280 uses the term once without differenting it from just "certificate". =20 The term "cross-certificate" should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 "end-entity public-key certificate" "user certictate" as a synonym for "end-entity public-key certificate" "end-entity attrubute certificate" =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attrubute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------=_NextPart_001_0023_01C9B47D.A32BACF0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I take silence = as approval.

 

Erik Andersen

Andersen's = L-Service

Elsevej 48, DK-3500 = Vaerloese

Denmark

Mobile: +45 2097 = 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen
Sent: 1. april 2009 = 14:40
To: Directory list; = PKIX
Subject: [x500standard] Certificate definitions

 

Hi

 

I got a number = of responses on user certificates, but quite little that actually answered = my question.

 

I have tried = to dig a little bit more in X.509 to get hold of the terminology and then = produced below figure. I will not comment all the boxes.

 

 

I will like = you to comments as to the correctness of above figure.

 

The end-entity certificate is not defined in the definition clause. However it is used = widely in the main text. It is mentioned the first time in clause 7 as a = public-key certificate. There are several other places where it is a public-key certificate. In 15.5.2.4 is used in the context of attribute = certificates. The conclusion must be that an end-entity certificate can either be a = end-entity public-key certificate or an end-entity attribute certificate. However, = in most places, it is implied that we only talks about public-key certificates. = For veterans, this is not a major problem, but new-comers may get confused. = Anyway, I thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.

 

The = “User Certificate”  is not defined in X.509, but is wide used. It = seems to be a synonym for “end-entrity public key certificate”. It is = also used in X.511. RFC 5280 uses the term once without differenting it from = just “certificate”.

 

The term “cross-certificate” should probably also be = qualified.

 

I suggest to = add in X.509 definitions for:

 

“end-entity public-key certificate”

“user certictate” as a synonym for “end-entity public-key certificate”

“end-entity attrubute certificate”

 

The X.509 text = should be updated to make use of these definitions.

 

X.509 has four = attribute types for holding certificates.

 

UserCertificate: For end-entity public-key certificates

cAcertificate: = For CA certificates

attributeCertificateAttribut= e: For end-entity attrubute certificates

aACertificate: = For AA Certificates

 

Any = comments?

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, DK-3500 = Vaerloese

Denmark

Mobile: +45 = 2097 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com<= /font>

 

------=_NextPart_001_0023_01C9B47D.A32BACF0-- ------=_NextPart_000_0022_01C9B47D.A32BACF0 Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_000_0022_01C9B47D.A32BACF0-- From owner-ietf-pkix@mail.imc.org Fri Apr 3 09:08:24 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 88C9E3A67BD for ; Fri, 3 Apr 2009 09:08:24 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 2.905 X-Spam-Level: ** X-Spam-Status: No, score=2.905 tagged_above=-999 required=5 tests=[AWL=-2.317, BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, MIME_BASE64_TEXT=1.753, MY_CID_AND_ARIAL2=1.46, RCVD_BAD_ID=2.837, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FBCCOszoie5G for ; Fri, 3 Apr 2009 09:08:23 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8E9F63A69A8 for ; Fri, 3 Apr 2009 09:08:22 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33FX1OL096954 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 08:33:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33FX1Z3096953; Fri, 3 Apr 2009 08:33:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33FWmwW096896 for ; Fri, 3 Apr 2009 08:33:00 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-001.frcl.bull.fr [129.184.87.31]) by odin2.bull.net (Bull S.A.) with ESMTP id DD8F87891; Fri, 3 Apr 2009 17:31:33 +0200 (CEST) Received: from FRCLS4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2009040317330199:400124 ; Fri, 3 Apr 2009 17:33:01 +0200 Reply-To: denis.pinkas@bull.net From: "Denis Pinkas" To: "x500 list", "ietf-pkix" Subject: RE: [x500standard] Certificate definitions Date: Fri, 3 Apr 2009 17:33:01 +0200 Message-Id: References: <3C35976D27EB42F590A0B142D903E7C7@ERA1> MIME-Version: 1.0 X-Priority: 3 (Normal) X-Mailer: DreamMail 4.4.1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 03/04/2009 17:33:02, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 03/04/2009 17:33:02 Content-Type: multipart/related; boundary="----=_NextPart_09040317330148873280414_001" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------=_NextPart_09040317330148873280414_001 Content-Type: multipart/alternative; boundary="----=_NextPart_09040317330148873280414_002" ------=_NextPart_09040317330148873280414_002 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: base64 RXJpYywNCg0KU2lsZW5jZSBkb2VzIG5vdCBtZWFuIGFwcHJvdmFsLg0KDQpJdCBtYXkgbWVhbiB0 aGF0IHRoZSBjb3JyZWN0aW9ucyBhcmUgc28gbnVtZXJvdXMgdGhhdCBpdCB3b3VsZCB0YWtlIHRv byBsb25nIHRvIHJlc3BvbmQNCmFuZCB0aGF0IHBlb3BsZSBkbyBub3QgaGF2ZSB0aGF0IHRpbWUg YXZhaWxhYmxlIGF0IHRoZSBtb21lbnQuDQoNCmUuZy46ICBhbiBFbmQtZW50aXR5IGF0dHJpYnV0 ZSBjZXJ0aWZpY2F0ZSBpcyBub3QgbGlua2VkIHRvIGEgcHVibGljLWtleSBjZXJ0aWZpY2F0ZS4N CiAgICAgICAgIGEgY3Jvc3MtY2VydGlmaWNhdGUgaXMgbm90IGxpbmtlZCB0byBhbiBBQSBjZXJ0 aWZpY2F0ZS4NCiAgICAgICAgIGFuIEF1dGhvcml0eSBDZXJ0aWZpY2F0ZSBpcyBub3QgbGlua2Vk IHRvIGFuIEF0dHJpYnV0ZSBDZXJ0aWZpY2F0ZS4NCg0KVGhpcyBpcyBvbmx5IGEgc3RhcnQgLi4u DQoNCkRlbmlzDQotLS0tLSBNZXNzYWdlIHJl53UgLS0tLS0gDQpEZSA6IG93bmVyLWlldGYtcGtp eCANCsAgOiB4NTAwc3RhbmRhcmQsJ1BLSVgnIA0KRGF0ZSA6IDIwMDktMDQtMDMsIDE3OjAwOjAx DQpTdWpldCA6IFJFOiBbeDUwMHN0YW5kYXJkXSBDZXJ0aWZpY2F0ZSBkZWZpbml0aW9ucw0KDQoN CkkgdGFrZSBzaWxlbmNlIGFzIGFwcHJvdmFsLg0KDQpFcmlrIEFuZGVyc2VuDQpBbmRlcnNlbidz IEwtU2VydmljZQ0KRWxzZXZlaiA0OCwgREstMzUwMCBWYWVybG9lc2UNCkRlbm1hcmsNCk1vYmls ZTogKzQ1IDIwOTcgMTQ5MA0KZW1haWw6IGVyYUB4NTAwLmV1DQp3d3cueDUwMC5ldQ0Kd3d3Lng1 MDBzdGFuZGFyZC5jb20NCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IHg1MDBz dGFuZGFyZC1ib3VuY2VAZnJlZWxpc3RzLm9yZyBbbWFpbHRvOng1MDBzdGFuZGFyZC1ib3VuY2VA ZnJlZWxpc3RzLm9yZ10gT24gQmVoYWxmIE9mIEVyaWsgQW5kZXJzZW4NClNlbnQ6IDEuIGFwcmls IDIwMDkgMTQ6NDANClRvOiBEaXJlY3RvcnkgbGlzdDsgUEtJWA0KU3ViamVjdDogW3g1MDBzdGFu ZGFyZF0gQ2VydGlmaWNhdGUgZGVmaW5pdGlvbnMNCg0KSGkNCg0KSSBnb3QgYSBudW1iZXIgb2Yg cmVzcG9uc2VzIG9uIHVzZXIgY2VydGlmaWNhdGVzLCBidXQgcXVpdGUgbGl0dGxlIHRoYXQgYWN0 dWFsbHkgYW5zd2VyZWQgbXkgcXVlc3Rpb24uDQoNCkkgaGF2ZSB0cmllZCB0byBkaWcgYSBsaXR0 bGUgYml0IG1vcmUgaW4gWC41MDkgdG8gZ2V0IGhvbGQgb2YgdGhlIHRlcm1pbm9sb2d5IGFuZCB0 aGVuIHByb2R1Y2VkIGJlbG93IGZpZ3VyZS4gSSB3aWxsIG5vdCBjb21tZW50IGFsbCB0aGUgYm94 ZXMuDQoNCg0KDQpJIHdpbGwgbGlrZSB5b3UgdG8gY29tbWVudHMgYXMgdG8gdGhlIGNvcnJlY3Ru ZXNzIG9mIGFib3ZlIGZpZ3VyZS4NCg0KVGhlIGVuZC1lbnRpdHkgY2VydGlmaWNhdGUgaXMgbm90 IGRlZmluZWQgaW4gdGhlIGRlZmluaXRpb24gY2xhdXNlLiBIb3dldmVyIGl0IGlzIHVzZWQgd2lk ZWx5IGluIHRoZSBtYWluIHRleHQuIEl0IGlzIG1lbnRpb25lZCB0aGUgZmlyc3QgdGltZSBpbiBj bGF1c2UgNyBhcyBhIHB1YmxpYy1rZXkgY2VydGlmaWNhdGUuIFRoZXJlIGFyZSBzZXZlcmFsIG90 aGVyIHBsYWNlcyB3aGVyZSBpdCBpcyBhIHB1YmxpYy1rZXkgY2VydGlmaWNhdGUuIEluIDE1LjUu Mi40IGlzIHVzZWQgaW4gdGhlIGNvbnRleHQgb2YgYXR0cmlidXRlIGNlcnRpZmljYXRlcy4gVGhl IGNvbmNsdXNpb24gbXVzdCBiZSB0aGF0IGFuIGVuZC1lbnRpdHkgY2VydGlmaWNhdGUgY2FuIGVp dGhlciBiZSBhIGVuZC1lbnRpdHkgcHVibGljLWtleSBjZXJ0aWZpY2F0ZSBvciBhbiBlbmQtZW50 aXR5IGF0dHJpYnV0ZSBjZXJ0aWZpY2F0ZS4gSG93ZXZlciwgaW4gbW9zdCBwbGFjZXMsIGl0IGlz IGltcGxpZWQgdGhhdCB3ZSBvbmx5IHRhbGtzIGFib3V0IHB1YmxpYy1rZXkgY2VydGlmaWNhdGVz LiBGb3IgdmV0ZXJhbnMsIHRoaXMgaXMgbm90IGEgbWFqb3IgcHJvYmxlbSwgYnV0IG5ldy1jb21l cnMgbWF5IGdldCBjb25mdXNlZC4gQW55d2F5LCBJIHRoaW5nIG91ciBzcGVjaWZpY2F0aW9ucyBz aG91bGQgYmUgY2xlYXIgYW5kIG5vdCBzdWJqZWN0IHRvIGludGVycHJldGF0aW9uLiBSRkMgNTI4 MCBkb2VzIG5vdCB1c2UgdGhlIHRlcm0gYXQgYWxsLiBJdCBzZWVtcyBqdXN0IHRvIHVzZSB0aGUg dGVybSCTY2VydGlmaWNhdGWUIGFzIGEgc3lub255bSBmb3Igk2VuZC1lbnRyaXR5IHB1YmxpYyBr ZXkgY2VydGlmaWNhdGWULg0KDQpUaGUgk1VzZXIgQ2VydGlmaWNhdGWUICBpcyBub3QgZGVmaW5l ZCBpbiBYLjUwOSwgYnV0IGlzIHdpZGUgdXNlZC4gSXQgc2VlbXMgdG8gYmUgYSBzeW5vbnltIGZv ciCTZW5kLWVudHJpdHkgcHVibGljIGtleSBjZXJ0aWZpY2F0ZZQuIEl0IGlzIGFsc28gdXNlZCBp biBYLjUxMS4gUkZDIDUyODAgdXNlcyB0aGUgdGVybSBvbmNlIHdpdGhvdXQgZGlmZmVyZW50aW5n IGl0IGZyb20ganVzdCCTY2VydGlmaWNhdGWULg0KDQpUaGUgdGVybSCTY3Jvc3MtY2VydGlmaWNh dGWUIHNob3VsZCBwcm9iYWJseSBhbHNvIGJlIHF1YWxpZmllZC4NCg0KSSBzdWdnZXN0IHRvIGFk ZCBpbiBYLjUwOSBkZWZpbml0aW9ucyBmb3I6DQoNCpNlbmQtZW50aXR5IHB1YmxpYy1rZXkgY2Vy dGlmaWNhdGWUDQqTdXNlciBjZXJ0aWN0YXRllCBhcyBhIHN5bm9ueW0gZm9yIJNlbmQtZW50aXR5 IHB1YmxpYy1rZXkgY2VydGlmaWNhdGWUDQqTZW5kLWVudGl0eSBhdHRydWJ1dGUgY2VydGlmaWNh dGWUDQoNClRoZSBYLjUwOSB0ZXh0IHNob3VsZCBiZSB1cGRhdGVkIHRvIG1ha2UgdXNlIG9mIHRo ZXNlIGRlZmluaXRpb25zLg0KDQpYLjUwOSBoYXMgZm91ciBhdHRyaWJ1dGUgdHlwZXMgZm9yIGhv bGRpbmcgY2VydGlmaWNhdGVzLg0KDQpVc2VyQ2VydGlmaWNhdGU6IEZvciBlbmQtZW50aXR5IHB1 YmxpYy1rZXkgY2VydGlmaWNhdGVzDQpjQWNlcnRpZmljYXRlOiBGb3IgQ0EgY2VydGlmaWNhdGVz DQphdHRyaWJ1dGVDZXJ0aWZpY2F0ZUF0dHJpYnV0ZTogRm9yIGVuZC1lbnRpdHkgYXR0cnVidXRl IGNlcnRpZmljYXRlcw0KYUFDZXJ0aWZpY2F0ZTogRm9yIEFBIENlcnRpZmljYXRlcw0KDQpBbnkg Y29tbWVudHM/DQoNCkVyaWsgQW5kZXJzZW4NCkFuZGVyc2VuJ3MgTC1TZXJ2aWNlDQpFbHNldmVq IDQ4LCBESy0zNTAwIFZhZXJsb2VzZQ0KRGVubWFyaw0KTW9iaWxlOiArNDUgMjA5NyAxNDkwDQpl bWFpbDogZXJhQHg1MDAuZXUNCnd3dy54NTAwLmV1DQp3d3cueDUwMHN0YW5kYXJkLmNvbQ0K ------=_NextPart_09040317330148873280414_002 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: base64 PEhUTUw+PEhFQUQ+PFRJVExFPjwvVElUTEU+DQo8TUVUQSBjb250ZW50PSJLc0RIVE1MRURMaWIu b2N4LCBGcmVlV2FyZSBIVE1MIEVkaXRvciAxLjE2NC4yLCCpIEt1cnQgU2VuZmVyIiANCm5hbWU9 R0VORVJBVE9SPg0KPFNUWUxFPg0KPCEtLQ0KIC8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCiBAZm9u dC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkhlbHZldGljYTsNCglwYW5vc2UtMToyIDExIDYgNCAyIDIg MiAyIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OlRpbWVzOw0KCXBhbm9zZS0xOjIg MiA2IDMgNSA0IDUgMiAzIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpUYWhvbWE7DQoJ cGFub3NlLTE6MiAxMSA2IDQgMyA1IDQgNCAyIDQ7fQ0KIC8qIFN0eWxlIERlZmluaXRpb25zICov DQogcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGNt Ow0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFt aWx5OiJUaW1lcyBOZXcgUm9tYW4iO30NCmgzDQoJe21hcmdpbi10b3A6OS4wNXB0Ow0KCW1hcmdp bi1yaWdodDowY207DQoJbWFyZ2luLWJvdHRvbTo2LjBwdDsNCgltYXJnaW4tbGVmdDowY207DQoJ dGV4dC1hbGlnbjpqdXN0aWZ5Ow0KCXBhZ2UtYnJlYWstYWZ0ZXI6YXZvaWQ7DQoJZm9udC1zaXpl OjEwLjBwdDsNCglmb250LWZhbWlseTpUaW1lczt9DQpwLk1zb1RvYzQsIGxpLk1zb1RvYzQsIGRp di5Nc29Ub2M0DQoJe21hcmdpbi10b3A6MGNtOw0KCW1hcmdpbi1yaWdodDowY207DQoJbWFyZ2lu LWJvdHRvbTowY207DQoJbWFyZ2luLWxlZnQ6ODcuOXB0Ow0KCW1hcmdpbi1ib3R0b206LjAwMDFw dDsNCgl0ZXh0LWFsaWduOmp1c3RpZnk7DQoJdGV4dC1pbmRlbnQ6LTQ1LjM1cHQ7DQoJZm9udC1z aXplOjEwLjBwdDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIjt9DQpwLk1zb1RvYzUs IGxpLk1zb1RvYzUsIGRpdi5Nc29Ub2M1DQoJe21hcmdpbi10b3A6MGNtOw0KCW1hcmdpbi1yaWdo dDowY207DQoJbWFyZ2luLWJvdHRvbTowY207DQoJbWFyZ2luLWxlZnQ6NDguMHB0Ow0KCW1hcmdp bi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1l cyBOZXcgUm9tYW4iO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7Y29sb3I6Ymx1ZTsN Cgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxp bmtGb2xsb3dlZA0KCXtjb2xvcjpwdXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9 DQpwLk1zb0F1dG9TaWcsIGxpLk1zb0F1dG9TaWcsIGRpdi5Nc29BdXRvU2lnDQoJe21hcmdpbjow Y207DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1m YW1pbHk6IlRpbWVzIE5ldyBSb21hbiI7fQ0KcC5BU04xLCBsaS5BU04xLCBkaXYuQVNOMQ0KCXtt YXJnaW4tdG9wOjYuOHB0Ow0KCW1hcmdpbi1yaWdodDowY207DQoJbWFyZ2luLWJvdHRvbTowY207 DQoJbWFyZ2luLWxlZnQ6MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglwdW5jdHVhdGlv bi13cmFwOnNpbXBsZTsNCgl0ZXh0LWF1dG9zcGFjZTpub25lOw0KCWZvbnQtc2l6ZTo5LjBwdDsN Cglmb250LWZhbWlseTpIZWx2ZXRpY2E7DQoJZm9udC13ZWlnaHQ6Ym9sZDt9DQpwLmFzbjEwLCBs aS5hc24xMCwgZGl2LmFzbjEwDQoJe21hcmdpbi10b3A6Ni44cHQ7DQoJbWFyZ2luLXJpZ2h0OjBj bTsNCgltYXJnaW4tYm90dG9tOjBjbTsNCgltYXJnaW4tbGVmdDowY207DQoJbWFyZ2luLWJvdHRv bTouMDAwMXB0Ow0KCXB1bmN0dWF0aW9uLXdyYXA6c2ltcGxlOw0KCXRleHQtYXV0b3NwYWNlOm5v bmU7DQoJZm9udC1zaXplOjkuMHB0Ow0KCWZvbnQtZmFtaWx5OkhlbHZldGljYTsNCglmb250LXdl aWdodDpib2xkO30NCnNwYW4uZW1haWxzdHlsZTIxDQoJe2ZvbnQtZmFtaWx5OkFyaWFsOw0KCWNv bG9yOndpbmRvd3RleHQ7fQ0Kc3Bhbi5FbWFpbFN0eWxlMjMNCgl7Zm9udC1mYW1pbHk6QXJpYWw7 DQoJY29sb3I6bmF2eTt9DQpAcGFnZSBTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBwdDsN CgltYXJnaW46NzIuMHB0IDkwLjBwdCA3Mi4wcHQgOTAuMHB0O30NCmRpdi5TZWN0aW9uMQ0KCXtw YWdlOlNlY3Rpb24xO30NCi0tPg0KPC9TVFlMRT4NCg0KPE1FVEEgaHR0cC1lcXVpdj1Db250ZW50 LVR5cGUgY29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PWlzby04ODU5LTEiPjwvSEVBRD4NCjxC T0RZIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBUYWhvbWEiIGxlZnRNYXJn aW49NSB0b3BNYXJnaW49NSANCiNmZmZmZmY+DQo8RElWPkVyaWMsPC9ESVY+DQo8RElWPiZuYnNw OzwvRElWPg0KPERJVj5TaWxlbmNlIGRvZXMgbm90IG1lYW4gYXBwcm92YWwuPC9ESVY+DQo8RElW PiZuYnNwOzwvRElWPg0KPERJVj5JdCBtYXkgbWVhbiZuYnNwO3RoYXQgdGhlIGNvcnJlY3Rpb25z IGFyZSZuYnNwO3NvIG51bWVyb3VzIHRoYXQgaXQgd291bGQgDQp0YWtlIHRvbyBsb25nIHRvIHJl c3BvbmQ8L0RJVj4NCjxESVY+YW5kIHRoYXQgcGVvcGxlIGRvIG5vdCBoYXZlIHRoYXQgdGltZSBh dmFpbGFibGUgYXQgdGhlIG1vbWVudC48L0RJVj4NCjxESVY+Jm5ic3A7PC9ESVY+DQo8RElWPmUu Zy46Jm5ic3A7IGFuIEVuZC1lbnRpdHkgYXR0cmlidXRlIGNlcnRpZmljYXRlIGlzIG5vdCBsaW5r ZWQgdG8gYSANCnB1YmxpYy1rZXkgY2VydGlmaWNhdGUuPC9ESVY+DQo8RElWPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBhIGNyb3NzLWNlcnRpZmljYXRl IGlzIG5vdCANCmxpbmtlZCB0byBhbiBBQSBjZXJ0aWZpY2F0ZS48L0RJVj4NCjxESVY+Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGFuIEF1dGhvcml0eSBD ZXJ0aWZpY2F0ZSANCmlzIG5vdCBsaW5rZWQgdG8gYW4gQXR0cmlidXRlIENlcnRpZmljYXRlLjwv RElWPg0KPERJVj4mbmJzcDs8L0RJVj4NCjxESVY+VGhpcyBpcyBvbmx5Jm5ic3A7YSBzdGFydCAu Li48L0RJVj4NCjxESVY+Jm5ic3A7PC9ESVY+DQo8RElWPkRlbmlzPC9ESVY+DQo8QkxPQ0tRVU9U RSANCnN0eWxlPSJQQURESU5HLVJJR0hUOiAwcHg7IFBBRERJTkctTEVGVDogNXB4OyBNQVJHSU4t TEVGVDogNXB4OyBCT1JERVItTEVGVDogIzAwMDAwMCAycHggc29saWQ7IE1BUkdJTi1SSUdIVDog MHB4Ij4NCiAgPERJViANCiAgc3R5bGU9IkZPTlQtV0VJR0hUOiBub3JtYWw7IEZPTlQtU0laRTog OXB0OyBMSU5FLUhFSUdIVDogbm9ybWFsOyBGT05ULVNUWUxFOiBub3JtYWw7IEZPTlQtVkFSSUFO VDogbm9ybWFsIj4tLS0tLSANCiAgTWVzc2FnZSByZed1IC0tLS0tIDwvRElWPg0KICA8RElWIA0K ICBzdHlsZT0iRk9OVC1XRUlHSFQ6IG5vcm1hbDsgRk9OVC1TSVpFOiA5cHQ7IEJBQ0tHUk9VTkQ6 ICNlNGU0ZTQ7IExJTkUtSEVJR0hUOiBub3JtYWw7IEZPTlQtU1RZTEU6IG5vcm1hbDsgRk9OVC1W QVJJQU5UOiBub3JtYWw7IGZvbnQtY29sb3I6IGJsYWNrIj48Qj5EZSANCiAgOjwvQj4gPEEgaHJl Zj0ibWFpbHRvIDpvd25lci1pZXRmLXBraXhAbWFpbC5pbWMub3JnIj5vd25lci1pZXRmLXBraXg8 L0E+IA0KPC9ESVY+DQogIDxESVYgDQogIHN0eWxlPSJGT05ULVdFSUdIVDogbm9ybWFsOyBGT05U LVNJWkU6IDlwdDsgTElORS1IRUlHSFQ6IG5vcm1hbDsgRk9OVC1TVFlMRTogbm9ybWFsOyBGT05U LVZBUklBTlQ6IG5vcm1hbCI+PEI+wCANCiAgOjwvQj4gPEEgDQogIGhyZWY9Im1haWx0byA6eDUw MHN0YW5kYXJkQGZyZWVsaXN0cy5vcmcsaWV0Zi1wa2l4QGltYy5vcmciPng1MDBzdGFuZGFyZCwn UEtJWCc8L0E+IA0KICA8L0RJVj4NCiAgPERJViANCiAgc3R5bGU9IkZPTlQtV0VJR0hUOiBub3Jt YWw7IEZPTlQtU0laRTogOXB0OyBMSU5FLUhFSUdIVDogbm9ybWFsOyBGT05ULVNUWUxFOiBub3Jt YWw7IEZPTlQtVkFSSUFOVDogbm9ybWFsIj48Qj5EYXRlIA0KICA6PC9CPiAyMDA5LTA0LTAzLCAx NzowMDowMTwvRElWPg0KICA8RElWIA0KICBzdHlsZT0iRk9OVC1XRUlHSFQ6IG5vcm1hbDsgRk9O VC1TSVpFOiA5cHQ7IExJTkUtSEVJR0hUOiBub3JtYWw7IEZPTlQtU1RZTEU6IG5vcm1hbDsgRk9O VC1WQVJJQU5UOiBub3JtYWwiPjxCPlN1amV0IA0KICA6PC9CPiBSRTogW3g1MDBzdGFuZGFyZF0g Q2VydGlmaWNhdGUgZGVmaW5pdGlvbnM8L0RJVj4NCiAgPERJVj48QlI+PC9ESVY+DQogIDxESVY+ PC9ESVY+DQogIDxESVY+PC9ESVY+DQogIDxESVY+DQogIDxESVYgY2xhc3M9U2VjdGlvbjE+DQog IDxQIGNsYXNzPU1zb05vcm1hbD48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6ZT0yPjxT UEFOIGxhbmc9RU4tR0IgDQogIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IENPTE9SOiBuYXZ5OyBG T05ULUZBTUlMWTogQXJpYWwiPkkgdGFrZSBzaWxlbmNlIGFzIA0KICBhcHByb3ZhbC48L1NQQU4+ PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsPjxGT05UIGZhY2U9QXJpYWwgY29sb3I9 bmF2eSBzaXplPTI+PFNQQU4gbGFuZz1FTi1HQiANCiAgc3R5bGU9IkZPTlQtU0laRTogMTBwdDsg Q09MT1I6IG5hdnk7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8L1A+ DQogIDxESVY+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWc+PEZPTlQgZmFjZT1BcmlhbCBjb2xvcj1u YXZ5IHNpemU9Mj48U1BBTiANCiAgc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgQ09MT1I6IG5hdnk7 IEZPTlQtRkFNSUxZOiBBcmlhbCI+RXJpayANCiAgQW5kZXJzZW48L1NQQU4+PC9GT05UPjwvUD4N CiAgPFAgY2xhc3M9TXNvQXV0b1NpZz48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6ZT0y PjxTUEFOIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1GQU1J TFk6IEFyaWFsIj5BbmRlcnNlbidzIA0KICBMLVNlcnZpY2U8L1NQQU4+PC9GT05UPjwvUD4NCiAg PFAgY2xhc3M9TXNvQXV0b1NpZz48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6ZT0yPjxT UEFOIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1GQU1JTFk6 IEFyaWFsIj5FbHNldmVqIDQ4LCBESy0zNTAwIA0KICBWYWVybG9lc2U8L1NQQU4+PC9GT05UPjwv UD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZz48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6 ZT0yPjxTUEFOIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1G QU1JTFk6IEFyaWFsIj5EZW5tYXJrPC9TUEFOPjwvRk9OVD48L1A+DQogIDxQIGNsYXNzPU1zb0F1 dG9TaWc+PEZPTlQgZmFjZT1BcmlhbCBjb2xvcj1uYXZ5IHNpemU9Mj48U1BBTiBsYW5nPUVOLUdC IA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1GQU1JTFk6IEFy aWFsIj5Nb2JpbGU6ICs0NSAyMDk3IA0KICAxNDkwPC9TUEFOPjwvRk9OVD48L1A+DQogIDxQIGNs YXNzPU1zb0F1dG9TaWc+PEZPTlQgZmFjZT1BcmlhbCBjb2xvcj1uYXZ5IHNpemU9Mj48U1BBTiBs YW5nPUVOLUdCIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1G QU1JTFk6IEFyaWFsIj5lbWFpbDogDQogIGVyYUB4NTAwLmV1PC9TUEFOPjwvRk9OVD48L1A+DQog IDxQIGNsYXNzPU1zb0F1dG9TaWc+PEZPTlQgZmFjZT1BcmlhbCBjb2xvcj1uYXZ5IHNpemU9Mj48 U1BBTiBsYW5nPUVOLUdCIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsg Rk9OVC1GQU1JTFk6IEFyaWFsIj53d3cueDUwMC5ldTwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBj bGFzcz1Nc29BdXRvU2lnPjxGT05UIGZhY2U9QXJpYWwgY29sb3I9bmF2eSBzaXplPTI+PFNQQU4g DQogIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IENPTE9SOiBuYXZ5OyBGT05ULUZBTUlMWTogQXJp YWwiPnd3dy54NTAwc3RhbmRhcmQuY29tPC9TUEFOPjwvRk9OVD48L1A+PC9ESVY+DQogIDxQIGNs YXNzPU1zb05vcm1hbD48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6ZT0yPjxTUEFOIA0K ICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1GQU1JTFk6IEFyaWFs Ij48L1NQQU4+PC9GT05UPiZuYnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsIHN0eWxlPSJN QVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1UYWhvbWEgc2l6ZT0yPjxTUEFOIA0KICBsYW5n PUVOLVVTIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBUYWhvbWEiPi0tLS0t T3JpZ2luYWwgDQogIE1lc3NhZ2UtLS0tLTxCUj48Qj48U1BBTiBzdHlsZT0iRk9OVC1XRUlHSFQ6 IGJvbGQiPkZyb206PC9TUEFOPjwvQj4gDQogIHg1MDBzdGFuZGFyZC1ib3VuY2VAZnJlZWxpc3Rz Lm9yZyBbbWFpbHRvOng1MDBzdGFuZGFyZC1ib3VuY2VAZnJlZWxpc3RzLm9yZ10gDQogIDxCPjxT UEFOIHN0eWxlPSJGT05ULVdFSUdIVDogYm9sZCI+T24gQmVoYWxmIE9mIDwvU1BBTj48L0I+RXJp ayANCiAgQW5kZXJzZW48QlI+PEI+PFNQQU4gc3R5bGU9IkZPTlQtV0VJR0hUOiBib2xkIj5TZW50 OjwvU1BBTj48L0I+IDEuIGFwcmlsIDIwMDkgDQogIDE0OjQwPEJSPjxCPjxTUEFOIHN0eWxlPSJG T05ULVdFSUdIVDogYm9sZCI+VG86PC9TUEFOPjwvQj4gRGlyZWN0b3J5IGxpc3Q7IA0KICBQS0lY PEJSPjxCPjxTUEFOIHN0eWxlPSJGT05ULVdFSUdIVDogYm9sZCI+U3ViamVjdDo8L1NQQU4+PC9C PiBbeDUwMHN0YW5kYXJkXSANCiAgQ2VydGlmaWNhdGUgZGVmaW5pdGlvbnM8L1NQQU4+PC9GT05U PjwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZP TlQgZmFjZT0iVGltZXMgTmV3IFJvbWFuIiANCiAgc2l6ZT0zPjxTUEFOIHN0eWxlPSJGT05ULVNJ WkU6IDEycHQiPjwvU1BBTj48L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29Ob3JtYWwg c3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9OVCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiAN CiAgbGFuZz1FTi1HQiBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwi PkhpPC9TUEFOPjwvRk9OVD48L1A+DQogIDxQIGNsYXNzPU1zb05vcm1hbCBzdHlsZT0iTUFSR0lO LUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdC IA0Kc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj48L1NQQU4+PC9G T05UPiZuYnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsIHN0eWxlPSJNQVJHSU4tTEVGVDog MzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Igc3R5bGU9 IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5JIGdvdCBhIG51bWJlciBvZiAN CiAgcmVzcG9uc2VzIG9uIHVzZXIgY2VydGlmaWNhdGVzLCBidXQgcXVpdGUgbGl0dGxlIHRoYXQg YWN0dWFsbHkgYW5zd2VyZWQgbXkgDQogIHF1ZXN0aW9uLjwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8 UCBjbGFzcz1Nc29Ob3JtYWwgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9OVCBmYWNlPUFy aWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCnN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7 IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8L1A+DQogIDxQIGNsYXNz PU1zb05vcm1hbCBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6 ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFN SUxZOiBBcmlhbCI+SSBoYXZlIHRyaWVkIHRvIGRpZyBhIA0KICBsaXR0bGUgYml0IG1vcmUgaW4g WC41MDkgdG8gZ2V0IGhvbGQgb2YgdGhlIHRlcm1pbm9sb2d5IGFuZCB0aGVuIHByb2R1Y2VkIA0K ICBiZWxvdyBmaWd1cmUuIEkgd2lsbCBub3QgY29tbWVudCBhbGwgdGhlIGJveGVzLjwvU1BBTj48 L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29Ob3JtYWwgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0 Ij48Rk9OVCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCnN0eWxlPSJG T05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8 L1A+DQogIDxQIGNsYXNzPU1zb05vcm1hbCBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05U IGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6 IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PElNRyBoZWlnaHQ9MjcxIA0KICBzcmM9ImNpZDpB dHRyXzMzMDE0ODgyODEwIiB3aWR0aD00Nzk+PC9TUEFOPjwvRk9OVD48L1A+DQogIDxQIGNsYXNz PU1zb05vcm1hbCBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6 ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0Kc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1G QU1JTFk6IEFyaWFsIj48L1NQQU4+PC9GT05UPiZuYnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0 b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxT UEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBB cmlhbCI+SSB3aWxsIGxpa2UgeW91IHRvIA0KICBjb21tZW50cyBhcyB0byB0aGUgY29ycmVjdG5l c3Mgb2YgYWJvdmUgZmlndXJlLjwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRv U2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQ QU4gDQogIGxhbmc9RU4tR0IgDQpzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTog QXJpYWwiPjwvU1BBTj48L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0 eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQog IGxhbmc9RU4tR0Igc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5U aGUgZW5kLWVudGl0eSANCiAgY2VydGlmaWNhdGUgaXMgbm90IGRlZmluZWQgaW4gdGhlIGRlZmlu aXRpb24gY2xhdXNlLiBIb3dldmVyIGl0IGlzIHVzZWQgd2lkZWx5IA0KICBpbiB0aGUgbWFpbiB0 ZXh0LiBJdCBpcyBtZW50aW9uZWQgdGhlIGZpcnN0IHRpbWUgaW4gY2xhdXNlIDcgYXMgYSBwdWJs aWMta2V5IA0KICBjZXJ0aWZpY2F0ZS4gVGhlcmUgYXJlIHNldmVyYWwgb3RoZXIgcGxhY2VzIHdo ZXJlIGl0IGlzIGEgcHVibGljLWtleSANCiAgY2VydGlmaWNhdGUuIEluIDE1LjUuMi40IGlzIHVz ZWQgaW4gdGhlIGNvbnRleHQgb2YgYXR0cmlidXRlIGNlcnRpZmljYXRlcy4gVGhlIA0KICBjb25j bHVzaW9uIG11c3QgYmUgdGhhdCBhbiBlbmQtZW50aXR5IGNlcnRpZmljYXRlIGNhbiBlaXRoZXIg YmUgYSBlbmQtZW50aXR5IA0KICBwdWJsaWMta2V5IGNlcnRpZmljYXRlIG9yIGFuIGVuZC1lbnRp dHkgYXR0cmlidXRlIGNlcnRpZmljYXRlLiBIb3dldmVyLCBpbiANCiAgbW9zdCBwbGFjZXMsIGl0 IGlzIGltcGxpZWQgdGhhdCB3ZSBvbmx5IHRhbGtzIGFib3V0IHB1YmxpYy1rZXkgY2VydGlmaWNh dGVzLiANCiAgRm9yIHZldGVyYW5zLCB0aGlzIGlzIG5vdCBhIG1ham9yIHByb2JsZW0sIGJ1dCBu ZXctY29tZXJzIG1heSBnZXQgY29uZnVzZWQuIA0KICBBbnl3YXksIEkgdGhpbmcgb3VyIHNwZWNp ZmljYXRpb25zIHNob3VsZCBiZSBjbGVhciBhbmQgbm90IHN1YmplY3QgdG8gDQogIGludGVycHJl dGF0aW9uLiBSRkMgNTI4MCBkb2VzIG5vdCB1c2UgdGhlIHRlcm0gYXQgYWxsLiBJdCBzZWVtcyBq dXN0IHRvIHVzZSANCiAgdGhlIHRlcm0gk2NlcnRpZmljYXRllCBhcyBhIHN5bm9ueW0gZm9yIJNl bmQtZW50cml0eSBwdWJsaWMga2V5IA0KICBjZXJ0aWZpY2F0ZZQuPC9TUEFOPjwvRk9OVD48L1A+ DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9OVCBm YWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCnN0eWxlPSJGT05ULVNJWkU6 IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8L1A+DQogIDxQ IGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9OVCBmYWNlPUFy aWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBG T05ULUZBTUlMWTogQXJpYWwiPlRoZSCTVXNlciANCiAgQ2VydGlmaWNhdGWUJm5ic3A7IGlzIG5v dCBkZWZpbmVkIGluIFguNTA5LCBidXQgaXMgd2lkZSB1c2VkLiBJdCBzZWVtcyB0byBiZSBhIA0K ICBzeW5vbnltIGZvciCTZW5kLWVudHJpdHkgcHVibGljIGtleSBjZXJ0aWZpY2F0ZZQuIEl0IGlz IGFsc28gdXNlZCBpbiBYLjUxMS4gDQogIFJGQyA1MjgwIHVzZXMgdGhlIHRlcm0gb25jZSB3aXRo b3V0IGRpZmZlcmVudGluZyBpdCBmcm9tIGp1c3QgDQogIJNjZXJ0aWZpY2F0ZZQuPC9TUEFOPjwv Rk9OVD48L1A+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0 Ij48Rk9OVCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCnN0eWxlPSJG T05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8 L1A+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9O VCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiBzdHlsZT0iRk9OVC1TSVpF OiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPlRoZSB0ZXJtIA0KICCTY3Jvc3MtY2VydGlmaWNh dGWUIHNob3VsZCBwcm9iYWJseSBhbHNvIGJlIHF1YWxpZmllZC48L1NQQU4+PC9GT05UPjwvUD4N CiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZh Y2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0Kc3R5bGU9IkZPTlQtU0laRTog MTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj48L1NQQU4+PC9GT05UPiZuYnNwOzwvUD4NCiAgPFAg Y2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJp YWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZP TlQtRkFNSUxZOiBBcmlhbCI+SSBzdWdnZXN0IHRvIGFkZCBpbiANCiAgWC41MDkgZGVmaW5pdGlv bnMgZm9yOjwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJN QVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9 RU4tR0IgDQpzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPjwvU1BB Tj48L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4t TEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Ig c3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj6TZW5kLWVudGl0eSBw dWJsaWMta2V5IA0KICBjZXJ0aWZpY2F0ZZQ8L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9 TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6 ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFN SUxZOiBBcmlhbCI+k3VzZXIgY2VydGljdGF0ZZQgYXMgYSANCiAgc3lub255bSBmb3Igk2VuZC1l bnRpdHkgcHVibGljLWtleSBjZXJ0aWZpY2F0ZZQ8L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAgY2xh c3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwg c2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQt RkFNSUxZOiBBcmlhbCI+k2VuZC1lbnRpdHkgYXR0cnVidXRlIA0KICBjZXJ0aWZpY2F0ZZQ8L1NQ QU4+PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6 IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0Kc3R5 bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj48L1NQQU4+PC9GT05UPiZu YnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQi PjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05U LVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+VGhlIFguNTA5IHRleHQgc2hvdWxkIA0K ICBiZSB1cGRhdGVkIHRvIG1ha2UgdXNlIG9mIHRoZXNlIGRlZmluaXRpb25zLjwvU1BBTj48L0ZP TlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+ PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0IgDQpzdHlsZT0iRk9O VC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPjwvU1BBTj48L0ZPTlQ+Jm5ic3A7PC9Q Pg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZPTlQg ZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Igc3R5bGU9IkZPTlQtU0laRTog MTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5YLjUwOSBoYXMgZm91ciANCiAgYXR0cmlidXRlIHR5 cGVzIGZvciBob2xkaW5nIGNlcnRpZmljYXRlcy48L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAgY2xh c3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwg c2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0Kc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9O VC1GQU1JTFk6IEFyaWFsIj48L1NQQU4+PC9GT05UPiZuYnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNv QXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0y PjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZ OiBBcmlhbCI+VXNlckNlcnRpZmljYXRlOiBGb3IgDQogIGVuZC1lbnRpdHkgcHVibGljLWtleSBj ZXJ0aWZpY2F0ZXM8L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHls ZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBs YW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+Y0Fj ZXJ0aWZpY2F0ZTogRm9yIENBIA0KICBjZXJ0aWZpY2F0ZXM8L1NQQU4+PC9GT05UPjwvUD4NCiAg PFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9 QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAx MHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPmF0dHJpYnV0ZUNlcnRpZmljYXRlQXR0cmlidXRlOiBG b3IgDQogIGVuZC1lbnRpdHkgYXR0cnVidXRlIGNlcnRpZmljYXRlczwvU1BBTj48L0ZPTlQ+PC9Q Pg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZPTlQg ZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Igc3R5bGU9IkZPTlQtU0laRTog MTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5hQUNlcnRpZmljYXRlOiBGb3IgQUEgDQogIENlcnRp ZmljYXRlczwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJN QVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9 RU4tR0IgDQpzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPjwvU1BB Tj48L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4t TEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Ig c3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5BbnkgDQogIGNvbW1l bnRzPzwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJH SU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4t R0IgDQpzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPjwvU1BBTj48 L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVG VDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIHN0eWxlPSJGT05ULVNJ WkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+RXJpayBBbmRlcnNlbjwvU1BBTj48L0ZPTlQ+ PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZP TlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZP TlQtRkFNSUxZOiBBcmlhbCI+QW5kZXJzZW4ncyANCiAgTC1TZXJ2aWNlPC9TUEFOPjwvRk9OVD48 L1A+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9O VCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9O VC1GQU1JTFk6IEFyaWFsIj5FbHNldmVqIDQ4LCBESy0zNTAwIA0KICBWYWVybG9lc2U8L1NQQU4+ PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2 cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAx MHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPkRlbm1hcms8L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAg Y2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJp YWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZP TlQtRkFNSUxZOiBBcmlhbCI+TW9iaWxlOiArNDUgMjA5NyANCiAgMTQ5MDwvU1BBTj48L0ZPTlQ+ PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZP TlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Igc3R5bGU9IkZPTlQtU0la RTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5lbWFpbDogDQogIGVyYUB4NTAwLmV1PC9TUEFO PjwvRk9OVD48L1A+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAz NnB0Ij48Rk9OVCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCiAgc3R5 bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj53d3cueDUwMC5ldTwvU1BB Tj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDog MzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIHN0eWxlPSJGT05ULVNJWkU6 IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+d3d3Lng1MDBzdGFuZGFyZC5jb208L1NQQU4+PC9G T05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+ PEZPTlQgZmFjZT0iVGltZXMgTmV3IFJvbWFuIiANCiAgc2l6ZT0zPjxTUEFOIGxhbmc9RU4tR0Ig DQogIHN0eWxlPSJGT05ULVNJWkU6IDEycHQiPjwvU1BBTj48L0ZPTlQ+Jm5ic3A7PC9QPjwvRElW PjwvRElWPjwvQkxPQ0tRVU9URT48L0JPRFk+PC9IVE1MPg0K ------=_NextPart_09040317330148873280414_002-- ------=_NextPart_09040317330148873280414_001 Content-Type: image/gif; name="image001.gif" Content-ID: Content-Transfer-Encoding: base64 R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_09040317330148873280414_001-- From owner-ietf-pkix@mail.imc.org Fri Apr 3 10:08:56 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D77F73A6859 for ; Fri, 3 Apr 2009 10:08:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.104 X-Spam-Level: X-Spam-Status: No, score=-99.104 tagged_above=-999 required=5 tests=[AWL=-3.215, BAYES_00=-2.599, EXTRA_MPART_TYPE=1, HTML_MESSAGE=0.001, MIME_BOUND_EQ_REL=2.832, MIME_HTML_ONLY=1.457, SARE_GIF_ATTACH=1.42, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FooUFTbf9DwQ for ; Fri, 3 Apr 2009 10:08:56 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 42A9D3A67E4 for ; Fri, 3 Apr 2009 10:08:55 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33GcPJ6002593 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 09:38:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33GcP34002592; Fri, 3 Apr 2009 09:38:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33GcOw4002586 for ; Fri, 3 Apr 2009 09:38:25 -0700 (MST) (envelope-from housley@vigilsec.com) Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id B66C4F24001; Fri, 3 Apr 2009 12:38:38 -0400 (EDT) X-Virus-Scanned: amavisd-new at smetech.net Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id SQ4Q9yi+P+yV; Fri, 3 Apr 2009 12:38:23 -0400 (EDT) Received: from THINKPADR52.vigilsec.com (pool-71-191-197-15.washdc.fios.verizon.net [71.191.197.15]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id A07DA9A4725; Fri, 3 Apr 2009 12:38:37 -0400 (EDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 03 Apr 2009 12:38:15 -0400 To: "Erik Andersen" , , "'PKIX'" From: Russ Housley Subject: RE: [x500standard] Certificate definitions In-Reply-To: <3C35976D27EB42F590A0B142D903E7C7@ERA1> References: <1C740690094340D3B49DADD21AD98606@ERA1> <3C35976D27EB42F590A0B142D903E7C7@ERA1> Mime-Version: 1.0 Content-Type: multipart/related; type="text/html"; boundary="=====================_180813421==.REL" Message-Id: <20090403163837.A07DA9A4725@odin.smetech.net> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --=====================_180813421==.REL Content-Type: text/html; charset="us-ascii" I'm a pit strapped for time right noe, but just looking at your picture, I see something that causes pause.  An AA certificate issues a Cross-Certificate?  That does not seem right.

Russ


At 11:00 AM 4/3/2009, Erik Andersen wrote:
I take silence as approval.
 
Erik Andersen
Andersen's L-Service
Elsevej 48, DK-3500 Vaerloese
Denmark
Mobile: +45 2097 1490
email: era@x500.eu
www.x500.eu
www.x500standard.com
 
-----Original Message-----
From: x500standard-bounce@freelists.org [ mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen
Sent: 1. april 2009 14:40
To: Directory list; PKIX
Subject: [x500standard] Certificate definitions
 
Hi
 
I got a number of responses on user certificates, but quite little that actually answered my question.
 
I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes.
 
[]

 
I will like you to comments as to the correctness of above figure.
 
The end-entity certificate is not defined in the definition clause. However it is used widely in the main text. It is mentioned the first time in clause 7 as a public-key certificate. There are several other places where it is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should be clear and not subject to interpretation. RFC 5280 does not use the term at all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.
 
The “User Certificate”  is not defined in X.509, but is wide used. It seems to be a synonym for “end-entrity public key certificate”. It is also used in X.511. RFC 5280 uses the term once without differenting it from just “certificate”.
 
The term “cross-certificate” should probably also be qualified.
 
I suggest to add in X.509 definitions for:
 
“end-entity public-key certificate”
“user certictate” as a synonym for “end-entity public-key certificate”
“end-entity attrubute certificate”
 
The X.509 text should be updated to make use of these definitions.
 
X.509 has four attribute types for holding certificates.
 
UserCertificate: For end-entity public-key certificates
cAcertificate: For CA certificates
attributeCertificateAttribute: For end-entity attrubute certificates
aACertificate: For AA Certificates
 
Any comments?
 
Erik Andersen
Andersen's L-Service
Elsevej 48, DK-3500 Vaerloese
Denmark
Mobile: +45 2097 1490
email: era@x500.eu
www.x500.eu
www.x500standard.com
 

--=====================_180813421==.REL Content-Type: application/octet-stream; name="ac6e364.gif" Content-ID: <7.1.0.9.2.20090403123646.097cc350@vigilsec.com.1> Content-Transfer-Encoding: base64 Content-Disposition: inline; filename="ac6e364.gif" R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 --=====================_180813421==.REL-- From owner-ietf-pkix@mail.imc.org Fri Apr 3 11:28:10 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A6AB33A69B9 for ; Fri, 3 Apr 2009 11:28:10 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.233 X-Spam-Level: X-Spam-Status: No, score=-0.233 tagged_above=-999 required=5 tests=[AWL=-1.184, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, EXTRA_MPART_TYPE=1, HTML_MESSAGE=0.001, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rc5TmQgybQEr for ; Fri, 3 Apr 2009 11:28:09 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D59793A68CF for ; Fri, 3 Apr 2009 11:28:07 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33I3LC4007963 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 11:03:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33I3LQa007961; Fri, 3 Apr 2009 11:03:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n33I3Axj007930 for ; Fri, 3 Apr 2009 11:03:20 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 9598 invoked from network); 3 Apr 2009 18:02:03 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 3 Apr 2009 18:02:03 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/related; boundary="----_=_NextPart_001_01C9B486.727F186D"; type="multipart/alternative" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Fri, 3 Apr 2009 14:03:09 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm0cYRI6tso9pQ0TuWLNAq+uDFxrwAE8a5A References: <3C35976D27EB42F590A0B142D903E7C7@ERA1> From: "Santosh Chokhani" To: , "ietf-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B486.727F186D Content-Type: multipart/alternative; boundary="----_=_NextPart_002_01C9B486.727F186D" ------_=_NextPart_002_01C9B486.727F186D Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable I did not respond before because I am not quite sure what purpose this = diagram serves and why we need it. =20 I have also read Russ's post and I agree with Russ (and with Denis on = one point). Unless some one views a PKC with SDA as an AC, AA = certificate is not a cross certificate. =20 I disagree with Denis on two of his comments. Good, bad or indifferent, = the diagram is saying that a PKC could be an Authority Certificate or an = EE certificate. The diagram is correct. The diagram says an attribute = certificate could be an authority certificate or an end entity = certificate. Again, the diagram is correct. =20 But, as I mentioned before, I lose forest for the trees here. I know = this started with the userCertificate directory attribute, but the = diagram may confuse people, may be misread, and without understanding = why precisely we need it, I do not see a need for it.=20 ________________________________ From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: Friday, April 03, 2009 11:33 AM To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too = long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a = public-key certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute = Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little = that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the = terminology and then produced below figure. I will not comment all the = boxes. =20 =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first = time in clause 7 as a public-key certificate. There are several other = places where it is a public-key certificate. In 15.5.2.4 is used in the = context of attribute certificates. The conclusion must be that an = end-entity certificate can either be a end-entity public-key certificate = or an end-entity attribute certificate. However, in most places, it is = implied that we only talks about public-key certificates. For veterans, = this is not a major problem, but new-comers may get confused. Anyway, I = thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to = use the term "certificate" as a synonym for "end-entrity public key = certificate". =20 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is = also used in X.511. RFC 5280 uses the term once without differenting it = from just "certificate". =20 The term "cross-certificate" should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 "end-entity public-key certificate" "user certictate" as a synonym for "end-entity public-key certificate" "end-entity attrubute certificate" =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attrubute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------_=_NextPart_002_01C9B486.727F186D Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
I did not = respond before=20 because I am not quite sure what purpose this diagram serves and why we = need=20 it.
 
I have also = read Russ's=20 post and I agree with Russ (and with Denis on one point).  Unless = some one=20 views a PKC with SDA as an AC,  AA certificate is not a cross=20 certificate.
 
I disagree = with Denis on=20 two of his comments.  Good, bad or indifferent, the diagram is = saying that=20 a PKC could be an Authority Certificate or an EE certificate.  The = diagram=20 is correct.  The diagram says an attribute certificate could be an=20 authority certificate or an end entity certificate.  Again, the = diagram is=20 correct.
 
But, as I = mentioned=20 before, I lose forest for the trees here.  I know this started with = the=20 userCertificate  directory attribute, but the diagram may confuse = people,=20 may be misread, and without understanding why precisely we need it, I do = not see=20 a need for it.
From: x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis=20 Pinkas
Sent: Friday, April 03, 2009 11:33 AM
To: = x500 list;=20 ietf-pkix
Subject: [x500standard] Re: Certificate=20 definitions

Eric,
 
Silence does not mean approval.
 
It may mean that the corrections are so numerous that = it would=20 take too long to respond
and that people do not have that time available at the = moment.
 
e.g.:  an End-entity attribute certificate is not linked to = a=20 public-key certificate.
         a = cross-certificate is=20 not linked to an AA certificate.
         an Authority = Certificate=20 is not linked to an Attribute Certificate.
 
This is only a start ...
 
Denis
-----=20 Message re=E7u ----- De=20 : owner-ietf-pkix=20 =C0=20 : x500standard,'PKIX'=20 Date=20 : 2009-04-03, 17:00:01 Sujet=20 : RE: [x500standard] Certificate definitions

I take=20 silence as approval.

 

Erik=20 Andersen

Andersen's=20 L-Service

Elsevej = 48, DK-3500=20 Vaerloese

Denmark

Mobile:=20 +45 2097 1490

email:=20 era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original=20 Message-----
From:=20 x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org]=20 On Behalf Of Erik=20 Andersen
Sent: 1. = april=20 2009 14:40
To: = Directory=20 list; PKIX
Subject:=20 [x500standard] Certificate definitions

 

Hi

 

I got a = number of=20 responses on user certificates, but quite little that actually = answered my=20 question.

 

I have = tried to dig a=20 little bit more in X.509 to get hold of the terminology and then = produced=20 below figure. I will not comment all the boxes.

 

 

I will = like you to=20 comments as to the correctness of above figure.

 

The = end-entity=20 certificate is not defined in the definition clause. However it is = used=20 widely in the main text. It is mentioned the first time in clause 7 = as a=20 public-key certificate. There are several other places where it is a = public-key certificate. In 15.5.2.4 is used in the context of = attribute=20 certificates. The conclusion must be that an end-entity certificate = can=20 either be a end-entity public-key certificate or an end-entity = attribute=20 certificate. However, in most places, it is implied that we only = talks about=20 public-key certificates. For veterans, this is not a major problem, = but=20 new-comers may get confused. Anyway, I thing our specifications = should be=20 clear and not subject to interpretation. RFC 5280 does not use the = term at=20 all. It seems just to use the term =93certificate=94 as a synonym = for=20 =93end-entrity public key certificate=94.

 

The = =93User=20 Certificate=94  is not defined in X.509, but is wide used. It = seems to be=20 a synonym for =93end-entrity public key certificate=94. It is also = used in=20 X.511. RFC 5280 uses the term once without differenting it from just = =93certificate=94.

 

The term=20 =93cross-certificate=94 should probably also be = qualified.

 

I suggest = to add in=20 X.509 definitions for:

 

=93end-entity=20 public-key certificate=94

=93user = certictate=94 as=20 a synonym for =93end-entity public-key = certificate=94

=93end-entity attrubute=20 certificate=94

 

The X.509 = text should=20 be updated to make use of these definitions.

 

X.509 has = four=20 attribute types for holding certificates.

 

UserCertificate: For=20 end-entity public-key certificates

cAcertificate: For CA=20 certificates

attributeCertificateAttribute: For end-entity attrubute = certificates

aACertificate: For AA=20 Certificates

 

Any=20 comments?

 

Erik = Andersen

Andersen's=20 L-Service

Elsevej 48, DK-3500=20 Vaerloese

Denmark

Mobile: = +45 2097=20 1490

email:=20 era@x500.eu

www.x500.eu

www.x500standard.com

 

------_=_NextPart_002_01C9B486.727F186D-- ------_=_NextPart_001_01C9B486.727F186D Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: <891535417@03042009-1B89> Content-Description: image001.gif Content-Location: image001.gif R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------_=_NextPart_001_01C9B486.727F186D-- From owner-ietf-pkix@mail.imc.org Sat Apr 4 11:15:50 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E40483A6A7E for ; Sat, 4 Apr 2009 11:15:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.382 X-Spam-Level: X-Spam-Status: No, score=-102.382 tagged_above=-999 required=5 tests=[AWL=0.217, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jU5yFqlrluPT for ; Sat, 4 Apr 2009 11:15:50 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 926B33A6A6A for ; Sat, 4 Apr 2009 11:15:49 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n34HgJ24078091 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 4 Apr 2009 10:42:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n34HgJkO078090; Sat, 4 Apr 2009 10:42:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n34Hg72C078079 for ; Sat, 4 Apr 2009 10:42:18 -0700 (MST) (envelope-from housley@vigilsec.com) Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id 9F0589A473A; Sat, 4 Apr 2009 13:42:15 -0400 (EDT) X-Virus-Scanned: amavisd-new at smetech.net Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id 2IO64PLNo0t3; Sat, 4 Apr 2009 13:42:05 -0400 (EDT) Received: from THINKPADR52.vigilsec.com (pool-71-191-197-15.washdc.fios.verizon.net [71.191.197.15]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id 8B1D59A4725; Sat, 4 Apr 2009 13:42:14 -0400 (EDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sat, 04 Apr 2009 13:42:04 -0400 To: "Maxim Masiutin" , ietf-pkix@imc.org From: Russ Housley Subject: Re: A contradiction between RFC3852 and RFC3278 In-Reply-To: <68226881330328496@ritlabs.com> References: <68226881330328496@ritlabs.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Message-Id: <20090404174214.8B1D59A4725@odin.smetech.net> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Max: I do not read the text in 10.1.1 of RFC 3852 to mean that compound signature algorithm identifiers should not be used. Please take a look at section 12.2 of RFC 2630. RFC 2630 is the grandfather of RFC 3852, and it clearly uses id-dsa-with-sha1. Russ At 08:38 AM 3/13/2009, Maxim Masiutin wrote: >Hello Ietf-Pkix, > >I have found a contradiction between RFC3278 (and >draft-ietf-smime-3278bis-05.txt work in progress) and RFC3852. > >RFC3852 declares that the signatureAlgorithm in the SignerInfo >should not be a compound algorithm of a public key algorithm and a >hash function. Section 10.1.2 of RFC3852: "The >SignatureAlgorithmIdentifier type identifies a signature >algorithm. Examples include RSA, DSA, and ECDSA. A signature >algorithm supports signature generation and verification >operations. The signature generation operation uses the message >digest and the signer's private key to generate a signature value". >As specified in the RFC3852, the signature algorithm takes the >message digest, i.e. the result of a hash function specified in the >digestAlgorithm in the SignerInfo > > >RFC3278 (and bis) declares that signatureAlgorithm contains the >algorithm identifier ecdsa-with-SHA1 (bis also allows any other SHA >hash), i.e. assumes that the algorithm takes as an input the whole >message itself rather than the digest. It also tells that the >digestAlgorithm in the SignerInfo should also be a SHA hash. Maybe >it assumes that the SHA in digestAlgorithm should match SHA in >signatureAlgorithm, but it is not explicitly clarified. Thus, a >combination of ecdsa-with-SHA224 in signatureAlgorithm and >id-sha-512 in digestAlgorithm is not prohibited. > > >How can we resolve this contradiction of RFC3852 and RFC3278? > > > > >-- >Best regards, >Maxim Masiutin >Ritlabs SRL >http://www.ritlabs.com/ From owner-ietf-pkix@mail.imc.org Mon Apr 6 14:55:59 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9621A3A6C7C for ; Mon, 6 Apr 2009 14:55:59 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -104.267 X-Spam-Level: X-Spam-Status: No, score=-104.267 tagged_above=-999 required=5 tests=[AWL=2.332, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zpsjRGGU7zt5 for ; Mon, 6 Apr 2009 14:55:58 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8463F3A6CB5 for ; Mon, 6 Apr 2009 14:55:55 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n36LG8fs041570 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 6 Apr 2009 14:16:08 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n36LG8mJ041568; Mon, 6 Apr 2009 14:16:08 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n36LG7a3041555 for ; Mon, 6 Apr 2009 14:16:07 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id 3CDA83A6CF6; Mon, 6 Apr 2009 14:15:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-new-asn1-04.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090406211501.3CDA83A6CF6@core3.amsl.com> Date: Mon, 6 Apr 2009 14:15:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : New ASN.1 Modules for PKIX Author(s) : P. Hoffman, J. Schaad Filename : draft-ietf-pkix-new-asn1-04.txt Pages : 119 Date : 2009-04-06 The PKIX certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-new-asn1-04.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-new-asn1-04.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-06141306.I-D@ietf.org> --NextPart-- From owner-ietf-pkix@mail.imc.org Mon Apr 6 20:24:50 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF01F3A687E for ; Mon, 6 Apr 2009 20:24:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -104.829 X-Spam-Level: X-Spam-Status: No, score=-104.829 tagged_above=-999 required=5 tests=[AWL=1.770, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8C4-t71azZbD for ; Mon, 6 Apr 2009 20:24:50 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C98723A69EA for ; Mon, 6 Apr 2009 20:24:49 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3731LgD057799 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 6 Apr 2009 20:01:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3731Kdu057795; Mon, 6 Apr 2009 20:01:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37318b8057774 for ; Mon, 6 Apr 2009 20:01:20 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id E43A53A6A44; Mon, 6 Apr 2009 20:00:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-new-asn1-05.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090407030001.E43A53A6A44@core3.amsl.com> Date: Mon, 6 Apr 2009 20:00:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : New ASN.1 Modules for PKIX Author(s) : P. Hoffman, J. Schaad Filename : draft-ietf-pkix-new-asn1-05.txt Pages : 119 Date : 2009-04-06 The PKIX certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-new-asn1-05.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-new-asn1-05.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-06194515.I-D@ietf.org> --NextPart-- From owner-ietf-pkix@mail.imc.org Tue Apr 7 05:11:26 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4D9E23A6DD0 for ; Tue, 7 Apr 2009 05:11:26 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.298 X-Spam-Level: X-Spam-Status: No, score=-2.298 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nXb9v7N5xEGV for ; Tue, 7 Apr 2009 05:11:25 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 482E13A6B1A for ; Tue, 7 Apr 2009 05:11:22 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37BgRTw086980 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Apr 2009 04:42:27 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n37BgRZI086979; Tue, 7 Apr 2009 04:42:27 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from fk-out-0910.google.com (fk-out-0910.google.com [209.85.128.188]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37BgF3K086969 for ; Tue, 7 Apr 2009 04:42:26 -0700 (MST) (envelope-from jlopez.ha@gmail.com) Received: by fk-out-0910.google.com with SMTP id z23so1011352fkz.10 for ; Tue, 07 Apr 2009 04:42:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=PKhJJ8J5sTfCIau7F2q8jEXVtlpca+4TGqvvMtSvP/4=; b=aVqkxfFqzTfYeaMAfb1N+13IRDuLj/xN73Gjs9qgna70VwyONwtQ/wl7luZ2ksMzpt UIcnlaPPoPXypFvFUcNuQSr3hTx2KHSHjGn3fJ47TLc3uSlz6u2HSl8i9XchTQ37Wnrl fYNI6Eh3fXco+TY+CqT7JZl1yz+PH9qtLtFoY= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=XqjmjeODOGrHNggR+coN4gNl3Nm/t8UcMMGRhBf5Z+2oWxyufcMYGyyuRr99abwjRr xu5RBJgQaAtfSYis7vahJ7sESKjhJTAZ0Fu17eg6WG6urJw8lk0xgNT5c1l+q3gFYobK Jmmurmh8s4fJQ6/XcTo7vjTSozUyRFEblhPFU= MIME-Version: 1.0 Received: by 10.204.52.146 with SMTP id i18mr43796bkg.33.1239104534188; Tue, 07 Apr 2009 04:42:14 -0700 (PDT) Date: Tue, 7 Apr 2009 13:42:14 +0200 Message-ID: Subject: Revocation scheme definition From: =?ISO-8859-1?Q?Jorge_L=F3pez?= To: ietf-pkix@imc.org Content-Type: multipart/alternative; boundary=001636c5abdf9992780466f58195 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --001636c5abdf9992780466f58195 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Hi all, Next I merely offer personal considerations about the (in my opinion) confusing scenario of PKI terminology classification. I would appreciate any comment on this. As can be seen in the literature, most people define CRL, Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status, Certificate Revocation Tree, etc. as revocation schemes. I think this "classification" is confusing. I personally consider a revocation scheme as a scheme/protocol where the owner (or an authorised party) is able to revocate the status of her certificate. For example, the one defined in RFC 4210 CMP. However, the terms mentioned above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make that data structure available to others (Over-Issued CRL, Over-Issued Segmented CRL, etc.) and both the managed data structure and the associated publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). But none of them to the procedure to be followed in order to revocate the certificate! If fact OCSP is sometimes referenced as a revocation scheme, when it is actually focused on "just" checking the revocation status of a certificate... >From my viewpoint, I would differentiate among the scheme, the certificate status information itself - CSI (data structure) - and the method that distributes/publishes the CSI. A revocation scheme updates the CSI. However, the publication/distribution method is oriented to support the validation of certificates. IMHO it has nothing to do with a revocation scheme. Perhaps you may consider appropiate to include in the term "revocation scheme" everything that has something to do with the revocation information... Therefore, I distinguish a revocation scheme from another type of scheme (validation scheme) which aim is to check the status of a certificate taking into account the CSI. This CSI could be distributed/published by using one of the methods defined above, or accessed in an online manner (an OCSP service that retrieves the CSI from a fresh database). I guess that the revocation scheme term has been extended to things not so related to the revocation itself, like the validation procedure. I just want to know what the PKI community think about this. Thanks in advance, -------- Jorge Lopez Hernandez-Ardieta --001636c5abdf9992780466f58195 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Hi all,

Next I merely offer personal consider= ations about the (in my opinion) confusing scenario of PKI terminology clas= sification. I would appreciate any comment on this.

As can be seen in the literature, most people define CRL, Partitioned = CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Sta= tus, Certificate Revocation Tree, etc. as revocation schemes. I think this = "classification" is confusing.

I personally consider a revocation scheme as a scheme/p= rotocol where the owner (or an authorised party) is able to revocate the st= atus of her certificate. For example, the one defined in RFC 4210 CMP. Howe= ver, the terms mentioned above relate to data structures (CRL, Partitioned = CRL, Delta CRL), mechanisms to make that data structure available to others= (Over-Issued CRL, Over-Issued Segmented CRL, etc.) and both the managed da= ta structure and the associated publication mechanism (NOVOMODO, Certificat= e Revocation Tree, etc.). But none of them to the procedure to be followed = in order to revocate the certificate! If fact OCSP is sometimes referenced = as a revocation scheme, when it is actually focused on "just" che= cking the revocation status of a certificate...

From my viewpoint, I would differentiate among the sche= me, the certificate status information itself - CSI (data structure) - and = the method that distributes/publishes the CSI. A revocation scheme updates = the CSI. However, the publication/distribution method is oriented to suppor= t the validation of certificates. IMHO it has nothing to do with a revocati= on scheme. Perhaps you may consider appropiate to include in the term "= ;revocation scheme" everything that has something to do with the revoc= ation information...

Therefore, I distinguish a revocation scheme from anoth= er type of scheme (validation scheme) which aim is to check the status of a= certificate taking into account the CSI. This CSI could be distributed/pub= lished by using one of the methods defined above, or accessed in an online = manner (an OCSP service that retrieves the CSI from a fresh database).

I guess that the revocation scheme term has been extend= ed to things not so related to the revocation itself, like the validation p= rocedure. I just want to know what the PKI community think about this.

Thanks in advance,

--------
Jorge Lopez Hernandez-Ardieta


--001636c5abdf9992780466f58195-- From owner-ietf-pkix@mail.imc.org Tue Apr 7 13:40:57 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 714373A6E0A for ; Tue, 7 Apr 2009 13:40:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.869 X-Spam-Level: X-Spam-Status: No, score=-1.869 tagged_above=-999 required=5 tests=[AWL=0.730, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VJGr57Oz7Kbu for ; Tue, 7 Apr 2009 13:40:56 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A0EDF3A6E0C for ; Tue, 7 Apr 2009 13:40:55 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37KDVSF023906 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Apr 2009 13:13:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n37KDUvp023905; Tue, 7 Apr 2009 13:13:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout1-sn1.fre.skanova.net (pne-smtpout1-sn1.fre.skanova.net [81.228.11.98]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37KDJow023890 for ; Tue, 7 Apr 2009 13:13:30 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout1-sn1.fre.skanova.net (7.3.129) id 49CCDA070016EFF6 for ietf-pkix@imc.org; Tue, 7 Apr 2009 22:13:18 +0200 Message-ID: <51FB0BC2B15540E3BAC7C0464B479375@AndersPC> From: "Anders Rundgren" To: Subject: - An HTML5 standard facility? Date: Tue, 7 Apr 2009 22:13:42 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-element Since the PKI community at large seems to ignore the client-side of PKI in browsers, the HTML 5 designers apparently didn't find any other solution but adopting the 15 year old Netscape hack known as . It is indeed as said in this list very simple to use etc. However, does it really match the needs of today? My guess FWIW, is that the serious users of on-line provisioning of PKI which includes governments and banks in the EU, as well as the USPTO will continue to use entirely proprietary solutions (mostly using Java), since the browser-schemes are all-over-the-map and do not do signatures either. A few things to consider: How could a static tag in a page mark-up language match an API or a protocol? Algorithm agility, isn't that a requirement these days? PIN-codes anybody? TPM - A dead duck? Anders From owner-ietf-pkix@mail.imc.org Tue Apr 7 15:50:25 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2F6E83A684B for ; Tue, 7 Apr 2009 15:50:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.598 X-Spam-Level: X-Spam-Status: No, score=-1.598 tagged_above=-999 required=5 tests=[AWL=0.651, BAYES_00=-2.599, HELO_EQ_SE=0.35] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XSJ0wzNBOiP0 for ; Tue, 7 Apr 2009 15:50:24 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 1143E3A67C1 for ; Tue, 7 Apr 2009 15:50:23 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37MUGcJ031327 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Apr 2009 15:30:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n37MUG7Q031326; Tue, 7 Apr 2009 15:30:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37MU20C031313 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 7 Apr 2009 15:30:14 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 56805 invoked from network); 7 Apr 2009 22:30:10 -0000 Received: from s34.loopia.se (HELO s19.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 7 Apr 2009 22:30:10 -0000 Received: (qmail 81113 invoked from network); 7 Apr 2009 22:30:01 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s19.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 7 Apr 2009 22:30:01 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 08 Apr 2009 00:30:00 +0200 Subject: Re: - An HTML5 standard facility? From: Stefan Santesson To: Anders Rundgren , Message-ID: Thread-Topic: - An HTML5 standard facility? Thread-Index: Acm30GMSHwX2ItKBnkiyz/+2DbXauw== In-Reply-To: <51FB0BC2B15540E3BAC7C0464B479375@AndersPC> Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I find it a bit remarkable that they reference RFC 2459 for algorithm identifier OIDs Quote: "3. Let algorithm be an ASN.1 AlgorithmIdentifier structure as defined by RFC2459, with the algorithm field giving the ASN.1 OID used to identify signature algorithm, using the OIDs defined in section 7.2 ("Signature Algorithms") of RFC2459, and the parameters field set up as required by RFC2459 for AlgorithmIdentifier structures for that algorithm. [X690] [RFC2459]" It's a tiny bit more than slightly outdated... /Stefan On 4/7/09 10:13 PM, "Anders Rundgren" wrote: > > http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-element > > Since the PKI community at large seems to ignore the client-side of > PKI in browsers, the HTML 5 designers apparently didn't find any other > solution but adopting the 15 year old Netscape hack known as . > > It is indeed as said in this list very simple to use etc. However, > does it really match the needs of today? > > My guess FWIW, is that the serious users of on-line provisioning of PKI > which includes governments and banks in the EU, as well as the USPTO > will continue to use entirely proprietary solutions (mostly using Java), since > the browser-schemes are all-over-the-map and do not do signatures either. > > A few things to consider: > > How could a static tag in a page mark-up language match an API > or a protocol? > > Algorithm agility, isn't that a requirement these days? > > PIN-codes anybody? > > TPM - A dead duck? > > Anders > From owner-ietf-pkix@mail.imc.org Tue Apr 7 16:22:42 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D1A3E3A6E05 for ; Tue, 7 Apr 2009 16:22:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.814 X-Spam-Level: X-Spam-Status: No, score=-0.814 tagged_above=-999 required=5 tests=[AWL=-0.262, BAYES_00=-2.599, HELO_EQ_SE=0.35, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, MIME_QP_LONG_LINE=1.396] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 233YwEnnAb57 for ; Tue, 7 Apr 2009 16:22:41 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8BA473A68ED for ; Tue, 7 Apr 2009 16:20:42 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37N0bSH032608 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Apr 2009 16:00:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n37N0bBX032607; Tue, 7 Apr 2009 16:00:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37N0XGZ032599 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 7 Apr 2009 16:00:35 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 79598 invoked from network); 7 Apr 2009 23:00:42 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 7 Apr 2009 23:00:42 -0000 Received: (qmail 89598 invoked from network); 7 Apr 2009 23:00:32 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 7 Apr 2009 23:00:32 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 08 Apr 2009 01:00:29 +0200 Subject: Re: Revocation scheme definition From: Stefan Santesson To: Jorge =?ISO-8859-1?B?TPNwZXo=?= , Message-ID: Thread-Topic: Revocation scheme definition Thread-Index: Acm31KU9P6Updu1cdk2ECIQhTrzzMA== In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321997232_36557475" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321997232_36557475 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Jorge, Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :) Other than that I feel sympathetic to your distinction between revocation and validation. It is however my belief that we have used that distinction in our standards efforts. /Stefan On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: > Hi all, >=20 > Next I merely offer personal considerations about the (in my opinion) > confusing scenario of PKI terminology classification. I would appreciate = any > comment on this. >=20 > As can be seen in the literature, most people define CRL, Partitioned CRL= , > Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status= , > Certificate Revocation Tree, etc. as revocation schemes. I think this > "classification" is confusing. >=20 > I personally consider a revocation scheme as a scheme/protocol where the = owner > (or an authorised party) is able to revocate the status of her certificat= e. > For example, the one defined in RFC 4210 CMP. However, the terms mentione= d > above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechan= isms > to make that data structure available to others (Over-Issued CRL, Over-Is= sued > Segmented CRL, etc.) and both the managed data structure and the associat= ed > publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). But = none > of them to the procedure to be followed in order to revocate the certific= ate! > If fact OCSP is sometimes referenced as a revocation scheme, when it is > actually focused on "just" checking the revocation status of a certificat= e... >=20 > From my viewpoint, I would differentiate among the scheme, the certificat= e > status information itself - CSI (data structure) - and the method that > distributes/publishes the CSI. A revocation scheme updates the CSI. Howev= er, > the publication/distribution method is oriented to support the validation= of > certificates. IMHO it has nothing to do with a revocation scheme. Perhaps= you > may consider appropiate to include in the term "revocation scheme" everyt= hing > that has something to do with the revocation information... >=20 > Therefore, I distinguish a revocation scheme from another type of scheme > (validation scheme) which aim is to check the status of a certificate tak= ing > into account the CSI. This CSI could be distributed/published by using on= e of > the methods defined above, or accessed in an online manner (an OCSP servi= ce > that retrieves the CSI from a fresh database). >=20 > I guess that the revocation scheme term has been extended to things not s= o > related to the revocation itself, like the validation procedure. I just w= ant > to know what the PKI community think about this. >=20 > Thanks in advance, >=20 > -------- > Jorge Lopez Hernandez-Ardieta >=20 >=20 >=20 --B_3321997232_36557475 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: Revocation scheme definition Jorge,

Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :)

Other than that I feel sympathetic to your distinction between revocation a= nd validation. It is however my belief that we have used that distinction in= our standards efforts.

/Stefan



On 4/7/09 1:42 PM, "Jorge López" <jlopez.ha@gmail.com> wrote:

<= SPAN STYLE=3D'font-size:11pt'>Hi all,

Next I merely offer personal considerations about the (in my opinion) confu= sing scenario of PKI terminology classification. I would appreciate any comm= ent on this.

As can be seen in the literature, most people define CRL, Partitioned CRL, = Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status, C= ertificate Revocation Tree, etc. as revocation schemes. I think this "c= lassification" is confusing.

I personally consider a revocation scheme as a scheme/protocol where the ow= ner (or an authorised party) is able to revocate the status of her certifica= te. For example, the one defined in RFC 4210 CMP. However, the terms mention= ed above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechan= isms to make that data structure available to others (Over-Issued CRL, Over-= Issued Segmented CRL, etc.) and both the managed data structure and the asso= ciated publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). = But none of them to the procedure to be followed in order to revocate the ce= rtificate! If fact OCSP is sometimes referenced as a revocation scheme, when= it is actually focused on "just" checking the revocation status o= f a certificate...

>From my viewpoint, I would differentiate among the scheme, the certificate = status information itself - CSI (data structure) - and the method that distr= ibutes/publishes the CSI. A revocation scheme updates the CSI. However, the = publication/distribution method is oriented to support the validation of cer= tificates. IMHO it has nothing to do with a revocation scheme. Perhaps you m= ay consider appropiate to include in the term "revocation scheme" = everything that has something to do with the revocation information...

Therefore, I distinguish a revocation scheme from another type of scheme (v= alidation scheme) which aim is to check the status of a certificate taking i= nto account the CSI. This CSI could be distributed/published by using one of= the methods defined above, or accessed in an online manner (an OCSP service= that retrieves the CSI from a fresh database).

I guess that the revocation scheme term has been extended to things not so = related to the revocation itself, like the validation procedure. I just want= to know what the PKI community think about this.

Thanks in advance,

--------
Jorge Lopez Hernandez-Ardieta



--B_3321997232_36557475-- From owner-ietf-pkix@mail.imc.org Wed Apr 8 07:48:15 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 343883A69B7 for ; Wed, 8 Apr 2009 07:48:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -7.132 X-Spam-Level: X-Spam-Status: No, score=-7.132 tagged_above=-999 required=5 tests=[AWL=1.167, BAYES_00=-2.599, GB_I_LETTER=-2, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id buZwk-ia-LBM for ; Wed, 8 Apr 2009 07:48:14 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7DCE53A6953 for ; Wed, 8 Apr 2009 07:48:13 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n38EJgLS002029 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 8 Apr 2009 07:19:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n38EJgBf002028; Wed, 8 Apr 2009 07:19:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n38EJec5002019 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 8 Apr 2009 07:19:41 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha2.nist.gov [129.6.16.198]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id n38EJhod001433; Wed, 8 Apr 2009 10:19:43 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id n38EJPD7029326; Wed, 8 Apr 2009 10:19:26 -0400 Message-ID: <49DCB26D.5050202@nist.gov> Date: Wed, 08 Apr 2009 10:19:25 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.21 (X11/20090330) MIME-Version: 1.0 To: =?ISO-8859-1?Q?Jorge_L=F3pez?= , Stefan Santesson CC: pkix Subject: Re: Revocation scheme definition References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 8bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan Santesson wrote: > Despite that I would love to put CSI expert on my business card, it > might be a bit problematic to hijack this acronym :) Yes, RFC 5513 points out the problem of the overuse of three letter acronyms (granted it is an April 1 RFC). If we used the acronym CSI, most people would tend to immediately think of the College of Southern Idaho ... I mean the College of Staten Island ... Computer Security Institute ... Construction Specifications Institute ... Commodity Systems Inc. ... Computers & Structures, Inc. ... Chi Sigma Iota ... Christian Schools International ... Computational Systems, Inc. ... Christian Solidarity International ... California Solar Initiative ... Canadian Solar Inc. ... Chandler Systems Inc. ... Communications Specialties, Inc. ... Cetacean Society International ... Coalition of Service Industries ... Church of South India ... Computer Society of India ... Cellular Specialties, Inc. ... College Student Insurance ... Custom Systems Integration ... Center for Social Innovation ... Center for Sustainable Innovation ... Creative Specialties International ... Control Sciences Inc. ... Conditional Symmetric Instability ... Community Services Infrastructure ... Coastal Studies Institute ... Curriculum Support Information ... Control Solutions International ... Conversion Services International ... Civil Society International ... Collaborative Software Initiative ... Consolidated Systems Incorporated ... Center for the Study of Intelligence ... Combat Studies Institute ... Coatings Societies International ... Chemical Sampling Information ... California Steel Industries ... Cardiovascular Systems Inc. ... Conservation Study Institute ... Cognitive Strategy Instruction ... Compliance Services International ... Cement Sustainability Initiative ... Cyber Safety Initiative ... Center for Student Involvement ... Center for the Study of Inequality ... Chiropractic Sports Institute ... Closure Systems International ... Custom Scientific Instruments ... Crisis Simulations International ... Cooperative Sagebrush Initiative ... Child Study Institute ... Climate Status Investigations ... Centrifugal Services, Inc. ... Conflict Solutions International ... Caregiver Services, Inc. ... Charter School Institute ... Component Sources International ... So I can understand that you would be concerned that if you referred to yourself as a CSI expert, people might think you meant that you were an expert in Computational Sciences and Informatics. > Other than that I feel sympathetic to your distinction between > revocation and validation. It is however my belief that we have used > that distinction in our standards efforts. I think it would be helpful if specific examples were provided of places in PKIX documents in which the distinction between mechanisms for distributing certificate status information (e.g., CRLs and OCSP) and mechanisms for submitting revocation requests (e.g., a CMP revocation request message) is not clear. Perhaps this confusion does appear in the literature, and those of us on this list simply don't notice it since we already clearly understand the concepts. But without being provided specific examples of text that a non-PKI expert might find confusing, it is difficult for us to judge whether this is a problem in PKIX documents that the WG needs to be more careful about in future documents. Dave > On 4/7/09 1:42 PM, "Jorge López" wrote: > > Hi all, > > Next I merely offer personal considerations about the (in my > opinion) confusing scenario of PKI terminology classification. I > would appreciate any comment on this. > > As can be seen in the literature, most people define CRL, > Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, > Certificate Revocation Status, Certificate Revocation Tree, etc. > as revocation schemes. I think this "classification" is confusing. > > I personally consider a revocation scheme as a scheme/protocol > where the owner (or an authorised party) is able to revocate the > status of her certificate. For example, the one defined in RFC > 4210 CMP. However, the terms mentioned above relate to data > structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make > that data structure available to others (Over-Issued CRL, > Over-Issued Segmented CRL, etc.) and both the managed data > structure and the associated publication mechanism (NOVOMODO, > Certificate Revocation Tree, etc.). But none of them to the > procedure to be followed in order to revocate the certificate! If > fact OCSP is sometimes referenced as a revocation scheme, when it > is actually focused on "just" checking the revocation status of a > certificate... > > From my viewpoint, I would differentiate among the scheme, the > certificate status information itself - CSI (data structure) - and > the method that distributes/publishes the CSI. A revocation scheme > updates the CSI. However, the publication/distribution method is > oriented to support the validation of certificates. IMHO it has > nothing to do with a revocation scheme. Perhaps you may consider > appropiate to include in the term "revocation scheme" everything > that has something to do with the revocation information... > > Therefore, I distinguish a revocation scheme from another type of > scheme (validation scheme) which aim is to check the status of a > certificate taking into account the CSI. This CSI could be > distributed/published by using one of the methods defined above, > or accessed in an online manner (an OCSP service that retrieves > the CSI from a fresh database). > > I guess that the revocation scheme term has been extended to > things not so related to the revocation itself, like the > validation procedure. I just want to know what the PKI community > think about this. > > Thanks in advance, > > -------- > Jorge Lopez Hernandez-Ardieta > From owner-ietf-pkix@mail.imc.org Wed Apr 8 08:29:35 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E6AFD3A6A3B for ; Wed, 8 Apr 2009 08:29:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.298 X-Spam-Level: X-Spam-Status: No, score=-3.298 tagged_above=-999 required=5 tests=[AWL=1.000, BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0eM5sh8MgKvr for ; Wed, 8 Apr 2009 08:29:34 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id BD0113A68C3 for ; Wed, 8 Apr 2009 08:29:33 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n38Ew71t005866 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 8 Apr 2009 07:58:08 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n38Ew7FS005865; Wed, 8 Apr 2009 07:58:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail-fx0-f177.google.com (mail-fx0-f177.google.com [209.85.220.177]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n38EvtQJ005840 for ; Wed, 8 Apr 2009 07:58:06 -0700 (MST) (envelope-from jlopez.ha@gmail.com) Received: by fxm25 with SMTP id 25so174748fxm.10 for ; Wed, 08 Apr 2009 07:57:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=9Z/kLQvAVeOVthHV9xhPtxDJ1CkrYeiiue5s39nsTtA=; b=r4fQH0SmXvyZSFJctoEctkEIVa5UMW2HKi2Le4nWBMxfp86drF2pcpQeG7GcIQM09o c+2GACOeR7Hjw/d3RkhmHAv1WtB4pJmvhv90K45cTUZJ+O54Enc4b1xzD0WcCGrnxoaI HhZgps7UrahjFeCn0+TSyZcdlAnf/W16d/56I= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=BN3mmPhoNEC5vvDTb12Thzc7syouzFroLftkfxm3kRMTNy8+5wEDMT83k0UkVBs6ez 3KwUcqWbnRhbvtAu9hxHP6oaaMqOTDfGOqwDwAXYG074vaQhgz9NHqZzUK8rOeeBmIoS i0G4s8Wor0OY0EBSgui9fVOIxGaGM8DtZ9VCw= MIME-Version: 1.0 Received: by 10.204.77.81 with SMTP id f17mr1202998bkk.78.1239202674915; Wed, 08 Apr 2009 07:57:54 -0700 (PDT) In-Reply-To: <49DCB26D.5050202@nist.gov> References: <49DCB26D.5050202@nist.gov> Date: Wed, 8 Apr 2009 16:57:54 +0200 Message-ID: Subject: Re: Revocation scheme definition From: =?ISO-8859-1?Q?Jorge_L=F3pez?= To: "David A. Cooper" Cc: Stefan Santesson , pkix Content-Type: multipart/alternative; boundary=001485f870603e3a0d04670c5b4e Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --001485f870603e3a0d04670c5b4e Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Thanks Stefan and Dave for your responses. Well, maybe CSI was not the best acronym as a proposal :-) I wasn't talking about PKIX documents, but some research papers, master/doctoral thesis where a classification of "revocation mechanisms" is made. I understand that these domains are out of the scope of the PKIX community, but maybe we should think of "standardizing" some concepts if th= e "rest of the world" tends to confuse them. I think that's one of the tasks of a standardization organization/work group/etc. Possibly it is not worthy to work on it focusing merely on revocation schem= e related terms, but I have been following a thread about digital certificate/end user certificate/etc. terms that seemed to be confusing as well to some folks. Is it crazy to propose an RFC Informational which collects a kind of glossary and definitions of PKIX related technology? Best, -------- Jorge Lopez Hernandez-Ardieta 2009/4/8 David A. Cooper > Stefan Santesson wrote: > >> Despite that I would love to put CSI expert on my business card, it migh= t >> be a bit problematic to hijack this acronym :) >> > > Yes, RFC 5513 points out the problem of the overuse of three letter > acronyms (granted it is an April 1 RFC). If we used the acronym CSI, mos= t > people would tend to immediately think of the College of Southern Idaho .= .. > I mean the College of Staten Island ... Computer Security Institute ... > Construction Specifications Institute ... Commodity Systems Inc. ... > Computers & Structures, Inc. ... Chi Sigma Iota ... Christian Schools > International ... Computational Systems, Inc. ... Christian Solidarity > International ... California Solar Initiative ... Canadian Solar Inc. ... > Chandler Systems Inc. ... Communications Specialties, Inc. ... Cetacean > Society International ... Coalition of Service Industries ... Church of > South India ... Computer Society of India ... Cellular Specialties, Inc. = ... > College Student Insurance ... Custom Systems Integration ... Center for > Social Innovation ... Center for Sustainable Innovation ... Creative > Specialties International ... Control Sciences Inc. ... Conditional > Symmetric Instability ... Community Services Infrastructure ... Coastal > Studies Institute ... Curriculum Support Information ... Control Solution= s > International ... Conversion Services International ... Civil Society > International ... Collaborative Software Initiative ... Consolidated Syst= ems > Incorporated ... Center for the Study of Intelligence ... Combat Studies > Institute ... Coatings Societies International ... Chemical Sampling > Information ... California Steel Industries ... Cardiovascular Systems In= c. > ... Conservation Study Institute ... Cognitive Strategy Instruction ... > Compliance Services International ... Cement Sustainability Initiative ..= . > Cyber Safety Initiative ... Center for Student Involvement ... Center for > the Study of Inequality ... Chiropractic Sports Institute ... Closure > Systems International ... Custom Scientific Instruments ... Crisis > Simulations International ... Cooperative Sagebrush Initiative ... Child > Study Institute ... Climate Status Investigations ... Centrifugal Service= s, > Inc. ... Conflict Solutions International ... Caregiver Services, Inc. ..= . > Charter School Institute ... Component Sources International ... > > So I can understand that you would be concerned that if you referred to > yourself as a CSI expert, people might think you meant that you were an > expert in Computational Sciences and Informatics. > > Other than that I feel sympathetic to your distinction between revocatio= n >> and validation. It is however my belief that we have used that distincti= on >> in our standards efforts. >> > > I think it would be helpful if specific examples were provided of places = in > PKIX documents in which the distinction between mechanisms for distributi= ng > certificate status information (e.g., CRLs and OCSP) and mechanisms for > submitting revocation requests (e.g., a CMP revocation request message) i= s > not clear. Perhaps this confusion does appear in the literature, and tho= se > of us on this list simply don't notice it since we already clearly > understand the concepts. But without being provided specific examples of > text that a non-PKI expert might find confusing, it is difficult for us t= o > judge whether this is a problem in PKIX documents that the WG needs to be > more careful about in future documents. > > Dave > > > On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: >> >> Hi all, >> >> Next I merely offer personal considerations about the (in my >> opinion) confusing scenario of PKI terminology classification. I >> would appreciate any comment on this. >> >> As can be seen in the literature, most people define CRL, >> Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, >> Certificate Revocation Status, Certificate Revocation Tree, etc. >> as revocation schemes. I think this "classification" is confusing. >> >> I personally consider a revocation scheme as a scheme/protocol >> where the owner (or an authorised party) is able to revocate the >> status of her certificate. For example, the one defined in RFC >> 4210 CMP. However, the terms mentioned above relate to data >> structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make >> that data structure available to others (Over-Issued CRL, >> Over-Issued Segmented CRL, etc.) and both the managed data >> structure and the associated publication mechanism (NOVOMODO, >> Certificate Revocation Tree, etc.). But none of them to the >> procedure to be followed in order to revocate the certificate! If >> fact OCSP is sometimes referenced as a revocation scheme, when it >> is actually focused on "just" checking the revocation status of a >> certificate... >> >> From my viewpoint, I would differentiate among the scheme, the >> certificate status information itself - CSI (data structure) - and >> the method that distributes/publishes the CSI. A revocation scheme >> updates the CSI. However, the publication/distribution method is >> oriented to support the validation of certificates. IMHO it has >> nothing to do with a revocation scheme. Perhaps you may consider >> appropiate to include in the term "revocation scheme" everything >> that has something to do with the revocation information... >> >> Therefore, I distinguish a revocation scheme from another type of >> scheme (validation scheme) which aim is to check the status of a >> certificate taking into account the CSI. This CSI could be >> distributed/published by using one of the methods defined above, >> or accessed in an online manner (an OCSP service that retrieves >> the CSI from a fresh database). >> >> I guess that the revocation scheme term has been extended to >> things not so related to the revocation itself, like the >> validation procedure. I just want to know what the PKI community >> think about this. >> >> Thanks in advance, >> >> -------- >> Jorge Lopez Hernandez-Ardieta >> >> > --001485f870603e3a0d04670c5b4e Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Thanks Stefan and Dave for your responses.

We= ll, maybe CSI was not the best acronym as a proposal :-)

I wasn't talking about PKIX documents, but some research papers,= master/doctoral thesis where a classification of "revocation mechanis= ms" is made. I understand that these domains are out of the scope of t= he PKIX community, but maybe we should think of "standardizing" s= ome concepts if the "rest of the world" tends to confuse them. I = think that's one of the tasks of a standardization organization/work gr= oup/etc.

Possibly it is not worthy to work on it focusing merely= on revocation scheme related terms, but I have been following a thread abo= ut digital certificate/end user certificate/etc. terms that seemed to be co= nfusing as well to some folks.

Is it crazy to propose an RFC Informational which colle= cts a kind of glossary and definitions of PKIX related technology?

Best,

--------
Jorge Lo= pez Hernandez-Ardieta

2009/4/8 David A. Cooper &= lt;david.cooper@nist.gov>
Stefan Santesson wrote:
Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :)

Yes, RFC 5513 points out the problem of the overuse of three letter acronym= s (granted it is an April 1 RFC). =A0If we used the acronym CSI, most peopl= e would tend to immediately think of the College of Southern Idaho ... I me= an the College of Staten Island ... Computer Security Institute ... Constru= ction Specifications Institute ... Commodity Systems Inc. ... Computers &am= p; Structures, Inc. ... Chi Sigma Iota ... Christian Schools International = ... Computational Systems, Inc. ... Christian Solidarity International ... = California Solar Initiative ... Canadian Solar Inc. ... Chandler Systems In= c. ... Communications Specialties, Inc. ... Cetacean Society International = ... Coalition of Service Industries ... Church of South India ... Computer = Society of India ... Cellular Specialties, Inc. ... College Student Insuran= ce ... Custom Systems Integration ... Center for Social Innovation ... Cent= er for Sustainable Innovation ... Creative Specialties International ... Co= ntrol Sciences Inc. ... Conditional Symmetric Instability ... Community Ser= vices Infrastructure ... Coastal Studies Institute ... Curriculum Support I= nformation ... Control Solutions International ... Conversion Services Inte= rnational ... Civil Society International ... Collaborative Software Initia= tive ... Consolidated Systems Incorporated ... Center for the Study of Inte= lligence ... Combat Studies Institute ... Coatings Societies International = ... Chemical Sampling Information ... California Steel Industries ... Cardi= ovascular Systems Inc. ... Conservation Study Institute ... =A0Cognitive St= rategy Instruction ... Compliance Services International ... Cement Sustain= ability Initiative ... Cyber Safety Initiative ... Center for Student Invol= vement ... Center for the Study of Inequality ... Chiropractic Sports Insti= tute ... Closure Systems International ... Custom Scientific Instruments ..= . Crisis Simulations International ... Cooperative Sagebrush Initiative ...= Child Study Institute ... Climate Status Investigations ... Centrifugal Se= rvices, Inc. ... Conflict Solutions International ... Caregiver Services, I= nc. ... Charter School Institute ... Component Sources International ...
So I can understand that you would be concerned that if you referred to you= rself as a CSI expert, people might think you meant that you were an expert= in Computational Sciences and Informatics.


Other than that I feel sympathetic to your distinction between revocation a= nd validation. It is however my belief that we have used that distinction i= n our standards efforts.

I think it would be helpful if specific examples were provided of places in= PKIX documents in which the distinction between mechanisms for distributin= g certificate status information (e.g., CRLs and OCSP) and mechanisms for s= ubmitting revocation requests (e.g., a CMP revocation request message) is n= ot clear. =A0Perhaps this confusion does appear in the literature, and thos= e of us on this list simply don't notice it since we already clearly un= derstand the concepts. =A0But without being provided specific examples of t= ext that a non-PKI expert might find confusing, it is difficult for us to j= udge whether this is a problem in PKIX documents that the WG needs to be mo= re careful about in future documents.

Dave


On 4/7/09 1:42 PM, "Jorge L=F3pez" <jlopez.ha@gmail.com> wrote:

=A0 =A0Hi all,

=A0 =A0Next I merely offer personal considerations about the (in my
=A0 =A0opinion) confusing scenario of PKI terminology classification. I =A0 =A0would appreciate any comment on this.

=A0 =A0As can be seen in the literature, most people define CRL,
=A0 =A0Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO,
=A0 =A0Certificate Revocation Status, Certificate Revocation Tree, etc. =A0 =A0as revocation schemes. I think this "classification" is c= onfusing.

=A0 =A0I personally consider a revocation scheme as a scheme/protocol
=A0 =A0where the owner (or an authorised party) is able to revocate the =A0 =A0status of her certificate. For example, the one defined in RFC
=A0 =A04210 CMP. However, the terms mentioned above relate to data
=A0 =A0structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make =A0 =A0that data structure available to others (Over-Issued CRL,
=A0 =A0Over-Issued Segmented CRL, etc.) and both the managed data
=A0 =A0structure and the associated publication mechanism (NOVOMODO,
=A0 =A0Certificate Revocation Tree, etc.). But none of them to the
=A0 =A0procedure to be followed in order to revocate the certificate! If =A0 =A0fact OCSP is sometimes referenced as a revocation scheme, when it =A0 =A0is actually focused on "just" checking the revocation sta= tus of a
=A0 =A0certificate...

=A0 =A0From my viewpoint, I would differentiate among the scheme, the
=A0 =A0certificate status information itself - CSI (data structure) - and<= br> =A0 =A0the method that distributes/publishes the CSI. A revocation scheme<= br> =A0 =A0updates the CSI. However, the publication/distribution method is =A0 =A0oriented to support the validation of certificates. IMHO it has
=A0 =A0nothing to do with a revocation scheme. Perhaps you may consider =A0 =A0appropiate to include in the term "revocation scheme" eve= rything
=A0 =A0that has something to do with the revocation information...

=A0 =A0Therefore, I distinguish a revocation scheme from another type of =A0 =A0scheme (validation scheme) which aim is to check the status of a =A0 =A0certificate taking into account the CSI. This CSI could be
=A0 =A0distributed/published by using one of the methods defined above, =A0 =A0or accessed in an online manner (an OCSP service that retrieves
=A0 =A0the CSI from a fresh database).

=A0 =A0I guess that the revocation scheme term has been extended to
=A0 =A0things not so related to the revocation itself, like the
=A0 =A0validation procedure. I just want to know what the PKI community =A0 =A0think about this.

=A0 =A0Thanks in advance,

=A0 =A0--------
=A0 =A0Jorge Lopez Hernandez-Ardieta



--001485f870603e3a0d04670c5b4e-- From owner-ietf-pkix@mail.imc.org Thu Apr 9 08:58:48 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E97CF3A6CB3 for ; Thu, 9 Apr 2009 08:58:48 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.138 X-Spam-Level: X-Spam-Status: No, score=-0.138 tagged_above=-999 required=5 tests=[AWL=-1.224, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, EXTRA_MPART_TYPE=1, HTML_MESSAGE=0.001, HTTP_ESCAPED_HOST=0.134, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KQhJBjAsmVcx for ; Thu, 9 Apr 2009 08:58:47 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 99A723A6BAF for ; Thu, 9 Apr 2009 08:58:44 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39Fa78r026216 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 08:36:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39Fa78j026215; Thu, 9 Apr 2009 08:36:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n39FZtsh026198 for ; Thu, 9 Apr 2009 08:36:06 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 20817 invoked from network); 9 Apr 2009 15:34:38 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 9 Apr 2009 15:34:38 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/related; boundary="----_=_NextPart_001_01C9B928.DDECEF6D"; type="multipart/alternative" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 11:35:52 -0400 Message-ID: In-Reply-To: <7B01F815F4064ABEB6447E403CA12C56@ERA1> X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOwAAKEOVA= References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> From: "Santosh Chokhani" To: , "ietf-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B928.DDECEF6D Content-Type: multipart/alternative; boundary="----_=_NextPart_002_01C9B928.DDECEF6D" ------_=_NextPart_002_01C9B928.DDECEF6D Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Erik, =20 See responses inline. ________________________________ From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: Thursday, April 09, 2009 11:26 AM To: x500standard@freelists.org; 'ietf-pkix' Subject: [x500standard] Re: Certificate definitions =09 =09 Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the = apparent inactivity of people, I have the power to produce Defect = Reports, produce Draft Technical Corrigenda, run them through both the = ISO and ITU-T approval process and finally integrate them into the next = edition of X.500 (incl. X.509) without being stopped by anyone (except = for Jean-Paul Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. = Let me express myself without the diagram. =20 The set of certificates is the union of the set of public-key = certificates and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key = certificates issued to end-entities and the set of attribute = certificates issued to end-entities. However, X.509 is a little = confusing here as the term end-entity certificate is sometimes meant to = be just public-key certificates issued to end-entities, so the term = end-entity certificate has two meanings. =20 The set of public-key certificates is the union of the set of = end-entity (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of end-entity = (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA = certificates and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued = (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute = certificate.=20 =20 [Santosh]: The above paragraph has two inaccuracies. Since not all CA = certificates are called cross certificates, set of CA certificates are = self-issued, cross certificate, and subordinate CA certificates. (I = wish we had not distinguished between cross certificates and subordinate = CA certificates in the first place). Also note that a cross certificate = can not be attribute certificate. I don't see an AA cross certificate = in RFC 3281 or in X.509 =20 I am avoiding here to use the term "user attribute", but believe it is = supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term "certificate", he/she is = entitled to believe it can either be a public-key certificate. It may = not always be clear from the context what is meant. =20 Whenever an innocent us reader see the term "end-entity certificate", = he/she is entitled to believe it is either a public key certificate or = an attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term "cross-certificate", = he/she is entitled to believe it is either a public key certificate or = an attribute certificate.=20 [Santosh]: See prior comment.=20 =20 My proposal was only to clear-up the terminology and to use the = terminology consistent in the text of X.509. Trying to do the latter may = raise a number of detailed questions when the meaning is not absolutely = clear from the context. =20 =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =20 Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too = long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a = public-key certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute = Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions =20 I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little = that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the = terminology and then produced below figure. I will not comment all the = boxes. =20 =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first = time in clause 7 as a public-key certificate. There are several other = places where it is a public-key certificate. In 15.5.2.4 is used in the = context of attribute certificates. The conclusion must be that an = end-entity certificate can either be a end-entity public-key certificate = or an end-entity attribute certificate. However, in most places, it is = implied that we only talks about public-key certificates. For veterans, = this is not a major problem, but new-comers may get confused. Anyway, I = thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to = use the term "certificate" as a synonym for "end-entrity public key = certificate". =20 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is = also used in X.511. RFC 5280 uses the term once without differenting it = from just "certificate". =20 The term "cross-certificate" should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 "end-entity public-key certificate" "user certificate" as a synonym for "end-entity public-key = certificate" "end-entity attribute certificate" =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attribute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------_=_NextPart_002_01C9B928.DDECEF6D Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Erik,
 
See responses inline.


From: = x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik=20 Andersen
Sent: Thursday, April 09, 2009 11:26 = AM
To:=20 x500standard@freelists.org; 'ietf-pkix'
Subject: = [x500standard] Re:=20 Certificate definitions

Hi=20 Denis,

 

It is a=20 little dangerous not to respond to my comments. Due to the apparent = inactivity=20 of people, I have the power to produce Defect Reports, produce Draft = Technical=20 Corrigenda, run them through both the ISO and ITU-T approval process = and=20 finally integrate them into the next edition of X.500 (incl. X.509) = without=20 being stopped by anyone (except for Jean-Paul Lemaire).

 

I believe=20 you misunderstood my diagram. It may be a little confusing. Let me = express=20 myself without the diagram.

 

The set of=20 certificates is the union of the set of public-key certificates and = the set of=20 attribute certificates.

 

The set of=20 end-entity certificates is the union of public-key certificates issued = to=20 end-entities and the set of attribute certificates issued to = end-entities.=20 However, X.509 is a little confusing here as the term end-entity = certificate=20 is sometimes meant to be just public-key certificates issued to = end-entities,=20 so the term end-entity certificate has two meanings.

 

The set of=20 public-key certificates is the union of the set of end-entity = (public-key)=20 certificates and the set of CA certificates.

 

The set of=20 attribute certificates is the union of the set of end-entity = (attribute)=20 certificates and the set of AA certificates.

 

The set of=20 authority certificates is the union of the set CA certificates and the = set of=20 AA certificates.

 

The set of=20 CA certificates is the union of the set of self-issued (public-key)=20 certificates and the set cross certificates. The latter is a little = confusing,=20 as a cross certificate can also be an attribute certificate. 

 

[Santosh]: The above = paragraph=20 has two inaccuracies.  Since not all CA certificates = are called=20 cross certificates, set of CA certificates are self-issued, cross = certificate,=20 and subordinate CA certificates.  (I wish we had not = distinguished=20 between cross certificates and subordinate CA certificates in the = first=20 place).  Also note that a cross certificate can not be attribute=20 certificate.  I don't see an AA cross certificate in RFC 3281 or = in=20 X.509

 

I am=20 avoiding here to use the term =93user attribute=94, but believe it is = supposed to=20 mean a public-key certificate issued to an = end-entity.

 

Whenever=20 an innocent reader sees the term =93certificate=94, he/she is entitled = to believe=20 it can either be a public-key certificate. It may not always be clear = from the=20 context what is meant.

 

Whenever=20 an innocent us  reader see the term =93end-entity certificate=94, = he/she is=20 entitled to believe it is either a public key certificate or an = attribute=20 certificate issued to an end-entity.

 

Whenever=20 an innocent us  reader see the term =93cross-certificate=94, = he/she is=20 entitled to believe it is either a public key certificate or an = attribute=20 certificate. 

[Santosh]: See = prior=20 comment. 

 

My=20 proposal was only to clear-up the terminology and to use the = terminology=20 consistent in the text of X.509. Trying to do the latter may raise a = number of=20 detailed questions when the meaning is not absolutely clear from the = context.=20  

 

Erik=20 Andersen

Andersen's=20 L-Service

Elsevej=20 48, DK-3500=20 Vaerloese

Denmark

Mobile: +45 = 2097=20 1490

email:=20 era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original=20 Message-----
From:=20 x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org]=20 On Behalf Of Denis=20 Pinkas
Sent: 3. = april 2009=20
17:33
To: x500 list; =
ietf-pkix
Subject:
[x500standard] Re: = Certificate=20 definitions

 

Eric,

 

Silence = does not mean=20 approval.

 

It may = mean that=20 the corrections are so numerous that it would take too long to=20 respond

and that = people do not=20 have that time available at the moment.

 

e.g.:  an=20 End-entity attribute certificate is not linked to a public-key=20 certificate.

         a=20 cross-certificate is not linked to an AA = certificate.

         an = Authority=20 Certificate is not linked to an Attribute = Certificate.

 

This is = only a=20 start ...

 

Denis

----- = Message re=E7u=20 -----

De=20 : = owner-ietf-pkix=20

=C0=20 : = x500standard,'PKIX'=20

Date : = 2009-04-03,=20 17:00:01

Sujet : RE: = [x500standard]=20 Certificate definitions

 

I take silence as approval.

 

Erik=20 Andersen

Andersen's=20 L-Service

Elsevej = 48, DK-3500=20 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original=20 Message-----
From:=20 x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org]=20 On Behalf Of Erik=20 Andersen
Sent: 1. = april=20 2009 14:40
To: = Directory=20 list; PKIX
Subject:=20 [x500standard] Certificate definitions

 

Hi

 

I got a = number of=20 responses on user certificates, but quite little that actually = answered my=20 question.

 

I have = tried to dig a=20 little bit more in X.509 to get hold of the terminology and then = produced=20 below figure. I will not comment all the boxes.

 

 

I will = like you to=20 comments as to the correctness of above figure.

 

The = end-entity=20 certificate is not defined in the definition clause. However it is = used=20 widely in the main text. It is mentioned the first time in clause 7 = as a=20 public-key certificate. There are several other places where it is a = public-key certificate. In 15.5.2.4 is used in the context of = attribute=20 certificates. The conclusion must be that an end-entity certificate = can=20 either be a end-entity public-key certificate or an end-entity = attribute=20 certificate. However, in most places, it is implied that we only = talks about=20 public-key certificates. For veterans, this is not a major problem, = but=20 new-comers may get confused. Anyway, I thing our specifications = should be=20 clear and not subject to interpretation. RFC 5280 does not use the = term at=20 all. It seems just to use the term =93certificate=94 as a synonym = for=20 =93end-entrity public key certificate=94.

 

The = =93User=20 Certificate=94  is not defined in X.509, but is wide used. It = seems to be=20 a synonym for =93end-entrity public key certificate=94. It is also = used in=20 X.511. RFC 5280 uses the term once without differenting it from just = =93certificate=94.

 

The term=20 =93cross-certificate=94 should probably also be = qualified.

 

I suggest = to add in=20 X.509 definitions for:

 

=93end-entity=20 public-key certificate=94

=93user = certificate=94 as=20 a synonym for =93end-entity public-key = certificate=94

=93end-entity attribute=20 certificate=94

 

The X.509 = text should=20 be updated to make use of these definitions.

 

X.509 has = four=20 attribute types for holding certificates.

 

UserCertificate: For=20 end-entity public-key certificates

cAcertificate: For CA=20 certificates

attributeCertificateAttribute: For end-entity attribute = certificates

aACertificate: For AA=20 Certificates

 

Any=20 comments?

 

Erik = Andersen

Andersen's=20 L-Service

Elsevej 48, DK-3500=20 Vaerloese

Denmark

Mobile: = +45 2097=20 1490

email:=20 era@x500.eu

www.x500.eu

www.x500standard.com

 

------_=_NextPart_002_01C9B928.DDECEF6D-- ------_=_NextPart_001_01C9B928.DDECEF6D Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: <462263115@09042009-1BCF> Content-Description: image001.gif Content-Location: image001.gif R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------_=_NextPart_001_01C9B928.DDECEF6D-- From owner-ietf-pkix@mail.imc.org Thu Apr 9 08:59:05 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1AF4F3A6BAF for ; Thu, 9 Apr 2009 08:59:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 2.405 X-Spam-Level: ** X-Spam-Status: No, score=2.405 tagged_above=-999 required=5 tests=[AWL=0.026, BAYES_40=-0.185, HELO_EQ_DK=1.009, HTML_MESSAGE=0.001, HTTP_ESCAPED_HOST=0.134, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bkpYEHi1B3CL for ; Thu, 9 Apr 2009 08:58:56 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 31DC83A6CB3 for ; Thu, 9 Apr 2009 08:58:54 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39FQ0xa025396 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 08:26:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39FQ03j025395; Thu, 9 Apr 2009 08:26:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail02.dandomain.dk (mail02.dandomain.dk [194.150.112.202]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39FPkJK025382 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 9 Apr 2009 08:25:58 -0700 (MST) (envelope-from era@x500.eu) Received: from ERA1 ([95.209.182.175]) by mail02.dandomain.dk (DanDomain Mailserver) with ASMTP id QTI80738; Thu, 09 Apr 2009 17:25:38 +0200 From: "Erik Andersen" To: , "'ietf-pkix'" Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 17:25:37 +0200 Message-ID: <7B01F815F4064ABEB6447E403CA12C56@ERA1> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0000_01C9B938.35920940" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6838 Importance: Normal Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOw In-Reply-To: X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0000_01C9B938.35920940 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0001_01C9B938.35920940" ------=_NextPart_001_0001_01C9B938.35920940 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the = apparent inactivity of people, I have the power to produce Defect Reports, = produce Draft Technical Corrigenda, run them through both the ISO and ITU-T = approval process and finally integrate them into the next edition of X.500 (incl. X.509) without being stopped by anyone (except for Jean-Paul Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. = Let me express myself without the diagram. =20 The set of certificates is the union of the set of public-key = certificates and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key = certificates issued to end-entities and the set of attribute certificates issued to end-entities. However, X.509 is a little confusing here as the term end-entity certificate is sometimes meant to be just public-key = certificates issued to end-entities, so the term end-entity certificate has two = meanings. =20 The set of public-key certificates is the union of the set of end-entity (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of end-entity (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA = certificates and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute certificate. =20 I am avoiding here to use the term =93user attribute=94, but believe it = is supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term =93certificate=94, he/she is = entitled to believe it can either be a public-key certificate. It may not always = be clear from the context what is meant. =20 Whenever an innocent us reader see the term =93end-entity = certificate=94, he/she is entitled to believe it is either a public key certificate or = an attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term =93cross-certificate=94, = he/she is entitled to believe it is either a public key certificate or an = attribute certificate. =20 My proposal was only to clear-up the terminology and to use the = terminology consistent in the text of X.509. Trying to do the latter may raise a = number of detailed questions when the meaning is not absolutely clear from the context. =20 =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =20 Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too = long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a public-key certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute = Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions =20 I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first time in = clause 7 as a public-key certificate. There are several other places where it = is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term = at all. It seems just to use the term =93certificate=94 as a synonym for =93end-entrity public key certificate=94. =20 The =93User Certificate=94 is not defined in X.509, but is wide used. = It seems to be a synonym for =93end-entrity public key certificate=94. It is also = used in X.511. RFC 5280 uses the term once without differenting it from just =93certificate=94. =20 The term =93cross-certificate=94 should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 =93end-entity public-key certificate=94 =93user certificate=94 as a synonym for =93end-entity public-key = certificate=94 =93end-entity attribute certificate=94 =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attribute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------=_NextPart_001_0001_01C9B938.35920940 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

Hi = Denis,

 

It is a little = dangerous not to respond to my comments. Due to the apparent inactivity of people, = I have the power to produce Defect Reports, produce Draft Technical Corrigenda, = run them through both the ISO and ITU-T approval process and finally = integrate them into the next edition of X.500 (incl. X.509) without being stopped by = anyone (except for Jean-Paul = Lemaire).

 

I believe you = misunderstood my diagram. It may be a little confusing. Let me express myself without = the diagram.

 

The set of = certificates is the union of the set of public-key certificates and the set of = attribute certificates.

 

The set of = end-entity certificates is the union of public-key certificates issued to end-entities and the = set of attribute certificates issued to end-entities. However, X.509 is a = little confusing here as the term end-entity certificate is sometimes meant to = be just public-key certificates issued to end-entities, so the term end-entity certificate has two meanings.

 

The set of = public-key certificates is the union of the set of end-entity (public-key) = certificates and the set of CA certificates.

 

The set of = attribute certificates is the union of the set of end-entity (attribute) = certificates and the set of AA certificates.

 

The set of = authority certificates is the union of the set CA certificates and the set of AA certificates.

 

The set of CA certificates is the union of the set of self-issued (public-key) = certificates and the set cross certificates. The latter is a little confusing, as a = cross certificate can also be an attribute certificate.

 

I am avoiding = here to use the term “user attribute”, but believe it is supposed to = mean a public-key certificate issued to an end-entity.

 

Whenever an = innocent reader sees the term “certificate”, he/she is entitled to believe = it can either be a public-key certificate. It may not always be clear from the = context what is meant.

 

Whenever an = innocent us =A0reader see the term “end-entity certificate”, he/she is entitled to believe it is either a public key certificate or an attribute = certificate issued to an end-entity.

 

Whenever an = innocent us =A0reader see the term “cross-certificate”, he/she is entitled to = believe it is either a public key certificate or an attribute = certificate.

 

My proposal was = only to clear-up the terminology and to use the terminology consistent in the text of = X.509. Trying to do the latter may raise a number of detailed questions when the = meaning is not absolutely clear from the context. =A0

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, = DK-3500 Vaerloese

Denmark

Mobile: +45 2097 = 1490

email: era@x500.eu

www.x500.eu

www.x500standard.= com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas
Sent: 3. april 2009 =
17:33
To: x500 list; =
ietf-pkix
Subject: [x500standard] = Re: Certificate definitions

 

Eric,

 

Silence does = not mean approval.

 

It may = mean that the corrections are so numerous that it would take too long to = respond

and that = people do not have that time available at the moment.

 

e.g.:  = an End-entity attribute certificate is not linked to a public-key = certificate.

    &nb= sp;    a cross-certificate is not linked to an AA = certificate.

    &nb= sp;    an Authority Certificate is not linked to an Attribute = Certificate.

 

This is = only a start ...

 

Denis

----- Message = re=E7u -----

Date = : 2009-04-03, 17:00:01

Sujet = : RE: [x500standard] Certificate definitions

 

I take silence as approval.

 

Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen
Sent: 1. april 2009 = 14:40
To: Directory list; = PKIX
Subject: [x500standard] Certificate definitions

 

Hi

 

I got a number = of responses on user certificates, but quite little that actually answered = my question.

 

I have tried = to dig a little bit more in X.509 to get hold of the terminology and then = produced below figure. I will not comment all the boxes.

 

 

I will like = you to comments as to the correctness of above figure.

 

The end-entity certificate is not defined in the definition clause. However it is used = widely in the main text. It is mentioned the first time in clause 7 as a = public-key certificate. There are several other places where it is a public-key certificate. In 15.5.2.4 is used in the context of attribute = certificates. The conclusion must be that an end-entity certificate can either be a = end-entity public-key certificate or an end-entity attribute certificate. However, = in most places, it is implied that we only talks about public-key certificates. = For veterans, this is not a major problem, but new-comers may get confused. = Anyway, I thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.

 

The = “User Certificate”  is not defined in X.509, but is wide used. It = seems to be a synonym for “end-entrity public key certificate”. It is = also used in X.511. RFC 5280 uses the term once without differenting it from = just “certificate”.

 

The term = “cross-certificate” should probably also be qualified.

 

I suggest to = add in X.509 definitions for:

 

“end-entity public-key certificate”

“user = certificate” as a synonym for “end-entity public-key = certificate”

“end-entity attribute certificate”

 

The X.509 text = should be updated to make use of these definitions.

 

X.509 has four = attribute types for holding certificates.

 

UserCertificate: For end-entity public-key certificates

cAcertificate: = For CA certificates

attributeCertificateAttribut= e: For end-entity attribute certificates

aACertificate: = For AA Certificates

 

Any = comments?

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, DK-3500 = Vaerloese

Denmark

Mobile: +45 = 2097 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com<= /font>

 

------=_NextPart_001_0001_01C9B938.35920940-- ------=_NextPart_000_0000_01C9B938.35920940 Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_000_0000_01C9B938.35920940-- From owner-ietf-pkix@mail.imc.org Thu Apr 9 09:32:27 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 281723A6856 for ; Thu, 9 Apr 2009 09:32:27 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.72 X-Spam-Level: X-Spam-Status: No, score=-5.72 tagged_above=-999 required=5 tests=[AWL=-0.579, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SuZ7WXZMkgwu for ; Thu, 9 Apr 2009 09:32:26 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C2AD73A67EB for ; Thu, 9 Apr 2009 09:32:25 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39G9bMX028338 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 09:09:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39G9bgw028337; Thu, 9 Apr 2009 09:09:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39G9ZwY028325 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 9 Apr 2009 09:09:36 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha2.nist.gov [129.6.16.198]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id n39G9RKI025274; Thu, 9 Apr 2009 12:09:27 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id n39G9JdO015998; Thu, 9 Apr 2009 12:09:20 -0400 Message-ID: <49DE1DAF.2000307@nist.gov> Date: Thu, 09 Apr 2009 12:09:19 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.21 (X11/20090330) MIME-Version: 1.0 To: x500standard@freelists.org CC: ietf-pkix Subject: Re: [x500standard] Re: Certificate definitions References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> In-Reply-To: Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh Chokhani wrote:

[Santosh]: The above paragraph has two inaccuracies.  Since not all CA certificates are called cross certificates, set of CA certificates are self-issued, cross certificate, and subordinate CA certificates.  (I wish we had not distinguished between cross certificates and subordinate CA certificates in the first place).  Also note that a cross certificate can not be attribute certificate.  I don't see an AA cross certificate in RFC 3281 or in X.509


Santosh,

RFC 5280 says that "Cross-certificates are CA certificates in which the issuer and subject are different entities."

X.509 defines a cross-certificate as "A public-key or attribute certificate where the issuer and the subject/holder are different CAs or AAs respectively. CAs and AAs issue cross-certificates to other CAs or AAs respectively as a mechanism to authorize the subject CA's existence (e.g., in a strict hierarchy) or to recognize the existence of the subject CA or holder AA (e.g., in a distributed trust model). The cross-certificate structure is used for both of these."

So, every CA certificate is either self-issued or a cross-certificate.

I know that a lot of people seem to think that a certificate issued in a hierarchy by a hierarchically superior CA to a subordinate CA is not a "cross-certificate", that belief is not consistent with either X.509 or RFC 5280.  (Perhaps people are simply guessing the meaning of "cross-certificate", and the inclusion of "cross" in the name leads them to guess that the term does not incorporate certificates issued to subordinate CAs.)   If documents are being created that use the term "cross-certificate" to mean only CA certificates that are neither self-issued nor issued to a subordinate CA, then they are creating confusion by misusing the term.

Dave

From owner-ietf-pkix@mail.imc.org Thu Apr 9 09:43:40 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1D01A3A69B1 for ; Thu, 9 Apr 2009 09:43:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.38 X-Spam-Level: X-Spam-Status: No, score=-1.38 tagged_above=-999 required=5 tests=[AWL=0.088, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sAGeZVeGO603 for ; Thu, 9 Apr 2009 09:43:39 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 39E013A6856 for ; Thu, 9 Apr 2009 09:43:38 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39GGOKn028935 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 09:16:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39GGOLr028934; Thu, 9 Apr 2009 09:16:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n39GGNkE028928 for ; Thu, 9 Apr 2009 09:16:23 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 21115 invoked from network); 9 Apr 2009 16:15:08 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 9 Apr 2009 16:15:07 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B92E.85ED62AC" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 12:16:21 -0400 Message-ID: In-Reply-To: <49DE1DAF.2000307@nist.gov> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm5LZm+5dIHybYeQIyTtW4kxKHJXQAAMztA References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> <49DE1DAF.2000307@nist.gov> From: "Santosh Chokhani" To: Cc: "ietf-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B92E.85ED62AC Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable David, =20 We agree. That is why my parenthetical remark. ________________________________ From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of David A. Cooper Sent: Thursday, April 09, 2009 12:09 PM To: x500standard@freelists.org Cc: ietf-pkix Subject: [x500standard] Re: Certificate definitions =09 =09 Santosh Chokhani wrote:=20 [Santosh]: The above paragraph has two inaccuracies. Since not all CA certificates are called cross certificates, set of CA certificates are self-issued, cross certificate, and subordinate CA certificates. (I wish we had not distinguished between cross certificates and subordinate CA certificates in the first place). Also note that a cross certificate can not be attribute certificate. I don't see an AA cross certificate in RFC 3281 or in X.509 =09 Santosh, =09 RFC 5280 says that "Cross-certificates are CA certificates in which the issuer and subject are different entities." =09 X.509 defines a cross-certificate as "A public-key or attribute certificate where the issuer and the subject/holder are different CAs or AAs respectively. CAs and AAs issue cross-certificates to other CAs or AAs respectively as a mechanism to authorize the subject CA's existence (e.g., in a strict hierarchy) or to recognize the existence of the subject CA or holder AA (e.g., in a distributed trust model). The cross-certificate structure is used for both of these." =09 So, every CA certificate is either self-issued or a cross-certificate. =09 I know that a lot of people seem to think that a certificate issued in a hierarchy by a hierarchically superior CA to a subordinate CA is not a "cross-certificate", that belief is not consistent with either X.509 or RFC 5280. (Perhaps people are simply guessing the meaning of "cross-certificate", and the inclusion of "cross" in the name leads them to guess that the term does not incorporate certificates issued to subordinate CAs.) If documents are being created that use the term "cross-certificate" to mean only CA certificates that are neither self-issued nor issued to a subordinate CA, then they are creating confusion by misusing the term. =09 Dave =09 ----- www.x500standard.com: The central source for information on the X.500 Directory Standard.=20 ------_=_NextPart_001_01C9B92E.85ED62AC Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
David,
 
We agree.  That is why my parenthetical=20 remark.


From: = x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of David = A.=20 Cooper
Sent: Thursday, April 09, 2009 12:09 PM
To: = x500standard@freelists.org
Cc: ietf-pkix
Subject:=20 [x500standard] Re: Certificate definitions

Santosh Chokhani wrote:=20

[Santosh]: The = above=20 paragraph has two inaccuracies.  Since not all CA = certificates=20 are called cross certificates, set of CA certificates are=20 self-issued, cross certificate, and subordinate CA=20 certificates.  (I wish we had not distinguished between cross = certificates and subordinate CA certificates in the first=20 place).  Also note that a cross certificate can not be = attribute=20 certificate.  I don't see an AA cross certificate in RFC 3281 = or in=20 = X.509

=
Santosh,

RFC=20 5280 says that "Cross-certificates are CA certificates in which the = issuer and=20 subject are different entities."

X.509 defines a = cross-certificate as=20 "A public-key or attribute certificate where the issuer and the = subject/holder=20 are different CAs or AAs respectively. CAs and AAs issue = cross-certificates to=20 other CAs or AAs respectively as a mechanism to authorize the subject = CA's=20 existence (e.g., in a strict hierarchy) or to recognize the existence = of the=20 subject CA or holder AA (e.g., in a distributed trust model). The=20 cross-certificate structure is used for both of these."

So, = every CA=20 certificate is either self-issued or a cross-certificate.

I = know that a=20 lot of people seem to think that a certificate issued in a hierarchy = by a=20 hierarchically superior CA to a subordinate CA is not a = "cross-certificate",=20 that belief is not consistent with either X.509 or RFC 5280.  = (Perhaps=20 people are simply guessing the meaning of "cross-certificate", and the = inclusion of "cross" in the name leads them to guess that the term = does not=20 incorporate certificates issued to subordinate CAs.)   If = documents are=20 being created that use the term "cross-certificate" to mean only CA=20 certificates that are neither self-issued nor issued to a subordinate = CA, then=20 they are creating confusion by misusing the = term.

Dave

----- www.x500standard.com: The central source = for=20 information on the X.500 Directory Standard. = ------_=_NextPart_001_01C9B92E.85ED62AC-- From owner-ietf-pkix@mail.imc.org Thu Apr 9 15:03:37 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DF13E3A681F for ; Thu, 9 Apr 2009 15:03:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.877 X-Spam-Level: X-Spam-Status: No, score=-1.877 tagged_above=-999 required=5 tests=[AWL=0.721, BAYES_00=-2.599, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zv3o3Zwyk5vx for ; Thu, 9 Apr 2009 15:03:36 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 4C2D13A67D7 for ; Thu, 9 Apr 2009 15:03:34 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39LaLuW047700 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 14:36:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39LaLBg047699; Thu, 9 Apr 2009 14:36:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout2-sn2.hy.skanova.net (pne-smtpout2-sn2.hy.skanova.net [81.228.8.164]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39La9ZQ047687 for ; Thu, 9 Apr 2009 14:36:20 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout2-sn2.hy.skanova.net (7.3.129) id 4873CA9504118B52; Thu, 9 Apr 2009 23:36:08 +0200 Message-ID: <9727707B83B64249ADD2B570DB6D1923@AndersPC> From: "Anders Rundgren" To: "Stefan Santesson" , References: In-Reply-To: Subject: Re: - An HTML5 standard facility? Date: Thu, 9 Apr 2009 23:36:32 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0222_01C9B96C.0392F920" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0222_01C9B96C.0392F920 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable It is indeed true that the write-up refers to out-dated RFCs but since = was designed ages ago that is sort of aligned with the rest of = the scheme as well :-) IMO it doesn't really matter if gets standardized or not, it = will anyway be obviated by other solutions since doesn't = support even the most basic security features needed, like giving the = issuer an indication whether keys are stored in the file system, or are = generated and stored in a secure container like a smart card. The = technique for doing that (container attestations) has been known for a = decade or more, and since trusted HW is already a part of high-end = mobile devices, it seems pretty short-sighted not to make use of it. BTW, and its numerous cousins are actually much more important = for mobile devices than for PCs, since for the latter we already have = physical token distribution (PIV/CAC/eID etc), which I believe is the = main reason why the state of on-line key-generation doesn't exactly top = the agendas of W3C, OASIS, or the IETF. One may argue that SIM-cards = already have what it takes, but then you probably haven't tried it in = practice :-) Anders ----- Original Message -----=20 From: "Stefan Santesson" To: "Anders Rundgren" ; Sent: Wednesday, April 08, 2009 00:30 Subject: Re: - An HTML5 standard facility? I find it a bit remarkable that they reference RFC 2459 for algorithm identifier OIDs Quote: "3. Let algorithm be an ASN.1 AlgorithmIdentifier structure as defined = by RFC2459, with the algorithm field giving the ASN.1 OID used to identify signature algorithm, using the OIDs defined in section 7.2 ("Signature Algorithms") of RFC2459, and the parameters field set up as required by RFC2459 for AlgorithmIdentifier structures for that algorithm. [X690] [RFC2459]" It's a tiny bit more than slightly outdated... /Stefan On 4/7/09 10:13 PM, "Anders Rundgren" wrote: >=20 > http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-element >=20 > Since the PKI community at large seems to ignore the client-side of > PKI in browsers, the HTML 5 designers apparently didn't find any other > solution but adopting the 15 year old Netscape hack known as . >=20 > It is indeed as said in this list very simple to use etc. However, > does it really match the needs of today? >=20 > My guess FWIW, is that the serious users of on-line provisioning of = PKI > which includes governments and banks in the EU, as well as the USPTO > will continue to use entirely proprietary solutions (mostly using = Java), since > the browser-schemes are all-over-the-map and do not do signatures = either. >=20 > A few things to consider: >=20 > How could a static tag in a page mark-up language match an API > or a protocol? >=20 > Algorithm agility, isn't that a requirement these days? >=20 > PIN-codes anybody? >=20 > TPM - A dead duck? >=20 > Anders >=20 ------=_NextPart_000_0222_01C9B96C.0392F920 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
It is indeed true that=20 the write-up refers to out-dated RFCs but = since <keygen>=20 was designed ages ago that is sort of aligned with the = rest of=20 the scheme as well :-)
 
IMO it doesn't really matter if = <keygen> gets=20 standardized or not, it will anyway be obviated by other solutions since = <keygen> doesn't support even the most basic security features = needed,=20 like giving the issuer an indication whether keys are stored in the file system, or are generated and stored in a = secure=20 container like a smart card.  The technique for doing that = (container attestations) has been known for a decade or more, = and since=20 trusted HW is already a part of high-end mobile devices, it seems pretty = short-sighted not to make use of it.

BTW, <keygen> and its = numerous=20 cousins are actually much more important for mobile devices = than for=20 PCs, since for the latter we already have physical token distribution=20 (PIV/CAC/eID etc), which I believe is the main reason why the state of = on-line=20 key-generation doesn't exactly top the agendas of W3C,
OASIS, or the IETF.  One may argue that = SIM-cards=20 already have what it takes, but then = you probably=20 haven't tried it in practice :-)

Anders


----- Original = Message=20 -----
From: "Stefan Santesson" <
stefan@aaa-sec.com>
To: "Anders=20 Rundgren" <
anders.rundgren@telia.com>;=20 <ietf-pkix@imc.org>
Sent:=20 Wednesday, April 08, 2009 00:30
Subject: Re: <keygen> - An = HTML5=20 standard facility?


I find it a bit remarkable that they = reference RFC=20 2459 for algorithm
identifier OIDs

Quote:
"3. Let algorithm = be an=20 ASN.1 AlgorithmIdentifier structure as defined by
RFC2459, with the = algorithm=20 field giving the ASN.1 OID used to identify
signature algorithm, = using the=20 OIDs defined in section 7.2 ("Signature
Algorithms") of RFC2459, and = the=20 parameters field set up as required by
RFC2459 for = AlgorithmIdentifier=20 structures for that algorithm. [X690]
[RFC2459]"

It's a tiny = bit more=20 than slightly outdated...

/Stefan


On 4/7/09 10:13 PM, = "Anders=20 Rundgren" <
anders.rundgren@telia.com>=20 wrote:

>
>
http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-el= ement

>
> Since the PKI community at large = seems to ignore=20 the client-side of
> PKI in browsers, the HTML 5 designers = apparently=20 didn't find any other
> solution but adopting the 15 year old = Netscape=20 hack known as <keygen>.
>
> It is indeed as said in = this list=20 very simple to use etc.  However,
> does it really match the = needs of=20 today?
>
> My guess FWIW, is that the serious users of = on-line=20 provisioning of PKI
> which includes governments and banks in the = EU, as=20 well as the USPTO
> will continue to use entirely proprietary = solutions=20 (mostly using Java), since
> the browser-schemes are = all-over-the-map and=20 do not do signatures either.
>
> A few things to = consider:
>=20
> How could a static tag in a page mark-up language match an = API
>=20 or a protocol?
>
> Algorithm agility, isn't that a = requirement=20 these days?
>
> PIN-codes anybody?
>
> TPM - A = dead=20 duck?
>
> Anders
> =

------=_NextPart_000_0222_01C9B96C.0392F920-- From owner-ietf-pkix@mail.imc.org Thu Apr 9 16:18:51 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1EF373A6AE2 for ; Thu, 9 Apr 2009 16:18:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1XAC8TJmSEFc for ; Thu, 9 Apr 2009 16:18:50 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 15EA03A6358 for ; Thu, 9 Apr 2009 16:18:49 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39MxOJt051675 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 15:59:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39MxOSM051674; Thu, 9 Apr 2009 15:59:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp109.biz.mail.re2.yahoo.com (smtp109.biz.mail.re2.yahoo.com [206.190.53.8]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n39MxDQ3051658 for ; Thu, 9 Apr 2009 15:59:23 -0700 (MST) (envelope-from turners@ieca.com) Received: (qmail 85969 invoked from network); 9 Apr 2009 22:59:12 -0000 Received: from unknown (HELO thunderfish.local) (turners@71.191.14.4 with plain) by smtp109.biz.mail.re2.yahoo.com with SMTP; 9 Apr 2009 22:59:12 -0000 X-Yahoo-SMTP: qPTWNAeswBAtDTSn9GKlmmL3C90ke7grn_5n9To- X-YMail-OSG: WwefH1kVM1msCUJ3k0N5Isro3B4ZvBaNxNxVzPpw2rX.tbem7tasco2XJqq_1uRXeG2EL4CV5z35Cd6Ll9Uzz0IxK3fiXq1eRv6Aem6c9OhCVcW2tQWL4GEASj32Ko4nV5KsFWEMJYZ3YaLn5cey1Ca5YzarhWngN4Wx.X0CE61Uf9d_aTX_LrnJ6FKWX3VfojBwYVjzRkzsNE3k9lUqjMYYfFSYBAntBh86JHnKAl4WpDx9XHisTCXArolnUmdCJ9OtHNQm7RK3dCQieDDEuKQP1QdYvFu1yDkAJnk16.clO_t1X0b. X-Yahoo-Newman-Property: ymail-3 Message-ID: <49DE7DC0.8050501@ieca.com> Date: Thu, 09 Apr 2009 18:59:12 -0400 From: Sean Turner User-Agent: Thunderbird 2.0.0.21 (Macintosh/20090302) MIME-Version: 1.0 To: pkix Subject: PRQP: CMS Gateway Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Max, Should the CMS Gateway be renamed CMC Gateway? CMM over CMS is CMC. Also should the reference be updated to RFC 5272? spt From owner-ietf-pkix@mail.imc.org Fri Apr 10 12:40:29 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1744F3A6973 for ; Fri, 10 Apr 2009 12:40:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.472 X-Spam-Level: X-Spam-Status: No, score=-2.472 tagged_above=-999 required=5 tests=[AWL=0.127, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iQa57Hzo9bUM for ; Fri, 10 Apr 2009 12:40:28 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id B0DDD3A6853 for ; Fri, 10 Apr 2009 12:40:27 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AJBE1U029595 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 12:11:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3AJBEqO029594; Fri, 10 Apr 2009 12:11:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp102.biz.mail.re2.yahoo.com (smtp102.biz.mail.re2.yahoo.com [68.142.229.216]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3AJB1cn029571 for ; Fri, 10 Apr 2009 12:11:11 -0700 (MST) (envelope-from turners@ieca.com) Received: (qmail 53985 invoked from network); 10 Apr 2009 19:11:00 -0000 Received: from unknown (HELO thunderfish.local) (turners@96.231.117.245 with plain) by smtp102.biz.mail.re2.yahoo.com with SMTP; 10 Apr 2009 19:11:00 -0000 X-Yahoo-SMTP: qPTWNAeswBAtDTSn9GKlmmL3C90ke7grn_5n9To- X-YMail-OSG: dXsNavoVM1kbwapkdXuu_ux9kCzni.YUjnczK8muSQqwn0vUEjLvcxnSMj3q0OPDTj2FC2Bb0jNzJFIjMfSfXXxyhzcHIynwqNflz9rT16GA1AEGvhdKmVSLEWEkwpCXAakOJXF9AFYPe4NQ6zkF_s6u96pecau4sMWNpXVHJBeC6DgoDpmMfyShlPXX3pxhuLnVF3CG3R4y1YUZf4oEReS2lt9z2YJ.GJKu5272NVp1mGGsuaV0tycEXueS_qcoFxLbJYKSHX651FLIku_4DFJaiNFreOI6nm6GeGyzCLbYKArcrOULUW3jUzCjHczTyPBNbcXAzGooVFC36yloltnL2g-- X-Yahoo-Newman-Property: ymail-3 Message-ID: <49DF99C4.5000205@ieca.com> Date: Fri, 10 Apr 2009 15:11:00 -0400 From: Sean Turner User-Agent: Thunderbird 2.0.0.21 (Macintosh/20090302) MIME-Version: 1.0 To: McCann Peter-A001034 CC: gen-art@ietf.org, draft-ietf-pkix-3281update@tools.ietf.org, pkix-chairs@tools.ietf.org, pkix-ads@tools.ietf.org, ietf-pkix@imc.org Subject: Re: Gen-ART Review of draft-ietf-pkix-3281update-04 References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Pete, I'll expand the acronym and fix the spelling during AUTH48. spt McCann Peter-A001034 wrote: > I have been selected as the General Area Review Team (Gen-ART) reviewer > for this draft (for background on Gen-ART, please see > http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html). > > Please resolve these comments along with any other Last Call comments > you may receive. > > Document: draft-ietf-pkix-3281update-04 > Reviewer: Pete McCann > Review Date: 10 April 2009 > IETF LC End Date: 10 April 2009 > IESG Telechat date: unknown > > Summary: Ready for publication as a Proposed Standard > > Major issues: > > > Minor issues: > > Section 4.2.8: > this field SHOULD NOT be used by conforming CAs > I assume CA is Certificate Authority that issued the AC issuer's PKC, > but this acronym isn't expanded in the terminology section. > > > Nits/editorial comments: > > Section 7.1: > content type carried withing the ciphertext. > SHOULD BE: > content type carried within the ciphertext. > > From owner-ietf-pkix@mail.imc.org Fri Apr 10 13:12:36 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E05683A680C for ; Fri, 10 Apr 2009 13:12:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.599 X-Spam-Level: X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kp+nXyP1fkRb for ; Fri, 10 Apr 2009 13:12:36 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 857263A63EB for ; Fri, 10 Apr 2009 13:12:35 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AJlOTG031818 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 12:47:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3AJlO4v031817; Fri, 10 Apr 2009 12:47:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.cs.dartmouth.edu (mail.cs.dartmouth.edu [129.170.212.100]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AJlCXS031793 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 10 Apr 2009 12:47:23 -0700 (MST) (envelope-from Massimiliano.Pala@Dartmouth.edu) Received: from titan.cs.dartmouth.edu (mm.cs.dartmouth.edu [129.170.214.89]) (authenticated bits=0) by mail.cs.dartmouth.edu (8.14.2/8.14.2) with ESMTP id n3AJl6IH021306 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 10 Apr 2009 15:47:08 -0400 Message-ID: <49DFA346.309@Dartmouth.edu> Date: Fri, 10 Apr 2009 15:51:34 -0400 From: Massimiliano Pala Organization: Dartmouth College - Computer Science Department User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: Sean Turner CC: pkix Subject: Re: PRQP: CMS Gateway References: <49DE7DC0.8050501@ieca.com> In-Reply-To: <49DE7DC0.8050501@ieca.com> Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms060001020207000203080301" X-Virus-Scanned: ClamAV 0.93.3/9223/Fri Apr 10 10:54:59 2009 on mail.cs.dartmouth.edu X-Virus-Status: Clean Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a cryptographically signed message in MIME format. --------------ms060001020207000203080301 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Hi Sean, thanks for the comments - I just modified the current draft version with the suggested changes. There are still some changes to be done for providing TAMP support via PRQP - but I think we will finalize them next week (I shall meet with Wallace at IDTrust) and we will be ready for updating the draft. Ciao, Max Sean Turner wrote: > > Max, > > Should the CMS Gateway be renamed CMC Gateway? CMM over CMS is CMC. > Also should the reference be updated to RFC 5272? --------------ms060001020207000203080301 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJIjCC BI0wggN1oAMCAQICAhpTMA0GCSqGSIb3DQEBBQUAMHcxEzARBgoJkiaJk/IsZAEZFgNlZHUx GTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0 bW91dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMTAeFw0wNTExMDgy MDMzMDZaFw0wOTExMDkyMDMzMDZaMIHBMRMwEQYKCZImiZPyLGQBGRYDZWR1MRkwFwYKCZIm iZPyLGQBGRYJZGFydG1vdXRoMQswCQYDVQQGEwJVUzEaMBgGA1UEChMRRGFydG1vdXRoIENv bGxlZ2UxGjAYBgoJkiaJk/IsZAEBEwoxMjI1NjAyOTQ3MRowGAYDVQQDExFNYXNzaW1pbGlh bm8gUGFsYTEuMCwGCSqGSIb3DQEJARYfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVk dTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsv8obBpbhPixgdyIJj7UN0GYRNhsgWHB muCE5j8v8IvCSJWRF9spKoR0NBYgOfJu8DwQuKTIgrvbp0EC3ikrneotL4KTGD1IqWz/bSXL UR/bZAsc0r9PrvCUsZOi7wbijy784gOuqQUCJ2fJwKwk5SJ3RBaPnUROQXTp+LPSK8MCAwEA AaOCAVowggFWMA4GA1UdDwEB/wQEAwIF4DARBglghkgBhvhCAQEEBAMCBaAwgaIGA1UdIASB mjCBlzCBlAYKKwYBBAFBAgEBATCBhTA9BggrBgEFBQcCAjAxMBgWEURhcnRtb3V0aCBDb2xs ZWdlMAMCAQEaFURhcnRtb3V0aCBDb2xsZWdlIENQUzBEBggrBgEFBQcCARY4aHR0cDovL3d3 dy5kYXJ0bW91dGguZWR1L35wa2lsYWIvRGFydG1vdXRoQ1BTXzRTZXAwMy5wZGYwKgYDVR0R BCMwIYEfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVkdTAfBgNVHSMEGDAWgBQ/wNbH p08Afu8GmWdsvJYeTaN3EjA/BggrBgEFBQcBAQQzMDEwLwYIKwYBBQUHMAGGI2h0dHA6Ly9j b2xsZWdlY2EuZGFydG1vdXRoLmVkdS9vY3NwMA0GCSqGSIb3DQEBBQUAA4IBAQDEYIWmG3Ht wcgFiBbrYKp7YpI62hgAw9I3Dj9Ai+etQcMDZL8cWg3Kd7DwYHDkLxO7jl518HIJCk8Elk+Z 3Y2c0rR+c9WLuxE+EHEUmQg2AbgxzRGZAeMXj7jrv5w75IWiXBrW3SdDkjVH6MQFZVP1CBk7 PF3/+dzmiO6E5g4cVtphPSdK2qtnX7Sh0zdePzeE+e0BTnsWdN0yHgKabKx3dCiEnQXt96sA Jf5ckg7fFLcplohwWlWJCpk8WwnJM0QGw3xbrZvLk+kIQgyh0sn2va4FgA1ae29cJ1d2NurA Z+LMdei9/ZbzBeMoD9XPSYyj7zLuVXGLF/JQQoPywk5oMIIEjTCCA3WgAwIBAgICGlMwDQYJ KoZIhvcNAQEFBQAwdzETMBEGCgmSJomT8ixkARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRh cnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNVBAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYD VQQDExNEYXJ0bW91dGggQ2VydEF1dGgxMB4XDTA1MTEwODIwMzMwNloXDTA5MTEwOTIwMzMw NlowgcExEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgx CzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29sbGVnZTEaMBgGCgmSJomT8ixk AQETCjEyMjU2MDI5NDcxGjAYBgNVBAMTEU1hc3NpbWlsaWFubyBQYWxhMS4wLAYJKoZIhvcN AQkBFh9NYXNzaW1pbGlhbm8uUGFsYUBEYXJ0bW91dGguZWR1MIGfMA0GCSqGSIb3DQEBAQUA A4GNADCBiQKBgQCy/yhsGluE+LGB3IgmPtQ3QZhE2GyBYcGa4ITmPy/wi8JIlZEX2ykqhHQ0 FiA58m7wPBC4pMiCu9unQQLeKSud6i0vgpMYPUipbP9tJctRH9tkCxzSv0+u8JSxk6LvBuKP LvziA66pBQInZ8nArCTlIndEFo+dRE5BdOn4s9IrwwIDAQABo4IBWjCCAVYwDgYDVR0PAQH/ BAQDAgXgMBEGCWCGSAGG+EIBAQQEAwIFoDCBogYDVR0gBIGaMIGXMIGUBgorBgEEAUECAQEB MIGFMD0GCCsGAQUFBwICMDEwGBYRRGFydG1vdXRoIENvbGxlZ2UwAwIBARoVRGFydG1vdXRo IENvbGxlZ2UgQ1BTMEQGCCsGAQUFBwIBFjhodHRwOi8vd3d3LmRhcnRtb3V0aC5lZHUvfnBr aWxhYi9EYXJ0bW91dGhDUFNfNFNlcDAzLnBkZjAqBgNVHREEIzAhgR9NYXNzaW1pbGlhbm8u UGFsYUBEYXJ0bW91dGguZWR1MB8GA1UdIwQYMBaAFD/A1senTwB+7waZZ2y8lh5No3cSMD8G CCsGAQUFBwEBBDMwMTAvBggrBgEFBQcwAYYjaHR0cDovL2NvbGxlZ2VjYS5kYXJ0bW91dGgu ZWR1L29jc3AwDQYJKoZIhvcNAQEFBQADggEBAMRghaYbce3ByAWIFutgqntikjraGADD0jcO P0CL561BwwNkvxxaDcp3sPBgcOQvE7uOXnXwcgkKTwSWT5ndjZzStH5z1Yu7ET4QcRSZCDYB uDHNEZkB4xePuOu/nDvkhaJcGtbdJ0OSNUfoxAVlU/UIGTs8Xf/53OaI7oTmDhxW2mE9J0ra q2dftKHTN14/N4T57QFOexZ03TIeAppsrHd0KISdBe33qwAl/lySDt8UtymWiHBaVYkKmTxb CckzRAbDfFutm8uT6QhCDKHSyfa9rgWADVp7b1wnV3Y26sBn4sx16L39lvMF4ygP1c9JjKPv Mu5VcYsX8lBCg/LCTmgxggL4MIIC9AIBATB9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAX BgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91 dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwCQYFKw4DAhoF AKCCAdEwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMDkwNDEw MTk1MTM0WjAjBgkqhkiG9w0BCQQxFgQU6sIaueZuctLcZSuyQaXRyrLksUEwUgYJKoZIhvcN AQkPMUUwQzAKBggqhkiG9w0DBzAOBggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYF Kw4DAgcwDQYIKoZIhvcNAwICASgwgYwGCSsGAQQBgjcQBDF/MH0wdzETMBEGCgmSJomT8ixk ARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRhcnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNV BAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYDVQQDExNEYXJ0bW91dGggQ2VydEF1dGgxAgIa UzCBjgYLKoZIhvcNAQkQAgsxf6B9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJ k/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29s bGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwDQYJKoZIhvcNAQEBBQAE gYASnb0jdWaklDHSPE/utWIC1HbZRm2QqHrI8PqXJ2ng/NZVn/zs4czzzXwFsKs+R/t8Ng/t 36hW7ujSRB8Tt7m3qqhSfsw64t5DQ+Ttan9uDofi+510lDjWWYL8keOybWw7t6pYXffR2f9N gRMTidCgYP/t7WQHi/pCw7BcZxmZ5QAAAAAAAA== --------------ms060001020207000203080301-- From owner-ietf-pkix@mail.imc.org Fri Apr 10 16:14:55 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F29313A685B for ; Fri, 10 Apr 2009 16:14:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.909 X-Spam-Level: X-Spam-Status: No, score=-0.909 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ydEFvAykfAY4 for ; Fri, 10 Apr 2009 16:14:54 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id AE8413A693C for ; Fri, 10 Apr 2009 16:14:53 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AMn2AL042002 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 15:49:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3AMn2dF042001; Fri, 10 Apr 2009 15:49:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AMmpaE041988 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 15:49:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hyperbius.net.ttu.edu (129.118.1.214) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 17:48:50 -0500 Received: from Pickup by hyperbius.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 22:48:50 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f X-IronPort-AV: E=Sophos;i="4.39,315,1235952000"; d="scan'208";a="149671683" CC: Message-ID: <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> From: max pritikin To: Russ Housley In-Reply-To: <20090402162231.3E53E9A476F@odin.smetech.net> Content-Type: text/plain; charset="US-ASCII"; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit MIME-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Normative reference for 'CA rollover'? Date: Thu, 2 Apr 2009 12:24:33 -0500 References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> X-Mailer: Apple Mail (2.930.3) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=2418; t=1238693074; x=1239557074; c=relaxed/simple; s=sjdkim4002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=pritikin@cisco.com; z=From:=20max=20pritikin=20 |Subject:=20Re=3A=20Normative=20reference=20for=20'CA=20rol lover'? |Sender:=20; bh=iVnriq0ZJB212pieNLLFFvdly3fxfQrH5CDY+DZa7dw=; b=QAV9Eyx+SmJMNlsO3k1ch1OPPjRw9gHZJlFo/F32zIBHj2j7oWJl51No7H QPMME2T5Ws2jcTHe11Zt+3P2MzDVhpXsdtPAxwwkA96Tj5KkxL/n/PDWXTry svjvXbkCRw; Authentication-Results: sj-dkim-4; header.From=pritikin@cisco.com; dkim=pass ( sig from cisco.com/sjdkim4002 verified; ); List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Thank you Russ. This is what I was looking for. I'll review and ask questions as necessary. I would support the idea of publishing this information independently from a specific enrollment protocol. - max On Apr 2, 2009, at 11:22 AM, Russ Housley wrote: > Believe it or not, the new-in-old and old-in-new procedure is > documented in CMP. Many people fail to find it there. Perhaps it > should be extracted from there and published as a BCP. > > Russ > > At 10:47 AM 4/2/2009, max pritikin wrote: > > >> Hi folks, >> >> I'm looking for a normative reference describing how a CA would >> 'rollover' to a new keypair or 'modified' certificate. >> >> RFC5280 includes the following statements about 'rollover', here >> quoted with minimal context: >> >> 4.2.1.10 Name Contraints: >> "Name constraints are not applied to self-issued certificates >> (unless >> the certificate is the final certificate in the path). (This could >> prevent CAs that use name constraints from employing self-issued >> certificates to implement key rollover.)" >> >> 6.1. Basic Path Validation: >> "A certificate is self-issued if the same DN appears in the subject >> and issuer fields (the two DNs are the same if they match according >> to the rules specified in Section 7.1). In general, the issuer and >> subject of the certificates that make up a path are different for >> each certificate. However, a CA may issue a certificate to itself >> to >> support key rollover or changes in certificate policies. These >> self-issued certificates are not counted when evaluating path >> length >> or name constraints." >> >> 8. Security Considerations: >> "Loss of a CA's private signing key may also be problematic. The >> CA >> would not be able to produce CRLs or perform normal key rollover." >> >> But it does not include a recommended description of this rollover >> process itself. >> >> RFC3647 does not mention rollover at all, although it does define >> 'renewal' and 'rekey'. >> >> I can find informative discussions of rollover for various CA's >> (thanks Google). >> >> Can somebody point me in the right direction? Is there a normative >> reference or should I be able to infer the "correct" behavior from >> end >> entity rekey discussions as per the above notes? >> >> Thank you, >> >> - max >> > From owner-ietf-pkix@mail.imc.org Fri Apr 10 16:54:18 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B036428C105 for ; Fri, 10 Apr 2009 16:54:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.909 X-Spam-Level: X-Spam-Status: No, score=-0.909 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8r5CBolI1VKF for ; Fri, 10 Apr 2009 16:54:17 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 777123A6889 for ; Fri, 10 Apr 2009 16:54:15 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AMpg4x042136 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 15:51:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3AMpgB7042135; Fri, 10 Apr 2009 15:51:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from euphorbus.net.ttu.edu (euphorbus.net.ttu.edu [129.118.1.216]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AMpUbN042125 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 15:51:40 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from Pickup by euphorbus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 22:51:30 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 16:31:58 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQ References: From: Santosh Chokhani To: Stefan Santesson , IETF-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan, See responses in-line. > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 > Sent: Wednesday, April 01, 2009 2:34 PM > To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > Santosh, >=20 > If you are talking about adding other options to calculate=20 > the KeyHash value in ResponderID then I strongly disagree. >=20 > If you add unspecified options you change the properties of=20 > the field from deterministic to a completely unknown value.=20 > It does not matter if RFC2560 isn't explicit in its=20 > description of the use of the field. The fact is that OCSP=20 > explicitly defines this value and as such will allow a client=20 > to deterministically compare this value with the certificate=20 > selected to validate the response signature. I hope no one is doing the matching of Responder ID with hash of a key in place of responder signature verification. That would be real bad. > If you allow=20 > other ways to calculate the value but do not provide any=20 > means to signal what method that was used, then this feature is lost. The most common use will be to use this field to prioritize the certificates of the responder to use for sigature verification on the response. >=20 > In worst case we will cause current implementation to fail. That is why I am asking what problems if any will the vendors have. >=20 > I really don't think its worth the effort to change this=20 > field. We have a very large base of implementations that we=20 > really don't want to mess up unless its absolutely necessary. So, we agree that leaving this field hard wired to SHA-1 is ok and 2560 can easily accommodate new hash functions. Right? My only reason to align with 5280 is that if some one were ever want to strip off SHA-1 altogether from their Responder or client, permitting other methods does it. >=20 > As the only property of this field is to provide a convenient=20 > identifier, it is far from absolutely necessary to change it.=20 > Remember that there is a second choice to to identify=20 > responder by name. For names we have accepted the possibility=20 > of collisions. In that comparison, upgrading from SHA-1 is=20 > really redundant. >=20 > /Stefan >=20 >=20 >=20 >=20 > On 4/1/09 4:05 PM, "Santosh Chokhani" wrote: >=20 > >=20 > > My resident ASN.1 expert apprised me of the fact that=20 > adding a choice=20 > > will break backward compatibility. Thus, extension is a=20 > fifth option=20 > > (probably third in the priority). > >=20 > > Based on what I know of OCSP implementations, not changing=20 > anything in=20 > > terms of bits on the wire and aligning the Key ID with SKID=20 > in 5280 is=20 > > the best approach. I do not think it will hurt backward=20 > compatibility. > >=20 > > OCSP Responder and OCSP client vendors should speak up if I=20 > am wrong. > >=20 > >> -----Original Message----- > >> From: Santosh Chokhani > >> Sent: Tuesday, March 31, 2009 12:51 PM > >> To: 'Massimiliano Pala'; IETF-pkix > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >> Max, > >>=20 > >> I do not see where and what extension we need to add for=20 > other digest=20 > >> algorithm. > >>=20 > >> For key id, we need to enhance or broaden the options. > >>=20 > >>> -----Original Message----- > >>> From: owner-ietf-pkix@mail.imc.org > >>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of=20 > Massimiliano Pala > >>> Sent: Tuesday, March 31, 2009 1:37 PM > >>> To: IETF-pkix > >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>=20 > >>> Hi all, > >>>=20 > >>> as I said during last meeting - as the use of SHA-1 does > >> not have any > >>> security implication in the OCSP, another viable way would be to=20 > >>> define an extension where other digest algorithms can be > >> added to the > >>> request/responses. > >>>=20 > >>> It is a simple addition and does not require any change in > >> the RFC, it > >>> can be done as a separate document for those who what to=20 > use other=20 > >>> digest algorithms. > >>>=20 > >>> After all, isn't this an example of why we allow=20 > extensions to the=20 > >>> messages ? > >>>=20 > >>> Later, > >>> Max > >>>=20 > >>>=20 > >>> Santosh Chokhani wrote: > >>>> Tom, > >>>>=20 > >>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>=20 > >>>> I would not add anything about matching this field with > >>> anything since > >>>> RFC 2560 does not say anything about it. > >>>>=20 > >>>> If one were to add something, one should describe how this > >>> field can > >>>> be used to select from multiple Responder certificates. > >>>>=20 > >>>>> -----Original Message----- > >>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>> To: Santosh Chokhani > >>>>> Cc: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>> Santosh: > >>>>>=20 > >>>>> The RFC 5280 method just describes "two common > >> methods for > >>>>> generating key identifiers from the public key" > >>>>> and says that other methods are acceptable. The comment > >>> to KeyHash > >>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >> the same > >>>>> field as SKID, and I would support either stating "if the > >>> KeyHash is > >>>>> not precisely 20 octets long, it should be matched against the=20 > >>>>> Subject Key Identifier extension of the signing certificate" or=20 > >>>>> adding another choice like byID [3] OCTET STRING -- > >>> matches the value > >>>>> of SKID. > >>>>>=20 > >>>>> Tom Gindin > >>>>>=20 > >>>>> P.S. - The above opinions are mine, and not necessarily > >>> those of my > >>>>> employer > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> "Santosh Chokhani" Sent by: > >>>>> owner-ietf-pkix@mail.imc.org > >>>>> 03/26/2009 10:39 PM > >>>>>=20 > >>>>> To > >>>>> "IETF-pkix" > >>>>> cc > >>>>>=20 > >>>>> Subject > >>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>> difficult to deal > >>>>> with. > >>>>>=20 > >>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >> optional. We can > >>>>> update this to add SHA-2 series as optional. > >>>>>=20 > >>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>> different than > >>>>> key ID extensions in RFC 5280. Here are some options=20 > in order of > >>>>> preference: > >>>>>=20 > >>>>> 1. Align the language with subject key ID language in RFC 5280. > >>>>>=20 > >>>>> 2. Keep on using SHA-1. This field is not security > >>> relevant. RFC > >>>>> 2560 does not even describe how to use this field. So, > >>> having SHA-1 > >>>>> and accidental or intentional collisions will not hurt the > >>> security > >>>>> of the protocol. > >>>>>=20 > >>>>> 3. If you do not believe in KISS principle, you can > >>> define another > >>>>> response type and enhance the key ID ASN.1 syntax so that hash=20 > >>>>> algorithm is identified. > >>>>>=20 > >>>>> 4. Another option is for the Responder to use the same hashing=20 > >>>>> algorithm as the one in the first certID entry. > >>>>>=20 > >>>>>=20 > >>>>> Santosh Chokhani > >>>>> CygnaCom Solutions > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>=20 > >>>>=20 > >>>=20 > >>>=20 > >>> -- > >>>=20 > >>> Best Regards, > >>>=20 > >>> Massimiliano Pala > >>>=20 > >>> --o----------------------------------------------------------- > >>> ------------- > >>> Massimiliano Pala [OpenCA Project Manager]=20 > >>> Massimiliano.Pala@dartmouth.edu > >>> =20 > >>> project.manager@openca.org > >>>=20 > >>> Dartmouth Computer Science Dept Home Phone: +1 > >>> (603) 369-9332 > >>> PKI/Trust Laboratory Work Phone: +1 > >>> (603) 646-9179 > >>> --o----------------------------------------------------------- > >>> ------------- > >>>=20 > >>> People who think they know everything are a great annoyance > >> to those > >>> of us who do. > >>> -- > >>> Isaac Asimov > >>>=20 > >>=20 > >=20 >=20 >=20 >=20 From owner-ietf-pkix@mail.imc.org Fri Apr 10 17:52:00 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 71F103A684B for ; Fri, 10 Apr 2009 17:52:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.908 X-Spam-Level: X-Spam-Status: No, score=-0.908 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69, HTML_MESSAGE=0.001, WHOIS_NETSOLPR=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6iTjNX3loOxF for ; Fri, 10 Apr 2009 17:51:49 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2C4793A6889 for ; Fri, 10 Apr 2009 17:51:47 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0KawP045883 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 17:20:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B0KaDb045882; Fri, 10 Apr 2009 17:20:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from emphytus.net.ttu.edu (emphytus.net.ttu.edu [129.118.1.215]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0KO08045826 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 17:20:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from Pickup by emphytus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 00:20:22 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B390.59C32388" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 08:41:31 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAAATo3RwAAzaKg References: From: Santosh Chokhani To: Stefan Santesson , "Hallam-Baker, Phillip" , IETF-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B390.59C32388 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Agree ________________________________ From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 Sent: Thursday, April 02, 2009 8:18 AM To: Santosh Chokhani; Hallam-Baker, Phillip; IETF-pkix Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I do agree to most things here. =09 I don't believe that implementations can strip off SHA-1 in any foreseeable future. It needs to be around, if nothing else, so for backwards compatibility. SHA-1 will continue to work in situations like this where no security properties are needed. =09 IMO, The added extension, even though I will not fight hard against it, would just be redundant complexity. =09 /Stefan =09 On 4/2/09 1:54 PM, "Santosh Chokhani" wrote: =09 =09 I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =09 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =09 It would appear that the extension should be NC. =09 Phil, =09 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =09 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. =09 =09 =20 =09 ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =20 =20 =20 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =09 =20 =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =09 =20 =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =09 =20 =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =09 =20 =20 =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =09 =20 =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =09 =20 =20 =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =09 =20 =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =09 =20 =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =09 =20 =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =09 =20 =20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =09 =20 =20 =20 =09 =20 =20 =09 ________________________________ =20 From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =20 =09 =20 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 =09 =09 ------_=_NextPart_001_01C9B390.59C32388 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Re: OCSP RFC (RFC 2560) Dependence on SHA-1
Agree


From: Stefan Santesson=20 [mailto:stefan@aaa-sec.com]
Sent: Thursday, April 02, 2009 = 8:18=20 AM
To: Santosh Chokhani; Hallam-Baker, Phillip;=20 IETF-pkix
Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I do agree to most things here.

I = don’t believe=20 that implementations can strip off SHA-1 in any foreseeable future. It = needs=20 to be around, if nothing else, so for backwards compatibility. SHA-1 = will=20 continue to work in situations like this where no security properties = are=20 needed.

IMO, The added extension, even though I will not fight = hard=20 against it,  would just be redundant = complexity.

/Stefan

On=20 4/2/09 1:54 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>=20 wrote:

I have no objection to having an extension, but if in = the long=20 term SHA-1 will not be there, it seems defining a new response type = (say=20 basic 2) would be the way to go so that SHA-1 based key ID can be = stripped=20 off.

If SHA-1 is not getting ripped = off in the=20 long term, I do not see value in extension except that it may make = every one=20 happy: those who do not care will not include it on the Server side = and/or=20 will ignore it on the client side.

It would appear that the = extension should be=20 NC.

Phil,

I would not respond to the = arguments on KISS=20 and security since in this case both are straightforward. =  Also, in=20 this thread, the comments were not meant for or directed at=20 you.

As you know, I have provided = extensive=20 comments to you when you first posted the OCSP Agility I-D and my = position=20 and reasons are matter of PKIX archives for anyone to scrutinize. =  When=20 you ignore every single cogent point, there is no sense in me = commenting on=20 next iteration.  I do think that the OCSP Agility I-D is a = solution=20 looking for a problem that I do not see.

 

From:=20 Hallam-Baker, Phillip  [mailto:pbaker@verisign.com]=20
Sent: Thursday, April 02, 2009 12:53 =  AM
To:=20 Santosh Chokhani; Stefan Santesson; =  IETF-pkix
Subject: RE:=20 OCSP RFC (RFC 2560) Dependence on  SHA-1

 
 
 
I think we have no choice  but to leave the Key = ID CHOICE=20 to be SHA-1 based.

 
 
But that does not preclude adding an  extension = that=20 allows the KeyID to be specified using a stronger algorithm. =  There=20 are two reasons for this:

 
 
1) Optics, even if there is no security =  implication, a=20 protocol that uses weak crypto necessitates an (expensive) =  security=20 review to prove that there is no problem. And these must be = performed=20  repeatedly by many different parties as relying on the = analysis of=20 others is a  good way to cause issues. Been there, done=20 that.

 
 
2) We are designing for long time spans,  ten = years or=20 more. While simple compressor collisions may not be a concern, =  there=20 is no guarantee that the attacks will stop at that point. MD4 has = been=20  broken repeatedly and they are now at the stage of jumping = up and=20 down on the  little pieces. It will probably happen to MD5 = and we=20 should be cautious in  case it happens to = SHA-1.

 
 
 
 
On the claim of 'Keep it simple STUPID',  I find = it rather=20 offensive to have my position characterized as stupid. My =  designs=20 are not exactly known for being verbose or overly elaborate. If I=20  propose something it is because there is a reason. It is = very easy=20 to defend  the status quo by derriding proposals as = unnecessary, but=20 the fact is that  making OCSP too simple will simply cause = the=20 complexity to blow out somewhere  else.

 
 
There is an architectural princple of  modular = design that=20 demands that the core of PKIX as it now stands (the =  certificate=20 profile and OCSP) be capable of stand alone use. We cannot fix=20  issues in OCSP with LTANS or other layered-on protocols as = some have=20 proposed.  It does not simplify my OCSP deployment to have to = graft=20 on an entire  different protocol in addition or to = re-engineer my=20 document archival protocol  to cover defects in = OCSP.

 
 
 
 
Simply adding new algorithms to a  protocol does = nothing=20 to improve security. You only improve security if you =  withdraw=20 insecure algorithms from use.

 
 
To make the system work you have to have  a = means of=20 negotiating between the client and the server. Otherwise there is =  no=20 way for an OCSP responder to ensure that it receives a secure,=20  supported response to querries for certificates that do not = exist=20 yet or  are not known to the responder.

 
 
In the case of an OCSP responder being  driven = by CRLs=20 collected from various sources, there is no way for the CA to =  know=20 if a certificate even exists, all it knows is if the status is=20  definitively revoked.

 
 
In the case of many transactional  architectures = the OCSP=20 validation is performed independently of certificate  chain=20 validation.

 
 
 
 
Experience of small scale PKI deployment  in = which any box=20 can be upgraded at will is simply not representative of large =  scale=20 real world deployment.

 
 
 

 
 


 
From:  owner-ietf-pkix@mail.imc.org = on=20 behalf of Santosh Chokhani
Sent: Wed  4/1/2009 8:39 = PM
To: Stefan Santesson; IETF-pkix
Subject: =  RE:=20 OCSP RFC (RFC 2560) Dependence on SHA-1

 

 

I=20 am saying that "Do you agree that 2560 can be left alone for=20  Responder
ID's key ID CHOICE being SHA-1 = based?"

>=20 -----Original  Message-----
> From: Stefan Santesson = [mailto:stefan@aaa-sec.com]
>= =20 Sent:  Wednesday, April 01, 2009 6:32 PM
> To: Santosh=20 Chokhani;  IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) = Dependence on  SHA-1
>
> Santosh,
>
> = In-line
>
>
>  On 4/1/09 10:31 PM, "Santosh = Chokhani" <SChokhani@cygnacom.com>=20  wrote:
>
> >
> > Stefan,
>=20 >
> > See  responses in-line.
> = >
>=20 >> -----Original  Message-----
> >> From: = Stefan=20 Santesson [mailto:stefan@aaa-sec.com]
>= =20  >> Sent: Wednesday, April 01, 2009 2:34 PM
> = >>=20 To: Santosh  Chokhani; Massimiliano Pala; IETF-pkix
> = >>=20 Subject: Re: OCSP RFC  (RFC 2560) Dependence on SHA-1
> = >>
> >>  Santosh,
> >>
> = >>=20 If you are talking about adding  other options to calculate=20 the
> >> KeyHash value in ResponderID  then I = strongly=20 disagree.
> >>
> >> If you add =  unspecified=20 options you change the properties
> of the field
>=20  >> from deterministic to a completely unknown = value.
>=20 >> It  does not matter if RFC2560 isn't explicit in its = description of
>  >> the use of the field. The = fact is=20 that OCSP explicitly
>  defines this
> >> = value and=20 as such will allow a client to  deterministically = compare
>=20 >> this value with the certificate  selected to = validate the=20 response
> >> signature.
>  >
> = > I=20 hope no one is doing the matching of Responder ID =  with
> hash=20 of a key
> > in place of responder signature =  verification.=20  That would
> be real bad.
> =  >
>
>=20 Yes it would. That is not at all what I talk about. But =  a
>=20 client could use this value to locate a responder=20  certificate.
>
> >> If you allow
> = >>=20 other ways  to calculate the value but do not provide any = means=20 to
> >> signal  what method that was used, then = this=20 feature is lost.
> >
>  > The most common = use will=20 be to use this field to prioritize the
>  > = certificates of=20 the responder to use for sigature
> verification on=20  the
> > response.
> >
>
> Do = you know=20 this for a  fact, or are you guessing?
> If a single=20 implementation verifies that  the certificate used
> to = validate the response matches the ResponderID  value, = and
>=20 choose to go into an error state because of mismatch, then=20  we
> have created great problems. So we can't guess. = We have=20 to
>  know that no single implementation will fail = because of=20 this.
> And that  may be very = hard.
>
>
>=20 >>
> >> In worst  case we will cause = current=20 implementation to fail.
> >
> >  That is = why I am=20 asking what problems if any will the vendors have.
>=20  >
>
> Even if no vendor speaks up here, it = will not=20 guarantee  that
> this will not create any=20 problems.
>
>  >>
> >> I really = don't=20 think its worth the effort to change  this field. We
> = >>=20 have a very large base of implementations that  we = really
>=20 don't want
> >> to mess up unless its absolutely=20  necessary.
> >
> > So, we agree that = leaving this=20 field hard  wired to SHA-1 is ok and
> > 2560 can = easily=20 accommodate new hash  functions.  Right?
>=20 >
>
> I fail to understand this  sentence. = Despite=20 reading it many
> times over.
>
> > My =  only=20 reason to align with 5280 is that if some one were
> ever=20  want
> > to strip off SHA-1 altogether from their = Responder=20 or  client,
> > permitting other methods does = it.
>=20  >
>
> I don't believe this argument is valid = as I=20 don't think  it is
> possible to strip off SHA-1 in any = reasonable future. In  any
> case. If we compare the = positive=20 side with allowing this
>  change and the negative = consequences=20 to make OCSP
> incompatible with  itself, my choice is=20 easy.
>
>  /Stefan
>
>
>=20 >>
> >> As the only  property of this field = is to=20 provide a convenient
> >> identifier,  it is far = from=20 absolutely necessary to change it.
> >> Remember =  that=20 there is a second choice to to identify responder by
> = >>=20  name. For names we have accepted the possibility of = collisions.=20 In
>  >> that comparison, upgrading from SHA-1 is = really=20 redundant.
>  >>
> >> /Stefan
> = >>
> >>
>  >>
> = >>
>=20 >> On 4/1/09 4:05 PM, "Santosh  Chokhani"
> = <SChokhani@cygnacom.com>=20 wrote:
>  >>
> >>>
> = >>> My=20 resident ASN.1 expert  apprised me of the fact that
> = >>=20 adding a choice
>  >>> will break backward=20 compatibility.  Thus, extension is  a
> >> = fifth=20 option
> >>> (probably third in the=20  priority).
> >>>
> >>> Based = on what I=20 know of  OCSP implementations, not changing
> >> = anything=20 in
>  >>> terms of bits on the wire and = aligning the=20 Key ID with  SKID
> >> in 5280 is
> = >>>=20 the best approach.   I do not think it will hurt=20 backward
> >> compatibility.
>=20  >>>
> >>> OCSP Responder and OCSP = client=20 vendors  should speak up if I
> >> am = wrong.
>=20 >>>
>  >>>> -----Original=20 Message-----
> >>>> From:  Santosh = Chokhani
>=20 >>>> Sent: Tuesday, March 31, 2009 12:51 =  PM
>=20 >>>> To: 'Massimiliano Pala'; IETF-pkix
>=20  >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence = on=20 SHA-1
>  >>>>
> >>>> = Max,
>=20  >>>>
> >>>> I do not see where = and=20 what  extension we need to add for
> >> other=20 digest
>  >>>> algorithm.
>=20 >>>>
> >>>>  For key id, we = need to=20 enhance or broaden the options.
> =  >>>>
>=20 >>>>> -----Original  Message-----
>=20 >>>>> From:  owner-ietf-pkix@mail.imc.org>=20 >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20  On Behalf Of
> >> Massimiliano Pala
>=20 >>>>>  Sent: Tuesday, March 31, 2009 1:37 = PM
>=20 >>>>> To:  IETF-pkix
> = >>>>>=20 Subject: Re: OCSP RFC (RFC 2560)  Dependence on SHA-1
> = >>>>>
> >>>>>  Hi = all,
>=20 >>>>>
> >>>>> as I said =  during=20 last meeting - as the use of SHA-1 does
> >>>> = not=20  have any
> >>>>> security implication = in the=20 OCSP,  another viable way
> would be to
>=20 >>>>> define an  extension where other digest=20 algorithms can be
> >>>> added  to = the
>=20 >>>>> request/responses.
>=20  >>>>>
> >>>>> It is a = simple=20 addition and  does not require any change in
> = >>>>=20 the RFC, it
>  >>>>> can be done as a = separate=20 document for those who what  to
> >> use = other
>=20 >>>>> digest  algorithms.
>=20 >>>>>
> >>>>> After  all, = isn't=20 this an example of why we allow
> >> extensions to=20  the
> >>>>> messages ?
>=20  >>>>>
> >>>>> = Later,
>=20  >>>>> Max
> = >>>>>
>=20  >>>>>
> >>>>> Santosh = Chokhani=20  wrote:
> >>>>>> Tom,
>=20  >>>>>>
> >>>>>> = Adding a=20 new choice  and aligning it with 5280 SKID is fine.
>=20  >>>>>>
> >>>>>> I = would=20 not add  anything about matching this field with
>=20 >>>>> anything  since
> = >>>>>>=20 RFC 2560 does not say anything about  it.
>=20 >>>>>>
> >>>>>> If one=20  were to add something, one should describe how this
>=20  >>>>> field can
> = >>>>>> be=20 used to  select from multiple Responder certificates.
> =  >>>>>>
> = >>>>>>>=20 -----Original  Message-----
> = >>>>>>>=20 From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20  >>>>>>> Sent: Monday, March 30, 2009 = 7:46=20 PM
>  >>>>>>> To: Santosh = Chokhani
>=20  >>>>>>> Cc: IETF-pkix
>=20  >>>>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on  SHA-1
> = >>>>>>>
>=20  >>>>>>>=20 =          Santosh:
>=20 >>>>>>>
> =  >>>>>>>=20          The RFC 5280 = method=20 just describes "two common
> >>>>  methods=20 for
> >>>>>>> generating key = identifiers=20  from the public key"
> >>>>>>> = and says=20 that other  methods are acceptable.  The comment
> = >>>>> to  KeyHash
> = >>>>>>>=20 in RFC 2560 4.2.1 is not as  permissive.  Of course,=20 it's
> >>>> the same
>=20  >>>>>>> field as SKID, and I would = support=20 either stating  "if the
> >>>>> KeyHash=20 is
>  >>>>>>> not precisely 20 = octets=20 long, it should be  matched
> against the
>=20 >>>>>>> Subject Key  Identifier = extension of the=20 signing
> certificate" or
> =  >>>>>>>=20 adding another choice like byID [3] OCTET STRING  --
>=20 >>>>> matches the value
>=20  >>>>>>> of SKID.
>=20  >>>>>>>
>=20  >>>>>>>=20 =             &= nbsp;    Tom=20 Gindin
> >>>>>>>
>=20  >>>>>>> P.S. - The above opinions are = mine, and=20 not  necessarily
> >>>>> those of = my
>=20  >>>>>>> employer
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
> =  >>>>>>>=20 "Santosh Chokhani" <SChokhani@cygnacom.com> =  Sent=20 by:
> >>>>>>>  owner-ietf-pkix@mail.imc.org>=20 >>>>>>> 03/26/2009  10:39 PM
>=20 >>>>>>>
> =  >>>>>>>=20 To
> >>>>>>>  "IETF-pkix" <ietf-pkix@imc.org>
>=20 >>>>>>>  cc
>=20 >>>>>>>
> >>>>>>>=20  Subject
> >>>>>>> OCSP RFC (RFC = 2560)=20 Dependence on  SHA-1
> = >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
> =  >>>>>>>=20 RFC 2560 dependence on SHA-1 does not appear to  be
>=20 >>>>> difficult to deal
>=20  >>>>>>> with.
>=20  >>>>>>>
> = >>>>>>>=20 Section 4.3  lists SHA-1 as mandatory and RSA as
>=20 >>>> optional.   We can
>=20 >>>>>>> update this to add SHA-2 series as=20  optional.
> >>>>>>>
>=20  >>>>>>> The Responder ID has SHA-1 = hardwired.=20  But,  that is no
> >>>>> different = than
>  >>>>>>> key ID extensions = in RFC=20 5280.  Here are  some options
> >> in order=20 of
> >>>>>>>  preference:
>=20 >>>>>>>
> =  >>>>>>> 1.=20  Align the language with subject key ID =  language
> in RFC=20 5280.
> >>>>>>>
>=20  >>>>>>> 2.  Keep on using SHA-1.=20  This field is  not security
> = >>>>>=20 relevant.  RFC
>  >>>>>>> = 2560 does=20 not even describe how to use this  field.  So,
>=20 >>>>> having SHA-1
>=20  >>>>>>> and accidental or intentional=20 collisions will not  hurt the
> >>>>>=20 security
>  >>>>>>> of the=20 protocol.
>  >>>>>>>
>=20 >>>>>>> 3.  If  you do not believe = in KISS=20 principle, you can
> >>>>>  define=20 another
> >>>>>>> response type and = enhance=20  the key ID ASN.1 syntax so
> that hash
>=20  >>>>>>> algorithm is = identified.
>=20  >>>>>>>
> = >>>>>>> 4.=20   Another option is for the Responder to use the
> = same=20 hashing
>  >>>>>>> algorithm as = the one in=20 the first certID  entry.
> = >>>>>>>
>=20  >>>>>>>
> = >>>>>>>=20 Santosh  Chokhani
> >>>>>>> = CygnaCom=20 Solutions
>  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>
> = >>>>>>
>=20  >>>>>
> >>>>>
>=20 >>>>>  --
> >>>>>
> = >>>>> Best  Regards,
>=20 >>>>>
> >>>>> =  Massimiliano=20 Pala
> >>>>>
> >>>>>=20 =  --o-----------------------------------------------------------
&= gt;=20  >>>>> -------------
> = >>>>>=20 Massimiliano  Pala [OpenCA Project Manager]
>=20 >>>>>  Massimiliano.Pala@dartmouth.edu<= /A>
>=20  >>>>>=20 =             <= BR>>=20  >>>>> project.manager@openca.org
>= ;=20  >>>>>
> >>>>> Dartmouth = Computer=20 Science  Dept=20 =             &= nbsp;  Home=20 Phone: +1
> >>>>> (603) 369-9332
>=20  >>>>> PKI/Trust  Laboratory=20 =             &= nbsp;           &n= bsp; Work=20 Phone: +1
> >>>>> (603) 646-9179
>=20  >>>>>=20 =  --o-----------------------------------------------------------
&= gt;=20  >>>>> -------------
>=20 >>>>>
>  >>>>> People who = think=20 they know everything are a great  annoyance
> = >>>>=20 to those
> >>>>> of us  who do.
>=20 >>>>>   --
> =  >>>>>=20 Isaac Asimov
> >>>>>
>=20  >>>>
> >>>
> = >>
>=20  >>
> >>
>=20 =  >
>
>
>


------_=_NextPart_001_01C9B390.59C32388-- From owner-ietf-pkix@mail.imc.org Fri Apr 10 17:53:13 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B610A3A689A for ; Fri, 10 Apr 2009 17:53:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.909 X-Spam-Level: X-Spam-Status: No, score=-0.909 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ikot2N-5FgJw for ; Fri, 10 Apr 2009 17:53:13 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A2FEB3A6889 for ; Fri, 10 Apr 2009 17:53:12 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0a2OJ047258 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 17:36:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B0a2ng047257; Fri, 10 Apr 2009 17:36:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0a146047251 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 17:36:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hyperbius.net.ttu.edu (129.118.1.214) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 19:36:00 -0500 Received: from Pickup by hyperbius.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 00:36:00 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: Renew/Rekey/Modification Date: Thu, 2 Apr 2009 17:05:34 -0400 Message-ID: <200904022105.n32L5ZXD014427@stingray.missi.ncsc.mil> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSwACiN0dAACdj+0A== References: <49D2D476.3030000@lockstep.com.au> From: "Kemp, David P." To: X-OriginalArrivalTime: 02 Apr 2009 21:00:25.0140 (UTC) FILETIME=[0B571740:01C9B3D6] List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: As Santosh said, if the old key is compromised and used first by an adversary to rekey, then the subscriber will detect the compromise when he tries to rekey and is rejected. If the subscriber rekeys first, then the adversary is out of luck. The subscriber could be allowed to spawn multiple new rekeyed certificates (such as generating an email encryption certificate based on a signature certificate) as long as the validity is not extended from old to new, but should be allowed only one rekey with a new validity period. -----Original Message----- From: EXT-Glatting, Dennis P >>=20 >> It should be. The goal here is to use the current certificate to >> authenticate to create new certificates. >>=20 > > I'm a little confused here. If we're getting rid of the key because it's > getting old, then how is it young enough to validate a new key? A > problem is there is an implicit "continuance of legacy" in the new key > of the old key that doesn't end with the immediate generation but > follows all generations of the original key. >=20 > I'm not suggesting something is "wrong" but there seems like there is a > logic error somewhere.=20 From owner-ietf-pkix@mail.imc.org Fri Apr 10 17:53:26 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DD6BF3A6A03 for ; Fri, 10 Apr 2009 17:53:26 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 0.091 X-Spam-Level: X-Spam-Status: No, score=0.091 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69, J_BACKHAIR_42=1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Go6KHS79yGNP for ; Fri, 10 Apr 2009 17:53:26 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id BB06C3A689A for ; Fri, 10 Apr 2009 17:53:25 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0bbki047376 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 17:37:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B0bbuF047375; Fri, 10 Apr 2009 17:37:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from emphytus.net.ttu.edu (emphytus.net.ttu.edu [129.118.1.215]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0baIE047368 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 17:37:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from Pickup by emphytus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 00:37:36 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f X-BigFish: VPS-25(zz1432R98dR1805Mzz1202hzz1033ILz2dh6bh87il61h) X-Spam-TCS-SCL: 0:0 X-FB-DOMAIN-IP-MATCH: fail Message-ID: <49D4C40D.5040501@cs.tcd.ie> Date: Thu, 2 Apr 2009 14:56:29 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.21 (X11/20090302) MIME-Version: 1.0 To: IETF-pkix Subject: Re: WG Last Call on draft-ietf-pkix-tac-03 References: In-Reply-To: X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit X-AntiVirus-Status: MessageID = A1743EE5B0A X-AntiVirus-Status: Host: imx2.tcd.ie X-AntiVirus-Status: Action Taken: X-AntiVirus-Status: NONE X-AntiVirus-Status: Checked by TCD Vexira. (version=1.60.2 VDF=10.102.30) List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan Santesson wrote: > The authors of Traceable Anonymous Certificate > draft-ietf-pkix-tac-03.txt has requested WGLC. > > http://tools.ietf.org/html/draft-ietf-pkix-tac-03 > A couple of comments: #1: Top of p7: "To effect issuance of the TAC, the AI interacts with the BI, over a secure channel, to jointly create the signature on the TAC, and sends the signed TAC to the user. The AI does this without learning the user's real identity (either from the user or from the BI)." If the AI sends the TAC to the user, then it will know some form of identity for that user, even if that's only an IP address. (And with the likes of SAVI, that could well be enough to establish a real identity.) I'd have thought it'd be much better to return the TAC via the BI and not require any user<->AI direct connections? #2: Section 5.2 claims that the AI can't unilaterally fool the BI into revealing the real identity. But the only thing that stops that seems to be the RP client identity verified by the BI when the RP establishes a mutual-auth TLS connection to the BI. So how can the BI really know that its not the AI making that connection? Stephen. From owner-ietf-pkix@mail.imc.org Fri Apr 10 18:00:43 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A4BBE3A6928 for ; Fri, 10 Apr 2009 18:00:43 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.909 X-Spam-Level: X-Spam-Status: No, score=-0.909 tagged_above=-999 required=5 tests=[AWL=0.001, BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MiWlyEmmxIu3 for ; Fri, 10 Apr 2009 18:00:42 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 608FD3A684B for ; Fri, 10 Apr 2009 18:00:41 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0fZ2q047605 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 17:41:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B0fZIj047604; Fri, 10 Apr 2009 17:41:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from euphorbus.net.ttu.edu (euphorbus.net.ttu.edu [129.118.1.216]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0fYl6047598 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 17:41:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from Pickup by euphorbus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 00:41:33 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: Renew/Rekey/Modification Date: Wed, 1 Apr 2009 17:00:50 -0400 Message-ID: In-Reply-To: <49D2D476.3030000@lockstep.com.au> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSw References: <49D2D476.3030000@lockstep.com.au> From: Santosh Chokhani To: , List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stephen, See responses in-line.=20 > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org=20 > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Wilson > Sent: Tuesday, March 31, 2009 10:42 PM > To: ietf-pkix@imc.org > Subject: Renew/Rekey/Modification >=20 >=20 >=20 > Colleagues, >=20 > There are a few things about certificate "renewal" and=20 > "re-key" that have long confounded me. Things only seem to=20 > have got more convoluted in RFC 3647 and -- no offence! -- in=20 > newer Certificate Policies like the=20 > US FPKI Policy Authority document. Can anyone help me=20 > understand the=20 > rationale for the some of the following scenarios? Thanks in advance! >=20 >=20 >=20 > Re-key is said (in the FPKI CP) to be a good idea because the=20 > older a key gets, the more susceptible it is to loss and=20 > compromise. Fair enough, but why wouldn't that consideration=20 > be factored into the chosen certificate validity period? It should be. The goal here is to use the current certificate to authenticate to create new certificates. >=20 >=20 > Is there ever a real world scenario when a Subject would of=20 > their own accord request re-key because they feel the key is=20 > getting old? PKI obligations and policy may require that subject perform the re-key and take some concrete action in order to be bound to the subscriber obligations and agreements. > If so, why wouldn't they revoke as well? Two reasons come to mind for not revoking. You do not want to invalidate existing, unexpired signatures. You do not want to have built in mechanism for large CRL. BTW, you can compensate for it by destroying the current key after re-key. > The=20 > FPKI CA says that after re-key "The old certificate may or=20 > may not be revoked". Why would you not revoke, given the=20 > possibility that the key has got too old? See previous response. > I don't think it=20 > would ever be sensible to keep using an old original key and=20 > a fresh key. And if I were a Relying Party, I might like to=20 > know about this possible quality difference, yet there would=20 > be nothing in a CRL or anywhere else to mark the fact that=20 > the Subscriber has re-keyed. >=20 You do not need to use the old authentication/signature key. You do not need to revoke it either. You can simply destroy it. You do need to keep old decryption keys. >=20 > The FPKI CA goes on to say that after re-key "The old certificate ...=20 > must not be further re-keyed, renewed, or modified". This=20 > seems almost oxymoronic. Consider that I have certificate A=20 > and then I re-key A to create certificate B. And then I=20 > re-key B to create certificate C. I would say that C is=20 > indistinguishable from a re-keyed A since A, B and C will=20 > only differ by key value. So how is it meaningful to forbid=20 > re-keying A more than once?=20 >=20 Certificates are not the only objects. CA and RA can keep other information that can be used to enforce that A is used to rekey only once. >=20 > Finally, why does RFC 3647 bother to describe "Certificate=20 > Modification"=20 > at all? The term is inherently confusing since one of the=20 > most obvious characteristics of a digital certificate is that=20 > it cannot be tampered with. I question the need for a=20 > special bit of counter intuitive jargon (and a whole slab of=20 > the RFC) to cover what is really a mundane scenario; viz a=20 > certificate Subject needs a certificate with different=20 > details in it. That is, it's just a new certificate. Why is=20 > it treated any differently from an original certificate application? Certificate Modification (like renewal and rekey) refer to the fact that a new certificate with different information is created. If you feel that the term is confusing, let us know of a better term. As to why deal with differently that original certificate is that the modification may be carried out using fully or partly automated process based on the current certificate to be modified. That is why framework identifies this. Of course, many certificate policies require initial process for certificate modification. For that matter, policies do not permit renewal and some require initial process for rekey as well. The framework tries to accommodate many plausible scenarios. >=20 >=20 > Cheers, >=20 > Stephen Wilson > Lockstep Technologies > www.lockstep.com.au/technologies. >=20 >=20 >=20 From owner-ietf-pkix@mail.imc.org Fri Apr 10 18:40:21 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DBC613A6A98 for ; Fri, 10 Apr 2009 18:40:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.555 X-Spam-Level: X-Spam-Status: No, score=-10.555 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_03_06=0.044, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ld8gpTqamkaD for ; Fri, 10 Apr 2009 18:40:21 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8C9893A6AEA for ; Fri, 10 Apr 2009 18:40:20 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B1JKTd049515 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 18:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B1JKhJ049514; Fri, 10 Apr 2009 18:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (maila.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B1J9KM049504 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Fri, 10 Apr 2009 18:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.2.99.4; Fri, 10 Apr 2009 18:19:09 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) with Microsoft SMTP Server id 8.2.99.4; Fri, 10 Apr 2009 18:19:08 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 01:21:02 +0000 X-BigFish: ps-67(zz1432R98dR1447R1805Mzz2cfT1202hzzz2dheIL6bh34h) X-FB-SS: 5,13, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Message-ID: <49DFA346.309@Dartmouth.edu> Date: Fri, 10 Apr 2009 15:51:34 -0400 From: Massimiliano Pala Organization: Dartmouth College - Computer Science Department User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: Sean Turner CC: pkix Subject: Re: PRQP: CMS Gateway References: <49DE7DC0.8050501@ieca.com> In-Reply-To: <49DE7DC0.8050501@ieca.com> Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms060001020207000203080301" X-Virus-Scanned: ClamAV 0.93.3/9223/Fri Apr 10 10:54:59 2009 on mail.cs.dartmouth.edu X-Virus-Status: Clean List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (tk5-exgwy-e803.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --------------ms060001020207000203080301 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Hi Sean, thanks for the comments - I just modified the current draft version with the suggested changes. There are still some changes to be done for providing TAMP support via PRQP - but I think we will finalize them next week (I shall meet with Wallace at IDTrust) and we will be ready for updating the draft. Ciao, Max Sean Turner wrote: > > Max, > > Should the CMS Gateway be renamed CMC Gateway? CMM over CMS is CMC. > Also should the reference be updated to RFC 5272? --------------ms060001020207000203080301 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJIjCC BI0wggN1oAMCAQICAhpTMA0GCSqGSIb3DQEBBQUAMHcxEzARBgoJkiaJk/IsZAEZFgNlZHUx GTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0 bW91dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMTAeFw0wNTExMDgy MDMzMDZaFw0wOTExMDkyMDMzMDZaMIHBMRMwEQYKCZImiZPyLGQBGRYDZWR1MRkwFwYKCZIm iZPyLGQBGRYJZGFydG1vdXRoMQswCQYDVQQGEwJVUzEaMBgGA1UEChMRRGFydG1vdXRoIENv bGxlZ2UxGjAYBgoJkiaJk/IsZAEBEwoxMjI1NjAyOTQ3MRowGAYDVQQDExFNYXNzaW1pbGlh bm8gUGFsYTEuMCwGCSqGSIb3DQEJARYfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVk dTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsv8obBpbhPixgdyIJj7UN0GYRNhsgWHB muCE5j8v8IvCSJWRF9spKoR0NBYgOfJu8DwQuKTIgrvbp0EC3ikrneotL4KTGD1IqWz/bSXL UR/bZAsc0r9PrvCUsZOi7wbijy784gOuqQUCJ2fJwKwk5SJ3RBaPnUROQXTp+LPSK8MCAwEA AaOCAVowggFWMA4GA1UdDwEB/wQEAwIF4DARBglghkgBhvhCAQEEBAMCBaAwgaIGA1UdIASB mjCBlzCBlAYKKwYBBAFBAgEBATCBhTA9BggrBgEFBQcCAjAxMBgWEURhcnRtb3V0aCBDb2xs ZWdlMAMCAQEaFURhcnRtb3V0aCBDb2xsZWdlIENQUzBEBggrBgEFBQcCARY4aHR0cDovL3d3 dy5kYXJ0bW91dGguZWR1L35wa2lsYWIvRGFydG1vdXRoQ1BTXzRTZXAwMy5wZGYwKgYDVR0R BCMwIYEfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVkdTAfBgNVHSMEGDAWgBQ/wNbH p08Afu8GmWdsvJYeTaN3EjA/BggrBgEFBQcBAQQzMDEwLwYIKwYBBQUHMAGGI2h0dHA6Ly9j b2xsZWdlY2EuZGFydG1vdXRoLmVkdS9vY3NwMA0GCSqGSIb3DQEBBQUAA4IBAQDEYIWmG3Ht wcgFiBbrYKp7YpI62hgAw9I3Dj9Ai+etQcMDZL8cWg3Kd7DwYHDkLxO7jl518HIJCk8Elk+Z 3Y2c0rR+c9WLuxE+EHEUmQg2AbgxzRGZAeMXj7jrv5w75IWiXBrW3SdDkjVH6MQFZVP1CBk7 PF3/+dzmiO6E5g4cVtphPSdK2qtnX7Sh0zdePzeE+e0BTnsWdN0yHgKabKx3dCiEnQXt96sA Jf5ckg7fFLcplohwWlWJCpk8WwnJM0QGw3xbrZvLk+kIQgyh0sn2va4FgA1ae29cJ1d2NurA Z+LMdei9/ZbzBeMoD9XPSYyj7zLuVXGLF/JQQoPywk5oMIIEjTCCA3WgAwIBAgICGlMwDQYJ KoZIhvcNAQEFBQAwdzETMBEGCgmSJomT8ixkARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRh cnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNVBAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYD VQQDExNEYXJ0bW91dGggQ2VydEF1dGgxMB4XDTA1MTEwODIwMzMwNloXDTA5MTEwOTIwMzMw NlowgcExEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgx CzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29sbGVnZTEaMBgGCgmSJomT8ixk AQETCjEyMjU2MDI5NDcxGjAYBgNVBAMTEU1hc3NpbWlsaWFubyBQYWxhMS4wLAYJKoZIhvcN AQkBFh9NYXNzaW1pbGlhbm8uUGFsYUBEYXJ0bW91dGguZWR1MIGfMA0GCSqGSIb3DQEBAQUA A4GNADCBiQKBgQCy/yhsGluE+LGB3IgmPtQ3QZhE2GyBYcGa4ITmPy/wi8JIlZEX2ykqhHQ0 FiA58m7wPBC4pMiCu9unQQLeKSud6i0vgpMYPUipbP9tJctRH9tkCxzSv0+u8JSxk6LvBuKP LvziA66pBQInZ8nArCTlIndEFo+dRE5BdOn4s9IrwwIDAQABo4IBWjCCAVYwDgYDVR0PAQH/ BAQDAgXgMBEGCWCGSAGG+EIBAQQEAwIFoDCBogYDVR0gBIGaMIGXMIGUBgorBgEEAUECAQEB MIGFMD0GCCsGAQUFBwICMDEwGBYRRGFydG1vdXRoIENvbGxlZ2UwAwIBARoVRGFydG1vdXRo IENvbGxlZ2UgQ1BTMEQGCCsGAQUFBwIBFjhodHRwOi8vd3d3LmRhcnRtb3V0aC5lZHUvfnBr aWxhYi9EYXJ0bW91dGhDUFNfNFNlcDAzLnBkZjAqBgNVHREEIzAhgR9NYXNzaW1pbGlhbm8u UGFsYUBEYXJ0bW91dGguZWR1MB8GA1UdIwQYMBaAFD/A1senTwB+7waZZ2y8lh5No3cSMD8G CCsGAQUFBwEBBDMwMTAvBggrBgEFBQcwAYYjaHR0cDovL2NvbGxlZ2VjYS5kYXJ0bW91dGgu ZWR1L29jc3AwDQYJKoZIhvcNAQEFBQADggEBAMRghaYbce3ByAWIFutgqntikjraGADD0jcO P0CL561BwwNkvxxaDcp3sPBgcOQvE7uOXnXwcgkKTwSWT5ndjZzStH5z1Yu7ET4QcRSZCDYB uDHNEZkB4xePuOu/nDvkhaJcGtbdJ0OSNUfoxAVlU/UIGTs8Xf/53OaI7oTmDhxW2mE9J0ra q2dftKHTN14/N4T57QFOexZ03TIeAppsrHd0KISdBe33qwAl/lySDt8UtymWiHBaVYkKmTxb CckzRAbDfFutm8uT6QhCDKHSyfa9rgWADVp7b1wnV3Y26sBn4sx16L39lvMF4ygP1c9JjKPv Mu5VcYsX8lBCg/LCTmgxggL4MIIC9AIBATB9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAX BgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91 dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwCQYFKw4DAhoF AKCCAdEwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMDkwNDEw MTk1MTM0WjAjBgkqhkiG9w0BCQQxFgQU6sIaueZuctLcZSuyQaXRyrLksUEwUgYJKoZIhvcN AQkPMUUwQzAKBggqhkiG9w0DBzAOBggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYF Kw4DAgcwDQYIKoZIhvcNAwICASgwgYwGCSsGAQQBgjcQBDF/MH0wdzETMBEGCgmSJomT8ixk ARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRhcnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNV BAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYDVQQDExNEYXJ0bW91dGggQ2VydEF1dGgxAgIa UzCBjgYLKoZIhvcNAQkQAgsxf6B9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJ k/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29s bGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwDQYJKoZIhvcNAQEBBQAE gYASnb0jdWaklDHSPE/utWIC1HbZRm2QqHrI8PqXJ2ng/NZVn/zs4czzzXwFsKs+R/t8Ng/t 36hW7ujSRB8Tt7m3qqhSfsw64t5DQ+Ttan9uDofi+510lDjWWYL8keOybWw7t6pYXffR2f9N gRMTidCgYP/t7WQHi/pCw7BcZxmZ5QAAAAAAAA== --------------ms060001020207000203080301-- From owner-ietf-pkix@mail.imc.org Fri Apr 10 19:11:51 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BD7DA3A6D98 for ; Fri, 10 Apr 2009 19:11:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.908 X-Spam-Level: X-Spam-Status: No, score=-0.908 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bPHLtLhRJo4U for ; Fri, 10 Apr 2009 19:11:49 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7AA6F3A6D85 for ; Fri, 10 Apr 2009 19:11:48 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B1mKQe051149 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 18:48:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B1mKCE051148; Fri, 10 Apr 2009 18:48:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B1mIN8051138 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 18:48:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hoplodamus.net.ttu.edu (129.118.1.213) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 20:48:18 -0500 Received: from Pickup by hoplodamus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 01:48:17 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B389.B83C96F2" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 07:54:02 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoA= References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: Santosh Chokhani To: "Hallam-Baker, Phillip" , Stefan Santesson , IETF-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B389.B83C96F2 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B389.B83C96F2 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
I have no objection to having an extension, but if = in the long=20 term SHA-1 will not be there, it seems defining a new response type (say = basic=20 2) would be the way to go so that SHA-1 based key ID can be stripped=20 off.
 
If SHA-1 is not getting ripped off in the long = term, I do=20 not see value in extension except that it may make every one happy: = those who do=20 not care will not include it on the Server side and/or will ignore = it on=20 the client side.
 
It would appear that the extension should be=20 NC.
 
Phil,
 
I would not respond to the arguments on KISS and = security=20 since in this case both are straightforward.  Also, in this thread, = the=20 comments were not meant for or directed at you.
 
As you know, I have provided extensive comments to = you when=20 you first posted the OCSP Agility I-D and my position and reasons are = matter of=20 PKIX archives for anyone to scrutinize.  When you ignore every = single=20 cogent point, there is no sense in me commenting on next = iteration.  I do=20 think that the OCSP Agility I-D is a solution looking for a problem that = I do=20 not see.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I think we = have no choice=20 but to leave the Key ID CHOICE to be SHA-1 based.
 
But that does not preclude = adding an=20 extension that allows the KeyID to be specified using a stronger = algorithm.=20 There are two reasons for this:
 
1) Optics, even if there is = no security=20 implication, a protocol that uses weak crypto necessitates an = (expensive)=20 security review to prove that there is no problem. And these must be = performed=20 repeatedly by many different parties as relying on the analysis of = others is a=20 good way to cause issues. Been there, done that.
 
2) We are designing for = long time spans,=20 ten years or more. While simple compressor collisions may not be a = concern,=20 there is no guarantee that the attacks will stop at that point. MD4 = has been=20 broken repeatedly and they are now at the stage of jumping up and down = on the=20 little pieces. It will probably happen to MD5 and we should be = cautious in=20 case it happens to SHA-1.
 
 
On the claim of 'Keep it = simple STUPID',=20 I find it rather offensive to have my position characterized as = stupid. My=20 designs are not exactly known for being verbose or overly elaborate. = If I=20 propose something it is because there is a reason. It is very easy to = defend=20 the status quo by derriding proposals as unnecessary, but the fact is = that=20 making OCSP too simple will simply cause the complexity to blow out = somewhere=20 else.
 
There is an architectural = princple of=20 modular design that demands that the core of PKIX as it now stands = (the=20 certificate profile and OCSP) be capable of stand alone use. We cannot = fix=20 issues in OCSP with LTANS or other layered-on protocols as some have = proposed.=20 It does not simplify my OCSP deployment to have to graft on an entire=20 different protocol in addition or to re-engineer my document archival = protocol=20 to cover defects in OCSP.
 
 
Simply adding new = algorithms to a=20 protocol does nothing to improve security. You only improve security = if you=20 withdraw insecure algorithms from use.
 
To make the system work you = have to have=20 a means of negotiating between the client and the server. Otherwise = there is=20 no way for an OCSP responder to ensure that it receives a secure,=20 supported response to querries for certificates that do not exist = yet or=20 are not known to the responder.
 
In the case of an OCSP = responder being=20 driven by CRLs collected from various sources, there is no way for the = CA to=20 know if a certificate even exists, all it knows is if the status is=20 definitively revoked.
 
In the case of many = transactional=20 architectures the OCSP validation is performed independently of = certificate=20 chain validation.
 
 
Experience of small scale = PKI deployment=20 in which any box can be upgraded at will is simply not representative = of large=20 scale real world deployment.
 


From:=20 owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed=20 4/1/2009 8:39 PM
To: Stefan Santesson; = IETF-pkix
Subject:=20 RE: OCSP RFC (RFC 2560) Dependence on SHA-1


I am saying that "Do you agree that 2560 can be left = alone for=20 Responder
ID's key ID CHOICE being SHA-1 based?"

> = -----Original=20 Message-----
> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= Sent:=20 Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani;=20 IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
>
> Santosh,
>
> = In-line
>
>
>=20 On 4/1/09 10:31 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>=20 wrote:
>
> >
> > Stefan,
> >
> = > See=20 responses in-line.
> >
> >> -----Original=20 Message-----
> >> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh=20 Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: Re: = OCSP RFC=20 (RFC 2560) Dependence on SHA-1
> >>
> >>=20 Santosh,
> >>
> >> If you are talking about = adding=20 other options to calculate the
> >> KeyHash value in = ResponderID=20 then I strongly disagree.
> >>
> >> If you add = unspecified options you change the properties
> of the = field
>=20 >> from deterministic to a completely unknown value.
> = >> It=20 does not matter if RFC2560 isn't explicit in its description = of
>=20 >> the use of the field. The fact is that OCSP = explicitly
>=20 defines this
> >> value and as such will allow a client to = deterministically compare
> >> this value with the = certificate=20 selected to validate the response
> >> signature.
>=20 >
> > I hope no one is doing the matching of Responder ID=20 with
> hash of a key
> > in place of responder = signature=20 verification.  That would
> be real bad.
>=20 >
>
> Yes it would. That is not at all what I talk = about. But=20 a
> client could use this value to locate a responder=20 certificate.
>
> >> If you allow
> >> = other ways=20 to calculate the value but do not provide any means to
> = >> signal=20 what method that was used, then this feature is lost.
> = >
>=20 > The most common use will be to use this field to prioritize = the
>=20 > certificates of the responder to use for sigature
> = verification on=20 the
> > response.
> >
>
> Do you know = this for a=20 fact, or are you guessing?
> If a single implementation verifies = that=20 the certificate used
> to validate the response matches the = ResponderID=20 value, and
> choose to go into an error state because of = mismatch, then=20 we
> have created great problems. So we can't guess. We have = to
>=20 know that no single implementation will fail because of this.
> = And that=20 may be very hard.
>
>
> >>
> >> In = worst=20 case we will cause current implementation to fail.
> = >
> >=20 That is why I am asking what problems if any will the vendors = have.
>=20 >
>
> Even if no vendor speaks up here, it will not = guarantee=20 that
> this will not create any problems.
>
>=20 >>
> >> I really don't think its worth the effort to = change=20 this field. We
> >> have a very large base of = implementations that=20 we really
> don't want
> >> to mess up unless its = absolutely=20 necessary.
> >
> > So, we agree that leaving this = field hard=20 wired to SHA-1 is ok and
> > 2560 can easily accommodate new = hash=20 functions.  Right?
> >
>
> I fail to = understand this=20 sentence. Despite reading it many
> times over.
>
> = > My=20 only reason to align with 5280 is that if some one were
> ever=20 want
> > to strip off SHA-1 altogether from their Responder = or=20 client,
> > permitting other methods does it.
>=20 >
>
> I don't believe this argument is valid as I don't = think=20 it is
> possible to strip off SHA-1 in any reasonable future. In = any
> case. If we compare the positive side with allowing = this
>=20 change and the negative consequences to make OCSP
> incompatible = with=20 itself, my choice is easy.
>
>=20 /Stefan

>
> >>
> >> As the = only=20 property of this field is to provide a convenient
> >> = identifier,=20 it is far from absolutely necessary to change it.
> >> = Remember=20 that there is a second choice to to identify responder by
> = >>=20 name. For names we have accepted the possibility of collisions. = In
>=20 >> that comparison, upgrading from SHA-1 is really = redundant.
>=20 >>
> >> /Stefan
> >>
> = >>
>=20 >>
> >>
> >> On 4/1/09 4:05 PM, "Santosh = Chokhani"
> <SChokhani@cygnacom.com> wrote:
>=20 >>
> >>>
> >>> My resident ASN.1 = expert=20 apprised me of the fact that
> >> adding a choice
>=20 >>> will break backward compatibility.  Thus, extension = is=20 a
> >> fifth option
> >>> (probably third = in the=20 priority).
> >>>
> >>> Based on what I = know of=20 OCSP implementations, not changing
> >> anything = in
>=20 >>> terms of bits on the wire and aligning the Key ID with=20 SKID
> >> in 5280 is
> >>> the best = approach. =20 I do not think it will hurt backward
> >> = compatibility.
>=20 >>>
> >>> OCSP Responder and OCSP client = vendors=20 should speak up if I
> >> am wrong.
> = >>>
>=20 >>>> -----Original Message-----
> >>>> = From:=20 Santosh Chokhani
> >>>> Sent: Tuesday, March 31, = 2009 12:51=20 PM
> >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
>=20 >>>>
> >>>> Max,
>=20 >>>>
> >>>> I do not see where and what=20 extension we need to add for
> >> other digest
>=20 >>>> algorithm.
> >>>>
> = >>>>=20 For key id, we need to enhance or broaden the options.
>=20 >>>>
> >>>>> -----Original=20 Message-----
> >>>>> From:=20 owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20 On Behalf Of
> >> Massimiliano Pala
> = >>>>>=20 Sent: Tuesday, March 31, 2009 1:37 PM
> >>>>> To: = IETF-pkix
> >>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on SHA-1
> >>>>>
> = >>>>>=20 Hi all,
> >>>>>
> >>>>> as I = said=20 during last meeting - as the use of SHA-1 does
> = >>>> not=20 have any
> >>>>> security implication in the = OCSP,=20 another viable way
> would be to
> >>>>> = define an=20 extension where other digest algorithms can be
> = >>>> added=20 to the
> >>>>> request/responses.
>=20 >>>>>
> >>>>> It is a simple = addition and=20 does not require any change in
> >>>> the RFC, = it
>=20 >>>>> can be done as a separate document for those who = what=20 to
> >> use other
> >>>>> digest=20 algorithms.
> >>>>>
> >>>>> = After=20 all, isn't this an example of why we allow
> >> extensions = to=20 the
> >>>>> messages ?
>=20 >>>>>
> >>>>> Later,
>=20 >>>>> Max
> >>>>>
>=20 >>>>>
> >>>>> Santosh Chokhani=20 wrote:
> >>>>>> Tom,
>=20 >>>>>>
> >>>>>> Adding a new = choice=20 and aligning it with 5280 SKID is fine.
>=20 >>>>>>
> >>>>>> I would not = add=20 anything about matching this field with
> >>>>> = anything=20 since
> >>>>>> RFC 2560 does not say anything = about=20 it.
> >>>>>>
> >>>>>> = If one=20 were to add something, one should describe how this
>=20 >>>>> field can
> >>>>>> be = used to=20 select from multiple Responder certificates.
>=20 >>>>>>
> >>>>>>> = -----Original=20 Message-----
> >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20 >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
>=20 >>>>>>> To: Santosh Chokhani
>=20 >>>>>>> Cc: IETF-pkix
>=20 >>>>>>> Subject: Re: OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 Santosh:
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 The RFC 5280 method just describes "two common
> = >>>>=20 methods for
> >>>>>>> generating key = identifiers=20 from the public key"
> >>>>>>> and says = that other=20 methods are acceptable.  The comment
> >>>>> = to=20 KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not = as=20 permissive.  Of course, it's
> >>>> the = same
>=20 >>>>>>> field as SKID, and I would support either = stating=20 "if the
> >>>>> KeyHash is
>=20 >>>>>>> not precisely 20 octets long, it should = be=20 matched
> against the
> >>>>>>> = Subject Key=20 Identifier extension of the signing
> certificate" or
>=20 >>>>>>> adding another choice like byID [3] OCTET = STRING=20 --
> >>>>> matches the value
>=20 >>>>>>> of SKID.
>=20 >>>>>>>
>=20 = >>>>>>>       &nb= sp;        =20 Tom Gindin
> >>>>>>>
>=20 >>>>>>> P.S. - The above opinions are mine, and = not=20 necessarily
> >>>>> those of my
>=20 >>>>>>> employer
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> "Santosh Chokhani" = <SChokhani@cygnacom.com>=20 Sent by:
> >>>>>>>=20 owner-ietf-pkix@mail.imc.org
> >>>>>>> = 03/26/2009=20 10:39 PM
> >>>>>>>
>=20 >>>>>>> To
> >>>>>>>=20 "IETF-pkix" <ietf-pkix@imc.org>
> = >>>>>>>=20 cc
> >>>>>>>
> = >>>>>>>=20 Subject
> >>>>>>> OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> RFC 2560 dependence on SHA-1 does not = appear to=20 be
> >>>>> difficult to deal
>=20 >>>>>>> with.
>=20 >>>>>>>
> >>>>>>> = Section 4.3=20 lists SHA-1 as mandatory and RSA as
> >>>> = optional. =20 We can
> >>>>>>> update this to add SHA-2 = series as=20 optional.
> >>>>>>>
>=20 >>>>>>> The Responder ID has SHA-1 = hardwired.  But,=20 that is no
> >>>>> different than
>=20 >>>>>>> key ID extensions in RFC 5280.  Here = are=20 some options
> >> in order of
> = >>>>>>>=20 preference:
> >>>>>>>
>=20 >>>>>>> 1.  Align the language with subject = key ID=20 language
> in RFC 5280.
> = >>>>>>>
>=20 >>>>>>> 2.  Keep on using SHA-1.  This = field is=20 not security
> >>>>> relevant.  RFC
>=20 >>>>>>> 2560 does not even describe how to use = this=20 field.  So,
> >>>>> having SHA-1
>=20 >>>>>>> and accidental or intentional collisions = will not=20 hurt the
> >>>>> security
>=20 >>>>>>> of the protocol.
>=20 >>>>>>>
> >>>>>>> = 3.  If=20 you do not believe in KISS principle, you can
> = >>>>>=20 define another
> >>>>>>> response type and = enhance=20 the key ID ASN.1 syntax so
> that hash
>=20 >>>>>>> algorithm is identified.
>=20 >>>>>>>
> >>>>>>> = 4. =20 Another option is for the Responder to use the
> same = hashing
>=20 >>>>>>> algorithm as the one in the first certID=20 entry.
> >>>>>>>
>=20 >>>>>>>
> >>>>>>> = Santosh=20 Chokhani
> >>>>>>> CygnaCom = Solutions
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>
> >>>>>>
>=20 >>>>>
> >>>>>
> = >>>>>=20 --
> >>>>>
> >>>>> Best=20 Regards,
> >>>>>
> >>>>>=20 Massimiliano Pala
> >>>>>
> = >>>>>=20 --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano=20 Pala [OpenCA Project Manager]
> >>>>>=20 Massimiliano.Pala@dartmouth.edu
>=20 = >>>>>         = ;    
>=20 >>>>> project.manager@openca.org
>=20 >>>>>
> >>>>> Dartmouth Computer = Science=20 = Dept           &nb= sp;  =20 Home Phone: +1
> >>>>> (603) 369-9332
>=20 >>>>> PKI/Trust=20 = Laboratory          &nb= sp;           &nbs= p;  =20 Work Phone: +1
> >>>>> (603) 646-9179
>=20 >>>>>=20 --o-----------------------------------------------------------
> = >>>>> -------------
> = >>>>>
>=20 >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> = >>>>> of us=20 who do.
> >>>>>   --
>=20 >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
>=20 >>
> >>
>=20 = >
>
>
>

= ------_=_NextPart_001_01C9B389.B83C96F2-- From owner-ietf-pkix@mail.imc.org Fri Apr 10 20:27:45 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 54FAE3A6DBF for ; Fri, 10 Apr 2009 20:27:45 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 0.488 X-Spam-Level: X-Spam-Status: No, score=0.488 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dheoRJa--So6 for ; Fri, 10 Apr 2009 20:27:42 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 107163A6D9A for ; Fri, 10 Apr 2009 20:27:41 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B2xWGP054274 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 19:59:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B2xWhS054273; Fri, 10 Apr 2009 19:59:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B2xLcR054260 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 19:59:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hoplodamus.net.ttu.edu (129.118.1.213) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 21:59:20 -0500 Received: from Pickup by hoplodamus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 02:59:19 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B39A.1397BF01" Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 06:47:45 -0700 Message-ID: <2788466ED3E31C418E9ACC5C3166155768B35F@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 thread-index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABFiEVA== References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Hallam-Baker, Phillip" To: Santosh Chokhani , Stefan Santesson , IETF-pkix X-OriginalArrivalTime: 02 Apr 2009 13:51:09.0810 (UTC) FILETIME=[13F79D20:01C9B39A] List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B39A.1397BF01 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable On the contrary, each time I asked for a substantive argument you used = exactly the same non argument you are using here. =20 I have put a substantive argument on the table here. "I am not = convinced" or "I answered the question some other time" with no links to = the specific points are not a substantive response. You may think that = you gave a substantive explanation of how a client that only supports = ECC can obtain a comprehensible response from a generic OCSP server that = also supports RSA. However I do not beleive that it is possible in the = current protocol. =20 If you think you have demonstrated this in the past then please point to = the email. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 I have no objection to having an extension, but if in the long term = SHA-1 will not be there, it seems defining a new response type (say = basic 2) would be the way to go so that SHA-1 based key ID can be = stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value = in extension except that it may make every one happy: those who do not = care will not include it on the Server side and/or will ignore it on the = client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this = case both are straightforward. Also, in this thread, the comments were = not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first = posted the OCSP Agility I-D and my position and reasons are matter of = PKIX archives for anyone to scrutinize. When you ignore every single = cogent point, there is no sense in me commenting on next iteration. I = do think that the OCSP Agility I-D is a solution looking for a problem = that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 = based. =20 But that does not preclude adding an extension that allows the KeyID to = be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that = uses weak crypto necessitates an (expensive) security review to prove = that there is no problem. And these must be performed repeatedly by many = different parties as relying on the analysis of others is a good way to = cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While = simple compressor collisions may not be a concern, there is no guarantee = that the attacks will stop at that point. MD4 has been broken repeatedly = and they are now at the stage of jumping up and down on the little = pieces. It will probably happen to MD5 and we should be cautious in case = it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to = have my position characterized as stupid. My designs are not exactly = known for being verbose or overly elaborate. If I propose something it = is because there is a reason. It is very easy to defend the status quo = by derriding proposals as unnecessary, but the fact is that making OCSP = too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that = the core of PKIX as it now stands (the certificate profile and OCSP) be = capable of stand alone use. We cannot fix issues in OCSP with LTANS or = other layered-on protocols as some have proposed. It does not simplify = my OCSP deployment to have to graft on an entire different protocol in = addition or to re-engineer my document archival protocol to cover = defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve = security. You only improve security if you withdraw insecure algorithms = from use. =20 To make the system work you have to have a means of negotiating between = the client and the server. Otherwise there is no way for an OCSP = responder to ensure that it receives a secure, supported response to = querries for certificates that do not exist yet or are not known to the = responder. =20 In the case of an OCSP responder being driven by CRLs collected from = various sources, there is no way for the CA to know if a certificate = even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is = performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be = upgraded at will is simply not representative of large scale real world = deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for = Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" = wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B39A.1397BF01 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1=0A= =0A= =0A= =0A=
=0A=
On the = contrary, each time I asked for a substantive argument you used exactly = the same non argument you are using here.
=0A=
 
=0A=
I have put a substantive = argument on the table here. "I am not convinced" or "I answered the = question some other time" with no links to the specific points are not a = substantive response. You may think that you gave a substantive = explanation of how a client that only supports ECC can obtain a = comprehensible response from a generic OCSP server that also supports = RSA. However I do not beleive that it is possible in the current = protocol.
=0A=
 
=0A=
If you think you have = demonstrated this in the past then please point to the = email.
=0A=
 
=0A=

=0A=
=0A= From: Santosh Chokhani = [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54 = AM
To: Hallam-Baker, Phillip; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
I have no objection to having an = extension, but if in the long term SHA-1 will not be there, it seems = defining a new response type (say basic 2) would be the way to go so = that SHA-1 based key ID can be stripped off.
=0A=
 
=0A=
If SHA-1 is not getting ripped off = in the long term, I do not see value in extension except that it = may make every one happy: those who do not care will not include it = on the Server side and/or will ignore it on the client = side.
=0A=
 
=0A=
It would appear that the extension = should be NC.
=0A=
 
=0A=
Phil,
=0A=
 
=0A=
I would not respond to the = arguments on KISS and security since in this case both are = straightforward.  Also, in this thread, the comments were not meant = for or directed at you.
=0A=
 
=0A=
As you know, I have provided = extensive comments to you when you first posted the OCSP Agility I-D and = my position and reasons are matter of PKIX archives for anyone to = scrutinize.  When you ignore every single cogent point, there is no = sense in me commenting on next iteration.  I do think that the OCSP = Agility I-D is a solution looking for a problem that I do not = see.
=0A=
=0A=
=0A=
=0A= From: Hallam-Baker, Phillip = [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53 AM
To: Santosh Chokhani; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
=0A=
I think we = have no choice but to leave the Key ID CHOICE to be SHA-1 = based.
=0A=
 
=0A=
But that does not preclude = adding an extension that allows the KeyID to be specified using a = stronger algorithm. There are two reasons for this:
=0A=
 
=0A=
1) Optics, even if there is = no security implication, a protocol that uses weak crypto necessitates = an (expensive) security review to prove that there is no problem. And = these must be performed repeatedly by many different parties as relying = on the analysis of others is a good way to cause issues. Been there, = done that.
=0A=
 
=0A=
2) We are designing for long = time spans, ten years or more. While simple compressor collisions may = not be a concern, there is no guarantee that the attacks will stop at = that point. MD4 has been broken repeatedly and they are now at the stage = of jumping up and down on the little pieces. It will probably happen to = MD5 and we should be cautious in case it happens to SHA-1.
=0A=
 
=0A=
 
=0A=
On the claim of 'Keep it = simple STUPID', I find it rather offensive to have my position = characterized as stupid. My designs are not exactly known for being = verbose or overly elaborate. If I propose something it is because there = is a reason. It is very easy to defend the status quo by derriding = proposals as unnecessary, but the fact is that making OCSP too simple = will simply cause the complexity to blow out somewhere else.
=0A=
 
=0A=
There is an architectural = princple of modular design that demands that the core of PKIX as it now = stands (the certificate profile and OCSP) be capable of stand alone use. = We cannot fix issues in OCSP with LTANS or other layered-on protocols as = some have proposed. It does not simplify my OCSP deployment to have to = graft on an entire different protocol in addition or to re-engineer my = document archival protocol to cover defects in OCSP.
=0A=
 
=0A=
 
=0A=
Simply adding new algorithms = to a protocol does nothing to improve security. You only improve = security if you withdraw insecure algorithms from use.
=0A=
 
=0A=
To make the system work you = have to have a means of negotiating between the client and the server. = Otherwise there is no way for an OCSP responder to ensure that it = receives a secure, supported response to querries for certificates = that do not exist yet or are not known to the responder.
=0A=
 
=0A=
In the case of an OCSP = responder being driven by CRLs collected from various sources, there is = no way for the CA to know if a certificate even exists, all it knows is = if the status is definitively revoked.
=0A=
 
=0A=
In the case of many = transactional architectures the OCSP validation is performed = independently of certificate chain validation.
=0A=
 
=0A=
 
=0A=
Experience of small scale PKI = deployment in which any box can be upgraded at will is simply not = representative of large scale real world deployment.
=0A=
 
=0A=
=0A=

=0A=
=0A=
=0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed 4/1/2009 8:39 PM
To: Stefan = Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

=0A=

=0A=

I am saying that "Do you agree that 2560 can be left = alone for Responder
ID's key ID CHOICE being SHA-1 = based?"

> -----Original Message-----
> From: Stefan = Santesson [mailto:stefan@aaa-sec.com]
>= Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani; = IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on = SHA-1
>
> Santosh,
>
> = In-line
>
>
> On 4/1/09 10:31 PM, "Santosh Chokhani" = <SChokhani@cygnacom.com> wrote:
>
> >
> > = Stefan,
> >
> > See responses in-line.
> = >
> >> -----Original Message-----
> >> From: = Stefan Santesson [mailto:stefan@aaa-sec.com]
>= >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >> Santosh,
> >>
> >> If you are talking = about adding other options to calculate the
> >> KeyHash = value in ResponderID then I strongly disagree.
> >>
> = >> If you add unspecified options you change the = properties
> of the field
> >> from deterministic to a = completely unknown value.
> >> It does not matter if RFC2560 = isn't explicit in its description of
> >> the use of the = field. The fact is that OCSP explicitly
> defines this
> = >> value and as such will allow a client to deterministically = compare
> >> this value with the certificate selected to = validate the response
> >> signature.
> >
> = > I hope no one is doing the matching of Responder ID with
> = hash of a key
> > in place of responder signature = verification.  That would
> be real bad.
> = >
>
> Yes it would. That is not at all what I talk about. = But a
> client could use this value to locate a responder = certificate.
>
> >> If you allow
> >> = other ways to calculate the value but do not provide any means = to
> >> signal what method that was used, then this feature = is lost.
> >
> > The most common use will be to use = this field to prioritize the
> > certificates of the responder = to use for sigature
> verification on the
> > = response.
> >
>
> Do you know this for a fact, or = are you guessing?
> If a single implementation verifies that the = certificate used
> to validate the response matches the = ResponderID value, and
> choose to go into an error state because = of mismatch, then we
> have created great problems. So we can't = guess. We have to
> know that no single implementation will fail = because of this.
> And that may be very = hard.
>
>
> >>
> >> In worst case we = will cause current implementation to fail.
> >
> > = That is why I am asking what problems if any will the vendors = have.
> >
>
> Even if no vendor speaks up here, it = will not guarantee that
> this will not create any = problems.
>
> >>
> >> I really don't think = its worth the effort to change this field. We
> >> have a = very large base of implementations that we really
> don't = want
> >> to mess up unless its absolutely = necessary.
> >
> > So, we agree that leaving this = field hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite reading = it many
> times over.
>
> > My only reason to align = with 5280 is that if some one were
> ever want
> > to = strip off SHA-1 altogether from their Responder or client,
> > = permitting other methods does it.
> >
>
> I don't = believe this argument is valid as I don't think it is
> possible = to strip off SHA-1 in any reasonable future. In any
> case. If we = compare the positive side with allowing this
> change and the = negative consequences to make OCSP
> incompatible with itself, my = choice is easy.
>
> /Stefan

>
> = >>
> >> As the only property of this field is to = provide a convenient
> >> identifier, it is far from = absolutely necessary to change it.
> >> Remember that there = is a second choice to to identify responder by
> >> name. = For names we have accepted the possibility of collisions. In
> = >> that comparison, upgrading from SHA-1 is really = redundant.
> >>
> >> /Stefan
> = >>
> >>
> >>
> >>
> = >> On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com> wrote:
> >>
> = >>>
> >>> My resident ASN.1 expert apprised me = of the fact that
> >> adding a choice
> >>> = will break backward compatibility.  Thus, extension is a
> = >> fifth option
> >>> (probably third in the = priority).
> >>>
> >>> Based on what I = know of OCSP implementations, not changing
> >> anything = in
> >>> terms of bits on the wire and aligning the Key = ID with SKID
> >> in 5280 is
> >>> the best = approach.  I do not think it will hurt backward
> >> = compatibility.
> >>>
> >>> OCSP Responder = and OCSP client vendors should speak up if I
> >> am = wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh Chokhani
> = >>>> Sent: Tuesday, March 31, 2009 12:51 PM
> = >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>
> >>>> Max,
> = >>>>
> >>>> I do not see where and what = extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
> = >>>> For key id, we need to enhance or broaden the = options.
> >>>>
> >>>>> = -----Original Message-----
> >>>>> From: = owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> >> Massimiliano Pala
> = >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>>>>
> >>>>> Hi all,
> = >>>>>
> >>>>> as I said during last = meeting - as the use of SHA-1 does
> >>>> not have = any
> >>>>> security implication in the OCSP, = another viable way
> would be to
> >>>>> = define an extension where other digest algorithms can be
> = >>>> added to the
> >>>>> = request/responses.
> >>>>>
> = >>>>> It is a simple addition and does not require any = change in
> >>>> the RFC, it
> = >>>>> can be done as a separate document for those who = what to
> >> use other
> >>>>> digest = algorithms.
> >>>>>
> >>>>> = After all, isn't this an example of why we allow
> >> = extensions to the
> >>>>> messages ?
> = >>>>>
> >>>>> Later,
> = >>>>> Max
> >>>>>
> = >>>>>
> >>>>> Santosh Chokhani = wrote:
> >>>>>> Tom,
> = >>>>>>
> >>>>>> Adding a new = choice and aligning it with 5280 SKID is fine.
> = >>>>>>
> >>>>>> I would not = add anything about matching this field with
> >>>>> = anything since
> >>>>>> RFC 2560 does not say = anything about it.
> >>>>>>
> = >>>>>> If one were to add something, one should = describe how this
> >>>>> field can
> = >>>>>> be used to select from multiple Responder = certificates.
> >>>>>>
> = >>>>>>> -----Original Message-----
> = >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
> >>>>>>> To: Santosh Chokhani
> = >>>>>>> Cc: IETF-pkix
> = >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence = on SHA-1
> >>>>>>>
> = >>>>>>>       &nb= sp; Santosh:
> >>>>>>>
> = >>>>>>>       &nb= sp; The RFC 5280 method just describes "two common
> = >>>> methods for
> >>>>>>> = generating key identifiers from the public key"
> = >>>>>>> and says that other methods are = acceptable.  The comment
> >>>>> to = KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as = permissive.  Of course, it's
> >>>> the = same
> >>>>>>> field as SKID, and I would = support either stating "if the
> >>>>> KeyHash = is
> >>>>>>> not precisely 20 octets long, it = should be matched
> against the
> = >>>>>>> Subject Key Identifier extension of the = signing
> certificate" or
> >>>>>>> = adding another choice like byID [3] OCTET STRING --
> = >>>>> matches the value
> = >>>>>>> of SKID.
> = >>>>>>>
> = >>>>>>>       &nb= sp;         Tom Gindin
> = >>>>>>>
> >>>>>>> P.S. - = The above opinions are mine, and not necessarily
> = >>>>> those of my
> >>>>>>> = employer
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> = "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by:
> = >>>>>>> owner-ietf-pkix@mail.imc.org
> = >>>>>>> 03/26/2009 10:39 PM
> = >>>>>>>
> >>>>>>> = To
> >>>>>>> "IETF-pkix" = <ietf-pkix@imc.org>
> >>>>>>> = cc
> >>>>>>>
> = >>>>>>> Subject
> = >>>>>>> OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> RFC = 2560 dependence on SHA-1 does not appear to be
> = >>>>> difficult to deal
> = >>>>>>> with.
> = >>>>>>>
> >>>>>>> = Section 4.3 lists SHA-1 as mandatory and RSA as
> >>>> = optional.  We can
> >>>>>>> update this = to add SHA-2 series as optional.
> = >>>>>>>
> >>>>>>> The = Responder ID has SHA-1 hardwired.  But, that is no
> = >>>>> different than
> >>>>>>> = key ID extensions in RFC 5280.  Here are some options
> = >> in order of
> >>>>>>> = preference:
> >>>>>>>
> = >>>>>>> 1.  Align the language with subject = key ID language
> in RFC 5280.
> = >>>>>>>
> >>>>>>> = 2.  Keep on using SHA-1.  This field is not security
> = >>>>> relevant.  RFC
> = >>>>>>> 2560 does not even describe how to use this = field.  So,
> >>>>> having SHA-1
> = >>>>>>> and accidental or intentional collisions = will not hurt the
> >>>>> security
> = >>>>>>> of the protocol.
> = >>>>>>>
> >>>>>>> = 3.  If you do not believe in KISS principle, you can
> = >>>>> define another
> >>>>>>> = response type and enhance the key ID ASN.1 syntax so
> that = hash
> >>>>>>> algorithm is = identified.
> >>>>>>>
> = >>>>>>> 4.  Another option is for the = Responder to use the
> same hashing
> = >>>>>>> algorithm as the one in the first certID = entry.
> >>>>>>>
> = >>>>>>>
> >>>>>>> = Santosh Chokhani
> >>>>>>> CygnaCom = Solutions
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>
> = >>>>>>
> >>>>>
> = >>>>>
> >>>>> --
> = >>>>>
> >>>>> Best Regards,
> = >>>>>
> >>>>> Massimiliano = Pala
> >>>>>
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano Pala [OpenCA Project Manager]
> >>>>> = Massimiliano.Pala@dartmouth.edu
> = >>>>>         = ;    
> >>>>> = project.manager@openca.org
> >>>>>
> = >>>>> Dartmouth Computer Science = Dept           &nb= sp;   Home Phone: +1
> >>>>> (603) = 369-9332
> >>>>> PKI/Trust = Laboratory          &nb= sp;           &nbs= p;   Work Phone: +1
> >>>>> (603) = 646-9179
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>>
> = >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> >>>>> = of us who do.
> >>>>>   --
> = >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
> = >>
> >>
> = >
>
>
>

<= /BODY> ------_=_NextPart_001_01C9B39A.1397BF01-- From owner-ietf-pkix@mail.imc.org Fri Apr 10 21:29:27 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CB7293A69BB for ; Fri, 10 Apr 2009 21:29:27 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.908 X-Spam-Level: X-Spam-Status: No, score=-0.908 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s6Gbd440J171 for ; Fri, 10 Apr 2009 21:29:27 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 897033A6886 for ; Fri, 10 Apr 2009 21:29:26 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B3xAQo056744 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 20:59:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B3xAAF056743; Fri, 10 Apr 2009 20:59:10 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B3x9oS056737 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 20:59:10 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hoplodamus.net.ttu.edu (129.118.1.213) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 22:59:09 -0500 Received: from Pickup by hoplodamus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 03:59:09 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3A4.843C68C1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 11:05:52 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABIERYQACTItw References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> From: Carl Wallace To: "Hallam-Baker, Phillip" , IETF-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B3A4.843C68C1 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the case that we have an RSA1024-SHA1 signature on a document signed using a key that was subsequently compromised and the question the infrastructure needs to answer is whether the certificate was valid at the point it was signed. This was one of the original core use cases in the design of OCSP. =20 Ignoring hash algorithms for the moment, how does a client indicate its time of interest to the OCSP responder? ------_=_NextPart_001_01C9B3A4.843C68C1 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on SHA-1

The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the = case that we have an RSA1024-SHA1 signature on a document signed using a key that = was subsequently compromised and the question the infrastructure needs to = answer is whether the certificate was valid at the point it was signed. This was = one of the original core use cases in the design of OCSP.

 

Ignoring hash algorithms for the moment, how does a = client indicate its time of interest to the OCSP = responder?

------_=_NextPart_001_01C9B3A4.843C68C1-- From owner-ietf-pkix@mail.imc.org Sat Apr 11 03:14:19 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4F5B43A6B0B for ; Sat, 11 Apr 2009 03:14:19 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -9.699 X-Spam-Level: X-Spam-Status: No, score=-9.699 tagged_above=-999 required=5 tests=[BAYES_50=0.001, GB_I_LETTER=-2, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vVNX6NbO6KzM for ; Sat, 11 Apr 2009 03:14:18 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A4C893A6836 for ; Sat, 11 Apr 2009 03:14:17 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B9lMoe070383 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 02:47:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B9lMr1070382; Sat, 11 Apr 2009 02:47:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B9lAtL070374 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 02:47:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 02:47:10 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 02:47:09 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 09:49:03 +0000 X-BigFish: ps-93(zz1432R98dR14ffO936eQ1443R1805M936fK9371Pzz2cfT1202hzz5a6ciz2dheIL6bh62h) X-Spam-TCS-SCL: 1:0 X-FB-SS: 5, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Message-ID: <49DCB26D.5050202@nist.gov> Date: Wed, 8 Apr 2009 10:19:25 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.21 (X11/20090330) MIME-Version: 1.0 To: =?ISO-8859-1?Q?Jorge_L=F3pez?= , Stefan Santesson CC: pkix Subject: Re: Revocation scheme definition References: In-Reply-To: Content-Type: text/plain; charset="ISO-8859-1"; format=flowed X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable Received-SPF: None (SVC-EXGWY-E802.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan Santesson wrote: > Despite that I would love to put CSI expert on my business card, it=20 > might be a bit problematic to hijack this acronym :) Yes, RFC 5513 points out the problem of the overuse of three letter=20 acronyms (granted it is an April 1 RFC). If we used the acronym CSI,=20 most people would tend to immediately think of the College of Southern=20 Idaho ... I mean the College of Staten Island ... Computer Security=20 Institute ... Construction Specifications Institute ... Commodity=20 Systems Inc. ... Computers & Structures, Inc. ... Chi Sigma Iota ...=20 Christian Schools International ... Computational Systems, Inc. ...=20 Christian Solidarity International ... California Solar Initiative ...=20 Canadian Solar Inc. ... Chandler Systems Inc. ... Communications=20 Specialties, Inc. ... Cetacean Society International ... Coalition of=20 Service Industries ... Church of South India ... Computer Society of=20 India ... Cellular Specialties, Inc. ... College Student Insurance ...=20 Custom Systems Integration ... Center for Social Innovation ... Center=20 for Sustainable Innovation ... Creative Specialties International ...=20 Control Sciences Inc. ... Conditional Symmetric Instability ...=20 Community Services Infrastructure ... Coastal Studies Institute ...=20 Curriculum Support Information ... Control Solutions International ...=20 Conversion Services International ... Civil Society International ...=20 Collaborative Software Initiative ... Consolidated Systems Incorporated=20 ... Center for the Study of Intelligence ... Combat Studies Institute=20 ... Coatings Societies International ... Chemical Sampling Information=20 ... California Steel Industries ... Cardiovascular Systems Inc. ...=20 Conservation Study Institute ... Cognitive Strategy Instruction ...=20 Compliance Services International ... Cement Sustainability Initiative=20 ... Cyber Safety Initiative ... Center for Student Involvement ...=20 Center for the Study of Inequality ... Chiropractic Sports Institute ...=20 Closure Systems International ... Custom Scientific Instruments ...=20 Crisis Simulations International ... Cooperative Sagebrush Initiative=20 ... Child Study Institute ... Climate Status Investigations ...=20 Centrifugal Services, Inc. ... Conflict Solutions International ...=20 Caregiver Services, Inc. ... Charter School Institute ... Component=20 Sources International ... So I can understand that you would be concerned that if you referred to=20 yourself as a CSI expert, people might think you meant that you were an=20 expert in Computational Sciences and Informatics. > Other than that I feel sympathetic to your distinction between=20 > revocation and validation. It is however my belief that we have used=20 > that distinction in our standards efforts. I think it would be helpful if specific examples were provided of places=20 in PKIX documents in which the distinction between mechanisms for=20 distributing certificate status information (e.g., CRLs and OCSP) and=20 mechanisms for submitting revocation requests (e.g., a CMP revocation=20 request message) is not clear. Perhaps this confusion does appear in=20 the literature, and those of us on this list simply don't notice it=20 since we already clearly understand the concepts. But without being=20 provided specific examples of text that a non-PKI expert might find=20 confusing, it is difficult for us to judge whether this is a problem in=20 PKIX documents that the WG needs to be more careful about in future=20 documents. Dave > On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: > > Hi all, > > Next I merely offer personal considerations about the (in my > opinion) confusing scenario of PKI terminology classification. I > would appreciate any comment on this. > > As can be seen in the literature, most people define CRL, > Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, > Certificate Revocation Status, Certificate Revocation Tree, etc. > as revocation schemes. I think this "classification" is confusing. > > I personally consider a revocation scheme as a scheme/protocol > where the owner (or an authorised party) is able to revocate the > status of her certificate. For example, the one defined in RFC > 4210 CMP. However, the terms mentioned above relate to data > structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make > that data structure available to others (Over-Issued CRL, > Over-Issued Segmented CRL, etc.) and both the managed data > structure and the associated publication mechanism (NOVOMODO, > Certificate Revocation Tree, etc.). But none of them to the > procedure to be followed in order to revocate the certificate! If > fact OCSP is sometimes referenced as a revocation scheme, when it > is actually focused on "just" checking the revocation status of a > certificate... > > From my viewpoint, I would differentiate among the scheme, the > certificate status information itself - CSI (data structure) - and > the method that distributes/publishes the CSI. A revocation scheme > updates the CSI. However, the publication/distribution method is > oriented to support the validation of certificates. IMHO it has > nothing to do with a revocation scheme. Perhaps you may consider > appropiate to include in the term "revocation scheme" everything > that has something to do with the revocation information... > > Therefore, I distinguish a revocation scheme from another type of > scheme (validation scheme) which aim is to check the status of a > certificate taking into account the CSI. This CSI could be > distributed/published by using one of the methods defined above, > or accessed in an online manner (an OCSP service that retrieves > the CSI from a fresh database). > > I guess that the revocation scheme term has been extended to > things not so related to the revocation itself, like the > validation procedure. I just want to know what the PKI community > think about this. > > Thanks in advance, > > -------- > Jorge Lopez Hernandez-Ardieta > From owner-ietf-pkix@mail.imc.org Sat Apr 11 03:22:50 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EAAEC3A6836 for ; Sat, 11 Apr 2009 03:22:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -12.298 X-Spam-Level: X-Spam-Status: No, score=-12.298 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lA5fOb5trFt1 for ; Sat, 11 Apr 2009 03:22:49 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 92EF93A6AE6 for ; Sat, 11 Apr 2009 03:22:48 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BA4APb071332 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 03:04:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3BA4AQM071331; Sat, 11 Apr 2009 03:04:10 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BA3xOE071320 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 03:04:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from TK5-EXHUB-C101.redmond.corp.microsoft.com (157.54.18.48) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 03:03:58 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by TK5-EXHUB-C101.redmond.corp.microsoft.com (157.54.18.48) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 03:03:58 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 10:05:51 +0000 X-BigFish: ps-96(zz1418M1432R98dR14ffO936eQ1443R1805M936fK9371Pzz2cfT1202h10adjzz5a6ciz2dheIL5eh6bh5fh) X-FB-SS: 5,5,13, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=9Z/kLQvAVeOVthHV9xhPtxDJ1CkrYeiiue5s39nsTtA=; b=r4fQH0SmXvyZSFJctoEctkEIVa5UMW2HKi2Le4nWBMxfp86drF2pcpQeG7GcIQM09o c+2GACOeR7Hjw/d3RkhmHAv1WtB4pJmvhv90K45cTUZJ+O54Enc4b1xzD0WcCGrnxoaI HhZgps7UrahjFeCn0+TSyZcdlAnf/W16d/56I= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=BN3mmPhoNEC5vvDTb12Thzc7syouzFroLftkfxm3kRMTNy8+5wEDMT83k0UkVBs6ez 3KwUcqWbnRhbvtAu9hxHP6oaaMqOTDfGOqwDwAXYG074vaQhgz9NHqZzUK8rOeeBmIoS i0G4s8Wor0OY0EBSgui9fVOIxGaGM8DtZ9VCw= MIME-Version: 1.0 In-Reply-To: <49DCB26D.5050202@nist.gov> References: <49DCB26D.5050202@nist.gov> Date: Wed, 8 Apr 2009 16:57:54 +0200 Message-ID: Subject: Re: Revocation scheme definition From: =?ISO-8859-1?Q?Jorge_L=F3pez?= To: "David A. Cooper" CC: Stefan Santesson , pkix Content-Type: multipart/alternative; boundary="001485f870603e3a0d04670c5b4e" List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (SVC-EXGWY-E802.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --001485f870603e3a0d04670c5b4e Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Thanks Stefan and Dave for your responses. Well, maybe CSI was not the best acronym as a proposal :-) I wasn't talking about PKIX documents, but some research papers, master/doctoral thesis where a classification of "revocation mechanisms" is made. I understand that these domains are out of the scope of the PKIX community, but maybe we should think of "standardizing" some concepts if th= e "rest of the world" tends to confuse them. I think that's one of the tasks of a standardization organization/work group/etc. Possibly it is not worthy to work on it focusing merely on revocation schem= e related terms, but I have been following a thread about digital certificate/end user certificate/etc. terms that seemed to be confusing as well to some folks. Is it crazy to propose an RFC Informational which collects a kind of glossary and definitions of PKIX related technology? Best, -------- Jorge Lopez Hernandez-Ardieta 2009/4/8 David A. Cooper > Stefan Santesson wrote: > >> Despite that I would love to put CSI expert on my business card, it migh= t >> be a bit problematic to hijack this acronym :) >> > > Yes, RFC 5513 points out the problem of the overuse of three letter > acronyms (granted it is an April 1 RFC). If we used the acronym CSI, mos= t > people would tend to immediately think of the College of Southern Idaho .= .. > I mean the College of Staten Island ... Computer Security Institute ... > Construction Specifications Institute ... Commodity Systems Inc. ... > Computers & Structures, Inc. ... Chi Sigma Iota ... Christian Schools > International ... Computational Systems, Inc. ... Christian Solidarity > International ... California Solar Initiative ... Canadian Solar Inc. ... > Chandler Systems Inc. ... Communications Specialties, Inc. ... Cetacean > Society International ... Coalition of Service Industries ... Church of > South India ... Computer Society of India ... Cellular Specialties, Inc. = ... > College Student Insurance ... Custom Systems Integration ... Center for > Social Innovation ... Center for Sustainable Innovation ... Creative > Specialties International ... Control Sciences Inc. ... Conditional > Symmetric Instability ... Community Services Infrastructure ... Coastal > Studies Institute ... Curriculum Support Information ... Control Solution= s > International ... Conversion Services International ... Civil Society > International ... Collaborative Software Initiative ... Consolidated Syst= ems > Incorporated ... Center for the Study of Intelligence ... Combat Studies > Institute ... Coatings Societies International ... Chemical Sampling > Information ... California Steel Industries ... Cardiovascular Systems In= c. > ... Conservation Study Institute ... Cognitive Strategy Instruction ... > Compliance Services International ... Cement Sustainability Initiative ..= . > Cyber Safety Initiative ... Center for Student Involvement ... Center for > the Study of Inequality ... Chiropractic Sports Institute ... Closure > Systems International ... Custom Scientific Instruments ... Crisis > Simulations International ... Cooperative Sagebrush Initiative ... Child > Study Institute ... Climate Status Investigations ... Centrifugal Service= s, > Inc. ... Conflict Solutions International ... Caregiver Services, Inc. ..= . > Charter School Institute ... Component Sources International ... > > So I can understand that you would be concerned that if you referred to > yourself as a CSI expert, people might think you meant that you were an > expert in Computational Sciences and Informatics. > > Other than that I feel sympathetic to your distinction between revocatio= n >> and validation. It is however my belief that we have used that distincti= on >> in our standards efforts. >> > > I think it would be helpful if specific examples were provided of places = in > PKIX documents in which the distinction between mechanisms for distributi= ng > certificate status information (e.g., CRLs and OCSP) and mechanisms for > submitting revocation requests (e.g., a CMP revocation request message) i= s > not clear. Perhaps this confusion does appear in the literature, and tho= se > of us on this list simply don't notice it since we already clearly > understand the concepts. But without being provided specific examples of > text that a non-PKI expert might find confusing, it is difficult for us t= o > judge whether this is a problem in PKIX documents that the WG needs to be > more careful about in future documents. > > Dave > > > On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: >> >> Hi all, >> >> Next I merely offer personal considerations about the (in my >> opinion) confusing scenario of PKI terminology classification. I >> would appreciate any comment on this. >> >> As can be seen in the literature, most people define CRL, >> Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, >> Certificate Revocation Status, Certificate Revocation Tree, etc. >> as revocation schemes. I think this "classification" is confusing. >> >> I personally consider a revocation scheme as a scheme/protocol >> where the owner (or an authorised party) is able to revocate the >> status of her certificate. For example, the one defined in RFC >> 4210 CMP. However, the terms mentioned above relate to data >> structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make >> that data structure available to others (Over-Issued CRL, >> Over-Issued Segmented CRL, etc.) and both the managed data >> structure and the associated publication mechanism (NOVOMODO, >> Certificate Revocation Tree, etc.). But none of them to the >> procedure to be followed in order to revocate the certificate! If >> fact OCSP is sometimes referenced as a revocation scheme, when it >> is actually focused on "just" checking the revocation status of a >> certificate... >> >> From my viewpoint, I would differentiate among the scheme, the >> certificate status information itself - CSI (data structure) - and >> the method that distributes/publishes the CSI. A revocation scheme >> updates the CSI. However, the publication/distribution method is >> oriented to support the validation of certificates. IMHO it has >> nothing to do with a revocation scheme. Perhaps you may consider >> appropiate to include in the term "revocation scheme" everything >> that has something to do with the revocation information... >> >> Therefore, I distinguish a revocation scheme from another type of >> scheme (validation scheme) which aim is to check the status of a >> certificate taking into account the CSI. This CSI could be >> distributed/published by using one of the methods defined above, >> or accessed in an online manner (an OCSP service that retrieves >> the CSI from a fresh database). >> >> I guess that the revocation scheme term has been extended to >> things not so related to the revocation itself, like the >> validation procedure. I just want to know what the PKI community >> think about this. >> >> Thanks in advance, >> >> -------- >> Jorge Lopez Hernandez-Ardieta >> >> > --001485f870603e3a0d04670c5b4e Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable
Thanks Stefan and Dave for your responses.

We= ll, maybe CSI was not the best acronym as a proposal :-)

I wasn't talking about PKIX documents, but some research papers,= master/doctoral thesis where a classification of "revocation mechanis= ms" is made. I understand that these domains are out of the scope of t= he PKIX community, but maybe we should think of "standardizing" s= ome concepts if the "rest of the world" tends to confuse them. I = think that's one of the tasks of a standardization organization/work gr= oup/etc.

Possibly it is not worthy to work on it focusing merely= on revocation scheme related terms, but I have been following a thread abo= ut digital certificate/end user certificate/etc. terms that seemed to be co= nfusing as well to some folks.

Is it crazy to propose an RFC Informational which colle= cts a kind of glossary and definitions of PKIX related technology?

Best,

--------
Jorge Lo= pez Hernandez-Ardieta

2009/4/8 David A. Cooper &= lt;david.cooper@nist.gov>
Stefan Santesson wrote:
Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :)

Yes, RFC 5513 points out the problem of the overuse of three letter acronym= s (granted it is an April 1 RFC). =A0If we used the acronym CSI, most peopl= e would tend to immediately think of the College of Southern Idaho ... I me= an the College of Staten Island ... Computer Security Institute ... Constru= ction Specifications Institute ... Commodity Systems Inc. ... Computers &am= p; Structures, Inc. ... Chi Sigma Iota ... Christian Schools International = ... Computational Systems, Inc. ... Christian Solidarity International ... = California Solar Initiative ... Canadian Solar Inc. ... Chandler Systems In= c. ... Communications Specialties, Inc. ... Cetacean Society International = ... Coalition of Service Industries ... Church of South India ... Computer = Society of India ... Cellular Specialties, Inc. ... College Student Insuran= ce ... Custom Systems Integration ... Center for Social Innovation ... Cent= er for Sustainable Innovation ... Creative Specialties International ... Co= ntrol Sciences Inc. ... Conditional Symmetric Instability ... Community Ser= vices Infrastructure ... Coastal Studies Institute ... Curriculum Support I= nformation ... Control Solutions International ... Conversion Services Inte= rnational ... Civil Society International ... Collaborative Software Initia= tive ... Consolidated Systems Incorporated ... Center for the Study of Inte= lligence ... Combat Studies Institute ... Coatings Societies International = ... Chemical Sampling Information ... California Steel Industries ... Cardi= ovascular Systems Inc. ... Conservation Study Institute ... =A0Cognitive St= rategy Instruction ... Compliance Services International ... Cement Sustain= ability Initiative ... Cyber Safety Initiative ... Center for Student Invol= vement ... Center for the Study of Inequality ... Chiropractic Sports Insti= tute ... Closure Systems International ... Custom Scientific Instruments ..= . Crisis Simulations International ... Cooperative Sagebrush Initiative ...= Child Study Institute ... Climate Status Investigations ... Centrifugal Se= rvices, Inc. ... Conflict Solutions International ... Caregiver Services, I= nc. ... Charter School Institute ... Component Sources International ...
So I can understand that you would be concerned that if you referred to you= rself as a CSI expert, people might think you meant that you were an expert= in Computational Sciences and Informatics.


Other than that I feel sympathetic to your distinction between revocation a= nd validation. It is however my belief that we have used that distinction i= n our standards efforts.

I think it would be helpful if specific examples were provided of places in= PKIX documents in which the distinction between mechanisms for distributin= g certificate status information (e.g., CRLs and OCSP) and mechanisms for s= ubmitting revocation requests (e.g., a CMP revocation request message) is n= ot clear. =A0Perhaps this confusion does appear in the literature, and thos= e of us on this list simply don't notice it since we already clearly un= derstand the concepts. =A0But without being provided specific examples of t= ext that a non-PKI expert might find confusing, it is difficult for us to j= udge whether this is a problem in PKIX documents that the WG needs to be mo= re careful about in future documents.

Dave


On 4/7/09 1:42 PM, "Jorge L=F3pez" <jlopez.ha@gmail.com> wrote:

=A0 =A0Hi all,

=A0 =A0Next I merely offer personal considerations about the (in my
=A0 =A0opinion) confusing scenario of PKI terminology classification. I =A0 =A0would appreciate any comment on this.

=A0 =A0As can be seen in the literature, most people define CRL,
=A0 =A0Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO,
=A0 =A0Certificate Revocation Status, Certificate Revocation Tree, etc. =A0 =A0as revocation schemes. I think this "classification" is c= onfusing.

=A0 =A0I personally consider a revocation scheme as a scheme/protocol
=A0 =A0where the owner (or an authorised party) is able to revocate the =A0 =A0status of her certificate. For example, the one defined in RFC
=A0 =A04210 CMP. However, the terms mentioned above relate to data
=A0 =A0structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make =A0 =A0that data structure available to others (Over-Issued CRL,
=A0 =A0Over-Issued Segmented CRL, etc.) and both the managed data
=A0 =A0structure and the associated publication mechanism (NOVOMODO,
=A0 =A0Certificate Revocation Tree, etc.). But none of them to the
=A0 =A0procedure to be followed in order to revocate the certificate! If =A0 =A0fact OCSP is sometimes referenced as a revocation scheme, when it =A0 =A0is actually focused on "just" checking the revocation sta= tus of a
=A0 =A0certificate...

=A0 =A0From my viewpoint, I would differentiate among the scheme, the
=A0 =A0certificate status information itself - CSI (data structure) - and<= br> =A0 =A0the method that distributes/publishes the CSI. A revocation scheme<= br> =A0 =A0updates the CSI. However, the publication/distribution method is =A0 =A0oriented to support the validation of certificates. IMHO it has
=A0 =A0nothing to do with a revocation scheme. Perhaps you may consider =A0 =A0appropiate to include in the term "revocation scheme" eve= rything
=A0 =A0that has something to do with the revocation information...

=A0 =A0Therefore, I distinguish a revocation scheme from another type of =A0 =A0scheme (validation scheme) which aim is to check the status of a =A0 =A0certificate taking into account the CSI. This CSI could be
=A0 =A0distributed/published by using one of the methods defined above, =A0 =A0or accessed in an online manner (an OCSP service that retrieves
=A0 =A0the CSI from a fresh database).

=A0 =A0I guess that the revocation scheme term has been extended to
=A0 =A0things not so related to the revocation itself, like the
=A0 =A0validation procedure. I just want to know what the PKI community =A0 =A0think about this.

=A0 =A0Thanks in advance,

=A0 =A0--------
=A0 =A0Jorge Lopez Hernandez-Ardieta



--001485f870603e3a0d04670c5b4e-- From owner-ietf-pkix@mail.imc.org Sat Apr 11 06:01:16 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EC1CC3A67A8 for ; Sat, 11 Apr 2009 06:01:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -7.825 X-Spam-Level: X-Spam-Status: No, score=-7.825 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_24_48=1.219, HTML_MESSAGE=0.001, HTTP_ESCAPED_HOST=0.134, RCVD_IN_DNSWL_HI=-8, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v27-Z6nuk56a for ; Sat, 11 Apr 2009 06:01:08 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 28F463A6E3E for ; Sat, 11 Apr 2009 06:00:59 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BCV47G079326 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 05:31:04 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3BCV4wU079325; Sat, 11 Apr 2009 05:31:04 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BCV2Yd079319 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 05:31:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 05:31:02 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 05:31:02 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 12:32:55 +0000 X-BigFish: ps-60(zz146fK542Ndf9M62a3Laf6W936eQ936fKzz2cfT1202h1082kzz4461rz2dh54h53keIL6bh6di34h61h) X-Spam-TCS-SCL: 0:0 X-FB-SS: 5,5,5, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f From: Erik Andersen To: , "'ietf-pkix'" Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 17:25:37 +0200 Message-ID: <7B01F815F4064ABEB6447E403CA12C56@ERA1> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0000_01C9B938.35920940" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6838 Importance: Normal Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOw In-Reply-To: X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (tk5-exgwy-e802.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------=_NextPart_000_0000_01C9B938.35920940 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0001_01C9B938.35920940" ------=_NextPart_001_0001_01C9B938.35920940 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the = apparent inactivity of people, I have the power to produce Defect Reports, = produce Draft Technical Corrigenda, run them through both the ISO and ITU-T = approval process and finally integrate them into the next edition of X.500 (incl. X.509) without being stopped by anyone (except for Jean-Paul Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. = Let me express myself without the diagram. =20 The set of certificates is the union of the set of public-key = certificates and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key = certificates issued to end-entities and the set of attribute certificates issued to end-entities. However, X.509 is a little confusing here as the term end-entity certificate is sometimes meant to be just public-key = certificates issued to end-entities, so the term end-entity certificate has two = meanings. =20 The set of public-key certificates is the union of the set of end-entity (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of end-entity (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA = certificates and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute certificate. =20 I am avoiding here to use the term =93user attribute=94, but believe it = is supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term =93certificate=94, he/she is = entitled to believe it can either be a public-key certificate. It may not always = be clear from the context what is meant. =20 Whenever an innocent us reader see the term =93end-entity = certificate=94, he/she is entitled to believe it is either a public key certificate or = an attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term =93cross-certificate=94, = he/she is entitled to believe it is either a public key certificate or an = attribute certificate. =20 My proposal was only to clear-up the terminology and to use the = terminology consistent in the text of X.509. Trying to do the latter may raise a = number of detailed questions when the meaning is not absolutely clear from the context. =20 =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =20 Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too = long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a public-key certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute = Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions =20 I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first time in = clause 7 as a public-key certificate. There are several other places where it = is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term = at all. It seems just to use the term =93certificate=94 as a synonym for =93end-entrity public key certificate=94. =20 The =93User Certificate=94 is not defined in X.509, but is wide used. = It seems to be a synonym for =93end-entrity public key certificate=94. It is also = used in X.511. RFC 5280 uses the term once without differenting it from just =93certificate=94. =20 The term =93cross-certificate=94 should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 =93end-entity public-key certificate=94 =93user certificate=94 as a synonym for =93end-entity public-key = certificate=94 =93end-entity attribute certificate=94 =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attribute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------=_NextPart_001_0001_01C9B938.35920940 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

Hi = Denis,

 

It is a little = dangerous not to respond to my comments. Due to the apparent inactivity of people, = I have the power to produce Defect Reports, produce Draft Technical Corrigenda, = run them through both the ISO and ITU-T approval process and finally = integrate them into the next edition of X.500 (incl. X.509) without being stopped by = anyone (except for Jean-Paul = Lemaire).

 

I believe you = misunderstood my diagram. It may be a little confusing. Let me express myself without = the diagram.

 

The set of = certificates is the union of the set of public-key certificates and the set of = attribute certificates.

 

The set of = end-entity certificates is the union of public-key certificates issued to end-entities and the = set of attribute certificates issued to end-entities. However, X.509 is a = little confusing here as the term end-entity certificate is sometimes meant to = be just public-key certificates issued to end-entities, so the term end-entity certificate has two meanings.

 

The set of = public-key certificates is the union of the set of end-entity (public-key) = certificates and the set of CA certificates.

 

The set of = attribute certificates is the union of the set of end-entity (attribute) = certificates and the set of AA certificates.

 

The set of = authority certificates is the union of the set CA certificates and the set of AA certificates.

 

The set of CA certificates is the union of the set of self-issued (public-key) = certificates and the set cross certificates. The latter is a little confusing, as a = cross certificate can also be an attribute certificate.

 

I am avoiding = here to use the term “user attribute”, but believe it is supposed to = mean a public-key certificate issued to an end-entity.

 

Whenever an = innocent reader sees the term “certificate”, he/she is entitled to believe = it can either be a public-key certificate. It may not always be clear from the = context what is meant.

 

Whenever an = innocent us =A0reader see the term “end-entity certificate”, he/she is entitled to believe it is either a public key certificate or an attribute = certificate issued to an end-entity.

 

Whenever an = innocent us =A0reader see the term “cross-certificate”, he/she is entitled to = believe it is either a public key certificate or an attribute = certificate.

 

My proposal was = only to clear-up the terminology and to use the terminology consistent in the text of = X.509. Trying to do the latter may raise a number of detailed questions when the = meaning is not absolutely clear from the context. =A0

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, = DK-3500 Vaerloese

Denmark

Mobile: +45 2097 = 1490

email: era@x500.eu

www.x500.eu

www.x500standard.= com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas
Sent: 3. april 2009 =
17:33
To: x500 list; =
ietf-pkix
Subject: [x500standard] = Re: Certificate definitions

 

Eric,

 

Silence does = not mean approval.

 

It may = mean that the corrections are so numerous that it would take too long to = respond

and that = people do not have that time available at the moment.

 

e.g.:  = an End-entity attribute certificate is not linked to a public-key = certificate.

    &nb= sp;    a cross-certificate is not linked to an AA = certificate.

    &nb= sp;    an Authority Certificate is not linked to an Attribute = Certificate.

 

This is = only a start ...

 

Denis

----- Message = re=E7u -----

Date = : 2009-04-03, 17:00:01

Sujet = : RE: [x500standard] Certificate definitions

 

I take silence as approval.

 

Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen
Sent: 1. april 2009 = 14:40
To: Directory list; = PKIX
Subject: [x500standard] Certificate definitions

 

Hi

 

I got a number = of responses on user certificates, but quite little that actually answered = my question.

 

I have tried = to dig a little bit more in X.509 to get hold of the terminology and then = produced below figure. I will not comment all the boxes.

 

 

I will like = you to comments as to the correctness of above figure.

 

The end-entity certificate is not defined in the definition clause. However it is used = widely in the main text. It is mentioned the first time in clause 7 as a = public-key certificate. There are several other places where it is a public-key certificate. In 15.5.2.4 is used in the context of attribute = certificates. The conclusion must be that an end-entity certificate can either be a = end-entity public-key certificate or an end-entity attribute certificate. However, = in most places, it is implied that we only talks about public-key certificates. = For veterans, this is not a major problem, but new-comers may get confused. = Anyway, I thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.

 

The = “User Certificate”  is not defined in X.509, but is wide used. It = seems to be a synonym for “end-entrity public key certificate”. It is = also used in X.511. RFC 5280 uses the term once without differenting it from = just “certificate”.

 

The term = “cross-certificate” should probably also be qualified.

 

I suggest to = add in X.509 definitions for:

 

“end-entity public-key certificate”

“user = certificate” as a synonym for “end-entity public-key = certificate”

“end-entity attribute certificate”

 

The X.509 text = should be updated to make use of these definitions.

 

X.509 has four = attribute types for holding certificates.

 

UserCertificate: For end-entity public-key certificates

cAcertificate: = For CA certificates

attributeCertificateAttribut= e: For end-entity attribute certificates

aACertificate: = For AA Certificates

 

Any = comments?

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, DK-3500 = Vaerloese

Denmark

Mobile: +45 = 2097 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com<= /font>

 

------=_NextPart_001_0001_01C9B938.35920940-- ------=_NextPart_000_0000_01C9B938.35920940 Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_000_0000_01C9B938.35920940-- From owner-ietf-pkix@mail.imc.org Sat Apr 11 17:22:52 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AF2333A6B49 for ; Sat, 11 Apr 2009 17:22:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -8.909 X-Spam-Level: X-Spam-Status: No, score=-8.909 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8qdxnV7UidCw for ; Sat, 11 Apr 2009 17:22:51 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 4FA533A6B8E for ; Sat, 11 Apr 2009 17:22:51 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BNsZHe011299 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 16:54:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3BNsZC4011298; Sat, 11 Apr 2009 16:54:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BNsOHg011285 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 16:54:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 16:54:24 -0700 Received: from tk5-exmlt-w602.wingroup.windeploy.ntdev.microsoft.com (157.54.18.33) by tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 16:54:23 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 23:54:22 +0000 X-BigFish: ps-38(zz20dbM14e1Jzz2cfT1202hzzz2dheIL6bh6di) X-FB-SS: 13, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Message-ID: <51FB0BC2B15540E3BAC7C0464B479375@AndersPC> From: Anders Rundgren To: Subject: - An HTML5 standard facility? Date: Tue, 7 Apr 2009 22:13:42 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (TK5-EXGWY-E801.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-element Since the PKI community at large seems to ignore the client-side of PKI in browsers, the HTML 5 designers apparently didn't find any other solution but adopting the 15 year old Netscape hack known as . It is indeed as said in this list very simple to use etc. However, does it really match the needs of today? My guess FWIW, is that the serious users of on-line provisioning of PKI which includes governments and banks in the EU, as well as the USPTO will continue to use entirely proprietary solutions (mostly using Java), since the browser-schemes are all-over-the-map and do not do signatures either. A few things to consider: How could a static tag in a page mark-up language match an API or a protocol? Algorithm agility, isn't that a requirement these days? PIN-codes anybody? TPM - A dead duck? Anders From owner-ietf-pkix@mail.imc.org Sat Apr 11 18:36:08 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 14C103A69C2 for ; Sat, 11 Apr 2009 18:36:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -7.212 X-Spam-Level: X-Spam-Status: No, score=-7.212 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_96_XX=1.69, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QPfx7abPTlTc for ; Sat, 11 Apr 2009 18:36:07 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 785233A67CF for ; Sat, 11 Apr 2009 18:36:06 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C193X9014100 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 18:09:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3C192sV014099; Sat, 11 Apr 2009 18:09:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (mailc.microsoft.com [131.107.115.214]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C191Lc014092 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 18:09:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 18:09:00 -0700 Received: from tk5-exmlt-w602.wingroup.windeploy.ntdev.microsoft.com (157.54.18.33) by tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 18:09:00 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sun, 12 Apr 2009 01:09:00 +0000 X-BigFish: ps-90(zz1432R98dR14ffO936eQ1443R1805M9371Pzz2cfT1202hzz5a6ciz2dheIL6bh65h) X-Spam-TCS-SCL: 4:0 X-FB-SS: 5,5, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 8 Apr 2009 01:00:29 +0200 Subject: Re: Revocation scheme definition From: Stefan Santesson To: Jorge =?ISO-8859-1?B?TPNwZXo=?= , Message-ID: Thread-Topic: Revocation scheme definition Thread-Index: Acm31KU9P6Updu1cdk2ECIQhTrzzMA== In-Reply-To: MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="B_3321997232_36557475" List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (TK5-EXGWY-E801.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --B_3321997232_36557475 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Jorge, Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :) Other than that I feel sympathetic to your distinction between revocation and validation. It is however my belief that we have used that distinction in our standards efforts. /Stefan On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: > Hi all, >=20 > Next I merely offer personal considerations about the (in my opinion) > confusing scenario of PKI terminology classification. I would appreciate = any > comment on this. >=20 > As can be seen in the literature, most people define CRL, Partitioned CRL= , > Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status= , > Certificate Revocation Tree, etc. as revocation schemes. I think this > "classification" is confusing. >=20 > I personally consider a revocation scheme as a scheme/protocol where the = owner > (or an authorised party) is able to revocate the status of her certificat= e. > For example, the one defined in RFC 4210 CMP. However, the terms mentione= d > above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechan= isms > to make that data structure available to others (Over-Issued CRL, Over-Is= sued > Segmented CRL, etc.) and both the managed data structure and the associat= ed > publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). But = none > of them to the procedure to be followed in order to revocate the certific= ate! > If fact OCSP is sometimes referenced as a revocation scheme, when it is > actually focused on "just" checking the revocation status of a certificat= e... >=20 > From my viewpoint, I would differentiate among the scheme, the certificat= e > status information itself - CSI (data structure) - and the method that > distributes/publishes the CSI. A revocation scheme updates the CSI. Howev= er, > the publication/distribution method is oriented to support the validation= of > certificates. IMHO it has nothing to do with a revocation scheme. Perhaps= you > may consider appropiate to include in the term "revocation scheme" everyt= hing > that has something to do with the revocation information... >=20 > Therefore, I distinguish a revocation scheme from another type of scheme > (validation scheme) which aim is to check the status of a certificate tak= ing > into account the CSI. This CSI could be distributed/published by using on= e of > the methods defined above, or accessed in an online manner (an OCSP servi= ce > that retrieves the CSI from a fresh database). >=20 > I guess that the revocation scheme term has been extended to things not s= o > related to the revocation itself, like the validation procedure. I just w= ant > to know what the PKI community think about this. >=20 > Thanks in advance, >=20 > -------- > Jorge Lopez Hernandez-Ardieta >=20 >=20 >=20 --B_3321997232_36557475 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Re: Revocation scheme definition Jorge,

Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :)

Other than that I feel sympathetic to your distinction between revocation a= nd validation. It is however my belief that we have used that distinction in= our standards efforts.

/Stefan



On 4/7/09 1:42 PM, "Jorge López" <jlopez.ha@gmail.com> wrote:

<= SPAN STYLE=3D'font-size:11pt'>Hi all,

Next I merely offer personal considerations about the (in my opinion) confu= sing scenario of PKI terminology classification. I would appreciate any comm= ent on this.

As can be seen in the literature, most people define CRL, Partitioned CRL, = Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status, C= ertificate Revocation Tree, etc. as revocation schemes. I think this "c= lassification" is confusing.

I personally consider a revocation scheme as a scheme/protocol where the ow= ner (or an authorised party) is able to revocate the status of her certifica= te. For example, the one defined in RFC 4210 CMP. However, the terms mention= ed above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechan= isms to make that data structure available to others (Over-Issued CRL, Over-= Issued Segmented CRL, etc.) and both the managed data structure and the asso= ciated publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). = But none of them to the procedure to be followed in order to revocate the ce= rtificate! If fact OCSP is sometimes referenced as a revocation scheme, when= it is actually focused on "just" checking the revocation status o= f a certificate...

>From my viewpoint, I would differentiate among the scheme, the certificate = status information itself - CSI (data structure) - and the method that distr= ibutes/publishes the CSI. A revocation scheme updates the CSI. However, the = publication/distribution method is oriented to support the validation of cer= tificates. IMHO it has nothing to do with a revocation scheme. Perhaps you m= ay consider appropiate to include in the term "revocation scheme" = everything that has something to do with the revocation information...

Therefore, I distinguish a revocation scheme from another type of scheme (v= alidation scheme) which aim is to check the status of a certificate taking i= nto account the CSI. This CSI could be distributed/published by using one of= the methods defined above, or accessed in an online manner (an OCSP service= that retrieves the CSI from a fresh database).

I guess that the revocation scheme term has been extended to things not so = related to the revocation itself, like the validation procedure. I just want= to know what the PKI community think about this.

Thanks in advance,

--------
Jorge Lopez Hernandez-Ardieta



--B_3321997232_36557475-- From owner-ietf-pkix@mail.imc.org Sat Apr 11 20:29:15 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B221C3A689F for ; Sat, 11 Apr 2009 20:29:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.598 X-Spam-Level: X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9OCvTxu38SyN for ; Sat, 11 Apr 2009 20:29:14 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id E7E0E3A6955 for ; Sat, 11 Apr 2009 20:29:13 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C31i6g017898 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 20:01:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3C31ixE017897; Sat, 11 Apr 2009 20:01:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C31gR0017891 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 20:01:43 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 20:01:42 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 20:01:42 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sun, 12 Apr 2009 03:03:37 +0000 X-BigFish: ps-43(zz98dR936fK9371Pzz2cfT1202hzz4461rz2dheIL6bh) X-FB-SS: 5, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B92E.85ED62AC" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 12:16:21 -0400 Message-ID: In-Reply-To: <49DE1DAF.2000307@nist.gov> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm5LZm+5dIHybYeQIyTtW4kxKHJXQAAMztA References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> <49DE1DAF.2000307@nist.gov> From: Santosh Chokhani To: CC: ietf-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (SVC-EXGWY-E802.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B92E.85ED62AC Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable David, =20 We agree. That is why my parenthetical remark. ________________________________ From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of David A. Cooper Sent: Thursday, April 09, 2009 12:09 PM To: x500standard@freelists.org Cc: ietf-pkix Subject: [x500standard] Re: Certificate definitions =09 =09 Santosh Chokhani wrote:=20 [Santosh]: The above paragraph has two inaccuracies. Since not all CA certificates are called cross certificates, set of CA certificates are self-issued, cross certificate, and subordinate CA certificates. (I wish we had not distinguished between cross certificates and subordinate CA certificates in the first place). Also note that a cross certificate can not be attribute certificate. I don't see an AA cross certificate in RFC 3281 or in X.509 =09 Santosh, =09 RFC 5280 says that "Cross-certificates are CA certificates in which the issuer and subject are different entities." =09 X.509 defines a cross-certificate as "A public-key or attribute certificate where the issuer and the subject/holder are different CAs or AAs respectively. CAs and AAs issue cross-certificates to other CAs or AAs respectively as a mechanism to authorize the subject CA's existence (e.g., in a strict hierarchy) or to recognize the existence of the subject CA or holder AA (e.g., in a distributed trust model). The cross-certificate structure is used for both of these." =09 So, every CA certificate is either self-issued or a cross-certificate. =09 I know that a lot of people seem to think that a certificate issued in a hierarchy by a hierarchically superior CA to a subordinate CA is not a "cross-certificate", that belief is not consistent with either X.509 or RFC 5280. (Perhaps people are simply guessing the meaning of "cross-certificate", and the inclusion of "cross" in the name leads them to guess that the term does not incorporate certificates issued to subordinate CAs.) If documents are being created that use the term "cross-certificate" to mean only CA certificates that are neither self-issued nor issued to a subordinate CA, then they are creating confusion by misusing the term. =09 Dave =09 ----- www.x500standard.com: The central source for information on the X.500 Directory Standard.=20 ------_=_NextPart_001_01C9B92E.85ED62AC Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
David,
 
We agree.  That is why my parenthetical=20 remark.


From: = x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of David = A.=20 Cooper
Sent: Thursday, April 09, 2009 12:09 PM
To: = x500standard@freelists.org
Cc: ietf-pkix
Subject:=20 [x500standard] Re: Certificate definitions

Santosh Chokhani wrote:=20

[Santosh]: The = above=20 paragraph has two inaccuracies.  Since not all CA = certificates=20 are called cross certificates, set of CA certificates are=20 self-issued, cross certificate, and subordinate CA=20 certificates.  (I wish we had not distinguished between cross = certificates and subordinate CA certificates in the first=20 place).  Also note that a cross certificate can not be = attribute=20 certificate.  I don't see an AA cross certificate in RFC 3281 = or in=20 = X.509

=
Santosh,

RFC=20 5280 says that "Cross-certificates are CA certificates in which the = issuer and=20 subject are different entities."

X.509 defines a = cross-certificate as=20 "A public-key or attribute certificate where the issuer and the = subject/holder=20 are different CAs or AAs respectively. CAs and AAs issue = cross-certificates to=20 other CAs or AAs respectively as a mechanism to authorize the subject = CA's=20 existence (e.g., in a strict hierarchy) or to recognize the existence = of the=20 subject CA or holder AA (e.g., in a distributed trust model). The=20 cross-certificate structure is used for both of these."

So, = every CA=20 certificate is either self-issued or a cross-certificate.

I = know that a=20 lot of people seem to think that a certificate issued in a hierarchy = by a=20 hierarchically superior CA to a subordinate CA is not a = "cross-certificate",=20 that belief is not consistent with either X.509 or RFC 5280.  = (Perhaps=20 people are simply guessing the meaning of "cross-certificate", and the = inclusion of "cross" in the name leads them to guess that the term = does not=20 incorporate certificates issued to subordinate CAs.)   If = documents are=20 being created that use the term "cross-certificate" to mean only CA=20 certificates that are neither self-issued nor issued to a subordinate = CA, then=20 they are creating confusion by misusing the = term.

Dave

----- www.x500standard.com: The central source = for=20 information on the X.500 Directory Standard. = ------_=_NextPart_001_01C9B92E.85ED62AC-- From owner-ietf-pkix@mail.imc.org Sun Apr 12 03:17:08 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F2A33A6839 for ; Sun, 12 Apr 2009 03:17:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.375 X-Spam-Level: X-Spam-Status: No, score=-0.375 tagged_above=-999 required=5 tests=[AWL=-0.943, BAYES_00=-2.599, HELO_EQ_SE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dCHbdnt68sgY for ; Sun, 12 Apr 2009 03:16:57 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C10003A65A6 for ; Sun, 12 Apr 2009 03:16:56 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C9oOxr032543 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 02:50:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3C9oO98032542; Sun, 12 Apr 2009 02:50:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C9o99Y032528 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 12 Apr 2009 02:50:22 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 37994 invoked from network); 12 Apr 2009 09:50:12 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 12 Apr 2009 09:50:12 -0000 Received: (qmail 2448 invoked from network); 12 Apr 2009 09:50:08 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 12 Apr 2009 09:50:08 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Sun, 12 Apr 2009 11:50:07 +0200 Subject: Re: [x500standard] Re: Certificate definitions From: Stefan Santesson To: Erik Andersen , "'ietf-pkix'" Message-ID: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOwAI14Wns= In-Reply-To: <7B01F815F4064ABEB6447E403CA12C56@ERA1> Mime-version: 1.0 Content-type: multipart/related; boundary="B_3322381808_2965858" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3322381808_2965858 Content-type: multipart/alternative; boundary="B_3322381808_2992874" --B_3322381808_2992874 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Eric, There is always a danger with cross posting to multiple mailing lists. Instead of making more people aware of the issue, it may have the opposite effect. In my case it made me miss all these mails as they all got sorted i= n the wrong folder. I see a few potential issues here. >=20 > =B3The set of attribute certificates is the union of the set of end-entity > (attribute) certificates and the set of AA certificates.=B2 I don=B9t think an AA certificate is an attribute certificate. I view it as = a public key certificate issued to the AA. > =B3The set of CA certificates is the union of the set of self-issued > (public-key) certificates and the set cross certificates. The latter is a > little confusing, as a cross certificate can also be an attribute > certificate.=B2 Except for Russ comment, what is true for Self Signed SSL/TLS certificates out there. Are they issued as CA certificates or as EE certificates (Basic Constraints CA=3DFALSE). I could not find any samples to study, doing a quick search. /Stefan On 09-04-09 5:25 PM, "Erik Andersen" wrote: > Hi Denis, > =20 > It is a little dangerous not to respond to my comments. Due to the appare= nt > inactivity of people, I have the power to produce Defect Reports, produce > Draft Technical Corrigenda, run them through both the ISO and ITU-T appro= val > process and finally integrate them into the next edition of X.500 (incl. > X.509) without being stopped by anyone (except for Jean-Paul Lemaire). > =20 > I believe you misunderstood my diagram. It may be a little confusing. Let= me > express myself without the diagram. > =20 > The set of certificates is the union of the set of public-key certificate= s and > the set of attribute certificates. > =20 > The set of end-entity certificates is the union of public-key certificate= s > issued to end-entities and the set of attribute certificates issued to > end-entities. However, X.509 is a little confusing here as the term end-e= ntity > certificate is sometimes meant to be just public-key certificates issued = to > end-entities, so the term end-entity certificate has two meanings. > =20 > The set of public-key certificates is the union of the set of end-entity > (public-key) certificates and the set of CA certificates. > =20 > The set of attribute certificates is the union of the set of end-entity > (attribute) certificates and the set of AA certificates. > =20 > The set of authority certificates is the union of the set CA certificates= and > the set of AA certificates. > =20 > The set of CA certificates is the union of the set of self-issued (public= -key) > certificates and the set cross certificates. The latter is a little confu= sing, > as a cross certificate can also be an attribute certificate. > =20 > I am avoiding here to use the term =B3user attribute=B2, but believe it is > supposed to mean a public-key certificate issued to an end-entity. > =20 > Whenever an innocent reader sees the term =B3certificate=B2, he/she is entitl= ed to > believe it can either be a public-key certificate. It may not always be c= lear > from the context what is meant. > =20 > Whenever an innocent us =A0reader see the term =B3end-entity certificate=B2, he= /she > is entitled to believe it is either a public key certificate or an attrib= ute > certificate issued to an end-entity. > =20 > Whenever an innocent us =A0reader see the term =B3cross-certificate=B2, he/she = is > entitled to believe it is either a public key certificate or an attribute > certificate. > =20 > My proposal was only to clear-up the terminology and to use the terminolo= gy > consistent in the text of X.509. Trying to do the latter may raise a numb= er of > detailed questions when the meaning is not absolutely clear from the cont= ext. > =A0 > =20 >=20 > Erik Andersen >=20 > Andersen's L-Service >=20 > Elsevej 48, DK-3500 Vaerloese >=20 > Denmark >=20 > Mobile: +45 2097 1490 >=20 > email: era@x500.eu >=20 > www.x500.eu >=20 > www.x500standard.com >=20 > =20 > -----Original Message----- > From: x500standard-bounce@freelists.org > [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas > Sent: 3. april 2009 17:33 > To: x500 list; ietf-pkix > Subject: [x500standard] Re: Certificate definitions > =20 >=20 > Eric, >=20 > =20 >=20 > Silence does not mean approval. >=20 > =20 >=20 > It may mean that the corrections are so numerous that it would take too l= ong > to respond >=20 > and that people do not have that time available at the moment. >=20 > =20 >=20 > e.g.: an End-entity attribute certificate is not linked to a public-key > certificate. >=20 > a cross-certificate is not linked to an AA certificate. >=20 > an Authority Certificate is not linked to an Attribute Certificat= e. >=20 > =20 >=20 > This is only a start ... >=20 > =20 >=20 > Denis >>=20 >> ----- Message re=E7u ----- >>=20 >> De : owner-ietf-pkix >>=20 >> =C0 : x500standard,'PKIX' >> >>=20 >> Date : 2009-04-03, 17:00:01 >>=20 >> Sujet : RE: [x500standard] Certificate definitions >>=20 >> =20 >>=20 >> I take silence as approval. >> =20 >>=20 >> Erik Andersen >>=20 >> Andersen's L-Service >>=20 >> Elsevej 48, DK-3500 Vaerloese >>=20 >> Denmark >>=20 >> Mobile: +45 2097 1490 >>=20 >> email: era@x500.eu >>=20 >> www.x500.eu >>=20 >> www.x500standard.com >>=20 >> =20 >> -----Original Message----- >> From: x500standard-bounce@freelists.org >> [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen >> Sent: 1. april 2009 14:40 >> To: Directory list; PKIX >> Subject: [x500standard] Certificate definitions >> =20 >> Hi >> =20 >> I got a number of responses on user certificates, but quite little that >> actually answered my question. >> =20 >> I have tried to dig a little bit more in X.509 to get hold of the termin= ology >> and then produced below figure. I will not comment all the boxes. >> =20 >>=20 >> =20 >> I will like you to comments as to the correctness of above figure. >>=20 >> =20 >>=20 >> The end-entity certificate is not defined in the definition clause. Howe= ver >> it is used widely in the main text. It is mentioned the first time in cl= ause >> 7 as a public-key certificate. There are several other places where it i= s a >> public-key certificate. In 15.5.2.4 is used in the context of attribute >> certificates. The conclusion must be that an end-entity certificate can >> either be a end-entity public-key certificate or an end-entity attribute >> certificate. However, in most places, it is implied that we only talks a= bout >> public-key certificates. For veterans, this is not a major problem, but >> new-comers may get confused. Anyway, I thing our specifications should b= e >> clear and not subject to interpretation. RFC 5280 does not use the term = at >> all. It seems just to use the term =B3certificate=B2 as a synonym for >> =B3end-entrity public key certificate=B2. >>=20 >> =20 >>=20 >> The =B3User Certificate=B2 is not defined in X.509, but is wide used. It se= ems >> to be a synonym for =B3end-entrity public key certificate=B2. It is also use= d in >> X.511. RFC 5280 uses the term once without differenting it from just >> =B3certificate=B2. >>=20 >> =20 >>=20 >> The term =B3cross-certificate=B2 should probably also be qualified. >>=20 >> =20 >>=20 >> I suggest to add in X.509 definitions for: >>=20 >> =20 >>=20 >> =B3end-entity public-key certificate=B2 >>=20 >> =B3user certificate=B2 as a synonym for =B3end-entity public-key certificate=B2 >>=20 >> =B3end-entity attribute certificate=B2 >>=20 >> =20 >>=20 >> The X.509 text should be updated to make use of these definitions. >>=20 >> =20 >>=20 >> X.509 has four attribute types for holding certificates. >>=20 >> =20 >>=20 >> UserCertificate: For end-entity public-key certificates >>=20 >> cAcertificate: For CA certificates >>=20 >> attributeCertificateAttribute: For end-entity attribute certificates >>=20 >> aACertificate: For AA Certificates >>=20 >> =20 >>=20 >> Any comments? >>=20 >> =20 >>=20 >> Erik Andersen >>=20 >> Andersen's L-Service >>=20 >> Elsevej 48, DK-3500 Vaerloese >>=20 >> Denmark >>=20 >> Mobile: +45 2097 1490 >>=20 >> email: era@x500.eu >>=20 >> www.x500.eu >>=20 >> www.x500standard.com >>=20 >> =20 >=20 --B_3322381808_2992874 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: [x500standard] Re: Certificate definitions Eric,

There is always a danger with cross posting to multiple mailing lists. Inst= ead of making more people aware of the issue, it may have the opposite effec= t. In my case it made me miss all these mails as they all got sorted in the = wrong folder.

 I see a few potential issues here.
<= SPAN STYLE=3D'font-size:11pt'>
The set of attribute certificates is the unio= n of the set of end-entity (attribute) certificates and the set of AA certif= icates.”

I don’t think an AA certificate is an attribute certi= ficate. I view it as a public key certificate issued to the AA.

<= SPAN STYLE=3D'font-size:11pt'>“The set of CA cert= ificates is the union of the set of self-issued (public-key) certificates an= d the set cross certificates. The latter is a little confusing, as a cross c= ertificate can also be an attribute certificate.”

Except for Russ comment, what is true for Self Signed SSL/TL= S certificates out there. Are they issued as CA certificates or as EE certif= icates (Basic Constraints CA=3DFALSE). I could not find any samples to study, = doing a quick search.

/Stefan

On 09-04-09 5:25 PM, "Erik Andersen" <er= a@x500.eu> wrote:

Hi Denis,
 
It is a little dangerous not to respond to my comments. Due to the apparent= inactivity of people, I have the power to produce Defect Reports, produce D= raft Technical Corrigenda, run them through both the ISO and ITU-T approval = process and finally integrate them into the next edition of X.500 (incl. X.5= 09) without being stopped by anyone (except for Jean-Paul Lemaire).
 
I believe you misunderstood my diagram. It may be a little confusing. Let m= e express myself without the diagram.
 
The set of certificates is the union of the set of public-key certificates = and the set of attribute certificates.
 
The set of end-entity certificates is the union of public-key certificates = issued to end-entities and the set of attribute certificates issued to end-e= ntities. However, X.509 is a little confusing here as the term end-entity ce= rtificate is sometimes meant to be just public-key certificates issued to en= d-entities, so the term end-entity certificate has two meanings.
 
The set of public-key certificates is the union of the set of end-entity (p= ublic-key) certificates and the set of CA certificates.
 
The set of attribute certificates is the union of the set of end-entity (at= tribute) certificates and the set of AA certificates.
 
The set of authority certificates is the union of the set CA certificates a= nd the set of AA certificates.
 
The set of CA certificates is the union of the set of self-issued (public-k= ey) certificates and the set cross certificates. The latter is a little conf= using, as a cross certificate can also be an attribute certificate.
 
I am avoiding here to use the term “user attribute”, but believ= e it is supposed to mean a public-key certificate issued to an end-entity.  
Whenever an innocent reader sees the term “certificate”, he/she= is entitled to believe it can either be a public-key certificate. It may no= t always be clear from the context what is meant.
 
Whenever an innocent us =A0reader see the term “end-entity certificate&= #8221;, he/she is entitled to believe it is either a public key certificate = or an attribute certificate issued to an end-entity.
 
Whenever an innocent us =A0reader see the term “cross-certificate”= ;, he/she is entitled to believe it is either a public key certificate or an= attribute certificate.
 
My proposal was only to clear-up the terminology and to use the terminology= consistent in the text of X.509. Trying to do the latter may raise a number= of detailed questions when the meaning is not absolutely clear from the con= text. =A0
 

Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com


-----Original Message-----
From: x500standard-bounc= e@freelists.org [mail= to:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33
To: x500 list; ietf-pkix
Subject: [x500standard] Re: Certificate definitions


Eric,



Silence does not mean approval.



It may mean that the corrections are so numero= us that it would take too long to respond

and that people do not have that time availabl= e at the moment.



e.g.:  an End-entity attribute certificat= e is not linked to a public-key certificate.

       a c= ross-certificate is not linked to an AA certificate.

       an = Authority Certificate is not linked to an Attribute Certificate.



This is only a start ...



Denis

----- Message reçu -----

De : owner-ietf-pkix <mailto%20:owner-ietf-pkix@mail.imc.org>  = ;

À : x500standard,'PKIX' <mailt= o%20:x500standard@freelists.org,ietf-pkix@imc.org>  

Date : 2009-04-03, 17:00:01

Sujet : RE: [x500standard] Certificate d= efinitions



I take silence as approval.


Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

-----Original Message-----
From: x500standard-bounc= e@freelists.org [mail= to:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen<= BR> Sent: 1. april 2009 14:40
To: Directory list; PKIX
Subject: [x500standard] Certificate definitions

Hi

I got a number of responses on user certificates, but quite little that ac= tually answered my question.

I have tried to dig a little bit more in X.509 to get hold of the terminol= ogy and then produced below figure. I will not comment all the boxes.



I will like you to comments as to the correctness of above figure.


The end-entity certificate is not defined in the definition clause. Howeve= r it is used widely in the main text. It is mentioned the first time in clau= se 7 as a public-key certificate. There are several other places where it is= a public-key certificate. In 15.5.2.4 is used in the context of attribute c= ertificates. The conclusion must be that an end-entity certificate can eithe= r be a end-entity public-key certificate or an end-entity attribute certific= ate. However, in most places, it is implied that we only talks about public-= key certificates. For veterans, this is not a major problem, but new-comers = may get confused. Anyway, I thing our specifications should be clear and not= subject to interpretation. RFC 5280 does not use the term at all. It seems = just to use the term “certificate” as a synonym for “end-e= ntrity public key certificate”.


The “User Certificate”  is not defined in X.509, but is w= ide used. It seems to be a synonym for “end-entrity public key certifi= cate”. It is also used in X.511. RFC 5280 uses the term once without d= ifferenting it from just “certificate”.


The term “cross-certificate” should probably also be qualified= .


I suggest to add in X.509 definitions for:


“end-entity public-key certificate”

“user certificate” as a synonym for “end-entity public-k= ey certificate”

“end-entity attribute certificate”


The X.509 text should be updated to make use of these definitions.


X.509 has four attribute types for holding certificates.


UserCertificate: For end-entity public-key certificates

cAcertificate: For CA certificates

attributeCertificateAttribute: For end-entity attribute certificates

aACertificate: For AA Certificates


Any comments?


Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

=
--B_3322381808_2992874-- --B_3322381808_2965858 Content-Type: image/gif; name="image.gif" Content-ID: <3322381807_2988502> Content-Transfer-Encoding: base64 R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAs AAAAAN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct 9/4PDAqHRAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O 8609/w8YGOMnaEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszql IcFDKzvL5pqrKwSLUbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3Wku TFtuvg7Tvf3e6q7u/aH+e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2Y xoX//iB6fCdRWr59/A4e3OgMJY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0 aRWkdJgqfdrEqRyoVBNJ3Vk1a0xtV7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3 bzMTfPv6/QsYhN7BdsSV6UA4MSLDaRErfty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3O MyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2zt++zwKkKHw5199jjyHMWp8u8eUTbik1LjweM Oufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYe iOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaHFpYiYhQlZmYWKCc+seJW2bSoA4wL hpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5goyQuSRwKp43JOqnJlcrV9Fww5 D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAdlO3YF45BdcbyQkNlJlQX knmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+pMjJnQpCSeZGXgsbq ap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4CaKh16AD7aEqa beqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvqsSYley+l 6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCtZtue o1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8S PpTiQ58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrW bIzwJO5Rtn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h 7aquPov3ZYG/hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9Wt gN3j3vcS2JmqMXA0B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbS J4XFmOEr+lTBy3WwZyuxIQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL /6mwejO8YOZkCMXAmUiLVoSTF5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vk oz7q5I9iLIognXPIlyRyJoTcwR0TZ0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb 8McxqCdiYtwDEql1SkfOjE+UeNiXNDYoft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5Uq vZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrCUY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4on ysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNXrDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10H xU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK61Jc/ycHSjipDUTaA2Dkv6q556DNm i2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQaziIlTHHii4caleo5g9a1h52K JNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEpGcA4HjOPpUHsRwzLqogy Fq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/tacmbWmp2k7GonWdvS YnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92hNXc72+UPYZuT Xet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWYbgPu4X9/ s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOcNRyK VXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUI UpNDqlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrU dcS0pyMtV1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqC yM7FWKyLaUxSCxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkz FtViBau93s2xfoV72GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9v M9zepPpkoyCucJwKXOMr4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/l bpq/k6BbTfi6Vg6yaH96NSCPXcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm7 2XQZonTWtxAVrO1G7TSuXWmBc7uAUvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStd Ka4crgu7ouV+a08zHsy9xf1O6778vXNp+TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81 qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWqOjzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/ tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9+Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5 x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BEdXUY4VDm8nzHBXwf6FylBDJvJzf0 Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2OF+ENXLLFno1VUvKhoJvgUv4 V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8xzoiyDf0JnpMVnL6pkw+ t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTgAYVKeG7qxn6fR34d 1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaBqFh1u1JRctiB MTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriKlRYbw4iN L5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP/bhu /niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMl KymUPElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYI d0HXlZdolsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5 QompmF6JE4YZHACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZ WKs5bZ51W7FZm6XJmqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2I nNdpm9QpM0fmnLk4WLKZV555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55b RJsMKHAmh2s49XP/OSa9qXSo+ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g 6Z0GKncZmp4FZzGECHRrqZYPOn1atzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haR hX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOXFHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9w dXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjBSFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6 iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj 7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqdI2op9zKiv1pXx9moVrOrGgdvxxp7 PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBquBcd3ygqpcRqX6DeHiMc0+RWq 1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd85VKiCitKmjqr7YlpC3N1 cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/OqoYCmwGHtxBAWsJLut ABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SInasmKzqTXrtV87 tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 --B_3322381808_2965858-- From owner-ietf-pkix@mail.imc.org Sun Apr 12 06:26:56 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6548B3A6950 for ; Sun, 12 Apr 2009 06:26:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.172 X-Spam-Level: X-Spam-Status: No, score=-0.172 tagged_above=-999 required=5 tests=[AWL=-1.124, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, EXTRA_MPART_TYPE=1, HTML_MESSAGE=0.001, SARE_GIF_ATTACH=1.42] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CpvY5xgp47TP for ; Sun, 12 Apr 2009 06:26:54 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 484773A67C0 for ; Sun, 12 Apr 2009 06:26:50 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3CCtPxE041365 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 05:55:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3CCtP5p041364; Sun, 12 Apr 2009 05:55:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3CCtCVG041351 for ; Sun, 12 Apr 2009 05:55:22 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 26933 invoked from network); 12 Apr 2009 12:53:52 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 12 Apr 2009 12:53:52 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/related; boundary="----_=_NextPart_001_01C9BB6D.EA5B6223"; type="multipart/alternative" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Sun, 12 Apr 2009 08:55:09 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOwAI14WnsABj+N0A== References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> From: "Santosh Chokhani" To: "Stefan Santesson" , "Erik Andersen" , "ietf-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9BB6D.EA5B6223 Content-Type: multipart/alternative; boundary="----_=_NextPart_002_01C9BB6D.EA5B6223" ------_=_NextPart_002_01C9BB6D.EA5B6223 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Stefan, =20 In context of RFC 3281, you are correct that the AA certificate is a = PKC. But, in the context of X.509, AA certificate exists. May be = posting to both X.500 and PKIX was a bad idea from that viewpoint. = Actually, 3281 does=20 =20 I do not understand your comment that states: =20 "Except for Russ comment, what is true for Self Signed SSL/TLS = certificates out there. Are they issued as CA certificates or as EE = certificates (Basic Constraints CA=3DFALSE). I could not find any = samples to study, doing a quick search." ________________________________ From: owner-ietf-pkix@mail.imc.org = [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan Santesson Sent: Sunday, April 12, 2009 5:50 AM To: Erik Andersen; 'ietf-pkix' Subject: Re: [x500standard] Re: Certificate definitions =09 =09 Eric, =09 There is always a danger with cross posting to multiple mailing lists. = Instead of making more people aware of the issue, it may have the = opposite effect. In my case it made me miss all these mails as they all = got sorted in the wrong folder. =09 I see a few potential issues here. =09 =09 "The set of attribute certificates is the union of the set of = end-entity (attribute) certificates and the set of AA certificates." =09 =09 I don't think an AA certificate is an attribute certificate. I view it = as a public key certificate issued to the AA. =09 =09 "The set of CA certificates is the union of the set of self-issued = (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute = certificate." =09 =09 Except for Russ comment, what is true for Self Signed SSL/TLS = certificates out there. Are they issued as CA certificates or as EE = certificates (Basic Constraints CA=3DFALSE). I could not find any = samples to study, doing a quick search. =09 /Stefan =09 On 09-04-09 5:25 PM, "Erik Andersen" wrote: =09 =09 Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the = apparent inactivity of people, I have the power to produce Defect = Reports, produce Draft Technical Corrigenda, run them through both the = ISO and ITU-T approval process and finally integrate them into the next = edition of X.500 (incl. X.509) without being stopped by anyone (except = for Jean-Paul Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. = Let me express myself without the diagram. =20 The set of certificates is the union of the set of public-key = certificates and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key = certificates issued to end-entities and the set of attribute = certificates issued to end-entities. However, X.509 is a little = confusing here as the term end-entity certificate is sometimes meant to = be just public-key certificates issued to end-entities, so the term = end-entity certificate has two meanings. =20 The set of public-key certificates is the union of the set of = end-entity (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of = end-entity (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA = certificates and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued = (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute = certificate. =20 I am avoiding here to use the term "user attribute", but believe it is = supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term "certificate", he/she is = entitled to believe it can either be a public-key certificate. It may = not always be clear from the context what is meant. =20 Whenever an innocent us reader see the term "end-entity certificate", = he/she is entitled to believe it is either a public key certificate or = an attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term "cross-certificate", = he/she is entitled to believe it is either a public key certificate or = an attribute certificate. =20 My proposal was only to clear-up the terminology and to use the = terminology consistent in the text of X.509. Trying to do the latter may = raise a number of detailed questions when the meaning is not absolutely = clear from the context. =20 =20 =09 Erik Andersen =09 Andersen's L-Service =09 Elsevej 48, DK-3500 Vaerloese =09 Denmark =09 Mobile: +45 2097 1490 =09 email: era@x500.eu =09 www.x500.eu =09 www.x500standard.com =09 =09 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =09 =09 Eric, =09 =09 =09 Silence does not mean approval. =09 =09 =09 It may mean that the corrections are so numerous that it would take = too long to respond =09 and that people do not have that time available at the moment. =09 =09 =09 e.g.: an End-entity attribute certificate is not linked to a = public-key certificate. =09 a cross-certificate is not linked to an AA certificate. =09 an Authority Certificate is not linked to an Attribute = Certificate. =09 =09 =09 This is only a start ... =09 =09 =09 Denis =09 =09 ----- Message re=E7u -----=20 =09 De : owner-ietf-pkix =20 =09 =C0 : x500standard,'PKIX' = =20 =09 Date : 2009-04-03, 17:00:01 =09 Sujet : RE: [x500standard] Certificate definitions =09 =09 =09 I take silence as approval. =09 =09 Erik Andersen =09 Andersen's L-Service =09 Elsevej 48, DK-3500 Vaerloese =09 Denmark =09 Mobile: +45 2097 1490 =09 email: era@x500.eu =09 www.x500.eu =09 www.x500standard.com =09 =09 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =09 Hi =09 I got a number of responses on user certificates, but quite little = that actually answered my question. =09 I have tried to dig a little bit more in X.509 to get hold of the = terminology and then produced below figure. I will not comment all the = boxes. =09 =20 =09 I will like you to comments as to the correctness of above figure. =09 =09 =09 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first = time in clause 7 as a public-key certificate. There are several other = places where it is a public-key certificate. In 15.5.2.4 is used in the = context of attribute certificates. The conclusion must be that an = end-entity certificate can either be a end-entity public-key certificate = or an end-entity attribute certificate. However, in most places, it is = implied that we only talks about public-key certificates. For veterans, = this is not a major problem, but new-comers may get confused. Anyway, I = thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to = use the term "certificate" as a synonym for "end-entrity public key = certificate". =09 =09 =09 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is = also used in X.511. RFC 5280 uses the term once without differenting it = from just "certificate". =09 =09 =09 The term "cross-certificate" should probably also be qualified. =09 =09 =09 I suggest to add in X.509 definitions for: =09 =09 =09 "end-entity public-key certificate" =09 "user certificate" as a synonym for "end-entity public-key = certificate" =09 "end-entity attribute certificate" =09 =09 =09 The X.509 text should be updated to make use of these definitions. =09 =09 =09 X.509 has four attribute types for holding certificates. =09 =09 =09 UserCertificate: For end-entity public-key certificates =09 cAcertificate: For CA certificates =09 attributeCertificateAttribute: For end-entity attribute certificates =09 aACertificate: For AA Certificates =09 =09 =09 Any comments? =09 =09 =09 Erik Andersen =09 Andersen's L-Service =09 Elsevej 48, DK-3500 Vaerloese =09 Denmark =09 Mobile: +45 2097 1490 =09 email: era@x500.eu =09 www.x500.eu =09 www.x500standard.com =09 =09 =09 =09 =09 ------_=_NextPart_002_01C9BB6D.EA5B6223 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Re: [x500standard] Re: Certificate = definitions
Stefan,
 
In context of RFC 3281, you are correct = that the AA=20 certificate is a PKC.  But, in the context of X.509, AA certificate = exists.  May be posting to both X.500  and PKIX was a bad idea = from=20 that viewpoint.  Actually, 3281 does
 
I do not understand your comment that=20 states:
 
"Except for Russ comment, what is true for Self Signed = SSL/TLS=20 certificates out there. Are they issued as CA certificates or as EE = certificates=20 (Basic Constraints CA=3DFALSE). I could not find any samples to study, = doing a=20 quick search."


From: owner-ietf-pkix@mail.imc.org = [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan=20 Santesson
Sent: Sunday, April 12, 2009 5:50 AM
To: = Erik=20 Andersen; 'ietf-pkix'
Subject: Re: [x500standard] Re: = Certificate=20 definitions

Eric,

There is always a danger with = cross=20 posting to multiple mailing lists. Instead of making more people aware = of the=20 issue, it may have the opposite effect. In my case it made me miss all = these=20 mails as they all got sorted in the wrong folder.

 I see a = few=20 potential issues here.

=93
The set = of attribute=20 certificates is the union of the set of end-entity (attribute) = certificates=20 and the set of AA=20 certificates.=94

I=20 don=92t think an AA certificate is an attribute certificate. I view it = as a=20 public key certificate issued to the AA.

=93The set = of CA=20 certificates is the union of the set of self-issued (public-key)=20 certificates and the set cross certificates. The latter is a little=20 confusing, as a cross certificate can also be an attribute=20 certificate.=94

Except=20 for Russ comment, what is true for Self Signed SSL/TLS certificates = out there.=20 Are they issued as CA certificates or as EE certificates (Basic = Constraints=20 CA=3DFALSE). I could not find any samples to study, doing a quick=20 search.

/Stefan

On 09-04-09 5:25 PM, "Erik Andersen" = <era@x500.eu> wrote:

Hi Denis,
 
It is a little = dangerous not=20 to respond to my comments. Due to the apparent inactivity of people, = I have=20 the power to produce Defect Reports, produce Draft Technical = Corrigenda, run=20 them through both the ISO and ITU-T approval process and finally = integrate=20 them into the next edition of X.500 (incl. X.509) without being = stopped by=20 anyone (except for Jean-Paul Lemaire).
 
I believe you=20 misunderstood my diagram. It may be a little confusing. Let me = express=20 myself without the diagram.
 
The set of certificates is = the=20 union of the set of public-key certificates and the set of attribute = certificates.
 
The set of end-entity certificates is the = union=20 of public-key certificates issued to end-entities and the set of = attribute=20 certificates issued to end-entities. However, X.509 is a little = confusing=20 here as the term end-entity certificate is sometimes meant to be = just=20 public-key certificates issued to end-entities, so the term = end-entity=20 certificate has two meanings.
 
The set of public-key=20 certificates is the union of the set of end-entity (public-key) = certificates=20 and the set of CA certificates.
 
The set of attribute=20 certificates is the union of the set of end-entity (attribute) = certificates=20 and the set of AA certificates.
 
The set of authority=20 certificates is the union of the set CA certificates and the set of = AA=20 certificates.
 
The set of CA certificates is the union = of the=20 set of self-issued (public-key) certificates and the set cross = certificates.=20 The latter is a little confusing, as a cross certificate can also be = an=20 attribute certificate.
 
I am avoiding here to use the = term =93user=20 attribute=94, but believe it is supposed to mean a public-key = certificate=20 issued to an end-entity.
 
Whenever an innocent reader = sees the=20 term =93certificate=94, he/she is entitled to believe it can either = be a=20 public-key certificate. It may not always be clear from the context = what is=20 meant.
 
Whenever an innocent us  reader see the = term=20 =93end-entity certificate=94, he/she is entitled to believe it is = either a=20 public key certificate or an attribute certificate issued to an=20 end-entity.
 
Whenever an innocent us  reader see = the term=20 =93cross-certificate=94, he/she is entitled to believe it is either = a public key=20 certificate or an attribute certificate.
 
My proposal = was only=20 to clear-up the terminology and to use the terminology consistent in = the=20 text of X.509. Trying to do the latter may raise a number of = detailed=20 questions when the meaning is not absolutely clear from the context. =  
 

Erik=20 Andersen

Andersen's=20 L-Service

Elsevej = 48, DK-3500=20 Vaerloese

Denmark

Mobile: = +45 2097=20 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com


-----Original=20 Message-----
From: x500standard-bounce@freelists.= org=20 [mailto:x500standard-bou= nce@freelists.org]=20 On Behalf Of Denis Pinkas
Sent: 3. april 2009=20 17:33
To: x500 list; ietf-pkix
Subject: = [x500standard]=20 Re: Certificate definitions


Eric,



Silence does not mean=20 approval.



It=20 may mean that the corrections are so numerous that it would take too = long to=20 respond

and=20 that people do not have that time available at the=20 moment.



e.g.:=20  an End-entity attribute certificate is not linked to a = public-key=20 certificate.

       a=20 cross-certificate is not linked to an AA=20 certificate.

       an=20 Authority Certificate is not linked to an Attribute=20 Certificate.



This=20 is only a start ...



Denis

----- Message re=E7u -----=20

De : owner-ietf-pkix = <mailto%20:owner-ietf-pkix@mail.imc.org>= ;=20  

=C0=20 : x500standard,'PKIX' <mailto%20:x500standard@freelists.org,ietf-pkix@imc.org>=20  

Date : 2009-04-03,=20 17:00:01

Sujet : RE: [x500standard] = Certificate=20 definitions



I take = silence as=20 approval.


Erik=20 Andersen

Andersen's=20 L-Service

Elsevej 48, DK-3500=20 Vaerloese

Denmark

Mobile: +45 2097=20 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com


-----Original = Message-----
From: x500standard-bounce@freelists.= org=20 [mailto:x500standard-bou= nce@freelists.org]=20 On Behalf Of Erik Andersen
Sent: 1. april 2009=20 14:40
To: Directory list; PKIX
Subject: = [x500standard]=20 Certificate definitions

Hi

I got a number of = responses on=20 user certificates, but quite little that actually answered my=20 question.

I have tried to dig a = little bit=20 more in X.509 to get hold of the terminology and then produced = below=20 figure. I will not comment all the = boxes.



I will like you to = comments as to=20 the correctness of above figure.



The end-entity = certificate is not=20 defined in the definition clause. However it is used widely in the = main=20 text. It is mentioned the first time in clause 7 as a public-key=20 certificate. There are several other places where it is a = public-key=20 certificate. In 15.5.2.4 is used in the context of attribute = certificates.=20 The conclusion must be that an end-entity certificate can either = be a=20 end-entity public-key certificate or an end-entity attribute = certificate.=20 However, in most places, it is implied that we only talks about = public-key=20 certificates. For veterans, this is not a major problem, but = new-comers=20 may get confused. Anyway, I thing our specifications should be = clear and=20 not subject to interpretation. RFC 5280 does not use the term at = all. It=20 seems just to use the term =93certificate=94 as a synonym for = =93end-entrity=20 public key certificate=94.



The =93User = Certificate=94  is=20 not defined in X.509, but is wide used. It seems to be a synonym = for=20 =93end-entrity public key certificate=94. It is also used in = X.511. RFC 5280=20 uses the term once without differenting it from just=20 =93certificate=94.



The term = =93cross-certificate=94=20 should probably also be qualified.



I suggest to add in = X.509=20 definitions for:



=93end-entity = public-key=20 certificate=94

=93user = certificate=94 as a synonym=20 for =93end-entity public-key = certificate=94

=93end-entity = attribute=20 certificate=94



The X.509 text should = be updated=20 to make use of these definitions.



X.509 has four = attribute types=20 for holding certificates.



UserCertificate: For = end-entity=20 public-key certificates

cAcertificate: For CA = certificates

attributeCertificateAttribute:=20 For end-entity attribute = certificates

aACertificate: For AA = Certificates



Any=20 comments?



Erik=20 Andersen

Andersen's=20 L-Service

Elsevej 48, DK-3500=20 Vaerloese

Denmark

Mobile: +45 2097=20 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com



------_=_NextPart_002_01C9BB6D.EA5B6223-- ------_=_NextPart_001_01C9BB6D.EA5B6223 Content-Type: image/gif; name="image.gif" Content-Transfer-Encoding: base64 Content-ID: <461014912@12042009-2D9C> Content-Description: image.gif Content-Location: image.gif R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------_=_NextPart_001_01C9BB6D.EA5B6223-- From owner-ietf-pkix@mail.imc.org Sun Apr 12 12:47:52 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 864433A6C62 for ; Sun, 12 Apr 2009 12:47:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.984 X-Spam-Level: X-Spam-Status: No, score=-0.984 tagged_above=-999 required=5 tests=[AWL=-0.244, BAYES_20=-0.74] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kuXsU3CEgpXW for ; Sun, 12 Apr 2009 12:47:51 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2A0013A6A0E for ; Sun, 12 Apr 2009 12:47:50 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3CJJZ5g061328 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 12:19:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3CJJYZP061327; Sun, 12 Apr 2009 12:19:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout2-sn1.fre.skanova.net (pne-smtpout2-sn1.fre.skanova.net [81.228.11.159]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3CJJNQv061310 for ; Sun, 12 Apr 2009 12:19:34 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout2-sn1.fre.skanova.net (7.3.129) id 49CCDA0D001FA050 for ietf-pkix@imc.org; Sun, 12 Apr 2009 21:19:23 +0200 Message-ID: From: "Anders Rundgren" To: Subject: NSA/IAD Suite B Key-generation & On-line Protocols Date: Sun, 12 Apr 2009 21:19:52 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: >From what I believe must be an unclassified e-mail I quote: "NSA/IAD is establishing a commercial Suite B infrastructure that will include generation, distribution, revocation, and life cycle maintenance of Suite B V3 X.509 certificates with a target IOC of 1st quarter FY10. We are defining the certificate policy and interface requirements as well as supporting protocols. KMI CI-2 Spiral 2 will deploy Suite B mission certificates and Over-the-Network Key in December 2011 and will incorporate ECDH for KEK generation for product wrapping to align with HAIPE IS 4.0 (r)" It would be interesting if someone could translate this into something even a civilian could understand :-) I have FWIW, upgraded KeyGen2 to support ECDSA keys according to the latest XML DSIG 1.1 draft. Example (look for "ECKeyValue"): http://webpki.org/papers/keygen2/ec-keygen.xml XML DSIG 11: http://www.w3.org/TR/xmldsig-core1 AndersR From owner-ietf-pkix@mail.imc.org Sun Apr 12 18:02:54 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C4CB13A6C25 for ; Sun, 12 Apr 2009 18:02:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.517 X-Spam-Level: X-Spam-Status: No, score=-1.517 tagged_above=-999 required=5 tests=[AWL=0.279, BAYES_00=-2.599, MSGID_FROM_MTA_HEADER=0.803] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jLipSzeGtrKz for ; Sun, 12 Apr 2009 18:02:53 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7A81A3A657C for ; Sun, 12 Apr 2009 18:02:53 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3D0WX82077798 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 17:32:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3D0WWvS077797; Sun, 12 Apr 2009 17:32:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from QMTA07.westchester.pa.mail.comcast.net (qmta07.westchester.pa.mail.comcast.net [76.96.62.64]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3D0WLxh077786 for ; Sun, 12 Apr 2009 17:32:32 -0700 (MST) (envelope-from mstjohns@comcast.net) Message-Id: <200904130032.n3D0WLxh077786@balder-227.proper.com> Received: from OMTA12.westchester.pa.mail.comcast.net ([76.96.62.44]) by QMTA07.westchester.pa.mail.comcast.net with comcast id ej9U1b0030xGWP857oXwqZ; Mon, 13 Apr 2009 00:31:56 +0000 Received: from MIKES-LAPTOM.comcast.net ([68.48.0.201]) by OMTA12.westchester.pa.mail.comcast.net with comcast id eoYN1b0084LCBKY3YoYNMP; Mon, 13 Apr 2009 00:32:22 +0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sun, 12 Apr 2009 20:32:21 -0400 To: "Anders Rundgren" , From: Michael StJohns Subject: Re: NSA/IAD Suite B Key-generation & On-line Protocols In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 03:19 PM 4/12/2009, Anders Rundgren wrote: >From what I believe must be an unclassified e-mail I quote: > > "NSA/IAD is establishing a commercial Suite B infrastructure that will > include generation, distribution, revocation, and life cycle maintenance > of Suite B V3 X.509 certificates with a target IOC of 1st quarter FY10. The National Security Agency is establishing a commercial Public Key Infrastructure which issues certificates compliant with the NSA Suite B cryptographic suite and provides the normal functions of certificate generation, distribution and revocation. The service should be up and running around October 2009. > We are defining the certificate policy and interface requirements as > well as supporting protocols. We're defining our own way of doing things, so anyone who wants to work with us will have to spend lots of money. > KMI CI-2 Spiral 2 will deploy Suite B > mission certificates and Over-the-Network Key in December 2011 and will > incorporate ECDH for KEK generation for product wrapping to align with > HAIPE IS 4.0 (r)" Phase two - occurring about December 2011 - will provide certificates and key material for the HAIPE series of IP packet encryptors and will do something mostly no one else will care about. >It would be interesting if someone could translate this into something even >a civilian could understand :-) > >I have FWIW, upgraded KeyGen2 to support ECDSA keys according >to the latest XML DSIG 1.1 draft. Example (look for "ECKeyValue"): >http://webpki.org/papers/keygen2/ec-keygen.xml > >XML DSIG 11: >http://www.w3.org/TR/xmldsig-core1 > >AndersR From owner-ietf-pkix@mail.imc.org Sun Apr 12 19:54:28 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0F0DB3A68D6 for ; Sun, 12 Apr 2009 19:54:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.099 X-Spam-Level: X-Spam-Status: No, score=-6.099 tagged_above=-999 required=5 tests=[AWL=0.500, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cMLQaYvU-7DW for ; Sun, 12 Apr 2009 19:54:26 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 1F8263A69F6 for ; Sun, 12 Apr 2009 19:54:25 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3D2WYbd084796 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 19:32:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3D2WYtL084795; Sun, 12 Apr 2009 19:32:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from e6.ny.us.ibm.com (e6.ny.us.ibm.com [32.97.182.146]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3D2WMSL084784 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Sun, 12 Apr 2009 19:32:33 -0700 (MST) (envelope-from tgindin@us.ibm.com) Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234]) by e6.ny.us.ibm.com (8.13.1/8.13.1) with ESMTP id n3D2Y6RM011614 for ; Sun, 12 Apr 2009 22:34:06 -0400 Received: from d01av03.pok.ibm.com (d01av03.pok.ibm.com [9.56.224.217]) by d01relay02.pok.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n3D2WM2W176672 for ; Sun, 12 Apr 2009 22:32:22 -0400 Received: from d01av03.pok.ibm.com (loopback [127.0.0.1]) by d01av03.pok.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id n3D2WLcY013480 for ; Sun, 12 Apr 2009 22:32:21 -0400 Received: from d01ml062.pok.ibm.com (d01ml062.pok.ibm.com [9.56.228.115]) by d01av03.pok.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id n3D2WLPm013477; Sun, 12 Apr 2009 22:32:21 -0400 In-Reply-To: <7B01F815F4064ABEB6447E403CA12C56@ERA1> To: "Erik Andersen" Cc: "'ietf-pkix'" , x500standard@freelists.org MIME-Version: 1.0 Subject: RE: [x500standard] Re: Certificate definitions X-Mailer: Lotus Notes Release 7.0 HF277 June 21, 2006 From: Tom Gindin Message-ID: Date: Sun, 12 Apr 2009 22:32:20 -0400 X-MIMETrack: Serialize by Router on D01ML062/01/M/IBM(Release 8.0.1 HF8|December 19, 2008) at 04/12/2009 22:32:21, Serialize complete at 04/12/2009 22:32:21 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: An AA certificate is also a PKC, and normally not an issuer of=20 other PKC's. Thus, having a "set of attribute certificates" containing=20 both AA's and AC's probably confuses more than it clarifies, especially=20 since the term "attribute certificate" is in general use and does not=20 include AA certificates. I think it would be more helpful to depict the=20 issuance relationship than to define a "set of authority certificates" and = a "set of end-entity certificates". A more accurate version of the second = and third lines of your diagram would thus go: PK Certificate has two children: CA certificate and=20 End-entity certificate EE Certificate has two children: End-entity PKC (EE PKC)=20 and AA certificate The issuance relationships should be arrows from CA certificate=20 back up to PKC, and from AA certificate to Attribute certificate. It=20 isn't clear to me whether EE Certificate as defined above is a useful=20 concept, or whether PKC should have three children: CA, EE PKC, and AA.=20 Conceptually, it's cleaner to make PKC have three children, but some=20 certificates can be used as AA's without it being apparent from the actual = contents of that certificate (the SOA identifier extension is not=20 mandatory). In a different part of the discussion, self-signed certificates=20 are a subset of self-issued ones. Tom Gindin "Erik Andersen" =20 Sent by: owner-ietf-pkix@mail.imc.org 04/09/2009 11:25 AM To , "'ietf-pkix'" cc Subject RE: [x500standard] Re: Certificate definitions Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the=20 apparent inactivity of people, I have the power to produce Defect Reports, = produce Draft Technical Corrigenda, run them through both the ISO and=20 ITU-T approval process and finally integrate them into the next edition of = X.500 (incl. X.509) without being stopped by anyone (except for Jean-Paul=20 Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. Let=20 me express myself without the diagram. =20 The set of certificates is the union of the set of public-key certificates = and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key certificates = issued to end-entities and the set of attribute certificates issued to=20 end-entities. However, X.509 is a little confusing here as the term=20 end-entity certificate is sometimes meant to be just public-key=20 certificates issued to end-entities, so the term end-entity certificate=20 has two meanings. =20 The set of public-key certificates is the union of the set of end-entity=20 (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of end-entity=20 (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA certificates=20 and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued=20 (public-key) certificates and the set cross certificates. The latter is a=20 little confusing, as a cross certificate can also be an attribute=20 certificate. =20 I am avoiding here to use the term ?user attribute?, but believe it is=20 supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term ?certificate?, he/she is=20 entitled to believe it can either be a public-key certificate. It may not=20 always be clear from the context what is meant. =20 Whenever an innocent us reader see the term ?end-entity certificate?,=20 he/she is entitled to believe it is either a public key certificate or an=20 attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term ?cross-certificate?, he/she=20 is entitled to believe it is either a public key certificate or an=20 attribute certificate. =20 My proposal was only to clear-up the terminology and to use the=20 terminology consistent in the text of X.509. Trying to do the latter may=20 raise a number of detailed questions when the meaning is not absolutely=20 clear from the context. =20 =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =20 Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too=20 long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a public-key=20 certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute=20 Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions =20 I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little that=20 actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the=20 terminology and then produced below figure. I will not comment all the=20 boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause.=20 However it is used widely in the main text. It is mentioned the first time = in clause 7 as a public-key certificate. There are several other places=20 where it is a public-key certificate. In 15.5.2.4 is used in the context=20 of attribute certificates. The conclusion must be that an end-entity=20 certificate can either be a end-entity public-key certificate or an=20 end-entity attribute certificate. However, in most places, it is implied=20 that we only talks about public-key certificates. For veterans, this is=20 not a major problem, but new-comers may get confused. Anyway, I thing our=20 specifications should be clear and not subject to interpretation. RFC 5280 = does not use the term at all. It seems just to use the term ?certificate?=20 as a synonym for ?end-entrity public key certificate?. =20 The ?User Certificate? is not defined in X.509, but is wide used. It=20 seems to be a synonym for ?end-entrity public key certificate?. It is also = used in X.511. RFC 5280 uses the term once without differenting it from=20 just ?certificate?. =20 The term ?cross-certificate? should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 ?end-entity public-key certificate? ?user certificate? as a synonym for ?end-entity public-key certificate? ?end-entity attribute certificate? =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attribute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 From oblion@alston.com Mon Apr 13 11:06:39 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 72CF43A6862 for ; Mon, 13 Apr 2009 11:06:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -8.549 X-Spam-Level: X-Spam-Status: No, score=-8.549 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_RELAY_NODNS=1.451, HELO_EQ_AU=0.377, HTML_IMAGE_ONLY_32=1.778, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SARE_FROM_DRUGS=1.666, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 50utA3F+Y3Yi for ; Mon, 13 Apr 2009 11:06:38 -0700 (PDT) Received: from ahrc.harness.org.au (unknown [189.25.179.183]) by core3.amsl.com (Postfix) with SMTP id CFC853A6D3C for ; Mon, 13 Apr 2009 11:06:35 -0700 (PDT) To: Subject: You've received an answer to your question From: VIAGRA . Official Site MIME-Version: 1.0 Content-Type: text/html Message-Id: <20090413180636.CFC853A6D3C@core3.amsl.com> Date: Mon, 13 Apr 2009 11:06:35 -0700 (PDT)
Men's Health wirzpBuild Maximum MUSCLE, STRENGTH, and POWER!
Try It FREE for 21 Days! ORDER NOW! Plus, get 2 FREE Bonus Gifts!
Dear pkix-archive

Men's Health recommends



FREE gifts reserved for you: pkix-archive@lists.ietf.org
If you would prefer not to receive future information about special offers from Men's Health,
you may Unsubscribe.


Customer Service Department, 33 East Minor Street, Emmaus, PA 18098


Copyright, Men's Health
From owner-ietf-pkix@mail.imc.org Mon Apr 13 13:22:51 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B7F613A6870 for ; Mon, 13 Apr 2009 13:22:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.352 X-Spam-Level: X-Spam-Status: No, score=-1.352 tagged_above=-999 required=5 tests=[AWL=0.117, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kuLunVbuGvIv for ; Mon, 13 Apr 2009 13:22:50 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2CA523A6924 for ; Mon, 13 Apr 2009 13:22:45 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3DJrTb9056814 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 13 Apr 2009 12:53:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3DJrTOV056813; Mon, 13 Apr 2009 12:53:29 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3DJrHSC056794 for ; Mon, 13 Apr 2009 12:53:28 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 11171 invoked from network); 13 Apr 2009 19:51:56 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 13 Apr 2009 19:51:55 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Mon, 13 Apr 2009 15:53:12 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAlknTSAAAy16cA== References: From: "Santosh Chokhani" To: "Kelvin Yiu" , "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: It seems that leaving responderID as is is our best course of action. Since this field and its match is not security relevant, I do not see this particular dependence on SHA-1 as problematic. > -----Original Message----- > From: Kelvin Yiu [mailto:kelviny@exchange.microsoft.com]=20 > Sent: Monday, April 13, 2009 2:50 PM > To: Santosh Chokhani; Stefan Santesson; IETF-pkix > Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > [Sorry for jumping on this thread so late] >=20 > Santosh, >=20 > The OCSP client in Windows Vista uses the responderID field=20 > to find the OCSP signer cert in the cert bag and expects the=20 > key hash to be SHA-1. Otherwise, the OCSP response will be=20 > rejected. Upgrading from SHA-1 will be problematic. >=20 > Kelvin Yiu > Lead Program Manager, Windows Security > Microsoft >=20 >=20 > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org=20 > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Wednesday, April 01, 2009 1:32 PM > To: Stefan Santesson; IETF-pkix > Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 >=20 >=20 > Stefan, >=20 > See responses in-line. >=20 > > -----Original Message----- > > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > > Sent: Wednesday, April 01, 2009 2:34 PM > > To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >=20 > > Santosh, > >=20 > > If you are talking about adding other options to calculate=20 > the KeyHash=20 > > value in ResponderID then I strongly disagree. > >=20 > > If you add unspecified options you change the properties of=20 > the field=20 > > from deterministic to a completely unknown value. > > It does not matter if RFC2560 isn't explicit in its=20 > description of the=20 > > use of the field. The fact is that OCSP explicitly defines=20 > this value=20 > > and as such will allow a client to deterministically compare this=20 > > value with the certificate selected to validate the response=20 > > signature. >=20 > I hope no one is doing the matching of Responder ID with hash=20 > of a key in place of responder signature verification. That=20 > would be real bad. >=20 > > If you allow > > other ways to calculate the value but do not provide any means to=20 > > signal what method that was used, then this feature is lost. >=20 > The most common use will be to use this field to prioritize=20 > the certificates of the responder to use for sigature=20 > verification on the response. >=20 > >=20 > > In worst case we will cause current implementation to fail. >=20 > That is why I am asking what problems if any will the vendors have. >=20 > >=20 > > I really don't think its worth the effort to change this field. We=20 > > have a very large base of implementations that we really=20 > don't want to=20 > > mess up unless its absolutely necessary. >=20 > So, we agree that leaving this field hard wired to SHA-1 is=20 > ok and 2560 can easily accommodate new hash functions. Right? >=20 > My only reason to align with 5280 is that if some one were=20 > ever want to strip off SHA-1 altogether from their Responder=20 > or client, permitting other methods does it. >=20 > >=20 > > As the only property of this field is to provide a convenient=20 > > identifier, it is far from absolutely necessary to change it. > > Remember that there is a second choice to to identify responder by=20 > > name. For names we have accepted the possibility of collisions. In=20 > > that comparison, upgrading from SHA-1 is really redundant. > >=20 > > /Stefan > >=20 > >=20 > >=20 > >=20 > > On 4/1/09 4:05 PM, "Santosh Chokhani"=20 > wrote: > >=20 > > >=20 > > > My resident ASN.1 expert apprised me of the fact that > > adding a choice > > > will break backward compatibility. Thus, extension is a > > fifth option > > > (probably third in the priority). > > >=20 > > > Based on what I know of OCSP implementations, not changing > > anything in > > > terms of bits on the wire and aligning the Key ID with SKID > > in 5280 is > > > the best approach. I do not think it will hurt backward > > compatibility. > > >=20 > > > OCSP Responder and OCSP client vendors should speak up if I > > am wrong. > > >=20 > > >> -----Original Message----- > > >> From: Santosh Chokhani > > >> Sent: Tuesday, March 31, 2009 12:51 PM > > >> To: 'Massimiliano Pala'; IETF-pkix > > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > > >>=20 > > >> Max, > > >>=20 > > >> I do not see where and what extension we need to add for > > other digest > > >> algorithm. > > >>=20 > > >> For key id, we need to enhance or broaden the options. > > >>=20 > > >>> -----Original Message----- > > >>> From: owner-ietf-pkix@mail.imc.org=20 > > >>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > > Massimiliano Pala > > >>> Sent: Tuesday, March 31, 2009 1:37 PM > > >>> To: IETF-pkix > > >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > >>>=20 > > >>> Hi all, > > >>>=20 > > >>> as I said during last meeting - as the use of SHA-1 does > > >> not have any > > >>> security implication in the OCSP, another viable way=20 > would be to=20 > > >>> define an extension where other digest algorithms can be > > >> added to the > > >>> request/responses. > > >>>=20 > > >>> It is a simple addition and does not require any change in > > >> the RFC, it > > >>> can be done as a separate document for those who what to > > use other > > >>> digest algorithms. > > >>>=20 > > >>> After all, isn't this an example of why we allow > > extensions to the > > >>> messages ? > > >>>=20 > > >>> Later, > > >>> Max > > >>>=20 > > >>>=20 > > >>> Santosh Chokhani wrote: > > >>>> Tom, > > >>>>=20 > > >>>> Adding a new choice and aligning it with 5280 SKID is fine. > > >>>>=20 > > >>>> I would not add anything about matching this field with > > >>> anything since > > >>>> RFC 2560 does not say anything about it. > > >>>>=20 > > >>>> If one were to add something, one should describe how this > > >>> field can > > >>>> be used to select from multiple Responder certificates. > > >>>>=20 > > >>>>> -----Original Message----- > > >>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > > >>>>> Sent: Monday, March 30, 2009 7:46 PM > > >>>>> To: Santosh Chokhani > > >>>>> Cc: IETF-pkix > > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > >>>>>=20 > > >>>>> Santosh: > > >>>>>=20 > > >>>>> The RFC 5280 method just describes "two common > > >> methods for > > >>>>> generating key identifiers from the public key" > > >>>>> and says that other methods are acceptable. The comment > > >>> to KeyHash > > >>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > > >> the same > > >>>>> field as SKID, and I would support either stating "if the > > >>> KeyHash is > > >>>>> not precisely 20 octets long, it should be matched=20 > against the=20 > > >>>>> Subject Key Identifier extension of the signing=20 > certificate" or=20 > > >>>>> adding another choice like byID [3] OCTET STRING -- > > >>> matches the value > > >>>>> of SKID. > > >>>>>=20 > > >>>>> Tom Gindin > > >>>>>=20 > > >>>>> P.S. - The above opinions are mine, and not necessarily > > >>> those of my > > >>>>> employer > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>> "Santosh Chokhani" Sent by: > > >>>>> owner-ietf-pkix@mail.imc.org > > >>>>> 03/26/2009 10:39 PM > > >>>>>=20 > > >>>>> To > > >>>>> "IETF-pkix" > > >>>>> cc > > >>>>>=20 > > >>>>> Subject > > >>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>> RFC 2560 dependence on SHA-1 does not appear to be > > >>> difficult to deal > > >>>>> with. > > >>>>>=20 > > >>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > > >> optional. We can > > >>>>> update this to add SHA-2 series as optional. > > >>>>>=20 > > >>>>> The Responder ID has SHA-1 hardwired. But, that is no > > >>> different than > > >>>>> key ID extensions in RFC 5280. Here are some options > > in order of > > >>>>> preference: > > >>>>>=20 > > >>>>> 1. Align the language with subject key ID language=20 > in RFC 5280. > > >>>>>=20 > > >>>>> 2. Keep on using SHA-1. This field is not security > > >>> relevant. RFC > > >>>>> 2560 does not even describe how to use this field. So, > > >>> having SHA-1 > > >>>>> and accidental or intentional collisions will not hurt the > > >>> security > > >>>>> of the protocol. > > >>>>>=20 > > >>>>> 3. If you do not believe in KISS principle, you can > > >>> define another > > >>>>> response type and enhance the key ID ASN.1 syntax so=20 > that hash=20 > > >>>>> algorithm is identified. > > >>>>>=20 > > >>>>> 4. Another option is for the Responder to use the=20 > same hashing=20 > > >>>>> algorithm as the one in the first certID entry. > > >>>>>=20 > > >>>>>=20 > > >>>>> Santosh Chokhani > > >>>>> CygnaCom Solutions > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>=20 > > >>>>=20 > > >>>=20 > > >>>=20 > > >>> -- > > >>>=20 > > >>> Best Regards, > > >>>=20 > > >>> Massimiliano Pala > > >>>=20 > > >>> --o----------------------------------------------------------- > > >>> ------------- > > >>> Massimiliano Pala [OpenCA Project Manager]=20 > > >>> Massimiliano.Pala@dartmouth.edu > > >>> =20 > > >>> project.manager@openca.org > > >>>=20 > > >>> Dartmouth Computer Science Dept Home Phone: +1 > > >>> (603) 369-9332 > > >>> PKI/Trust Laboratory Work Phone: +1 > > >>> (603) 646-9179 > > >>> --o----------------------------------------------------------- > > >>> ------------- > > >>>=20 > > >>> People who think they know everything are a great annoyance > > >> to those > > >>> of us who do. > > >>> -- > > >>> Isaac Asimov > > >>>=20 > > >>=20 > > >=20 > >=20 > >=20 > >=20 >=20 >=20 >=20 From owner-ietf-pkix@mail.imc.org Tue Apr 14 02:32:51 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3F5453A6AFC for ; Tue, 14 Apr 2009 02:32:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.63 X-Spam-Level: X-Spam-Status: No, score=-3.63 tagged_above=-999 required=5 tests=[AWL=2.416, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YhaVXLKxLC5A for ; Tue, 14 Apr 2009 02:32:50 -0700 (PDT) Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) by core3.amsl.com (Postfix) with ESMTP id 27EC03A67F4 for ; Tue, 14 Apr 2009 02:32:46 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3E93D8O000608 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 14 Apr 2009 02:03:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3E93DQY000607; Tue, 14 Apr 2009 02:03:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3E92xpM000596 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 14 Apr 2009 02:03:11 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 30871 invoked from network); 14 Apr 2009 09:03:01 -0000 Received: from s34.loopia.se (HELO s29.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 14 Apr 2009 09:03:01 -0000 Received: (qmail 83212 invoked from network); 14 Apr 2009 09:02:57 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s29.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 14 Apr 2009 09:02:57 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Tue, 14 Apr 2009 11:02:52 +0200 Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 From: Stefan Santesson To: Santosh Chokhani , Kelvin Yiu , IETF-pkix Message-ID: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAlknTSAAAy16cAAbna1A In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is also my opinion. /Stefan On 09-04-13 9:53 PM, "Santosh Chokhani" wrote: > > It seems that leaving responderID as is is our best course of action. > Since this field and its match is not security relevant, I do not see > this particular dependence on SHA-1 as problematic. > >> -----Original Message----- >> From: Kelvin Yiu [mailto:kelviny@exchange.microsoft.com] >> Sent: Monday, April 13, 2009 2:50 PM >> To: Santosh Chokhani; Stefan Santesson; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >> >> [Sorry for jumping on this thread so late] >> >> Santosh, >> >> The OCSP client in Windows Vista uses the responderID field >> to find the OCSP signer cert in the cert bag and expects the >> key hash to be SHA-1. Otherwise, the OCSP response will be >> rejected. Upgrading from SHA-1 will be problematic. >> >> Kelvin Yiu >> Lead Program Manager, Windows Security >> Microsoft >> >> >> -----Original Message----- >> From: owner-ietf-pkix@mail.imc.org >> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani >> Sent: Wednesday, April 01, 2009 1:32 PM >> To: Stefan Santesson; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >> >> >> >> Stefan, >> >> See responses in-line. >> >>> -----Original Message----- >>> From: Stefan Santesson [mailto:stefan@aaa-sec.com] >>> Sent: Wednesday, April 01, 2009 2:34 PM >>> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>> >>> Santosh, >>> >>> If you are talking about adding other options to calculate >> the KeyHash >>> value in ResponderID then I strongly disagree. >>> >>> If you add unspecified options you change the properties of >> the field >>> from deterministic to a completely unknown value. >>> It does not matter if RFC2560 isn't explicit in its >> description of the >>> use of the field. The fact is that OCSP explicitly defines >> this value >>> and as such will allow a client to deterministically compare this >>> value with the certificate selected to validate the response >>> signature. >> >> I hope no one is doing the matching of Responder ID with hash >> of a key in place of responder signature verification. That >> would be real bad. >> >>> If you allow >>> other ways to calculate the value but do not provide any means to >>> signal what method that was used, then this feature is lost. >> >> The most common use will be to use this field to prioritize >> the certificates of the responder to use for sigature >> verification on the response. >> >>> >>> In worst case we will cause current implementation to fail. >> >> That is why I am asking what problems if any will the vendors have. >> >>> >>> I really don't think its worth the effort to change this field. We >>> have a very large base of implementations that we really >> don't want to >>> mess up unless its absolutely necessary. >> >> So, we agree that leaving this field hard wired to SHA-1 is >> ok and 2560 can easily accommodate new hash functions. Right? >> >> My only reason to align with 5280 is that if some one were >> ever want to strip off SHA-1 altogether from their Responder >> or client, permitting other methods does it. >> >>> >>> As the only property of this field is to provide a convenient >>> identifier, it is far from absolutely necessary to change it. >>> Remember that there is a second choice to to identify responder by >>> name. For names we have accepted the possibility of collisions. In >>> that comparison, upgrading from SHA-1 is really redundant. >>> >>> /Stefan >>> >>> >>> >>> >>> On 4/1/09 4:05 PM, "Santosh Chokhani" >> wrote: >>> >>>> >>>> My resident ASN.1 expert apprised me of the fact that >>> adding a choice >>>> will break backward compatibility. Thus, extension is a >>> fifth option >>>> (probably third in the priority). >>>> >>>> Based on what I know of OCSP implementations, not changing >>> anything in >>>> terms of bits on the wire and aligning the Key ID with SKID >>> in 5280 is >>>> the best approach. I do not think it will hurt backward >>> compatibility. >>>> >>>> OCSP Responder and OCSP client vendors should speak up if I >>> am wrong. >>>> >>>>> -----Original Message----- >>>>> From: Santosh Chokhani >>>>> Sent: Tuesday, March 31, 2009 12:51 PM >>>>> To: 'Massimiliano Pala'; IETF-pkix >>>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> >>>>> Max, >>>>> >>>>> I do not see where and what extension we need to add for >>> other digest >>>>> algorithm. >>>>> >>>>> For key id, we need to enhance or broaden the options. >>>>> >>>>>> -----Original Message----- >>>>>> From: owner-ietf-pkix@mail.imc.org >>>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of >>> Massimiliano Pala >>>>>> Sent: Tuesday, March 31, 2009 1:37 PM >>>>>> To: IETF-pkix >>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>> >>>>>> Hi all, >>>>>> >>>>>> as I said during last meeting - as the use of SHA-1 does >>>>> not have any >>>>>> security implication in the OCSP, another viable way >> would be to >>>>>> define an extension where other digest algorithms can be >>>>> added to the >>>>>> request/responses. >>>>>> >>>>>> It is a simple addition and does not require any change in >>>>> the RFC, it >>>>>> can be done as a separate document for those who what to >>> use other >>>>>> digest algorithms. >>>>>> >>>>>> After all, isn't this an example of why we allow >>> extensions to the >>>>>> messages ? >>>>>> >>>>>> Later, >>>>>> Max >>>>>> >>>>>> >>>>>> Santosh Chokhani wrote: >>>>>>> Tom, >>>>>>> >>>>>>> Adding a new choice and aligning it with 5280 SKID is fine. >>>>>>> >>>>>>> I would not add anything about matching this field with >>>>>> anything since >>>>>>> RFC 2560 does not say anything about it. >>>>>>> >>>>>>> If one were to add something, one should describe how this >>>>>> field can >>>>>>> be used to select from multiple Responder certificates. >>>>>>> >>>>>>>> -----Original Message----- >>>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] >>>>>>>> Sent: Monday, March 30, 2009 7:46 PM >>>>>>>> To: Santosh Chokhani >>>>>>>> Cc: IETF-pkix >>>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>> >>>>>>>> Santosh: >>>>>>>> >>>>>>>> The RFC 5280 method just describes "two common >>>>> methods for >>>>>>>> generating key identifiers from the public key" >>>>>>>> and says that other methods are acceptable. The comment >>>>>> to KeyHash >>>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's >>>>> the same >>>>>>>> field as SKID, and I would support either stating "if the >>>>>> KeyHash is >>>>>>>> not precisely 20 octets long, it should be matched >> against the >>>>>>>> Subject Key Identifier extension of the signing >> certificate" or >>>>>>>> adding another choice like byID [3] OCTET STRING -- >>>>>> matches the value >>>>>>>> of SKID. >>>>>>>> >>>>>>>> Tom Gindin >>>>>>>> >>>>>>>> P.S. - The above opinions are mine, and not necessarily >>>>>> those of my >>>>>>>> employer >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> "Santosh Chokhani" Sent by: >>>>>>>> owner-ietf-pkix@mail.imc.org >>>>>>>> 03/26/2009 10:39 PM >>>>>>>> >>>>>>>> To >>>>>>>> "IETF-pkix" >>>>>>>> cc >>>>>>>> >>>>>>>> Subject >>>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> RFC 2560 dependence on SHA-1 does not appear to be >>>>>> difficult to deal >>>>>>>> with. >>>>>>>> >>>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as >>>>> optional. We can >>>>>>>> update this to add SHA-2 series as optional. >>>>>>>> >>>>>>>> The Responder ID has SHA-1 hardwired. But, that is no >>>>>> different than >>>>>>>> key ID extensions in RFC 5280. Here are some options >>> in order of >>>>>>>> preference: >>>>>>>> >>>>>>>> 1. Align the language with subject key ID language >> in RFC 5280. >>>>>>>> >>>>>>>> 2. Keep on using SHA-1. This field is not security >>>>>> relevant. RFC >>>>>>>> 2560 does not even describe how to use this field. So, >>>>>> having SHA-1 >>>>>>>> and accidental or intentional collisions will not hurt the >>>>>> security >>>>>>>> of the protocol. >>>>>>>> >>>>>>>> 3. If you do not believe in KISS principle, you can >>>>>> define another >>>>>>>> response type and enhance the key ID ASN.1 syntax so >> that hash >>>>>>>> algorithm is identified. >>>>>>>> >>>>>>>> 4. Another option is for the Responder to use the >> same hashing >>>>>>>> algorithm as the one in the first certID entry. >>>>>>>> >>>>>>>> >>>>>>>> Santosh Chokhani >>>>>>>> CygnaCom Solutions >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>> >>>>>>> >>>>>> >>>>>> >>>>>> -- >>>>>> >>>>>> Best Regards, >>>>>> >>>>>> Massimiliano Pala >>>>>> >>>>>> --o----------------------------------------------------------- >>>>>> ------------- >>>>>> Massimiliano Pala [OpenCA Project Manager] >>>>>> Massimiliano.Pala@dartmouth.edu >>>>>> >>>>>> project.manager@openca.org >>>>>> >>>>>> Dartmouth Computer Science Dept Home Phone: +1 >>>>>> (603) 369-9332 >>>>>> PKI/Trust Laboratory Work Phone: +1 >>>>>> (603) 646-9179 >>>>>> --o----------------------------------------------------------- >>>>>> ------------- >>>>>> >>>>>> People who think they know everything are a great annoyance >>>>> to those >>>>>> of us who do. >>>>>> -- >>>>>> Isaac Asimov >>>>>> >>>>> >>>> >>> >>> >>> >> >> >> > From owner-ietf-pkix@mail.imc.org Tue Apr 14 07:11:05 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D80033A6C69 for ; Tue, 14 Apr 2009 07:11:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.355 X-Spam-Level: X-Spam-Status: No, score=-1.355 tagged_above=-999 required=5 tests=[AWL=0.114, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RVjK19DehfQw for ; Tue, 14 Apr 2009 07:11:04 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 21F473A6DC8 for ; Tue, 14 Apr 2009 07:10:46 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3EDV5Z4022355 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 14 Apr 2009 06:31:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3EDV5OF022353; Tue, 14 Apr 2009 06:31:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3EDUsYL022334 for ; Tue, 14 Apr 2009 06:31:04 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 22045 invoked from network); 14 Apr 2009 13:29:32 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 14 Apr 2009 13:29:31 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Tue, 14 Apr 2009 09:30:49 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAlknTSAAAy16cAAbna1AAAk2LvA= References: From: "Santosh Chokhani" To: "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This also leads to the conclusion made in the initial email on this thread that enhancing 2560 for newer hashing and signature algorithm is a matter of requiring mandatory or optional support for added algorithms. As it so happens, the algorithm identifiers for these are already registered through other RFCs. > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 > Sent: Tuesday, April 14, 2009 5:03 AM > To: Santosh Chokhani; Kelvin Yiu; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > This is also my opinion. >=20 > /Stefan >=20 >=20 > On 09-04-13 9:53 PM, "Santosh Chokhani"=20 > wrote: >=20 > >=20 > > It seems that leaving responderID as is is our best course=20 > of action. > > Since this field and its match is not security relevant, I=20 > do not see=20 > > this particular dependence on SHA-1 as problematic. > >=20 > >> -----Original Message----- > >> From: Kelvin Yiu [mailto:kelviny@exchange.microsoft.com] > >> Sent: Monday, April 13, 2009 2:50 PM > >> To: Santosh Chokhani; Stefan Santesson; IETF-pkix > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >> [Sorry for jumping on this thread so late] > >>=20 > >> Santosh, > >>=20 > >> The OCSP client in Windows Vista uses the responderID=20 > field to find=20 > >> the OCSP signer cert in the cert bag and expects the key=20 > hash to be=20 > >> SHA-1. Otherwise, the OCSP response will be rejected.=20 > Upgrading from=20 > >> SHA-1 will be problematic. > >>=20 > >> Kelvin Yiu > >> Lead Program Manager, Windows Security Microsoft > >>=20 > >>=20 > >> -----Original Message----- > >> From: owner-ietf-pkix@mail.imc.org > >> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > >> Sent: Wednesday, April 01, 2009 1:32 PM > >> To: Stefan Santesson; IETF-pkix > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >>=20 > >>=20 > >> Stefan, > >>=20 > >> See responses in-line. > >>=20 > >>> -----Original Message----- > >>> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >>> Sent: Wednesday, April 01, 2009 2:34 PM > >>> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>=20 > >>> Santosh, > >>>=20 > >>> If you are talking about adding other options to calculate > >> the KeyHash > >>> value in ResponderID then I strongly disagree. > >>>=20 > >>> If you add unspecified options you change the properties of > >> the field > >>> from deterministic to a completely unknown value. > >>> It does not matter if RFC2560 isn't explicit in its > >> description of the > >>> use of the field. The fact is that OCSP explicitly defines > >> this value > >>> and as such will allow a client to deterministically compare this=20 > >>> value with the certificate selected to validate the response=20 > >>> signature. > >>=20 > >> I hope no one is doing the matching of Responder ID with hash of a=20 > >> key in place of responder signature verification. That=20 > would be real=20 > >> bad. > >>=20 > >>> If you allow > >>> other ways to calculate the value but do not provide any means to=20 > >>> signal what method that was used, then this feature is lost. > >>=20 > >> The most common use will be to use this field to prioritize the=20 > >> certificates of the responder to use for sigature=20 > verification on the=20 > >> response. > >>=20 > >>>=20 > >>> In worst case we will cause current implementation to fail. > >>=20 > >> That is why I am asking what problems if any will the vendors have. > >>=20 > >>>=20 > >>> I really don't think its worth the effort to change this=20 > field. We=20 > >>> have a very large base of implementations that we really > >> don't want to > >>> mess up unless its absolutely necessary. > >>=20 > >> So, we agree that leaving this field hard wired to SHA-1 is ok and=20 > >> 2560 can easily accommodate new hash functions. Right? > >>=20 > >> My only reason to align with 5280 is that if some one were=20 > ever want=20 > >> to strip off SHA-1 altogether from their Responder or client,=20 > >> permitting other methods does it. > >>=20 > >>>=20 > >>> As the only property of this field is to provide a convenient=20 > >>> identifier, it is far from absolutely necessary to change it. > >>> Remember that there is a second choice to to identify=20 > responder by=20 > >>> name. For names we have accepted the possibility of=20 > collisions. In=20 > >>> that comparison, upgrading from SHA-1 is really redundant. > >>>=20 > >>> /Stefan > >>>=20 > >>>=20 > >>>=20 > >>>=20 > >>> On 4/1/09 4:05 PM, "Santosh Chokhani" > >> wrote: > >>>=20 > >>>>=20 > >>>> My resident ASN.1 expert apprised me of the fact that > >>> adding a choice > >>>> will break backward compatibility. Thus, extension is a > >>> fifth option > >>>> (probably third in the priority). > >>>>=20 > >>>> Based on what I know of OCSP implementations, not changing > >>> anything in > >>>> terms of bits on the wire and aligning the Key ID with SKID > >>> in 5280 is > >>>> the best approach. I do not think it will hurt backward > >>> compatibility. > >>>>=20 > >>>> OCSP Responder and OCSP client vendors should speak up if I > >>> am wrong. > >>>>=20 > >>>>> -----Original Message----- > >>>>> From: Santosh Chokhani > >>>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>>> To: 'Massimiliano Pala'; IETF-pkix > >>>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>> Max, > >>>>>=20 > >>>>> I do not see where and what extension we need to add for > >>> other digest > >>>>> algorithm. > >>>>>=20 > >>>>> For key id, we need to enhance or broaden the options. > >>>>>=20 > >>>>>> -----Original Message----- > >>>>>> From: owner-ietf-pkix@mail.imc.org=20 > >>>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >>> Massimiliano Pala > >>>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>>> To: IETF-pkix > >>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>=20 > >>>>>> Hi all, > >>>>>>=20 > >>>>>> as I said during last meeting - as the use of SHA-1 does > >>>>> not have any > >>>>>> security implication in the OCSP, another viable way > >> would be to > >>>>>> define an extension where other digest algorithms can be > >>>>> added to the > >>>>>> request/responses. > >>>>>>=20 > >>>>>> It is a simple addition and does not require any change in > >>>>> the RFC, it > >>>>>> can be done as a separate document for those who what to > >>> use other > >>>>>> digest algorithms. > >>>>>>=20 > >>>>>> After all, isn't this an example of why we allow > >>> extensions to the > >>>>>> messages ? > >>>>>>=20 > >>>>>> Later, > >>>>>> Max > >>>>>>=20 > >>>>>>=20 > >>>>>> Santosh Chokhani wrote: > >>>>>>> Tom, > >>>>>>>=20 > >>>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>>>=20 > >>>>>>> I would not add anything about matching this field with > >>>>>> anything since > >>>>>>> RFC 2560 does not say anything about it. > >>>>>>>=20 > >>>>>>> If one were to add something, one should describe how this > >>>>>> field can > >>>>>>> be used to select from multiple Responder certificates. > >>>>>>>=20 > >>>>>>>> -----Original Message----- > >>>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>>> To: Santosh Chokhani > >>>>>>>> Cc: IETF-pkix > >>>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>>>=20 > >>>>>>>> Santosh: > >>>>>>>>=20 > >>>>>>>> The RFC 5280 method just describes "two common > >>>>> methods for > >>>>>>>> generating key identifiers from the public key" > >>>>>>>> and says that other methods are acceptable. The comment > >>>>>> to KeyHash > >>>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>>> the same > >>>>>>>> field as SKID, and I would support either stating "if the > >>>>>> KeyHash is > >>>>>>>> not precisely 20 octets long, it should be matched > >> against the > >>>>>>>> Subject Key Identifier extension of the signing > >> certificate" or > >>>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>>> matches the value > >>>>>>>> of SKID. > >>>>>>>>=20 > >>>>>>>> Tom Gindin > >>>>>>>>=20 > >>>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>>> those of my > >>>>>>>> employer > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>> "Santosh Chokhani" Sent by: > >>>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>>> 03/26/2009 10:39 PM > >>>>>>>>=20 > >>>>>>>> To > >>>>>>>> "IETF-pkix" cc > >>>>>>>>=20 > >>>>>>>> Subject > >>>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>>> difficult to deal > >>>>>>>> with. > >>>>>>>>=20 > >>>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>>> optional. We can > >>>>>>>> update this to add SHA-2 series as optional. > >>>>>>>>=20 > >>>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>>> different than > >>>>>>>> key ID extensions in RFC 5280. Here are some options > >>> in order of > >>>>>>>> preference: > >>>>>>>>=20 > >>>>>>>> 1. Align the language with subject key ID language > >> in RFC 5280. > >>>>>>>>=20 > >>>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>>> relevant. RFC > >>>>>>>> 2560 does not even describe how to use this field. So, > >>>>>> having SHA-1 > >>>>>>>> and accidental or intentional collisions will not hurt the > >>>>>> security > >>>>>>>> of the protocol. > >>>>>>>>=20 > >>>>>>>> 3. If you do not believe in KISS principle, you can > >>>>>> define another > >>>>>>>> response type and enhance the key ID ASN.1 syntax so > >> that hash > >>>>>>>> algorithm is identified. > >>>>>>>>=20 > >>>>>>>> 4. Another option is for the Responder to use the > >> same hashing > >>>>>>>> algorithm as the one in the first certID entry. > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>> Santosh Chokhani > >>>>>>>> CygnaCom Solutions > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>=20 > >>>>>>=20 > >>>>>> -- > >>>>>>=20 > >>>>>> Best Regards, > >>>>>>=20 > >>>>>> Massimiliano Pala > >>>>>>=20 > >>>>>> --o----------------------------------------------------------- > >>>>>> ------------- > >>>>>> Massimiliano Pala [OpenCA Project Manager]=20 > >>>>>> Massimiliano.Pala@dartmouth.edu > >>>>>> =20 > >>>>>> project.manager@openca.org > >>>>>>=20 > >>>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>>> (603) 369-9332 > >>>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>>> (603) 646-9179 > >>>>>> --o----------------------------------------------------------- > >>>>>> ------------- > >>>>>>=20 > >>>>>> People who think they know everything are a great annoyance > >>>>> to those > >>>>>> of us who do. > >>>>>> -- > >>>>>> Isaac Asimov > >>>>>>=20 > >>>>>=20 > >>>>=20 > >>>=20 > >>>=20 > >>>=20 > >>=20 > >>=20 > >>=20 > >=20 >=20 >=20 >=20 From owner-ietf-pkix@mail.imc.org Tue Apr 14 11:43:17 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C55E63A6AC4 for ; Tue, 14 Apr 2009 11:43:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -104.266 X-Spam-Level: X-Spam-Status: No, score=-104.266 tagged_above=-999 required=5 tests=[AWL=2.333, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ydBbtbNzKrVN for ; Tue, 14 Apr 2009 11:43:17 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id B220B3A69AD for ; Tue, 14 Apr 2009 11:43:16 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3EIGEmq045849 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 14 Apr 2009 11:16:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3EIGEsp045848; Tue, 14 Apr 2009 11:16:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3EIGDkt045840 for ; Tue, 14 Apr 2009 11:16:13 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id 5F9BE3A6E5A; Tue, 14 Apr 2009 11:15:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-other-certs-03.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090414181501.5F9BE3A6E5A@core3.amsl.com> Date: Tue, 14 Apr 2009 11:15:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Other Certificates Extension Author(s) : S. Farrell Filename : draft-ietf-pkix-other-certs-03.txt Pages : 8 Date : 2009-04-14 Some applications that associate state information with public key certificates can benefit from a way to link together a set of certificates belonging to the same end entity that can safely be considered to be equivalent for the purposes of referencing that application state information. This memo defines a certificate extension that allows applications to establish the required linkage without introducing a new application protocol data unit. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-other-certs-03.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-other-certs-03.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-14111020.I-D@ietf.org> --NextPart-- From owner-ietf-pkix@mail.imc.org Tue Apr 14 15:08:05 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 194963A6AF6 for ; Tue, 14 Apr 2009 15:08:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.446 X-Spam-Level: X-Spam-Status: No, score=-1.446 tagged_above=-999 required=5 tests=[AWL=-1.153, BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, HELO_MISMATCH_COM=0.553, RDNS_DYNAMIC=0.1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hseDWRdBYLK8 for ; Tue, 14 Apr 2009 15:08:04 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D8EAC3A6ACE for ; Tue, 14 Apr 2009 15:08:03 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3ELfxO6058555 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 14 Apr 2009 14:41:59 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3ELfxTJ058554; Tue, 14 Apr 2009 14:41:59 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.newbay.com (87-198-172-198.ptr.magnet.ie [87.198.172.198]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3ELfl83058543 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 14 Apr 2009 14:41:58 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.newbay.com (Postfix) with ESMTP id C6CF21003F520 for ; Tue, 14 Apr 2009 22:41:45 +0100 (IST) X-Virus-Scanned: amavisd-new at newbay.com Received: from mail.newbay.com ([127.0.0.1]) by localhost (mail.newbay.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rLOj4SVxG6lB for ; Tue, 14 Apr 2009 22:41:43 +0100 (IST) Received: from mail01.newbay.com (mail01.newbay.com [192.168.12.25]) by mail.newbay.com (Postfix) with ESMTP id 17E501003F4D5 for ; Tue, 14 Apr 2009 22:41:42 +0100 (IST) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail01.newbay.com (Postfix) with ESMTP id D980C7C306 for ; Tue, 14 Apr 2009 22:41:42 +0100 (IST) X-Virus-Scanned: amavisd-new at newbay.com Received: from mail01.newbay.com ([127.0.0.1]) by localhost (mail01.newbay.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jq+SqqZLHaDa for ; Tue, 14 Apr 2009 22:41:39 +0100 (IST) Received: from [10.87.48.3] (dsl-102-234.cust.imagine.ie [87.232.102.234]) by mail01.newbay.com (Postfix) with ESMTP id E243B7C2C4 for ; Tue, 14 Apr 2009 22:41:38 +0100 (IST) Message-Id: <6223D26C-3746-4F42-B6B3-457C2E24FE01@cs.tcd.ie> From: Stephen Farrell To: "ietf-pkix@imc.org" In-Reply-To: <20090414181501.5F9BE3A6E5A@core3.amsl.com> Content-Type: text/plain; charset=us-ascii; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit X-Mailer: iPhone Mail (5H11) Mime-Version: 1.0 (iPhone Mail 5H11) Subject: Re: I-D Action:draft-ietf-pkix-other-certs-03.txt Date: Tue, 14 Apr 2009 22:29:03 +0100 References: <20090414181501.5F9BE3A6E5A@core3.amsl.com> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Think this addresses the one LC comment so its hopefully ready to go forward, S. On 14 Apr 2009, at 19:15, Internet-Drafts@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the Public-Key Infrastructure (X.509) > Working Group of the IETF. > > > Title : Other Certificates Extension > Author(s) : S. Farrell > Filename : draft-ietf-pkix-other-certs-03.txt > Pages : 8 > Date : 2009-04-14 > > Some applications that associate state information with public key > certificates can benefit from a way to link together a set of > certificates belonging to the same end entity that can safely be > considered to be equivalent for the purposes of referencing that > application state information. This memo defines a certificate > extension that allows applications to establish the required linkage > without introducing a new application protocol data unit. > > A URL for this Internet-Draft is: > http://www.ietf.org/internet-drafts/draft-ietf-pkix-other-certs-03.txt > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > Below is the data which will enable a MIME compliant mail reader > implementation to automatically retrieve the ASCII version of the > Internet-Draft. > Content-Type: text/plain Content-ID: <2009-04-14111020.I-D@ietf.org > > From muwadbibendumsif@adbibendum.be Fri Apr 17 09:11:18 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AFD683A692C for ; Fri, 17 Apr 2009 09:11:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -11.846 X-Spam-Level: X-Spam-Status: No, score=-11.846 tagged_above=-999 required=5 tests=[BAYES_99=3.5, HELO_EQ_DYNAMIC=1.144, HELO_EQ_IT=0.635, HOST_EQ_IT=1.245, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XMWrOQ7lUiw5 for ; Fri, 17 Apr 2009 09:11:13 -0700 (PDT) Received: from host160-100-dynamic.53-79-r.retail.telecomitalia.it (host160-100-dynamic.53-79-r.retail.telecomitalia.it [79.53.100.160]) by core3.amsl.com (Postfix) with SMTP id C1F313A6889 for ; Fri, 17 Apr 2009 09:11:11 -0700 (PDT) To: pkix-archive@lists.ietf.org Subject: 0rder #289479 From: pkix-archive@lists.ietf.org MIME-Version: 1.0 Importance: High Content-Type: text/html Message-Id: <20090417161111.C1F313A6889@core3.amsl.com> Date: Fri, 17 Apr 2009 09:11:11 -0700 (PDT)
Tell a friend · Download latest version See this email as a webpage

Hello!

Shipped Privately And Discreetly To Your Door!

See this email as a webpage
  We want to put a great big grin on your face in 2009. You'll be to rejoice all year.  

Unsubscribe · Lost Password · Account Settings · Help · Terms of Service · Privacy

Ottho Heldringstraat 2, 08333 AZ Amsterdam, The Netherlands

From owner-ietf-pkix@mail.imc.org Mon Apr 20 14:15:21 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DF0B628C2BB for ; Mon, 20 Apr 2009 14:15:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -104.341 X-Spam-Level: X-Spam-Status: No, score=-104.341 tagged_above=-999 required=5 tests=[AWL=2.258, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N1IsAysp9m2K for ; Mon, 20 Apr 2009 14:15:21 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A3D8028C2B6 for ; Mon, 20 Apr 2009 14:15:18 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3KKkIxR084742 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 20 Apr 2009 13:46:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3KKkIRc084740; Mon, 20 Apr 2009 13:46:18 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3KKkIxB084727 for ; Mon, 20 Apr 2009 13:46:18 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id A30CD3A6AB4; Mon, 20 Apr 2009 13:45:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-tamp-02.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090420204501.A30CD3A6AB4@core3.amsl.com> Date: Mon, 20 Apr 2009 13:45:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Trust Anchor Management Protocol (TAMP) Author(s) : R. Housley, et al. Filename : draft-ietf-pkix-tamp-02.txt Pages : 84 Date : 2009-04-20 This document describes a transport independent protocol for the management of trust anchors and community identifiers stored in a trust anchor store. The protocol makes use of the Cryptographic Message Syntax (CMS), and a digital signature is used to provide integrity protection and data origin authentication. The protocol can be used to manage trust anchor stores containing trust anchors represented as Certificate, TBSCertificate or TrustAnchorInfo objects. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-tamp-02.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-tamp-02.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-20133811.I-D@ietf.org> --NextPart-- From owner-ietf-pkix@mail.imc.org Mon Apr 20 14:17:14 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4A50E28C30A for ; Mon, 20 Apr 2009 14:17:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -104.349 X-Spam-Level: X-Spam-Status: No, score=-104.349 tagged_above=-999 required=5 tests=[AWL=2.250, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A9+jTVp4rxAa for ; Mon, 20 Apr 2009 14:17:13 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id B447D3A6E4C for ; Mon, 20 Apr 2009 14:16:06 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3KKkJKp084743 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 20 Apr 2009 13:46:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3KKkIvW084741; Mon, 20 Apr 2009 13:46:18 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3KKkIkq084728 for ; Mon, 20 Apr 2009 13:46:18 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id 9E2A23A6A9A; Mon, 20 Apr 2009 13:45:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-ta-format-02.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090420204501.9E2A23A6A9A@core3.amsl.com> Date: Mon, 20 Apr 2009 13:45:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Trust Anchor Format Author(s) : R. Housley, et al. Filename : draft-ietf-pkix-ta-format-02.txt Pages : 17 Date : 2009-04-20 This document describes a structure for representing trust anchor information. A trust anchor is an authoritative entity represented by a public key and associated data. The public key is used to verify digital signatures and the associated data is used to constrain the types of information or actions for which the trust anchor is authoritative. The structures defined in this document are intended to satisfy the format-related requirements defined in Trust Anchor Management Requirements. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-ta-format-02.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-ta-format-02.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-20133758.I-D@ietf.org> --NextPart-- From k.boonstra@agisweb.nl Tue Apr 21 23:45:10 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9917A3A6A0B for ; Tue, 21 Apr 2009 23:45:10 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -19.25 X-Spam-Level: X-Spam-Status: No, score=-19.25 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_IMAGE_ONLY_32=1.778, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SARE_FROM_DRUGS=1.666, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DMlrWm35gsdo for ; Tue, 21 Apr 2009 23:45:09 -0700 (PDT) Received: from aig.com (unknown [189.58.130.216]) by core3.amsl.com (Postfix) with SMTP id C39EC3A67FF for ; Tue, 21 Apr 2009 23:45:07 -0700 (PDT) To: " Date: Tue, 21 Apr 2009 23:45:07 -0700 (PDT)
Men's Health wirzpBuild Maximum MUSCLE, STRENGTH, and POWER!
Try It FREE for 21 Days! ORDER NOW! Plus, get 2 FREE Bonus Gifts!
Dear pkix-archive

Men's Health recommends



FREE gifts reserved for you: pkix-archive@lists.ietf.org
If you would prefer not to receive future information about special offers from Men's Health,
you may Unsubscribe.


Customer Service Department, 33 East Minor Street, Emmaus, PA 18098


Copyright, Men's Health
From pabstxanew@alid.co.uk Wed Apr 22 21:59:26 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 42AF73A6992 for ; Wed, 22 Apr 2009 21:59:26 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.509 X-Spam-Level: X-Spam-Status: No, score=-10.509 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_RELAY_NODNS=1.451, HELO_EQ_AU=0.377, HTML_IMAGE_ONLY_32=1.778, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SARE_FROM_DRUGS=1.666, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jN7BYnQqgiJc for ; Wed, 22 Apr 2009 21:59:25 -0700 (PDT) Received: from abbots.com.au (unknown [190.49.165.156]) by core3.amsl.com (Postfix) with SMTP id 1AB0F3A68CD for ; Wed, 22 Apr 2009 21:59:23 -0700 (PDT) To: " Date: Wed, 22 Apr 2009 21:59:23 -0700 (PDT)
Men's Health wirzpBuild Maximum MUSCLE, STRENGTH, and POWER!
Try It FREE for 21 Days! ORDER NOW! Plus, get 2 FREE Bonus Gifts!
Dear pkix-archive

Men's Health recommends



FREE gifts reserved for you: pkix-archive@lists.ietf.org
If you would prefer not to receive future information about special offers from Men's Health,
you may Unsubscribe.


Customer Service Department, 33 East Minor Street, Emmaus, PA 18098


Copyright, Men's Health
From beatificationskqwu161@justinbatts.com Thu Apr 23 11:09:16 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A884F3A72E1; Thu, 23 Apr 2009 11:09:16 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 4.85 X-Spam-Level: **** X-Spam-Status: No, score=4.85 tagged_above=-999 required=5 tests=[BAYES_99=3.5, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mrAHvaHNXkzA; Thu, 23 Apr 2009 11:09:15 -0700 (PDT) Received: from r10jd113.net.upc.cz (r10jd113.net.upc.cz [78.45.7.113]) by core3.amsl.com (Postfix) with ESMTP id 9796028C119; Thu, 23 Apr 2009 11:09:14 -0700 (PDT) Received: from 78.45.7.113 by eforwardct.name-services.com; Thu, 23 Apr 2009 20:09:56 +0100 Message-ID: <000d01c9c43e$b51f17a0$6400a8c0@beatificationskqwu161> From: "Amado Witt" To: Subject: Get 'em to Gawk Date: Thu, 23 Apr 2009 20:09:56 +0100 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_0075_01C9C43E.B51F17A0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6001.18000 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6001.18049 This is a multi-part message in MIME format. ------=_NextPart_000_0075_01C9C43E.B51F17A0 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0076_01C9C43E.B51F17A0" ------=_NextPart_001_0076_01C9C43E.B51F17A0 Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable me 1982 i spent a few years calming down my teen angst and attempting to grow up i = loved san luis obispo i was ready to chill there for good=20 i am determined what im listening to this morningagain grant and i talked last fall about wanting to take control and own a home a= nd make some of our dreams a reality so we planned to move back to californ= ia for some opportunities there=20 what a few hours on a sunny day can do for you from brora i think they are so cute i love her litte handwriting and she is beyond exc= ited to pass them out some other projects she and i looked at but didnt get= around to (of course) from martha (of course) Quilt kits finally all done i never thought life would then take me to utah to attend byu and then off = to serve as a missionary for a year and a half but it did and it was hardes= t most surprising most rewarding experience of my life just a phone call one night she had an aneurysm and although this was a sur= prise of the worst kind it was the most spiritual time of my life much good= and understanding has come through that loss but i couldnt stop looking at the picture because it shows the place where = i played for the first 12 years of my life=20 but we feel more blessed and amazed than ever at lifes unexpected twists an= d turns and how happy we are that there is a loving heavenly father that un= derstands the little picture we have in our minds for our lives and gently = and lovingly helps us change our vision to a masterpiece i really love life= =20 ok its hard to stop i love every song i am given glimpses of the why and the good and the reasons and the plan th= e bigger picture and the necessity for some to not fit the mold feeling so inspired say hi to gilbert and the kids with love km one thing i enjoy about facebook is the old pictures that friends and fam u= pload to walk down memory lane together with you=20 dinner i kind of snack or have a lunch type meal again dinner is tricky bec= ause i still need to prepare dinner for my family so i do but im not super = hungry at night so i just eat whatever broccoli a little of what theyre hav= ing or snacky stuff or chicken wings or crispy thin crust pizza but i alway= s end the day with a low carb ice cream bar cate what did you play on the computer then ------=_NextPart_001_0076_01C9C43E.B51F17A0 Content-Type: text/html; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable
3D""
me 1982
i spent a few years calming down my teen angst and = attempting to grow up i loved san luis obispo i was ready to chill there fo= r good
i am determined
what im listening to this morningagain
grant and i talked last fall about wanting to take = control and own a home and make some of our dreams a reality so we planned = to move back to california for some opportunities there
what a few hours on a sunny day can do for you
<= /FONT>
from brora
i think they are so cute i love her litte handwriti= ng and she is beyond excited to pass them out some other projects she and i= looked at but didnt get around to (of course) from martha (of course)
<= /FONT>
Quilt kits finally all done
i never thought life would then take me to utah to = attend byu and then off to serve as a missionary for a year and a half but = it did and it was hardest most surprising most rewarding experience of my l= ife
just a phone call one night she had an aneurysm and= although this was a surprise of the worst kind it was the most spiritual t= ime of my life much good and understanding has come through that loss
but i couldnt stop looking at the picture because i= t shows the place where i played for the first 12 years of my life
but we feel more blessed and amazed than ever at li= fes unexpected twists and turns and how happy we are that there is a loving= heavenly father that understands the little picture we have in our minds f= or our lives and gently and lovingly helps us change our vision to a master= piece i really love life
ok its hard to stop i love every song
i am given glimpses of the why and the good and the= reasons and the plan the bigger picture and the necessity for some to not = fit the mold
feeling so inspired
say hi to gilbert and the kids with love km
one thing i enjoy about facebook is the old picture= s that friends and fam upload to walk down memory lane together with you
dinner i kind of snack or have a lunch type meal ag= ain dinner is tricky because i still need to prepare dinner for my family s= o i do but im not super hungry at night so i just eat whatever broccoli a l= ittle of what theyre having or snacky stuff or chicken wings or crispy thin= crust pizza but i always end the day with a low carb ice cream bar
cate what did you play on the computer then
------=_NextPart_001_0076_01C9C43E.B51F17A0-- ------=_NextPart_000_0075_01C9C43E.B51F17A0 Content-Type: image/png; name="DSL8003.png" Content-Transfer-Encoding: base64 Content-ID: iVBORw0KGgoAAAANSUhEUgAAAZAAAADwCAMAAAAZ4sIQAAAABGdBTUEAAK/INwWK6QAAABl0RVh0 U29mdHdhcmUAQWRvYmUgSW1hZ2VSZWFkeXHJZTwAAABgUExURe7w8A5arFGs1eENDZrW6ppqD+2w DjqYyvDHa/PSivLHFuu4TiGHu9rq8OevNdaLFuicC22/38ZyEteXIeClLv3x1Hp+goTD4OOlGOGZ K7jj8cqAG/rksMMomim3Uf///8wIjrsAAB5qSURBVHja7J2HgqowEEUBXUFBLOAqqOT///KlM2kU DZZ9RHdFEMsc75SoQ4Dm8VEjmE3wTUCCLR41+bedyb0dSEBQBGJs+7D8ktH5WD2b59ENRMFBBuJU Are1Z5NPBoTi2OqDKCWwMxFAyCW7+AW6oVfZAvwP7yAMxUVIB7sSyq1sXdhuVLbbhrILuLlxp0i5 U7SgQ1wu5Bq6iJSNfAW7UB9d3YEsOxf6gQR1TQxvEmFUbDoxgPz+itXiKt8KVtqBtCYL5cpQwkKW 7fI+VByOuwM7wRVitbRva+jWZgIQIGAFIkGCDa4FZc/AIQ8TR03ONTnXfE2PQpBuewDEEm8sQHQA zut2IK6704HAR5bmkUDAkmpCbbMOBBk0HwZSK+6q3rYkGI6aLpENDwOx+U1gnB4LDgEShnZv6Aai W8sGBNquCwjc4Vkg2F0FCo66riUGOAik4BkgksvbgUDX13r1zwCyraGXApKwj62R9v6KeIHUoI60 oP7bC0SuAGYzfIwWocM2Xji9l4UvZLJog3rrdWQU1o0uYXQA6Qjqhq8L3DwsIJb1Eg66Lni+9giQ 9oZ3WFDJwGz+plMhbiACipoiKVmWUyFDgHQoRE+ydCAtDxk2BAsBQb3EjILpgMjEFdl8jvrGHgBE uzu7Y7NYshuIoqcHXFaXQgQPFYUqC3M8PatiBwKWrVmWmhz1ZlnWuDMky7IEeiP31byZryzL5GHC OIsTPeMFPHxVp1ZnxGs7k1gvkHAUEKMMcQBZDAQyvA5Rdg10HnWLQ6FB7G8fy3MdeAUSgvit+hvT e+mexl2p6zMBICDZC3UVg6NSh0DUiAB2sIcOABEQCXR9CByAhpuFGPX8GYD/uaztkuDgPCwsDuRE Bvt/ENfphmAG4htIUNdSHlwdUBkH54jIv3oG4htILWty4awECRNGFEWMBFnAJ7w0A/EMpHVWEIcF BgEQxzEHQf6RcQhmIAj9/HgDggMIrP/sborbngKJ+TUxtj6BsBf2Q4b9ReN/g168ekf2OxxxB8ZG urrdZDytBx45EA6rGwdVAsaQUW3EeDkCROIoFkCa54HIF2F9zzlW262p3NHAPX9GPRN4c+M2P2jU IwNbbJcglKs0IumVqKNiQA7kUsKwA2kaDY5c0fDRrRD4KsAbUTOvfP/RNe06yx2pd8j2ALtbgAx4 Jgg+E/4gqhrAI3c8qmqLrQtHxCI3UQYVxoGqg8qDE4nJAj5vgaknBdK+amo77eWKdf1A5J/+9h0J RHsm4tk5gDgfVbUFpAHT2YidYuqisDoImogCIoPjYMsBsLRGph9VLxAE3k3ghZkvV/Mco4H86HLp eCbapQJEfS1jgQSMx1kBwgwv/rOQzjFETCYxA8SACEM3zGv5BmJGTu4bDCCKQf0rxLKgPBPdZRnP YAgQUx4sm2L2J8LAK7L4IF0VJQQFEp8BkIEx5FGFSB+svza5w6RAdIX8qM9EvCu0LG0UkEDBEXEt RLzeYHpgbIRgWJCPIskjrqWhhwd19FgMsQL5eQ7Is0FdAfJj82Y2IK6gXqu+iggDJlGEywFE84jL A+iDeSzN0m4g4qYdaW/rBjqAtIXAj9Vl6XdkuUMFpr3QcD8TUIfYXdaPdgdDHhXbAqgjziQEmudy DxXzsEHX6t6KVCdLZBLpBoK6sqzXF8k+amw/jxqggOMQCZUIFQfuq8iVjEUTXqzH4iRHoAbvFwN5 oAL3uLvnRw3QlkxY8epPxmyuClZj8NlECSOK2vSKlCjZGdgZ9QJpplDIH5pc3EaHdo5Q1hwiZBxA 1gtmSqA8sihoq3QTiBFUZKEyA7ECqQ9gWorav02t2KcdkTpLAoFk5KRFkAYsNoKDuqIny/rPgcBp QpDrxlGkzeiySUUtnmOHFZjVXxcQpJchMxANiDB1DKLEITpEBwsL6K0yphBl5t3DbO+7R/NuIIof 4tEjkvIQWy3yoP4qW6KvBNI0PUAUtZv1U9M0zTRAAlFViPBxAChUhSi5LtMHzLA+A0gzzFSu27R+ FdzQvKKs9QsEHQQODkVMHppxXOVBT1Hg50m84q0/5GZ0Oq5pVATy1vKKstY3kG2sjEg/gQuIg5y1 APJJQGRKobmghifm3KptTt4qQMlP3gAEnVUescLBLMspEIrDE48pgAhjNlr1A2l0A1H80muBBJpC hH8CkSU2kl2KpEafCKQRFjNcj7rBFgfaZN0IGSanqYDgRMs1InMV91YESR2gz1eIG4g9U2p0CShl rPszUZ9AMJHMwSLSqWQyfmRLv0/iU4FYUy00pcuSGsn4X8dgPOiog28HAizaBonGkteabquHB/g6 u/XHPv222EZZH5EM0sh+a+/viomyLISMFU4g6scHjVYgatVihz6O7U8NjgukLdjwyd8mtF+2Pmcy Qtig8DowY1DC2Gc3mndNnVhN6sUNjVPI4sjPqi3qKFOjBF0Sa+g5EwqJthP4zT8ChPwS574Qv94V iwgvKL+qWsgeEHaFkOUlLDOkiwJxnOMIz35N+Kdme8WPr8h7ngM4Sh0Iyy+OEMLizs+GLYJllCm1 RtYGDXaNyqT2/Br+FBAaKlgMoYuLY/u7tSM5L0SAYYsdCqHX67MMIcxJCSZCO+HvFs1ABijkLhbv 3DHd+Wq2zP/12yLYLiMjnsukOIyW/l/D3/qASoshR9BW6L6QPQn4LXsVwpPg5Zlh4HPwYu4ki89T GG/+xLDfFkGwPZ/jX6iT34lwyCcR/Ndj0JszqJfnc/QbkfPTP36eFeLFFsEnPIkZyH/4JGYgM5AZ yAxkBjID+dtAgtPttubjdjsFnwDkK/sj+7DFep3mZZ7nKR5JkpCLPE3WE2AJxuFAX9gf+VlbnG4J JpEkazluaywWLBcCJlmf3ggEoS/sj/yULU7rkkjBHITIiTgxLJX1LXgHkG/tj/y4LYK0zG0wyEgE FkwFK8WbTrYTAfmg/siPAsGeKl2vnTzoKWEB/oR1ktzeD+Q7+iM/BuSWusSR8DPhwQZVSuIHyURA BBQ1RXpPf+RHgKzTssNXMR6EBOVBAj7OuIhKTu8G8g39kR8Akl7c6hC+qhUIY4LdW1KmQCTN1EC+ tT/yeCDr3KUMiWKtsEgTXqDk5ckCRP8emfb92CeAfGV/5LFAgiQHeVQiQngbyLXBK0XKJC3TU2tp e2cNyw90HwTypf2RxwJpeSTgZEqDwsAcGImUVe95sYZWR/buTOD3uDou719j+fq5LOqvEtfJlEcL BOPI85I6rY52We0XYuHiDMQF5FYyGSgEDGVwTyWiR8ujqso16myXNQMZByRJ1BzKxoIrQ/FWKZNH VRUJ6myXNQMZBQQ7LDsBNcXdFTyxAjQIj7IqdqkaQ5C9O1bT/uhvYiBDG/t+3oOSjnJlD40krQgL +i9J2Xw854FxFEVxZUA62mVZWp08C8Tdo9jei3J8M2WtUdkQGl6ArPOkh0daXHn0SDGCa8FjBwVC eAggHe2ymtZdgcUngGjd83rerCNaGmu9HdHw7ma+gJRpG6+Fe9ICR14IVRR5kgNvRXjsrtfrWhaG znZZyqqn017FWLBRq9KO8pGWxrKToNY5UXRTlPugQQ86HsiplFGCnxJR9fEEN0lLDKQsrqTkqEog D6aP67W4od52Wb6BgMbrbbtqtX3uQy2Nf+SFDkTvuznoQccDScoWhUSQlNeyvYph5FQdZAkPqA+M 43jNHdW43p3JCP3PKcTSatSwjbpLH5C2baURQ2DTU3vrcy9hJEApmJgSKVSelEVJr5EogRVS5WmC AdDteVEyHCVzV8djcdNmTuxA9DAzOZCHWhr/qGSQ1nxX+LqfQQ/6CJAyVQe287Vg9QbGkpbXCjOo qDhKGkPKkgmkEjyu7Qz89LO9o4A80tL4xx6nzEdC/Q/6OBBZW9DcNidxgofwFGMgohBAsMNKWfEh eByts72fAOShlsb9QMSj9j7oQ0BOFay9y0JcFnipqAgiqhDMIidEWAHC5LEjQH6Ou5d+HtJRWIBA 76OlsQ2ILcv68ZtlBXvorgrpwAgHHCzYPyyMsmwnSy4XyoOE8+Nxl7zyE8MhqfBLd/U9IcCA5LTU 40DYd+OKgidXFWFB86qU51aX4iL91c81PX05kOcaKXsHghgQeiLztmRqhJyIuypx1VFiBjmXxuWC xYH/FUwfNIDkHr4LNE8uQiAVh0EkUFYVzaDwHwve+DrOt8i6Cz6XxFkRdyXj+bF88bdO/j6QE0ti CYSSACBL2FXhPxnCiTQwEMaDZlc0fpBRePli1gwEAklZXcFnQ4qKxok8zeUECWZRUl+F/7PowdwV TrDKNZqB+HZZtwuvuykYOjVSkq+9sxB+KVecBXZWRcHk4VcfHwSk+QQgJ+KlxKDfIaEkSHKL3RQd JT0XBo81+log9mZXHwEEYWvjQo+fc1qHV1QSJWchYYhikOLwE8+9A3mij3KjtjBFjl719v71HoGk FAUflA3PbgkoyoXDgDh+rv54eAby6M1kez/YsdfWe27KpqQEyAlHcjqw0fEfDRVlhcM3Dhv4f9Xi uF6lPK6pPx5TABnRR1lv2YugvQ0gDZocCEqqQg6GpSoYn0L4KomD8vg57hKfv6HyD2RMH+VRQBr0 AiAnav9dYR27HY/jUh0/R1/p7nQx5JE+yk1j4NM6X4pvAU4NBKXVjtudSAHAoOtUHJjHNb+hDwZi 2N8BxPzSt9ZZvFHhtquaqYGgVFieDYBCwKATu5gGlkeRnNB/AQRZg/orFIJOaYVtjo0PqFxbGNJX 4dPOtzzeB8RotN+oTfeR/XghQ4A83Uj5xr49Yh8icuDztVxP0Dxg0iwLIWOFFYjWJLkxWynrR5nr EIhoScoWtQUbPqPF361k3x+xwhDyuFbr0wQqfdfUiWFRfy5onEKOvF8pBIKJVJzIkZ8hChI7rvk0 OP4akEXbkhQskiak4xopn5KqgpKAg4gjnQrHH5vtFb/SAt15F0IH0vLHBYRwX/AzUn8WneCSUPVS TB3H4y6fjsafA3KUMYQtitjBu12T9smc2pFvc7aJDdaFoZLrtcjXt9Okr+FPKkT0fOeeCvEVUhOO oGJ0ciATWyLjIp+MJOvT5K/hb31ApceQI2hEdB/dSDk4nUjDH/K9hmS9Pp1e0lts/sTQqZD3jBnI ZwKZO1vPCpkVMgOZgcxAZiAzkP8GSFDXh8NheViSsd0GM5A3AgnqJWaxrOttveVjea63wQzkLUAw DcyiHYRHQCnV2xnIy4FgR6XgaLHQA7ltZyAvBbI9HLCfgmNZ4xhC/jAmXFRut9uPAKK3k2NX9B7w artYpckcvDS7usubTdvuvQ9IsIw0FpREO7BQsOfyGEw8ADE6wYOO8GrzRQcQ0E0RaR/BTt3uvQdI HS0ZB/q31Imcl+czgbKtz+dPBKIDcF43gMBV5mfibwPCeMg/dRAafBAP5iu8P343ZvtRV+PxHiBO y76gu3gnkPNBomBho7bREEwOfg5yPwNxAsHRXITv2qWN8/nABlmKzp8FRG08DjrJ2sLNYmF2f+8G Mkm7dzeQ4HA2IrjB40BOAsnh4OPYuE94PqVzL7J0glcyMAOIR4X4SbJUIPGh7mQhQeARkVOEL+Pz ZwHROsEbCgF0fLss3wo5H2xBfNkqQ0gjEjgiMuIY3EfzXiBg2ZplWfvBf2iWFUQHQxhL4KeANgAN MrKlCcTSStnd9/qZZM3qjHg5aBLrAuKhDvFApAWCowHFYGRTB9NTQRxRHGVbHYPRerSzLakHIEYn eKVSt7s3V6WOjINUTNvu3Q5kGSsOyhLBNV0IHOQ462fF6gj84kV9NPCNdF9A/uxcVnzQywyLNA4G DYIjjplEYPN3ZAPCYaEZSD+QZaTy4EmtoKHCiLMsJq6K0SBAlgCIDsB+fQbSCSSIXMogNKLDAUQM zIMSkTjwtbP0WEoYRw4ezXy4ih4g54M7gKvSICSyQ5TFclA8WgxBtt8YqUDe34z/LQ3ihwE5RxZh aDiIlyIYMgwEL2WRpJGFHAgyUyunA5vYZbUdEkc0iB+w24uAxHqlIUkcWnHENKUiUKhKhLciI4yR 7b1vO0LCS4AIg0Id9DeIbztcoqGN4icCsozOZ31ORKCIW2cVUW3gPyKPTOoD8wjPbWHYtC0RbMcQ eVGW9fOjm31Qg3gnkI5m8f6BBKYyBA0WNOgC10UUMxqZUEdGqq9aWLpRmrOAw001+i+U3wakq1d7 BxBn52X/QEgWJeqMtvaLeQyn0YKcM/rHgNANXB6YSBbAatxYtET0qYO60tF6eIP4jwCyjc0inNqa xIvDgYVvEtV56BARROIIw4MxgaX0gTdLkMnTXvNwFo81iH8HkHMseDCfRfSQqaE7piU5lQjZEktm zGGF27fN9vYAcbRtd/Zq/wQgQQxSKaYE4pYoHOabZD3OJkoMfYQZ+lAglsPwdPdqHwpkyqB+iBVP FUW80oh56G5VklEkkYzmggcQyIcAUY4q8TO0QTzSb67sNqBZvB8gMZwtzHjNxzTAg3jGydAwkmU6 jjB69km8slL3ZMnpgASZnKRq/RW94AkuDSh0eiQGNBwC+S+ATFrAB9uMz6IzIsxfxTyAM5nIAA5h tOOtn6n/vcnFbRaDiVvmlSKaTYEZ3UwnErZMsmAG4hlIFCvJbcZCN5u7ik1xEFcFFFKjGYhvhagj 49lUZIMhxCGJROhvA4HfdHzN5GIWK59t8M9kwVyVRRxAIKcvAwK+BN9vaEbjxUBYBsXsTXMphzIY DaoQENGX6OOBhKqJQxXM5ylkq9s9dtMIM0Ud2GGdvgtIiFQgxNxMLUheCAohVEj4Kio4RYqyzhFy RyVOcGR+frTzMiDql7QEg9b0CP7YR9IQ214FZMt9kYNFptGASN7++5ABHgd+09qIIfC72fo3G3Ug L1MIkYiwuCATgoABcagCWSL0VQqBdJQv/HI46kZVHi90WQgtRSKb8bMkIK+FoYEj/EVfBkTNsqDl tTBvAkGvEgkLAts4E9YXf1rQ0KMHCejbvwREuC+Hy3oxEBREcH5Ki9wmC/opob9ejO+pQ7TQrmZZ 4RuzLDZqfc4wtHPwWaF/bKX+0srDAQQFyzj77YYARn2agUwMBC+f6UzWACi/fk04Ty7agWDLnOPf AUjOnp/EDMQFhORbcfQb/3ZBif9+N6APcVlsnOmnIk4kv0v/T2L7Eht3JEqhtvXVM4qdQHgsiYlO fnUmUT3Fk5gOSDjsTW/v/fAxQIiJlvwDEogkO3/d8UMs/TUcs7tyTkuvP+A6pSXBS4Eg2jvuzL7B SMa53k7XlP+VQByzu8BRaXNY7UX4XiB8exBsg6lbl04ERJ3p7Z3d7QWC0AcAecl4qctyzu6Ctijt fEmo/QQ+nHoO5f8EokduS9MHJXgY014zEO9ArLO7YBNdyvSb81XvAnI63ZJNskk3SXL69mNQDZrd VbMs9eamrl4L5HRKNhjEjY11kpArXwzkW2p4B5DTOt2sbydl3NabiZDMQHqA3LA2bhgHkQYfN0qH eLD/G8g7KnXsqxLmpjZgJBsGZb25zUBeCuS2SdZYGAoNAYWC2qxPM5CXASHyIBHcNTAsfJPbDORF QEj0SDp4MCTrzfpvAmk+Dcia2LsTB0OS+CXyBiD2g6F/GpD1akXVsaLnjrFeew0kfg9w33nk+S4g ShsKyyXcc+DDPAfktNowHKtNr0iSNPlUII/ejPbDE03x4GUDbt+ANoWTEAFAAgwi5TgGIPHotSYA IjugIrWfWtN2xxFNcuQe0GW1AFQg9qVpgGAa6QrzGKIQPFJ/uZZ/IMKIoPcK0mlMCcRsxDy0g2wL JFmtJI4hTNLN5vSRQBpgRL0nFLwEMNo9Gz1QICeQLoEc206+xwXSFmz4zMN331oegwRCkXyBQtxA zDadjbJ7qxutTd4AhzVOIeSQ6/QMgVCBrIBKuge+Qb7x5bQ+DUhjdV16kHLDWKD7QvYvv4v3/l1t Wr5QGpsbCrmtVoDIkLBOPVvwzUBUOYgkq12hmx/evIsHN/FRLLK3Pl/Bz0cIYXHnZwAE4hgY1skt 1x8KBCRVCBkrrECQ1g1PXaG5L6MpnhI+RAyhi4tj2xb+SM4LEWDYol0hUCBDwwi93TdPnRgG9ZLG SoXcxeKdO6Y7X82W+T9HlpWqCnmxRP4UED2GyISLrUbgYArgqAuaQk6rBxRCgWx8vKJ5tldXSHpZ jUbCypXVyQbE8LBGe8y593snkBUGclG8Vm+edbnQ9Bj6LFuTWKRAaDqBBP/1gEBOmMZFVciqTyGX 8kKgrVLd6sjSKtnVMHZWiF0hN81juX3WapWXdMMqT/bspoCH83AucMUMpB8Itu3FxsQc+SZJLhTI Jb8UVEo3FYjiwYxpJlt8mYEYQPLVam/gUHlgl5ZTT7W5sMt8k+Y5ueVNrbxcQPSgPgPpAIJx7FcX C5IWSprTD68wiJwCyfOE6GUFonrnwUOM41jMWVYHkMv+clmZPoultquS8Eg2ueCSXxinVUpryARZ iVhmFpy0ZiAqkBMGwqKIDoWa/sLTKkYBE0kJC1aFrGCaBWVgm+mZgQwFsscKwUik36L/ixWpNbAo uCDyFf9YShbp9KaXXCkMG/jRDrJkWc0MZAgQIpE9kwh2XjtCpNzl+YV+7sG0wWIHnDZh7HJg9AY1 Wg1iFCbm4Vw8AxHd1wZvuIuBhm4Zv8dol4WB0CiC/VZxLcoS1xt5gWWDw/aGxoyVnC+RLHQgZjHe NMh2fJcpsyzYEG/Ihrs6kGvTM3uMD+pUIZQJQVIQFtgj5UVBp0eINFa0BlnJKSzBBAsrNeerDCDG XNZEhaHWorB/w/3utK9jy/g9HsqyiMsqriSWrPLrrihotGaui1KQHyPKCXoBZJ98zmyv0TSyd8Pd aV/XlvF7PACk3BONEPuT065IU1q456zyUxmo/grvt/5gIFnfBqcR76OB3D0CSSiQcrfDHParalfs qDbyzapjXEgWgPe7fQwQaGzF8M4NTiv2Xxm+xwNA1ntKhADBQil3RZnn+5VlfkuyIBsvdK/Cw5ez /AIxrzg3IMs7HF5RNz24xwNAcN5bEJ91vV4xE+KpZJFoqeApDZKU0Vzggl4JJBzKA5miQFYgRkzu BTJ2j8eAsCBSlfmKTqNcWDhhMyqXFWRDSkjirvZMIYk3INpP8sPngICrzg3WGmKEeScDgoPIjgDB lSBLf7nNWZkoT3R6hYhDykMLIc8q5OOA3EcDufsBctvvuUj2LFKveGWyYgXjBTARm/hAXoHw5gqh 6IYvFoWAQrl5KiC2ittl3fF7DAWCiELAoLONhMaKTqnsqTb2VDT7i/RWvjyWASQEYpAU+BZ+JfQN xJnEOq07fo8RQJLdDiKhSrnQnEuc9zyrUnD48VgmkNACBLZXskrkYSDW0qGzphi/x1ggOKzv9nvp iS7c7hflxLZCHDs/P6MyXBbv/AaBhKpC+mcVDSDZACDOWS7kAjJwj7FAUK4oRJqeBXkOgS+0RHZ+ BGIBgpxA4I26iAyqEk1nM8y+4/cYDYRIRI0jkoLUirKe3H53Qf6AgA49IWzFo7os7tLCYTMnGhDH zOP4qcKpJxdptc6jSGWBYrtCAZ6QV4X4n8vSVNEPZNjM1NRzWcJpaRLpHOTWvn6I+2Yg3RMhbvuO 32MUkNN+FBF84xx9GBBoeOsElrnBUefZ3/se9hgBBN12Q4kUGMdxV50+DoiZW/VvsJnX8UmHhz3G AKHFyG6oPI57fx1o+oGET5AZusFtXjQaiLmH7CKotBMEjU8tQDCR4xAkBMdx/9JODqMntj4MiDi+ l1hq0WTyvwUIqna7ay8RymPns/vMBECG8bCmTp3mHb8HnMkmiqBUeLvT9kBsYWYFQjRyrHZ7ZWqr AoXgFPpQpt+VTqGiFAzlUaBCpBz50Vm2D/wukCsQOzLah/ZgTzfTyIQASwg/e9B/15zsj8frrmrt L5Z2/KKqsF/L/faU2yJbqS5mtUJ9lgveVgFi5FR9G+6jP5C9P/QRbhsiMgiEocjCdr2lxd+pIg6p wqMFIZbI2uqKeXhuvywVYgIBaMJ2ggspV5x1SO+GXvMaW8bvoQLhWhHhpF8hmEiORXK8VlVZlSX2 VwV3XGWZVinGcaySSXouhlaFKEtwChj1A+nfcB/9HZL7Q986kRHC4rIyoBNkbxN7IpGEIKnSNM3p iY6qwqurfKKupAOAhBYgoRPIgA0dNhz9tSzHHooAwtZZZYMVQie2qEqOVwKl4jCuV+LK0ilaKdtc FgjZoRnC2+7fLiBO6XTMz94HTN2O3UMGCnGsSn6EZ00bWTcQUrenRCbKqKbqNe5/Lmvohu6Zp95P QwbsIXwRy29lSaKLJ+wFQrq/r9MdyXLJqNL1abIjKcw/R7BPndhvcFtPemSEGchIIK8YM5AZyMeO fwIMAJx85ddImlCTAAAAAElFTkSuQmCC ------=_NextPart_000_0075_01C9C43E.B51F17A0-- From owner-ietf-pkix@mail.imc.org Fri Apr 24 11:52:17 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7FE4328C1A9 for ; Fri, 24 Apr 2009 11:52:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.599 X-Spam-Level: X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8JhpDR9g6Gdu for ; Fri, 24 Apr 2009 11:52:16 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3666F3A6E0A for ; Fri, 24 Apr 2009 11:51:07 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3OIKDJd086869 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 24 Apr 2009 11:20:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3OIKDQi086868; Fri, 24 Apr 2009 11:20:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mailhub2.dartmouth.edu (mailhub2.dartmouth.edu [129.170.17.107]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3OIK11c086852 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 24 Apr 2009 11:20:12 -0700 (MST) (envelope-from Massimiliano.Pala@Dartmouth.edu) Received: from newblitzen.Dartmouth.EDU (newblitzen.dartmouth.edu [129.170.208.36]) by mailhub2.dartmouth.edu (8.13.5/DND2.0/8.13.5) with ESMTP id n3OGTpZ8031848 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 24 Apr 2009 14:19:03 -0400 X-Disclaimer: This message was received from outside Dartmouth's BlitzMail system. Received: from mm.cs.dartmouth.edu [129.170.214.89] by newblitzen.Dartmouth.EDU (Mac) via SMTP for ietf-pkix@imc.org id <146797827>; 24 Apr 2009 14:19:03 -0400 Message-ID: <49F203A6.3050706@Dartmouth.edu> Date: Fri, 24 Apr 2009 14:23:34 -0400 From: Massimiliano Pala Organization: Dartmouth College - Computer Science Department User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: pkix Subject: PRQP - Updates Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms090308010807090904030808" X-MailScanner: Found to be clean by mailhub.Dartmouth.EDU X-MailScanner-From: massimiliano.pala@dartmouth.edu Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a cryptographically signed message in MIME format. --------------ms090308010807090904030808 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Hi all, while proceeding in deploying a series of PRQP servers for multiple CAs we realized that it could be useful to add a new optional field in the resource identifier data structure (both for the request and the response). In particular I think an OID that identifies the data that is pointed by the URL could be interesting. An example of this would be asking for a particular policy document from a CA: the OID of the specific policy could be copied from the certificate into the PRQP request so that only the URL of the specific policy is returned instead of the URLs of all the configured certPolicy services. Many other examples could be added here, I guess. What do you think ? For the ASN.1 experts: shall I explicitly add references to the OIDs for the know type of data in the RFC ? If so, is there a place with all the available OIDs for the data structures ? Ciao, Max -- Best Regards, Massimiliano Pala --o------------------------------------------------------------------------ Massimiliano Pala [OpenCA Project Manager] Massimiliano.Pala@dartmouth.edu project.manager@openca.org Dartmouth Computer Science Dept Home Phone: +1 (603) 369-9332 PKI/Trust Laboratory Work Phone: +1 (603) 646-9179 --o------------------------------------------------------------------------ People who think they know everything are a great annoyance to those of us who do. -- Isaac Asimov --------------ms090308010807090904030808 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJIjCC BI0wggN1oAMCAQICAhpTMA0GCSqGSIb3DQEBBQUAMHcxEzARBgoJkiaJk/IsZAEZFgNlZHUx GTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0 bW91dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMTAeFw0wNTExMDgy MDMzMDZaFw0wOTExMDkyMDMzMDZaMIHBMRMwEQYKCZImiZPyLGQBGRYDZWR1MRkwFwYKCZIm iZPyLGQBGRYJZGFydG1vdXRoMQswCQYDVQQGEwJVUzEaMBgGA1UEChMRRGFydG1vdXRoIENv bGxlZ2UxGjAYBgoJkiaJk/IsZAEBEwoxMjI1NjAyOTQ3MRowGAYDVQQDExFNYXNzaW1pbGlh bm8gUGFsYTEuMCwGCSqGSIb3DQEJARYfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVk dTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsv8obBpbhPixgdyIJj7UN0GYRNhsgWHB muCE5j8v8IvCSJWRF9spKoR0NBYgOfJu8DwQuKTIgrvbp0EC3ikrneotL4KTGD1IqWz/bSXL UR/bZAsc0r9PrvCUsZOi7wbijy784gOuqQUCJ2fJwKwk5SJ3RBaPnUROQXTp+LPSK8MCAwEA AaOCAVowggFWMA4GA1UdDwEB/wQEAwIF4DARBglghkgBhvhCAQEEBAMCBaAwgaIGA1UdIASB mjCBlzCBlAYKKwYBBAFBAgEBATCBhTA9BggrBgEFBQcCAjAxMBgWEURhcnRtb3V0aCBDb2xs ZWdlMAMCAQEaFURhcnRtb3V0aCBDb2xsZWdlIENQUzBEBggrBgEFBQcCARY4aHR0cDovL3d3 dy5kYXJ0bW91dGguZWR1L35wa2lsYWIvRGFydG1vdXRoQ1BTXzRTZXAwMy5wZGYwKgYDVR0R BCMwIYEfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVkdTAfBgNVHSMEGDAWgBQ/wNbH p08Afu8GmWdsvJYeTaN3EjA/BggrBgEFBQcBAQQzMDEwLwYIKwYBBQUHMAGGI2h0dHA6Ly9j b2xsZWdlY2EuZGFydG1vdXRoLmVkdS9vY3NwMA0GCSqGSIb3DQEBBQUAA4IBAQDEYIWmG3Ht wcgFiBbrYKp7YpI62hgAw9I3Dj9Ai+etQcMDZL8cWg3Kd7DwYHDkLxO7jl518HIJCk8Elk+Z 3Y2c0rR+c9WLuxE+EHEUmQg2AbgxzRGZAeMXj7jrv5w75IWiXBrW3SdDkjVH6MQFZVP1CBk7 PF3/+dzmiO6E5g4cVtphPSdK2qtnX7Sh0zdePzeE+e0BTnsWdN0yHgKabKx3dCiEnQXt96sA Jf5ckg7fFLcplohwWlWJCpk8WwnJM0QGw3xbrZvLk+kIQgyh0sn2va4FgA1ae29cJ1d2NurA Z+LMdei9/ZbzBeMoD9XPSYyj7zLuVXGLF/JQQoPywk5oMIIEjTCCA3WgAwIBAgICGlMwDQYJ KoZIhvcNAQEFBQAwdzETMBEGCgmSJomT8ixkARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRh cnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNVBAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYD VQQDExNEYXJ0bW91dGggQ2VydEF1dGgxMB4XDTA1MTEwODIwMzMwNloXDTA5MTEwOTIwMzMw NlowgcExEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgx CzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29sbGVnZTEaMBgGCgmSJomT8ixk AQETCjEyMjU2MDI5NDcxGjAYBgNVBAMTEU1hc3NpbWlsaWFubyBQYWxhMS4wLAYJKoZIhvcN AQkBFh9NYXNzaW1pbGlhbm8uUGFsYUBEYXJ0bW91dGguZWR1MIGfMA0GCSqGSIb3DQEBAQUA A4GNADCBiQKBgQCy/yhsGluE+LGB3IgmPtQ3QZhE2GyBYcGa4ITmPy/wi8JIlZEX2ykqhHQ0 FiA58m7wPBC4pMiCu9unQQLeKSud6i0vgpMYPUipbP9tJctRH9tkCxzSv0+u8JSxk6LvBuKP LvziA66pBQInZ8nArCTlIndEFo+dRE5BdOn4s9IrwwIDAQABo4IBWjCCAVYwDgYDVR0PAQH/ BAQDAgXgMBEGCWCGSAGG+EIBAQQEAwIFoDCBogYDVR0gBIGaMIGXMIGUBgorBgEEAUECAQEB MIGFMD0GCCsGAQUFBwICMDEwGBYRRGFydG1vdXRoIENvbGxlZ2UwAwIBARoVRGFydG1vdXRo IENvbGxlZ2UgQ1BTMEQGCCsGAQUFBwIBFjhodHRwOi8vd3d3LmRhcnRtb3V0aC5lZHUvfnBr aWxhYi9EYXJ0bW91dGhDUFNfNFNlcDAzLnBkZjAqBgNVHREEIzAhgR9NYXNzaW1pbGlhbm8u UGFsYUBEYXJ0bW91dGguZWR1MB8GA1UdIwQYMBaAFD/A1senTwB+7waZZ2y8lh5No3cSMD8G CCsGAQUFBwEBBDMwMTAvBggrBgEFBQcwAYYjaHR0cDovL2NvbGxlZ2VjYS5kYXJ0bW91dGgu ZWR1L29jc3AwDQYJKoZIhvcNAQEFBQADggEBAMRghaYbce3ByAWIFutgqntikjraGADD0jcO P0CL561BwwNkvxxaDcp3sPBgcOQvE7uOXnXwcgkKTwSWT5ndjZzStH5z1Yu7ET4QcRSZCDYB uDHNEZkB4xePuOu/nDvkhaJcGtbdJ0OSNUfoxAVlU/UIGTs8Xf/53OaI7oTmDhxW2mE9J0ra q2dftKHTN14/N4T57QFOexZ03TIeAppsrHd0KISdBe33qwAl/lySDt8UtymWiHBaVYkKmTxb CckzRAbDfFutm8uT6QhCDKHSyfa9rgWADVp7b1wnV3Y26sBn4sx16L39lvMF4ygP1c9JjKPv Mu5VcYsX8lBCg/LCTmgxggL4MIIC9AIBATB9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAX BgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91 dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwCQYFKw4DAhoF AKCCAdEwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMDkwNDI0 MTgyMzM0WjAjBgkqhkiG9w0BCQQxFgQUjxACC57TCSlj/0G9etIfltlW+8UwUgYJKoZIhvcN AQkPMUUwQzAKBggqhkiG9w0DBzAOBggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYF Kw4DAgcwDQYIKoZIhvcNAwICASgwgYwGCSsGAQQBgjcQBDF/MH0wdzETMBEGCgmSJomT8ixk ARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRhcnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNV BAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYDVQQDExNEYXJ0bW91dGggQ2VydEF1dGgxAgIa UzCBjgYLKoZIhvcNAQkQAgsxf6B9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJ k/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29s bGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwDQYJKoZIhvcNAQEBBQAE gYB+zkoM7yYhgKmUfLWaaor6gR84oW1XJkNbetbuMwKx5j5T+3bQ4GzW30cIem5Yh1Wwp9jz 6DCnZXsrOHVJMAEYKl0ZKCQeOeoGpPlIBbx7ecZ0PfkY+VS5dB4TJFR50Ja9mg5INzEWIixw sQxEc5GWPObMN8xj6fbZ2inwDQgRvwAAAAAAAA== --------------ms090308010807090904030808-- From owner-ietf-pkix@mail.imc.org Sat Apr 25 01:09:10 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B204E3A6924 for ; Sat, 25 Apr 2009 01:09:10 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.85 X-Spam-Level: X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[AWL=0.399, BAYES_00=-2.599, HELO_EQ_SE=0.35] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sf7-HdmcnDeG for ; Sat, 25 Apr 2009 01:09:10 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 9793D3A65A5 for ; Sat, 25 Apr 2009 01:09:09 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3P7gHbf028917 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 00:42:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3P7gHcW028916; Sat, 25 Apr 2009 00:42:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3P7g4Qm028901 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sat, 25 Apr 2009 00:42:16 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 7111 invoked from network); 25 Apr 2009 07:42:05 -0000 Received: from s34.loopia.se (HELO s57.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 25 Apr 2009 07:42:05 -0000 Received: (qmail 52959 invoked from network); 25 Apr 2009 07:42:02 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s57.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 25 Apr 2009 07:42:02 -0000 User-Agent: Microsoft-Entourage/12.17.0.090302 Date: Sat, 25 Apr 2009 09:41:56 +0200 Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Stefan Santesson To: IETF-pkix Message-ID: Thread-Topic: I-D ACTION:draft-santesson-pkix-certimage-00.txt Thread-Index: AcnFeU7EH8RomgkUr0WEBll15bEIzw== In-Reply-To: <20090423223001.969093A731E@core3.amsl.com> Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: All, The first certificate image draft is now posted after an initial design process. http://tools.ietf.org/html/draft-santesson-pkix-certimage-00 This issue was presented at the IETF meeting in San Francisco. See minutes at: http://tools.ietf.org/wg/pkix/minutes Input to the initial design process, especially regarding image formats, have been received from CA and browser vendors As author I would like to request the PKIX WG to accept this as PKIX work item. /Stefan On 09-04-24 12:30 AM, "Internet-Drafts@ietf.org" wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > > > Title : Internet X.509 Public Key Infrastructure: Certificate Image > Author(s) : S. Santesson, R. Housley, S. Bajaj, L. Rosenthol > Filename : draft-santesson-pkix-certimage-00.txt > Pages : 10 > Date : 2009-4-21 > > This document specifies a method to bind a visual representation of a > certificate in the form of a certificate image to a [RFC5280] public > key certificate by defining a new otherLogos image type according to > [RFC3709]. > > A URL for this Internet-Draft is: > http://www.ietf.org/internet-drafts/draft-santesson-pkix-certimage-00.txt > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > Below is the data which will enable a MIME compliant mail reader > implementation to automatically retrieve the ASCII version of the > Internet-Draft. > _______________________________________________ > I-D-Announce mailing list > I-D-Announce@ietf.org > https://www.ietf.org/mailman/listinfo/i-d-announce > Internet-Draft directories: http://www.ietf.org/shadow.html > or ftp://ftp.ietf.org/ietf/1shadow-sites.txt From owner-ietf-pkix@mail.imc.org Sat Apr 25 09:08:52 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F359B3A6B74 for ; Sat, 25 Apr 2009 09:08:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.697 X-Spam-Level: X-Spam-Status: No, score=-1.697 tagged_above=-999 required=5 tests=[AWL=-0.587, BAYES_05=-1.11] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iF3veG17jfca for ; Sat, 25 Apr 2009 09:08:51 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C4E053A67B3 for ; Sat, 25 Apr 2009 09:08:50 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3PFiENJ057918 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 08:44:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3PFiEMJ057917; Sat, 25 Apr 2009 08:44:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout2-sn1.fre.skanova.net (pne-smtpout2-sn1.fre.skanova.net [81.228.11.159]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3PFi3fd057898 for ; Sat, 25 Apr 2009 08:44:14 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout2-sn1.fre.skanova.net (7.3.129) id 49CCDA0D00420964 for ietf-pkix@imc.org; Sat, 25 Apr 2009 17:44:02 +0200 Message-ID: <15CF6442567042599308AEBA99A9C2B9@AndersPC> From: "Anders Rundgren" To: "IETF-pkix" References: In-Reply-To: Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt Date: Sat, 25 Apr 2009 17:44:14 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I do in no way object to this as an IETF WG item, however, I would like to point out that there is another work-in-progress that fulfills about the same objectives, albeit in a rather different way. This work-item is coined KeyGen2, and started as a universal credential provisioning and management protocol, but recently morphed into something which could be described as a unified credential solution for consumers with USB sticks and mobile phones as the primary target containers. Anyway, in KeyGen2 logotypes are linked to credentials not through certificate extensions, but through an image "payload" during the provisioning phase, which can be securely tied to the certificate. Is there any advantage with this one may wonder? Maybe nothing earth-shattering, but it does relieve CAs from *publishing* gazillions of personalized images. The only disadvantage I can see is that the scheme is incompatible with space-limited, single-issuer smart-cards but these are [IMHO] not that interesting for this purpose since they typically already have a logotype or something similar printed on the surface while the multi-issuer schemes imposed by mobile phones really need logotypes. In KeyGen2 the size and type of a logotype is negotiated during the issuance phase. This negotiation also includes thumbprint versions to be used in credential selection and management dialogs. A preliminary version is currently available for testing on: http://keycenter.webpki.org Anders Rundgren From owner-ietf-pkix@mail.imc.org Sat Apr 25 17:13:07 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5AC2C3A6C77 for ; Sat, 25 Apr 2009 17:13:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k4uExgX7xWXN for ; Sat, 25 Apr 2009 17:13:06 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 419073A693A for ; Sat, 25 Apr 2009 17:13:06 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3PNmXAo006364 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 16:48:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3PNmXxK006363; Sat, 25 Apr 2009 16:48:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtpauth17.prod.mesa1.secureserver.net (smtpauth17.prod.mesa1.secureserver.net [64.202.165.29]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3PNmMN9006351 for ; Sat, 25 Apr 2009 16:48:32 -0700 (MST) (envelope-from nelson@bolyard.me) Received: (qmail 30872 invoked from network); 25 Apr 2009 23:48:21 -0000 Received: from unknown (64.202.165.29) by smtpauth17.prod.mesa1.secureserver.net (64.202.165.29) with ESMTP; 25 Apr 2009 23:48:21 -0000 Message-ID: <49F3A152.3050703@bolyard.me> Date: Sat, 25 Apr 2009 16:48:34 -0700 From: Nelson B Bolyard Organization: Network Security Services User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.9.1b1pre) Gecko/20081004 NOT Firefox/2.0 SeaMonkey/2.0a2pre MIME-Version: 1.0 To: ietf-pkix@imc.org Subject: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? References: <20090420204501.A30CD3A6AB4@core3.amsl.com> In-Reply-To: <20090420204501.A30CD3A6AB4@core3.amsl.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This question is addressed to the authors of this new ID: > Title : Trust Anchor Management Protocol (TAMP) > Author(s) : R. Housley, et al. > Filename : draft-ietf-pkix-tamp-02.txt > Pages : 84 > Date : 2009-04-20 Are there any IPR disclosures to be made regarding this draft? Would software that implements this draft, or any aspect of it, be stepping on any IPR claims from (or known by) any of the authors of that draft? From owner-ietf-pkix@mail.imc.org Sat Apr 25 18:37:16 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0AFF83A6D1A for ; Sat, 25 Apr 2009 18:37:16 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.311 X-Spam-Level: X-Spam-Status: No, score=-2.311 tagged_above=-999 required=5 tests=[AWL=0.288, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AIfj5jo+Hqxc for ; Sat, 25 Apr 2009 18:37:15 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D655C3A6816 for ; Sat, 25 Apr 2009 18:37:14 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3Q1EuE8010837 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 18:14:56 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3Q1EuHe010836; Sat, 25 Apr 2009 18:14:56 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.20.30.158] (dsl-63-249-108-169.static.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3Q1EpMC010826 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 18:14:55 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <49F3A152.3050703@bolyard.me> References: <20090420204501.A30CD3A6AB4@core3.amsl.com> <49F3A152.3050703@bolyard.me> Date: Sat, 25 Apr 2009 18:14:49 -0700 To: Nelson B Bolyard , ietf-pkix@imc.org From: Paul Hoffman Subject: Re: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? Content-Type: text/plain; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 4:48 PM -0700 4/25/09, Nelson B Bolyard wrote: >This question is addressed to the authors of this new ID: > >> Title : Trust Anchor Management Protocol (TAMP) >> Author(s) : R. Housley, et al. > > Filename : draft-ietf-pkix-tamp-02.txt >> Pages : 84 >> Date : 2009-04-20 > >Are there any IPR disclosures to be made regarding this draft? > >Would software that implements this draft, or any aspect of it, be >stepping on any IPR claims from (or known by) any of the authors of >that draft? says "No IPR disclosures related to draft-ietf-pkix-tamp have been submitted". --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Sat Apr 25 20:15:12 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DCBE33A6D07 for ; Sat, 25 Apr 2009 20:15:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4sKMtAY4H+kB for ; Sat, 25 Apr 2009 20:15:12 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id ACC2A3A6941 for ; Sat, 25 Apr 2009 20:15:11 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3Q2pFmG014179 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 19:51:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3Q2pFuM014178; Sat, 25 Apr 2009 19:51:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from p3plsmtpa01-06.prod.phx3.secureserver.net (p3plsmtpa01-06.prod.phx3.secureserver.net [72.167.82.86]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3Q2p3AM014164 for ; Sat, 25 Apr 2009 19:51:14 -0700 (MST) (envelope-from nelson@bolyard.me) Received: (qmail 14064 invoked from network); 26 Apr 2009 02:51:03 -0000 Received: from unknown (72.167.82.86) by p3plsmtpa01-06.prod.phx3.secureserver.net (72.167.82.86) with ESMTP; 26 Apr 2009 02:51:03 -0000 Message-ID: <49F3CC24.4080403@bolyard.me> Date: Sat, 25 Apr 2009 19:51:16 -0700 From: Nelson B Bolyard Organization: Network Security Services User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.9.1b1pre) Gecko/20081004 NOT Firefox/2.0 SeaMonkey/2.0a2pre MIME-Version: 1.0 To: ietf-pkix@imc.org Subject: Re: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? References: <20090420204501.A30CD3A6AB4@core3.amsl.com> <49F3A152.3050703@bolyard.me> In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul Hoffman wrote, On 2009-04-25 18:14: > At 4:48 PM -0700 4/25/09, Nelson B Bolyard wrote: >> This question is addressed to the authors of this new ID: >> >>> Title : Trust Anchor Management Protocol (TAMP) >>> Author(s) : R. Housley, et al. >>> Filename : draft-ietf-pkix-tamp-02.txt >>> Pages : 84 >>> Date : 2009-04-20 >> >> Are there any IPR disclosures to be made regarding this draft? >> >> Would software that implements this draft, or any aspect of it, be >> stepping on any IPR claims from (or known by) any of the authors of >> that draft? > > > says "No IPR disclosures related to draft-ietf-pkix-tamp have been > submitted". Yes, well, I opine that, in the past, some IPR disclosures have come from certain RFC or ID authors only after being prompted. That's why I asked my question in the future tense: "to be made". :) Regards, /Nelson From morrismodd@amboinsight.com Sun Apr 26 06:22:13 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 646DE3A691B for ; Sun, 26 Apr 2009 06:22:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -16.775 X-Spam-Level: X-Spam-Status: No, score=-16.775 tagged_above=-999 required=5 tests=[AWL=-5.404, BAYES_99=3.5, DNS_FROM_RFC_DSN=1.495, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NDESUGzCVinK for ; Sun, 26 Apr 2009 06:22:12 -0700 (PDT) Received: from anacnv.com (unknown [89.205.51.228]) by core3.amsl.com (Postfix) with SMTP id 1AE7B3A68E8 for ; Sun, 26 Apr 2009 06:22:10 -0700 (PDT) To: pkix-archive@lists.ietf.org Subject: from pkix-archive@lists.ietf.org From: pkix-archive@lists.ietf.org MIME-Version: 1.0 Importance: High Content-Type: text/html X-Antivirus: avast! (VPS 090112-0, 01/12/2009), Outbound message X-Antivirus-Status: Clean Message-Id: <20090426132211.1AE7B3A68E8@core3.amsl.com> Date: Sun, 26 Apr 2009 06:22:10 -0700 (PDT)
Tell a friend · Download latest version See this email as a webpage

Hello!

Shipped Privately And Discreetly To Your Door!

See this email as a webpage
  We want to put a great big grin on your face in 2009. You'll be to rejoice all year.  

Unsubscribe · Lost Password · Account Settings · Help · Terms of Service · Privacy

Ottho Heldringstraat 3, 95299 AZ Amsterdam, The Netherlands

From nepi@advbiol.com Sun Apr 26 12:42:11 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1CC023A6E98 for ; Sun, 26 Apr 2009 12:42:11 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 2.672 X-Spam-Level: ** X-Spam-Status: No, score=2.672 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR2=4.395, HELO_EQ_BR=0.955, HOST_EQ_BR=1.295, HTML_IMAGE_ONLY_20=1.546, HTML_IMAGE_RATIO_02=0.383, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BbuXBGVDu7Ss for ; Sun, 26 Apr 2009 12:42:11 -0700 (PDT) Received: from adsl-068-153-202-133.sip.bct.bellsouth.net (adsl-068-153-202-133.sip.bct.bellsouth.net [68.153.202.133]) by core3.amsl.com (Postfix) with SMTP id E9CD43A6D64 for ; Sun, 26 Apr 2009 12:42:09 -0700 (PDT) To: " Date: Sun, 26 Apr 2009 12:42:09 -0700 (PDT)

Read more
Copyright

Subscribe to Men's Health Today!
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
From moutazberrigan@ahkonline.com Sun Apr 26 13:32:42 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 907D728C0D6 for ; Sun, 26 Apr 2009 13:32:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.08 X-Spam-Level: X-Spam-Status: No, score=-6.08 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DNS_FROM_RFC_BOGUSMX=1.482, HELO_DYNAMIC_HCC=4.295, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5CpVU7F7sEOJ for ; Sun, 26 Apr 2009 13:32:41 -0700 (PDT) Received: from cpc2-blac1-0-0-cust1011.manc.cable.ntl.com (cpc2-blac1-0-0-cust1011.manc.cable.ntl.com [81.97.151.244]) by core3.amsl.com (Postfix) with SMTP id B21B328C0D0 for ; Sun, 26 Apr 2009 13:32:37 -0700 (PDT) To: pkix-archive@lists.ietf.org Subject: from pkix-archive@lists.ietf.org From: pkix-archive@lists.ietf.org MIME-Version: 1.0 Importance: High Content-Type: text/html Message-Id: <20090426203238.B21B328C0D0@core3.amsl.com> Date: Sun, 26 Apr 2009 13:32:37 -0700 (PDT)
Tell a friend · Download latest version See this email as a webpage

Hello!

Shipped Privately And Discreetly To Your Door!

See this email as a webpage
  We want to put a great big grin on your face in 2009. You'll be to rejoice all year.  

Unsubscribe · Lost Password · Account Settings · Help · Terms of Service · Privacy

Ottho Heldringstraat 4, 36566 AZ Amsterdam, The Netherlands

From owner-ietf-pkix@mail.imc.org Sun Apr 26 17:25:35 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 867383A6A7A for ; Sun, 26 Apr 2009 17:25:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.376 X-Spam-Level: X-Spam-Status: No, score=-1.376 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, MIME_BASE64_BLANKS=0.041] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GZdkCuzeEZOo for ; Sun, 26 Apr 2009 17:25:34 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 63C063A6A2D for ; Sun, 26 Apr 2009 17:25:33 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3R01lLN078916 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 26 Apr 2009 17:01:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3R01lNq078915; Sun, 26 Apr 2009 17:01:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3R01aOh078906 for ; Sun, 26 Apr 2009 17:01:47 -0700 (MST) (envelope-from CWallace@cygnacom.com) Received: (qmail 31459 invoked from network); 26 Apr 2009 23:59:56 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 26 Apr 2009 23:59:56 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? Date: Sun, 26 Apr 2009 20:01:34 -0400 Message-ID: In-Reply-To: <49F3CC24.4080403@bolyard.me> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? Thread-Index: AcnGG+z3jEobOB0sR1u1YspjRRTGkwArrABQ References: <20090420204501.A30CD3A6AB4@core3.amsl.com> <49F3A152.3050703@bolyard.me> <49F3CC24.4080403@bolyard.me> From: "Carl Wallace" To: "Nelson B Bolyard" , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: IA0KPiA8aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9pcHIvc2VhcmNoLz9vcHRpb249ZG9j dW1lbnRfc2VhcmNoJmRvY3VtZW50X3NlYXJjaD1kcmFmdC1pZXRmLXBraXgtdGFtcD4NCj4gc2F5 cyAiTm8gSVBSIGRpc2Nsb3N1cmVzIHJlbGF0ZWQgdG8gZHJhZnQtaWV0Zi1wa2l4LXRhbXAgaGF2 ZSBiZWVuDQo+IHN1Ym1pdHRlZCIuDQoNClllcywgd2VsbCwgSSBvcGluZSB0aGF0LCBpbiB0aGUg cGFzdCwgc29tZSBJUFIgZGlzY2xvc3VyZXMgaGF2ZSBjb21lIGZyb20NCmNlcnRhaW4gUkZDIG9y IElEIGF1dGhvcnMgb25seSBhZnRlciBiZWluZyBwcm9tcHRlZC4gIFRoYXQncyB3aHkgSSBhc2tl ZA0KbXkgcXVlc3Rpb24gaW4gdGhlIGZ1dHVyZSB0ZW5zZTogInRvIGJlIG1hZGUiLiAgOikNCg0K DQpbQ1ddIEtlZXBpbmcgd2l0aCBJRVRGIDc0IHNwaXJpdCwgd2l0aCByZWdhcmQgdG8gSVBSIGRp c2Nsb3N1cmVzIGFuZCB0aGUgc2V0IG9mIFRBTSBzcGVjczoNCg0KQXMgZmFyIGFzIEkga25vdywN Cm5vbmUgaGF2ZSBiZWVuIG1hZGUsIHdpbGwgYmUgbWFkZQ0Kb3IgYXJlIGJlaW5nIG1hZGUuDQo= From owner-ietf-pkix@mail.imc.org Mon Apr 27 15:13:59 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 365C83A6C11 for ; Mon, 27 Apr 2009 15:13:59 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -104.401 X-Spam-Level: X-Spam-Status: No, score=-104.401 tagged_above=-999 required=5 tests=[AWL=2.198, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dAap8i-t+pIC for ; Mon, 27 Apr 2009 15:13:58 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 0BD963A697A for ; Mon, 27 Apr 2009 15:13:57 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3RLkOax070277 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 27 Apr 2009 14:46:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3RLkOqI070273; Mon, 27 Apr 2009 14:46:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3RLkN5i070255 for ; Mon, 27 Apr 2009 14:46:23 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id B82903A6F83; Mon, 27 Apr 2009 14:45:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D ACTION:draft-ietf-pkix-3281update-05.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090427214501.B82903A6F83@core3.amsl.com> Date: Mon, 27 Apr 2009 14:45:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : An Internet Attribute Certificate Profile for Authorization Author(s) : R. Housley, S. Farrell, S. Turner Filename : draft-ietf-pkix-3281update-05.txt Pages : 48 Date : 2009-4-27 This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols. Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements. The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements. The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications. This document obsoletes RFC 3281. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-3281update-05.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-3281update-05.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-4-27143424.I-D@ietf.org> --NextPart-- From ooi.cheankeong@akerkvaerner.com Wed Apr 29 00:12:46 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C58CA3A6DDD for ; Wed, 29 Apr 2009 00:12:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.329 X-Spam-Level: X-Spam-Status: No, score=-4.329 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_DHCP=1.398, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_CPE=0.5, HOST_EQ_CPE=0.979, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KQLDvqEuN776 for ; Wed, 29 Apr 2009 00:12:39 -0700 (PDT) Received: from cpe-98-14-161-36.nyc.res.rr.com (cpe-98-14-161-36.nyc.res.rr.com [98.14.161.36]) by core3.amsl.com (Postfix) with SMTP id B95033A6B23 for ; Wed, 29 Apr 2009 00:12:37 -0700 (PDT) To: pkix-archive@lists.ietf.org Subject: RE: Q&A Doctor Leslie From: pkix-archive@lists.ietf.org MIME-Version: 1.0 Importance: High Content-Type: text/html Message-Id: <20090429071237.B95033A6B23@core3.amsl.com> Date: Wed, 29 Apr 2009 00:12:37 -0700 (PDT)
Tell a friend · Download latest version See this email as a webpage

Hello!

Shipped Privately And Discreetly To Your Door!

See this email as a webpage
  We want to put a great big grin on your face in 2009. You'll be to rejoice all year.  

Unsubscribe · Lost Password · Account Settings · Help · Terms of Service · Privacy

Ottho Heldringstraat 8, 06722 AZ Amsterdam, The Netherlands

From owner-ietf-pkix@mail.imc.org Thu Apr 30 11:17:07 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AAF1E3A6ADB for ; Thu, 30 Apr 2009 11:17:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.329 X-Spam-Level: X-Spam-Status: No, score=-2.329 tagged_above=-999 required=5 tests=[AWL=0.270, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ip+lpq9o1Sci for ; Thu, 30 Apr 2009 11:17:07 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 925DC3A68FD for ; Thu, 30 Apr 2009 11:17:06 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UHgRdx051234 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 10:42:27 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3UHgQck051233; Thu, 30 Apr 2009 10:42:26 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.20.30.158] (dsl-63-249-108-169.static.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UHgL4u051220 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 10:42:22 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Thu, 30 Apr 2009 10:42:18 -0700 To: Stefan Santesson , IETF-pkix From: Paul Hoffman Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt Content-Type: text/plain; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 9:41 AM +0200 4/25/09, Stefan Santesson wrote: >As author I would like to request the PKIX WG to accept this as PKIX work >item. I think this is a terrible idea as a WG item, and even as an individual submission. As a WG item: - Note that only one person has supported the idea, even obliquely, since the request was posted. - Given the extremely thin adoption of RFC 3709, it is inappropriate for the WG to take on a major extension to that RFC. As an individual submission: - This proposes that compliant PKIX validators need to include at least one complex image-display mechanism. These mechanisms have been error-prone in the past, sometimes leading to the execution of arbitrary code on the host system. Forcing, or even suggesting, this be deployed as part of PKIX seems needlessly dangerous for very little value. - The rationale from the introduction of the document for showing pictures instead of words is wrong. If you want to fix the words the user sees, fix the words, don't pretend that a picture it is sorta-kinda based on the current words but not really will lead to better security. - "The previous RFC failed so now we want to extend it to make it more complicated" just sounds silly for a standard. The fact that it has been done in the IETF before doesn't mean we should make the same mistake again. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Thu Apr 30 15:58:03 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6FC8028C155 for ; Thu, 30 Apr 2009 15:58:03 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.867 X-Spam-Level: X-Spam-Status: No, score=-1.867 tagged_above=-999 required=5 tests=[AWL=0.382, BAYES_00=-2.599, HELO_EQ_SE=0.35] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PlnLcGch9JPW for ; Thu, 30 Apr 2009 15:58:02 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 069913A6FC3 for ; Thu, 30 Apr 2009 15:58:01 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UMVZjX071789 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 15:31:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3UMVZ2B071788; Thu, 30 Apr 2009 15:31:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UMVMGr071769 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 30 Apr 2009 15:31:34 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 6169 invoked from network); 30 Apr 2009 22:31:30 -0000 Received: from s34.loopia.se (HELO s57.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 30 Apr 2009 22:31:30 -0000 Received: (qmail 70740 invoked from network); 30 Apr 2009 22:31:20 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s57.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 30 Apr 2009 22:31:20 -0000 User-Agent: Microsoft-Entourage/12.17.0.090302 Date: Fri, 01 May 2009 00:31:19 +0200 Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Stefan Santesson To: Paul Hoffman , IETF-pkix Message-ID: Thread-Topic: I-D ACTION:draft-santesson-pkix-certimage-00.txt Thread-Index: AcnJ42GpfaC8qvS8qkej5nHCyA9ZVg== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul, On 09-04-30 7:42 PM, "Paul Hoffman" wrote: > > At 9:41 AM +0200 4/25/09, Stefan Santesson wrote: >> As author I would like to request the PKIX WG to accept this as PKIX work >> item. > > I think this is a terrible idea as a WG item, and even as an individual > submission. > > As a WG item: > > - Note that only one person has supported the idea, even obliquely, since the > request was posted. > First of all that is a premature assessment. Very little time has passed so far. Secondly you are wrong. This draft is supported also by the editors. That makes it five. Only one person so far has voiced against. > - Given the extremely thin adoption of RFC 3709, it is inappropriate for the > WG to take on a major extension to that RFC. > Thin adoption of RFC 3709 is not a problem at all. One of the problems with just providing logotypes with 3709 is that the solution is incomplete. The certificate image offers a complete solution. The problem is important and need a solution. Building on RFC 3709 offers an easy solution. > As an individual submission: > > - This proposes that compliant PKIX validators need to include at least one > complex image-display mechanism. These mechanisms have been error-prone in > the past, sometimes leading to the execution of arbitrary code on the host > system. Forcing, or even suggesting, this be deployed as part of PKIX seems > needlessly dangerous for very little value. > I don't understand the problem. We are talking about having the option to display a signed image from a trusted source. As if that would be a lot more dangerous than displaying images in your browser from untrusted sources. > - The rationale from the introduction of the document for showing pictures > instead of words is wrong. If you want to fix the words the user sees, fix the > words, don't pretend that a picture it is sorta-kinda based on the current > words but not really will lead to better security. > I don't have to pretend. We have at least 3 image formats that is very well suited to display a mix of text and graphics. The feature achieved is usability more than security. To the extent security can benefit from a more user friendly UI, this is also providing better security. > - "The previous RFC failed so now we want to extend it to make it more > complicated" just sounds silly for a standard. The fact that it has been done > in the IETF before doesn't mean we should make the same mistake again. > > > --Paul Hoffman, Director > --VPN Consortium > Not at all. It is the total opposite. Just adding logotypes didn't make the task to provide a understandable UI easy enough. So we need to make the solution easier and complete. A UI just using RFC 3709 would have to: - Decide where to place the logotypes on the screen relative to the text - Decide how to scale the images relative to each other and to the text - Come up with display text describing the content of each attribute - Decide which naming attributes and other names to display - Figure out how to serve the users language preferences with respect to display text. A UI using the certificate image in this new draft, can instead do the following - Display the certificate Image I would call that easier, not more complicated. I would understand your violent disagreement more Paul, if you could offer an alternative solution. /Stefan From owner-ietf-pkix@mail.imc.org Thu Apr 30 16:21:40 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8CA0F28C131 for ; Thu, 30 Apr 2009 16:21:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.334 X-Spam-Level: X-Spam-Status: No, score=-2.334 tagged_above=-999 required=5 tests=[AWL=0.265, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zg2nbOSPbO9r for ; Thu, 30 Apr 2009 16:21:39 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 37ED028C169 for ; Thu, 30 Apr 2009 16:21:17 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UN16C9073509 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 16:01:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3UN16r0073508; Thu, 30 Apr 2009 16:01:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.20.30.158] (dsl-63-249-108-169.static.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UN11tM073501 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 16:01:02 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Thu, 30 Apr 2009 16:01:00 -0700 To: Stefan Santesson , IETF-pkix From: Paul Hoffman Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt Content-Type: text/plain; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 12:31 AM +0200 5/1/09, Stefan Santesson wrote: >On 09-04-30 7:42 PM, "Paul Hoffman" wrote: > > - Note that only one person has supported the idea, even obliquely, since the >> request was posted. >> > >First of all that is a premature assessment. Very little time has passed so >far. That is for the co-chairs to decide. Hopefully, you have recused yourself from this decision. >Secondly you are wrong. This draft is supported also by the editors. That >makes it five. Only one person so far has voiced against. There is a reasonable assumption in the IETF that all the co-authors on a draft support it. The question for WG adoption is whether *others* support the inclusion in the WG. > > - Given the extremely thin adoption of RFC 3709, it is inappropriate for the >> WG to take on a major extension to that RFC. >> > >Thin adoption of RFC 3709 is not a problem at all. We disagree, strongly. >One of the problems with >just providing logotypes with 3709 is that the solution is incomplete. The >certificate image offers a complete solution. Which implementers have said "oh, if you only included Postscript, then we would have done 3709"? >The problem is important and need a solution. Building on RFC 3709 offers an >easy solution. We disagree, strongly. > > As an individual submission: >> >> - This proposes that compliant PKIX validators need to include at least one >> complex image-display mechanism. These mechanisms have been error-prone in >> the past, sometimes leading to the execution of arbitrary code on the host >> system. Forcing, or even suggesting, this be deployed as part of PKIX seems >> needlessly dangerous for very little value. >> > >I don't understand the problem. Clearly. >We are talking about having the option to >display a signed image from a trusted source. As if that would be a lot more >dangerous than displaying images in your browser from untrusted sources. To date, the CAs in the root pile have been trusted to issue certificates that reflect a proper binding between an end entity and a public key. There was some risk of them creating certificates with malicious formatting, but that was considered easy to detect. You are now proposing that those hundred of CAs be automatically trusted to format the art portions of their certificates correctly. That is a very different level of trust. Even if a CA formats the certificate in a way they think is correct, there is a chance that the named party will have given them information that will cause the display mechanism to crash and possibly execute arbitrary code. That isn't possible today with any sensible ASN.1 parser. > > - The rationale from the introduction of the document for showing pictures >> instead of words is wrong. If you want to fix the words the user sees, fix the >> words, don't pretend that a picture it is sorta-kinda based on the current >> words but not really will lead to better security. >> > >I don't have to pretend. We have at least 3 image formats that is very well >suited to display a mix of text and graphics. The feature achieved is >usability more than security. To the extent security can benefit from a more >user friendly UI, this is also providing better security. This does not explain why you don't try to just fix the problems that you claim are the base for this extension. No one *needs* pictures; they need accurate information about the identified party. That can be done in text, yes? > > - "The previous RFC failed so now we want to extend it to make it more > > complicated" just sounds silly for a standard. The fact that it has been done > > in the IETF before doesn't mean we should make the same mistake again. > > > >Not at all. It is the total opposite. Just adding logotypes didn't make the >task to provide a understandable UI easy enough. So we need to make the >solution easier and complete. > >A UI just using RFC 3709 would have to: > - Decide where to place the logotypes on the screen relative to the text > - Decide how to scale the images relative to each other and to the text > - Come up with display text describing the content of each attribute > - Decide which naming attributes and other names to display > - Figure out how to serve the users language preferences with respect to >display text. > >A UI using the certificate image in this new draft, can instead do the >following > - Display the certificate Image > >I would call that easier, not more complicated. You come from the assumption that logotypes are actually useful, not just (to use your terms) "user friendly" and based on "usability more than security". >I would understand your violent disagreement more Paul, if you could offer >an alternative solution. I already did that in the last message, but let me try again. If the problem is that the names in certificates are not right, fix them. Specify "display text describing the content of each attribute", "decide which naming attributes and other names to display", and "figure out how to serve the users language preferences with respect to display text". None of that takes graphics, much less more complicated graphics than has already failed. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Thu Apr 30 17:26:39 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B9F123A6911 for ; Thu, 30 Apr 2009 17:26:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.882 X-Spam-Level: X-Spam-Status: No, score=-1.882 tagged_above=-999 required=5 tests=[AWL=0.367, BAYES_00=-2.599, HELO_EQ_SE=0.35] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XG3LZDkBD50m for ; Thu, 30 Apr 2009 17:26:39 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C1F7628C123 for ; Thu, 30 Apr 2009 17:26:25 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UNuLwv076237 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 16:56:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3UNuLmG076236; Thu, 30 Apr 2009 16:56:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UNuJu8076221 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 30 Apr 2009 16:56:20 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 23298 invoked from network); 30 Apr 2009 23:56:27 -0000 Received: from s34.loopia.se (HELO s128.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 30 Apr 2009 23:56:27 -0000 Received: (qmail 7538 invoked from network); 30 Apr 2009 23:56:17 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s128.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 30 Apr 2009 23:56:17 -0000 User-Agent: Microsoft-Entourage/12.17.0.090302 Date: Fri, 01 May 2009 01:56:17 +0200 Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Stefan Santesson To: Paul Hoffman , IETF-pkix Message-ID: Thread-Topic: I-D ACTION:draft-santesson-pkix-certimage-00.txt Thread-Index: AcnJ70BOxXII96VkfUWX/66NqGrpBA== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul, Skipping some.. On 09-05-01 1:01 AM, "Paul Hoffman" wrote: >> I would understand your violent disagreement more Paul, if you could offer >> an alternative solution. > > I already did that in the last message, but let me try again. If the problem > is that the names in certificates are not right, fix them. Specify "display > text describing the content of each attribute", "decide which naming > attributes and other names to display", and "figure out how to serve the users > language preferences with respect to display text". None of that takes > graphics, much less more complicated graphics than has already failed. No you did not, but here you do. It is indeed an alternative solution to provide display text in all relevant languages to each attribute in the certificate and in addition to that define which attributes to display. It's just a lot more complicated and does not offer the option to include graphics. Graphics is indeed not needed, but it can be really useful. Using a certificate image does not necessarily equals use of graphics. An SVG or PDF/A can provide pure text. The client has full control over what it displays. If it doesn't trust the CA to provide a certificate image, then it will not display it. Note that this new draft is not doing anything that is not already allowed through RFC 3709. It just specifies an OID for a new image type. From owner-ietf-pkix@mail.imc.org Thu Apr 30 20:39:20 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DCA1E3A688A for ; Thu, 30 Apr 2009 20:39:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.598 X-Spam-Level: X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5EWuGA4BdeeU for ; Thu, 30 Apr 2009 20:39:20 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 5E4803A67A6 for ; Thu, 30 Apr 2009 20:39:18 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n413DZF9086297 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 20:13:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n413DZpZ086296; Thu, 30 Apr 2009 20:13:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from qw-out-1920.google.com (qw-out-1920.google.com [74.125.92.146]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n413DY9n086288 for ; Thu, 30 Apr 2009 20:13:34 -0700 (MST) (envelope-from khess000@gmail.com) Received: by qw-out-1920.google.com with SMTP id 9so1915067qwj.28 for ; Thu, 30 Apr 2009 20:13:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=iWKKc0hFeefv9ZlBxq2WvYwyEiWHeecV1EGTLP79ssg=; b=GZ7/1RRU+9QvX+04lM9w6O5/sKJlmRrnZOLrmaIobfXYXX33ma00XiRpwkP9HVBGIz ZHNFU9CZfKN/IDR7AUxlCFU7hSeAYB3yGudbx8eTnVN8NXEPku34mKST1WqdS5Wbgq6E cVj+3b7XjKK6OCzJMs96/leLtNG+zQx9exkGg= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=jVRXovEhx5dUvGi1UmVeZsIBEaWNw5LvuZZz/Am5sUXpIDMbc9iyDM5MaXdSYMVEx0 kT+ughn/AmQMm/DwFOG/aYVi5UWk6XRqUVHf2W7tHJCPKo5ytyOZ3n0IPPyev1jSBodh zar7fZuxsDVs3e1Obizf9527PTIE02tPDmTow= MIME-Version: 1.0 Received: by 10.229.80.1 with SMTP id r1mr1929503qck.93.1241147613642; Thu, 30 Apr 2009 20:13:33 -0700 (PDT) In-Reply-To: References: <20090423223001.969093A731E@core3.amsl.com> Date: Thu, 30 Apr 2009 23:13:33 -0400 Message-ID: <8eb2f6190904302013o69d5fdeaw2aa4a5f8bea0bd67@mail.gmail.com> Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Karl Hess To: stefan@aaa-sec.com Cc: ietf-pkix@imc.org Content-Type: multipart/alternative; boundary=0016364ee590a000c10468d1320d Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --0016364ee590a000c10468d1320d Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit On Sat, Apr 25, 2009 at 03:41, Stefan Santesson wrote > > > > All, > > The first certificate image draft is now posted after an initial design > process. > > http://tools.ietf.org/html/draft-santesson-pkix-certimage-00 > > This issue was presented at the IETF meeting in San Francisco. See minutes > at: http://tools.ietf.org/wg/pkix/minutes > > Input to the initial design process, especially regarding image formats, > have been received from CA and browser vendors > > As author I would like to request the PKIX WG to accept this as PKIX work > item. > I disagree that this should be a WG item. I don't feel that it belongs in the WG. > > /Stefan > > > > On 09-04-24 12:30 AM, "Internet-Drafts@ietf.org" > > wrote: > > > A New Internet-Draft is available from the on-line Internet-Drafts > > directories. > > > > > > Title : Internet X.509 Public Key Infrastructure: Certificate Image > > Author(s) : S. Santesson, R. Housley, S. Bajaj, L. Rosenthol > > Filename : draft-santesson-pkix-certimage-00.txt > > Pages : 10 > > Date : 2009-4-21 > > > > This document specifies a method to bind a visual representation of a > > certificate in the form of a certificate image to a [RFC5280] public > > key certificate by defining a new otherLogos image type according to > > [RFC3709]. > > > > A URL for this Internet-Draft is: > > > http://www.ietf.org/internet-drafts/draft-santesson-pkix-certimage-00.txt > > > > Internet-Drafts are also available by anonymous FTP at: > > ftp://ftp.ietf.org/internet-drafts/ > > > > Below is the data which will enable a MIME compliant mail reader > > implementation to automatically retrieve the ASCII version of the > > Internet-Draft. > > _______________________________________________ > > I-D-Announce mailing list > > I-D-Announce@ietf.org > > https://www.ietf.org/mailman/listinfo/i-d-announce > > Internet-Draft directories: http://www.ietf.org/shadow.html > > or ftp://ftp.ietf.org/ietf/1shadow-sites.txt > --0016364ee590a000c10468d1320d Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
On Sat,=A0Apr 25, 2009 at 03:41,=A0Stef= an Santesson <stefan@aaa-sec.com>=A0wrote=A0



All,

The first certificate image draft is now posted after an initial design
process.

http://tools.ietf.org/html/draft-santesson-pkix-certimage-0= 0

This issue was presented at the IETF meeting in San Francisco. See minutes<= br> at: htt= p://tools.ietf.org/wg/pkix/minutes

Input to the initial design process, especially regarding image formats, have been received from CA and browser vendors

As author I would like to request the PKIX WG to accept this as PKIX work item.

I=A0disagree=A0that this should be a WG it= em. =A0I don't feel that it belongs in the WG. =A0
=A0
<= blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px= #ccc solid;padding-left:1ex;">
/Stefan



On 09-04-24 12:30 AM, "Int= ernet-Drafts@ietf.org" <Internet-Drafts@ietf.org>
wrote:

> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>
> Title =A0: Internet X.509 Public Key Infrastructure: Certificate Image=
> Author(s) : S. Santesson, R. Housley, S. Bajaj, L. Rosenthol
> Filename : draft-santesson-pkix-certimage-00.txt
> Pages =A0: 10
> Date =A0: 2009-4-21
>
> =A0 =A0This document specifies a method to bind a visual representatio= n of a
> =A0 =A0certificate in the form of a certificate image to a [RFC5280] p= ublic
> =A0 =A0key certificate by defining a new otherLogos image type accordi= ng to
> =A0 =A0[RFC3709].
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft= -santesson-pkix-certimage-00.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp:= //ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt

--0016364ee590a000c10468d1320d-- From owner-ietf-pkix@mail.imc.org Thu Apr 30 22:12:02 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D55B93A6A60 for ; Thu, 30 Apr 2009 22:12:02 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.599 X-Spam-Level: X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j4PHzeoHpy2M for ; Thu, 30 Apr 2009 22:12:02 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A41AC3A67B7 for ; Thu, 30 Apr 2009 22:12:01 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n414nMjp091050 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 21:49:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n414nL9o091048; Thu, 30 Apr 2009 21:49:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mx1.myoutlookonline.com (mx1.myoutlookonline.com [64.95.72.238]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n414nAWf091033 for ; Thu, 30 Apr 2009 21:49:21 -0700 (MST) (envelope-from jdilles@pericore.com) Received: from mx1.myoutlookonline.com ([10.9.36.14]) by mx1.myoutlookonline.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 1 May 2009 00:49:09 -0400 Received: from mbp2208e.dilles.net ([71.126.132.133]) by mx1.myoutlookonline.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Fri, 1 May 2009 00:49:09 -0400 Cc: IETF-pkix , Stefan Santesson Message-Id: <142261A9-CCD4-4E97-9AB4-031927C48B6F@pericore.com> From: Jacob Dilles To: Paul Hoffman In-Reply-To: Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt Date: Fri, 1 May 2009 00:49:07 -0400 References: X-Mailer: Apple Mail (2.930.4) X-OriginalArrivalTime: 01 May 2009 04:49:09.0284 (UTC) FILETIME=[2A33E640:01C9CA18] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: An image format will be necessary eventually; a company logo or credential owner ID photo that only appears in a GUI when the certificate signature and trust chain are validated is significantly more meaningful to 99% of "human" users than any text could ever be. The average SSL client, signed PDF viewer, or PA security guard, does not have the time, knowledge, or desire to decipher attributes from a DN. The original internet was text based.. It's just a matter of time. JSD On Apr 30, 2009, at 7:56 PM, Stefan Santesson wrote: > > Paul, > > Skipping some.. > > On 09-05-01 1:01 AM, "Paul Hoffman" wrote: > >>> I would understand your violent disagreement more Paul, if you >>> could offer >>> an alternative solution. >> >> I already did that in the last message, but let me try again. If >> the problem >> is that the names in certificates are not right, fix them. Specify >> "display >> text describing the content of each attribute", "decide which naming >> attributes and other names to display", and "figure out how to >> serve the users >> language preferences with respect to display text". None of that >> takes >> graphics, much less more complicated graphics than has already >> failed. > > > No you did not, but here you do. > > It is indeed an alternative solution to provide display text in all > relevant > languages to each attribute in the certificate and in addition to that > define which attributes to display. > > It's just a lot more complicated and does not offer the option to > include > graphics. > > Graphics is indeed not needed, but it can be really useful. Using a > certificate image does not necessarily equals use of graphics. An > SVG or > PDF/A can provide pure text. > > The client has full control over what it displays. If it doesn't > trust the > CA to provide a certificate image, then it will not display it. > > Note that this new draft is not doing anything that is not already > allowed > through RFC 3709. It just specifies an OID for a new image type. > > > From owner-ietf-pkix@mail.imc.org Thu Apr 30 22:58:28 2009 Return-Path: X-Original-To: ietfarch-pkix-archive@core3.amsl.com Delivered-To: ietfarch-pkix-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 984833A684A for ; Thu, 30 Apr 2009 22:58:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.198 X-Spam-Level: X-Spam-Status: No, score=-1.198 tagged_above=-999 required=5 tests=[AWL=-0.346, BAYES_00=-2.599, HELO_EQ_SE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rE-MVpZKydQp for ; Thu, 30 Apr 2009 22:58:25 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 9518B3A6828 for ; Thu, 30 Apr 2009 22:58:24 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n415dHjc093229 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 22:39:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n415dHQd093228; Thu, 30 Apr 2009 22:39:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n415d3Mk093207 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 30 Apr 2009 22:39:15 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 87334 invoked from network); 1 May 2009 05:39:04 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 1 May 2009 05:39:04 -0000 Received: (qmail 37486 invoked from network); 1 May 2009 05:39:02 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 1 May 2009 05:39:02 -0000 User-Agent: Microsoft-Entourage/12.17.0.090302 Date: Fri, 01 May 2009 07:39:01 +0200 Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Stefan Santesson To: Karl Hess CC: Message-ID: Thread-Topic: I-D ACTION:draft-santesson-pkix-certimage-00.txt Thread-Index: AcnKHyFnCI5E10BBH0mMEpPCFH+38w== In-Reply-To: <8eb2f6190904302013o69d5fdeaw2aa4a5f8bea0bd67@mail.gmail.com> Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3324008342_13260116" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3324008342_13260116 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable On 09-05-01 5:13 AM, "Karl Hess" wrote: > I=A0disagree=A0that this should be a WG item. =A0I don't feel that it belongs i= n the > WG.=20 Karl, Just a clarifying question. You are not telling me that something is wrong with the proposal, just that it does not belong in the WG. But given that both RFC 3739 and 3709 are products of PKIX, how does this NOT belong in this WG? To clarify: This WG produced RFC 3709, which specifies an extension where you can reference images that supports certificate display. The images already specified in RFC 3709 are: - Community logo - Issuer logo - Subject logo - Loyalty logo - Background image Another RFC from this WG, RFC 3739, defines how to reference 2 other images to support certificate display. - Picture of the Subject - Image of subject=B9s handwritten signature This draft simply defines an OID for one more image type (certificate image= ) to be referenced from the RFC 3709 extension. --B_3324008342_13260116 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt On 09-05-01 5:13 AM, "Karl Hess" <khess000@gmail.com> wrote:

<= SPAN STYLE=3D'font-size:11pt'>I=A0disagree=A0that this should be a WG item. =A0I don= 't feel that it belongs in the WG.
=

Karl,

Just a clarifying question.

You are not telling me that something is wrong with the proposal, just that= it does not belong in the WG. But given that both RFC 3739 and 3709 are pro= ducts of PKIX, how does this NOT belong in this WG?


To clarify:
This WG produced RFC 3709, which specifies an extension where you can refer= ence images that supports certificate display.
The images already specified in RFC 3709 are:

- Community logo
- Issuer logo
- Subject logo
- Loyalty logo
- Background image

Another RFC from this WG, RFC 3739, defines how to reference 2 other images= to support certificate display.
- Picture of the Subject
- Image of subject’s handwritten signature

This draft simply defines an OID for one more image type (certificate image= ) to be referenced from the RFC 3709 extension.


--B_3324008342_13260116-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n415dHjc093229 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 22:39:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n415dHQd093228; Thu, 30 Apr 2009 22:39:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n415d3Mk093207 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 30 Apr 2009 22:39:15 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 87334 invoked from network); 1 May 2009 05:39:04 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 1 May 2009 05:39:04 -0000 Received: (qmail 37486 invoked from network); 1 May 2009 05:39:02 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 1 May 2009 05:39:02 -0000 User-Agent: Microsoft-Entourage/12.17.0.090302 Date: Fri, 01 May 2009 07:39:01 +0200 Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Stefan Santesson To: Karl Hess CC: Message-ID: Thread-Topic: I-D ACTION:draft-santesson-pkix-certimage-00.txt Thread-Index: AcnKHyFnCI5E10BBH0mMEpPCFH+38w== In-Reply-To: <8eb2f6190904302013o69d5fdeaw2aa4a5f8bea0bd67@mail.gmail.com> Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3324008342_13260116" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3324008342_13260116 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable On 09-05-01 5:13 AM, "Karl Hess" wrote: > I=A0disagree=A0that this should be a WG item. =A0I don't feel that it belongs i= n the > WG.=20 Karl, Just a clarifying question. You are not telling me that something is wrong with the proposal, just that it does not belong in the WG. But given that both RFC 3739 and 3709 are products of PKIX, how does this NOT belong in this WG? To clarify: This WG produced RFC 3709, which specifies an extension where you can reference images that supports certificate display. The images already specified in RFC 3709 are: - Community logo - Issuer logo - Subject logo - Loyalty logo - Background image Another RFC from this WG, RFC 3739, defines how to reference 2 other images to support certificate display. - Picture of the Subject - Image of subject=B9s handwritten signature This draft simply defines an OID for one more image type (certificate image= ) to be referenced from the RFC 3709 extension. --B_3324008342_13260116 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt On 09-05-01 5:13 AM, "Karl Hess" <khess000@gmail.com> wrote:

<= SPAN STYLE=3D'font-size:11pt'>I=A0disagree=A0that this should be a WG item. =A0I don= 't feel that it belongs in the WG.
=

Karl,

Just a clarifying question.

You are not telling me that something is wrong with the proposal, just that= it does not belong in the WG. But given that both RFC 3739 and 3709 are pro= ducts of PKIX, how does this NOT belong in this WG?


To clarify:
This WG produced RFC 3709, which specifies an extension where you can refer= ence images that supports certificate display.
The images already specified in RFC 3709 are:

- Community logo
- Issuer logo
- Subject logo
- Loyalty logo
- Background image

Another RFC from this WG, RFC 3739, defines how to reference 2 other images= to support certificate display.
- Picture of the Subject
- Image of subject’s handwritten signature

This draft simply defines an OID for one more image type (certificate image= ) to be referenced from the RFC 3709 extension.


--B_3324008342_13260116-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n414nMjp091050 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 21:49:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n414nL9o091048; Thu, 30 Apr 2009 21:49:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mx1.myoutlookonline.com (mx1.myoutlookonline.com [64.95.72.238]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n414nAWf091033 for ; Thu, 30 Apr 2009 21:49:21 -0700 (MST) (envelope-from jdilles@pericore.com) Received: from mx1.myoutlookonline.com ([10.9.36.14]) by mx1.myoutlookonline.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 1 May 2009 00:49:09 -0400 Received: from mbp2208e.dilles.net ([71.126.132.133]) by mx1.myoutlookonline.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Fri, 1 May 2009 00:49:09 -0400 Cc: IETF-pkix , Stefan Santesson Message-Id: <142261A9-CCD4-4E97-9AB4-031927C48B6F@pericore.com> From: Jacob Dilles To: Paul Hoffman In-Reply-To: Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt Date: Fri, 1 May 2009 00:49:07 -0400 References: X-Mailer: Apple Mail (2.930.4) X-OriginalArrivalTime: 01 May 2009 04:49:09.0284 (UTC) FILETIME=[2A33E640:01C9CA18] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: An image format will be necessary eventually; a company logo or credential owner ID photo that only appears in a GUI when the certificate signature and trust chain are validated is significantly more meaningful to 99% of "human" users than any text could ever be. The average SSL client, signed PDF viewer, or PA security guard, does not have the time, knowledge, or desire to decipher attributes from a DN. The original internet was text based.. It's just a matter of time. JSD On Apr 30, 2009, at 7:56 PM, Stefan Santesson wrote: > > Paul, > > Skipping some.. > > On 09-05-01 1:01 AM, "Paul Hoffman" wrote: > >>> I would understand your violent disagreement more Paul, if you >>> could offer >>> an alternative solution. >> >> I already did that in the last message, but let me try again. If >> the problem >> is that the names in certificates are not right, fix them. Specify >> "display >> text describing the content of each attribute", "decide which naming >> attributes and other names to display", and "figure out how to >> serve the users >> language preferences with respect to display text". None of that >> takes >> graphics, much less more complicated graphics than has already >> failed. > > > No you did not, but here you do. > > It is indeed an alternative solution to provide display text in all > relevant > languages to each attribute in the certificate and in addition to that > define which attributes to display. > > It's just a lot more complicated and does not offer the option to > include > graphics. > > Graphics is indeed not needed, but it can be really useful. Using a > certificate image does not necessarily equals use of graphics. An > SVG or > PDF/A can provide pure text. > > The client has full control over what it displays. If it doesn't > trust the > CA to provide a certificate image, then it will not display it. > > Note that this new draft is not doing anything that is not already > allowed > through RFC 3709. It just specifies an OID for a new image type. > > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n413DZF9086297 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 20:13:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n413DZpZ086296; Thu, 30 Apr 2009 20:13:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from qw-out-1920.google.com (qw-out-1920.google.com [74.125.92.146]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n413DY9n086288 for ; Thu, 30 Apr 2009 20:13:34 -0700 (MST) (envelope-from khess000@gmail.com) Received: by qw-out-1920.google.com with SMTP id 9so1915067qwj.28 for ; Thu, 30 Apr 2009 20:13:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=iWKKc0hFeefv9ZlBxq2WvYwyEiWHeecV1EGTLP79ssg=; b=GZ7/1RRU+9QvX+04lM9w6O5/sKJlmRrnZOLrmaIobfXYXX33ma00XiRpwkP9HVBGIz ZHNFU9CZfKN/IDR7AUxlCFU7hSeAYB3yGudbx8eTnVN8NXEPku34mKST1WqdS5Wbgq6E cVj+3b7XjKK6OCzJMs96/leLtNG+zQx9exkGg= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=jVRXovEhx5dUvGi1UmVeZsIBEaWNw5LvuZZz/Am5sUXpIDMbc9iyDM5MaXdSYMVEx0 kT+ughn/AmQMm/DwFOG/aYVi5UWk6XRqUVHf2W7tHJCPKo5ytyOZ3n0IPPyev1jSBodh zar7fZuxsDVs3e1Obizf9527PTIE02tPDmTow= MIME-Version: 1.0 Received: by 10.229.80.1 with SMTP id r1mr1929503qck.93.1241147613642; Thu, 30 Apr 2009 20:13:33 -0700 (PDT) In-Reply-To: References: <20090423223001.969093A731E@core3.amsl.com> Date: Thu, 30 Apr 2009 23:13:33 -0400 Message-ID: <8eb2f6190904302013o69d5fdeaw2aa4a5f8bea0bd67@mail.gmail.com> Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Karl Hess To: stefan@aaa-sec.com Cc: ietf-pkix@imc.org Content-Type: multipart/alternative; boundary=0016364ee590a000c10468d1320d Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --0016364ee590a000c10468d1320d Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit On Sat, Apr 25, 2009 at 03:41, Stefan Santesson wrote > > > > All, > > The first certificate image draft is now posted after an initial design > process. > > http://tools.ietf.org/html/draft-santesson-pkix-certimage-00 > > This issue was presented at the IETF meeting in San Francisco. See minutes > at: http://tools.ietf.org/wg/pkix/minutes > > Input to the initial design process, especially regarding image formats, > have been received from CA and browser vendors > > As author I would like to request the PKIX WG to accept this as PKIX work > item. > I disagree that this should be a WG item. I don't feel that it belongs in the WG. > > /Stefan > > > > On 09-04-24 12:30 AM, "Internet-Drafts@ietf.org" > > wrote: > > > A New Internet-Draft is available from the on-line Internet-Drafts > > directories. > > > > > > Title : Internet X.509 Public Key Infrastructure: Certificate Image > > Author(s) : S. Santesson, R. Housley, S. Bajaj, L. Rosenthol > > Filename : draft-santesson-pkix-certimage-00.txt > > Pages : 10 > > Date : 2009-4-21 > > > > This document specifies a method to bind a visual representation of a > > certificate in the form of a certificate image to a [RFC5280] public > > key certificate by defining a new otherLogos image type according to > > [RFC3709]. > > > > A URL for this Internet-Draft is: > > > http://www.ietf.org/internet-drafts/draft-santesson-pkix-certimage-00.txt > > > > Internet-Drafts are also available by anonymous FTP at: > > ftp://ftp.ietf.org/internet-drafts/ > > > > Below is the data which will enable a MIME compliant mail reader > > implementation to automatically retrieve the ASCII version of the > > Internet-Draft. > > _______________________________________________ > > I-D-Announce mailing list > > I-D-Announce@ietf.org > > https://www.ietf.org/mailman/listinfo/i-d-announce > > Internet-Draft directories: http://www.ietf.org/shadow.html > > or ftp://ftp.ietf.org/ietf/1shadow-sites.txt > --0016364ee590a000c10468d1320d Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
On Sat,=A0Apr 25, 2009 at 03:41,=A0Stef= an Santesson <stefan@aaa-sec.com>=A0wrote=A0



All,

The first certificate image draft is now posted after an initial design
process.

http://tools.ietf.org/html/draft-santesson-pkix-certimage-0= 0

This issue was presented at the IETF meeting in San Francisco. See minutes<= br> at: htt= p://tools.ietf.org/wg/pkix/minutes

Input to the initial design process, especially regarding image formats, have been received from CA and browser vendors

As author I would like to request the PKIX WG to accept this as PKIX work item.

I=A0disagree=A0that this should be a WG it= em. =A0I don't feel that it belongs in the WG. =A0
=A0
<= blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px= #ccc solid;padding-left:1ex;">
/Stefan



On 09-04-24 12:30 AM, "Int= ernet-Drafts@ietf.org" <Internet-Drafts@ietf.org>
wrote:

> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>
> Title =A0: Internet X.509 Public Key Infrastructure: Certificate Image=
> Author(s) : S. Santesson, R. Housley, S. Bajaj, L. Rosenthol
> Filename : draft-santesson-pkix-certimage-00.txt
> Pages =A0: 10
> Date =A0: 2009-4-21
>
> =A0 =A0This document specifies a method to bind a visual representatio= n of a
> =A0 =A0certificate in the form of a certificate image to a [RFC5280] p= ublic
> =A0 =A0key certificate by defining a new otherLogos image type accordi= ng to
> =A0 =A0[RFC3709].
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft= -santesson-pkix-certimage-00.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp:= //ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt

--0016364ee590a000c10468d1320d-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UNuLwv076237 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 16:56:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3UNuLmG076236; Thu, 30 Apr 2009 16:56:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UNuJu8076221 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 30 Apr 2009 16:56:20 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 23298 invoked from network); 30 Apr 2009 23:56:27 -0000 Received: from s34.loopia.se (HELO s128.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 30 Apr 2009 23:56:27 -0000 Received: (qmail 7538 invoked from network); 30 Apr 2009 23:56:17 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s128.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 30 Apr 2009 23:56:17 -0000 User-Agent: Microsoft-Entourage/12.17.0.090302 Date: Fri, 01 May 2009 01:56:17 +0200 Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Stefan Santesson To: Paul Hoffman , IETF-pkix Message-ID: Thread-Topic: I-D ACTION:draft-santesson-pkix-certimage-00.txt Thread-Index: AcnJ70BOxXII96VkfUWX/66NqGrpBA== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul, Skipping some.. On 09-05-01 1:01 AM, "Paul Hoffman" wrote: >> I would understand your violent disagreement more Paul, if you could offer >> an alternative solution. > > I already did that in the last message, but let me try again. If the problem > is that the names in certificates are not right, fix them. Specify "display > text describing the content of each attribute", "decide which naming > attributes and other names to display", and "figure out how to serve the users > language preferences with respect to display text". None of that takes > graphics, much less more complicated graphics than has already failed. No you did not, but here you do. It is indeed an alternative solution to provide display text in all relevant languages to each attribute in the certificate and in addition to that define which attributes to display. It's just a lot more complicated and does not offer the option to include graphics. Graphics is indeed not needed, but it can be really useful. Using a certificate image does not necessarily equals use of graphics. An SVG or PDF/A can provide pure text. The client has full control over what it displays. If it doesn't trust the CA to provide a certificate image, then it will not display it. Note that this new draft is not doing anything that is not already allowed through RFC 3709. It just specifies an OID for a new image type. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UN16C9073509 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 16:01:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3UN16r0073508; Thu, 30 Apr 2009 16:01:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.20.30.158] (dsl-63-249-108-169.static.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UN11tM073501 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 16:01:02 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Thu, 30 Apr 2009 16:01:00 -0700 To: Stefan Santesson , IETF-pkix From: Paul Hoffman Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt Content-Type: text/plain; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 12:31 AM +0200 5/1/09, Stefan Santesson wrote: >On 09-04-30 7:42 PM, "Paul Hoffman" wrote: > > - Note that only one person has supported the idea, even obliquely, since the >> request was posted. >> > >First of all that is a premature assessment. Very little time has passed so >far. That is for the co-chairs to decide. Hopefully, you have recused yourself from this decision. >Secondly you are wrong. This draft is supported also by the editors. That >makes it five. Only one person so far has voiced against. There is a reasonable assumption in the IETF that all the co-authors on a draft support it. The question for WG adoption is whether *others* support the inclusion in the WG. > > - Given the extremely thin adoption of RFC 3709, it is inappropriate for the >> WG to take on a major extension to that RFC. >> > >Thin adoption of RFC 3709 is not a problem at all. We disagree, strongly. >One of the problems with >just providing logotypes with 3709 is that the solution is incomplete. The >certificate image offers a complete solution. Which implementers have said "oh, if you only included Postscript, then we would have done 3709"? >The problem is important and need a solution. Building on RFC 3709 offers an >easy solution. We disagree, strongly. > > As an individual submission: >> >> - This proposes that compliant PKIX validators need to include at least one >> complex image-display mechanism. These mechanisms have been error-prone in >> the past, sometimes leading to the execution of arbitrary code on the host >> system. Forcing, or even suggesting, this be deployed as part of PKIX seems >> needlessly dangerous for very little value. >> > >I don't understand the problem. Clearly. >We are talking about having the option to >display a signed image from a trusted source. As if that would be a lot more >dangerous than displaying images in your browser from untrusted sources. To date, the CAs in the root pile have been trusted to issue certificates that reflect a proper binding between an end entity and a public key. There was some risk of them creating certificates with malicious formatting, but that was considered easy to detect. You are now proposing that those hundred of CAs be automatically trusted to format the art portions of their certificates correctly. That is a very different level of trust. Even if a CA formats the certificate in a way they think is correct, there is a chance that the named party will have given them information that will cause the display mechanism to crash and possibly execute arbitrary code. That isn't possible today with any sensible ASN.1 parser. > > - The rationale from the introduction of the document for showing pictures >> instead of words is wrong. If you want to fix the words the user sees, fix the >> words, don't pretend that a picture it is sorta-kinda based on the current >> words but not really will lead to better security. >> > >I don't have to pretend. We have at least 3 image formats that is very well >suited to display a mix of text and graphics. The feature achieved is >usability more than security. To the extent security can benefit from a more >user friendly UI, this is also providing better security. This does not explain why you don't try to just fix the problems that you claim are the base for this extension. No one *needs* pictures; they need accurate information about the identified party. That can be done in text, yes? > > - "The previous RFC failed so now we want to extend it to make it more > > complicated" just sounds silly for a standard. The fact that it has been done > > in the IETF before doesn't mean we should make the same mistake again. > > > >Not at all. It is the total opposite. Just adding logotypes didn't make the >task to provide a understandable UI easy enough. So we need to make the >solution easier and complete. > >A UI just using RFC 3709 would have to: > - Decide where to place the logotypes on the screen relative to the text > - Decide how to scale the images relative to each other and to the text > - Come up with display text describing the content of each attribute > - Decide which naming attributes and other names to display > - Figure out how to serve the users language preferences with respect to >display text. > >A UI using the certificate image in this new draft, can instead do the >following > - Display the certificate Image > >I would call that easier, not more complicated. You come from the assumption that logotypes are actually useful, not just (to use your terms) "user friendly" and based on "usability more than security". >I would understand your violent disagreement more Paul, if you could offer >an alternative solution. I already did that in the last message, but let me try again. If the problem is that the names in certificates are not right, fix them. Specify "display text describing the content of each attribute", "decide which naming attributes and other names to display", and "figure out how to serve the users language preferences with respect to display text". None of that takes graphics, much less more complicated graphics than has already failed. --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UMVZjX071789 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 15:31:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3UMVZ2B071788; Thu, 30 Apr 2009 15:31:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UMVMGr071769 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 30 Apr 2009 15:31:34 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 6169 invoked from network); 30 Apr 2009 22:31:30 -0000 Received: from s34.loopia.se (HELO s57.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 30 Apr 2009 22:31:30 -0000 Received: (qmail 70740 invoked from network); 30 Apr 2009 22:31:20 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s57.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 30 Apr 2009 22:31:20 -0000 User-Agent: Microsoft-Entourage/12.17.0.090302 Date: Fri, 01 May 2009 00:31:19 +0200 Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Stefan Santesson To: Paul Hoffman , IETF-pkix Message-ID: Thread-Topic: I-D ACTION:draft-santesson-pkix-certimage-00.txt Thread-Index: AcnJ42GpfaC8qvS8qkej5nHCyA9ZVg== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul, On 09-04-30 7:42 PM, "Paul Hoffman" wrote: > > At 9:41 AM +0200 4/25/09, Stefan Santesson wrote: >> As author I would like to request the PKIX WG to accept this as PKIX work >> item. > > I think this is a terrible idea as a WG item, and even as an individual > submission. > > As a WG item: > > - Note that only one person has supported the idea, even obliquely, since the > request was posted. > First of all that is a premature assessment. Very little time has passed so far. Secondly you are wrong. This draft is supported also by the editors. That makes it five. Only one person so far has voiced against. > - Given the extremely thin adoption of RFC 3709, it is inappropriate for the > WG to take on a major extension to that RFC. > Thin adoption of RFC 3709 is not a problem at all. One of the problems with just providing logotypes with 3709 is that the solution is incomplete. The certificate image offers a complete solution. The problem is important and need a solution. Building on RFC 3709 offers an easy solution. > As an individual submission: > > - This proposes that compliant PKIX validators need to include at least one > complex image-display mechanism. These mechanisms have been error-prone in > the past, sometimes leading to the execution of arbitrary code on the host > system. Forcing, or even suggesting, this be deployed as part of PKIX seems > needlessly dangerous for very little value. > I don't understand the problem. We are talking about having the option to display a signed image from a trusted source. As if that would be a lot more dangerous than displaying images in your browser from untrusted sources. > - The rationale from the introduction of the document for showing pictures > instead of words is wrong. If you want to fix the words the user sees, fix the > words, don't pretend that a picture it is sorta-kinda based on the current > words but not really will lead to better security. > I don't have to pretend. We have at least 3 image formats that is very well suited to display a mix of text and graphics. The feature achieved is usability more than security. To the extent security can benefit from a more user friendly UI, this is also providing better security. > - "The previous RFC failed so now we want to extend it to make it more > complicated" just sounds silly for a standard. The fact that it has been done > in the IETF before doesn't mean we should make the same mistake again. > > > --Paul Hoffman, Director > --VPN Consortium > Not at all. It is the total opposite. Just adding logotypes didn't make the task to provide a understandable UI easy enough. So we need to make the solution easier and complete. A UI just using RFC 3709 would have to: - Decide where to place the logotypes on the screen relative to the text - Decide how to scale the images relative to each other and to the text - Come up with display text describing the content of each attribute - Decide which naming attributes and other names to display - Figure out how to serve the users language preferences with respect to display text. A UI using the certificate image in this new draft, can instead do the following - Display the certificate Image I would call that easier, not more complicated. I would understand your violent disagreement more Paul, if you could offer an alternative solution. /Stefan Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UHgRdx051234 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 10:42:27 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3UHgQck051233; Thu, 30 Apr 2009 10:42:26 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.20.30.158] (dsl-63-249-108-169.static.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3UHgL4u051220 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 30 Apr 2009 10:42:22 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Thu, 30 Apr 2009 10:42:18 -0700 To: Stefan Santesson , IETF-pkix From: Paul Hoffman Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt Content-Type: text/plain; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 9:41 AM +0200 4/25/09, Stefan Santesson wrote: >As author I would like to request the PKIX WG to accept this as PKIX work >item. I think this is a terrible idea as a WG item, and even as an individual submission. As a WG item: - Note that only one person has supported the idea, even obliquely, since the request was posted. - Given the extremely thin adoption of RFC 3709, it is inappropriate for the WG to take on a major extension to that RFC. As an individual submission: - This proposes that compliant PKIX validators need to include at least one complex image-display mechanism. These mechanisms have been error-prone in the past, sometimes leading to the execution of arbitrary code on the host system. Forcing, or even suggesting, this be deployed as part of PKIX seems needlessly dangerous for very little value. - The rationale from the introduction of the document for showing pictures instead of words is wrong. If you want to fix the words the user sees, fix the words, don't pretend that a picture it is sorta-kinda based on the current words but not really will lead to better security. - "The previous RFC failed so now we want to extend it to make it more complicated" just sounds silly for a standard. The fact that it has been done in the IETF before doesn't mean we should make the same mistake again. --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3RLkOax070277 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 27 Apr 2009 14:46:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3RLkOqI070273; Mon, 27 Apr 2009 14:46:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3RLkN5i070255 for ; Mon, 27 Apr 2009 14:46:23 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id B82903A6F83; Mon, 27 Apr 2009 14:45:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D ACTION:draft-ietf-pkix-3281update-05.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090427214501.B82903A6F83@core3.amsl.com> Date: Mon, 27 Apr 2009 14:45:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : An Internet Attribute Certificate Profile for Authorization Author(s) : R. Housley, S. Farrell, S. Turner Filename : draft-ietf-pkix-3281update-05.txt Pages : 48 Date : 2009-4-27 This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols. Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements. The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements. The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications. This document obsoletes RFC 3281. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-3281update-05.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-3281update-05.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-4-27143424.I-D@ietf.org> --NextPart-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3R01lLN078916 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 26 Apr 2009 17:01:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3R01lNq078915; Sun, 26 Apr 2009 17:01:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3R01aOh078906 for ; Sun, 26 Apr 2009 17:01:47 -0700 (MST) (envelope-from CWallace@cygnacom.com) Received: (qmail 31459 invoked from network); 26 Apr 2009 23:59:56 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 26 Apr 2009 23:59:56 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? Date: Sun, 26 Apr 2009 20:01:34 -0400 Message-ID: In-Reply-To: <49F3CC24.4080403@bolyard.me> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? Thread-Index: AcnGG+z3jEobOB0sR1u1YspjRRTGkwArrABQ References: <20090420204501.A30CD3A6AB4@core3.amsl.com> <49F3A152.3050703@bolyard.me> <49F3CC24.4080403@bolyard.me> From: "Carl Wallace" To: "Nelson B Bolyard" , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: IA0KPiA8aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9pcHIvc2VhcmNoLz9vcHRpb249ZG9j dW1lbnRfc2VhcmNoJmRvY3VtZW50X3NlYXJjaD1kcmFmdC1pZXRmLXBraXgtdGFtcD4NCj4gc2F5 cyAiTm8gSVBSIGRpc2Nsb3N1cmVzIHJlbGF0ZWQgdG8gZHJhZnQtaWV0Zi1wa2l4LXRhbXAgaGF2 ZSBiZWVuDQo+IHN1Ym1pdHRlZCIuDQoNClllcywgd2VsbCwgSSBvcGluZSB0aGF0LCBpbiB0aGUg cGFzdCwgc29tZSBJUFIgZGlzY2xvc3VyZXMgaGF2ZSBjb21lIGZyb20NCmNlcnRhaW4gUkZDIG9y IElEIGF1dGhvcnMgb25seSBhZnRlciBiZWluZyBwcm9tcHRlZC4gIFRoYXQncyB3aHkgSSBhc2tl ZA0KbXkgcXVlc3Rpb24gaW4gdGhlIGZ1dHVyZSB0ZW5zZTogInRvIGJlIG1hZGUiLiAgOikNCg0K DQpbQ1ddIEtlZXBpbmcgd2l0aCBJRVRGIDc0IHNwaXJpdCwgd2l0aCByZWdhcmQgdG8gSVBSIGRp c2Nsb3N1cmVzIGFuZCB0aGUgc2V0IG9mIFRBTSBzcGVjczoNCg0KQXMgZmFyIGFzIEkga25vdywN Cm5vbmUgaGF2ZSBiZWVuIG1hZGUsIHdpbGwgYmUgbWFkZQ0Kb3IgYXJlIGJlaW5nIG1hZGUuDQo= Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3Q2pFmG014179 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 19:51:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3Q2pFuM014178; Sat, 25 Apr 2009 19:51:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from p3plsmtpa01-06.prod.phx3.secureserver.net (p3plsmtpa01-06.prod.phx3.secureserver.net [72.167.82.86]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3Q2p3AM014164 for ; Sat, 25 Apr 2009 19:51:14 -0700 (MST) (envelope-from nelson@bolyard.me) Received: (qmail 14064 invoked from network); 26 Apr 2009 02:51:03 -0000 Received: from unknown (72.167.82.86) by p3plsmtpa01-06.prod.phx3.secureserver.net (72.167.82.86) with ESMTP; 26 Apr 2009 02:51:03 -0000 Message-ID: <49F3CC24.4080403@bolyard.me> Date: Sat, 25 Apr 2009 19:51:16 -0700 From: Nelson B Bolyard Organization: Network Security Services User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.9.1b1pre) Gecko/20081004 NOT Firefox/2.0 SeaMonkey/2.0a2pre MIME-Version: 1.0 To: ietf-pkix@imc.org Subject: Re: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? References: <20090420204501.A30CD3A6AB4@core3.amsl.com> <49F3A152.3050703@bolyard.me> In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul Hoffman wrote, On 2009-04-25 18:14: > At 4:48 PM -0700 4/25/09, Nelson B Bolyard wrote: >> This question is addressed to the authors of this new ID: >> >>> Title : Trust Anchor Management Protocol (TAMP) >>> Author(s) : R. Housley, et al. >>> Filename : draft-ietf-pkix-tamp-02.txt >>> Pages : 84 >>> Date : 2009-04-20 >> >> Are there any IPR disclosures to be made regarding this draft? >> >> Would software that implements this draft, or any aspect of it, be >> stepping on any IPR claims from (or known by) any of the authors of >> that draft? > > > says "No IPR disclosures related to draft-ietf-pkix-tamp have been > submitted". Yes, well, I opine that, in the past, some IPR disclosures have come from certain RFC or ID authors only after being prompted. That's why I asked my question in the future tense: "to be made". :) Regards, /Nelson Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3Q1EuE8010837 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 18:14:56 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3Q1EuHe010836; Sat, 25 Apr 2009 18:14:56 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.20.30.158] (dsl-63-249-108-169.static.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3Q1EpMC010826 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 18:14:55 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <49F3A152.3050703@bolyard.me> References: <20090420204501.A30CD3A6AB4@core3.amsl.com> <49F3A152.3050703@bolyard.me> Date: Sat, 25 Apr 2009 18:14:49 -0700 To: Nelson B Bolyard , ietf-pkix@imc.org From: Paul Hoffman Subject: Re: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? Content-Type: text/plain; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 4:48 PM -0700 4/25/09, Nelson B Bolyard wrote: >This question is addressed to the authors of this new ID: > >> Title : Trust Anchor Management Protocol (TAMP) >> Author(s) : R. Housley, et al. > > Filename : draft-ietf-pkix-tamp-02.txt >> Pages : 84 >> Date : 2009-04-20 > >Are there any IPR disclosures to be made regarding this draft? > >Would software that implements this draft, or any aspect of it, be >stepping on any IPR claims from (or known by) any of the authors of >that draft? says "No IPR disclosures related to draft-ietf-pkix-tamp have been submitted". --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3PNmXAo006364 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 16:48:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3PNmXxK006363; Sat, 25 Apr 2009 16:48:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtpauth17.prod.mesa1.secureserver.net (smtpauth17.prod.mesa1.secureserver.net [64.202.165.29]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3PNmMN9006351 for ; Sat, 25 Apr 2009 16:48:32 -0700 (MST) (envelope-from nelson@bolyard.me) Received: (qmail 30872 invoked from network); 25 Apr 2009 23:48:21 -0000 Received: from unknown (64.202.165.29) by smtpauth17.prod.mesa1.secureserver.net (64.202.165.29) with ESMTP; 25 Apr 2009 23:48:21 -0000 Message-ID: <49F3A152.3050703@bolyard.me> Date: Sat, 25 Apr 2009 16:48:34 -0700 From: Nelson B Bolyard Organization: Network Security Services User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.9.1b1pre) Gecko/20081004 NOT Firefox/2.0 SeaMonkey/2.0a2pre MIME-Version: 1.0 To: ietf-pkix@imc.org Subject: IPR disclosures for draft-ietf-pkix-tamp-02.txt ? References: <20090420204501.A30CD3A6AB4@core3.amsl.com> In-Reply-To: <20090420204501.A30CD3A6AB4@core3.amsl.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This question is addressed to the authors of this new ID: > Title : Trust Anchor Management Protocol (TAMP) > Author(s) : R. Housley, et al. > Filename : draft-ietf-pkix-tamp-02.txt > Pages : 84 > Date : 2009-04-20 Are there any IPR disclosures to be made regarding this draft? Would software that implements this draft, or any aspect of it, be stepping on any IPR claims from (or known by) any of the authors of that draft? Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3PFiENJ057918 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 08:44:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3PFiEMJ057917; Sat, 25 Apr 2009 08:44:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout2-sn1.fre.skanova.net (pne-smtpout2-sn1.fre.skanova.net [81.228.11.159]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3PFi3fd057898 for ; Sat, 25 Apr 2009 08:44:14 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout2-sn1.fre.skanova.net (7.3.129) id 49CCDA0D00420964 for ietf-pkix@imc.org; Sat, 25 Apr 2009 17:44:02 +0200 Message-ID: <15CF6442567042599308AEBA99A9C2B9@AndersPC> From: "Anders Rundgren" To: "IETF-pkix" References: In-Reply-To: Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt Date: Sat, 25 Apr 2009 17:44:14 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I do in no way object to this as an IETF WG item, however, I would like to point out that there is another work-in-progress that fulfills about the same objectives, albeit in a rather different way. This work-item is coined KeyGen2, and started as a universal credential provisioning and management protocol, but recently morphed into something which could be described as a unified credential solution for consumers with USB sticks and mobile phones as the primary target containers. Anyway, in KeyGen2 logotypes are linked to credentials not through certificate extensions, but through an image "payload" during the provisioning phase, which can be securely tied to the certificate. Is there any advantage with this one may wonder? Maybe nothing earth-shattering, but it does relieve CAs from *publishing* gazillions of personalized images. The only disadvantage I can see is that the scheme is incompatible with space-limited, single-issuer smart-cards but these are [IMHO] not that interesting for this purpose since they typically already have a logotype or something similar printed on the surface while the multi-issuer schemes imposed by mobile phones really need logotypes. In KeyGen2 the size and type of a logotype is negotiated during the issuance phase. This negotiation also includes thumbprint versions to be used in credential selection and management dialogs. A preliminary version is currently available for testing on: http://keycenter.webpki.org Anders Rundgren Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3P7gHbf028917 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 25 Apr 2009 00:42:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3P7gHcW028916; Sat, 25 Apr 2009 00:42:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3P7g4Qm028901 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sat, 25 Apr 2009 00:42:16 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 7111 invoked from network); 25 Apr 2009 07:42:05 -0000 Received: from s34.loopia.se (HELO s57.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 25 Apr 2009 07:42:05 -0000 Received: (qmail 52959 invoked from network); 25 Apr 2009 07:42:02 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s57.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 25 Apr 2009 07:42:02 -0000 User-Agent: Microsoft-Entourage/12.17.0.090302 Date: Sat, 25 Apr 2009 09:41:56 +0200 Subject: Re: I-D ACTION:draft-santesson-pkix-certimage-00.txt From: Stefan Santesson To: IETF-pkix Message-ID: Thread-Topic: I-D ACTION:draft-santesson-pkix-certimage-00.txt Thread-Index: AcnFeU7EH8RomgkUr0WEBll15bEIzw== In-Reply-To: <20090423223001.969093A731E@core3.amsl.com> Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: All, The first certificate image draft is now posted after an initial design process. http://tools.ietf.org/html/draft-santesson-pkix-certimage-00 This issue was presented at the IETF meeting in San Francisco. See minutes at: http://tools.ietf.org/wg/pkix/minutes Input to the initial design process, especially regarding image formats, have been received from CA and browser vendors As author I would like to request the PKIX WG to accept this as PKIX work item. /Stefan On 09-04-24 12:30 AM, "Internet-Drafts@ietf.org" wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > > > Title : Internet X.509 Public Key Infrastructure: Certificate Image > Author(s) : S. Santesson, R. Housley, S. Bajaj, L. Rosenthol > Filename : draft-santesson-pkix-certimage-00.txt > Pages : 10 > Date : 2009-4-21 > > This document specifies a method to bind a visual representation of a > certificate in the form of a certificate image to a [RFC5280] public > key certificate by defining a new otherLogos image type according to > [RFC3709]. > > A URL for this Internet-Draft is: > http://www.ietf.org/internet-drafts/draft-santesson-pkix-certimage-00.txt > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > Below is the data which will enable a MIME compliant mail reader > implementation to automatically retrieve the ASCII version of the > Internet-Draft. > _______________________________________________ > I-D-Announce mailing list > I-D-Announce@ietf.org > https://www.ietf.org/mailman/listinfo/i-d-announce > Internet-Draft directories: http://www.ietf.org/shadow.html > or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3OIKDJd086869 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 24 Apr 2009 11:20:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3OIKDQi086868; Fri, 24 Apr 2009 11:20:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mailhub2.dartmouth.edu (mailhub2.dartmouth.edu [129.170.17.107]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3OIK11c086852 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 24 Apr 2009 11:20:12 -0700 (MST) (envelope-from Massimiliano.Pala@Dartmouth.edu) Received: from newblitzen.Dartmouth.EDU (newblitzen.dartmouth.edu [129.170.208.36]) by mailhub2.dartmouth.edu (8.13.5/DND2.0/8.13.5) with ESMTP id n3OGTpZ8031848 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 24 Apr 2009 14:19:03 -0400 X-Disclaimer: This message was received from outside Dartmouth's BlitzMail system. Received: from mm.cs.dartmouth.edu [129.170.214.89] by newblitzen.Dartmouth.EDU (Mac) via SMTP for ietf-pkix@imc.org id <146797827>; 24 Apr 2009 14:19:03 -0400 Message-ID: <49F203A6.3050706@Dartmouth.edu> Date: Fri, 24 Apr 2009 14:23:34 -0400 From: Massimiliano Pala Organization: Dartmouth College - Computer Science Department User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: pkix Subject: PRQP - Updates Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms090308010807090904030808" X-MailScanner: Found to be clean by mailhub.Dartmouth.EDU X-MailScanner-From: massimiliano.pala@dartmouth.edu Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a cryptographically signed message in MIME format. --------------ms090308010807090904030808 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Hi all, while proceeding in deploying a series of PRQP servers for multiple CAs we realized that it could be useful to add a new optional field in the resource identifier data structure (both for the request and the response). In particular I think an OID that identifies the data that is pointed by the URL could be interesting. An example of this would be asking for a particular policy document from a CA: the OID of the specific policy could be copied from the certificate into the PRQP request so that only the URL of the specific policy is returned instead of the URLs of all the configured certPolicy services. Many other examples could be added here, I guess. What do you think ? For the ASN.1 experts: shall I explicitly add references to the OIDs for the know type of data in the RFC ? If so, is there a place with all the available OIDs for the data structures ? Ciao, Max -- Best Regards, Massimiliano Pala --o------------------------------------------------------------------------ Massimiliano Pala [OpenCA Project Manager] Massimiliano.Pala@dartmouth.edu project.manager@openca.org Dartmouth Computer Science Dept Home Phone: +1 (603) 369-9332 PKI/Trust Laboratory Work Phone: +1 (603) 646-9179 --o------------------------------------------------------------------------ People who think they know everything are a great annoyance to those of us who do. -- Isaac Asimov --------------ms090308010807090904030808 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJIjCC BI0wggN1oAMCAQICAhpTMA0GCSqGSIb3DQEBBQUAMHcxEzARBgoJkiaJk/IsZAEZFgNlZHUx GTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0 bW91dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMTAeFw0wNTExMDgy MDMzMDZaFw0wOTExMDkyMDMzMDZaMIHBMRMwEQYKCZImiZPyLGQBGRYDZWR1MRkwFwYKCZIm iZPyLGQBGRYJZGFydG1vdXRoMQswCQYDVQQGEwJVUzEaMBgGA1UEChMRRGFydG1vdXRoIENv bGxlZ2UxGjAYBgoJkiaJk/IsZAEBEwoxMjI1NjAyOTQ3MRowGAYDVQQDExFNYXNzaW1pbGlh bm8gUGFsYTEuMCwGCSqGSIb3DQEJARYfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVk dTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsv8obBpbhPixgdyIJj7UN0GYRNhsgWHB muCE5j8v8IvCSJWRF9spKoR0NBYgOfJu8DwQuKTIgrvbp0EC3ikrneotL4KTGD1IqWz/bSXL UR/bZAsc0r9PrvCUsZOi7wbijy784gOuqQUCJ2fJwKwk5SJ3RBaPnUROQXTp+LPSK8MCAwEA AaOCAVowggFWMA4GA1UdDwEB/wQEAwIF4DARBglghkgBhvhCAQEEBAMCBaAwgaIGA1UdIASB mjCBlzCBlAYKKwYBBAFBAgEBATCBhTA9BggrBgEFBQcCAjAxMBgWEURhcnRtb3V0aCBDb2xs ZWdlMAMCAQEaFURhcnRtb3V0aCBDb2xsZWdlIENQUzBEBggrBgEFBQcCARY4aHR0cDovL3d3 dy5kYXJ0bW91dGguZWR1L35wa2lsYWIvRGFydG1vdXRoQ1BTXzRTZXAwMy5wZGYwKgYDVR0R BCMwIYEfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVkdTAfBgNVHSMEGDAWgBQ/wNbH p08Afu8GmWdsvJYeTaN3EjA/BggrBgEFBQcBAQQzMDEwLwYIKwYBBQUHMAGGI2h0dHA6Ly9j b2xsZWdlY2EuZGFydG1vdXRoLmVkdS9vY3NwMA0GCSqGSIb3DQEBBQUAA4IBAQDEYIWmG3Ht wcgFiBbrYKp7YpI62hgAw9I3Dj9Ai+etQcMDZL8cWg3Kd7DwYHDkLxO7jl518HIJCk8Elk+Z 3Y2c0rR+c9WLuxE+EHEUmQg2AbgxzRGZAeMXj7jrv5w75IWiXBrW3SdDkjVH6MQFZVP1CBk7 PF3/+dzmiO6E5g4cVtphPSdK2qtnX7Sh0zdePzeE+e0BTnsWdN0yHgKabKx3dCiEnQXt96sA Jf5ckg7fFLcplohwWlWJCpk8WwnJM0QGw3xbrZvLk+kIQgyh0sn2va4FgA1ae29cJ1d2NurA Z+LMdei9/ZbzBeMoD9XPSYyj7zLuVXGLF/JQQoPywk5oMIIEjTCCA3WgAwIBAgICGlMwDQYJ KoZIhvcNAQEFBQAwdzETMBEGCgmSJomT8ixkARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRh cnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNVBAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYD VQQDExNEYXJ0bW91dGggQ2VydEF1dGgxMB4XDTA1MTEwODIwMzMwNloXDTA5MTEwOTIwMzMw NlowgcExEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgx CzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29sbGVnZTEaMBgGCgmSJomT8ixk AQETCjEyMjU2MDI5NDcxGjAYBgNVBAMTEU1hc3NpbWlsaWFubyBQYWxhMS4wLAYJKoZIhvcN AQkBFh9NYXNzaW1pbGlhbm8uUGFsYUBEYXJ0bW91dGguZWR1MIGfMA0GCSqGSIb3DQEBAQUA A4GNADCBiQKBgQCy/yhsGluE+LGB3IgmPtQ3QZhE2GyBYcGa4ITmPy/wi8JIlZEX2ykqhHQ0 FiA58m7wPBC4pMiCu9unQQLeKSud6i0vgpMYPUipbP9tJctRH9tkCxzSv0+u8JSxk6LvBuKP LvziA66pBQInZ8nArCTlIndEFo+dRE5BdOn4s9IrwwIDAQABo4IBWjCCAVYwDgYDVR0PAQH/ BAQDAgXgMBEGCWCGSAGG+EIBAQQEAwIFoDCBogYDVR0gBIGaMIGXMIGUBgorBgEEAUECAQEB MIGFMD0GCCsGAQUFBwICMDEwGBYRRGFydG1vdXRoIENvbGxlZ2UwAwIBARoVRGFydG1vdXRo IENvbGxlZ2UgQ1BTMEQGCCsGAQUFBwIBFjhodHRwOi8vd3d3LmRhcnRtb3V0aC5lZHUvfnBr aWxhYi9EYXJ0bW91dGhDUFNfNFNlcDAzLnBkZjAqBgNVHREEIzAhgR9NYXNzaW1pbGlhbm8u UGFsYUBEYXJ0bW91dGguZWR1MB8GA1UdIwQYMBaAFD/A1senTwB+7waZZ2y8lh5No3cSMD8G CCsGAQUFBwEBBDMwMTAvBggrBgEFBQcwAYYjaHR0cDovL2NvbGxlZ2VjYS5kYXJ0bW91dGgu ZWR1L29jc3AwDQYJKoZIhvcNAQEFBQADggEBAMRghaYbce3ByAWIFutgqntikjraGADD0jcO P0CL561BwwNkvxxaDcp3sPBgcOQvE7uOXnXwcgkKTwSWT5ndjZzStH5z1Yu7ET4QcRSZCDYB uDHNEZkB4xePuOu/nDvkhaJcGtbdJ0OSNUfoxAVlU/UIGTs8Xf/53OaI7oTmDhxW2mE9J0ra q2dftKHTN14/N4T57QFOexZ03TIeAppsrHd0KISdBe33qwAl/lySDt8UtymWiHBaVYkKmTxb CckzRAbDfFutm8uT6QhCDKHSyfa9rgWADVp7b1wnV3Y26sBn4sx16L39lvMF4ygP1c9JjKPv Mu5VcYsX8lBCg/LCTmgxggL4MIIC9AIBATB9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAX BgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91 dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwCQYFKw4DAhoF AKCCAdEwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMDkwNDI0 MTgyMzM0WjAjBgkqhkiG9w0BCQQxFgQUjxACC57TCSlj/0G9etIfltlW+8UwUgYJKoZIhvcN AQkPMUUwQzAKBggqhkiG9w0DBzAOBggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYF Kw4DAgcwDQYIKoZIhvcNAwICASgwgYwGCSsGAQQBgjcQBDF/MH0wdzETMBEGCgmSJomT8ixk ARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRhcnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNV BAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYDVQQDExNEYXJ0bW91dGggQ2VydEF1dGgxAgIa UzCBjgYLKoZIhvcNAQkQAgsxf6B9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJ k/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29s bGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwDQYJKoZIhvcNAQEBBQAE gYB+zkoM7yYhgKmUfLWaaor6gR84oW1XJkNbetbuMwKx5j5T+3bQ4GzW30cIem5Yh1Wwp9jz 6DCnZXsrOHVJMAEYKl0ZKCQeOeoGpPlIBbx7ecZ0PfkY+VS5dB4TJFR50Ja9mg5INzEWIixw sQxEc5GWPObMN8xj6fbZ2inwDQgRvwAAAAAAAA== --------------ms090308010807090904030808-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3KKkJKp084743 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 20 Apr 2009 13:46:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3KKkIvW084741; Mon, 20 Apr 2009 13:46:18 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3KKkIkq084728 for ; Mon, 20 Apr 2009 13:46:18 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id 9E2A23A6A9A; Mon, 20 Apr 2009 13:45:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-ta-format-02.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090420204501.9E2A23A6A9A@core3.amsl.com> Date: Mon, 20 Apr 2009 13:45:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Trust Anchor Format Author(s) : R. Housley, et al. Filename : draft-ietf-pkix-ta-format-02.txt Pages : 17 Date : 2009-04-20 This document describes a structure for representing trust anchor information. A trust anchor is an authoritative entity represented by a public key and associated data. The public key is used to verify digital signatures and the associated data is used to constrain the types of information or actions for which the trust anchor is authoritative. The structures defined in this document are intended to satisfy the format-related requirements defined in Trust Anchor Management Requirements. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-ta-format-02.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-ta-format-02.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-20133758.I-D@ietf.org> --NextPart-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3KKkIxR084742 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 20 Apr 2009 13:46:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3KKkIRc084740; Mon, 20 Apr 2009 13:46:18 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3KKkIxB084727 for ; Mon, 20 Apr 2009 13:46:18 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id A30CD3A6AB4; Mon, 20 Apr 2009 13:45:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-tamp-02.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090420204501.A30CD3A6AB4@core3.amsl.com> Date: Mon, 20 Apr 2009 13:45:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Trust Anchor Management Protocol (TAMP) Author(s) : R. Housley, et al. Filename : draft-ietf-pkix-tamp-02.txt Pages : 84 Date : 2009-04-20 This document describes a transport independent protocol for the management of trust anchors and community identifiers stored in a trust anchor store. The protocol makes use of the Cryptographic Message Syntax (CMS), and a digital signature is used to provide integrity protection and data origin authentication. The protocol can be used to manage trust anchor stores containing trust anchors represented as Certificate, TBSCertificate or TrustAnchorInfo objects. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-tamp-02.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-tamp-02.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-20133811.I-D@ietf.org> --NextPart-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3ELfxO6058555 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 14 Apr 2009 14:41:59 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3ELfxTJ058554; Tue, 14 Apr 2009 14:41:59 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.newbay.com (87-198-172-198.ptr.magnet.ie [87.198.172.198]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3ELfl83058543 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 14 Apr 2009 14:41:58 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.newbay.com (Postfix) with ESMTP id C6CF21003F520 for ; Tue, 14 Apr 2009 22:41:45 +0100 (IST) X-Virus-Scanned: amavisd-new at newbay.com Received: from mail.newbay.com ([127.0.0.1]) by localhost (mail.newbay.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rLOj4SVxG6lB for ; Tue, 14 Apr 2009 22:41:43 +0100 (IST) Received: from mail01.newbay.com (mail01.newbay.com [192.168.12.25]) by mail.newbay.com (Postfix) with ESMTP id 17E501003F4D5 for ; Tue, 14 Apr 2009 22:41:42 +0100 (IST) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail01.newbay.com (Postfix) with ESMTP id D980C7C306 for ; Tue, 14 Apr 2009 22:41:42 +0100 (IST) X-Virus-Scanned: amavisd-new at newbay.com Received: from mail01.newbay.com ([127.0.0.1]) by localhost (mail01.newbay.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jq+SqqZLHaDa for ; Tue, 14 Apr 2009 22:41:39 +0100 (IST) Received: from [10.87.48.3] (dsl-102-234.cust.imagine.ie [87.232.102.234]) by mail01.newbay.com (Postfix) with ESMTP id E243B7C2C4 for ; Tue, 14 Apr 2009 22:41:38 +0100 (IST) Message-Id: <6223D26C-3746-4F42-B6B3-457C2E24FE01@cs.tcd.ie> From: Stephen Farrell To: "ietf-pkix@imc.org" In-Reply-To: <20090414181501.5F9BE3A6E5A@core3.amsl.com> Content-Type: text/plain; charset=us-ascii; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit X-Mailer: iPhone Mail (5H11) Mime-Version: 1.0 (iPhone Mail 5H11) Subject: Re: I-D Action:draft-ietf-pkix-other-certs-03.txt Date: Tue, 14 Apr 2009 22:29:03 +0100 References: <20090414181501.5F9BE3A6E5A@core3.amsl.com> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Think this addresses the one LC comment so its hopefully ready to go forward, S. On 14 Apr 2009, at 19:15, Internet-Drafts@ietf.org wrote: > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the Public-Key Infrastructure (X.509) > Working Group of the IETF. > > > Title : Other Certificates Extension > Author(s) : S. Farrell > Filename : draft-ietf-pkix-other-certs-03.txt > Pages : 8 > Date : 2009-04-14 > > Some applications that associate state information with public key > certificates can benefit from a way to link together a set of > certificates belonging to the same end entity that can safely be > considered to be equivalent for the purposes of referencing that > application state information. This memo defines a certificate > extension that allows applications to establish the required linkage > without introducing a new application protocol data unit. > > A URL for this Internet-Draft is: > http://www.ietf.org/internet-drafts/draft-ietf-pkix-other-certs-03.txt > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > Below is the data which will enable a MIME compliant mail reader > implementation to automatically retrieve the ASCII version of the > Internet-Draft. > Content-Type: text/plain Content-ID: <2009-04-14111020.I-D@ietf.org > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3EIGEmq045849 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 14 Apr 2009 11:16:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3EIGEsp045848; Tue, 14 Apr 2009 11:16:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3EIGDkt045840 for ; Tue, 14 Apr 2009 11:16:13 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id 5F9BE3A6E5A; Tue, 14 Apr 2009 11:15:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-other-certs-03.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090414181501.5F9BE3A6E5A@core3.amsl.com> Date: Tue, 14 Apr 2009 11:15:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Other Certificates Extension Author(s) : S. Farrell Filename : draft-ietf-pkix-other-certs-03.txt Pages : 8 Date : 2009-04-14 Some applications that associate state information with public key certificates can benefit from a way to link together a set of certificates belonging to the same end entity that can safely be considered to be equivalent for the purposes of referencing that application state information. This memo defines a certificate extension that allows applications to establish the required linkage without introducing a new application protocol data unit. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-other-certs-03.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-other-certs-03.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-14111020.I-D@ietf.org> --NextPart-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3EDV5Z4022355 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 14 Apr 2009 06:31:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3EDV5OF022353; Tue, 14 Apr 2009 06:31:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3EDUsYL022334 for ; Tue, 14 Apr 2009 06:31:04 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 22045 invoked from network); 14 Apr 2009 13:29:32 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 14 Apr 2009 13:29:31 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Tue, 14 Apr 2009 09:30:49 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAlknTSAAAy16cAAbna1AAAk2LvA= References: From: "Santosh Chokhani" To: "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This also leads to the conclusion made in the initial email on this thread that enhancing 2560 for newer hashing and signature algorithm is a matter of requiring mandatory or optional support for added algorithms. As it so happens, the algorithm identifiers for these are already registered through other RFCs. > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 > Sent: Tuesday, April 14, 2009 5:03 AM > To: Santosh Chokhani; Kelvin Yiu; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > This is also my opinion. >=20 > /Stefan >=20 >=20 > On 09-04-13 9:53 PM, "Santosh Chokhani"=20 > wrote: >=20 > >=20 > > It seems that leaving responderID as is is our best course=20 > of action. > > Since this field and its match is not security relevant, I=20 > do not see=20 > > this particular dependence on SHA-1 as problematic. > >=20 > >> -----Original Message----- > >> From: Kelvin Yiu [mailto:kelviny@exchange.microsoft.com] > >> Sent: Monday, April 13, 2009 2:50 PM > >> To: Santosh Chokhani; Stefan Santesson; IETF-pkix > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >> [Sorry for jumping on this thread so late] > >>=20 > >> Santosh, > >>=20 > >> The OCSP client in Windows Vista uses the responderID=20 > field to find=20 > >> the OCSP signer cert in the cert bag and expects the key=20 > hash to be=20 > >> SHA-1. Otherwise, the OCSP response will be rejected.=20 > Upgrading from=20 > >> SHA-1 will be problematic. > >>=20 > >> Kelvin Yiu > >> Lead Program Manager, Windows Security Microsoft > >>=20 > >>=20 > >> -----Original Message----- > >> From: owner-ietf-pkix@mail.imc.org > >> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > >> Sent: Wednesday, April 01, 2009 1:32 PM > >> To: Stefan Santesson; IETF-pkix > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >>=20 > >>=20 > >> Stefan, > >>=20 > >> See responses in-line. > >>=20 > >>> -----Original Message----- > >>> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >>> Sent: Wednesday, April 01, 2009 2:34 PM > >>> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>=20 > >>> Santosh, > >>>=20 > >>> If you are talking about adding other options to calculate > >> the KeyHash > >>> value in ResponderID then I strongly disagree. > >>>=20 > >>> If you add unspecified options you change the properties of > >> the field > >>> from deterministic to a completely unknown value. > >>> It does not matter if RFC2560 isn't explicit in its > >> description of the > >>> use of the field. The fact is that OCSP explicitly defines > >> this value > >>> and as such will allow a client to deterministically compare this=20 > >>> value with the certificate selected to validate the response=20 > >>> signature. > >>=20 > >> I hope no one is doing the matching of Responder ID with hash of a=20 > >> key in place of responder signature verification. That=20 > would be real=20 > >> bad. > >>=20 > >>> If you allow > >>> other ways to calculate the value but do not provide any means to=20 > >>> signal what method that was used, then this feature is lost. > >>=20 > >> The most common use will be to use this field to prioritize the=20 > >> certificates of the responder to use for sigature=20 > verification on the=20 > >> response. > >>=20 > >>>=20 > >>> In worst case we will cause current implementation to fail. > >>=20 > >> That is why I am asking what problems if any will the vendors have. > >>=20 > >>>=20 > >>> I really don't think its worth the effort to change this=20 > field. We=20 > >>> have a very large base of implementations that we really > >> don't want to > >>> mess up unless its absolutely necessary. > >>=20 > >> So, we agree that leaving this field hard wired to SHA-1 is ok and=20 > >> 2560 can easily accommodate new hash functions. Right? > >>=20 > >> My only reason to align with 5280 is that if some one were=20 > ever want=20 > >> to strip off SHA-1 altogether from their Responder or client,=20 > >> permitting other methods does it. > >>=20 > >>>=20 > >>> As the only property of this field is to provide a convenient=20 > >>> identifier, it is far from absolutely necessary to change it. > >>> Remember that there is a second choice to to identify=20 > responder by=20 > >>> name. For names we have accepted the possibility of=20 > collisions. In=20 > >>> that comparison, upgrading from SHA-1 is really redundant. > >>>=20 > >>> /Stefan > >>>=20 > >>>=20 > >>>=20 > >>>=20 > >>> On 4/1/09 4:05 PM, "Santosh Chokhani" > >> wrote: > >>>=20 > >>>>=20 > >>>> My resident ASN.1 expert apprised me of the fact that > >>> adding a choice > >>>> will break backward compatibility. Thus, extension is a > >>> fifth option > >>>> (probably third in the priority). > >>>>=20 > >>>> Based on what I know of OCSP implementations, not changing > >>> anything in > >>>> terms of bits on the wire and aligning the Key ID with SKID > >>> in 5280 is > >>>> the best approach. I do not think it will hurt backward > >>> compatibility. > >>>>=20 > >>>> OCSP Responder and OCSP client vendors should speak up if I > >>> am wrong. > >>>>=20 > >>>>> -----Original Message----- > >>>>> From: Santosh Chokhani > >>>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>>> To: 'Massimiliano Pala'; IETF-pkix > >>>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>> Max, > >>>>>=20 > >>>>> I do not see where and what extension we need to add for > >>> other digest > >>>>> algorithm. > >>>>>=20 > >>>>> For key id, we need to enhance or broaden the options. > >>>>>=20 > >>>>>> -----Original Message----- > >>>>>> From: owner-ietf-pkix@mail.imc.org=20 > >>>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >>> Massimiliano Pala > >>>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>>> To: IETF-pkix > >>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>=20 > >>>>>> Hi all, > >>>>>>=20 > >>>>>> as I said during last meeting - as the use of SHA-1 does > >>>>> not have any > >>>>>> security implication in the OCSP, another viable way > >> would be to > >>>>>> define an extension where other digest algorithms can be > >>>>> added to the > >>>>>> request/responses. > >>>>>>=20 > >>>>>> It is a simple addition and does not require any change in > >>>>> the RFC, it > >>>>>> can be done as a separate document for those who what to > >>> use other > >>>>>> digest algorithms. > >>>>>>=20 > >>>>>> After all, isn't this an example of why we allow > >>> extensions to the > >>>>>> messages ? > >>>>>>=20 > >>>>>> Later, > >>>>>> Max > >>>>>>=20 > >>>>>>=20 > >>>>>> Santosh Chokhani wrote: > >>>>>>> Tom, > >>>>>>>=20 > >>>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>>>=20 > >>>>>>> I would not add anything about matching this field with > >>>>>> anything since > >>>>>>> RFC 2560 does not say anything about it. > >>>>>>>=20 > >>>>>>> If one were to add something, one should describe how this > >>>>>> field can > >>>>>>> be used to select from multiple Responder certificates. > >>>>>>>=20 > >>>>>>>> -----Original Message----- > >>>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>>> To: Santosh Chokhani > >>>>>>>> Cc: IETF-pkix > >>>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>>>=20 > >>>>>>>> Santosh: > >>>>>>>>=20 > >>>>>>>> The RFC 5280 method just describes "two common > >>>>> methods for > >>>>>>>> generating key identifiers from the public key" > >>>>>>>> and says that other methods are acceptable. The comment > >>>>>> to KeyHash > >>>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>>> the same > >>>>>>>> field as SKID, and I would support either stating "if the > >>>>>> KeyHash is > >>>>>>>> not precisely 20 octets long, it should be matched > >> against the > >>>>>>>> Subject Key Identifier extension of the signing > >> certificate" or > >>>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>>> matches the value > >>>>>>>> of SKID. > >>>>>>>>=20 > >>>>>>>> Tom Gindin > >>>>>>>>=20 > >>>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>>> those of my > >>>>>>>> employer > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>> "Santosh Chokhani" Sent by: > >>>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>>> 03/26/2009 10:39 PM > >>>>>>>>=20 > >>>>>>>> To > >>>>>>>> "IETF-pkix" cc > >>>>>>>>=20 > >>>>>>>> Subject > >>>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>>> difficult to deal > >>>>>>>> with. > >>>>>>>>=20 > >>>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>>> optional. We can > >>>>>>>> update this to add SHA-2 series as optional. > >>>>>>>>=20 > >>>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>>> different than > >>>>>>>> key ID extensions in RFC 5280. Here are some options > >>> in order of > >>>>>>>> preference: > >>>>>>>>=20 > >>>>>>>> 1. Align the language with subject key ID language > >> in RFC 5280. > >>>>>>>>=20 > >>>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>>> relevant. RFC > >>>>>>>> 2560 does not even describe how to use this field. So, > >>>>>> having SHA-1 > >>>>>>>> and accidental or intentional collisions will not hurt the > >>>>>> security > >>>>>>>> of the protocol. > >>>>>>>>=20 > >>>>>>>> 3. If you do not believe in KISS principle, you can > >>>>>> define another > >>>>>>>> response type and enhance the key ID ASN.1 syntax so > >> that hash > >>>>>>>> algorithm is identified. > >>>>>>>>=20 > >>>>>>>> 4. Another option is for the Responder to use the > >> same hashing > >>>>>>>> algorithm as the one in the first certID entry. > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>> Santosh Chokhani > >>>>>>>> CygnaCom Solutions > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>=20 > >>>>>>=20 > >>>>>> -- > >>>>>>=20 > >>>>>> Best Regards, > >>>>>>=20 > >>>>>> Massimiliano Pala > >>>>>>=20 > >>>>>> --o----------------------------------------------------------- > >>>>>> ------------- > >>>>>> Massimiliano Pala [OpenCA Project Manager]=20 > >>>>>> Massimiliano.Pala@dartmouth.edu > >>>>>> =20 > >>>>>> project.manager@openca.org > >>>>>>=20 > >>>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>>> (603) 369-9332 > >>>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>>> (603) 646-9179 > >>>>>> --o----------------------------------------------------------- > >>>>>> ------------- > >>>>>>=20 > >>>>>> People who think they know everything are a great annoyance > >>>>> to those > >>>>>> of us who do. > >>>>>> -- > >>>>>> Isaac Asimov > >>>>>>=20 > >>>>>=20 > >>>>=20 > >>>=20 > >>>=20 > >>>=20 > >>=20 > >>=20 > >>=20 > >=20 >=20 >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3E93D8O000608 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 14 Apr 2009 02:03:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3E93DQY000607; Tue, 14 Apr 2009 02:03:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3E92xpM000596 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 14 Apr 2009 02:03:11 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 30871 invoked from network); 14 Apr 2009 09:03:01 -0000 Received: from s34.loopia.se (HELO s29.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 14 Apr 2009 09:03:01 -0000 Received: (qmail 83212 invoked from network); 14 Apr 2009 09:02:57 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s29.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 14 Apr 2009 09:02:57 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Tue, 14 Apr 2009 11:02:52 +0200 Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 From: Stefan Santesson To: Santosh Chokhani , Kelvin Yiu , IETF-pkix Message-ID: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAlknTSAAAy16cAAbna1A In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is also my opinion. /Stefan On 09-04-13 9:53 PM, "Santosh Chokhani" wrote: > > It seems that leaving responderID as is is our best course of action. > Since this field and its match is not security relevant, I do not see > this particular dependence on SHA-1 as problematic. > >> -----Original Message----- >> From: Kelvin Yiu [mailto:kelviny@exchange.microsoft.com] >> Sent: Monday, April 13, 2009 2:50 PM >> To: Santosh Chokhani; Stefan Santesson; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >> >> [Sorry for jumping on this thread so late] >> >> Santosh, >> >> The OCSP client in Windows Vista uses the responderID field >> to find the OCSP signer cert in the cert bag and expects the >> key hash to be SHA-1. Otherwise, the OCSP response will be >> rejected. Upgrading from SHA-1 will be problematic. >> >> Kelvin Yiu >> Lead Program Manager, Windows Security >> Microsoft >> >> >> -----Original Message----- >> From: owner-ietf-pkix@mail.imc.org >> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani >> Sent: Wednesday, April 01, 2009 1:32 PM >> To: Stefan Santesson; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >> >> >> >> Stefan, >> >> See responses in-line. >> >>> -----Original Message----- >>> From: Stefan Santesson [mailto:stefan@aaa-sec.com] >>> Sent: Wednesday, April 01, 2009 2:34 PM >>> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>> >>> Santosh, >>> >>> If you are talking about adding other options to calculate >> the KeyHash >>> value in ResponderID then I strongly disagree. >>> >>> If you add unspecified options you change the properties of >> the field >>> from deterministic to a completely unknown value. >>> It does not matter if RFC2560 isn't explicit in its >> description of the >>> use of the field. The fact is that OCSP explicitly defines >> this value >>> and as such will allow a client to deterministically compare this >>> value with the certificate selected to validate the response >>> signature. >> >> I hope no one is doing the matching of Responder ID with hash >> of a key in place of responder signature verification. That >> would be real bad. >> >>> If you allow >>> other ways to calculate the value but do not provide any means to >>> signal what method that was used, then this feature is lost. >> >> The most common use will be to use this field to prioritize >> the certificates of the responder to use for sigature >> verification on the response. >> >>> >>> In worst case we will cause current implementation to fail. >> >> That is why I am asking what problems if any will the vendors have. >> >>> >>> I really don't think its worth the effort to change this field. We >>> have a very large base of implementations that we really >> don't want to >>> mess up unless its absolutely necessary. >> >> So, we agree that leaving this field hard wired to SHA-1 is >> ok and 2560 can easily accommodate new hash functions. Right? >> >> My only reason to align with 5280 is that if some one were >> ever want to strip off SHA-1 altogether from their Responder >> or client, permitting other methods does it. >> >>> >>> As the only property of this field is to provide a convenient >>> identifier, it is far from absolutely necessary to change it. >>> Remember that there is a second choice to to identify responder by >>> name. For names we have accepted the possibility of collisions. In >>> that comparison, upgrading from SHA-1 is really redundant. >>> >>> /Stefan >>> >>> >>> >>> >>> On 4/1/09 4:05 PM, "Santosh Chokhani" >> wrote: >>> >>>> >>>> My resident ASN.1 expert apprised me of the fact that >>> adding a choice >>>> will break backward compatibility. Thus, extension is a >>> fifth option >>>> (probably third in the priority). >>>> >>>> Based on what I know of OCSP implementations, not changing >>> anything in >>>> terms of bits on the wire and aligning the Key ID with SKID >>> in 5280 is >>>> the best approach. I do not think it will hurt backward >>> compatibility. >>>> >>>> OCSP Responder and OCSP client vendors should speak up if I >>> am wrong. >>>> >>>>> -----Original Message----- >>>>> From: Santosh Chokhani >>>>> Sent: Tuesday, March 31, 2009 12:51 PM >>>>> To: 'Massimiliano Pala'; IETF-pkix >>>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> >>>>> Max, >>>>> >>>>> I do not see where and what extension we need to add for >>> other digest >>>>> algorithm. >>>>> >>>>> For key id, we need to enhance or broaden the options. >>>>> >>>>>> -----Original Message----- >>>>>> From: owner-ietf-pkix@mail.imc.org >>>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of >>> Massimiliano Pala >>>>>> Sent: Tuesday, March 31, 2009 1:37 PM >>>>>> To: IETF-pkix >>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>> >>>>>> Hi all, >>>>>> >>>>>> as I said during last meeting - as the use of SHA-1 does >>>>> not have any >>>>>> security implication in the OCSP, another viable way >> would be to >>>>>> define an extension where other digest algorithms can be >>>>> added to the >>>>>> request/responses. >>>>>> >>>>>> It is a simple addition and does not require any change in >>>>> the RFC, it >>>>>> can be done as a separate document for those who what to >>> use other >>>>>> digest algorithms. >>>>>> >>>>>> After all, isn't this an example of why we allow >>> extensions to the >>>>>> messages ? >>>>>> >>>>>> Later, >>>>>> Max >>>>>> >>>>>> >>>>>> Santosh Chokhani wrote: >>>>>>> Tom, >>>>>>> >>>>>>> Adding a new choice and aligning it with 5280 SKID is fine. >>>>>>> >>>>>>> I would not add anything about matching this field with >>>>>> anything since >>>>>>> RFC 2560 does not say anything about it. >>>>>>> >>>>>>> If one were to add something, one should describe how this >>>>>> field can >>>>>>> be used to select from multiple Responder certificates. >>>>>>> >>>>>>>> -----Original Message----- >>>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] >>>>>>>> Sent: Monday, March 30, 2009 7:46 PM >>>>>>>> To: Santosh Chokhani >>>>>>>> Cc: IETF-pkix >>>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>> >>>>>>>> Santosh: >>>>>>>> >>>>>>>> The RFC 5280 method just describes "two common >>>>> methods for >>>>>>>> generating key identifiers from the public key" >>>>>>>> and says that other methods are acceptable. The comment >>>>>> to KeyHash >>>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's >>>>> the same >>>>>>>> field as SKID, and I would support either stating "if the >>>>>> KeyHash is >>>>>>>> not precisely 20 octets long, it should be matched >> against the >>>>>>>> Subject Key Identifier extension of the signing >> certificate" or >>>>>>>> adding another choice like byID [3] OCTET STRING -- >>>>>> matches the value >>>>>>>> of SKID. >>>>>>>> >>>>>>>> Tom Gindin >>>>>>>> >>>>>>>> P.S. - The above opinions are mine, and not necessarily >>>>>> those of my >>>>>>>> employer >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> "Santosh Chokhani" Sent by: >>>>>>>> owner-ietf-pkix@mail.imc.org >>>>>>>> 03/26/2009 10:39 PM >>>>>>>> >>>>>>>> To >>>>>>>> "IETF-pkix" >>>>>>>> cc >>>>>>>> >>>>>>>> Subject >>>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> RFC 2560 dependence on SHA-1 does not appear to be >>>>>> difficult to deal >>>>>>>> with. >>>>>>>> >>>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as >>>>> optional. We can >>>>>>>> update this to add SHA-2 series as optional. >>>>>>>> >>>>>>>> The Responder ID has SHA-1 hardwired. But, that is no >>>>>> different than >>>>>>>> key ID extensions in RFC 5280. Here are some options >>> in order of >>>>>>>> preference: >>>>>>>> >>>>>>>> 1. Align the language with subject key ID language >> in RFC 5280. >>>>>>>> >>>>>>>> 2. Keep on using SHA-1. This field is not security >>>>>> relevant. RFC >>>>>>>> 2560 does not even describe how to use this field. So, >>>>>> having SHA-1 >>>>>>>> and accidental or intentional collisions will not hurt the >>>>>> security >>>>>>>> of the protocol. >>>>>>>> >>>>>>>> 3. If you do not believe in KISS principle, you can >>>>>> define another >>>>>>>> response type and enhance the key ID ASN.1 syntax so >> that hash >>>>>>>> algorithm is identified. >>>>>>>> >>>>>>>> 4. Another option is for the Responder to use the >> same hashing >>>>>>>> algorithm as the one in the first certID entry. >>>>>>>> >>>>>>>> >>>>>>>> Santosh Chokhani >>>>>>>> CygnaCom Solutions >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>> >>>>>>> >>>>>> >>>>>> >>>>>> -- >>>>>> >>>>>> Best Regards, >>>>>> >>>>>> Massimiliano Pala >>>>>> >>>>>> --o----------------------------------------------------------- >>>>>> ------------- >>>>>> Massimiliano Pala [OpenCA Project Manager] >>>>>> Massimiliano.Pala@dartmouth.edu >>>>>> >>>>>> project.manager@openca.org >>>>>> >>>>>> Dartmouth Computer Science Dept Home Phone: +1 >>>>>> (603) 369-9332 >>>>>> PKI/Trust Laboratory Work Phone: +1 >>>>>> (603) 646-9179 >>>>>> --o----------------------------------------------------------- >>>>>> ------------- >>>>>> >>>>>> People who think they know everything are a great annoyance >>>>> to those >>>>>> of us who do. >>>>>> -- >>>>>> Isaac Asimov >>>>>> >>>>> >>>> >>> >>> >>> >> >> >> > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3DJrTb9056814 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 13 Apr 2009 12:53:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3DJrTOV056813; Mon, 13 Apr 2009 12:53:29 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3DJrHSC056794 for ; Mon, 13 Apr 2009 12:53:28 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 11171 invoked from network); 13 Apr 2009 19:51:56 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 13 Apr 2009 19:51:55 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Mon, 13 Apr 2009 15:53:12 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAlknTSAAAy16cA== References: From: "Santosh Chokhani" To: "Kelvin Yiu" , "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: It seems that leaving responderID as is is our best course of action. Since this field and its match is not security relevant, I do not see this particular dependence on SHA-1 as problematic. > -----Original Message----- > From: Kelvin Yiu [mailto:kelviny@exchange.microsoft.com]=20 > Sent: Monday, April 13, 2009 2:50 PM > To: Santosh Chokhani; Stefan Santesson; IETF-pkix > Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > [Sorry for jumping on this thread so late] >=20 > Santosh, >=20 > The OCSP client in Windows Vista uses the responderID field=20 > to find the OCSP signer cert in the cert bag and expects the=20 > key hash to be SHA-1. Otherwise, the OCSP response will be=20 > rejected. Upgrading from SHA-1 will be problematic. >=20 > Kelvin Yiu > Lead Program Manager, Windows Security > Microsoft >=20 >=20 > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org=20 > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Wednesday, April 01, 2009 1:32 PM > To: Stefan Santesson; IETF-pkix > Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 >=20 >=20 > Stefan, >=20 > See responses in-line. >=20 > > -----Original Message----- > > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > > Sent: Wednesday, April 01, 2009 2:34 PM > > To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >=20 > > Santosh, > >=20 > > If you are talking about adding other options to calculate=20 > the KeyHash=20 > > value in ResponderID then I strongly disagree. > >=20 > > If you add unspecified options you change the properties of=20 > the field=20 > > from deterministic to a completely unknown value. > > It does not matter if RFC2560 isn't explicit in its=20 > description of the=20 > > use of the field. The fact is that OCSP explicitly defines=20 > this value=20 > > and as such will allow a client to deterministically compare this=20 > > value with the certificate selected to validate the response=20 > > signature. >=20 > I hope no one is doing the matching of Responder ID with hash=20 > of a key in place of responder signature verification. That=20 > would be real bad. >=20 > > If you allow > > other ways to calculate the value but do not provide any means to=20 > > signal what method that was used, then this feature is lost. >=20 > The most common use will be to use this field to prioritize=20 > the certificates of the responder to use for sigature=20 > verification on the response. >=20 > >=20 > > In worst case we will cause current implementation to fail. >=20 > That is why I am asking what problems if any will the vendors have. >=20 > >=20 > > I really don't think its worth the effort to change this field. We=20 > > have a very large base of implementations that we really=20 > don't want to=20 > > mess up unless its absolutely necessary. >=20 > So, we agree that leaving this field hard wired to SHA-1 is=20 > ok and 2560 can easily accommodate new hash functions. Right? >=20 > My only reason to align with 5280 is that if some one were=20 > ever want to strip off SHA-1 altogether from their Responder=20 > or client, permitting other methods does it. >=20 > >=20 > > As the only property of this field is to provide a convenient=20 > > identifier, it is far from absolutely necessary to change it. > > Remember that there is a second choice to to identify responder by=20 > > name. For names we have accepted the possibility of collisions. In=20 > > that comparison, upgrading from SHA-1 is really redundant. > >=20 > > /Stefan > >=20 > >=20 > >=20 > >=20 > > On 4/1/09 4:05 PM, "Santosh Chokhani"=20 > wrote: > >=20 > > >=20 > > > My resident ASN.1 expert apprised me of the fact that > > adding a choice > > > will break backward compatibility. Thus, extension is a > > fifth option > > > (probably third in the priority). > > >=20 > > > Based on what I know of OCSP implementations, not changing > > anything in > > > terms of bits on the wire and aligning the Key ID with SKID > > in 5280 is > > > the best approach. I do not think it will hurt backward > > compatibility. > > >=20 > > > OCSP Responder and OCSP client vendors should speak up if I > > am wrong. > > >=20 > > >> -----Original Message----- > > >> From: Santosh Chokhani > > >> Sent: Tuesday, March 31, 2009 12:51 PM > > >> To: 'Massimiliano Pala'; IETF-pkix > > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > > >>=20 > > >> Max, > > >>=20 > > >> I do not see where and what extension we need to add for > > other digest > > >> algorithm. > > >>=20 > > >> For key id, we need to enhance or broaden the options. > > >>=20 > > >>> -----Original Message----- > > >>> From: owner-ietf-pkix@mail.imc.org=20 > > >>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > > Massimiliano Pala > > >>> Sent: Tuesday, March 31, 2009 1:37 PM > > >>> To: IETF-pkix > > >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > >>>=20 > > >>> Hi all, > > >>>=20 > > >>> as I said during last meeting - as the use of SHA-1 does > > >> not have any > > >>> security implication in the OCSP, another viable way=20 > would be to=20 > > >>> define an extension where other digest algorithms can be > > >> added to the > > >>> request/responses. > > >>>=20 > > >>> It is a simple addition and does not require any change in > > >> the RFC, it > > >>> can be done as a separate document for those who what to > > use other > > >>> digest algorithms. > > >>>=20 > > >>> After all, isn't this an example of why we allow > > extensions to the > > >>> messages ? > > >>>=20 > > >>> Later, > > >>> Max > > >>>=20 > > >>>=20 > > >>> Santosh Chokhani wrote: > > >>>> Tom, > > >>>>=20 > > >>>> Adding a new choice and aligning it with 5280 SKID is fine. > > >>>>=20 > > >>>> I would not add anything about matching this field with > > >>> anything since > > >>>> RFC 2560 does not say anything about it. > > >>>>=20 > > >>>> If one were to add something, one should describe how this > > >>> field can > > >>>> be used to select from multiple Responder certificates. > > >>>>=20 > > >>>>> -----Original Message----- > > >>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > > >>>>> Sent: Monday, March 30, 2009 7:46 PM > > >>>>> To: Santosh Chokhani > > >>>>> Cc: IETF-pkix > > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > >>>>>=20 > > >>>>> Santosh: > > >>>>>=20 > > >>>>> The RFC 5280 method just describes "two common > > >> methods for > > >>>>> generating key identifiers from the public key" > > >>>>> and says that other methods are acceptable. The comment > > >>> to KeyHash > > >>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > > >> the same > > >>>>> field as SKID, and I would support either stating "if the > > >>> KeyHash is > > >>>>> not precisely 20 octets long, it should be matched=20 > against the=20 > > >>>>> Subject Key Identifier extension of the signing=20 > certificate" or=20 > > >>>>> adding another choice like byID [3] OCTET STRING -- > > >>> matches the value > > >>>>> of SKID. > > >>>>>=20 > > >>>>> Tom Gindin > > >>>>>=20 > > >>>>> P.S. - The above opinions are mine, and not necessarily > > >>> those of my > > >>>>> employer > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>> "Santosh Chokhani" Sent by: > > >>>>> owner-ietf-pkix@mail.imc.org > > >>>>> 03/26/2009 10:39 PM > > >>>>>=20 > > >>>>> To > > >>>>> "IETF-pkix" > > >>>>> cc > > >>>>>=20 > > >>>>> Subject > > >>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>> RFC 2560 dependence on SHA-1 does not appear to be > > >>> difficult to deal > > >>>>> with. > > >>>>>=20 > > >>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > > >> optional. We can > > >>>>> update this to add SHA-2 series as optional. > > >>>>>=20 > > >>>>> The Responder ID has SHA-1 hardwired. But, that is no > > >>> different than > > >>>>> key ID extensions in RFC 5280. Here are some options > > in order of > > >>>>> preference: > > >>>>>=20 > > >>>>> 1. Align the language with subject key ID language=20 > in RFC 5280. > > >>>>>=20 > > >>>>> 2. Keep on using SHA-1. This field is not security > > >>> relevant. RFC > > >>>>> 2560 does not even describe how to use this field. So, > > >>> having SHA-1 > > >>>>> and accidental or intentional collisions will not hurt the > > >>> security > > >>>>> of the protocol. > > >>>>>=20 > > >>>>> 3. If you do not believe in KISS principle, you can > > >>> define another > > >>>>> response type and enhance the key ID ASN.1 syntax so=20 > that hash=20 > > >>>>> algorithm is identified. > > >>>>>=20 > > >>>>> 4. Another option is for the Responder to use the=20 > same hashing=20 > > >>>>> algorithm as the one in the first certID entry. > > >>>>>=20 > > >>>>>=20 > > >>>>> Santosh Chokhani > > >>>>> CygnaCom Solutions > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>>=20 > > >>>>=20 > > >>>>=20 > > >>>=20 > > >>>=20 > > >>> -- > > >>>=20 > > >>> Best Regards, > > >>>=20 > > >>> Massimiliano Pala > > >>>=20 > > >>> --o----------------------------------------------------------- > > >>> ------------- > > >>> Massimiliano Pala [OpenCA Project Manager]=20 > > >>> Massimiliano.Pala@dartmouth.edu > > >>> =20 > > >>> project.manager@openca.org > > >>>=20 > > >>> Dartmouth Computer Science Dept Home Phone: +1 > > >>> (603) 369-9332 > > >>> PKI/Trust Laboratory Work Phone: +1 > > >>> (603) 646-9179 > > >>> --o----------------------------------------------------------- > > >>> ------------- > > >>>=20 > > >>> People who think they know everything are a great annoyance > > >> to those > > >>> of us who do. > > >>> -- > > >>> Isaac Asimov > > >>>=20 > > >>=20 > > >=20 > >=20 > >=20 > >=20 >=20 >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3D2WYbd084796 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 19:32:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3D2WYtL084795; Sun, 12 Apr 2009 19:32:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from e6.ny.us.ibm.com (e6.ny.us.ibm.com [32.97.182.146]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3D2WMSL084784 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Sun, 12 Apr 2009 19:32:33 -0700 (MST) (envelope-from tgindin@us.ibm.com) Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234]) by e6.ny.us.ibm.com (8.13.1/8.13.1) with ESMTP id n3D2Y6RM011614 for ; Sun, 12 Apr 2009 22:34:06 -0400 Received: from d01av03.pok.ibm.com (d01av03.pok.ibm.com [9.56.224.217]) by d01relay02.pok.ibm.com (8.13.8/8.13.8/NCO v9.2) with ESMTP id n3D2WM2W176672 for ; Sun, 12 Apr 2009 22:32:22 -0400 Received: from d01av03.pok.ibm.com (loopback [127.0.0.1]) by d01av03.pok.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id n3D2WLcY013480 for ; Sun, 12 Apr 2009 22:32:21 -0400 Received: from d01ml062.pok.ibm.com (d01ml062.pok.ibm.com [9.56.228.115]) by d01av03.pok.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id n3D2WLPm013477; Sun, 12 Apr 2009 22:32:21 -0400 In-Reply-To: <7B01F815F4064ABEB6447E403CA12C56@ERA1> To: "Erik Andersen" Cc: "'ietf-pkix'" , x500standard@freelists.org MIME-Version: 1.0 Subject: RE: [x500standard] Re: Certificate definitions X-Mailer: Lotus Notes Release 7.0 HF277 June 21, 2006 From: Tom Gindin Message-ID: Date: Sun, 12 Apr 2009 22:32:20 -0400 X-MIMETrack: Serialize by Router on D01ML062/01/M/IBM(Release 8.0.1 HF8|December 19, 2008) at 04/12/2009 22:32:21, Serialize complete at 04/12/2009 22:32:21 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: An AA certificate is also a PKC, and normally not an issuer of=20 other PKC's. Thus, having a "set of attribute certificates" containing=20 both AA's and AC's probably confuses more than it clarifies, especially=20 since the term "attribute certificate" is in general use and does not=20 include AA certificates. I think it would be more helpful to depict the=20 issuance relationship than to define a "set of authority certificates" and = a "set of end-entity certificates". A more accurate version of the second = and third lines of your diagram would thus go: PK Certificate has two children: CA certificate and=20 End-entity certificate EE Certificate has two children: End-entity PKC (EE PKC)=20 and AA certificate The issuance relationships should be arrows from CA certificate=20 back up to PKC, and from AA certificate to Attribute certificate. It=20 isn't clear to me whether EE Certificate as defined above is a useful=20 concept, or whether PKC should have three children: CA, EE PKC, and AA.=20 Conceptually, it's cleaner to make PKC have three children, but some=20 certificates can be used as AA's without it being apparent from the actual = contents of that certificate (the SOA identifier extension is not=20 mandatory). In a different part of the discussion, self-signed certificates=20 are a subset of self-issued ones. Tom Gindin "Erik Andersen" =20 Sent by: owner-ietf-pkix@mail.imc.org 04/09/2009 11:25 AM To , "'ietf-pkix'" cc Subject RE: [x500standard] Re: Certificate definitions Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the=20 apparent inactivity of people, I have the power to produce Defect Reports, = produce Draft Technical Corrigenda, run them through both the ISO and=20 ITU-T approval process and finally integrate them into the next edition of = X.500 (incl. X.509) without being stopped by anyone (except for Jean-Paul=20 Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. Let=20 me express myself without the diagram. =20 The set of certificates is the union of the set of public-key certificates = and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key certificates = issued to end-entities and the set of attribute certificates issued to=20 end-entities. However, X.509 is a little confusing here as the term=20 end-entity certificate is sometimes meant to be just public-key=20 certificates issued to end-entities, so the term end-entity certificate=20 has two meanings. =20 The set of public-key certificates is the union of the set of end-entity=20 (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of end-entity=20 (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA certificates=20 and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued=20 (public-key) certificates and the set cross certificates. The latter is a=20 little confusing, as a cross certificate can also be an attribute=20 certificate. =20 I am avoiding here to use the term ?user attribute?, but believe it is=20 supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term ?certificate?, he/she is=20 entitled to believe it can either be a public-key certificate. It may not=20 always be clear from the context what is meant. =20 Whenever an innocent us reader see the term ?end-entity certificate?,=20 he/she is entitled to believe it is either a public key certificate or an=20 attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term ?cross-certificate?, he/she=20 is entitled to believe it is either a public key certificate or an=20 attribute certificate. =20 My proposal was only to clear-up the terminology and to use the=20 terminology consistent in the text of X.509. Trying to do the latter may=20 raise a number of detailed questions when the meaning is not absolutely=20 clear from the context. =20 =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =20 Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too=20 long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a public-key=20 certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute=20 Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions =20 I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little that=20 actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the=20 terminology and then produced below figure. I will not comment all the=20 boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause.=20 However it is used widely in the main text. It is mentioned the first time = in clause 7 as a public-key certificate. There are several other places=20 where it is a public-key certificate. In 15.5.2.4 is used in the context=20 of attribute certificates. The conclusion must be that an end-entity=20 certificate can either be a end-entity public-key certificate or an=20 end-entity attribute certificate. However, in most places, it is implied=20 that we only talks about public-key certificates. For veterans, this is=20 not a major problem, but new-comers may get confused. Anyway, I thing our=20 specifications should be clear and not subject to interpretation. RFC 5280 = does not use the term at all. It seems just to use the term ?certificate?=20 as a synonym for ?end-entrity public key certificate?. =20 The ?User Certificate? is not defined in X.509, but is wide used. It=20 seems to be a synonym for ?end-entrity public key certificate?. It is also = used in X.511. RFC 5280 uses the term once without differenting it from=20 just ?certificate?. =20 The term ?cross-certificate? should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 ?end-entity public-key certificate? ?user certificate? as a synonym for ?end-entity public-key certificate? ?end-entity attribute certificate? =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attribute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3D0WX82077798 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 17:32:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3D0WWvS077797; Sun, 12 Apr 2009 17:32:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from QMTA07.westchester.pa.mail.comcast.net (qmta07.westchester.pa.mail.comcast.net [76.96.62.64]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3D0WLxh077786 for ; Sun, 12 Apr 2009 17:32:32 -0700 (MST) (envelope-from mstjohns@comcast.net) Message-Id: <200904130032.n3D0WLxh077786@balder-227.proper.com> Received: from OMTA12.westchester.pa.mail.comcast.net ([76.96.62.44]) by QMTA07.westchester.pa.mail.comcast.net with comcast id ej9U1b0030xGWP857oXwqZ; Mon, 13 Apr 2009 00:31:56 +0000 Received: from MIKES-LAPTOM.comcast.net ([68.48.0.201]) by OMTA12.westchester.pa.mail.comcast.net with comcast id eoYN1b0084LCBKY3YoYNMP; Mon, 13 Apr 2009 00:32:22 +0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sun, 12 Apr 2009 20:32:21 -0400 To: "Anders Rundgren" , From: Michael StJohns Subject: Re: NSA/IAD Suite B Key-generation & On-line Protocols In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 03:19 PM 4/12/2009, Anders Rundgren wrote: >From what I believe must be an unclassified e-mail I quote: > > "NSA/IAD is establishing a commercial Suite B infrastructure that will > include generation, distribution, revocation, and life cycle maintenance > of Suite B V3 X.509 certificates with a target IOC of 1st quarter FY10. The National Security Agency is establishing a commercial Public Key Infrastructure which issues certificates compliant with the NSA Suite B cryptographic suite and provides the normal functions of certificate generation, distribution and revocation. The service should be up and running around October 2009. > We are defining the certificate policy and interface requirements as > well as supporting protocols. We're defining our own way of doing things, so anyone who wants to work with us will have to spend lots of money. > KMI CI-2 Spiral 2 will deploy Suite B > mission certificates and Over-the-Network Key in December 2011 and will > incorporate ECDH for KEK generation for product wrapping to align with > HAIPE IS 4.0 (r)" Phase two - occurring about December 2011 - will provide certificates and key material for the HAIPE series of IP packet encryptors and will do something mostly no one else will care about. >It would be interesting if someone could translate this into something even >a civilian could understand :-) > >I have FWIW, upgraded KeyGen2 to support ECDSA keys according >to the latest XML DSIG 1.1 draft. Example (look for "ECKeyValue"): >http://webpki.org/papers/keygen2/ec-keygen.xml > >XML DSIG 11: >http://www.w3.org/TR/xmldsig-core1 > >AndersR Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3CJJZ5g061328 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 12:19:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3CJJYZP061327; Sun, 12 Apr 2009 12:19:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout2-sn1.fre.skanova.net (pne-smtpout2-sn1.fre.skanova.net [81.228.11.159]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3CJJNQv061310 for ; Sun, 12 Apr 2009 12:19:34 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout2-sn1.fre.skanova.net (7.3.129) id 49CCDA0D001FA050 for ietf-pkix@imc.org; Sun, 12 Apr 2009 21:19:23 +0200 Message-ID: From: "Anders Rundgren" To: Subject: NSA/IAD Suite B Key-generation & On-line Protocols Date: Sun, 12 Apr 2009 21:19:52 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: >From what I believe must be an unclassified e-mail I quote: "NSA/IAD is establishing a commercial Suite B infrastructure that will include generation, distribution, revocation, and life cycle maintenance of Suite B V3 X.509 certificates with a target IOC of 1st quarter FY10. We are defining the certificate policy and interface requirements as well as supporting protocols. KMI CI-2 Spiral 2 will deploy Suite B mission certificates and Over-the-Network Key in December 2011 and will incorporate ECDH for KEK generation for product wrapping to align with HAIPE IS 4.0 (r)" It would be interesting if someone could translate this into something even a civilian could understand :-) I have FWIW, upgraded KeyGen2 to support ECDSA keys according to the latest XML DSIG 1.1 draft. Example (look for "ECKeyValue"): http://webpki.org/papers/keygen2/ec-keygen.xml XML DSIG 11: http://www.w3.org/TR/xmldsig-core1 AndersR Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3CCtPxE041365 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 05:55:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3CCtP5p041364; Sun, 12 Apr 2009 05:55:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3CCtCVG041351 for ; Sun, 12 Apr 2009 05:55:22 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 26933 invoked from network); 12 Apr 2009 12:53:52 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 12 Apr 2009 12:53:52 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/related; boundary="----_=_NextPart_001_01C9BB6D.EA5B6223"; type="multipart/alternative" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Sun, 12 Apr 2009 08:55:09 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOwAI14WnsABj+N0A== References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> From: "Santosh Chokhani" To: "Stefan Santesson" , "Erik Andersen" , "ietf-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9BB6D.EA5B6223 Content-Type: multipart/alternative; boundary="----_=_NextPart_002_01C9BB6D.EA5B6223" ------_=_NextPart_002_01C9BB6D.EA5B6223 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Stefan, =20 In context of RFC 3281, you are correct that the AA certificate is a = PKC. But, in the context of X.509, AA certificate exists. May be = posting to both X.500 and PKIX was a bad idea from that viewpoint. = Actually, 3281 does=20 =20 I do not understand your comment that states: =20 "Except for Russ comment, what is true for Self Signed SSL/TLS = certificates out there. Are they issued as CA certificates or as EE = certificates (Basic Constraints CA=3DFALSE). I could not find any = samples to study, doing a quick search." ________________________________ From: owner-ietf-pkix@mail.imc.org = [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan Santesson Sent: Sunday, April 12, 2009 5:50 AM To: Erik Andersen; 'ietf-pkix' Subject: Re: [x500standard] Re: Certificate definitions =09 =09 Eric, =09 There is always a danger with cross posting to multiple mailing lists. = Instead of making more people aware of the issue, it may have the = opposite effect. In my case it made me miss all these mails as they all = got sorted in the wrong folder. =09 I see a few potential issues here. =09 =09 "The set of attribute certificates is the union of the set of = end-entity (attribute) certificates and the set of AA certificates." =09 =09 I don't think an AA certificate is an attribute certificate. I view it = as a public key certificate issued to the AA. =09 =09 "The set of CA certificates is the union of the set of self-issued = (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute = certificate." =09 =09 Except for Russ comment, what is true for Self Signed SSL/TLS = certificates out there. Are they issued as CA certificates or as EE = certificates (Basic Constraints CA=3DFALSE). I could not find any = samples to study, doing a quick search. =09 /Stefan =09 On 09-04-09 5:25 PM, "Erik Andersen" wrote: =09 =09 Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the = apparent inactivity of people, I have the power to produce Defect = Reports, produce Draft Technical Corrigenda, run them through both the = ISO and ITU-T approval process and finally integrate them into the next = edition of X.500 (incl. X.509) without being stopped by anyone (except = for Jean-Paul Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. = Let me express myself without the diagram. =20 The set of certificates is the union of the set of public-key = certificates and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key = certificates issued to end-entities and the set of attribute = certificates issued to end-entities. However, X.509 is a little = confusing here as the term end-entity certificate is sometimes meant to = be just public-key certificates issued to end-entities, so the term = end-entity certificate has two meanings. =20 The set of public-key certificates is the union of the set of = end-entity (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of = end-entity (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA = certificates and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued = (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute = certificate. =20 I am avoiding here to use the term "user attribute", but believe it is = supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term "certificate", he/she is = entitled to believe it can either be a public-key certificate. It may = not always be clear from the context what is meant. =20 Whenever an innocent us reader see the term "end-entity certificate", = he/she is entitled to believe it is either a public key certificate or = an attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term "cross-certificate", = he/she is entitled to believe it is either a public key certificate or = an attribute certificate. =20 My proposal was only to clear-up the terminology and to use the = terminology consistent in the text of X.509. Trying to do the latter may = raise a number of detailed questions when the meaning is not absolutely = clear from the context. =20 =20 =09 Erik Andersen =09 Andersen's L-Service =09 Elsevej 48, DK-3500 Vaerloese =09 Denmark =09 Mobile: +45 2097 1490 =09 email: era@x500.eu =09 www.x500.eu =09 www.x500standard.com =09 =09 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =09 =09 Eric, =09 =09 =09 Silence does not mean approval. =09 =09 =09 It may mean that the corrections are so numerous that it would take = too long to respond =09 and that people do not have that time available at the moment. =09 =09 =09 e.g.: an End-entity attribute certificate is not linked to a = public-key certificate. =09 a cross-certificate is not linked to an AA certificate. =09 an Authority Certificate is not linked to an Attribute = Certificate. =09 =09 =09 This is only a start ... =09 =09 =09 Denis =09 =09 ----- Message re=E7u -----=20 =09 De : owner-ietf-pkix =20 =09 =C0 : x500standard,'PKIX' = =20 =09 Date : 2009-04-03, 17:00:01 =09 Sujet : RE: [x500standard] Certificate definitions =09 =09 =09 I take silence as approval. =09 =09 Erik Andersen =09 Andersen's L-Service =09 Elsevej 48, DK-3500 Vaerloese =09 Denmark =09 Mobile: +45 2097 1490 =09 email: era@x500.eu =09 www.x500.eu =09 www.x500standard.com =09 =09 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =09 Hi =09 I got a number of responses on user certificates, but quite little = that actually answered my question. =09 I have tried to dig a little bit more in X.509 to get hold of the = terminology and then produced below figure. I will not comment all the = boxes. =09 =20 =09 I will like you to comments as to the correctness of above figure. =09 =09 =09 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first = time in clause 7 as a public-key certificate. There are several other = places where it is a public-key certificate. In 15.5.2.4 is used in the = context of attribute certificates. The conclusion must be that an = end-entity certificate can either be a end-entity public-key certificate = or an end-entity attribute certificate. However, in most places, it is = implied that we only talks about public-key certificates. For veterans, = this is not a major problem, but new-comers may get confused. Anyway, I = thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to = use the term "certificate" as a synonym for "end-entrity public key = certificate". =09 =09 =09 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is = also used in X.511. RFC 5280 uses the term once without differenting it = from just "certificate". =09 =09 =09 The term "cross-certificate" should probably also be qualified. =09 =09 =09 I suggest to add in X.509 definitions for: =09 =09 =09 "end-entity public-key certificate" =09 "user certificate" as a synonym for "end-entity public-key = certificate" =09 "end-entity attribute certificate" =09 =09 =09 The X.509 text should be updated to make use of these definitions. =09 =09 =09 X.509 has four attribute types for holding certificates. =09 =09 =09 UserCertificate: For end-entity public-key certificates =09 cAcertificate: For CA certificates =09 attributeCertificateAttribute: For end-entity attribute certificates =09 aACertificate: For AA Certificates =09 =09 =09 Any comments? =09 =09 =09 Erik Andersen =09 Andersen's L-Service =09 Elsevej 48, DK-3500 Vaerloese =09 Denmark =09 Mobile: +45 2097 1490 =09 email: era@x500.eu =09 www.x500.eu =09 www.x500standard.com =09 =09 =09 =09 =09 ------_=_NextPart_002_01C9BB6D.EA5B6223 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Re: [x500standard] Re: Certificate = definitions
Stefan,
 
In context of RFC 3281, you are correct = that the AA=20 certificate is a PKC.  But, in the context of X.509, AA certificate = exists.  May be posting to both X.500  and PKIX was a bad idea = from=20 that viewpoint.  Actually, 3281 does
 
I do not understand your comment that=20 states:
 
"Except for Russ comment, what is true for Self Signed = SSL/TLS=20 certificates out there. Are they issued as CA certificates or as EE = certificates=20 (Basic Constraints CA=3DFALSE). I could not find any samples to study, = doing a=20 quick search."


From: owner-ietf-pkix@mail.imc.org = [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan=20 Santesson
Sent: Sunday, April 12, 2009 5:50 AM
To: = Erik=20 Andersen; 'ietf-pkix'
Subject: Re: [x500standard] Re: = Certificate=20 definitions

Eric,

There is always a danger with = cross=20 posting to multiple mailing lists. Instead of making more people aware = of the=20 issue, it may have the opposite effect. In my case it made me miss all = these=20 mails as they all got sorted in the wrong folder.

 I see a = few=20 potential issues here.

=93
The set = of attribute=20 certificates is the union of the set of end-entity (attribute) = certificates=20 and the set of AA=20 certificates.=94

I=20 don=92t think an AA certificate is an attribute certificate. I view it = as a=20 public key certificate issued to the AA.

=93The set = of CA=20 certificates is the union of the set of self-issued (public-key)=20 certificates and the set cross certificates. The latter is a little=20 confusing, as a cross certificate can also be an attribute=20 certificate.=94

Except=20 for Russ comment, what is true for Self Signed SSL/TLS certificates = out there.=20 Are they issued as CA certificates or as EE certificates (Basic = Constraints=20 CA=3DFALSE). I could not find any samples to study, doing a quick=20 search.

/Stefan

On 09-04-09 5:25 PM, "Erik Andersen" = <era@x500.eu> wrote:

Hi Denis,
 
It is a little = dangerous not=20 to respond to my comments. Due to the apparent inactivity of people, = I have=20 the power to produce Defect Reports, produce Draft Technical = Corrigenda, run=20 them through both the ISO and ITU-T approval process and finally = integrate=20 them into the next edition of X.500 (incl. X.509) without being = stopped by=20 anyone (except for Jean-Paul Lemaire).
 
I believe you=20 misunderstood my diagram. It may be a little confusing. Let me = express=20 myself without the diagram.
 
The set of certificates is = the=20 union of the set of public-key certificates and the set of attribute = certificates.
 
The set of end-entity certificates is the = union=20 of public-key certificates issued to end-entities and the set of = attribute=20 certificates issued to end-entities. However, X.509 is a little = confusing=20 here as the term end-entity certificate is sometimes meant to be = just=20 public-key certificates issued to end-entities, so the term = end-entity=20 certificate has two meanings.
 
The set of public-key=20 certificates is the union of the set of end-entity (public-key) = certificates=20 and the set of CA certificates.
 
The set of attribute=20 certificates is the union of the set of end-entity (attribute) = certificates=20 and the set of AA certificates.
 
The set of authority=20 certificates is the union of the set CA certificates and the set of = AA=20 certificates.
 
The set of CA certificates is the union = of the=20 set of self-issued (public-key) certificates and the set cross = certificates.=20 The latter is a little confusing, as a cross certificate can also be = an=20 attribute certificate.
 
I am avoiding here to use the = term =93user=20 attribute=94, but believe it is supposed to mean a public-key = certificate=20 issued to an end-entity.
 
Whenever an innocent reader = sees the=20 term =93certificate=94, he/she is entitled to believe it can either = be a=20 public-key certificate. It may not always be clear from the context = what is=20 meant.
 
Whenever an innocent us  reader see the = term=20 =93end-entity certificate=94, he/she is entitled to believe it is = either a=20 public key certificate or an attribute certificate issued to an=20 end-entity.
 
Whenever an innocent us  reader see = the term=20 =93cross-certificate=94, he/she is entitled to believe it is either = a public key=20 certificate or an attribute certificate.
 
My proposal = was only=20 to clear-up the terminology and to use the terminology consistent in = the=20 text of X.509. Trying to do the latter may raise a number of = detailed=20 questions when the meaning is not absolutely clear from the context. =  
 

Erik=20 Andersen

Andersen's=20 L-Service

Elsevej = 48, DK-3500=20 Vaerloese

Denmark

Mobile: = +45 2097=20 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com


-----Original=20 Message-----
From: x500standard-bounce@freelists.= org=20 [mailto:x500standard-bou= nce@freelists.org]=20 On Behalf Of Denis Pinkas
Sent: 3. april 2009=20 17:33
To: x500 list; ietf-pkix
Subject: = [x500standard]=20 Re: Certificate definitions


Eric,



Silence does not mean=20 approval.



It=20 may mean that the corrections are so numerous that it would take too = long to=20 respond

and=20 that people do not have that time available at the=20 moment.



e.g.:=20  an End-entity attribute certificate is not linked to a = public-key=20 certificate.

       a=20 cross-certificate is not linked to an AA=20 certificate.

       an=20 Authority Certificate is not linked to an Attribute=20 Certificate.



This=20 is only a start ...



Denis

----- Message re=E7u -----=20

De : owner-ietf-pkix = <mailto%20:owner-ietf-pkix@mail.imc.org>= ;=20  

=C0=20 : x500standard,'PKIX' <mailto%20:x500standard@freelists.org,ietf-pkix@imc.org>=20  

Date : 2009-04-03,=20 17:00:01

Sujet : RE: [x500standard] = Certificate=20 definitions



I take = silence as=20 approval.


Erik=20 Andersen

Andersen's=20 L-Service

Elsevej 48, DK-3500=20 Vaerloese

Denmark

Mobile: +45 2097=20 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com


-----Original = Message-----
From: x500standard-bounce@freelists.= org=20 [mailto:x500standard-bou= nce@freelists.org]=20 On Behalf Of Erik Andersen
Sent: 1. april 2009=20 14:40
To: Directory list; PKIX
Subject: = [x500standard]=20 Certificate definitions

Hi

I got a number of = responses on=20 user certificates, but quite little that actually answered my=20 question.

I have tried to dig a = little bit=20 more in X.509 to get hold of the terminology and then produced = below=20 figure. I will not comment all the = boxes.



I will like you to = comments as to=20 the correctness of above figure.



The end-entity = certificate is not=20 defined in the definition clause. However it is used widely in the = main=20 text. It is mentioned the first time in clause 7 as a public-key=20 certificate. There are several other places where it is a = public-key=20 certificate. In 15.5.2.4 is used in the context of attribute = certificates.=20 The conclusion must be that an end-entity certificate can either = be a=20 end-entity public-key certificate or an end-entity attribute = certificate.=20 However, in most places, it is implied that we only talks about = public-key=20 certificates. For veterans, this is not a major problem, but = new-comers=20 may get confused. Anyway, I thing our specifications should be = clear and=20 not subject to interpretation. RFC 5280 does not use the term at = all. It=20 seems just to use the term =93certificate=94 as a synonym for = =93end-entrity=20 public key certificate=94.



The =93User = Certificate=94  is=20 not defined in X.509, but is wide used. It seems to be a synonym = for=20 =93end-entrity public key certificate=94. It is also used in = X.511. RFC 5280=20 uses the term once without differenting it from just=20 =93certificate=94.



The term = =93cross-certificate=94=20 should probably also be qualified.



I suggest to add in = X.509=20 definitions for:



=93end-entity = public-key=20 certificate=94

=93user = certificate=94 as a synonym=20 for =93end-entity public-key = certificate=94

=93end-entity = attribute=20 certificate=94



The X.509 text should = be updated=20 to make use of these definitions.



X.509 has four = attribute types=20 for holding certificates.



UserCertificate: For = end-entity=20 public-key certificates

cAcertificate: For CA = certificates

attributeCertificateAttribute:=20 For end-entity attribute = certificates

aACertificate: For AA = Certificates



Any=20 comments?



Erik=20 Andersen

Andersen's=20 L-Service

Elsevej 48, DK-3500=20 Vaerloese

Denmark

Mobile: +45 2097=20 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com



------_=_NextPart_002_01C9BB6D.EA5B6223-- ------_=_NextPart_001_01C9BB6D.EA5B6223 Content-Type: image/gif; name="image.gif" Content-Transfer-Encoding: base64 Content-ID: <461014912@12042009-2D9C> Content-Description: image.gif Content-Location: image.gif R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------_=_NextPart_001_01C9BB6D.EA5B6223-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C9oOxr032543 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 12 Apr 2009 02:50:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3C9oO98032542; Sun, 12 Apr 2009 02:50:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C9o99Y032528 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 12 Apr 2009 02:50:22 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 37994 invoked from network); 12 Apr 2009 09:50:12 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 12 Apr 2009 09:50:12 -0000 Received: (qmail 2448 invoked from network); 12 Apr 2009 09:50:08 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 12 Apr 2009 09:50:08 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Sun, 12 Apr 2009 11:50:07 +0200 Subject: Re: [x500standard] Re: Certificate definitions From: Stefan Santesson To: Erik Andersen , "'ietf-pkix'" Message-ID: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOwAI14Wns= In-Reply-To: <7B01F815F4064ABEB6447E403CA12C56@ERA1> Mime-version: 1.0 Content-type: multipart/related; boundary="B_3322381808_2965858" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3322381808_2965858 Content-type: multipart/alternative; boundary="B_3322381808_2992874" --B_3322381808_2992874 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Eric, There is always a danger with cross posting to multiple mailing lists. Instead of making more people aware of the issue, it may have the opposite effect. In my case it made me miss all these mails as they all got sorted i= n the wrong folder. I see a few potential issues here. >=20 > =B3The set of attribute certificates is the union of the set of end-entity > (attribute) certificates and the set of AA certificates.=B2 I don=B9t think an AA certificate is an attribute certificate. I view it as = a public key certificate issued to the AA. > =B3The set of CA certificates is the union of the set of self-issued > (public-key) certificates and the set cross certificates. The latter is a > little confusing, as a cross certificate can also be an attribute > certificate.=B2 Except for Russ comment, what is true for Self Signed SSL/TLS certificates out there. Are they issued as CA certificates or as EE certificates (Basic Constraints CA=3DFALSE). I could not find any samples to study, doing a quick search. /Stefan On 09-04-09 5:25 PM, "Erik Andersen" wrote: > Hi Denis, > =20 > It is a little dangerous not to respond to my comments. Due to the appare= nt > inactivity of people, I have the power to produce Defect Reports, produce > Draft Technical Corrigenda, run them through both the ISO and ITU-T appro= val > process and finally integrate them into the next edition of X.500 (incl. > X.509) without being stopped by anyone (except for Jean-Paul Lemaire). > =20 > I believe you misunderstood my diagram. It may be a little confusing. Let= me > express myself without the diagram. > =20 > The set of certificates is the union of the set of public-key certificate= s and > the set of attribute certificates. > =20 > The set of end-entity certificates is the union of public-key certificate= s > issued to end-entities and the set of attribute certificates issued to > end-entities. However, X.509 is a little confusing here as the term end-e= ntity > certificate is sometimes meant to be just public-key certificates issued = to > end-entities, so the term end-entity certificate has two meanings. > =20 > The set of public-key certificates is the union of the set of end-entity > (public-key) certificates and the set of CA certificates. > =20 > The set of attribute certificates is the union of the set of end-entity > (attribute) certificates and the set of AA certificates. > =20 > The set of authority certificates is the union of the set CA certificates= and > the set of AA certificates. > =20 > The set of CA certificates is the union of the set of self-issued (public= -key) > certificates and the set cross certificates. The latter is a little confu= sing, > as a cross certificate can also be an attribute certificate. > =20 > I am avoiding here to use the term =B3user attribute=B2, but believe it is > supposed to mean a public-key certificate issued to an end-entity. > =20 > Whenever an innocent reader sees the term =B3certificate=B2, he/she is entitl= ed to > believe it can either be a public-key certificate. It may not always be c= lear > from the context what is meant. > =20 > Whenever an innocent us =A0reader see the term =B3end-entity certificate=B2, he= /she > is entitled to believe it is either a public key certificate or an attrib= ute > certificate issued to an end-entity. > =20 > Whenever an innocent us =A0reader see the term =B3cross-certificate=B2, he/she = is > entitled to believe it is either a public key certificate or an attribute > certificate. > =20 > My proposal was only to clear-up the terminology and to use the terminolo= gy > consistent in the text of X.509. Trying to do the latter may raise a numb= er of > detailed questions when the meaning is not absolutely clear from the cont= ext. > =A0 > =20 >=20 > Erik Andersen >=20 > Andersen's L-Service >=20 > Elsevej 48, DK-3500 Vaerloese >=20 > Denmark >=20 > Mobile: +45 2097 1490 >=20 > email: era@x500.eu >=20 > www.x500.eu >=20 > www.x500standard.com >=20 > =20 > -----Original Message----- > From: x500standard-bounce@freelists.org > [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas > Sent: 3. april 2009 17:33 > To: x500 list; ietf-pkix > Subject: [x500standard] Re: Certificate definitions > =20 >=20 > Eric, >=20 > =20 >=20 > Silence does not mean approval. >=20 > =20 >=20 > It may mean that the corrections are so numerous that it would take too l= ong > to respond >=20 > and that people do not have that time available at the moment. >=20 > =20 >=20 > e.g.: an End-entity attribute certificate is not linked to a public-key > certificate. >=20 > a cross-certificate is not linked to an AA certificate. >=20 > an Authority Certificate is not linked to an Attribute Certificat= e. >=20 > =20 >=20 > This is only a start ... >=20 > =20 >=20 > Denis >>=20 >> ----- Message re=E7u ----- >>=20 >> De : owner-ietf-pkix >>=20 >> =C0 : x500standard,'PKIX' >> >>=20 >> Date : 2009-04-03, 17:00:01 >>=20 >> Sujet : RE: [x500standard] Certificate definitions >>=20 >> =20 >>=20 >> I take silence as approval. >> =20 >>=20 >> Erik Andersen >>=20 >> Andersen's L-Service >>=20 >> Elsevej 48, DK-3500 Vaerloese >>=20 >> Denmark >>=20 >> Mobile: +45 2097 1490 >>=20 >> email: era@x500.eu >>=20 >> www.x500.eu >>=20 >> www.x500standard.com >>=20 >> =20 >> -----Original Message----- >> From: x500standard-bounce@freelists.org >> [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen >> Sent: 1. april 2009 14:40 >> To: Directory list; PKIX >> Subject: [x500standard] Certificate definitions >> =20 >> Hi >> =20 >> I got a number of responses on user certificates, but quite little that >> actually answered my question. >> =20 >> I have tried to dig a little bit more in X.509 to get hold of the termin= ology >> and then produced below figure. I will not comment all the boxes. >> =20 >>=20 >> =20 >> I will like you to comments as to the correctness of above figure. >>=20 >> =20 >>=20 >> The end-entity certificate is not defined in the definition clause. Howe= ver >> it is used widely in the main text. It is mentioned the first time in cl= ause >> 7 as a public-key certificate. There are several other places where it i= s a >> public-key certificate. In 15.5.2.4 is used in the context of attribute >> certificates. The conclusion must be that an end-entity certificate can >> either be a end-entity public-key certificate or an end-entity attribute >> certificate. However, in most places, it is implied that we only talks a= bout >> public-key certificates. For veterans, this is not a major problem, but >> new-comers may get confused. Anyway, I thing our specifications should b= e >> clear and not subject to interpretation. RFC 5280 does not use the term = at >> all. It seems just to use the term =B3certificate=B2 as a synonym for >> =B3end-entrity public key certificate=B2. >>=20 >> =20 >>=20 >> The =B3User Certificate=B2 is not defined in X.509, but is wide used. It se= ems >> to be a synonym for =B3end-entrity public key certificate=B2. It is also use= d in >> X.511. RFC 5280 uses the term once without differenting it from just >> =B3certificate=B2. >>=20 >> =20 >>=20 >> The term =B3cross-certificate=B2 should probably also be qualified. >>=20 >> =20 >>=20 >> I suggest to add in X.509 definitions for: >>=20 >> =20 >>=20 >> =B3end-entity public-key certificate=B2 >>=20 >> =B3user certificate=B2 as a synonym for =B3end-entity public-key certificate=B2 >>=20 >> =B3end-entity attribute certificate=B2 >>=20 >> =20 >>=20 >> The X.509 text should be updated to make use of these definitions. >>=20 >> =20 >>=20 >> X.509 has four attribute types for holding certificates. >>=20 >> =20 >>=20 >> UserCertificate: For end-entity public-key certificates >>=20 >> cAcertificate: For CA certificates >>=20 >> attributeCertificateAttribute: For end-entity attribute certificates >>=20 >> aACertificate: For AA Certificates >>=20 >> =20 >>=20 >> Any comments? >>=20 >> =20 >>=20 >> Erik Andersen >>=20 >> Andersen's L-Service >>=20 >> Elsevej 48, DK-3500 Vaerloese >>=20 >> Denmark >>=20 >> Mobile: +45 2097 1490 >>=20 >> email: era@x500.eu >>=20 >> www.x500.eu >>=20 >> www.x500standard.com >>=20 >> =20 >=20 --B_3322381808_2992874 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: [x500standard] Re: Certificate definitions Eric,

There is always a danger with cross posting to multiple mailing lists. Inst= ead of making more people aware of the issue, it may have the opposite effec= t. In my case it made me miss all these mails as they all got sorted in the = wrong folder.

 I see a few potential issues here.
<= SPAN STYLE=3D'font-size:11pt'>
The set of attribute certificates is the unio= n of the set of end-entity (attribute) certificates and the set of AA certif= icates.”

I don’t think an AA certificate is an attribute certi= ficate. I view it as a public key certificate issued to the AA.

<= SPAN STYLE=3D'font-size:11pt'>“The set of CA cert= ificates is the union of the set of self-issued (public-key) certificates an= d the set cross certificates. The latter is a little confusing, as a cross c= ertificate can also be an attribute certificate.”

Except for Russ comment, what is true for Self Signed SSL/TL= S certificates out there. Are they issued as CA certificates or as EE certif= icates (Basic Constraints CA=3DFALSE). I could not find any samples to study, = doing a quick search.

/Stefan

On 09-04-09 5:25 PM, "Erik Andersen" <er= a@x500.eu> wrote:

Hi Denis,
 
It is a little dangerous not to respond to my comments. Due to the apparent= inactivity of people, I have the power to produce Defect Reports, produce D= raft Technical Corrigenda, run them through both the ISO and ITU-T approval = process and finally integrate them into the next edition of X.500 (incl. X.5= 09) without being stopped by anyone (except for Jean-Paul Lemaire).
 
I believe you misunderstood my diagram. It may be a little confusing. Let m= e express myself without the diagram.
 
The set of certificates is the union of the set of public-key certificates = and the set of attribute certificates.
 
The set of end-entity certificates is the union of public-key certificates = issued to end-entities and the set of attribute certificates issued to end-e= ntities. However, X.509 is a little confusing here as the term end-entity ce= rtificate is sometimes meant to be just public-key certificates issued to en= d-entities, so the term end-entity certificate has two meanings.
 
The set of public-key certificates is the union of the set of end-entity (p= ublic-key) certificates and the set of CA certificates.
 
The set of attribute certificates is the union of the set of end-entity (at= tribute) certificates and the set of AA certificates.
 
The set of authority certificates is the union of the set CA certificates a= nd the set of AA certificates.
 
The set of CA certificates is the union of the set of self-issued (public-k= ey) certificates and the set cross certificates. The latter is a little conf= using, as a cross certificate can also be an attribute certificate.
 
I am avoiding here to use the term “user attribute”, but believ= e it is supposed to mean a public-key certificate issued to an end-entity.  
Whenever an innocent reader sees the term “certificate”, he/she= is entitled to believe it can either be a public-key certificate. It may no= t always be clear from the context what is meant.
 
Whenever an innocent us =A0reader see the term “end-entity certificate&= #8221;, he/she is entitled to believe it is either a public key certificate = or an attribute certificate issued to an end-entity.
 
Whenever an innocent us =A0reader see the term “cross-certificate”= ;, he/she is entitled to believe it is either a public key certificate or an= attribute certificate.
 
My proposal was only to clear-up the terminology and to use the terminology= consistent in the text of X.509. Trying to do the latter may raise a number= of detailed questions when the meaning is not absolutely clear from the con= text. =A0
 

Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com


-----Original Message-----
From: x500standard-bounc= e@freelists.org [mail= to:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33
To: x500 list; ietf-pkix
Subject: [x500standard] Re: Certificate definitions


Eric,



Silence does not mean approval.



It may mean that the corrections are so numero= us that it would take too long to respond

and that people do not have that time availabl= e at the moment.



e.g.:  an End-entity attribute certificat= e is not linked to a public-key certificate.

       a c= ross-certificate is not linked to an AA certificate.

       an = Authority Certificate is not linked to an Attribute Certificate.



This is only a start ...



Denis

----- Message reçu -----

De : owner-ietf-pkix <mailto%20:owner-ietf-pkix@mail.imc.org>  = ;

À : x500standard,'PKIX' <mailt= o%20:x500standard@freelists.org,ietf-pkix@imc.org>  

Date : 2009-04-03, 17:00:01

Sujet : RE: [x500standard] Certificate d= efinitions



I take silence as approval.


Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

-----Original Message-----
From: x500standard-bounc= e@freelists.org [mail= to:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen<= BR> Sent: 1. april 2009 14:40
To: Directory list; PKIX
Subject: [x500standard] Certificate definitions

Hi

I got a number of responses on user certificates, but quite little that ac= tually answered my question.

I have tried to dig a little bit more in X.509 to get hold of the terminol= ogy and then produced below figure. I will not comment all the boxes.



I will like you to comments as to the correctness of above figure.


The end-entity certificate is not defined in the definition clause. Howeve= r it is used widely in the main text. It is mentioned the first time in clau= se 7 as a public-key certificate. There are several other places where it is= a public-key certificate. In 15.5.2.4 is used in the context of attribute c= ertificates. The conclusion must be that an end-entity certificate can eithe= r be a end-entity public-key certificate or an end-entity attribute certific= ate. However, in most places, it is implied that we only talks about public-= key certificates. For veterans, this is not a major problem, but new-comers = may get confused. Anyway, I thing our specifications should be clear and not= subject to interpretation. RFC 5280 does not use the term at all. It seems = just to use the term “certificate” as a synonym for “end-e= ntrity public key certificate”.


The “User Certificate”  is not defined in X.509, but is w= ide used. It seems to be a synonym for “end-entrity public key certifi= cate”. It is also used in X.511. RFC 5280 uses the term once without d= ifferenting it from just “certificate”.


The term “cross-certificate” should probably also be qualified= .


I suggest to add in X.509 definitions for:


“end-entity public-key certificate”

“user certificate” as a synonym for “end-entity public-k= ey certificate”

“end-entity attribute certificate”


The X.509 text should be updated to make use of these definitions.


X.509 has four attribute types for holding certificates.


UserCertificate: For end-entity public-key certificates

cAcertificate: For CA certificates

attributeCertificateAttribute: For end-entity attribute certificates

aACertificate: For AA Certificates


Any comments?


Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

=
--B_3322381808_2992874-- --B_3322381808_2965858 Content-Type: image/gif; name="image.gif" Content-ID: <3322381807_2988502> Content-Transfer-Encoding: base64 R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAs AAAAAN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct 9/4PDAqHRAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O 8609/w8YGOMnaEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszql IcFDKzvL5pqrKwSLUbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3Wku TFtuvg7Tvf3e6q7u/aH+e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2Y xoX//iB6fCdRWr59/A4e3OgMJY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0 aRWkdJgqfdrEqRyoVBNJ3Vk1a0xtV7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3 bzMTfPv6/QsYhN7BdsSV6UA4MSLDaRErfty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3O MyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2zt++zwKkKHw5199jjyHMWp8u8eUTbik1LjweM Oufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYe iOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaHFpYiYhQlZmYWKCc+seJW2bSoA4wL hpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5goyQuSRwKp43JOqnJlcrV9Fww5 D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAdlO3YF45BdcbyQkNlJlQX knmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+pMjJnQpCSeZGXgsbq ap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4CaKh16AD7aEqa beqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvqsSYley+l 6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCtZtue o1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8S PpTiQ58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrW bIzwJO5Rtn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h 7aquPov3ZYG/hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9Wt gN3j3vcS2JmqMXA0B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbS J4XFmOEr+lTBy3WwZyuxIQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL /6mwejO8YOZkCMXAmUiLVoSTF5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vk oz7q5I9iLIognXPIlyRyJoTcwR0TZ0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb 8McxqCdiYtwDEql1SkfOjE+UeNiXNDYoft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5Uq vZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrCUY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4on ysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNXrDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10H xU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK61Jc/ycHSjipDUTaA2Dkv6q556DNm i2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQaziIlTHHii4caleo5g9a1h52K JNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEpGcA4HjOPpUHsRwzLqogy Fq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/tacmbWmp2k7GonWdvS YnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92hNXc72+UPYZuT Xet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWYbgPu4X9/ s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOcNRyK VXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUI UpNDqlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrU dcS0pyMtV1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqC yM7FWKyLaUxSCxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkz FtViBau93s2xfoV72GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9v M9zepPpkoyCucJwKXOMr4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/l bpq/k6BbTfi6Vg6yaH96NSCPXcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm7 2XQZonTWtxAVrO1G7TSuXWmBc7uAUvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStd Ka4crgu7ouV+a08zHsy9xf1O6778vXNp+TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81 qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWqOjzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/ tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9+Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5 x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BEdXUY4VDm8nzHBXwf6FylBDJvJzf0 Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2OF+ENXLLFno1VUvKhoJvgUv4 V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8xzoiyDf0JnpMVnL6pkw+ t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTgAYVKeG7qxn6fR34d 1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaBqFh1u1JRctiB MTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriKlRYbw4iN L5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP/bhu /niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMl KymUPElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYI d0HXlZdolsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5 QompmF6JE4YZHACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZ WKs5bZ51W7FZm6XJmqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2I nNdpm9QpM0fmnLk4WLKZV555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55b RJsMKHAmh2s49XP/OSa9qXSo+ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g 6Z0GKncZmp4FZzGECHRrqZYPOn1atzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haR hX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOXFHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9w dXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjBSFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6 iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj 7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqdI2op9zKiv1pXx9moVrOrGgdvxxp7 PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBquBcd3ygqpcRqX6DeHiMc0+RWq 1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd85VKiCitKmjqr7YlpC3N1 cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/OqoYCmwGHtxBAWsJLut ABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SInasmKzqTXrtV87 tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 --B_3322381808_2965858-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C31i6g017898 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 20:01:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3C31ixE017897; Sat, 11 Apr 2009 20:01:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C31gR0017891 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 20:01:43 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 20:01:42 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 20:01:42 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sun, 12 Apr 2009 03:03:37 +0000 X-BigFish: ps-43(zz98dR936fK9371Pzz2cfT1202hzz4461rz2dheIL6bh) X-FB-SS: 5, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B92E.85ED62AC" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 12:16:21 -0400 Message-ID: In-Reply-To: <49DE1DAF.2000307@nist.gov> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm5LZm+5dIHybYeQIyTtW4kxKHJXQAAMztA References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> <49DE1DAF.2000307@nist.gov> From: Santosh Chokhani To: CC: ietf-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (SVC-EXGWY-E802.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B92E.85ED62AC Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable David, =20 We agree. That is why my parenthetical remark. ________________________________ From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of David A. Cooper Sent: Thursday, April 09, 2009 12:09 PM To: x500standard@freelists.org Cc: ietf-pkix Subject: [x500standard] Re: Certificate definitions =09 =09 Santosh Chokhani wrote:=20 [Santosh]: The above paragraph has two inaccuracies. Since not all CA certificates are called cross certificates, set of CA certificates are self-issued, cross certificate, and subordinate CA certificates. (I wish we had not distinguished between cross certificates and subordinate CA certificates in the first place). Also note that a cross certificate can not be attribute certificate. I don't see an AA cross certificate in RFC 3281 or in X.509 =09 Santosh, =09 RFC 5280 says that "Cross-certificates are CA certificates in which the issuer and subject are different entities." =09 X.509 defines a cross-certificate as "A public-key or attribute certificate where the issuer and the subject/holder are different CAs or AAs respectively. CAs and AAs issue cross-certificates to other CAs or AAs respectively as a mechanism to authorize the subject CA's existence (e.g., in a strict hierarchy) or to recognize the existence of the subject CA or holder AA (e.g., in a distributed trust model). The cross-certificate structure is used for both of these." =09 So, every CA certificate is either self-issued or a cross-certificate. =09 I know that a lot of people seem to think that a certificate issued in a hierarchy by a hierarchically superior CA to a subordinate CA is not a "cross-certificate", that belief is not consistent with either X.509 or RFC 5280. (Perhaps people are simply guessing the meaning of "cross-certificate", and the inclusion of "cross" in the name leads them to guess that the term does not incorporate certificates issued to subordinate CAs.) If documents are being created that use the term "cross-certificate" to mean only CA certificates that are neither self-issued nor issued to a subordinate CA, then they are creating confusion by misusing the term. =09 Dave =09 ----- www.x500standard.com: The central source for information on the X.500 Directory Standard.=20 ------_=_NextPart_001_01C9B92E.85ED62AC Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
David,
 
We agree.  That is why my parenthetical=20 remark.


From: = x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of David = A.=20 Cooper
Sent: Thursday, April 09, 2009 12:09 PM
To: = x500standard@freelists.org
Cc: ietf-pkix
Subject:=20 [x500standard] Re: Certificate definitions

Santosh Chokhani wrote:=20

[Santosh]: The = above=20 paragraph has two inaccuracies.  Since not all CA = certificates=20 are called cross certificates, set of CA certificates are=20 self-issued, cross certificate, and subordinate CA=20 certificates.  (I wish we had not distinguished between cross = certificates and subordinate CA certificates in the first=20 place).  Also note that a cross certificate can not be = attribute=20 certificate.  I don't see an AA cross certificate in RFC 3281 = or in=20 = X.509

=
Santosh,

RFC=20 5280 says that "Cross-certificates are CA certificates in which the = issuer and=20 subject are different entities."

X.509 defines a = cross-certificate as=20 "A public-key or attribute certificate where the issuer and the = subject/holder=20 are different CAs or AAs respectively. CAs and AAs issue = cross-certificates to=20 other CAs or AAs respectively as a mechanism to authorize the subject = CA's=20 existence (e.g., in a strict hierarchy) or to recognize the existence = of the=20 subject CA or holder AA (e.g., in a distributed trust model). The=20 cross-certificate structure is used for both of these."

So, = every CA=20 certificate is either self-issued or a cross-certificate.

I = know that a=20 lot of people seem to think that a certificate issued in a hierarchy = by a=20 hierarchically superior CA to a subordinate CA is not a = "cross-certificate",=20 that belief is not consistent with either X.509 or RFC 5280.  = (Perhaps=20 people are simply guessing the meaning of "cross-certificate", and the = inclusion of "cross" in the name leads them to guess that the term = does not=20 incorporate certificates issued to subordinate CAs.)   If = documents are=20 being created that use the term "cross-certificate" to mean only CA=20 certificates that are neither self-issued nor issued to a subordinate = CA, then=20 they are creating confusion by misusing the = term.

Dave

----- www.x500standard.com: The central source = for=20 information on the X.500 Directory Standard. = ------_=_NextPart_001_01C9B92E.85ED62AC-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C193X9014100 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 18:09:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3C192sV014099; Sat, 11 Apr 2009 18:09:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (mailc.microsoft.com [131.107.115.214]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3C191Lc014092 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 18:09:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 18:09:00 -0700 Received: from tk5-exmlt-w602.wingroup.windeploy.ntdev.microsoft.com (157.54.18.33) by tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 18:09:00 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sun, 12 Apr 2009 01:09:00 +0000 X-BigFish: ps-90(zz1432R98dR14ffO936eQ1443R1805M9371Pzz2cfT1202hzz5a6ciz2dheIL6bh65h) X-Spam-TCS-SCL: 4:0 X-FB-SS: 5,5, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 8 Apr 2009 01:00:29 +0200 Subject: Re: Revocation scheme definition From: Stefan Santesson To: Jorge =?ISO-8859-1?B?TPNwZXo=?= , Message-ID: Thread-Topic: Revocation scheme definition Thread-Index: Acm31KU9P6Updu1cdk2ECIQhTrzzMA== In-Reply-To: MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="B_3321997232_36557475" List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (TK5-EXGWY-E801.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --B_3321997232_36557475 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Jorge, Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :) Other than that I feel sympathetic to your distinction between revocation and validation. It is however my belief that we have used that distinction in our standards efforts. /Stefan On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: > Hi all, >=20 > Next I merely offer personal considerations about the (in my opinion) > confusing scenario of PKI terminology classification. I would appreciate = any > comment on this. >=20 > As can be seen in the literature, most people define CRL, Partitioned CRL= , > Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status= , > Certificate Revocation Tree, etc. as revocation schemes. I think this > "classification" is confusing. >=20 > I personally consider a revocation scheme as a scheme/protocol where the = owner > (or an authorised party) is able to revocate the status of her certificat= e. > For example, the one defined in RFC 4210 CMP. However, the terms mentione= d > above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechan= isms > to make that data structure available to others (Over-Issued CRL, Over-Is= sued > Segmented CRL, etc.) and both the managed data structure and the associat= ed > publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). But = none > of them to the procedure to be followed in order to revocate the certific= ate! > If fact OCSP is sometimes referenced as a revocation scheme, when it is > actually focused on "just" checking the revocation status of a certificat= e... >=20 > From my viewpoint, I would differentiate among the scheme, the certificat= e > status information itself - CSI (data structure) - and the method that > distributes/publishes the CSI. A revocation scheme updates the CSI. Howev= er, > the publication/distribution method is oriented to support the validation= of > certificates. IMHO it has nothing to do with a revocation scheme. Perhaps= you > may consider appropiate to include in the term "revocation scheme" everyt= hing > that has something to do with the revocation information... >=20 > Therefore, I distinguish a revocation scheme from another type of scheme > (validation scheme) which aim is to check the status of a certificate tak= ing > into account the CSI. This CSI could be distributed/published by using on= e of > the methods defined above, or accessed in an online manner (an OCSP servi= ce > that retrieves the CSI from a fresh database). >=20 > I guess that the revocation scheme term has been extended to things not s= o > related to the revocation itself, like the validation procedure. I just w= ant > to know what the PKI community think about this. >=20 > Thanks in advance, >=20 > -------- > Jorge Lopez Hernandez-Ardieta >=20 >=20 >=20 --B_3321997232_36557475 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Re: Revocation scheme definition Jorge,

Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :)

Other than that I feel sympathetic to your distinction between revocation a= nd validation. It is however my belief that we have used that distinction in= our standards efforts.

/Stefan



On 4/7/09 1:42 PM, "Jorge López" <jlopez.ha@gmail.com> wrote:

<= SPAN STYLE=3D'font-size:11pt'>Hi all,

Next I merely offer personal considerations about the (in my opinion) confu= sing scenario of PKI terminology classification. I would appreciate any comm= ent on this.

As can be seen in the literature, most people define CRL, Partitioned CRL, = Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status, C= ertificate Revocation Tree, etc. as revocation schemes. I think this "c= lassification" is confusing.

I personally consider a revocation scheme as a scheme/protocol where the ow= ner (or an authorised party) is able to revocate the status of her certifica= te. For example, the one defined in RFC 4210 CMP. However, the terms mention= ed above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechan= isms to make that data structure available to others (Over-Issued CRL, Over-= Issued Segmented CRL, etc.) and both the managed data structure and the asso= ciated publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). = But none of them to the procedure to be followed in order to revocate the ce= rtificate! If fact OCSP is sometimes referenced as a revocation scheme, when= it is actually focused on "just" checking the revocation status o= f a certificate...

>From my viewpoint, I would differentiate among the scheme, the certificate = status information itself - CSI (data structure) - and the method that distr= ibutes/publishes the CSI. A revocation scheme updates the CSI. However, the = publication/distribution method is oriented to support the validation of cer= tificates. IMHO it has nothing to do with a revocation scheme. Perhaps you m= ay consider appropiate to include in the term "revocation scheme" = everything that has something to do with the revocation information...

Therefore, I distinguish a revocation scheme from another type of scheme (v= alidation scheme) which aim is to check the status of a certificate taking i= nto account the CSI. This CSI could be distributed/published by using one of= the methods defined above, or accessed in an online manner (an OCSP service= that retrieves the CSI from a fresh database).

I guess that the revocation scheme term has been extended to things not so = related to the revocation itself, like the validation procedure. I just want= to know what the PKI community think about this.

Thanks in advance,

--------
Jorge Lopez Hernandez-Ardieta



--B_3321997232_36557475-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BNsZHe011299 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 16:54:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3BNsZC4011298; Sat, 11 Apr 2009 16:54:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BNsOHg011285 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 16:54:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 16:54:24 -0700 Received: from tk5-exmlt-w602.wingroup.windeploy.ntdev.microsoft.com (157.54.18.33) by tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 16:54:23 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 23:54:22 +0000 X-BigFish: ps-38(zz20dbM14e1Jzz2cfT1202hzzz2dheIL6bh6di) X-FB-SS: 13, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Message-ID: <51FB0BC2B15540E3BAC7C0464B479375@AndersPC> From: Anders Rundgren To: Subject: - An HTML5 standard facility? Date: Tue, 7 Apr 2009 22:13:42 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (TK5-EXGWY-E801.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-element Since the PKI community at large seems to ignore the client-side of PKI in browsers, the HTML 5 designers apparently didn't find any other solution but adopting the 15 year old Netscape hack known as . It is indeed as said in this list very simple to use etc. However, does it really match the needs of today? My guess FWIW, is that the serious users of on-line provisioning of PKI which includes governments and banks in the EU, as well as the USPTO will continue to use entirely proprietary solutions (mostly using Java), since the browser-schemes are all-over-the-map and do not do signatures either. A few things to consider: How could a static tag in a page mark-up language match an API or a protocol? Algorithm agility, isn't that a requirement these days? PIN-codes anybody? TPM - A dead duck? Anders Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BCV47G079326 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 05:31:04 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3BCV4wU079325; Sat, 11 Apr 2009 05:31:04 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BCV2Yd079319 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 05:31:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 05:31:02 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 05:31:02 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 12:32:55 +0000 X-BigFish: ps-60(zz146fK542Ndf9M62a3Laf6W936eQ936fKzz2cfT1202h1082kzz4461rz2dh54h53keIL6bh6di34h61h) X-Spam-TCS-SCL: 0:0 X-FB-SS: 5,5,5, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f From: Erik Andersen To: , "'ietf-pkix'" Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 17:25:37 +0200 Message-ID: <7B01F815F4064ABEB6447E403CA12C56@ERA1> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0000_01C9B938.35920940" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6838 Importance: Normal Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOw In-Reply-To: X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (tk5-exgwy-e802.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------=_NextPart_000_0000_01C9B938.35920940 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0001_01C9B938.35920940" ------=_NextPart_001_0001_01C9B938.35920940 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the = apparent inactivity of people, I have the power to produce Defect Reports, = produce Draft Technical Corrigenda, run them through both the ISO and ITU-T = approval process and finally integrate them into the next edition of X.500 (incl. X.509) without being stopped by anyone (except for Jean-Paul Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. = Let me express myself without the diagram. =20 The set of certificates is the union of the set of public-key = certificates and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key = certificates issued to end-entities and the set of attribute certificates issued to end-entities. However, X.509 is a little confusing here as the term end-entity certificate is sometimes meant to be just public-key = certificates issued to end-entities, so the term end-entity certificate has two = meanings. =20 The set of public-key certificates is the union of the set of end-entity (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of end-entity (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA = certificates and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute certificate. =20 I am avoiding here to use the term =93user attribute=94, but believe it = is supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term =93certificate=94, he/she is = entitled to believe it can either be a public-key certificate. It may not always = be clear from the context what is meant. =20 Whenever an innocent us reader see the term =93end-entity = certificate=94, he/she is entitled to believe it is either a public key certificate or = an attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term =93cross-certificate=94, = he/she is entitled to believe it is either a public key certificate or an = attribute certificate. =20 My proposal was only to clear-up the terminology and to use the = terminology consistent in the text of X.509. Trying to do the latter may raise a = number of detailed questions when the meaning is not absolutely clear from the context. =20 =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =20 Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too = long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a public-key certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute = Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions =20 I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first time in = clause 7 as a public-key certificate. There are several other places where it = is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term = at all. It seems just to use the term =93certificate=94 as a synonym for =93end-entrity public key certificate=94. =20 The =93User Certificate=94 is not defined in X.509, but is wide used. = It seems to be a synonym for =93end-entrity public key certificate=94. It is also = used in X.511. RFC 5280 uses the term once without differenting it from just =93certificate=94. =20 The term =93cross-certificate=94 should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 =93end-entity public-key certificate=94 =93user certificate=94 as a synonym for =93end-entity public-key = certificate=94 =93end-entity attribute certificate=94 =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attribute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------=_NextPart_001_0001_01C9B938.35920940 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

Hi = Denis,

 

It is a little = dangerous not to respond to my comments. Due to the apparent inactivity of people, = I have the power to produce Defect Reports, produce Draft Technical Corrigenda, = run them through both the ISO and ITU-T approval process and finally = integrate them into the next edition of X.500 (incl. X.509) without being stopped by = anyone (except for Jean-Paul = Lemaire).

 

I believe you = misunderstood my diagram. It may be a little confusing. Let me express myself without = the diagram.

 

The set of = certificates is the union of the set of public-key certificates and the set of = attribute certificates.

 

The set of = end-entity certificates is the union of public-key certificates issued to end-entities and the = set of attribute certificates issued to end-entities. However, X.509 is a = little confusing here as the term end-entity certificate is sometimes meant to = be just public-key certificates issued to end-entities, so the term end-entity certificate has two meanings.

 

The set of = public-key certificates is the union of the set of end-entity (public-key) = certificates and the set of CA certificates.

 

The set of = attribute certificates is the union of the set of end-entity (attribute) = certificates and the set of AA certificates.

 

The set of = authority certificates is the union of the set CA certificates and the set of AA certificates.

 

The set of CA certificates is the union of the set of self-issued (public-key) = certificates and the set cross certificates. The latter is a little confusing, as a = cross certificate can also be an attribute certificate.

 

I am avoiding = here to use the term “user attribute”, but believe it is supposed to = mean a public-key certificate issued to an end-entity.

 

Whenever an = innocent reader sees the term “certificate”, he/she is entitled to believe = it can either be a public-key certificate. It may not always be clear from the = context what is meant.

 

Whenever an = innocent us =A0reader see the term “end-entity certificate”, he/she is entitled to believe it is either a public key certificate or an attribute = certificate issued to an end-entity.

 

Whenever an = innocent us =A0reader see the term “cross-certificate”, he/she is entitled to = believe it is either a public key certificate or an attribute = certificate.

 

My proposal was = only to clear-up the terminology and to use the terminology consistent in the text of = X.509. Trying to do the latter may raise a number of detailed questions when the = meaning is not absolutely clear from the context. =A0

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, = DK-3500 Vaerloese

Denmark

Mobile: +45 2097 = 1490

email: era@x500.eu

www.x500.eu

www.x500standard.= com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas
Sent: 3. april 2009 =
17:33
To: x500 list; =
ietf-pkix
Subject: [x500standard] = Re: Certificate definitions

 

Eric,

 

Silence does = not mean approval.

 

It may = mean that the corrections are so numerous that it would take too long to = respond

and that = people do not have that time available at the moment.

 

e.g.:  = an End-entity attribute certificate is not linked to a public-key = certificate.

    &nb= sp;    a cross-certificate is not linked to an AA = certificate.

    &nb= sp;    an Authority Certificate is not linked to an Attribute = Certificate.

 

This is = only a start ...

 

Denis

----- Message = re=E7u -----

Date = : 2009-04-03, 17:00:01

Sujet = : RE: [x500standard] Certificate definitions

 

I take silence as approval.

 

Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen
Sent: 1. april 2009 = 14:40
To: Directory list; = PKIX
Subject: [x500standard] Certificate definitions

 

Hi

 

I got a number = of responses on user certificates, but quite little that actually answered = my question.

 

I have tried = to dig a little bit more in X.509 to get hold of the terminology and then = produced below figure. I will not comment all the boxes.

 

 

I will like = you to comments as to the correctness of above figure.

 

The end-entity certificate is not defined in the definition clause. However it is used = widely in the main text. It is mentioned the first time in clause 7 as a = public-key certificate. There are several other places where it is a public-key certificate. In 15.5.2.4 is used in the context of attribute = certificates. The conclusion must be that an end-entity certificate can either be a = end-entity public-key certificate or an end-entity attribute certificate. However, = in most places, it is implied that we only talks about public-key certificates. = For veterans, this is not a major problem, but new-comers may get confused. = Anyway, I thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.

 

The = “User Certificate”  is not defined in X.509, but is wide used. It = seems to be a synonym for “end-entrity public key certificate”. It is = also used in X.511. RFC 5280 uses the term once without differenting it from = just “certificate”.

 

The term = “cross-certificate” should probably also be qualified.

 

I suggest to = add in X.509 definitions for:

 

“end-entity public-key certificate”

“user = certificate” as a synonym for “end-entity public-key = certificate”

“end-entity attribute certificate”

 

The X.509 text = should be updated to make use of these definitions.

 

X.509 has four = attribute types for holding certificates.

 

UserCertificate: For end-entity public-key certificates

cAcertificate: = For CA certificates

attributeCertificateAttribut= e: For end-entity attribute certificates

aACertificate: = For AA Certificates

 

Any = comments?

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, DK-3500 = Vaerloese

Denmark

Mobile: +45 = 2097 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com<= /font>

 

------=_NextPart_001_0001_01C9B938.35920940-- ------=_NextPart_000_0000_01C9B938.35920940 Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_000_0000_01C9B938.35920940-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BA4APb071332 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 03:04:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3BA4AQM071331; Sat, 11 Apr 2009 03:04:10 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3BA3xOE071320 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 03:04:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from TK5-EXHUB-C101.redmond.corp.microsoft.com (157.54.18.48) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 03:03:58 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by TK5-EXHUB-C101.redmond.corp.microsoft.com (157.54.18.48) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 03:03:58 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 10:05:51 +0000 X-BigFish: ps-96(zz1418M1432R98dR14ffO936eQ1443R1805M936fK9371Pzz2cfT1202h10adjzz5a6ciz2dheIL5eh6bh5fh) X-FB-SS: 5,5,13, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=9Z/kLQvAVeOVthHV9xhPtxDJ1CkrYeiiue5s39nsTtA=; b=r4fQH0SmXvyZSFJctoEctkEIVa5UMW2HKi2Le4nWBMxfp86drF2pcpQeG7GcIQM09o c+2GACOeR7Hjw/d3RkhmHAv1WtB4pJmvhv90K45cTUZJ+O54Enc4b1xzD0WcCGrnxoaI HhZgps7UrahjFeCn0+TSyZcdlAnf/W16d/56I= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=BN3mmPhoNEC5vvDTb12Thzc7syouzFroLftkfxm3kRMTNy8+5wEDMT83k0UkVBs6ez 3KwUcqWbnRhbvtAu9hxHP6oaaMqOTDfGOqwDwAXYG074vaQhgz9NHqZzUK8rOeeBmIoS i0G4s8Wor0OY0EBSgui9fVOIxGaGM8DtZ9VCw= MIME-Version: 1.0 In-Reply-To: <49DCB26D.5050202@nist.gov> References: <49DCB26D.5050202@nist.gov> Date: Wed, 8 Apr 2009 16:57:54 +0200 Message-ID: Subject: Re: Revocation scheme definition From: =?ISO-8859-1?Q?Jorge_L=F3pez?= To: "David A. Cooper" CC: Stefan Santesson , pkix Content-Type: multipart/alternative; boundary="001485f870603e3a0d04670c5b4e" List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (SVC-EXGWY-E802.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --001485f870603e3a0d04670c5b4e Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Thanks Stefan and Dave for your responses. Well, maybe CSI was not the best acronym as a proposal :-) I wasn't talking about PKIX documents, but some research papers, master/doctoral thesis where a classification of "revocation mechanisms" is made. I understand that these domains are out of the scope of the PKIX community, but maybe we should think of "standardizing" some concepts if th= e "rest of the world" tends to confuse them. I think that's one of the tasks of a standardization organization/work group/etc. Possibly it is not worthy to work on it focusing merely on revocation schem= e related terms, but I have been following a thread about digital certificate/end user certificate/etc. terms that seemed to be confusing as well to some folks. Is it crazy to propose an RFC Informational which collects a kind of glossary and definitions of PKIX related technology? Best, -------- Jorge Lopez Hernandez-Ardieta 2009/4/8 David A. Cooper > Stefan Santesson wrote: > >> Despite that I would love to put CSI expert on my business card, it migh= t >> be a bit problematic to hijack this acronym :) >> > > Yes, RFC 5513 points out the problem of the overuse of three letter > acronyms (granted it is an April 1 RFC). If we used the acronym CSI, mos= t > people would tend to immediately think of the College of Southern Idaho .= .. > I mean the College of Staten Island ... Computer Security Institute ... > Construction Specifications Institute ... Commodity Systems Inc. ... > Computers & Structures, Inc. ... Chi Sigma Iota ... Christian Schools > International ... Computational Systems, Inc. ... Christian Solidarity > International ... California Solar Initiative ... Canadian Solar Inc. ... > Chandler Systems Inc. ... Communications Specialties, Inc. ... Cetacean > Society International ... Coalition of Service Industries ... Church of > South India ... Computer Society of India ... Cellular Specialties, Inc. = ... > College Student Insurance ... Custom Systems Integration ... Center for > Social Innovation ... Center for Sustainable Innovation ... Creative > Specialties International ... Control Sciences Inc. ... Conditional > Symmetric Instability ... Community Services Infrastructure ... Coastal > Studies Institute ... Curriculum Support Information ... Control Solution= s > International ... Conversion Services International ... Civil Society > International ... Collaborative Software Initiative ... Consolidated Syst= ems > Incorporated ... Center for the Study of Intelligence ... Combat Studies > Institute ... Coatings Societies International ... Chemical Sampling > Information ... California Steel Industries ... Cardiovascular Systems In= c. > ... Conservation Study Institute ... Cognitive Strategy Instruction ... > Compliance Services International ... Cement Sustainability Initiative ..= . > Cyber Safety Initiative ... Center for Student Involvement ... Center for > the Study of Inequality ... Chiropractic Sports Institute ... Closure > Systems International ... Custom Scientific Instruments ... Crisis > Simulations International ... Cooperative Sagebrush Initiative ... Child > Study Institute ... Climate Status Investigations ... Centrifugal Service= s, > Inc. ... Conflict Solutions International ... Caregiver Services, Inc. ..= . > Charter School Institute ... Component Sources International ... > > So I can understand that you would be concerned that if you referred to > yourself as a CSI expert, people might think you meant that you were an > expert in Computational Sciences and Informatics. > > Other than that I feel sympathetic to your distinction between revocatio= n >> and validation. It is however my belief that we have used that distincti= on >> in our standards efforts. >> > > I think it would be helpful if specific examples were provided of places = in > PKIX documents in which the distinction between mechanisms for distributi= ng > certificate status information (e.g., CRLs and OCSP) and mechanisms for > submitting revocation requests (e.g., a CMP revocation request message) i= s > not clear. Perhaps this confusion does appear in the literature, and tho= se > of us on this list simply don't notice it since we already clearly > understand the concepts. But without being provided specific examples of > text that a non-PKI expert might find confusing, it is difficult for us t= o > judge whether this is a problem in PKIX documents that the WG needs to be > more careful about in future documents. > > Dave > > > On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: >> >> Hi all, >> >> Next I merely offer personal considerations about the (in my >> opinion) confusing scenario of PKI terminology classification. I >> would appreciate any comment on this. >> >> As can be seen in the literature, most people define CRL, >> Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, >> Certificate Revocation Status, Certificate Revocation Tree, etc. >> as revocation schemes. I think this "classification" is confusing. >> >> I personally consider a revocation scheme as a scheme/protocol >> where the owner (or an authorised party) is able to revocate the >> status of her certificate. For example, the one defined in RFC >> 4210 CMP. However, the terms mentioned above relate to data >> structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make >> that data structure available to others (Over-Issued CRL, >> Over-Issued Segmented CRL, etc.) and both the managed data >> structure and the associated publication mechanism (NOVOMODO, >> Certificate Revocation Tree, etc.). But none of them to the >> procedure to be followed in order to revocate the certificate! If >> fact OCSP is sometimes referenced as a revocation scheme, when it >> is actually focused on "just" checking the revocation status of a >> certificate... >> >> From my viewpoint, I would differentiate among the scheme, the >> certificate status information itself - CSI (data structure) - and >> the method that distributes/publishes the CSI. A revocation scheme >> updates the CSI. However, the publication/distribution method is >> oriented to support the validation of certificates. IMHO it has >> nothing to do with a revocation scheme. Perhaps you may consider >> appropiate to include in the term "revocation scheme" everything >> that has something to do with the revocation information... >> >> Therefore, I distinguish a revocation scheme from another type of >> scheme (validation scheme) which aim is to check the status of a >> certificate taking into account the CSI. This CSI could be >> distributed/published by using one of the methods defined above, >> or accessed in an online manner (an OCSP service that retrieves >> the CSI from a fresh database). >> >> I guess that the revocation scheme term has been extended to >> things not so related to the revocation itself, like the >> validation procedure. I just want to know what the PKI community >> think about this. >> >> Thanks in advance, >> >> -------- >> Jorge Lopez Hernandez-Ardieta >> >> > --001485f870603e3a0d04670c5b4e Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable
Thanks Stefan and Dave for your responses.

We= ll, maybe CSI was not the best acronym as a proposal :-)

I wasn't talking about PKIX documents, but some research papers,= master/doctoral thesis where a classification of "revocation mechanis= ms" is made. I understand that these domains are out of the scope of t= he PKIX community, but maybe we should think of "standardizing" s= ome concepts if the "rest of the world" tends to confuse them. I = think that's one of the tasks of a standardization organization/work gr= oup/etc.

Possibly it is not worthy to work on it focusing merely= on revocation scheme related terms, but I have been following a thread abo= ut digital certificate/end user certificate/etc. terms that seemed to be co= nfusing as well to some folks.

Is it crazy to propose an RFC Informational which colle= cts a kind of glossary and definitions of PKIX related technology?

Best,

--------
Jorge Lo= pez Hernandez-Ardieta

2009/4/8 David A. Cooper &= lt;david.cooper@nist.gov>
Stefan Santesson wrote:
Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :)

Yes, RFC 5513 points out the problem of the overuse of three letter acronym= s (granted it is an April 1 RFC). =A0If we used the acronym CSI, most peopl= e would tend to immediately think of the College of Southern Idaho ... I me= an the College of Staten Island ... Computer Security Institute ... Constru= ction Specifications Institute ... Commodity Systems Inc. ... Computers &am= p; Structures, Inc. ... Chi Sigma Iota ... Christian Schools International = ... Computational Systems, Inc. ... Christian Solidarity International ... = California Solar Initiative ... Canadian Solar Inc. ... Chandler Systems In= c. ... Communications Specialties, Inc. ... Cetacean Society International = ... Coalition of Service Industries ... Church of South India ... Computer = Society of India ... Cellular Specialties, Inc. ... College Student Insuran= ce ... Custom Systems Integration ... Center for Social Innovation ... Cent= er for Sustainable Innovation ... Creative Specialties International ... Co= ntrol Sciences Inc. ... Conditional Symmetric Instability ... Community Ser= vices Infrastructure ... Coastal Studies Institute ... Curriculum Support I= nformation ... Control Solutions International ... Conversion Services Inte= rnational ... Civil Society International ... Collaborative Software Initia= tive ... Consolidated Systems Incorporated ... Center for the Study of Inte= lligence ... Combat Studies Institute ... Coatings Societies International = ... Chemical Sampling Information ... California Steel Industries ... Cardi= ovascular Systems Inc. ... Conservation Study Institute ... =A0Cognitive St= rategy Instruction ... Compliance Services International ... Cement Sustain= ability Initiative ... Cyber Safety Initiative ... Center for Student Invol= vement ... Center for the Study of Inequality ... Chiropractic Sports Insti= tute ... Closure Systems International ... Custom Scientific Instruments ..= . Crisis Simulations International ... Cooperative Sagebrush Initiative ...= Child Study Institute ... Climate Status Investigations ... Centrifugal Se= rvices, Inc. ... Conflict Solutions International ... Caregiver Services, I= nc. ... Charter School Institute ... Component Sources International ...
So I can understand that you would be concerned that if you referred to you= rself as a CSI expert, people might think you meant that you were an expert= in Computational Sciences and Informatics.


Other than that I feel sympathetic to your distinction between revocation a= nd validation. It is however my belief that we have used that distinction i= n our standards efforts.

I think it would be helpful if specific examples were provided of places in= PKIX documents in which the distinction between mechanisms for distributin= g certificate status information (e.g., CRLs and OCSP) and mechanisms for s= ubmitting revocation requests (e.g., a CMP revocation request message) is n= ot clear. =A0Perhaps this confusion does appear in the literature, and thos= e of us on this list simply don't notice it since we already clearly un= derstand the concepts. =A0But without being provided specific examples of t= ext that a non-PKI expert might find confusing, it is difficult for us to j= udge whether this is a problem in PKIX documents that the WG needs to be mo= re careful about in future documents.

Dave


On 4/7/09 1:42 PM, "Jorge L=F3pez" <jlopez.ha@gmail.com> wrote:

=A0 =A0Hi all,

=A0 =A0Next I merely offer personal considerations about the (in my
=A0 =A0opinion) confusing scenario of PKI terminology classification. I =A0 =A0would appreciate any comment on this.

=A0 =A0As can be seen in the literature, most people define CRL,
=A0 =A0Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO,
=A0 =A0Certificate Revocation Status, Certificate Revocation Tree, etc. =A0 =A0as revocation schemes. I think this "classification" is c= onfusing.

=A0 =A0I personally consider a revocation scheme as a scheme/protocol
=A0 =A0where the owner (or an authorised party) is able to revocate the =A0 =A0status of her certificate. For example, the one defined in RFC
=A0 =A04210 CMP. However, the terms mentioned above relate to data
=A0 =A0structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make =A0 =A0that data structure available to others (Over-Issued CRL,
=A0 =A0Over-Issued Segmented CRL, etc.) and both the managed data
=A0 =A0structure and the associated publication mechanism (NOVOMODO,
=A0 =A0Certificate Revocation Tree, etc.). But none of them to the
=A0 =A0procedure to be followed in order to revocate the certificate! If =A0 =A0fact OCSP is sometimes referenced as a revocation scheme, when it =A0 =A0is actually focused on "just" checking the revocation sta= tus of a
=A0 =A0certificate...

=A0 =A0From my viewpoint, I would differentiate among the scheme, the
=A0 =A0certificate status information itself - CSI (data structure) - and<= br> =A0 =A0the method that distributes/publishes the CSI. A revocation scheme<= br> =A0 =A0updates the CSI. However, the publication/distribution method is =A0 =A0oriented to support the validation of certificates. IMHO it has
=A0 =A0nothing to do with a revocation scheme. Perhaps you may consider =A0 =A0appropiate to include in the term "revocation scheme" eve= rything
=A0 =A0that has something to do with the revocation information...

=A0 =A0Therefore, I distinguish a revocation scheme from another type of =A0 =A0scheme (validation scheme) which aim is to check the status of a =A0 =A0certificate taking into account the CSI. This CSI could be
=A0 =A0distributed/published by using one of the methods defined above, =A0 =A0or accessed in an online manner (an OCSP service that retrieves
=A0 =A0the CSI from a fresh database).

=A0 =A0I guess that the revocation scheme term has been extended to
=A0 =A0things not so related to the revocation itself, like the
=A0 =A0validation procedure. I just want to know what the PKI community =A0 =A0think about this.

=A0 =A0Thanks in advance,

=A0 =A0--------
=A0 =A0Jorge Lopez Hernandez-Ardieta



--001485f870603e3a0d04670c5b4e-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B9lMoe070383 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 11 Apr 2009 02:47:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B9lMr1070382; Sat, 11 Apr 2009 02:47:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B9lAtL070374 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Sat, 11 Apr 2009 02:47:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.2.99.4; Sat, 11 Apr 2009 02:47:10 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by tk5-exhub-c104.redmond.corp.microsoft.com (157.54.88.97) with Microsoft SMTP Server id 8.2.99.4; Sat, 11 Apr 2009 02:47:09 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 09:49:03 +0000 X-BigFish: ps-93(zz1432R98dR14ffO936eQ1443R1805M936fK9371Pzz2cfT1202hzz5a6ciz2dheIL6bh62h) X-Spam-TCS-SCL: 1:0 X-FB-SS: 5, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Message-ID: <49DCB26D.5050202@nist.gov> Date: Wed, 8 Apr 2009 10:19:25 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.21 (X11/20090330) MIME-Version: 1.0 To: =?ISO-8859-1?Q?Jorge_L=F3pez?= , Stefan Santesson CC: pkix Subject: Re: Revocation scheme definition References: In-Reply-To: Content-Type: text/plain; charset="ISO-8859-1"; format=flowed X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable Received-SPF: None (SVC-EXGWY-E802.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan Santesson wrote: > Despite that I would love to put CSI expert on my business card, it=20 > might be a bit problematic to hijack this acronym :) Yes, RFC 5513 points out the problem of the overuse of three letter=20 acronyms (granted it is an April 1 RFC). If we used the acronym CSI,=20 most people would tend to immediately think of the College of Southern=20 Idaho ... I mean the College of Staten Island ... Computer Security=20 Institute ... Construction Specifications Institute ... Commodity=20 Systems Inc. ... Computers & Structures, Inc. ... Chi Sigma Iota ...=20 Christian Schools International ... Computational Systems, Inc. ...=20 Christian Solidarity International ... California Solar Initiative ...=20 Canadian Solar Inc. ... Chandler Systems Inc. ... Communications=20 Specialties, Inc. ... Cetacean Society International ... Coalition of=20 Service Industries ... Church of South India ... Computer Society of=20 India ... Cellular Specialties, Inc. ... College Student Insurance ...=20 Custom Systems Integration ... Center for Social Innovation ... Center=20 for Sustainable Innovation ... Creative Specialties International ...=20 Control Sciences Inc. ... Conditional Symmetric Instability ...=20 Community Services Infrastructure ... Coastal Studies Institute ...=20 Curriculum Support Information ... Control Solutions International ...=20 Conversion Services International ... Civil Society International ...=20 Collaborative Software Initiative ... Consolidated Systems Incorporated=20 ... Center for the Study of Intelligence ... Combat Studies Institute=20 ... Coatings Societies International ... Chemical Sampling Information=20 ... California Steel Industries ... Cardiovascular Systems Inc. ...=20 Conservation Study Institute ... Cognitive Strategy Instruction ...=20 Compliance Services International ... Cement Sustainability Initiative=20 ... Cyber Safety Initiative ... Center for Student Involvement ...=20 Center for the Study of Inequality ... Chiropractic Sports Institute ...=20 Closure Systems International ... Custom Scientific Instruments ...=20 Crisis Simulations International ... Cooperative Sagebrush Initiative=20 ... Child Study Institute ... Climate Status Investigations ...=20 Centrifugal Services, Inc. ... Conflict Solutions International ...=20 Caregiver Services, Inc. ... Charter School Institute ... Component=20 Sources International ... So I can understand that you would be concerned that if you referred to=20 yourself as a CSI expert, people might think you meant that you were an=20 expert in Computational Sciences and Informatics. > Other than that I feel sympathetic to your distinction between=20 > revocation and validation. It is however my belief that we have used=20 > that distinction in our standards efforts. I think it would be helpful if specific examples were provided of places=20 in PKIX documents in which the distinction between mechanisms for=20 distributing certificate status information (e.g., CRLs and OCSP) and=20 mechanisms for submitting revocation requests (e.g., a CMP revocation=20 request message) is not clear. Perhaps this confusion does appear in=20 the literature, and those of us on this list simply don't notice it=20 since we already clearly understand the concepts. But without being=20 provided specific examples of text that a non-PKI expert might find=20 confusing, it is difficult for us to judge whether this is a problem in=20 PKIX documents that the WG needs to be more careful about in future=20 documents. Dave > On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: > > Hi all, > > Next I merely offer personal considerations about the (in my > opinion) confusing scenario of PKI terminology classification. I > would appreciate any comment on this. > > As can be seen in the literature, most people define CRL, > Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, > Certificate Revocation Status, Certificate Revocation Tree, etc. > as revocation schemes. I think this "classification" is confusing. > > I personally consider a revocation scheme as a scheme/protocol > where the owner (or an authorised party) is able to revocate the > status of her certificate. For example, the one defined in RFC > 4210 CMP. However, the terms mentioned above relate to data > structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make > that data structure available to others (Over-Issued CRL, > Over-Issued Segmented CRL, etc.) and both the managed data > structure and the associated publication mechanism (NOVOMODO, > Certificate Revocation Tree, etc.). But none of them to the > procedure to be followed in order to revocate the certificate! If > fact OCSP is sometimes referenced as a revocation scheme, when it > is actually focused on "just" checking the revocation status of a > certificate... > > From my viewpoint, I would differentiate among the scheme, the > certificate status information itself - CSI (data structure) - and > the method that distributes/publishes the CSI. A revocation scheme > updates the CSI. However, the publication/distribution method is > oriented to support the validation of certificates. IMHO it has > nothing to do with a revocation scheme. Perhaps you may consider > appropiate to include in the term "revocation scheme" everything > that has something to do with the revocation information... > > Therefore, I distinguish a revocation scheme from another type of > scheme (validation scheme) which aim is to check the status of a > certificate taking into account the CSI. This CSI could be > distributed/published by using one of the methods defined above, > or accessed in an online manner (an OCSP service that retrieves > the CSI from a fresh database). > > I guess that the revocation scheme term has been extended to > things not so related to the revocation itself, like the > validation procedure. I just want to know what the PKI community > think about this. > > Thanks in advance, > > -------- > Jorge Lopez Hernandez-Ardieta > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B3xAQo056744 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 20:59:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B3xAAF056743; Fri, 10 Apr 2009 20:59:10 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B3x9oS056737 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 20:59:10 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hoplodamus.net.ttu.edu (129.118.1.213) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 22:59:09 -0500 Received: from Pickup by hoplodamus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 03:59:09 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3A4.843C68C1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 11:05:52 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABIERYQACTItw References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> From: Carl Wallace To: "Hallam-Baker, Phillip" , IETF-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B3A4.843C68C1 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the case that we have an RSA1024-SHA1 signature on a document signed using a key that was subsequently compromised and the question the infrastructure needs to answer is whether the certificate was valid at the point it was signed. This was one of the original core use cases in the design of OCSP. =20 Ignoring hash algorithms for the moment, how does a client indicate its time of interest to the OCSP responder? ------_=_NextPart_001_01C9B3A4.843C68C1 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on SHA-1

The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the = case that we have an RSA1024-SHA1 signature on a document signed using a key that = was subsequently compromised and the question the infrastructure needs to = answer is whether the certificate was valid at the point it was signed. This was = one of the original core use cases in the design of OCSP.

 

Ignoring hash algorithms for the moment, how does a = client indicate its time of interest to the OCSP = responder?

------_=_NextPart_001_01C9B3A4.843C68C1-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B2xWGP054274 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 19:59:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B2xWhS054273; Fri, 10 Apr 2009 19:59:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B2xLcR054260 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 19:59:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hoplodamus.net.ttu.edu (129.118.1.213) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 21:59:20 -0500 Received: from Pickup by hoplodamus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 02:59:19 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B39A.1397BF01" Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 06:47:45 -0700 Message-ID: <2788466ED3E31C418E9ACC5C3166155768B35F@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 thread-index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABFiEVA== References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Hallam-Baker, Phillip" To: Santosh Chokhani , Stefan Santesson , IETF-pkix X-OriginalArrivalTime: 02 Apr 2009 13:51:09.0810 (UTC) FILETIME=[13F79D20:01C9B39A] List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B39A.1397BF01 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable On the contrary, each time I asked for a substantive argument you used = exactly the same non argument you are using here. =20 I have put a substantive argument on the table here. "I am not = convinced" or "I answered the question some other time" with no links to = the specific points are not a substantive response. You may think that = you gave a substantive explanation of how a client that only supports = ECC can obtain a comprehensible response from a generic OCSP server that = also supports RSA. However I do not beleive that it is possible in the = current protocol. =20 If you think you have demonstrated this in the past then please point to = the email. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 I have no objection to having an extension, but if in the long term = SHA-1 will not be there, it seems defining a new response type (say = basic 2) would be the way to go so that SHA-1 based key ID can be = stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value = in extension except that it may make every one happy: those who do not = care will not include it on the Server side and/or will ignore it on the = client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this = case both are straightforward. Also, in this thread, the comments were = not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first = posted the OCSP Agility I-D and my position and reasons are matter of = PKIX archives for anyone to scrutinize. When you ignore every single = cogent point, there is no sense in me commenting on next iteration. I = do think that the OCSP Agility I-D is a solution looking for a problem = that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 = based. =20 But that does not preclude adding an extension that allows the KeyID to = be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that = uses weak crypto necessitates an (expensive) security review to prove = that there is no problem. And these must be performed repeatedly by many = different parties as relying on the analysis of others is a good way to = cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While = simple compressor collisions may not be a concern, there is no guarantee = that the attacks will stop at that point. MD4 has been broken repeatedly = and they are now at the stage of jumping up and down on the little = pieces. It will probably happen to MD5 and we should be cautious in case = it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to = have my position characterized as stupid. My designs are not exactly = known for being verbose or overly elaborate. If I propose something it = is because there is a reason. It is very easy to defend the status quo = by derriding proposals as unnecessary, but the fact is that making OCSP = too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that = the core of PKIX as it now stands (the certificate profile and OCSP) be = capable of stand alone use. We cannot fix issues in OCSP with LTANS or = other layered-on protocols as some have proposed. It does not simplify = my OCSP deployment to have to graft on an entire different protocol in = addition or to re-engineer my document archival protocol to cover = defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve = security. You only improve security if you withdraw insecure algorithms = from use. =20 To make the system work you have to have a means of negotiating between = the client and the server. Otherwise there is no way for an OCSP = responder to ensure that it receives a secure, supported response to = querries for certificates that do not exist yet or are not known to the = responder. =20 In the case of an OCSP responder being driven by CRLs collected from = various sources, there is no way for the CA to know if a certificate = even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is = performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be = upgraded at will is simply not representative of large scale real world = deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for = Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" = wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B39A.1397BF01 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1=0A= =0A= =0A= =0A=
=0A=
On the = contrary, each time I asked for a substantive argument you used exactly = the same non argument you are using here.
=0A=
 
=0A=
I have put a substantive = argument on the table here. "I am not convinced" or "I answered the = question some other time" with no links to the specific points are not a = substantive response. You may think that you gave a substantive = explanation of how a client that only supports ECC can obtain a = comprehensible response from a generic OCSP server that also supports = RSA. However I do not beleive that it is possible in the current = protocol.
=0A=
 
=0A=
If you think you have = demonstrated this in the past then please point to the = email.
=0A=
 
=0A=

=0A=
=0A= From: Santosh Chokhani = [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54 = AM
To: Hallam-Baker, Phillip; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
I have no objection to having an = extension, but if in the long term SHA-1 will not be there, it seems = defining a new response type (say basic 2) would be the way to go so = that SHA-1 based key ID can be stripped off.
=0A=
 
=0A=
If SHA-1 is not getting ripped off = in the long term, I do not see value in extension except that it = may make every one happy: those who do not care will not include it = on the Server side and/or will ignore it on the client = side.
=0A=
 
=0A=
It would appear that the extension = should be NC.
=0A=
 
=0A=
Phil,
=0A=
 
=0A=
I would not respond to the = arguments on KISS and security since in this case both are = straightforward.  Also, in this thread, the comments were not meant = for or directed at you.
=0A=
 
=0A=
As you know, I have provided = extensive comments to you when you first posted the OCSP Agility I-D and = my position and reasons are matter of PKIX archives for anyone to = scrutinize.  When you ignore every single cogent point, there is no = sense in me commenting on next iteration.  I do think that the OCSP = Agility I-D is a solution looking for a problem that I do not = see.
=0A=
=0A=
=0A=
=0A= From: Hallam-Baker, Phillip = [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53 AM
To: Santosh Chokhani; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
=0A=
I think we = have no choice but to leave the Key ID CHOICE to be SHA-1 = based.
=0A=
 
=0A=
But that does not preclude = adding an extension that allows the KeyID to be specified using a = stronger algorithm. There are two reasons for this:
=0A=
 
=0A=
1) Optics, even if there is = no security implication, a protocol that uses weak crypto necessitates = an (expensive) security review to prove that there is no problem. And = these must be performed repeatedly by many different parties as relying = on the analysis of others is a good way to cause issues. Been there, = done that.
=0A=
 
=0A=
2) We are designing for long = time spans, ten years or more. While simple compressor collisions may = not be a concern, there is no guarantee that the attacks will stop at = that point. MD4 has been broken repeatedly and they are now at the stage = of jumping up and down on the little pieces. It will probably happen to = MD5 and we should be cautious in case it happens to SHA-1.
=0A=
 
=0A=
 
=0A=
On the claim of 'Keep it = simple STUPID', I find it rather offensive to have my position = characterized as stupid. My designs are not exactly known for being = verbose or overly elaborate. If I propose something it is because there = is a reason. It is very easy to defend the status quo by derriding = proposals as unnecessary, but the fact is that making OCSP too simple = will simply cause the complexity to blow out somewhere else.
=0A=
 
=0A=
There is an architectural = princple of modular design that demands that the core of PKIX as it now = stands (the certificate profile and OCSP) be capable of stand alone use. = We cannot fix issues in OCSP with LTANS or other layered-on protocols as = some have proposed. It does not simplify my OCSP deployment to have to = graft on an entire different protocol in addition or to re-engineer my = document archival protocol to cover defects in OCSP.
=0A=
 
=0A=
 
=0A=
Simply adding new algorithms = to a protocol does nothing to improve security. You only improve = security if you withdraw insecure algorithms from use.
=0A=
 
=0A=
To make the system work you = have to have a means of negotiating between the client and the server. = Otherwise there is no way for an OCSP responder to ensure that it = receives a secure, supported response to querries for certificates = that do not exist yet or are not known to the responder.
=0A=
 
=0A=
In the case of an OCSP = responder being driven by CRLs collected from various sources, there is = no way for the CA to know if a certificate even exists, all it knows is = if the status is definitively revoked.
=0A=
 
=0A=
In the case of many = transactional architectures the OCSP validation is performed = independently of certificate chain validation.
=0A=
 
=0A=
 
=0A=
Experience of small scale PKI = deployment in which any box can be upgraded at will is simply not = representative of large scale real world deployment.
=0A=
 
=0A=
=0A=

=0A=
=0A=
=0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed 4/1/2009 8:39 PM
To: Stefan = Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

=0A=

=0A=

I am saying that "Do you agree that 2560 can be left = alone for Responder
ID's key ID CHOICE being SHA-1 = based?"

> -----Original Message-----
> From: Stefan = Santesson [mailto:stefan@aaa-sec.com]
>= Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani; = IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on = SHA-1
>
> Santosh,
>
> = In-line
>
>
> On 4/1/09 10:31 PM, "Santosh Chokhani" = <SChokhani@cygnacom.com> wrote:
>
> >
> > = Stefan,
> >
> > See responses in-line.
> = >
> >> -----Original Message-----
> >> From: = Stefan Santesson [mailto:stefan@aaa-sec.com]
>= >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >> Santosh,
> >>
> >> If you are talking = about adding other options to calculate the
> >> KeyHash = value in ResponderID then I strongly disagree.
> >>
> = >> If you add unspecified options you change the = properties
> of the field
> >> from deterministic to a = completely unknown value.
> >> It does not matter if RFC2560 = isn't explicit in its description of
> >> the use of the = field. The fact is that OCSP explicitly
> defines this
> = >> value and as such will allow a client to deterministically = compare
> >> this value with the certificate selected to = validate the response
> >> signature.
> >
> = > I hope no one is doing the matching of Responder ID with
> = hash of a key
> > in place of responder signature = verification.  That would
> be real bad.
> = >
>
> Yes it would. That is not at all what I talk about. = But a
> client could use this value to locate a responder = certificate.
>
> >> If you allow
> >> = other ways to calculate the value but do not provide any means = to
> >> signal what method that was used, then this feature = is lost.
> >
> > The most common use will be to use = this field to prioritize the
> > certificates of the responder = to use for sigature
> verification on the
> > = response.
> >
>
> Do you know this for a fact, or = are you guessing?
> If a single implementation verifies that the = certificate used
> to validate the response matches the = ResponderID value, and
> choose to go into an error state because = of mismatch, then we
> have created great problems. So we can't = guess. We have to
> know that no single implementation will fail = because of this.
> And that may be very = hard.
>
>
> >>
> >> In worst case we = will cause current implementation to fail.
> >
> > = That is why I am asking what problems if any will the vendors = have.
> >
>
> Even if no vendor speaks up here, it = will not guarantee that
> this will not create any = problems.
>
> >>
> >> I really don't think = its worth the effort to change this field. We
> >> have a = very large base of implementations that we really
> don't = want
> >> to mess up unless its absolutely = necessary.
> >
> > So, we agree that leaving this = field hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite reading = it many
> times over.
>
> > My only reason to align = with 5280 is that if some one were
> ever want
> > to = strip off SHA-1 altogether from their Responder or client,
> > = permitting other methods does it.
> >
>
> I don't = believe this argument is valid as I don't think it is
> possible = to strip off SHA-1 in any reasonable future. In any
> case. If we = compare the positive side with allowing this
> change and the = negative consequences to make OCSP
> incompatible with itself, my = choice is easy.
>
> /Stefan

>
> = >>
> >> As the only property of this field is to = provide a convenient
> >> identifier, it is far from = absolutely necessary to change it.
> >> Remember that there = is a second choice to to identify responder by
> >> name. = For names we have accepted the possibility of collisions. In
> = >> that comparison, upgrading from SHA-1 is really = redundant.
> >>
> >> /Stefan
> = >>
> >>
> >>
> >>
> = >> On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com> wrote:
> >>
> = >>>
> >>> My resident ASN.1 expert apprised me = of the fact that
> >> adding a choice
> >>> = will break backward compatibility.  Thus, extension is a
> = >> fifth option
> >>> (probably third in the = priority).
> >>>
> >>> Based on what I = know of OCSP implementations, not changing
> >> anything = in
> >>> terms of bits on the wire and aligning the Key = ID with SKID
> >> in 5280 is
> >>> the best = approach.  I do not think it will hurt backward
> >> = compatibility.
> >>>
> >>> OCSP Responder = and OCSP client vendors should speak up if I
> >> am = wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh Chokhani
> = >>>> Sent: Tuesday, March 31, 2009 12:51 PM
> = >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>
> >>>> Max,
> = >>>>
> >>>> I do not see where and what = extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
> = >>>> For key id, we need to enhance or broaden the = options.
> >>>>
> >>>>> = -----Original Message-----
> >>>>> From: = owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> >> Massimiliano Pala
> = >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>>>>
> >>>>> Hi all,
> = >>>>>
> >>>>> as I said during last = meeting - as the use of SHA-1 does
> >>>> not have = any
> >>>>> security implication in the OCSP, = another viable way
> would be to
> >>>>> = define an extension where other digest algorithms can be
> = >>>> added to the
> >>>>> = request/responses.
> >>>>>
> = >>>>> It is a simple addition and does not require any = change in
> >>>> the RFC, it
> = >>>>> can be done as a separate document for those who = what to
> >> use other
> >>>>> digest = algorithms.
> >>>>>
> >>>>> = After all, isn't this an example of why we allow
> >> = extensions to the
> >>>>> messages ?
> = >>>>>
> >>>>> Later,
> = >>>>> Max
> >>>>>
> = >>>>>
> >>>>> Santosh Chokhani = wrote:
> >>>>>> Tom,
> = >>>>>>
> >>>>>> Adding a new = choice and aligning it with 5280 SKID is fine.
> = >>>>>>
> >>>>>> I would not = add anything about matching this field with
> >>>>> = anything since
> >>>>>> RFC 2560 does not say = anything about it.
> >>>>>>
> = >>>>>> If one were to add something, one should = describe how this
> >>>>> field can
> = >>>>>> be used to select from multiple Responder = certificates.
> >>>>>>
> = >>>>>>> -----Original Message-----
> = >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
> >>>>>>> To: Santosh Chokhani
> = >>>>>>> Cc: IETF-pkix
> = >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence = on SHA-1
> >>>>>>>
> = >>>>>>>       &nb= sp; Santosh:
> >>>>>>>
> = >>>>>>>       &nb= sp; The RFC 5280 method just describes "two common
> = >>>> methods for
> >>>>>>> = generating key identifiers from the public key"
> = >>>>>>> and says that other methods are = acceptable.  The comment
> >>>>> to = KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as = permissive.  Of course, it's
> >>>> the = same
> >>>>>>> field as SKID, and I would = support either stating "if the
> >>>>> KeyHash = is
> >>>>>>> not precisely 20 octets long, it = should be matched
> against the
> = >>>>>>> Subject Key Identifier extension of the = signing
> certificate" or
> >>>>>>> = adding another choice like byID [3] OCTET STRING --
> = >>>>> matches the value
> = >>>>>>> of SKID.
> = >>>>>>>
> = >>>>>>>       &nb= sp;         Tom Gindin
> = >>>>>>>
> >>>>>>> P.S. - = The above opinions are mine, and not necessarily
> = >>>>> those of my
> >>>>>>> = employer
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> = "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by:
> = >>>>>>> owner-ietf-pkix@mail.imc.org
> = >>>>>>> 03/26/2009 10:39 PM
> = >>>>>>>
> >>>>>>> = To
> >>>>>>> "IETF-pkix" = <ietf-pkix@imc.org>
> >>>>>>> = cc
> >>>>>>>
> = >>>>>>> Subject
> = >>>>>>> OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> RFC = 2560 dependence on SHA-1 does not appear to be
> = >>>>> difficult to deal
> = >>>>>>> with.
> = >>>>>>>
> >>>>>>> = Section 4.3 lists SHA-1 as mandatory and RSA as
> >>>> = optional.  We can
> >>>>>>> update this = to add SHA-2 series as optional.
> = >>>>>>>
> >>>>>>> The = Responder ID has SHA-1 hardwired.  But, that is no
> = >>>>> different than
> >>>>>>> = key ID extensions in RFC 5280.  Here are some options
> = >> in order of
> >>>>>>> = preference:
> >>>>>>>
> = >>>>>>> 1.  Align the language with subject = key ID language
> in RFC 5280.
> = >>>>>>>
> >>>>>>> = 2.  Keep on using SHA-1.  This field is not security
> = >>>>> relevant.  RFC
> = >>>>>>> 2560 does not even describe how to use this = field.  So,
> >>>>> having SHA-1
> = >>>>>>> and accidental or intentional collisions = will not hurt the
> >>>>> security
> = >>>>>>> of the protocol.
> = >>>>>>>
> >>>>>>> = 3.  If you do not believe in KISS principle, you can
> = >>>>> define another
> >>>>>>> = response type and enhance the key ID ASN.1 syntax so
> that = hash
> >>>>>>> algorithm is = identified.
> >>>>>>>
> = >>>>>>> 4.  Another option is for the = Responder to use the
> same hashing
> = >>>>>>> algorithm as the one in the first certID = entry.
> >>>>>>>
> = >>>>>>>
> >>>>>>> = Santosh Chokhani
> >>>>>>> CygnaCom = Solutions
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>
> = >>>>>>
> >>>>>
> = >>>>>
> >>>>> --
> = >>>>>
> >>>>> Best Regards,
> = >>>>>
> >>>>> Massimiliano = Pala
> >>>>>
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano Pala [OpenCA Project Manager]
> >>>>> = Massimiliano.Pala@dartmouth.edu
> = >>>>>         = ;    
> >>>>> = project.manager@openca.org
> >>>>>
> = >>>>> Dartmouth Computer Science = Dept           &nb= sp;   Home Phone: +1
> >>>>> (603) = 369-9332
> >>>>> PKI/Trust = Laboratory          &nb= sp;           &nbs= p;   Work Phone: +1
> >>>>> (603) = 646-9179
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>>
> = >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> >>>>> = of us who do.
> >>>>>   --
> = >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
> = >>
> >>
> = >
>
>
>

<= /BODY> ------_=_NextPart_001_01C9B39A.1397BF01-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B1mKQe051149 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 18:48:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B1mKCE051148; Fri, 10 Apr 2009 18:48:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B1mIN8051138 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 18:48:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hoplodamus.net.ttu.edu (129.118.1.213) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 20:48:18 -0500 Received: from Pickup by hoplodamus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 01:48:17 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B389.B83C96F2" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 07:54:02 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoA= References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: Santosh Chokhani To: "Hallam-Baker, Phillip" , Stefan Santesson , IETF-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B389.B83C96F2 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B389.B83C96F2 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
I have no objection to having an extension, but if = in the long=20 term SHA-1 will not be there, it seems defining a new response type (say = basic=20 2) would be the way to go so that SHA-1 based key ID can be stripped=20 off.
 
If SHA-1 is not getting ripped off in the long = term, I do=20 not see value in extension except that it may make every one happy: = those who do=20 not care will not include it on the Server side and/or will ignore = it on=20 the client side.
 
It would appear that the extension should be=20 NC.
 
Phil,
 
I would not respond to the arguments on KISS and = security=20 since in this case both are straightforward.  Also, in this thread, = the=20 comments were not meant for or directed at you.
 
As you know, I have provided extensive comments to = you when=20 you first posted the OCSP Agility I-D and my position and reasons are = matter of=20 PKIX archives for anyone to scrutinize.  When you ignore every = single=20 cogent point, there is no sense in me commenting on next = iteration.  I do=20 think that the OCSP Agility I-D is a solution looking for a problem that = I do=20 not see.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I think we = have no choice=20 but to leave the Key ID CHOICE to be SHA-1 based.
 
But that does not preclude = adding an=20 extension that allows the KeyID to be specified using a stronger = algorithm.=20 There are two reasons for this:
 
1) Optics, even if there is = no security=20 implication, a protocol that uses weak crypto necessitates an = (expensive)=20 security review to prove that there is no problem. And these must be = performed=20 repeatedly by many different parties as relying on the analysis of = others is a=20 good way to cause issues. Been there, done that.
 
2) We are designing for = long time spans,=20 ten years or more. While simple compressor collisions may not be a = concern,=20 there is no guarantee that the attacks will stop at that point. MD4 = has been=20 broken repeatedly and they are now at the stage of jumping up and down = on the=20 little pieces. It will probably happen to MD5 and we should be = cautious in=20 case it happens to SHA-1.
 
 
On the claim of 'Keep it = simple STUPID',=20 I find it rather offensive to have my position characterized as = stupid. My=20 designs are not exactly known for being verbose or overly elaborate. = If I=20 propose something it is because there is a reason. It is very easy to = defend=20 the status quo by derriding proposals as unnecessary, but the fact is = that=20 making OCSP too simple will simply cause the complexity to blow out = somewhere=20 else.
 
There is an architectural = princple of=20 modular design that demands that the core of PKIX as it now stands = (the=20 certificate profile and OCSP) be capable of stand alone use. We cannot = fix=20 issues in OCSP with LTANS or other layered-on protocols as some have = proposed.=20 It does not simplify my OCSP deployment to have to graft on an entire=20 different protocol in addition or to re-engineer my document archival = protocol=20 to cover defects in OCSP.
 
 
Simply adding new = algorithms to a=20 protocol does nothing to improve security. You only improve security = if you=20 withdraw insecure algorithms from use.
 
To make the system work you = have to have=20 a means of negotiating between the client and the server. Otherwise = there is=20 no way for an OCSP responder to ensure that it receives a secure,=20 supported response to querries for certificates that do not exist = yet or=20 are not known to the responder.
 
In the case of an OCSP = responder being=20 driven by CRLs collected from various sources, there is no way for the = CA to=20 know if a certificate even exists, all it knows is if the status is=20 definitively revoked.
 
In the case of many = transactional=20 architectures the OCSP validation is performed independently of = certificate=20 chain validation.
 
 
Experience of small scale = PKI deployment=20 in which any box can be upgraded at will is simply not representative = of large=20 scale real world deployment.
 


From:=20 owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed=20 4/1/2009 8:39 PM
To: Stefan Santesson; = IETF-pkix
Subject:=20 RE: OCSP RFC (RFC 2560) Dependence on SHA-1


I am saying that "Do you agree that 2560 can be left = alone for=20 Responder
ID's key ID CHOICE being SHA-1 based?"

> = -----Original=20 Message-----
> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= Sent:=20 Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani;=20 IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
>
> Santosh,
>
> = In-line
>
>
>=20 On 4/1/09 10:31 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>=20 wrote:
>
> >
> > Stefan,
> >
> = > See=20 responses in-line.
> >
> >> -----Original=20 Message-----
> >> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh=20 Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: Re: = OCSP RFC=20 (RFC 2560) Dependence on SHA-1
> >>
> >>=20 Santosh,
> >>
> >> If you are talking about = adding=20 other options to calculate the
> >> KeyHash value in = ResponderID=20 then I strongly disagree.
> >>
> >> If you add = unspecified options you change the properties
> of the = field
>=20 >> from deterministic to a completely unknown value.
> = >> It=20 does not matter if RFC2560 isn't explicit in its description = of
>=20 >> the use of the field. The fact is that OCSP = explicitly
>=20 defines this
> >> value and as such will allow a client to = deterministically compare
> >> this value with the = certificate=20 selected to validate the response
> >> signature.
>=20 >
> > I hope no one is doing the matching of Responder ID=20 with
> hash of a key
> > in place of responder = signature=20 verification.  That would
> be real bad.
>=20 >
>
> Yes it would. That is not at all what I talk = about. But=20 a
> client could use this value to locate a responder=20 certificate.
>
> >> If you allow
> >> = other ways=20 to calculate the value but do not provide any means to
> = >> signal=20 what method that was used, then this feature is lost.
> = >
>=20 > The most common use will be to use this field to prioritize = the
>=20 > certificates of the responder to use for sigature
> = verification on=20 the
> > response.
> >
>
> Do you know = this for a=20 fact, or are you guessing?
> If a single implementation verifies = that=20 the certificate used
> to validate the response matches the = ResponderID=20 value, and
> choose to go into an error state because of = mismatch, then=20 we
> have created great problems. So we can't guess. We have = to
>=20 know that no single implementation will fail because of this.
> = And that=20 may be very hard.
>
>
> >>
> >> In = worst=20 case we will cause current implementation to fail.
> = >
> >=20 That is why I am asking what problems if any will the vendors = have.
>=20 >
>
> Even if no vendor speaks up here, it will not = guarantee=20 that
> this will not create any problems.
>
>=20 >>
> >> I really don't think its worth the effort to = change=20 this field. We
> >> have a very large base of = implementations that=20 we really
> don't want
> >> to mess up unless its = absolutely=20 necessary.
> >
> > So, we agree that leaving this = field hard=20 wired to SHA-1 is ok and
> > 2560 can easily accommodate new = hash=20 functions.  Right?
> >
>
> I fail to = understand this=20 sentence. Despite reading it many
> times over.
>
> = > My=20 only reason to align with 5280 is that if some one were
> ever=20 want
> > to strip off SHA-1 altogether from their Responder = or=20 client,
> > permitting other methods does it.
>=20 >
>
> I don't believe this argument is valid as I don't = think=20 it is
> possible to strip off SHA-1 in any reasonable future. In = any
> case. If we compare the positive side with allowing = this
>=20 change and the negative consequences to make OCSP
> incompatible = with=20 itself, my choice is easy.
>
>=20 /Stefan

>
> >>
> >> As the = only=20 property of this field is to provide a convenient
> >> = identifier,=20 it is far from absolutely necessary to change it.
> >> = Remember=20 that there is a second choice to to identify responder by
> = >>=20 name. For names we have accepted the possibility of collisions. = In
>=20 >> that comparison, upgrading from SHA-1 is really = redundant.
>=20 >>
> >> /Stefan
> >>
> = >>
>=20 >>
> >>
> >> On 4/1/09 4:05 PM, "Santosh = Chokhani"
> <SChokhani@cygnacom.com> wrote:
>=20 >>
> >>>
> >>> My resident ASN.1 = expert=20 apprised me of the fact that
> >> adding a choice
>=20 >>> will break backward compatibility.  Thus, extension = is=20 a
> >> fifth option
> >>> (probably third = in the=20 priority).
> >>>
> >>> Based on what I = know of=20 OCSP implementations, not changing
> >> anything = in
>=20 >>> terms of bits on the wire and aligning the Key ID with=20 SKID
> >> in 5280 is
> >>> the best = approach. =20 I do not think it will hurt backward
> >> = compatibility.
>=20 >>>
> >>> OCSP Responder and OCSP client = vendors=20 should speak up if I
> >> am wrong.
> = >>>
>=20 >>>> -----Original Message-----
> >>>> = From:=20 Santosh Chokhani
> >>>> Sent: Tuesday, March 31, = 2009 12:51=20 PM
> >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
>=20 >>>>
> >>>> Max,
>=20 >>>>
> >>>> I do not see where and what=20 extension we need to add for
> >> other digest
>=20 >>>> algorithm.
> >>>>
> = >>>>=20 For key id, we need to enhance or broaden the options.
>=20 >>>>
> >>>>> -----Original=20 Message-----
> >>>>> From:=20 owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20 On Behalf Of
> >> Massimiliano Pala
> = >>>>>=20 Sent: Tuesday, March 31, 2009 1:37 PM
> >>>>> To: = IETF-pkix
> >>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on SHA-1
> >>>>>
> = >>>>>=20 Hi all,
> >>>>>
> >>>>> as I = said=20 during last meeting - as the use of SHA-1 does
> = >>>> not=20 have any
> >>>>> security implication in the = OCSP,=20 another viable way
> would be to
> >>>>> = define an=20 extension where other digest algorithms can be
> = >>>> added=20 to the
> >>>>> request/responses.
>=20 >>>>>
> >>>>> It is a simple = addition and=20 does not require any change in
> >>>> the RFC, = it
>=20 >>>>> can be done as a separate document for those who = what=20 to
> >> use other
> >>>>> digest=20 algorithms.
> >>>>>
> >>>>> = After=20 all, isn't this an example of why we allow
> >> extensions = to=20 the
> >>>>> messages ?
>=20 >>>>>
> >>>>> Later,
>=20 >>>>> Max
> >>>>>
>=20 >>>>>
> >>>>> Santosh Chokhani=20 wrote:
> >>>>>> Tom,
>=20 >>>>>>
> >>>>>> Adding a new = choice=20 and aligning it with 5280 SKID is fine.
>=20 >>>>>>
> >>>>>> I would not = add=20 anything about matching this field with
> >>>>> = anything=20 since
> >>>>>> RFC 2560 does not say anything = about=20 it.
> >>>>>>
> >>>>>> = If one=20 were to add something, one should describe how this
>=20 >>>>> field can
> >>>>>> be = used to=20 select from multiple Responder certificates.
>=20 >>>>>>
> >>>>>>> = -----Original=20 Message-----
> >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20 >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
>=20 >>>>>>> To: Santosh Chokhani
>=20 >>>>>>> Cc: IETF-pkix
>=20 >>>>>>> Subject: Re: OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 Santosh:
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 The RFC 5280 method just describes "two common
> = >>>>=20 methods for
> >>>>>>> generating key = identifiers=20 from the public key"
> >>>>>>> and says = that other=20 methods are acceptable.  The comment
> >>>>> = to=20 KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not = as=20 permissive.  Of course, it's
> >>>> the = same
>=20 >>>>>>> field as SKID, and I would support either = stating=20 "if the
> >>>>> KeyHash is
>=20 >>>>>>> not precisely 20 octets long, it should = be=20 matched
> against the
> >>>>>>> = Subject Key=20 Identifier extension of the signing
> certificate" or
>=20 >>>>>>> adding another choice like byID [3] OCTET = STRING=20 --
> >>>>> matches the value
>=20 >>>>>>> of SKID.
>=20 >>>>>>>
>=20 = >>>>>>>       &nb= sp;        =20 Tom Gindin
> >>>>>>>
>=20 >>>>>>> P.S. - The above opinions are mine, and = not=20 necessarily
> >>>>> those of my
>=20 >>>>>>> employer
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> "Santosh Chokhani" = <SChokhani@cygnacom.com>=20 Sent by:
> >>>>>>>=20 owner-ietf-pkix@mail.imc.org
> >>>>>>> = 03/26/2009=20 10:39 PM
> >>>>>>>
>=20 >>>>>>> To
> >>>>>>>=20 "IETF-pkix" <ietf-pkix@imc.org>
> = >>>>>>>=20 cc
> >>>>>>>
> = >>>>>>>=20 Subject
> >>>>>>> OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> RFC 2560 dependence on SHA-1 does not = appear to=20 be
> >>>>> difficult to deal
>=20 >>>>>>> with.
>=20 >>>>>>>
> >>>>>>> = Section 4.3=20 lists SHA-1 as mandatory and RSA as
> >>>> = optional. =20 We can
> >>>>>>> update this to add SHA-2 = series as=20 optional.
> >>>>>>>
>=20 >>>>>>> The Responder ID has SHA-1 = hardwired.  But,=20 that is no
> >>>>> different than
>=20 >>>>>>> key ID extensions in RFC 5280.  Here = are=20 some options
> >> in order of
> = >>>>>>>=20 preference:
> >>>>>>>
>=20 >>>>>>> 1.  Align the language with subject = key ID=20 language
> in RFC 5280.
> = >>>>>>>
>=20 >>>>>>> 2.  Keep on using SHA-1.  This = field is=20 not security
> >>>>> relevant.  RFC
>=20 >>>>>>> 2560 does not even describe how to use = this=20 field.  So,
> >>>>> having SHA-1
>=20 >>>>>>> and accidental or intentional collisions = will not=20 hurt the
> >>>>> security
>=20 >>>>>>> of the protocol.
>=20 >>>>>>>
> >>>>>>> = 3.  If=20 you do not believe in KISS principle, you can
> = >>>>>=20 define another
> >>>>>>> response type and = enhance=20 the key ID ASN.1 syntax so
> that hash
>=20 >>>>>>> algorithm is identified.
>=20 >>>>>>>
> >>>>>>> = 4. =20 Another option is for the Responder to use the
> same = hashing
>=20 >>>>>>> algorithm as the one in the first certID=20 entry.
> >>>>>>>
>=20 >>>>>>>
> >>>>>>> = Santosh=20 Chokhani
> >>>>>>> CygnaCom = Solutions
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>
> >>>>>>
>=20 >>>>>
> >>>>>
> = >>>>>=20 --
> >>>>>
> >>>>> Best=20 Regards,
> >>>>>
> >>>>>=20 Massimiliano Pala
> >>>>>
> = >>>>>=20 --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano=20 Pala [OpenCA Project Manager]
> >>>>>=20 Massimiliano.Pala@dartmouth.edu
>=20 = >>>>>         = ;    
>=20 >>>>> project.manager@openca.org
>=20 >>>>>
> >>>>> Dartmouth Computer = Science=20 = Dept           &nb= sp;  =20 Home Phone: +1
> >>>>> (603) 369-9332
>=20 >>>>> PKI/Trust=20 = Laboratory          &nb= sp;           &nbs= p;  =20 Work Phone: +1
> >>>>> (603) 646-9179
>=20 >>>>>=20 --o-----------------------------------------------------------
> = >>>>> -------------
> = >>>>>
>=20 >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> = >>>>> of us=20 who do.
> >>>>>   --
>=20 >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
>=20 >>
> >>
>=20 = >
>
>
>

= ------_=_NextPart_001_01C9B389.B83C96F2-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B1JKTd049515 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 18:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B1JKhJ049514; Fri, 10 Apr 2009 18:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (maila.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B1J9KM049504 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Fri, 10 Apr 2009 18:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.2.99.4; Fri, 10 Apr 2009 18:19:09 -0700 Received: from tk5-exmlt-w601.wingroup.windeploy.ntdev.microsoft.com (157.54.18.32) by tk5-exhub-c103.redmond.corp.microsoft.com (157.54.88.96) with Microsoft SMTP Server id 8.2.99.4; Fri, 10 Apr 2009 18:19:08 -0700 Received: from Pickup by mail.windows.microsoft.com with Microsoft SMTP Server id 8.1.291.1; Sat, 11 Apr 2009 01:21:02 +0000 X-BigFish: ps-67(zz1432R98dR1447R1805Mzz2cfT1202hzzz2dheIL6bh34h) X-FB-SS: 5,13, X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Message-ID: <49DFA346.309@Dartmouth.edu> Date: Fri, 10 Apr 2009 15:51:34 -0400 From: Massimiliano Pala Organization: Dartmouth College - Computer Science Department User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: Sean Turner CC: pkix Subject: Re: PRQP: CMS Gateway References: <49DE7DC0.8050501@ieca.com> In-Reply-To: <49DE7DC0.8050501@ieca.com> Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms060001020207000203080301" X-Virus-Scanned: ClamAV 0.93.3/9223/Fri Apr 10 10:54:59 2009 on mail.cs.dartmouth.edu X-Virus-Status: Clean X-Spam-Status: No, score=-2.4 required=5.0 tests=AWL,BAYES_00,SPF_HELO_FAIL autolearn=no version=3.2.5 X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on mail.cs.dartmouth.edu List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (tk5-exgwy-e803.partners.extranet.microsoft.com: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --------------ms060001020207000203080301 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Hi Sean, thanks for the comments - I just modified the current draft version with the suggested changes. There are still some changes to be done for providing TAMP support via PRQP - but I think we will finalize them next week (I shall meet with Wallace at IDTrust) and we will be ready for updating the draft. Ciao, Max Sean Turner wrote: > > Max, > > Should the CMS Gateway be renamed CMC Gateway? CMM over CMS is CMC. > Also should the reference be updated to RFC 5272? --------------ms060001020207000203080301 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJIjCC BI0wggN1oAMCAQICAhpTMA0GCSqGSIb3DQEBBQUAMHcxEzARBgoJkiaJk/IsZAEZFgNlZHUx GTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0 bW91dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMTAeFw0wNTExMDgy MDMzMDZaFw0wOTExMDkyMDMzMDZaMIHBMRMwEQYKCZImiZPyLGQBGRYDZWR1MRkwFwYKCZIm iZPyLGQBGRYJZGFydG1vdXRoMQswCQYDVQQGEwJVUzEaMBgGA1UEChMRRGFydG1vdXRoIENv bGxlZ2UxGjAYBgoJkiaJk/IsZAEBEwoxMjI1NjAyOTQ3MRowGAYDVQQDExFNYXNzaW1pbGlh bm8gUGFsYTEuMCwGCSqGSIb3DQEJARYfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVk dTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsv8obBpbhPixgdyIJj7UN0GYRNhsgWHB muCE5j8v8IvCSJWRF9spKoR0NBYgOfJu8DwQuKTIgrvbp0EC3ikrneotL4KTGD1IqWz/bSXL UR/bZAsc0r9PrvCUsZOi7wbijy784gOuqQUCJ2fJwKwk5SJ3RBaPnUROQXTp+LPSK8MCAwEA AaOCAVowggFWMA4GA1UdDwEB/wQEAwIF4DARBglghkgBhvhCAQEEBAMCBaAwgaIGA1UdIASB mjCBlzCBlAYKKwYBBAFBAgEBATCBhTA9BggrBgEFBQcCAjAxMBgWEURhcnRtb3V0aCBDb2xs ZWdlMAMCAQEaFURhcnRtb3V0aCBDb2xsZWdlIENQUzBEBggrBgEFBQcCARY4aHR0cDovL3d3 dy5kYXJ0bW91dGguZWR1L35wa2lsYWIvRGFydG1vdXRoQ1BTXzRTZXAwMy5wZGYwKgYDVR0R BCMwIYEfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVkdTAfBgNVHSMEGDAWgBQ/wNbH p08Afu8GmWdsvJYeTaN3EjA/BggrBgEFBQcBAQQzMDEwLwYIKwYBBQUHMAGGI2h0dHA6Ly9j b2xsZWdlY2EuZGFydG1vdXRoLmVkdS9vY3NwMA0GCSqGSIb3DQEBBQUAA4IBAQDEYIWmG3Ht wcgFiBbrYKp7YpI62hgAw9I3Dj9Ai+etQcMDZL8cWg3Kd7DwYHDkLxO7jl518HIJCk8Elk+Z 3Y2c0rR+c9WLuxE+EHEUmQg2AbgxzRGZAeMXj7jrv5w75IWiXBrW3SdDkjVH6MQFZVP1CBk7 PF3/+dzmiO6E5g4cVtphPSdK2qtnX7Sh0zdePzeE+e0BTnsWdN0yHgKabKx3dCiEnQXt96sA Jf5ckg7fFLcplohwWlWJCpk8WwnJM0QGw3xbrZvLk+kIQgyh0sn2va4FgA1ae29cJ1d2NurA Z+LMdei9/ZbzBeMoD9XPSYyj7zLuVXGLF/JQQoPywk5oMIIEjTCCA3WgAwIBAgICGlMwDQYJ KoZIhvcNAQEFBQAwdzETMBEGCgmSJomT8ixkARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRh cnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNVBAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYD VQQDExNEYXJ0bW91dGggQ2VydEF1dGgxMB4XDTA1MTEwODIwMzMwNloXDTA5MTEwOTIwMzMw NlowgcExEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgx CzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29sbGVnZTEaMBgGCgmSJomT8ixk AQETCjEyMjU2MDI5NDcxGjAYBgNVBAMTEU1hc3NpbWlsaWFubyBQYWxhMS4wLAYJKoZIhvcN AQkBFh9NYXNzaW1pbGlhbm8uUGFsYUBEYXJ0bW91dGguZWR1MIGfMA0GCSqGSIb3DQEBAQUA A4GNADCBiQKBgQCy/yhsGluE+LGB3IgmPtQ3QZhE2GyBYcGa4ITmPy/wi8JIlZEX2ykqhHQ0 FiA58m7wPBC4pMiCu9unQQLeKSud6i0vgpMYPUipbP9tJctRH9tkCxzSv0+u8JSxk6LvBuKP LvziA66pBQInZ8nArCTlIndEFo+dRE5BdOn4s9IrwwIDAQABo4IBWjCCAVYwDgYDVR0PAQH/ BAQDAgXgMBEGCWCGSAGG+EIBAQQEAwIFoDCBogYDVR0gBIGaMIGXMIGUBgorBgEEAUECAQEB MIGFMD0GCCsGAQUFBwICMDEwGBYRRGFydG1vdXRoIENvbGxlZ2UwAwIBARoVRGFydG1vdXRo IENvbGxlZ2UgQ1BTMEQGCCsGAQUFBwIBFjhodHRwOi8vd3d3LmRhcnRtb3V0aC5lZHUvfnBr aWxhYi9EYXJ0bW91dGhDUFNfNFNlcDAzLnBkZjAqBgNVHREEIzAhgR9NYXNzaW1pbGlhbm8u UGFsYUBEYXJ0bW91dGguZWR1MB8GA1UdIwQYMBaAFD/A1senTwB+7waZZ2y8lh5No3cSMD8G CCsGAQUFBwEBBDMwMTAvBggrBgEFBQcwAYYjaHR0cDovL2NvbGxlZ2VjYS5kYXJ0bW91dGgu ZWR1L29jc3AwDQYJKoZIhvcNAQEFBQADggEBAMRghaYbce3ByAWIFutgqntikjraGADD0jcO P0CL561BwwNkvxxaDcp3sPBgcOQvE7uOXnXwcgkKTwSWT5ndjZzStH5z1Yu7ET4QcRSZCDYB uDHNEZkB4xePuOu/nDvkhaJcGtbdJ0OSNUfoxAVlU/UIGTs8Xf/53OaI7oTmDhxW2mE9J0ra q2dftKHTN14/N4T57QFOexZ03TIeAppsrHd0KISdBe33qwAl/lySDt8UtymWiHBaVYkKmTxb CckzRAbDfFutm8uT6QhCDKHSyfa9rgWADVp7b1wnV3Y26sBn4sx16L39lvMF4ygP1c9JjKPv Mu5VcYsX8lBCg/LCTmgxggL4MIIC9AIBATB9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAX BgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91 dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwCQYFKw4DAhoF AKCCAdEwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMDkwNDEw MTk1MTM0WjAjBgkqhkiG9w0BCQQxFgQU6sIaueZuctLcZSuyQaXRyrLksUEwUgYJKoZIhvcN AQkPMUUwQzAKBggqhkiG9w0DBzAOBggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYF Kw4DAgcwDQYIKoZIhvcNAwICASgwgYwGCSsGAQQBgjcQBDF/MH0wdzETMBEGCgmSJomT8ixk ARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRhcnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNV BAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYDVQQDExNEYXJ0bW91dGggQ2VydEF1dGgxAgIa UzCBjgYLKoZIhvcNAQkQAgsxf6B9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJ k/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29s bGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwDQYJKoZIhvcNAQEBBQAE gYASnb0jdWaklDHSPE/utWIC1HbZRm2QqHrI8PqXJ2ng/NZVn/zs4czzzXwFsKs+R/t8Ng/t 36hW7ujSRB8Tt7m3qqhSfsw64t5DQ+Ttan9uDofi+510lDjWWYL8keOybWw7t6pYXffR2f9N gRMTidCgYP/t7WQHi/pCw7BcZxmZ5QAAAAAAAA== --------------ms060001020207000203080301-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0fZ2q047605 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 17:41:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B0fZIj047604; Fri, 10 Apr 2009 17:41:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from euphorbus.net.ttu.edu (euphorbus.net.ttu.edu [129.118.1.216]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0fYl6047598 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 17:41:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from Pickup by euphorbus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 00:41:33 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: Renew/Rekey/Modification Date: Wed, 1 Apr 2009 17:00:50 -0400 Message-ID: In-Reply-To: <49D2D476.3030000@lockstep.com.au> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSw References: <49D2D476.3030000@lockstep.com.au> From: Santosh Chokhani To: , List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stephen, See responses in-line.=20 > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org=20 > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Wilson > Sent: Tuesday, March 31, 2009 10:42 PM > To: ietf-pkix@imc.org > Subject: Renew/Rekey/Modification >=20 >=20 >=20 > Colleagues, >=20 > There are a few things about certificate "renewal" and=20 > "re-key" that have long confounded me. Things only seem to=20 > have got more convoluted in RFC 3647 and -- no offence! -- in=20 > newer Certificate Policies like the=20 > US FPKI Policy Authority document. Can anyone help me=20 > understand the=20 > rationale for the some of the following scenarios? Thanks in advance! >=20 >=20 >=20 > Re-key is said (in the FPKI CP) to be a good idea because the=20 > older a key gets, the more susceptible it is to loss and=20 > compromise. Fair enough, but why wouldn't that consideration=20 > be factored into the chosen certificate validity period? It should be. The goal here is to use the current certificate to authenticate to create new certificates. >=20 >=20 > Is there ever a real world scenario when a Subject would of=20 > their own accord request re-key because they feel the key is=20 > getting old? PKI obligations and policy may require that subject perform the re-key and take some concrete action in order to be bound to the subscriber obligations and agreements. > If so, why wouldn't they revoke as well? Two reasons come to mind for not revoking. You do not want to invalidate existing, unexpired signatures. You do not want to have built in mechanism for large CRL. BTW, you can compensate for it by destroying the current key after re-key. > The=20 > FPKI CA says that after re-key "The old certificate may or=20 > may not be revoked". Why would you not revoke, given the=20 > possibility that the key has got too old? See previous response. > I don't think it=20 > would ever be sensible to keep using an old original key and=20 > a fresh key. And if I were a Relying Party, I might like to=20 > know about this possible quality difference, yet there would=20 > be nothing in a CRL or anywhere else to mark the fact that=20 > the Subscriber has re-keyed. >=20 You do not need to use the old authentication/signature key. You do not need to revoke it either. You can simply destroy it. You do need to keep old decryption keys. >=20 > The FPKI CA goes on to say that after re-key "The old certificate ...=20 > must not be further re-keyed, renewed, or modified". This=20 > seems almost oxymoronic. Consider that I have certificate A=20 > and then I re-key A to create certificate B. And then I=20 > re-key B to create certificate C. I would say that C is=20 > indistinguishable from a re-keyed A since A, B and C will=20 > only differ by key value. So how is it meaningful to forbid=20 > re-keying A more than once?=20 >=20 Certificates are not the only objects. CA and RA can keep other information that can be used to enforce that A is used to rekey only once. >=20 > Finally, why does RFC 3647 bother to describe "Certificate=20 > Modification"=20 > at all? The term is inherently confusing since one of the=20 > most obvious characteristics of a digital certificate is that=20 > it cannot be tampered with. I question the need for a=20 > special bit of counter intuitive jargon (and a whole slab of=20 > the RFC) to cover what is really a mundane scenario; viz a=20 > certificate Subject needs a certificate with different=20 > details in it. That is, it's just a new certificate. Why is=20 > it treated any differently from an original certificate application? Certificate Modification (like renewal and rekey) refer to the fact that a new certificate with different information is created. If you feel that the term is confusing, let us know of a better term. As to why deal with differently that original certificate is that the modification may be carried out using fully or partly automated process based on the current certificate to be modified. That is why framework identifies this. Of course, many certificate policies require initial process for certificate modification. For that matter, policies do not permit renewal and some require initial process for rekey as well. The framework tries to accommodate many plausible scenarios. >=20 >=20 > Cheers, >=20 > Stephen Wilson > Lockstep Technologies > www.lockstep.com.au/technologies. >=20 >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0bbki047376 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 17:37:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B0bbuF047375; Fri, 10 Apr 2009 17:37:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from emphytus.net.ttu.edu (emphytus.net.ttu.edu [129.118.1.215]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0baIE047368 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 17:37:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from Pickup by emphytus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 00:37:36 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f X-BigFish: VPS-25(zz1432R98dR1805Mzz1202hzz1033ILz2dh6bh87il61h) X-Spam-TCS-SCL: 0:0 X-FB-DOMAIN-IP-MATCH: fail Message-ID: <49D4C40D.5040501@cs.tcd.ie> Date: Thu, 2 Apr 2009 14:56:29 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.21 (X11/20090302) MIME-Version: 1.0 To: IETF-pkix Subject: Re: WG Last Call on draft-ietf-pkix-tac-03 References: In-Reply-To: X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit X-AntiVirus-Status: MessageID = A1743EE5B0A X-AntiVirus-Status: Host: imx2.tcd.ie X-AntiVirus-Status: Action Taken: X-AntiVirus-Status: NONE X-AntiVirus-Status: Checked by TCD Vexira. (version=1.60.2 VDF=10.102.30) List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan Santesson wrote: > The authors of Traceable Anonymous Certificate > draft-ietf-pkix-tac-03.txt has requested WGLC. > > http://tools.ietf.org/html/draft-ietf-pkix-tac-03 > A couple of comments: #1: Top of p7: "To effect issuance of the TAC, the AI interacts with the BI, over a secure channel, to jointly create the signature on the TAC, and sends the signed TAC to the user. The AI does this without learning the user's real identity (either from the user or from the BI)." If the AI sends the TAC to the user, then it will know some form of identity for that user, even if that's only an IP address. (And with the likes of SAVI, that could well be enough to establish a real identity.) I'd have thought it'd be much better to return the TAC via the BI and not require any user<->AI direct connections? #2: Section 5.2 claims that the AI can't unilaterally fool the BI into revealing the real identity. But the only thing that stops that seems to be the RP client identity verified by the BI when the RP establishes a mutual-auth TLS connection to the BI. So how can the BI really know that its not the AI making that connection? Stephen. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0a2OJ047258 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 17:36:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B0a2ng047257; Fri, 10 Apr 2009 17:36:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0a146047251 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 17:36:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hyperbius.net.ttu.edu (129.118.1.214) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 19:36:00 -0500 Received: from Pickup by hyperbius.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 00:36:00 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: Renew/Rekey/Modification Date: Thu, 2 Apr 2009 17:05:34 -0400 Message-ID: <200904022105.n32L5ZXD014427@stingray.missi.ncsc.mil> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSwACiN0dAACdj+0A== References: <49D2D476.3030000@lockstep.com.au> From: "Kemp, David P." To: X-OriginalArrivalTime: 02 Apr 2009 21:00:25.0140 (UTC) FILETIME=[0B571740:01C9B3D6] List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: As Santosh said, if the old key is compromised and used first by an adversary to rekey, then the subscriber will detect the compromise when he tries to rekey and is rejected. If the subscriber rekeys first, then the adversary is out of luck. The subscriber could be allowed to spawn multiple new rekeyed certificates (such as generating an email encryption certificate based on a signature certificate) as long as the validity is not extended from old to new, but should be allowed only one rekey with a new validity period. -----Original Message----- From: EXT-Glatting, Dennis P >>=20 >> It should be. The goal here is to use the current certificate to >> authenticate to create new certificates. >>=20 > > I'm a little confused here. If we're getting rid of the key because it's > getting old, then how is it young enough to validate a new key? A > problem is there is an implicit "continuance of legacy" in the new key > of the old key that doesn't end with the immediate generation but > follows all generations of the original key. >=20 > I'm not suggesting something is "wrong" but there seems like there is a > logic error somewhere.=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0KawP045883 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 17:20:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3B0KaDb045882; Fri, 10 Apr 2009 17:20:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from emphytus.net.ttu.edu (emphytus.net.ttu.edu [129.118.1.215]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3B0KO08045826 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 17:20:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from Pickup by emphytus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Sat, 11 Apr 2009 00:20:22 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B390.59C32388" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 08:41:31 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAAATo3RwAAzaKg References: From: Santosh Chokhani To: Stefan Santesson , "Hallam-Baker, Phillip" , IETF-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------_=_NextPart_001_01C9B390.59C32388 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Agree ________________________________ From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 Sent: Thursday, April 02, 2009 8:18 AM To: Santosh Chokhani; Hallam-Baker, Phillip; IETF-pkix Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I do agree to most things here. =09 I don't believe that implementations can strip off SHA-1 in any foreseeable future. It needs to be around, if nothing else, so for backwards compatibility. SHA-1 will continue to work in situations like this where no security properties are needed. =09 IMO, The added extension, even though I will not fight hard against it, would just be redundant complexity. =09 /Stefan =09 On 4/2/09 1:54 PM, "Santosh Chokhani" wrote: =09 =09 I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =09 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =09 It would appear that the extension should be NC. =09 Phil, =09 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =09 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. =09 =09 =20 =09 ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =20 =20 =20 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =09 =20 =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =09 =20 =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =09 =20 =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =09 =20 =20 =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =09 =20 =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =09 =20 =20 =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =09 =20 =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =09 =20 =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =09 =20 =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =09 =20 =20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =09 =20 =20 =20 =09 =20 =20 =09 ________________________________ =20 From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =20 =09 =20 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 =09 =09 ------_=_NextPart_001_01C9B390.59C32388 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Re: OCSP RFC (RFC 2560) Dependence on SHA-1
Agree


From: Stefan Santesson=20 [mailto:stefan@aaa-sec.com]
Sent: Thursday, April 02, 2009 = 8:18=20 AM
To: Santosh Chokhani; Hallam-Baker, Phillip;=20 IETF-pkix
Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I do agree to most things here.

I = don’t believe=20 that implementations can strip off SHA-1 in any foreseeable future. It = needs=20 to be around, if nothing else, so for backwards compatibility. SHA-1 = will=20 continue to work in situations like this where no security properties = are=20 needed.

IMO, The added extension, even though I will not fight = hard=20 against it,  would just be redundant = complexity.

/Stefan

On=20 4/2/09 1:54 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>=20 wrote:

I have no objection to having an extension, but if in = the long=20 term SHA-1 will not be there, it seems defining a new response type = (say=20 basic 2) would be the way to go so that SHA-1 based key ID can be = stripped=20 off.

If SHA-1 is not getting ripped = off in the=20 long term, I do not see value in extension except that it may make = every one=20 happy: those who do not care will not include it on the Server side = and/or=20 will ignore it on the client side.

It would appear that the = extension should be=20 NC.

Phil,

I would not respond to the = arguments on KISS=20 and security since in this case both are straightforward. =  Also, in=20 this thread, the comments were not meant for or directed at=20 you.

As you know, I have provided = extensive=20 comments to you when you first posted the OCSP Agility I-D and my = position=20 and reasons are matter of PKIX archives for anyone to scrutinize. =  When=20 you ignore every single cogent point, there is no sense in me = commenting on=20 next iteration.  I do think that the OCSP Agility I-D is a = solution=20 looking for a problem that I do not see.

 

From:=20 Hallam-Baker, Phillip  [mailto:pbaker@verisign.com]=20
Sent: Thursday, April 02, 2009 12:53 =  AM
To:=20 Santosh Chokhani; Stefan Santesson; =  IETF-pkix
Subject: RE:=20 OCSP RFC (RFC 2560) Dependence on  SHA-1

 
 
 
I think we have no choice  but to leave the Key = ID CHOICE=20 to be SHA-1 based.

 
 
But that does not preclude adding an  extension = that=20 allows the KeyID to be specified using a stronger algorithm. =  There=20 are two reasons for this:

 
 
1) Optics, even if there is no security =  implication, a=20 protocol that uses weak crypto necessitates an (expensive) =  security=20 review to prove that there is no problem. And these must be = performed=20  repeatedly by many different parties as relying on the = analysis of=20 others is a  good way to cause issues. Been there, done=20 that.

 
 
2) We are designing for long time spans,  ten = years or=20 more. While simple compressor collisions may not be a concern, =  there=20 is no guarantee that the attacks will stop at that point. MD4 has = been=20  broken repeatedly and they are now at the stage of jumping = up and=20 down on the  little pieces. It will probably happen to MD5 = and we=20 should be cautious in  case it happens to = SHA-1.

 
 
 
 
On the claim of 'Keep it simple STUPID',  I find = it rather=20 offensive to have my position characterized as stupid. My =  designs=20 are not exactly known for being verbose or overly elaborate. If I=20  propose something it is because there is a reason. It is = very easy=20 to defend  the status quo by derriding proposals as = unnecessary, but=20 the fact is that  making OCSP too simple will simply cause = the=20 complexity to blow out somewhere  else.

 
 
There is an architectural princple of  modular = design that=20 demands that the core of PKIX as it now stands (the =  certificate=20 profile and OCSP) be capable of stand alone use. We cannot fix=20  issues in OCSP with LTANS or other layered-on protocols as = some have=20 proposed.  It does not simplify my OCSP deployment to have to = graft=20 on an entire  different protocol in addition or to = re-engineer my=20 document archival protocol  to cover defects in = OCSP.

 
 
 
 
Simply adding new algorithms to a  protocol does = nothing=20 to improve security. You only improve security if you =  withdraw=20 insecure algorithms from use.

 
 
To make the system work you have to have  a = means of=20 negotiating between the client and the server. Otherwise there is =  no=20 way for an OCSP responder to ensure that it receives a secure,=20  supported response to querries for certificates that do not = exist=20 yet or  are not known to the responder.

 
 
In the case of an OCSP responder being  driven = by CRLs=20 collected from various sources, there is no way for the CA to =  know=20 if a certificate even exists, all it knows is if the status is=20  definitively revoked.

 
 
In the case of many transactional  architectures = the OCSP=20 validation is performed independently of certificate  chain=20 validation.

 
 
 
 
Experience of small scale PKI deployment  in = which any box=20 can be upgraded at will is simply not representative of large =  scale=20 real world deployment.

 
 
 

 
 


 
From:  owner-ietf-pkix@mail.imc.org = on=20 behalf of Santosh Chokhani
Sent: Wed  4/1/2009 8:39 = PM
To: Stefan Santesson; IETF-pkix
Subject: =  RE:=20 OCSP RFC (RFC 2560) Dependence on SHA-1

 

 

I=20 am saying that "Do you agree that 2560 can be left alone for=20  Responder
ID's key ID CHOICE being SHA-1 = based?"

>=20 -----Original  Message-----
> From: Stefan Santesson = [mailto:stefan@aaa-sec.com]
>= =20 Sent:  Wednesday, April 01, 2009 6:32 PM
> To: Santosh=20 Chokhani;  IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) = Dependence on  SHA-1
>
> Santosh,
>
> = In-line
>
>
>  On 4/1/09 10:31 PM, "Santosh = Chokhani" <SChokhani@cygnacom.com>=20  wrote:
>
> >
> > Stefan,
>=20 >
> > See  responses in-line.
> = >
>=20 >> -----Original  Message-----
> >> From: = Stefan=20 Santesson [mailto:stefan@aaa-sec.com]
>= =20  >> Sent: Wednesday, April 01, 2009 2:34 PM
> = >>=20 To: Santosh  Chokhani; Massimiliano Pala; IETF-pkix
> = >>=20 Subject: Re: OCSP RFC  (RFC 2560) Dependence on SHA-1
> = >>
> >>  Santosh,
> >>
> = >>=20 If you are talking about adding  other options to calculate=20 the
> >> KeyHash value in ResponderID  then I = strongly=20 disagree.
> >>
> >> If you add =  unspecified=20 options you change the properties
> of the field
>=20  >> from deterministic to a completely unknown = value.
>=20 >> It  does not matter if RFC2560 isn't explicit in its = description of
>  >> the use of the field. The = fact is=20 that OCSP explicitly
>  defines this
> >> = value and=20 as such will allow a client to  deterministically = compare
>=20 >> this value with the certificate  selected to = validate the=20 response
> >> signature.
>  >
> = > I=20 hope no one is doing the matching of Responder ID =  with
> hash=20 of a key
> > in place of responder signature =  verification.=20  That would
> be real bad.
> =  >
>
>=20 Yes it would. That is not at all what I talk about. But =  a
>=20 client could use this value to locate a responder=20  certificate.
>
> >> If you allow
> = >>=20 other ways  to calculate the value but do not provide any = means=20 to
> >> signal  what method that was used, then = this=20 feature is lost.
> >
>  > The most common = use will=20 be to use this field to prioritize the
>  > = certificates of=20 the responder to use for sigature
> verification on=20  the
> > response.
> >
>
> Do = you know=20 this for a  fact, or are you guessing?
> If a single=20 implementation verifies that  the certificate used
> to = validate the response matches the ResponderID  value, = and
>=20 choose to go into an error state because of mismatch, then=20  we
> have created great problems. So we can't guess. = We have=20 to
>  know that no single implementation will fail = because of=20 this.
> And that  may be very = hard.
>
>
>=20 >>
> >> In worst  case we will cause = current=20 implementation to fail.
> >
> >  That is = why I am=20 asking what problems if any will the vendors have.
>=20  >
>
> Even if no vendor speaks up here, it = will not=20 guarantee  that
> this will not create any=20 problems.
>
>  >>
> >> I really = don't=20 think its worth the effort to change  this field. We
> = >>=20 have a very large base of implementations that  we = really
>=20 don't want
> >> to mess up unless its absolutely=20  necessary.
> >
> > So, we agree that = leaving this=20 field hard  wired to SHA-1 is ok and
> > 2560 can = easily=20 accommodate new hash  functions.  Right?
>=20 >
>
> I fail to understand this  sentence. = Despite=20 reading it many
> times over.
>
> > My =  only=20 reason to align with 5280 is that if some one were
> ever=20  want
> > to strip off SHA-1 altogether from their = Responder=20 or  client,
> > permitting other methods does = it.
>=20  >
>
> I don't believe this argument is valid = as I=20 don't think  it is
> possible to strip off SHA-1 in any = reasonable future. In  any
> case. If we compare the = positive=20 side with allowing this
>  change and the negative = consequences=20 to make OCSP
> incompatible with  itself, my choice is=20 easy.
>
>  /Stefan
>
>
>=20 >>
> >> As the only  property of this field = is to=20 provide a convenient
> >> identifier,  it is far = from=20 absolutely necessary to change it.
> >> Remember =  that=20 there is a second choice to to identify responder by
> = >>=20  name. For names we have accepted the possibility of = collisions.=20 In
>  >> that comparison, upgrading from SHA-1 is = really=20 redundant.
>  >>
> >> /Stefan
> = >>
> >>
>  >>
> = >>
>=20 >> On 4/1/09 4:05 PM, "Santosh  Chokhani"
> = <SChokhani@cygnacom.com>=20 wrote:
>  >>
> >>>
> = >>> My=20 resident ASN.1 expert  apprised me of the fact that
> = >>=20 adding a choice
>  >>> will break backward=20 compatibility.  Thus, extension is  a
> >> = fifth=20 option
> >>> (probably third in the=20  priority).
> >>>
> >>> Based = on what I=20 know of  OCSP implementations, not changing
> >> = anything=20 in
>  >>> terms of bits on the wire and = aligning the=20 Key ID with  SKID
> >> in 5280 is
> = >>>=20 the best approach.   I do not think it will hurt=20 backward
> >> compatibility.
>=20  >>>
> >>> OCSP Responder and OCSP = client=20 vendors  should speak up if I
> >> am = wrong.
>=20 >>>
>  >>>> -----Original=20 Message-----
> >>>> From:  Santosh = Chokhani
>=20 >>>> Sent: Tuesday, March 31, 2009 12:51 =  PM
>=20 >>>> To: 'Massimiliano Pala'; IETF-pkix
>=20  >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence = on=20 SHA-1
>  >>>>
> >>>> = Max,
>=20  >>>>
> >>>> I do not see where = and=20 what  extension we need to add for
> >> other=20 digest
>  >>>> algorithm.
>=20 >>>>
> >>>>  For key id, we = need to=20 enhance or broaden the options.
> =  >>>>
>=20 >>>>> -----Original  Message-----
>=20 >>>>> From:  owner-ietf-pkix@mail.imc.org>=20 >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20  On Behalf Of
> >> Massimiliano Pala
>=20 >>>>>  Sent: Tuesday, March 31, 2009 1:37 = PM
>=20 >>>>> To:  IETF-pkix
> = >>>>>=20 Subject: Re: OCSP RFC (RFC 2560)  Dependence on SHA-1
> = >>>>>
> >>>>>  Hi = all,
>=20 >>>>>
> >>>>> as I said =  during=20 last meeting - as the use of SHA-1 does
> >>>> = not=20  have any
> >>>>> security implication = in the=20 OCSP,  another viable way
> would be to
>=20 >>>>> define an  extension where other digest=20 algorithms can be
> >>>> added  to = the
>=20 >>>>> request/responses.
>=20  >>>>>
> >>>>> It is a = simple=20 addition and  does not require any change in
> = >>>>=20 the RFC, it
>  >>>>> can be done as a = separate=20 document for those who what  to
> >> use = other
>=20 >>>>> digest  algorithms.
>=20 >>>>>
> >>>>> After  all, = isn't=20 this an example of why we allow
> >> extensions to=20  the
> >>>>> messages ?
>=20  >>>>>
> >>>>> = Later,
>=20  >>>>> Max
> = >>>>>
>=20  >>>>>
> >>>>> Santosh = Chokhani=20  wrote:
> >>>>>> Tom,
>=20  >>>>>>
> >>>>>> = Adding a=20 new choice  and aligning it with 5280 SKID is fine.
>=20  >>>>>>
> >>>>>> I = would=20 not add  anything about matching this field with
>=20 >>>>> anything  since
> = >>>>>>=20 RFC 2560 does not say anything about  it.
>=20 >>>>>>
> >>>>>> If one=20  were to add something, one should describe how this
>=20  >>>>> field can
> = >>>>>> be=20 used to  select from multiple Responder certificates.
> =  >>>>>>
> = >>>>>>>=20 -----Original  Message-----
> = >>>>>>>=20 From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20  >>>>>>> Sent: Monday, March 30, 2009 = 7:46=20 PM
>  >>>>>>> To: Santosh = Chokhani
>=20  >>>>>>> Cc: IETF-pkix
>=20  >>>>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on  SHA-1
> = >>>>>>>
>=20  >>>>>>>=20 =          Santosh:
>=20 >>>>>>>
> =  >>>>>>>=20          The RFC 5280 = method=20 just describes "two common
> >>>>  methods=20 for
> >>>>>>> generating key = identifiers=20  from the public key"
> >>>>>>> = and says=20 that other  methods are acceptable.  The comment
> = >>>>> to  KeyHash
> = >>>>>>>=20 in RFC 2560 4.2.1 is not as  permissive.  Of course,=20 it's
> >>>> the same
>=20  >>>>>>> field as SKID, and I would = support=20 either stating  "if the
> >>>>> KeyHash=20 is
>  >>>>>>> not precisely 20 = octets=20 long, it should be  matched
> against the
>=20 >>>>>>> Subject Key  Identifier = extension of the=20 signing
> certificate" or
> =  >>>>>>>=20 adding another choice like byID [3] OCTET STRING  --
>=20 >>>>> matches the value
>=20  >>>>>>> of SKID.
>=20  >>>>>>>
>=20  >>>>>>>=20 =             &= nbsp;    Tom=20 Gindin
> >>>>>>>
>=20  >>>>>>> P.S. - The above opinions are = mine, and=20 not  necessarily
> >>>>> those of = my
>=20  >>>>>>> employer
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
> =  >>>>>>>=20 "Santosh Chokhani" <SChokhani@cygnacom.com> =  Sent=20 by:
> >>>>>>>  owner-ietf-pkix@mail.imc.org>=20 >>>>>>> 03/26/2009  10:39 PM
>=20 >>>>>>>
> =  >>>>>>>=20 To
> >>>>>>>  "IETF-pkix" <ietf-pkix@imc.org>
>=20 >>>>>>>  cc
>=20 >>>>>>>
> >>>>>>>=20  Subject
> >>>>>>> OCSP RFC (RFC = 2560)=20 Dependence on  SHA-1
> = >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
> =  >>>>>>>=20 RFC 2560 dependence on SHA-1 does not appear to  be
>=20 >>>>> difficult to deal
>=20  >>>>>>> with.
>=20  >>>>>>>
> = >>>>>>>=20 Section 4.3  lists SHA-1 as mandatory and RSA as
>=20 >>>> optional.   We can
>=20 >>>>>>> update this to add SHA-2 series as=20  optional.
> >>>>>>>
>=20  >>>>>>> The Responder ID has SHA-1 = hardwired.=20  But,  that is no
> >>>>> different = than
>  >>>>>>> key ID extensions = in RFC=20 5280.  Here are  some options
> >> in order=20 of
> >>>>>>>  preference:
>=20 >>>>>>>
> =  >>>>>>> 1.=20  Align the language with subject key ID =  language
> in RFC=20 5280.
> >>>>>>>
>=20  >>>>>>> 2.  Keep on using SHA-1.=20  This field is  not security
> = >>>>>=20 relevant.  RFC
>  >>>>>>> = 2560 does=20 not even describe how to use this  field.  So,
>=20 >>>>> having SHA-1
>=20  >>>>>>> and accidental or intentional=20 collisions will not  hurt the
> >>>>>=20 security
>  >>>>>>> of the=20 protocol.
>  >>>>>>>
>=20 >>>>>>> 3.  If  you do not believe = in KISS=20 principle, you can
> >>>>>  define=20 another
> >>>>>>> response type and = enhance=20  the key ID ASN.1 syntax so
> that hash
>=20  >>>>>>> algorithm is = identified.
>=20  >>>>>>>
> = >>>>>>> 4.=20   Another option is for the Responder to use the
> = same=20 hashing
>  >>>>>>> algorithm as = the one in=20 the first certID  entry.
> = >>>>>>>
>=20  >>>>>>>
> = >>>>>>>=20 Santosh  Chokhani
> >>>>>>> = CygnaCom=20 Solutions
>  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>
> = >>>>>>
>=20  >>>>>
> >>>>>
>=20 >>>>>  --
> >>>>>
> = >>>>> Best  Regards,
>=20 >>>>>
> >>>>> =  Massimiliano=20 Pala
> >>>>>
> >>>>>=20 =  --o-----------------------------------------------------------
&= gt;=20  >>>>> -------------
> = >>>>>=20 Massimiliano  Pala [OpenCA Project Manager]
>=20 >>>>>  Massimiliano.Pala@dartmouth.edu<= /A>
>=20  >>>>>=20 =             <= BR>>=20  >>>>> project.manager@openca.org
>= ;=20  >>>>>
> >>>>> Dartmouth = Computer=20 Science  Dept=20 =             &= nbsp;  Home=20 Phone: +1
> >>>>> (603) 369-9332
>=20  >>>>> PKI/Trust  Laboratory=20 =             &= nbsp;           &n= bsp; Work=20 Phone: +1
> >>>>> (603) 646-9179
>=20  >>>>>=20 =  --o-----------------------------------------------------------
&= gt;=20  >>>>> -------------
>=20 >>>>>
>  >>>>> People who = think=20 they know everything are a great  annoyance
> = >>>>=20 to those
> >>>>> of us  who do.
>=20 >>>>>   --
> =  >>>>>=20 Isaac Asimov
> >>>>>
>=20  >>>>
> >>>
> = >>
>=20  >>
> >>
>=20 =  >
>
>
>


------_=_NextPart_001_01C9B390.59C32388-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AMpg4x042136 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 15:51:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3AMpgB7042135; Fri, 10 Apr 2009 15:51:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from euphorbus.net.ttu.edu (euphorbus.net.ttu.edu [129.118.1.216]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AMpUbN042125 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 15:51:40 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from Pickup by euphorbus.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 22:51:30 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 16:31:58 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQ References: From: Santosh Chokhani To: Stefan Santesson , IETF-pkix List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan, See responses in-line. > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 > Sent: Wednesday, April 01, 2009 2:34 PM > To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > Santosh, >=20 > If you are talking about adding other options to calculate=20 > the KeyHash value in ResponderID then I strongly disagree. >=20 > If you add unspecified options you change the properties of=20 > the field from deterministic to a completely unknown value.=20 > It does not matter if RFC2560 isn't explicit in its=20 > description of the use of the field. The fact is that OCSP=20 > explicitly defines this value and as such will allow a client=20 > to deterministically compare this value with the certificate=20 > selected to validate the response signature. I hope no one is doing the matching of Responder ID with hash of a key in place of responder signature verification. That would be real bad. > If you allow=20 > other ways to calculate the value but do not provide any=20 > means to signal what method that was used, then this feature is lost. The most common use will be to use this field to prioritize the certificates of the responder to use for sigature verification on the response. >=20 > In worst case we will cause current implementation to fail. That is why I am asking what problems if any will the vendors have. >=20 > I really don't think its worth the effort to change this=20 > field. We have a very large base of implementations that we=20 > really don't want to mess up unless its absolutely necessary. So, we agree that leaving this field hard wired to SHA-1 is ok and 2560 can easily accommodate new hash functions. Right? My only reason to align with 5280 is that if some one were ever want to strip off SHA-1 altogether from their Responder or client, permitting other methods does it. >=20 > As the only property of this field is to provide a convenient=20 > identifier, it is far from absolutely necessary to change it.=20 > Remember that there is a second choice to to identify=20 > responder by name. For names we have accepted the possibility=20 > of collisions. In that comparison, upgrading from SHA-1 is=20 > really redundant. >=20 > /Stefan >=20 >=20 >=20 >=20 > On 4/1/09 4:05 PM, "Santosh Chokhani" wrote: >=20 > >=20 > > My resident ASN.1 expert apprised me of the fact that=20 > adding a choice=20 > > will break backward compatibility. Thus, extension is a=20 > fifth option=20 > > (probably third in the priority). > >=20 > > Based on what I know of OCSP implementations, not changing=20 > anything in=20 > > terms of bits on the wire and aligning the Key ID with SKID=20 > in 5280 is=20 > > the best approach. I do not think it will hurt backward=20 > compatibility. > >=20 > > OCSP Responder and OCSP client vendors should speak up if I=20 > am wrong. > >=20 > >> -----Original Message----- > >> From: Santosh Chokhani > >> Sent: Tuesday, March 31, 2009 12:51 PM > >> To: 'Massimiliano Pala'; IETF-pkix > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >> Max, > >>=20 > >> I do not see where and what extension we need to add for=20 > other digest=20 > >> algorithm. > >>=20 > >> For key id, we need to enhance or broaden the options. > >>=20 > >>> -----Original Message----- > >>> From: owner-ietf-pkix@mail.imc.org > >>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of=20 > Massimiliano Pala > >>> Sent: Tuesday, March 31, 2009 1:37 PM > >>> To: IETF-pkix > >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>=20 > >>> Hi all, > >>>=20 > >>> as I said during last meeting - as the use of SHA-1 does > >> not have any > >>> security implication in the OCSP, another viable way would be to=20 > >>> define an extension where other digest algorithms can be > >> added to the > >>> request/responses. > >>>=20 > >>> It is a simple addition and does not require any change in > >> the RFC, it > >>> can be done as a separate document for those who what to=20 > use other=20 > >>> digest algorithms. > >>>=20 > >>> After all, isn't this an example of why we allow=20 > extensions to the=20 > >>> messages ? > >>>=20 > >>> Later, > >>> Max > >>>=20 > >>>=20 > >>> Santosh Chokhani wrote: > >>>> Tom, > >>>>=20 > >>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>=20 > >>>> I would not add anything about matching this field with > >>> anything since > >>>> RFC 2560 does not say anything about it. > >>>>=20 > >>>> If one were to add something, one should describe how this > >>> field can > >>>> be used to select from multiple Responder certificates. > >>>>=20 > >>>>> -----Original Message----- > >>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>> To: Santosh Chokhani > >>>>> Cc: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>> Santosh: > >>>>>=20 > >>>>> The RFC 5280 method just describes "two common > >> methods for > >>>>> generating key identifiers from the public key" > >>>>> and says that other methods are acceptable. The comment > >>> to KeyHash > >>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >> the same > >>>>> field as SKID, and I would support either stating "if the > >>> KeyHash is > >>>>> not precisely 20 octets long, it should be matched against the=20 > >>>>> Subject Key Identifier extension of the signing certificate" or=20 > >>>>> adding another choice like byID [3] OCTET STRING -- > >>> matches the value > >>>>> of SKID. > >>>>>=20 > >>>>> Tom Gindin > >>>>>=20 > >>>>> P.S. - The above opinions are mine, and not necessarily > >>> those of my > >>>>> employer > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> "Santosh Chokhani" Sent by: > >>>>> owner-ietf-pkix@mail.imc.org > >>>>> 03/26/2009 10:39 PM > >>>>>=20 > >>>>> To > >>>>> "IETF-pkix" > >>>>> cc > >>>>>=20 > >>>>> Subject > >>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>> difficult to deal > >>>>> with. > >>>>>=20 > >>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >> optional. We can > >>>>> update this to add SHA-2 series as optional. > >>>>>=20 > >>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>> different than > >>>>> key ID extensions in RFC 5280. Here are some options=20 > in order of > >>>>> preference: > >>>>>=20 > >>>>> 1. Align the language with subject key ID language in RFC 5280. > >>>>>=20 > >>>>> 2. Keep on using SHA-1. This field is not security > >>> relevant. RFC > >>>>> 2560 does not even describe how to use this field. So, > >>> having SHA-1 > >>>>> and accidental or intentional collisions will not hurt the > >>> security > >>>>> of the protocol. > >>>>>=20 > >>>>> 3. If you do not believe in KISS principle, you can > >>> define another > >>>>> response type and enhance the key ID ASN.1 syntax so that hash=20 > >>>>> algorithm is identified. > >>>>>=20 > >>>>> 4. Another option is for the Responder to use the same hashing=20 > >>>>> algorithm as the one in the first certID entry. > >>>>>=20 > >>>>>=20 > >>>>> Santosh Chokhani > >>>>> CygnaCom Solutions > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>=20 > >>>>=20 > >>>=20 > >>>=20 > >>> -- > >>>=20 > >>> Best Regards, > >>>=20 > >>> Massimiliano Pala > >>>=20 > >>> --o----------------------------------------------------------- > >>> ------------- > >>> Massimiliano Pala [OpenCA Project Manager]=20 > >>> Massimiliano.Pala@dartmouth.edu > >>> =20 > >>> project.manager@openca.org > >>>=20 > >>> Dartmouth Computer Science Dept Home Phone: +1 > >>> (603) 369-9332 > >>> PKI/Trust Laboratory Work Phone: +1 > >>> (603) 646-9179 > >>> --o----------------------------------------------------------- > >>> ------------- > >>>=20 > >>> People who think they know everything are a great annoyance > >> to those > >>> of us who do. > >>> -- > >>> Isaac Asimov > >>>=20 > >>=20 > >=20 >=20 >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AMn2AL042002 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 15:49:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3AMn2dF042001; Fri, 10 Apr 2009 15:49:02 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from eurymedon.net.ttu.edu (eurymedon.net.ttu.edu [129.118.1.225]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AMmpaE041988 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Fri, 10 Apr 2009 15:49:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: from hyperbius.net.ttu.edu (129.118.1.214) by tmrc.ttu.edu (129.118.1.179) with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 17:48:50 -0500 Received: from Pickup by hyperbius.net.ttu.edu with Microsoft SMTP Server id 8.1.340.0; Fri, 10 Apr 2009 22:48:50 +0000 X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f X-IronPort-AV: E=Sophos;i="4.39,315,1235952000"; d="scan'208";a="149671683" CC: Message-ID: <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> From: max pritikin To: Russ Housley In-Reply-To: <20090402162231.3E53E9A476F@odin.smetech.net> Content-Type: text/plain; charset="US-ASCII"; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit MIME-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Normative reference for 'CA rollover'? Date: Thu, 2 Apr 2009 12:24:33 -0500 References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> X-Mailer: Apple Mail (2.930.3) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=2418; t=1238693074; x=1239557074; c=relaxed/simple; s=sjdkim4002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=pritikin@cisco.com; z=From:=20max=20pritikin=20 |Subject:=20Re=3A=20Normative=20reference=20for=20'CA=20rol lover'? |Sender:=20; bh=iVnriq0ZJB212pieNLLFFvdly3fxfQrH5CDY+DZa7dw=; b=QAV9Eyx+SmJMNlsO3k1ch1OPPjRw9gHZJlFo/F32zIBHj2j7oWJl51No7H QPMME2T5Ws2jcTHe11Zt+3P2MzDVhpXsdtPAxwwkA96Tj5KkxL/n/PDWXTry svjvXbkCRw; Authentication-Results: sj-dkim-4; header.From=pritikin@cisco.com; dkim=pass ( sig from cisco.com/sjdkim4002 verified; ); List-Archive: List-ID: List-Unsubscribe: Received-SPF: None (emphytus.net.ttu.edu: owner-ietf-pkix@mail.imc.org does not designate permitted sender hosts) X-TechMail-Edge-Route: TTU Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Thank you Russ. This is what I was looking for. I'll review and ask questions as necessary. I would support the idea of publishing this information independently from a specific enrollment protocol. - max On Apr 2, 2009, at 11:22 AM, Russ Housley wrote: > Believe it or not, the new-in-old and old-in-new procedure is > documented in CMP. Many people fail to find it there. Perhaps it > should be extracted from there and published as a BCP. > > Russ > > At 10:47 AM 4/2/2009, max pritikin wrote: > > >> Hi folks, >> >> I'm looking for a normative reference describing how a CA would >> 'rollover' to a new keypair or 'modified' certificate. >> >> RFC5280 includes the following statements about 'rollover', here >> quoted with minimal context: >> >> 4.2.1.10 Name Contraints: >> "Name constraints are not applied to self-issued certificates >> (unless >> the certificate is the final certificate in the path). (This could >> prevent CAs that use name constraints from employing self-issued >> certificates to implement key rollover.)" >> >> 6.1. Basic Path Validation: >> "A certificate is self-issued if the same DN appears in the subject >> and issuer fields (the two DNs are the same if they match according >> to the rules specified in Section 7.1). In general, the issuer and >> subject of the certificates that make up a path are different for >> each certificate. However, a CA may issue a certificate to itself >> to >> support key rollover or changes in certificate policies. These >> self-issued certificates are not counted when evaluating path >> length >> or name constraints." >> >> 8. Security Considerations: >> "Loss of a CA's private signing key may also be problematic. The >> CA >> would not be able to produce CRLs or perform normal key rollover." >> >> But it does not include a recommended description of this rollover >> process itself. >> >> RFC3647 does not mention rollover at all, although it does define >> 'renewal' and 'rekey'. >> >> I can find informative discussions of rollover for various CA's >> (thanks Google). >> >> Can somebody point me in the right direction? Is there a normative >> reference or should I be able to infer the "correct" behavior from >> end >> entity rekey discussions as per the above notes? >> >> Thank you, >> >> - max >> > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AJlOTG031818 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 12:47:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3AJlO4v031817; Fri, 10 Apr 2009 12:47:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.cs.dartmouth.edu (mail.cs.dartmouth.edu [129.170.212.100]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AJlCXS031793 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 10 Apr 2009 12:47:23 -0700 (MST) (envelope-from Massimiliano.Pala@Dartmouth.edu) Received: from titan.cs.dartmouth.edu (mm.cs.dartmouth.edu [129.170.214.89]) (authenticated bits=0) by mail.cs.dartmouth.edu (8.14.2/8.14.2) with ESMTP id n3AJl6IH021306 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 10 Apr 2009 15:47:08 -0400 Message-ID: <49DFA346.309@Dartmouth.edu> Date: Fri, 10 Apr 2009 15:51:34 -0400 From: Massimiliano Pala Organization: Dartmouth College - Computer Science Department User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: Sean Turner CC: pkix Subject: Re: PRQP: CMS Gateway References: <49DE7DC0.8050501@ieca.com> In-Reply-To: <49DE7DC0.8050501@ieca.com> Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms060001020207000203080301" X-Virus-Scanned: ClamAV 0.93.3/9223/Fri Apr 10 10:54:59 2009 on mail.cs.dartmouth.edu X-Virus-Status: Clean X-Spam-Status: No, score=-2.4 required=5.0 tests=AWL,BAYES_00,SPF_HELO_FAIL autolearn=no version=3.2.5 X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on mail.cs.dartmouth.edu Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a cryptographically signed message in MIME format. --------------ms060001020207000203080301 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Hi Sean, thanks for the comments - I just modified the current draft version with the suggested changes. There are still some changes to be done for providing TAMP support via PRQP - but I think we will finalize them next week (I shall meet with Wallace at IDTrust) and we will be ready for updating the draft. Ciao, Max Sean Turner wrote: > > Max, > > Should the CMS Gateway be renamed CMC Gateway? CMM over CMS is CMC. > Also should the reference be updated to RFC 5272? --------------ms060001020207000203080301 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJIjCC BI0wggN1oAMCAQICAhpTMA0GCSqGSIb3DQEBBQUAMHcxEzARBgoJkiaJk/IsZAEZFgNlZHUx GTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0 bW91dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMTAeFw0wNTExMDgy MDMzMDZaFw0wOTExMDkyMDMzMDZaMIHBMRMwEQYKCZImiZPyLGQBGRYDZWR1MRkwFwYKCZIm iZPyLGQBGRYJZGFydG1vdXRoMQswCQYDVQQGEwJVUzEaMBgGA1UEChMRRGFydG1vdXRoIENv bGxlZ2UxGjAYBgoJkiaJk/IsZAEBEwoxMjI1NjAyOTQ3MRowGAYDVQQDExFNYXNzaW1pbGlh bm8gUGFsYTEuMCwGCSqGSIb3DQEJARYfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVk dTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAsv8obBpbhPixgdyIJj7UN0GYRNhsgWHB muCE5j8v8IvCSJWRF9spKoR0NBYgOfJu8DwQuKTIgrvbp0EC3ikrneotL4KTGD1IqWz/bSXL UR/bZAsc0r9PrvCUsZOi7wbijy784gOuqQUCJ2fJwKwk5SJ3RBaPnUROQXTp+LPSK8MCAwEA AaOCAVowggFWMA4GA1UdDwEB/wQEAwIF4DARBglghkgBhvhCAQEEBAMCBaAwgaIGA1UdIASB mjCBlzCBlAYKKwYBBAFBAgEBATCBhTA9BggrBgEFBQcCAjAxMBgWEURhcnRtb3V0aCBDb2xs ZWdlMAMCAQEaFURhcnRtb3V0aCBDb2xsZWdlIENQUzBEBggrBgEFBQcCARY4aHR0cDovL3d3 dy5kYXJ0bW91dGguZWR1L35wa2lsYWIvRGFydG1vdXRoQ1BTXzRTZXAwMy5wZGYwKgYDVR0R BCMwIYEfTWFzc2ltaWxpYW5vLlBhbGFARGFydG1vdXRoLmVkdTAfBgNVHSMEGDAWgBQ/wNbH p08Afu8GmWdsvJYeTaN3EjA/BggrBgEFBQcBAQQzMDEwLwYIKwYBBQUHMAGGI2h0dHA6Ly9j b2xsZWdlY2EuZGFydG1vdXRoLmVkdS9vY3NwMA0GCSqGSIb3DQEBBQUAA4IBAQDEYIWmG3Ht wcgFiBbrYKp7YpI62hgAw9I3Dj9Ai+etQcMDZL8cWg3Kd7DwYHDkLxO7jl518HIJCk8Elk+Z 3Y2c0rR+c9WLuxE+EHEUmQg2AbgxzRGZAeMXj7jrv5w75IWiXBrW3SdDkjVH6MQFZVP1CBk7 PF3/+dzmiO6E5g4cVtphPSdK2qtnX7Sh0zdePzeE+e0BTnsWdN0yHgKabKx3dCiEnQXt96sA Jf5ckg7fFLcplohwWlWJCpk8WwnJM0QGw3xbrZvLk+kIQgyh0sn2va4FgA1ae29cJ1d2NurA Z+LMdei9/ZbzBeMoD9XPSYyj7zLuVXGLF/JQQoPywk5oMIIEjTCCA3WgAwIBAgICGlMwDQYJ KoZIhvcNAQEFBQAwdzETMBEGCgmSJomT8ixkARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRh cnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNVBAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYD VQQDExNEYXJ0bW91dGggQ2VydEF1dGgxMB4XDTA1MTEwODIwMzMwNloXDTA5MTEwOTIwMzMw NlowgcExEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJk/IsZAEZFglkYXJ0bW91dGgx CzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29sbGVnZTEaMBgGCgmSJomT8ixk AQETCjEyMjU2MDI5NDcxGjAYBgNVBAMTEU1hc3NpbWlsaWFubyBQYWxhMS4wLAYJKoZIhvcN AQkBFh9NYXNzaW1pbGlhbm8uUGFsYUBEYXJ0bW91dGguZWR1MIGfMA0GCSqGSIb3DQEBAQUA A4GNADCBiQKBgQCy/yhsGluE+LGB3IgmPtQ3QZhE2GyBYcGa4ITmPy/wi8JIlZEX2ykqhHQ0 FiA58m7wPBC4pMiCu9unQQLeKSud6i0vgpMYPUipbP9tJctRH9tkCxzSv0+u8JSxk6LvBuKP LvziA66pBQInZ8nArCTlIndEFo+dRE5BdOn4s9IrwwIDAQABo4IBWjCCAVYwDgYDVR0PAQH/ BAQDAgXgMBEGCWCGSAGG+EIBAQQEAwIFoDCBogYDVR0gBIGaMIGXMIGUBgorBgEEAUECAQEB MIGFMD0GCCsGAQUFBwICMDEwGBYRRGFydG1vdXRoIENvbGxlZ2UwAwIBARoVRGFydG1vdXRo IENvbGxlZ2UgQ1BTMEQGCCsGAQUFBwIBFjhodHRwOi8vd3d3LmRhcnRtb3V0aC5lZHUvfnBr aWxhYi9EYXJ0bW91dGhDUFNfNFNlcDAzLnBkZjAqBgNVHREEIzAhgR9NYXNzaW1pbGlhbm8u UGFsYUBEYXJ0bW91dGguZWR1MB8GA1UdIwQYMBaAFD/A1senTwB+7waZZ2y8lh5No3cSMD8G CCsGAQUFBwEBBDMwMTAvBggrBgEFBQcwAYYjaHR0cDovL2NvbGxlZ2VjYS5kYXJ0bW91dGgu ZWR1L29jc3AwDQYJKoZIhvcNAQEFBQADggEBAMRghaYbce3ByAWIFutgqntikjraGADD0jcO P0CL561BwwNkvxxaDcp3sPBgcOQvE7uOXnXwcgkKTwSWT5ndjZzStH5z1Yu7ET4QcRSZCDYB uDHNEZkB4xePuOu/nDvkhaJcGtbdJ0OSNUfoxAVlU/UIGTs8Xf/53OaI7oTmDhxW2mE9J0ra q2dftKHTN14/N4T57QFOexZ03TIeAppsrHd0KISdBe33qwAl/lySDt8UtymWiHBaVYkKmTxb CckzRAbDfFutm8uT6QhCDKHSyfa9rgWADVp7b1wnV3Y26sBn4sx16L39lvMF4ygP1c9JjKPv Mu5VcYsX8lBCg/LCTmgxggL4MIIC9AIBATB9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAX BgoJkiaJk/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91 dGggQ29sbGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwCQYFKw4DAhoF AKCCAdEwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMDkwNDEw MTk1MTM0WjAjBgkqhkiG9w0BCQQxFgQU6sIaueZuctLcZSuyQaXRyrLksUEwUgYJKoZIhvcN AQkPMUUwQzAKBggqhkiG9w0DBzAOBggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYF Kw4DAgcwDQYIKoZIhvcNAwICASgwgYwGCSsGAQQBgjcQBDF/MH0wdzETMBEGCgmSJomT8ixk ARkWA2VkdTEZMBcGCgmSJomT8ixkARkWCWRhcnRtb3V0aDELMAkGA1UEBhMCVVMxGjAYBgNV BAoTEURhcnRtb3V0aCBDb2xsZWdlMRwwGgYDVQQDExNEYXJ0bW91dGggQ2VydEF1dGgxAgIa UzCBjgYLKoZIhvcNAQkQAgsxf6B9MHcxEzARBgoJkiaJk/IsZAEZFgNlZHUxGTAXBgoJkiaJ k/IsZAEZFglkYXJ0bW91dGgxCzAJBgNVBAYTAlVTMRowGAYDVQQKExFEYXJ0bW91dGggQ29s bGVnZTEcMBoGA1UEAxMTRGFydG1vdXRoIENlcnRBdXRoMQICGlMwDQYJKoZIhvcNAQEBBQAE gYASnb0jdWaklDHSPE/utWIC1HbZRm2QqHrI8PqXJ2ng/NZVn/zs4czzzXwFsKs+R/t8Ng/t 36hW7ujSRB8Tt7m3qqhSfsw64t5DQ+Ttan9uDofi+510lDjWWYL8keOybWw7t6pYXffR2f9N gRMTidCgYP/t7WQHi/pCw7BcZxmZ5QAAAAAAAA== --------------ms060001020207000203080301-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3AJBE1U029595 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 10 Apr 2009 12:11:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3AJBEqO029594; Fri, 10 Apr 2009 12:11:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp102.biz.mail.re2.yahoo.com (smtp102.biz.mail.re2.yahoo.com [68.142.229.216]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n3AJB1cn029571 for ; Fri, 10 Apr 2009 12:11:11 -0700 (MST) (envelope-from turners@ieca.com) Received: (qmail 53985 invoked from network); 10 Apr 2009 19:11:00 -0000 Received: from unknown (HELO thunderfish.local) (turners@96.231.117.245 with plain) by smtp102.biz.mail.re2.yahoo.com with SMTP; 10 Apr 2009 19:11:00 -0000 X-Yahoo-SMTP: qPTWNAeswBAtDTSn9GKlmmL3C90ke7grn_5n9To- X-YMail-OSG: dXsNavoVM1kbwapkdXuu_ux9kCzni.YUjnczK8muSQqwn0vUEjLvcxnSMj3q0OPDTj2FC2Bb0jNzJFIjMfSfXXxyhzcHIynwqNflz9rT16GA1AEGvhdKmVSLEWEkwpCXAakOJXF9AFYPe4NQ6zkF_s6u96pecau4sMWNpXVHJBeC6DgoDpmMfyShlPXX3pxhuLnVF3CG3R4y1YUZf4oEReS2lt9z2YJ.GJKu5272NVp1mGGsuaV0tycEXueS_qcoFxLbJYKSHX651FLIku_4DFJaiNFreOI6nm6GeGyzCLbYKArcrOULUW3jUzCjHczTyPBNbcXAzGooVFC36yloltnL2g-- X-Yahoo-Newman-Property: ymail-3 Message-ID: <49DF99C4.5000205@ieca.com> Date: Fri, 10 Apr 2009 15:11:00 -0400 From: Sean Turner User-Agent: Thunderbird 2.0.0.21 (Macintosh/20090302) MIME-Version: 1.0 To: McCann Peter-A001034 CC: gen-art@ietf.org, draft-ietf-pkix-3281update@tools.ietf.org, pkix-chairs@tools.ietf.org, pkix-ads@tools.ietf.org, ietf-pkix@imc.org Subject: Re: Gen-ART Review of draft-ietf-pkix-3281update-04 References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Pete, I'll expand the acronym and fix the spelling during AUTH48. spt McCann Peter-A001034 wrote: > I have been selected as the General Area Review Team (Gen-ART) reviewer > for this draft (for background on Gen-ART, please see > http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html). > > Please resolve these comments along with any other Last Call comments > you may receive. > > Document: draft-ietf-pkix-3281update-04 > Reviewer: Pete McCann > Review Date: 10 April 2009 > IETF LC End Date: 10 April 2009 > IESG Telechat date: unknown > > Summary: Ready for publication as a Proposed Standard > > Major issues: > > > Minor issues: > > Section 4.2.8: > this field SHOULD NOT be used by conforming CAs > I assume CA is Certificate Authority that issued the AC issuer's PKC, > but this acronym isn't expanded in the terminology section. > > > Nits/editorial comments: > > Section 7.1: > content type carried withing the ciphertext. > SHOULD BE: > content type carried within the ciphertext. > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39MxOJt051675 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 15:59:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39MxOSM051674; Thu, 9 Apr 2009 15:59:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp109.biz.mail.re2.yahoo.com (smtp109.biz.mail.re2.yahoo.com [206.190.53.8]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n39MxDQ3051658 for ; Thu, 9 Apr 2009 15:59:23 -0700 (MST) (envelope-from turners@ieca.com) Received: (qmail 85969 invoked from network); 9 Apr 2009 22:59:12 -0000 Received: from unknown (HELO thunderfish.local) (turners@71.191.14.4 with plain) by smtp109.biz.mail.re2.yahoo.com with SMTP; 9 Apr 2009 22:59:12 -0000 X-Yahoo-SMTP: qPTWNAeswBAtDTSn9GKlmmL3C90ke7grn_5n9To- X-YMail-OSG: WwefH1kVM1msCUJ3k0N5Isro3B4ZvBaNxNxVzPpw2rX.tbem7tasco2XJqq_1uRXeG2EL4CV5z35Cd6Ll9Uzz0IxK3fiXq1eRv6Aem6c9OhCVcW2tQWL4GEASj32Ko4nV5KsFWEMJYZ3YaLn5cey1Ca5YzarhWngN4Wx.X0CE61Uf9d_aTX_LrnJ6FKWX3VfojBwYVjzRkzsNE3k9lUqjMYYfFSYBAntBh86JHnKAl4WpDx9XHisTCXArolnUmdCJ9OtHNQm7RK3dCQieDDEuKQP1QdYvFu1yDkAJnk16.clO_t1X0b. X-Yahoo-Newman-Property: ymail-3 Message-ID: <49DE7DC0.8050501@ieca.com> Date: Thu, 09 Apr 2009 18:59:12 -0400 From: Sean Turner User-Agent: Thunderbird 2.0.0.21 (Macintosh/20090302) MIME-Version: 1.0 To: pkix Subject: PRQP: CMS Gateway Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Max, Should the CMS Gateway be renamed CMC Gateway? CMM over CMS is CMC. Also should the reference be updated to RFC 5272? spt Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39LaLuW047700 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 14:36:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39LaLBg047699; Thu, 9 Apr 2009 14:36:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout2-sn2.hy.skanova.net (pne-smtpout2-sn2.hy.skanova.net [81.228.8.164]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39La9ZQ047687 for ; Thu, 9 Apr 2009 14:36:20 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout2-sn2.hy.skanova.net (7.3.129) id 4873CA9504118B52; Thu, 9 Apr 2009 23:36:08 +0200 Message-ID: <9727707B83B64249ADD2B570DB6D1923@AndersPC> From: "Anders Rundgren" To: "Stefan Santesson" , References: In-Reply-To: Subject: Re: - An HTML5 standard facility? Date: Thu, 9 Apr 2009 23:36:32 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0222_01C9B96C.0392F920" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0222_01C9B96C.0392F920 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable It is indeed true that the write-up refers to out-dated RFCs but since = was designed ages ago that is sort of aligned with the rest of = the scheme as well :-) IMO it doesn't really matter if gets standardized or not, it = will anyway be obviated by other solutions since doesn't = support even the most basic security features needed, like giving the = issuer an indication whether keys are stored in the file system, or are = generated and stored in a secure container like a smart card. The = technique for doing that (container attestations) has been known for a = decade or more, and since trusted HW is already a part of high-end = mobile devices, it seems pretty short-sighted not to make use of it. BTW, and its numerous cousins are actually much more important = for mobile devices than for PCs, since for the latter we already have = physical token distribution (PIV/CAC/eID etc), which I believe is the = main reason why the state of on-line key-generation doesn't exactly top = the agendas of W3C, OASIS, or the IETF. One may argue that SIM-cards = already have what it takes, but then you probably haven't tried it in = practice :-) Anders ----- Original Message -----=20 From: "Stefan Santesson" To: "Anders Rundgren" ; Sent: Wednesday, April 08, 2009 00:30 Subject: Re: - An HTML5 standard facility? I find it a bit remarkable that they reference RFC 2459 for algorithm identifier OIDs Quote: "3. Let algorithm be an ASN.1 AlgorithmIdentifier structure as defined = by RFC2459, with the algorithm field giving the ASN.1 OID used to identify signature algorithm, using the OIDs defined in section 7.2 ("Signature Algorithms") of RFC2459, and the parameters field set up as required by RFC2459 for AlgorithmIdentifier structures for that algorithm. [X690] [RFC2459]" It's a tiny bit more than slightly outdated... /Stefan On 4/7/09 10:13 PM, "Anders Rundgren" wrote: >=20 > http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-element >=20 > Since the PKI community at large seems to ignore the client-side of > PKI in browsers, the HTML 5 designers apparently didn't find any other > solution but adopting the 15 year old Netscape hack known as . >=20 > It is indeed as said in this list very simple to use etc. However, > does it really match the needs of today? >=20 > My guess FWIW, is that the serious users of on-line provisioning of = PKI > which includes governments and banks in the EU, as well as the USPTO > will continue to use entirely proprietary solutions (mostly using = Java), since > the browser-schemes are all-over-the-map and do not do signatures = either. >=20 > A few things to consider: >=20 > How could a static tag in a page mark-up language match an API > or a protocol? >=20 > Algorithm agility, isn't that a requirement these days? >=20 > PIN-codes anybody? >=20 > TPM - A dead duck? >=20 > Anders >=20 ------=_NextPart_000_0222_01C9B96C.0392F920 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
It is indeed true that=20 the write-up refers to out-dated RFCs but = since <keygen>=20 was designed ages ago that is sort of aligned with the = rest of=20 the scheme as well :-)
 
IMO it doesn't really matter if = <keygen> gets=20 standardized or not, it will anyway be obviated by other solutions since = <keygen> doesn't support even the most basic security features = needed,=20 like giving the issuer an indication whether keys are stored in the file system, or are generated and stored in a = secure=20 container like a smart card.  The technique for doing that = (container attestations) has been known for a decade or more, = and since=20 trusted HW is already a part of high-end mobile devices, it seems pretty = short-sighted not to make use of it.

BTW, <keygen> and its = numerous=20 cousins are actually much more important for mobile devices = than for=20 PCs, since for the latter we already have physical token distribution=20 (PIV/CAC/eID etc), which I believe is the main reason why the state of = on-line=20 key-generation doesn't exactly top the agendas of W3C,
OASIS, or the IETF.  One may argue that = SIM-cards=20 already have what it takes, but then = you probably=20 haven't tried it in practice :-)

Anders


----- Original = Message=20 -----
From: "Stefan Santesson" <
stefan@aaa-sec.com>
To: "Anders=20 Rundgren" <
anders.rundgren@telia.com>;=20 <ietf-pkix@imc.org>
Sent:=20 Wednesday, April 08, 2009 00:30
Subject: Re: <keygen> - An = HTML5=20 standard facility?


I find it a bit remarkable that they = reference RFC=20 2459 for algorithm
identifier OIDs

Quote:
"3. Let algorithm = be an=20 ASN.1 AlgorithmIdentifier structure as defined by
RFC2459, with the = algorithm=20 field giving the ASN.1 OID used to identify
signature algorithm, = using the=20 OIDs defined in section 7.2 ("Signature
Algorithms") of RFC2459, and = the=20 parameters field set up as required by
RFC2459 for = AlgorithmIdentifier=20 structures for that algorithm. [X690]
[RFC2459]"

It's a tiny = bit more=20 than slightly outdated...

/Stefan


On 4/7/09 10:13 PM, = "Anders=20 Rundgren" <
anders.rundgren@telia.com>=20 wrote:

>
>
http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-el= ement
>
> Since the PKI community at large = seems to ignore=20 the client-side of
> PKI in browsers, the HTML 5 designers = apparently=20 didn't find any other
> solution but adopting the 15 year old = Netscape=20 hack known as <keygen>.
>
> It is indeed as said in = this list=20 very simple to use etc.  However,
> does it really match the = needs of=20 today?
>
> My guess FWIW, is that the serious users of = on-line=20 provisioning of PKI
> which includes governments and banks in the = EU, as=20 well as the USPTO
> will continue to use entirely proprietary = solutions=20 (mostly using Java), since
> the browser-schemes are = all-over-the-map and=20 do not do signatures either.
>
> A few things to = consider:
>=20
> How could a static tag in a page mark-up language match an = API
>=20 or a protocol?
>
> Algorithm agility, isn't that a = requirement=20 these days?
>
> PIN-codes anybody?
>
> TPM - A = dead=20 duck?
>
> Anders
> =

------=_NextPart_000_0222_01C9B96C.0392F920-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39GGOKn028935 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 09:16:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39GGOLr028934; Thu, 9 Apr 2009 09:16:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n39GGNkE028928 for ; Thu, 9 Apr 2009 09:16:23 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 21115 invoked from network); 9 Apr 2009 16:15:08 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 9 Apr 2009 16:15:07 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B92E.85ED62AC" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 12:16:21 -0400 Message-ID: In-Reply-To: <49DE1DAF.2000307@nist.gov> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm5LZm+5dIHybYeQIyTtW4kxKHJXQAAMztA References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> <49DE1DAF.2000307@nist.gov> From: "Santosh Chokhani" To: Cc: "ietf-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B92E.85ED62AC Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable David, =20 We agree. That is why my parenthetical remark. ________________________________ From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of David A. Cooper Sent: Thursday, April 09, 2009 12:09 PM To: x500standard@freelists.org Cc: ietf-pkix Subject: [x500standard] Re: Certificate definitions =09 =09 Santosh Chokhani wrote:=20 [Santosh]: The above paragraph has two inaccuracies. Since not all CA certificates are called cross certificates, set of CA certificates are self-issued, cross certificate, and subordinate CA certificates. (I wish we had not distinguished between cross certificates and subordinate CA certificates in the first place). Also note that a cross certificate can not be attribute certificate. I don't see an AA cross certificate in RFC 3281 or in X.509 =09 Santosh, =09 RFC 5280 says that "Cross-certificates are CA certificates in which the issuer and subject are different entities." =09 X.509 defines a cross-certificate as "A public-key or attribute certificate where the issuer and the subject/holder are different CAs or AAs respectively. CAs and AAs issue cross-certificates to other CAs or AAs respectively as a mechanism to authorize the subject CA's existence (e.g., in a strict hierarchy) or to recognize the existence of the subject CA or holder AA (e.g., in a distributed trust model). The cross-certificate structure is used for both of these." =09 So, every CA certificate is either self-issued or a cross-certificate. =09 I know that a lot of people seem to think that a certificate issued in a hierarchy by a hierarchically superior CA to a subordinate CA is not a "cross-certificate", that belief is not consistent with either X.509 or RFC 5280. (Perhaps people are simply guessing the meaning of "cross-certificate", and the inclusion of "cross" in the name leads them to guess that the term does not incorporate certificates issued to subordinate CAs.) If documents are being created that use the term "cross-certificate" to mean only CA certificates that are neither self-issued nor issued to a subordinate CA, then they are creating confusion by misusing the term. =09 Dave =09 ----- www.x500standard.com: The central source for information on the X.500 Directory Standard.=20 ------_=_NextPart_001_01C9B92E.85ED62AC Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
David,
 
We agree.  That is why my parenthetical=20 remark.


From: = x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of David = A.=20 Cooper
Sent: Thursday, April 09, 2009 12:09 PM
To: = x500standard@freelists.org
Cc: ietf-pkix
Subject:=20 [x500standard] Re: Certificate definitions

Santosh Chokhani wrote:=20

[Santosh]: The = above=20 paragraph has two inaccuracies.  Since not all CA = certificates=20 are called cross certificates, set of CA certificates are=20 self-issued, cross certificate, and subordinate CA=20 certificates.  (I wish we had not distinguished between cross = certificates and subordinate CA certificates in the first=20 place).  Also note that a cross certificate can not be = attribute=20 certificate.  I don't see an AA cross certificate in RFC 3281 = or in=20 = X.509

=
Santosh,

RFC=20 5280 says that "Cross-certificates are CA certificates in which the = issuer and=20 subject are different entities."

X.509 defines a = cross-certificate as=20 "A public-key or attribute certificate where the issuer and the = subject/holder=20 are different CAs or AAs respectively. CAs and AAs issue = cross-certificates to=20 other CAs or AAs respectively as a mechanism to authorize the subject = CA's=20 existence (e.g., in a strict hierarchy) or to recognize the existence = of the=20 subject CA or holder AA (e.g., in a distributed trust model). The=20 cross-certificate structure is used for both of these."

So, = every CA=20 certificate is either self-issued or a cross-certificate.

I = know that a=20 lot of people seem to think that a certificate issued in a hierarchy = by a=20 hierarchically superior CA to a subordinate CA is not a = "cross-certificate",=20 that belief is not consistent with either X.509 or RFC 5280.  = (Perhaps=20 people are simply guessing the meaning of "cross-certificate", and the = inclusion of "cross" in the name leads them to guess that the term = does not=20 incorporate certificates issued to subordinate CAs.)   If = documents are=20 being created that use the term "cross-certificate" to mean only CA=20 certificates that are neither self-issued nor issued to a subordinate = CA, then=20 they are creating confusion by misusing the = term.

Dave

----- www.x500standard.com: The central source = for=20 information on the X.500 Directory Standard. = ------_=_NextPart_001_01C9B92E.85ED62AC-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39G9bMX028338 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 09:09:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39G9bgw028337; Thu, 9 Apr 2009 09:09:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39G9ZwY028325 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 9 Apr 2009 09:09:36 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha2.nist.gov [129.6.16.198]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id n39G9RKI025274; Thu, 9 Apr 2009 12:09:27 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id n39G9JdO015998; Thu, 9 Apr 2009 12:09:20 -0400 Message-ID: <49DE1DAF.2000307@nist.gov> Date: Thu, 09 Apr 2009 12:09:19 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.21 (X11/20090330) MIME-Version: 1.0 To: x500standard@freelists.org CC: ietf-pkix Subject: Re: [x500standard] Re: Certificate definitions References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> In-Reply-To: Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh Chokhani wrote:

[Santosh]: The above paragraph has two inaccuracies.  Since not all CA certificates are called cross certificates, set of CA certificates are self-issued, cross certificate, and subordinate CA certificates.  (I wish we had not distinguished between cross certificates and subordinate CA certificates in the first place).  Also note that a cross certificate can not be attribute certificate.  I don't see an AA cross certificate in RFC 3281 or in X.509


Santosh,

RFC 5280 says that "Cross-certificates are CA certificates in which the issuer and subject are different entities."

X.509 defines a cross-certificate as "A public-key or attribute certificate where the issuer and the subject/holder are different CAs or AAs respectively. CAs and AAs issue cross-certificates to other CAs or AAs respectively as a mechanism to authorize the subject CA's existence (e.g., in a strict hierarchy) or to recognize the existence of the subject CA or holder AA (e.g., in a distributed trust model). The cross-certificate structure is used for both of these."

So, every CA certificate is either self-issued or a cross-certificate.

I know that a lot of people seem to think that a certificate issued in a hierarchy by a hierarchically superior CA to a subordinate CA is not a "cross-certificate", that belief is not consistent with either X.509 or RFC 5280.  (Perhaps people are simply guessing the meaning of "cross-certificate", and the inclusion of "cross" in the name leads them to guess that the term does not incorporate certificates issued to subordinate CAs.)   If documents are being created that use the term "cross-certificate" to mean only CA certificates that are neither self-issued nor issued to a subordinate CA, then they are creating confusion by misusing the term.

Dave

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39Fa78r026216 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 08:36:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39Fa78j026215; Thu, 9 Apr 2009 08:36:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n39FZtsh026198 for ; Thu, 9 Apr 2009 08:36:06 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 20817 invoked from network); 9 Apr 2009 15:34:38 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 9 Apr 2009 15:34:38 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/related; boundary="----_=_NextPart_001_01C9B928.DDECEF6D"; type="multipart/alternative" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 11:35:52 -0400 Message-ID: In-Reply-To: <7B01F815F4064ABEB6447E403CA12C56@ERA1> X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOwAAKEOVA= References: <7B01F815F4064ABEB6447E403CA12C56@ERA1> From: "Santosh Chokhani" To: , "ietf-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B928.DDECEF6D Content-Type: multipart/alternative; boundary="----_=_NextPart_002_01C9B928.DDECEF6D" ------_=_NextPart_002_01C9B928.DDECEF6D Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Erik, =20 See responses inline. ________________________________ From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: Thursday, April 09, 2009 11:26 AM To: x500standard@freelists.org; 'ietf-pkix' Subject: [x500standard] Re: Certificate definitions =09 =09 Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the = apparent inactivity of people, I have the power to produce Defect = Reports, produce Draft Technical Corrigenda, run them through both the = ISO and ITU-T approval process and finally integrate them into the next = edition of X.500 (incl. X.509) without being stopped by anyone (except = for Jean-Paul Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. = Let me express myself without the diagram. =20 The set of certificates is the union of the set of public-key = certificates and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key = certificates issued to end-entities and the set of attribute = certificates issued to end-entities. However, X.509 is a little = confusing here as the term end-entity certificate is sometimes meant to = be just public-key certificates issued to end-entities, so the term = end-entity certificate has two meanings. =20 The set of public-key certificates is the union of the set of = end-entity (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of end-entity = (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA = certificates and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued = (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute = certificate.=20 =20 [Santosh]: The above paragraph has two inaccuracies. Since not all CA = certificates are called cross certificates, set of CA certificates are = self-issued, cross certificate, and subordinate CA certificates. (I = wish we had not distinguished between cross certificates and subordinate = CA certificates in the first place). Also note that a cross certificate = can not be attribute certificate. I don't see an AA cross certificate = in RFC 3281 or in X.509 =20 I am avoiding here to use the term "user attribute", but believe it is = supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term "certificate", he/she is = entitled to believe it can either be a public-key certificate. It may = not always be clear from the context what is meant. =20 Whenever an innocent us reader see the term "end-entity certificate", = he/she is entitled to believe it is either a public key certificate or = an attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term "cross-certificate", = he/she is entitled to believe it is either a public key certificate or = an attribute certificate.=20 [Santosh]: See prior comment.=20 =20 My proposal was only to clear-up the terminology and to use the = terminology consistent in the text of X.509. Trying to do the latter may = raise a number of detailed questions when the meaning is not absolutely = clear from the context. =20 =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =20 Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too = long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a = public-key certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute = Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions =20 I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little = that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the = terminology and then produced below figure. I will not comment all the = boxes. =20 =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first = time in clause 7 as a public-key certificate. There are several other = places where it is a public-key certificate. In 15.5.2.4 is used in the = context of attribute certificates. The conclusion must be that an = end-entity certificate can either be a end-entity public-key certificate = or an end-entity attribute certificate. However, in most places, it is = implied that we only talks about public-key certificates. For veterans, = this is not a major problem, but new-comers may get confused. Anyway, I = thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to = use the term "certificate" as a synonym for "end-entrity public key = certificate". =20 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is = also used in X.511. RFC 5280 uses the term once without differenting it = from just "certificate". =20 The term "cross-certificate" should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 "end-entity public-key certificate" "user certificate" as a synonym for "end-entity public-key = certificate" "end-entity attribute certificate" =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attribute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------_=_NextPart_002_01C9B928.DDECEF6D Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Erik,
 
See responses inline.


From: = x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik=20 Andersen
Sent: Thursday, April 09, 2009 11:26 = AM
To:=20 x500standard@freelists.org; 'ietf-pkix'
Subject: = [x500standard] Re:=20 Certificate definitions

Hi=20 Denis,

 

It is a=20 little dangerous not to respond to my comments. Due to the apparent = inactivity=20 of people, I have the power to produce Defect Reports, produce Draft = Technical=20 Corrigenda, run them through both the ISO and ITU-T approval process = and=20 finally integrate them into the next edition of X.500 (incl. X.509) = without=20 being stopped by anyone (except for Jean-Paul Lemaire).

 

I believe=20 you misunderstood my diagram. It may be a little confusing. Let me = express=20 myself without the diagram.

 

The set of=20 certificates is the union of the set of public-key certificates and = the set of=20 attribute certificates.

 

The set of=20 end-entity certificates is the union of public-key certificates issued = to=20 end-entities and the set of attribute certificates issued to = end-entities.=20 However, X.509 is a little confusing here as the term end-entity = certificate=20 is sometimes meant to be just public-key certificates issued to = end-entities,=20 so the term end-entity certificate has two meanings.

 

The set of=20 public-key certificates is the union of the set of end-entity = (public-key)=20 certificates and the set of CA certificates.

 

The set of=20 attribute certificates is the union of the set of end-entity = (attribute)=20 certificates and the set of AA certificates.

 

The set of=20 authority certificates is the union of the set CA certificates and the = set of=20 AA certificates.

 

The set of=20 CA certificates is the union of the set of self-issued (public-key)=20 certificates and the set cross certificates. The latter is a little = confusing,=20 as a cross certificate can also be an attribute certificate. 

 

[Santosh]: The above = paragraph=20 has two inaccuracies.  Since not all CA certificates = are called=20 cross certificates, set of CA certificates are self-issued, cross = certificate,=20 and subordinate CA certificates.  (I wish we had not = distinguished=20 between cross certificates and subordinate CA certificates in the = first=20 place).  Also note that a cross certificate can not be attribute=20 certificate.  I don't see an AA cross certificate in RFC 3281 or = in=20 X.509

 

I am=20 avoiding here to use the term =93user attribute=94, but believe it is = supposed to=20 mean a public-key certificate issued to an = end-entity.

 

Whenever=20 an innocent reader sees the term =93certificate=94, he/she is entitled = to believe=20 it can either be a public-key certificate. It may not always be clear = from the=20 context what is meant.

 

Whenever=20 an innocent us  reader see the term =93end-entity certificate=94, = he/she is=20 entitled to believe it is either a public key certificate or an = attribute=20 certificate issued to an end-entity.

 

Whenever=20 an innocent us  reader see the term =93cross-certificate=94, = he/she is=20 entitled to believe it is either a public key certificate or an = attribute=20 certificate. 

[Santosh]: See = prior=20 comment. 

 

My=20 proposal was only to clear-up the terminology and to use the = terminology=20 consistent in the text of X.509. Trying to do the latter may raise a = number of=20 detailed questions when the meaning is not absolutely clear from the = context.=20  

 

Erik=20 Andersen

Andersen's=20 L-Service

Elsevej=20 48, DK-3500=20 Vaerloese

Denmark

Mobile: +45 = 2097=20 1490

email:=20 era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original=20 Message-----
From:=20 x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org]=20 On Behalf Of Denis=20 Pinkas
Sent: 3. = april 2009=20
17:33
To: x500 list; =
ietf-pkix
Subject:
[x500standard] Re: = Certificate=20 definitions

 

Eric,

 

Silence = does not mean=20 approval.

 

It may = mean that=20 the corrections are so numerous that it would take too long to=20 respond

and that = people do not=20 have that time available at the moment.

 

e.g.:  an=20 End-entity attribute certificate is not linked to a public-key=20 certificate.

         a=20 cross-certificate is not linked to an AA = certificate.

         an = Authority=20 Certificate is not linked to an Attribute = Certificate.

 

This is = only a=20 start ...

 

Denis

----- = Message re=E7u=20 -----

De=20 : = owner-ietf-pkix=20

=C0=20 : = x500standard,'PKIX'=20

Date : = 2009-04-03,=20 17:00:01

Sujet : RE: = [x500standard]=20 Certificate definitions

 

I take silence as approval.

 

Erik=20 Andersen

Andersen's=20 L-Service

Elsevej = 48, DK-3500=20 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original=20 Message-----
From:=20 x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org]=20 On Behalf Of Erik=20 Andersen
Sent: 1. = april=20 2009 14:40
To: = Directory=20 list; PKIX
Subject:=20 [x500standard] Certificate definitions

 

Hi

 

I got a = number of=20 responses on user certificates, but quite little that actually = answered my=20 question.

 

I have = tried to dig a=20 little bit more in X.509 to get hold of the terminology and then = produced=20 below figure. I will not comment all the boxes.

 

 

I will = like you to=20 comments as to the correctness of above figure.

 

The = end-entity=20 certificate is not defined in the definition clause. However it is = used=20 widely in the main text. It is mentioned the first time in clause 7 = as a=20 public-key certificate. There are several other places where it is a = public-key certificate. In 15.5.2.4 is used in the context of = attribute=20 certificates. The conclusion must be that an end-entity certificate = can=20 either be a end-entity public-key certificate or an end-entity = attribute=20 certificate. However, in most places, it is implied that we only = talks about=20 public-key certificates. For veterans, this is not a major problem, = but=20 new-comers may get confused. Anyway, I thing our specifications = should be=20 clear and not subject to interpretation. RFC 5280 does not use the = term at=20 all. It seems just to use the term =93certificate=94 as a synonym = for=20 =93end-entrity public key certificate=94.

 

The = =93User=20 Certificate=94  is not defined in X.509, but is wide used. It = seems to be=20 a synonym for =93end-entrity public key certificate=94. It is also = used in=20 X.511. RFC 5280 uses the term once without differenting it from just = =93certificate=94.

 

The term=20 =93cross-certificate=94 should probably also be = qualified.

 

I suggest = to add in=20 X.509 definitions for:

 

=93end-entity=20 public-key certificate=94

=93user = certificate=94 as=20 a synonym for =93end-entity public-key = certificate=94

=93end-entity attribute=20 certificate=94

 

The X.509 = text should=20 be updated to make use of these definitions.

 

X.509 has = four=20 attribute types for holding certificates.

 

UserCertificate: For=20 end-entity public-key certificates

cAcertificate: For CA=20 certificates

attributeCertificateAttribute: For end-entity attribute = certificates

aACertificate: For AA=20 Certificates

 

Any=20 comments?

 

Erik = Andersen

Andersen's=20 L-Service

Elsevej 48, DK-3500=20 Vaerloese

Denmark

Mobile: = +45 2097=20 1490

email:=20 era@x500.eu

www.x500.eu

www.x500standard.com

 

------_=_NextPart_002_01C9B928.DDECEF6D-- ------_=_NextPart_001_01C9B928.DDECEF6D Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: <462263115@09042009-1BCF> Content-Description: image001.gif Content-Location: image001.gif R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------_=_NextPart_001_01C9B928.DDECEF6D-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39FQ0xa025396 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 9 Apr 2009 08:26:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n39FQ03j025395; Thu, 9 Apr 2009 08:26:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail02.dandomain.dk (mail02.dandomain.dk [194.150.112.202]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n39FPkJK025382 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 9 Apr 2009 08:25:58 -0700 (MST) (envelope-from era@x500.eu) Received: from ERA1 ([95.209.182.175]) by mail02.dandomain.dk (DanDomain Mailserver) with ASMTP id QTI80738; Thu, 09 Apr 2009 17:25:38 +0200 From: "Erik Andersen" To: , "'ietf-pkix'" Subject: RE: [x500standard] Re: Certificate definitions Date: Thu, 9 Apr 2009 17:25:37 +0200 Message-ID: <7B01F815F4064ABEB6447E403CA12C56@ERA1> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0000_01C9B938.35920940" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6838 Importance: Normal Thread-Index: Acm0cXogl35R6fnrRR6btIokFjzPxQErLQOw In-Reply-To: X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0000_01C9B938.35920940 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0001_01C9B938.35920940" ------=_NextPart_001_0001_01C9B938.35920940 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi Denis, =20 It is a little dangerous not to respond to my comments. Due to the = apparent inactivity of people, I have the power to produce Defect Reports, = produce Draft Technical Corrigenda, run them through both the ISO and ITU-T = approval process and finally integrate them into the next edition of X.500 (incl. X.509) without being stopped by anyone (except for Jean-Paul Lemaire). =20 I believe you misunderstood my diagram. It may be a little confusing. = Let me express myself without the diagram. =20 The set of certificates is the union of the set of public-key = certificates and the set of attribute certificates. =20 The set of end-entity certificates is the union of public-key = certificates issued to end-entities and the set of attribute certificates issued to end-entities. However, X.509 is a little confusing here as the term end-entity certificate is sometimes meant to be just public-key = certificates issued to end-entities, so the term end-entity certificate has two = meanings. =20 The set of public-key certificates is the union of the set of end-entity (public-key) certificates and the set of CA certificates. =20 The set of attribute certificates is the union of the set of end-entity (attribute) certificates and the set of AA certificates. =20 The set of authority certificates is the union of the set CA = certificates and the set of AA certificates. =20 The set of CA certificates is the union of the set of self-issued (public-key) certificates and the set cross certificates. The latter is = a little confusing, as a cross certificate can also be an attribute certificate. =20 I am avoiding here to use the term =93user attribute=94, but believe it = is supposed to mean a public-key certificate issued to an end-entity. =20 Whenever an innocent reader sees the term =93certificate=94, he/she is = entitled to believe it can either be a public-key certificate. It may not always = be clear from the context what is meant. =20 Whenever an innocent us reader see the term =93end-entity = certificate=94, he/she is entitled to believe it is either a public key certificate or = an attribute certificate issued to an end-entity. =20 Whenever an innocent us reader see the term =93cross-certificate=94, = he/she is entitled to believe it is either a public key certificate or an = attribute certificate. =20 My proposal was only to clear-up the terminology and to use the = terminology consistent in the text of X.509. Trying to do the latter may raise a = number of detailed questions when the meaning is not absolutely clear from the context. =20 =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: 3. april 2009 17:33 To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions =20 Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too = long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a public-key certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute = Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions =20 I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first time in = clause 7 as a public-key certificate. There are several other places where it = is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term = at all. It seems just to use the term =93certificate=94 as a synonym for =93end-entrity public key certificate=94. =20 The =93User Certificate=94 is not defined in X.509, but is wide used. = It seems to be a synonym for =93end-entrity public key certificate=94. It is also = used in X.511. RFC 5280 uses the term once without differenting it from just =93certificate=94. =20 The term =93cross-certificate=94 should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 =93end-entity public-key certificate=94 =93user certificate=94 as a synonym for =93end-entity public-key = certificate=94 =93end-entity attribute certificate=94 =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attribute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------=_NextPart_001_0001_01C9B938.35920940 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

Hi = Denis,

 

It is a little = dangerous not to respond to my comments. Due to the apparent inactivity of people, = I have the power to produce Defect Reports, produce Draft Technical Corrigenda, = run them through both the ISO and ITU-T approval process and finally = integrate them into the next edition of X.500 (incl. X.509) without being stopped by = anyone (except for Jean-Paul = Lemaire).

 

I believe you = misunderstood my diagram. It may be a little confusing. Let me express myself without = the diagram.

 

The set of = certificates is the union of the set of public-key certificates and the set of = attribute certificates.

 

The set of = end-entity certificates is the union of public-key certificates issued to end-entities and the = set of attribute certificates issued to end-entities. However, X.509 is a = little confusing here as the term end-entity certificate is sometimes meant to = be just public-key certificates issued to end-entities, so the term end-entity certificate has two meanings.

 

The set of = public-key certificates is the union of the set of end-entity (public-key) = certificates and the set of CA certificates.

 

The set of = attribute certificates is the union of the set of end-entity (attribute) = certificates and the set of AA certificates.

 

The set of = authority certificates is the union of the set CA certificates and the set of AA certificates.

 

The set of CA certificates is the union of the set of self-issued (public-key) = certificates and the set cross certificates. The latter is a little confusing, as a = cross certificate can also be an attribute certificate.

 

I am avoiding = here to use the term “user attribute”, but believe it is supposed to = mean a public-key certificate issued to an end-entity.

 

Whenever an = innocent reader sees the term “certificate”, he/she is entitled to believe = it can either be a public-key certificate. It may not always be clear from the = context what is meant.

 

Whenever an = innocent us =A0reader see the term “end-entity certificate”, he/she is entitled to believe it is either a public key certificate or an attribute = certificate issued to an end-entity.

 

Whenever an = innocent us =A0reader see the term “cross-certificate”, he/she is entitled to = believe it is either a public key certificate or an attribute = certificate.

 

My proposal was = only to clear-up the terminology and to use the terminology consistent in the text of = X.509. Trying to do the latter may raise a number of detailed questions when the = meaning is not absolutely clear from the context. =A0

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, = DK-3500 Vaerloese

Denmark

Mobile: +45 2097 = 1490

email: era@x500.eu

www.x500.eu

www.x500standard.= com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas
Sent: 3. april 2009 =
17:33
To: x500 list; =
ietf-pkix
Subject: [x500standard] = Re: Certificate definitions

 

Eric,

 

Silence does = not mean approval.

 

It may = mean that the corrections are so numerous that it would take too long to = respond

and that = people do not have that time available at the moment.

 

e.g.:  = an End-entity attribute certificate is not linked to a public-key = certificate.

    &nb= sp;    a cross-certificate is not linked to an AA = certificate.

    &nb= sp;    an Authority Certificate is not linked to an Attribute = Certificate.

 

This is = only a start ...

 

Denis

----- Message = re=E7u -----

Date = : 2009-04-03, 17:00:01

Sujet = : RE: [x500standard] Certificate definitions

 

I take silence as approval.

 

Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen
Sent: 1. april 2009 = 14:40
To: Directory list; = PKIX
Subject: [x500standard] Certificate definitions

 

Hi

 

I got a number = of responses on user certificates, but quite little that actually answered = my question.

 

I have tried = to dig a little bit more in X.509 to get hold of the terminology and then = produced below figure. I will not comment all the boxes.

 

 

I will like = you to comments as to the correctness of above figure.

 

The end-entity certificate is not defined in the definition clause. However it is used = widely in the main text. It is mentioned the first time in clause 7 as a = public-key certificate. There are several other places where it is a public-key certificate. In 15.5.2.4 is used in the context of attribute = certificates. The conclusion must be that an end-entity certificate can either be a = end-entity public-key certificate or an end-entity attribute certificate. However, = in most places, it is implied that we only talks about public-key certificates. = For veterans, this is not a major problem, but new-comers may get confused. = Anyway, I thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.

 

The = “User Certificate”  is not defined in X.509, but is wide used. It = seems to be a synonym for “end-entrity public key certificate”. It is = also used in X.511. RFC 5280 uses the term once without differenting it from = just “certificate”.

 

The term = “cross-certificate” should probably also be qualified.

 

I suggest to = add in X.509 definitions for:

 

“end-entity public-key certificate”

“user = certificate” as a synonym for “end-entity public-key = certificate”

“end-entity attribute certificate”

 

The X.509 text = should be updated to make use of these definitions.

 

X.509 has four = attribute types for holding certificates.

 

UserCertificate: For end-entity public-key certificates

cAcertificate: = For CA certificates

attributeCertificateAttribut= e: For end-entity attribute certificates

aACertificate: = For AA Certificates

 

Any = comments?

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, DK-3500 = Vaerloese

Denmark

Mobile: +45 = 2097 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com<= /font>

 

------=_NextPart_001_0001_01C9B938.35920940-- ------=_NextPart_000_0000_01C9B938.35920940 Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_000_0000_01C9B938.35920940-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n38Ew71t005866 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 8 Apr 2009 07:58:08 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n38Ew7FS005865; Wed, 8 Apr 2009 07:58:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail-fx0-f177.google.com (mail-fx0-f177.google.com [209.85.220.177]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n38EvtQJ005840 for ; Wed, 8 Apr 2009 07:58:06 -0700 (MST) (envelope-from jlopez.ha@gmail.com) Received: by fxm25 with SMTP id 25so174748fxm.10 for ; Wed, 08 Apr 2009 07:57:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=9Z/kLQvAVeOVthHV9xhPtxDJ1CkrYeiiue5s39nsTtA=; b=r4fQH0SmXvyZSFJctoEctkEIVa5UMW2HKi2Le4nWBMxfp86drF2pcpQeG7GcIQM09o c+2GACOeR7Hjw/d3RkhmHAv1WtB4pJmvhv90K45cTUZJ+O54Enc4b1xzD0WcCGrnxoaI HhZgps7UrahjFeCn0+TSyZcdlAnf/W16d/56I= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=BN3mmPhoNEC5vvDTb12Thzc7syouzFroLftkfxm3kRMTNy8+5wEDMT83k0UkVBs6ez 3KwUcqWbnRhbvtAu9hxHP6oaaMqOTDfGOqwDwAXYG074vaQhgz9NHqZzUK8rOeeBmIoS i0G4s8Wor0OY0EBSgui9fVOIxGaGM8DtZ9VCw= MIME-Version: 1.0 Received: by 10.204.77.81 with SMTP id f17mr1202998bkk.78.1239202674915; Wed, 08 Apr 2009 07:57:54 -0700 (PDT) In-Reply-To: <49DCB26D.5050202@nist.gov> References: <49DCB26D.5050202@nist.gov> Date: Wed, 8 Apr 2009 16:57:54 +0200 Message-ID: Subject: Re: Revocation scheme definition From: =?ISO-8859-1?Q?Jorge_L=F3pez?= To: "David A. Cooper" Cc: Stefan Santesson , pkix Content-Type: multipart/alternative; boundary=001485f870603e3a0d04670c5b4e Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --001485f870603e3a0d04670c5b4e Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Thanks Stefan and Dave for your responses. Well, maybe CSI was not the best acronym as a proposal :-) I wasn't talking about PKIX documents, but some research papers, master/doctoral thesis where a classification of "revocation mechanisms" is made. I understand that these domains are out of the scope of the PKIX community, but maybe we should think of "standardizing" some concepts if th= e "rest of the world" tends to confuse them. I think that's one of the tasks of a standardization organization/work group/etc. Possibly it is not worthy to work on it focusing merely on revocation schem= e related terms, but I have been following a thread about digital certificate/end user certificate/etc. terms that seemed to be confusing as well to some folks. Is it crazy to propose an RFC Informational which collects a kind of glossary and definitions of PKIX related technology? Best, -------- Jorge Lopez Hernandez-Ardieta 2009/4/8 David A. Cooper > Stefan Santesson wrote: > >> Despite that I would love to put CSI expert on my business card, it migh= t >> be a bit problematic to hijack this acronym :) >> > > Yes, RFC 5513 points out the problem of the overuse of three letter > acronyms (granted it is an April 1 RFC). If we used the acronym CSI, mos= t > people would tend to immediately think of the College of Southern Idaho .= .. > I mean the College of Staten Island ... Computer Security Institute ... > Construction Specifications Institute ... Commodity Systems Inc. ... > Computers & Structures, Inc. ... Chi Sigma Iota ... Christian Schools > International ... Computational Systems, Inc. ... Christian Solidarity > International ... California Solar Initiative ... Canadian Solar Inc. ... > Chandler Systems Inc. ... Communications Specialties, Inc. ... Cetacean > Society International ... Coalition of Service Industries ... Church of > South India ... Computer Society of India ... Cellular Specialties, Inc. = ... > College Student Insurance ... Custom Systems Integration ... Center for > Social Innovation ... Center for Sustainable Innovation ... Creative > Specialties International ... Control Sciences Inc. ... Conditional > Symmetric Instability ... Community Services Infrastructure ... Coastal > Studies Institute ... Curriculum Support Information ... Control Solution= s > International ... Conversion Services International ... Civil Society > International ... Collaborative Software Initiative ... Consolidated Syst= ems > Incorporated ... Center for the Study of Intelligence ... Combat Studies > Institute ... Coatings Societies International ... Chemical Sampling > Information ... California Steel Industries ... Cardiovascular Systems In= c. > ... Conservation Study Institute ... Cognitive Strategy Instruction ... > Compliance Services International ... Cement Sustainability Initiative ..= . > Cyber Safety Initiative ... Center for Student Involvement ... Center for > the Study of Inequality ... Chiropractic Sports Institute ... Closure > Systems International ... Custom Scientific Instruments ... Crisis > Simulations International ... Cooperative Sagebrush Initiative ... Child > Study Institute ... Climate Status Investigations ... Centrifugal Service= s, > Inc. ... Conflict Solutions International ... Caregiver Services, Inc. ..= . > Charter School Institute ... Component Sources International ... > > So I can understand that you would be concerned that if you referred to > yourself as a CSI expert, people might think you meant that you were an > expert in Computational Sciences and Informatics. > > Other than that I feel sympathetic to your distinction between revocatio= n >> and validation. It is however my belief that we have used that distincti= on >> in our standards efforts. >> > > I think it would be helpful if specific examples were provided of places = in > PKIX documents in which the distinction between mechanisms for distributi= ng > certificate status information (e.g., CRLs and OCSP) and mechanisms for > submitting revocation requests (e.g., a CMP revocation request message) i= s > not clear. Perhaps this confusion does appear in the literature, and tho= se > of us on this list simply don't notice it since we already clearly > understand the concepts. But without being provided specific examples of > text that a non-PKI expert might find confusing, it is difficult for us t= o > judge whether this is a problem in PKIX documents that the WG needs to be > more careful about in future documents. > > Dave > > > On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: >> >> Hi all, >> >> Next I merely offer personal considerations about the (in my >> opinion) confusing scenario of PKI terminology classification. I >> would appreciate any comment on this. >> >> As can be seen in the literature, most people define CRL, >> Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, >> Certificate Revocation Status, Certificate Revocation Tree, etc. >> as revocation schemes. I think this "classification" is confusing. >> >> I personally consider a revocation scheme as a scheme/protocol >> where the owner (or an authorised party) is able to revocate the >> status of her certificate. For example, the one defined in RFC >> 4210 CMP. However, the terms mentioned above relate to data >> structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make >> that data structure available to others (Over-Issued CRL, >> Over-Issued Segmented CRL, etc.) and both the managed data >> structure and the associated publication mechanism (NOVOMODO, >> Certificate Revocation Tree, etc.). But none of them to the >> procedure to be followed in order to revocate the certificate! If >> fact OCSP is sometimes referenced as a revocation scheme, when it >> is actually focused on "just" checking the revocation status of a >> certificate... >> >> From my viewpoint, I would differentiate among the scheme, the >> certificate status information itself - CSI (data structure) - and >> the method that distributes/publishes the CSI. A revocation scheme >> updates the CSI. However, the publication/distribution method is >> oriented to support the validation of certificates. IMHO it has >> nothing to do with a revocation scheme. Perhaps you may consider >> appropiate to include in the term "revocation scheme" everything >> that has something to do with the revocation information... >> >> Therefore, I distinguish a revocation scheme from another type of >> scheme (validation scheme) which aim is to check the status of a >> certificate taking into account the CSI. This CSI could be >> distributed/published by using one of the methods defined above, >> or accessed in an online manner (an OCSP service that retrieves >> the CSI from a fresh database). >> >> I guess that the revocation scheme term has been extended to >> things not so related to the revocation itself, like the >> validation procedure. I just want to know what the PKI community >> think about this. >> >> Thanks in advance, >> >> -------- >> Jorge Lopez Hernandez-Ardieta >> >> > --001485f870603e3a0d04670c5b4e Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Thanks Stefan and Dave for your responses.

We= ll, maybe CSI was not the best acronym as a proposal :-)

I wasn't talking about PKIX documents, but some research papers,= master/doctoral thesis where a classification of "revocation mechanis= ms" is made. I understand that these domains are out of the scope of t= he PKIX community, but maybe we should think of "standardizing" s= ome concepts if the "rest of the world" tends to confuse them. I = think that's one of the tasks of a standardization organization/work gr= oup/etc.

Possibly it is not worthy to work on it focusing merely= on revocation scheme related terms, but I have been following a thread abo= ut digital certificate/end user certificate/etc. terms that seemed to be co= nfusing as well to some folks.

Is it crazy to propose an RFC Informational which colle= cts a kind of glossary and definitions of PKIX related technology?

Best,

--------
Jorge Lo= pez Hernandez-Ardieta

2009/4/8 David A. Cooper &= lt;david.cooper@nist.gov>
Stefan Santesson wrote:
Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :)

Yes, RFC 5513 points out the problem of the overuse of three letter acronym= s (granted it is an April 1 RFC). =A0If we used the acronym CSI, most peopl= e would tend to immediately think of the College of Southern Idaho ... I me= an the College of Staten Island ... Computer Security Institute ... Constru= ction Specifications Institute ... Commodity Systems Inc. ... Computers &am= p; Structures, Inc. ... Chi Sigma Iota ... Christian Schools International = ... Computational Systems, Inc. ... Christian Solidarity International ... = California Solar Initiative ... Canadian Solar Inc. ... Chandler Systems In= c. ... Communications Specialties, Inc. ... Cetacean Society International = ... Coalition of Service Industries ... Church of South India ... Computer = Society of India ... Cellular Specialties, Inc. ... College Student Insuran= ce ... Custom Systems Integration ... Center for Social Innovation ... Cent= er for Sustainable Innovation ... Creative Specialties International ... Co= ntrol Sciences Inc. ... Conditional Symmetric Instability ... Community Ser= vices Infrastructure ... Coastal Studies Institute ... Curriculum Support I= nformation ... Control Solutions International ... Conversion Services Inte= rnational ... Civil Society International ... Collaborative Software Initia= tive ... Consolidated Systems Incorporated ... Center for the Study of Inte= lligence ... Combat Studies Institute ... Coatings Societies International = ... Chemical Sampling Information ... California Steel Industries ... Cardi= ovascular Systems Inc. ... Conservation Study Institute ... =A0Cognitive St= rategy Instruction ... Compliance Services International ... Cement Sustain= ability Initiative ... Cyber Safety Initiative ... Center for Student Invol= vement ... Center for the Study of Inequality ... Chiropractic Sports Insti= tute ... Closure Systems International ... Custom Scientific Instruments ..= . Crisis Simulations International ... Cooperative Sagebrush Initiative ...= Child Study Institute ... Climate Status Investigations ... Centrifugal Se= rvices, Inc. ... Conflict Solutions International ... Caregiver Services, I= nc. ... Charter School Institute ... Component Sources International ...
So I can understand that you would be concerned that if you referred to you= rself as a CSI expert, people might think you meant that you were an expert= in Computational Sciences and Informatics.


Other than that I feel sympathetic to your distinction between revocation a= nd validation. It is however my belief that we have used that distinction i= n our standards efforts.

I think it would be helpful if specific examples were provided of places in= PKIX documents in which the distinction between mechanisms for distributin= g certificate status information (e.g., CRLs and OCSP) and mechanisms for s= ubmitting revocation requests (e.g., a CMP revocation request message) is n= ot clear. =A0Perhaps this confusion does appear in the literature, and thos= e of us on this list simply don't notice it since we already clearly un= derstand the concepts. =A0But without being provided specific examples of t= ext that a non-PKI expert might find confusing, it is difficult for us to j= udge whether this is a problem in PKIX documents that the WG needs to be mo= re careful about in future documents.

Dave


On 4/7/09 1:42 PM, "Jorge L=F3pez" <jlopez.ha@gmail.com> wrote:

=A0 =A0Hi all,

=A0 =A0Next I merely offer personal considerations about the (in my
=A0 =A0opinion) confusing scenario of PKI terminology classification. I =A0 =A0would appreciate any comment on this.

=A0 =A0As can be seen in the literature, most people define CRL,
=A0 =A0Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO,
=A0 =A0Certificate Revocation Status, Certificate Revocation Tree, etc. =A0 =A0as revocation schemes. I think this "classification" is c= onfusing.

=A0 =A0I personally consider a revocation scheme as a scheme/protocol
=A0 =A0where the owner (or an authorised party) is able to revocate the =A0 =A0status of her certificate. For example, the one defined in RFC
=A0 =A04210 CMP. However, the terms mentioned above relate to data
=A0 =A0structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make =A0 =A0that data structure available to others (Over-Issued CRL,
=A0 =A0Over-Issued Segmented CRL, etc.) and both the managed data
=A0 =A0structure and the associated publication mechanism (NOVOMODO,
=A0 =A0Certificate Revocation Tree, etc.). But none of them to the
=A0 =A0procedure to be followed in order to revocate the certificate! If =A0 =A0fact OCSP is sometimes referenced as a revocation scheme, when it =A0 =A0is actually focused on "just" checking the revocation sta= tus of a
=A0 =A0certificate...

=A0 =A0From my viewpoint, I would differentiate among the scheme, the
=A0 =A0certificate status information itself - CSI (data structure) - and<= br> =A0 =A0the method that distributes/publishes the CSI. A revocation scheme<= br> =A0 =A0updates the CSI. However, the publication/distribution method is =A0 =A0oriented to support the validation of certificates. IMHO it has
=A0 =A0nothing to do with a revocation scheme. Perhaps you may consider =A0 =A0appropiate to include in the term "revocation scheme" eve= rything
=A0 =A0that has something to do with the revocation information...

=A0 =A0Therefore, I distinguish a revocation scheme from another type of =A0 =A0scheme (validation scheme) which aim is to check the status of a =A0 =A0certificate taking into account the CSI. This CSI could be
=A0 =A0distributed/published by using one of the methods defined above, =A0 =A0or accessed in an online manner (an OCSP service that retrieves
=A0 =A0the CSI from a fresh database).

=A0 =A0I guess that the revocation scheme term has been extended to
=A0 =A0things not so related to the revocation itself, like the
=A0 =A0validation procedure. I just want to know what the PKI community =A0 =A0think about this.

=A0 =A0Thanks in advance,

=A0 =A0--------
=A0 =A0Jorge Lopez Hernandez-Ardieta



--001485f870603e3a0d04670c5b4e-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n38EJgLS002029 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 8 Apr 2009 07:19:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n38EJgBf002028; Wed, 8 Apr 2009 07:19:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n38EJec5002019 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 8 Apr 2009 07:19:41 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha2.nist.gov [129.6.16.198]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id n38EJhod001433; Wed, 8 Apr 2009 10:19:43 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id n38EJPD7029326; Wed, 8 Apr 2009 10:19:26 -0400 Message-ID: <49DCB26D.5050202@nist.gov> Date: Wed, 08 Apr 2009 10:19:25 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.21 (X11/20090330) MIME-Version: 1.0 To: =?ISO-8859-1?Q?Jorge_L=F3pez?= , Stefan Santesson CC: pkix Subject: Re: Revocation scheme definition References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 8bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan Santesson wrote: > Despite that I would love to put CSI expert on my business card, it > might be a bit problematic to hijack this acronym :) Yes, RFC 5513 points out the problem of the overuse of three letter acronyms (granted it is an April 1 RFC). If we used the acronym CSI, most people would tend to immediately think of the College of Southern Idaho ... I mean the College of Staten Island ... Computer Security Institute ... Construction Specifications Institute ... Commodity Systems Inc. ... Computers & Structures, Inc. ... Chi Sigma Iota ... Christian Schools International ... Computational Systems, Inc. ... Christian Solidarity International ... California Solar Initiative ... Canadian Solar Inc. ... Chandler Systems Inc. ... Communications Specialties, Inc. ... Cetacean Society International ... Coalition of Service Industries ... Church of South India ... Computer Society of India ... Cellular Specialties, Inc. ... College Student Insurance ... Custom Systems Integration ... Center for Social Innovation ... Center for Sustainable Innovation ... Creative Specialties International ... Control Sciences Inc. ... Conditional Symmetric Instability ... Community Services Infrastructure ... Coastal Studies Institute ... Curriculum Support Information ... Control Solutions International ... Conversion Services International ... Civil Society International ... Collaborative Software Initiative ... Consolidated Systems Incorporated ... Center for the Study of Intelligence ... Combat Studies Institute ... Coatings Societies International ... Chemical Sampling Information ... California Steel Industries ... Cardiovascular Systems Inc. ... Conservation Study Institute ... Cognitive Strategy Instruction ... Compliance Services International ... Cement Sustainability Initiative ... Cyber Safety Initiative ... Center for Student Involvement ... Center for the Study of Inequality ... Chiropractic Sports Institute ... Closure Systems International ... Custom Scientific Instruments ... Crisis Simulations International ... Cooperative Sagebrush Initiative ... Child Study Institute ... Climate Status Investigations ... Centrifugal Services, Inc. ... Conflict Solutions International ... Caregiver Services, Inc. ... Charter School Institute ... Component Sources International ... So I can understand that you would be concerned that if you referred to yourself as a CSI expert, people might think you meant that you were an expert in Computational Sciences and Informatics. > Other than that I feel sympathetic to your distinction between > revocation and validation. It is however my belief that we have used > that distinction in our standards efforts. I think it would be helpful if specific examples were provided of places in PKIX documents in which the distinction between mechanisms for distributing certificate status information (e.g., CRLs and OCSP) and mechanisms for submitting revocation requests (e.g., a CMP revocation request message) is not clear. Perhaps this confusion does appear in the literature, and those of us on this list simply don't notice it since we already clearly understand the concepts. But without being provided specific examples of text that a non-PKI expert might find confusing, it is difficult for us to judge whether this is a problem in PKIX documents that the WG needs to be more careful about in future documents. Dave > On 4/7/09 1:42 PM, "Jorge López" wrote: > > Hi all, > > Next I merely offer personal considerations about the (in my > opinion) confusing scenario of PKI terminology classification. I > would appreciate any comment on this. > > As can be seen in the literature, most people define CRL, > Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, > Certificate Revocation Status, Certificate Revocation Tree, etc. > as revocation schemes. I think this "classification" is confusing. > > I personally consider a revocation scheme as a scheme/protocol > where the owner (or an authorised party) is able to revocate the > status of her certificate. For example, the one defined in RFC > 4210 CMP. However, the terms mentioned above relate to data > structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make > that data structure available to others (Over-Issued CRL, > Over-Issued Segmented CRL, etc.) and both the managed data > structure and the associated publication mechanism (NOVOMODO, > Certificate Revocation Tree, etc.). But none of them to the > procedure to be followed in order to revocate the certificate! If > fact OCSP is sometimes referenced as a revocation scheme, when it > is actually focused on "just" checking the revocation status of a > certificate... > > From my viewpoint, I would differentiate among the scheme, the > certificate status information itself - CSI (data structure) - and > the method that distributes/publishes the CSI. A revocation scheme > updates the CSI. However, the publication/distribution method is > oriented to support the validation of certificates. IMHO it has > nothing to do with a revocation scheme. Perhaps you may consider > appropiate to include in the term "revocation scheme" everything > that has something to do with the revocation information... > > Therefore, I distinguish a revocation scheme from another type of > scheme (validation scheme) which aim is to check the status of a > certificate taking into account the CSI. This CSI could be > distributed/published by using one of the methods defined above, > or accessed in an online manner (an OCSP service that retrieves > the CSI from a fresh database). > > I guess that the revocation scheme term has been extended to > things not so related to the revocation itself, like the > validation procedure. I just want to know what the PKI community > think about this. > > Thanks in advance, > > -------- > Jorge Lopez Hernandez-Ardieta > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37N0bSH032608 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Apr 2009 16:00:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n37N0bBX032607; Tue, 7 Apr 2009 16:00:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37N0XGZ032599 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 7 Apr 2009 16:00:35 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 79598 invoked from network); 7 Apr 2009 23:00:42 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 7 Apr 2009 23:00:42 -0000 Received: (qmail 89598 invoked from network); 7 Apr 2009 23:00:32 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 7 Apr 2009 23:00:32 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 08 Apr 2009 01:00:29 +0200 Subject: Re: Revocation scheme definition From: Stefan Santesson To: Jorge =?ISO-8859-1?B?TPNwZXo=?= , Message-ID: Thread-Topic: Revocation scheme definition Thread-Index: Acm31KU9P6Updu1cdk2ECIQhTrzzMA== In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321997232_36557475" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321997232_36557475 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Jorge, Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :) Other than that I feel sympathetic to your distinction between revocation and validation. It is however my belief that we have used that distinction in our standards efforts. /Stefan On 4/7/09 1:42 PM, "Jorge L=F3pez" wrote: > Hi all, >=20 > Next I merely offer personal considerations about the (in my opinion) > confusing scenario of PKI terminology classification. I would appreciate = any > comment on this. >=20 > As can be seen in the literature, most people define CRL, Partitioned CRL= , > Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status= , > Certificate Revocation Tree, etc. as revocation schemes. I think this > "classification" is confusing. >=20 > I personally consider a revocation scheme as a scheme/protocol where the = owner > (or an authorised party) is able to revocate the status of her certificat= e. > For example, the one defined in RFC 4210 CMP. However, the terms mentione= d > above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechan= isms > to make that data structure available to others (Over-Issued CRL, Over-Is= sued > Segmented CRL, etc.) and both the managed data structure and the associat= ed > publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). But = none > of them to the procedure to be followed in order to revocate the certific= ate! > If fact OCSP is sometimes referenced as a revocation scheme, when it is > actually focused on "just" checking the revocation status of a certificat= e... >=20 > From my viewpoint, I would differentiate among the scheme, the certificat= e > status information itself - CSI (data structure) - and the method that > distributes/publishes the CSI. A revocation scheme updates the CSI. Howev= er, > the publication/distribution method is oriented to support the validation= of > certificates. IMHO it has nothing to do with a revocation scheme. Perhaps= you > may consider appropiate to include in the term "revocation scheme" everyt= hing > that has something to do with the revocation information... >=20 > Therefore, I distinguish a revocation scheme from another type of scheme > (validation scheme) which aim is to check the status of a certificate tak= ing > into account the CSI. This CSI could be distributed/published by using on= e of > the methods defined above, or accessed in an online manner (an OCSP servi= ce > that retrieves the CSI from a fresh database). >=20 > I guess that the revocation scheme term has been extended to things not s= o > related to the revocation itself, like the validation procedure. I just w= ant > to know what the PKI community think about this. >=20 > Thanks in advance, >=20 > -------- > Jorge Lopez Hernandez-Ardieta >=20 >=20 >=20 --B_3321997232_36557475 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: Revocation scheme definition Jorge,

Despite that I would love to put CSI expert on my business card, it might b= e a bit problematic to hijack this acronym :)

Other than that I feel sympathetic to your distinction between revocation a= nd validation. It is however my belief that we have used that distinction in= our standards efforts.

/Stefan



On 4/7/09 1:42 PM, "Jorge López" <jlopez.ha@gmail.com> wrote:

<= SPAN STYLE=3D'font-size:11pt'>Hi all,

Next I merely offer personal considerations about the (in my opinion) confu= sing scenario of PKI terminology classification. I would appreciate any comm= ent on this.

As can be seen in the literature, most people define CRL, Partitioned CRL, = Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status, C= ertificate Revocation Tree, etc. as revocation schemes. I think this "c= lassification" is confusing.

I personally consider a revocation scheme as a scheme/protocol where the ow= ner (or an authorised party) is able to revocate the status of her certifica= te. For example, the one defined in RFC 4210 CMP. However, the terms mention= ed above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechan= isms to make that data structure available to others (Over-Issued CRL, Over-= Issued Segmented CRL, etc.) and both the managed data structure and the asso= ciated publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). = But none of them to the procedure to be followed in order to revocate the ce= rtificate! If fact OCSP is sometimes referenced as a revocation scheme, when= it is actually focused on "just" checking the revocation status o= f a certificate...

>From my viewpoint, I would differentiate among the scheme, the certificate = status information itself - CSI (data structure) - and the method that distr= ibutes/publishes the CSI. A revocation scheme updates the CSI. However, the = publication/distribution method is oriented to support the validation of cer= tificates. IMHO it has nothing to do with a revocation scheme. Perhaps you m= ay consider appropiate to include in the term "revocation scheme" = everything that has something to do with the revocation information...

Therefore, I distinguish a revocation scheme from another type of scheme (v= alidation scheme) which aim is to check the status of a certificate taking i= nto account the CSI. This CSI could be distributed/published by using one of= the methods defined above, or accessed in an online manner (an OCSP service= that retrieves the CSI from a fresh database).

I guess that the revocation scheme term has been extended to things not so = related to the revocation itself, like the validation procedure. I just want= to know what the PKI community think about this.

Thanks in advance,

--------
Jorge Lopez Hernandez-Ardieta



--B_3321997232_36557475-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37MUGcJ031327 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Apr 2009 15:30:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n37MUG7Q031326; Tue, 7 Apr 2009 15:30:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37MU20C031313 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 7 Apr 2009 15:30:14 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 56805 invoked from network); 7 Apr 2009 22:30:10 -0000 Received: from s34.loopia.se (HELO s19.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 7 Apr 2009 22:30:10 -0000 Received: (qmail 81113 invoked from network); 7 Apr 2009 22:30:01 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s19.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 7 Apr 2009 22:30:01 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 08 Apr 2009 00:30:00 +0200 Subject: Re: - An HTML5 standard facility? From: Stefan Santesson To: Anders Rundgren , Message-ID: Thread-Topic: - An HTML5 standard facility? Thread-Index: Acm30GMSHwX2ItKBnkiyz/+2DbXauw== In-Reply-To: <51FB0BC2B15540E3BAC7C0464B479375@AndersPC> Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I find it a bit remarkable that they reference RFC 2459 for algorithm identifier OIDs Quote: "3. Let algorithm be an ASN.1 AlgorithmIdentifier structure as defined by RFC2459, with the algorithm field giving the ASN.1 OID used to identify signature algorithm, using the OIDs defined in section 7.2 ("Signature Algorithms") of RFC2459, and the parameters field set up as required by RFC2459 for AlgorithmIdentifier structures for that algorithm. [X690] [RFC2459]" It's a tiny bit more than slightly outdated... /Stefan On 4/7/09 10:13 PM, "Anders Rundgren" wrote: > > http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-element > > Since the PKI community at large seems to ignore the client-side of > PKI in browsers, the HTML 5 designers apparently didn't find any other > solution but adopting the 15 year old Netscape hack known as . > > It is indeed as said in this list very simple to use etc. However, > does it really match the needs of today? > > My guess FWIW, is that the serious users of on-line provisioning of PKI > which includes governments and banks in the EU, as well as the USPTO > will continue to use entirely proprietary solutions (mostly using Java), since > the browser-schemes are all-over-the-map and do not do signatures either. > > A few things to consider: > > How could a static tag in a page mark-up language match an API > or a protocol? > > Algorithm agility, isn't that a requirement these days? > > PIN-codes anybody? > > TPM - A dead duck? > > Anders > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37KDVSF023906 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Apr 2009 13:13:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n37KDUvp023905; Tue, 7 Apr 2009 13:13:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout1-sn1.fre.skanova.net (pne-smtpout1-sn1.fre.skanova.net [81.228.11.98]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37KDJow023890 for ; Tue, 7 Apr 2009 13:13:30 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout1-sn1.fre.skanova.net (7.3.129) id 49CCDA070016EFF6 for ietf-pkix@imc.org; Tue, 7 Apr 2009 22:13:18 +0200 Message-ID: <51FB0BC2B15540E3BAC7C0464B479375@AndersPC> From: "Anders Rundgren" To: Subject: - An HTML5 standard facility? Date: Tue, 7 Apr 2009 22:13:42 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: http://www.whatwg.org/specs/web-apps/current-work/#the-keygen-element Since the PKI community at large seems to ignore the client-side of PKI in browsers, the HTML 5 designers apparently didn't find any other solution but adopting the 15 year old Netscape hack known as . It is indeed as said in this list very simple to use etc. However, does it really match the needs of today? My guess FWIW, is that the serious users of on-line provisioning of PKI which includes governments and banks in the EU, as well as the USPTO will continue to use entirely proprietary solutions (mostly using Java), since the browser-schemes are all-over-the-map and do not do signatures either. A few things to consider: How could a static tag in a page mark-up language match an API or a protocol? Algorithm agility, isn't that a requirement these days? PIN-codes anybody? TPM - A dead duck? Anders Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37BgRTw086980 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 7 Apr 2009 04:42:27 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n37BgRZI086979; Tue, 7 Apr 2009 04:42:27 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from fk-out-0910.google.com (fk-out-0910.google.com [209.85.128.188]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37BgF3K086969 for ; Tue, 7 Apr 2009 04:42:26 -0700 (MST) (envelope-from jlopez.ha@gmail.com) Received: by fk-out-0910.google.com with SMTP id z23so1011352fkz.10 for ; Tue, 07 Apr 2009 04:42:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=PKhJJ8J5sTfCIau7F2q8jEXVtlpca+4TGqvvMtSvP/4=; b=aVqkxfFqzTfYeaMAfb1N+13IRDuLj/xN73Gjs9qgna70VwyONwtQ/wl7luZ2ksMzpt UIcnlaPPoPXypFvFUcNuQSr3hTx2KHSHjGn3fJ47TLc3uSlz6u2HSl8i9XchTQ37Wnrl fYNI6Eh3fXco+TY+CqT7JZl1yz+PH9qtLtFoY= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=XqjmjeODOGrHNggR+coN4gNl3Nm/t8UcMMGRhBf5Z+2oWxyufcMYGyyuRr99abwjRr xu5RBJgQaAtfSYis7vahJ7sESKjhJTAZ0Fu17eg6WG6urJw8lk0xgNT5c1l+q3gFYobK Jmmurmh8s4fJQ6/XcTo7vjTSozUyRFEblhPFU= MIME-Version: 1.0 Received: by 10.204.52.146 with SMTP id i18mr43796bkg.33.1239104534188; Tue, 07 Apr 2009 04:42:14 -0700 (PDT) Date: Tue, 7 Apr 2009 13:42:14 +0200 Message-ID: Subject: Revocation scheme definition From: =?ISO-8859-1?Q?Jorge_L=F3pez?= To: ietf-pkix@imc.org Content-Type: multipart/alternative; boundary=001636c5abdf9992780466f58195 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --001636c5abdf9992780466f58195 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Hi all, Next I merely offer personal considerations about the (in my opinion) confusing scenario of PKI terminology classification. I would appreciate any comment on this. As can be seen in the literature, most people define CRL, Partitioned CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Status, Certificate Revocation Tree, etc. as revocation schemes. I think this "classification" is confusing. I personally consider a revocation scheme as a scheme/protocol where the owner (or an authorised party) is able to revocate the status of her certificate. For example, the one defined in RFC 4210 CMP. However, the terms mentioned above relate to data structures (CRL, Partitioned CRL, Delta CRL), mechanisms to make that data structure available to others (Over-Issued CRL, Over-Issued Segmented CRL, etc.) and both the managed data structure and the associated publication mechanism (NOVOMODO, Certificate Revocation Tree, etc.). But none of them to the procedure to be followed in order to revocate the certificate! If fact OCSP is sometimes referenced as a revocation scheme, when it is actually focused on "just" checking the revocation status of a certificate... >From my viewpoint, I would differentiate among the scheme, the certificate status information itself - CSI (data structure) - and the method that distributes/publishes the CSI. A revocation scheme updates the CSI. However, the publication/distribution method is oriented to support the validation of certificates. IMHO it has nothing to do with a revocation scheme. Perhaps you may consider appropiate to include in the term "revocation scheme" everything that has something to do with the revocation information... Therefore, I distinguish a revocation scheme from another type of scheme (validation scheme) which aim is to check the status of a certificate taking into account the CSI. This CSI could be distributed/published by using one of the methods defined above, or accessed in an online manner (an OCSP service that retrieves the CSI from a fresh database). I guess that the revocation scheme term has been extended to things not so related to the revocation itself, like the validation procedure. I just want to know what the PKI community think about this. Thanks in advance, -------- Jorge Lopez Hernandez-Ardieta --001636c5abdf9992780466f58195 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Hi all,

Next I merely offer personal consider= ations about the (in my opinion) confusing scenario of PKI terminology clas= sification. I would appreciate any comment on this.

As can be seen in the literature, most people define CRL, Partitioned = CRL, Over-issued CRL, Delta CRL, OCSP, NOVOMODO, Certificate Revocation Sta= tus, Certificate Revocation Tree, etc. as revocation schemes. I think this = "classification" is confusing.

I personally consider a revocation scheme as a scheme/p= rotocol where the owner (or an authorised party) is able to revocate the st= atus of her certificate. For example, the one defined in RFC 4210 CMP. Howe= ver, the terms mentioned above relate to data structures (CRL, Partitioned = CRL, Delta CRL), mechanisms to make that data structure available to others= (Over-Issued CRL, Over-Issued Segmented CRL, etc.) and both the managed da= ta structure and the associated publication mechanism (NOVOMODO, Certificat= e Revocation Tree, etc.). But none of them to the procedure to be followed = in order to revocate the certificate! If fact OCSP is sometimes referenced = as a revocation scheme, when it is actually focused on "just" che= cking the revocation status of a certificate...

From my viewpoint, I would differentiate among the sche= me, the certificate status information itself - CSI (data structure) - and = the method that distributes/publishes the CSI. A revocation scheme updates = the CSI. However, the publication/distribution method is oriented to suppor= t the validation of certificates. IMHO it has nothing to do with a revocati= on scheme. Perhaps you may consider appropiate to include in the term "= ;revocation scheme" everything that has something to do with the revoc= ation information...

Therefore, I distinguish a revocation scheme from anoth= er type of scheme (validation scheme) which aim is to check the status of a= certificate taking into account the CSI. This CSI could be distributed/pub= lished by using one of the methods defined above, or accessed in an online = manner (an OCSP service that retrieves the CSI from a fresh database).

I guess that the revocation scheme term has been extend= ed to things not so related to the revocation itself, like the validation p= rocedure. I just want to know what the PKI community think about this.

Thanks in advance,

--------
Jorge Lopez Hernandez-Ardieta


--001636c5abdf9992780466f58195-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3731LgD057799 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 6 Apr 2009 20:01:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3731Kdu057795; Mon, 6 Apr 2009 20:01:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n37318b8057774 for ; Mon, 6 Apr 2009 20:01:20 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id E43A53A6A44; Mon, 6 Apr 2009 20:00:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-new-asn1-05.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090407030001.E43A53A6A44@core3.amsl.com> Date: Mon, 6 Apr 2009 20:00:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : New ASN.1 Modules for PKIX Author(s) : P. Hoffman, J. Schaad Filename : draft-ietf-pkix-new-asn1-05.txt Pages : 119 Date : 2009-04-06 The PKIX certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-new-asn1-05.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-new-asn1-05.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-06194515.I-D@ietf.org> --NextPart-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n36LG8fs041570 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 6 Apr 2009 14:16:08 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n36LG8mJ041568; Mon, 6 Apr 2009 14:16:08 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n36LG7a3041555 for ; Mon, 6 Apr 2009 14:16:07 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id 3CDA83A6CF6; Mon, 6 Apr 2009 14:15:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D Action:draft-ietf-pkix-new-asn1-04.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090406211501.3CDA83A6CF6@core3.amsl.com> Date: Mon, 6 Apr 2009 14:15:01 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : New ASN.1 Modules for PKIX Author(s) : P. Hoffman, J. Schaad Filename : draft-ietf-pkix-new-asn1-04.txt Pages : 119 Date : 2009-04-06 The PKIX certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-new-asn1-04.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-new-asn1-04.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-04-06141306.I-D@ietf.org> --NextPart-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n34HgJ24078091 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 4 Apr 2009 10:42:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n34HgJkO078090; Sat, 4 Apr 2009 10:42:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n34Hg72C078079 for ; Sat, 4 Apr 2009 10:42:18 -0700 (MST) (envelope-from housley@vigilsec.com) Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id 9F0589A473A; Sat, 4 Apr 2009 13:42:15 -0400 (EDT) X-Virus-Scanned: amavisd-new at smetech.net Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id 2IO64PLNo0t3; Sat, 4 Apr 2009 13:42:05 -0400 (EDT) Received: from THINKPADR52.vigilsec.com (pool-71-191-197-15.washdc.fios.verizon.net [71.191.197.15]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id 8B1D59A4725; Sat, 4 Apr 2009 13:42:14 -0400 (EDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sat, 04 Apr 2009 13:42:04 -0400 To: "Maxim Masiutin" , ietf-pkix@imc.org From: Russ Housley Subject: Re: A contradiction between RFC3852 and RFC3278 In-Reply-To: <68226881330328496@ritlabs.com> References: <68226881330328496@ritlabs.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Message-Id: <20090404174214.8B1D59A4725@odin.smetech.net> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Max: I do not read the text in 10.1.1 of RFC 3852 to mean that compound signature algorithm identifiers should not be used. Please take a look at section 12.2 of RFC 2630. RFC 2630 is the grandfather of RFC 3852, and it clearly uses id-dsa-with-sha1. Russ At 08:38 AM 3/13/2009, Maxim Masiutin wrote: >Hello Ietf-Pkix, > >I have found a contradiction between RFC3278 (and >draft-ietf-smime-3278bis-05.txt work in progress) and RFC3852. > >RFC3852 declares that the signatureAlgorithm in the SignerInfo >should not be a compound algorithm of a public key algorithm and a >hash function. Section 10.1.2 of RFC3852: "The >SignatureAlgorithmIdentifier type identifies a signature >algorithm. Examples include RSA, DSA, and ECDSA. A signature >algorithm supports signature generation and verification >operations. The signature generation operation uses the message >digest and the signer's private key to generate a signature value". >As specified in the RFC3852, the signature algorithm takes the >message digest, i.e. the result of a hash function specified in the >digestAlgorithm in the SignerInfo > > >RFC3278 (and bis) declares that signatureAlgorithm contains the >algorithm identifier ecdsa-with-SHA1 (bis also allows any other SHA >hash), i.e. assumes that the algorithm takes as an input the whole >message itself rather than the digest. It also tells that the >digestAlgorithm in the SignerInfo should also be a SHA hash. Maybe >it assumes that the SHA in digestAlgorithm should match SHA in >signatureAlgorithm, but it is not explicitly clarified. Thus, a >combination of ecdsa-with-SHA224 in signatureAlgorithm and >id-sha-512 in digestAlgorithm is not prohibited. > > >How can we resolve this contradiction of RFC3852 and RFC3278? > > > > >-- >Best regards, >Maxim Masiutin >Ritlabs SRL >http://www.ritlabs.com/ Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33I3LC4007963 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 11:03:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33I3LQa007961; Fri, 3 Apr 2009 11:03:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n33I3Axj007930 for ; Fri, 3 Apr 2009 11:03:20 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 9598 invoked from network); 3 Apr 2009 18:02:03 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 3 Apr 2009 18:02:03 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/related; boundary="----_=_NextPart_001_01C9B486.727F186D"; type="multipart/alternative" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: [x500standard] Re: Certificate definitions Date: Fri, 3 Apr 2009 14:03:09 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: [x500standard] Re: Certificate definitions Thread-Index: Acm0cYRI6tso9pQ0TuWLNAq+uDFxrwAE8a5A References: <3C35976D27EB42F590A0B142D903E7C7@ERA1> From: "Santosh Chokhani" To: , "ietf-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B486.727F186D Content-Type: multipart/alternative; boundary="----_=_NextPart_002_01C9B486.727F186D" ------_=_NextPart_002_01C9B486.727F186D Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable I did not respond before because I am not quite sure what purpose this = diagram serves and why we need it. =20 I have also read Russ's post and I agree with Russ (and with Denis on = one point). Unless some one views a PKC with SDA as an AC, AA = certificate is not a cross certificate. =20 I disagree with Denis on two of his comments. Good, bad or indifferent, = the diagram is saying that a PKC could be an Authority Certificate or an = EE certificate. The diagram is correct. The diagram says an attribute = certificate could be an authority certificate or an end entity = certificate. Again, the diagram is correct. =20 But, as I mentioned before, I lose forest for the trees here. I know = this started with the userCertificate directory attribute, but the = diagram may confuse people, may be misread, and without understanding = why precisely we need it, I do not see a need for it.=20 ________________________________ From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis Pinkas Sent: Friday, April 03, 2009 11:33 AM To: x500 list; ietf-pkix Subject: [x500standard] Re: Certificate definitions Eric, =20 Silence does not mean approval. =20 It may mean that the corrections are so numerous that it would take too = long to respond and that people do not have that time available at the moment. =20 e.g.: an End-entity attribute certificate is not linked to a = public-key certificate. a cross-certificate is not linked to an AA certificate. an Authority Certificate is not linked to an Attribute = Certificate. =20 This is only a start ... =20 Denis ----- Message re=E7u -----=20 De : owner-ietf-pkix=20 =C0 : x500standard,'PKIX'=20 Date : 2009-04-03, 17:00:01 Sujet : RE: [x500standard] Certificate definitions I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little = that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the = terminology and then produced below figure. I will not comment all the = boxes. =20 =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first = time in clause 7 as a public-key certificate. There are several other = places where it is a public-key certificate. In 15.5.2.4 is used in the = context of attribute certificates. The conclusion must be that an = end-entity certificate can either be a end-entity public-key certificate = or an end-entity attribute certificate. However, in most places, it is = implied that we only talks about public-key certificates. For veterans, = this is not a major problem, but new-comers may get confused. Anyway, I = thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to = use the term "certificate" as a synonym for "end-entrity public key = certificate". =20 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is = also used in X.511. RFC 5280 uses the term once without differenting it = from just "certificate". =20 The term "cross-certificate" should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 "end-entity public-key certificate" "user certictate" as a synonym for "end-entity public-key certificate" "end-entity attrubute certificate" =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attrubute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------_=_NextPart_002_01C9B486.727F186D Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
I did not = respond before=20 because I am not quite sure what purpose this diagram serves and why we = need=20 it.
 
I have also = read Russ's=20 post and I agree with Russ (and with Denis on one point).  Unless = some one=20 views a PKC with SDA as an AC,  AA certificate is not a cross=20 certificate.
 
I disagree = with Denis on=20 two of his comments.  Good, bad or indifferent, the diagram is = saying that=20 a PKC could be an Authority Certificate or an EE certificate.  The = diagram=20 is correct.  The diagram says an attribute certificate could be an=20 authority certificate or an end entity certificate.  Again, the = diagram is=20 correct.
 
But, as I = mentioned=20 before, I lose forest for the trees here.  I know this started with = the=20 userCertificate  directory attribute, but the diagram may confuse = people,=20 may be misread, and without understanding why precisely we need it, I do = not see=20 a need for it.
From: x500standard-bounce@freelists.org=20 [mailto:x500standard-bounce@freelists.org] On Behalf Of Denis=20 Pinkas
Sent: Friday, April 03, 2009 11:33 AM
To: = x500 list;=20 ietf-pkix
Subject: [x500standard] Re: Certificate=20 definitions

Eric,
 
Silence does not mean approval.
 
It may mean that the corrections are so numerous that = it would=20 take too long to respond
and that people do not have that time available at the = moment.
 
e.g.:  an End-entity attribute certificate is not linked to = a=20 public-key certificate.
         a = cross-certificate is=20 not linked to an AA certificate.
         an Authority = Certificate=20 is not linked to an Attribute Certificate.
 
This is only a start ...
 
Denis
-----=20 Message re=E7u -----
De=20 : owner-ietf-pkix=20
=C0=20 : x500standard,'PKIX'=20
Date=20 : 2009-04-03, 17:00:01
Sujet=20 : RE: [x500standard] Certificate definitions

I take=20 silence as approval.

 

Erik=20 Andersen

Andersen's=20 L-Service

Elsevej = 48, DK-3500=20 Vaerloese

Denmark

Mobile:=20 +45 2097 1490

email:=20 era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original=20 Message-----
From:=20 x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org]=20 On Behalf Of Erik=20 Andersen
Sent: 1. = april=20 2009 14:40
To: = Directory=20 list; PKIX
Subject:=20 [x500standard] Certificate definitions

 

Hi

 

I got a = number of=20 responses on user certificates, but quite little that actually = answered my=20 question.

 

I have = tried to dig a=20 little bit more in X.509 to get hold of the terminology and then = produced=20 below figure. I will not comment all the boxes.

 

 

I will = like you to=20 comments as to the correctness of above figure.

 

The = end-entity=20 certificate is not defined in the definition clause. However it is = used=20 widely in the main text. It is mentioned the first time in clause 7 = as a=20 public-key certificate. There are several other places where it is a = public-key certificate. In 15.5.2.4 is used in the context of = attribute=20 certificates. The conclusion must be that an end-entity certificate = can=20 either be a end-entity public-key certificate or an end-entity = attribute=20 certificate. However, in most places, it is implied that we only = talks about=20 public-key certificates. For veterans, this is not a major problem, = but=20 new-comers may get confused. Anyway, I thing our specifications = should be=20 clear and not subject to interpretation. RFC 5280 does not use the = term at=20 all. It seems just to use the term =93certificate=94 as a synonym = for=20 =93end-entrity public key certificate=94.

 

The = =93User=20 Certificate=94  is not defined in X.509, but is wide used. It = seems to be=20 a synonym for =93end-entrity public key certificate=94. It is also = used in=20 X.511. RFC 5280 uses the term once without differenting it from just = =93certificate=94.

 

The term=20 =93cross-certificate=94 should probably also be = qualified.

 

I suggest = to add in=20 X.509 definitions for:

 

=93end-entity=20 public-key certificate=94

=93user = certictate=94 as=20 a synonym for =93end-entity public-key = certificate=94

=93end-entity attrubute=20 certificate=94

 

The X.509 = text should=20 be updated to make use of these definitions.

 

X.509 has = four=20 attribute types for holding certificates.

 

UserCertificate: For=20 end-entity public-key certificates

cAcertificate: For CA=20 certificates

attributeCertificateAttribute: For end-entity attrubute = certificates

aACertificate: For AA=20 Certificates

 

Any=20 comments?

 

Erik = Andersen

Andersen's=20 L-Service

Elsevej 48, DK-3500=20 Vaerloese

Denmark

Mobile: = +45 2097=20 1490

email:=20 era@x500.eu

www.x500.eu

www.x500standard.com

 

------_=_NextPart_002_01C9B486.727F186D-- ------_=_NextPart_001_01C9B486.727F186D Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: <891535417@03042009-1B89> Content-Description: image001.gif Content-Location: image001.gif R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------_=_NextPart_001_01C9B486.727F186D-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33GcPJ6002593 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 09:38:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33GcP34002592; Fri, 3 Apr 2009 09:38:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33GcOw4002586 for ; Fri, 3 Apr 2009 09:38:25 -0700 (MST) (envelope-from housley@vigilsec.com) Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id B66C4F24001; Fri, 3 Apr 2009 12:38:38 -0400 (EDT) X-Virus-Scanned: amavisd-new at smetech.net Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id SQ4Q9yi+P+yV; Fri, 3 Apr 2009 12:38:23 -0400 (EDT) Received: from THINKPADR52.vigilsec.com (pool-71-191-197-15.washdc.fios.verizon.net [71.191.197.15]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id A07DA9A4725; Fri, 3 Apr 2009 12:38:37 -0400 (EDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 03 Apr 2009 12:38:15 -0400 To: "Erik Andersen" , , "'PKIX'" From: Russ Housley Subject: RE: [x500standard] Certificate definitions In-Reply-To: <3C35976D27EB42F590A0B142D903E7C7@ERA1> References: <1C740690094340D3B49DADD21AD98606@ERA1> <3C35976D27EB42F590A0B142D903E7C7@ERA1> Mime-Version: 1.0 Content-Type: multipart/related; type="text/html"; boundary="=====================_180813421==.REL" Message-Id: <20090403163837.A07DA9A4725@odin.smetech.net> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --=====================_180813421==.REL Content-Type: text/html; charset="us-ascii" I'm a pit strapped for time right noe, but just looking at your picture, I see something that causes pause.  An AA certificate issues a Cross-Certificate?  That does not seem right.

Russ


At 11:00 AM 4/3/2009, Erik Andersen wrote:
I take silence as approval.
 
Erik Andersen
Andersen's L-Service
Elsevej 48, DK-3500 Vaerloese
Denmark
Mobile: +45 2097 1490
email: era@x500.eu
www.x500.eu
www.x500standard.com
 
-----Original Message-----
From: x500standard-bounce@freelists.org [ mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen
Sent: 1. april 2009 14:40
To: Directory list; PKIX
Subject: [x500standard] Certificate definitions
 
Hi
 
I got a number of responses on user certificates, but quite little that actually answered my question.
 
I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes.
 
[]

 
I will like you to comments as to the correctness of above figure.
 
The end-entity certificate is not defined in the definition clause. However it is used widely in the main text. It is mentioned the first time in clause 7 as a public-key certificate. There are several other places where it is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should be clear and not subject to interpretation. RFC 5280 does not use the term at all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.
 
The “User Certificate”  is not defined in X.509, but is wide used. It seems to be a synonym for “end-entrity public key certificate”. It is also used in X.511. RFC 5280 uses the term once without differenting it from just “certificate”.
 
The term “cross-certificate” should probably also be qualified.
 
I suggest to add in X.509 definitions for:
 
“end-entity public-key certificate”
“user certictate” as a synonym for “end-entity public-key certificate”
“end-entity attrubute certificate”
 
The X.509 text should be updated to make use of these definitions.
 
X.509 has four attribute types for holding certificates.
 
UserCertificate: For end-entity public-key certificates
cAcertificate: For CA certificates
attributeCertificateAttribute: For end-entity attrubute certificates
aACertificate: For AA Certificates
 
Any comments?
 
Erik Andersen
Andersen's L-Service
Elsevej 48, DK-3500 Vaerloese
Denmark
Mobile: +45 2097 1490
email: era@x500.eu
www.x500.eu
www.x500standard.com
 

--=====================_180813421==.REL Content-Type: application/octet-stream; name="ac6e364.gif" Content-ID: <7.1.0.9.2.20090403123646.097cc350@vigilsec.com.1> Content-Transfer-Encoding: base64 Content-Disposition: inline; filename="ac6e364.gif" R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 --=====================_180813421==.REL-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33FX1OL096954 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 08:33:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33FX1Z3096953; Fri, 3 Apr 2009 08:33:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33FWmwW096896 for ; Fri, 3 Apr 2009 08:33:00 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-001.frcl.bull.fr [129.184.87.31]) by odin2.bull.net (Bull S.A.) with ESMTP id DD8F87891; Fri, 3 Apr 2009 17:31:33 +0200 (CEST) Received: from FRCLS4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2009040317330199:400124 ; Fri, 3 Apr 2009 17:33:01 +0200 Reply-To: denis.pinkas@bull.net From: "Denis Pinkas" To: "x500 list", "ietf-pkix" Subject: RE: [x500standard] Certificate definitions Date: Fri, 3 Apr 2009 17:33:01 +0200 Message-Id: References: <3C35976D27EB42F590A0B142D903E7C7@ERA1> MIME-Version: 1.0 X-Priority: 3 (Normal) X-Mailer: DreamMail 4.4.1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 03/04/2009 17:33:02, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 03/04/2009 17:33:02 Content-Type: multipart/related; boundary="----=_NextPart_09040317330148873280414_001" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: ------=_NextPart_09040317330148873280414_001 Content-Type: multipart/alternative; boundary="----=_NextPart_09040317330148873280414_002" ------=_NextPart_09040317330148873280414_002 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: base64 RXJpYywNCg0KU2lsZW5jZSBkb2VzIG5vdCBtZWFuIGFwcHJvdmFsLg0KDQpJdCBtYXkgbWVhbiB0 aGF0IHRoZSBjb3JyZWN0aW9ucyBhcmUgc28gbnVtZXJvdXMgdGhhdCBpdCB3b3VsZCB0YWtlIHRv byBsb25nIHRvIHJlc3BvbmQNCmFuZCB0aGF0IHBlb3BsZSBkbyBub3QgaGF2ZSB0aGF0IHRpbWUg YXZhaWxhYmxlIGF0IHRoZSBtb21lbnQuDQoNCmUuZy46ICBhbiBFbmQtZW50aXR5IGF0dHJpYnV0 ZSBjZXJ0aWZpY2F0ZSBpcyBub3QgbGlua2VkIHRvIGEgcHVibGljLWtleSBjZXJ0aWZpY2F0ZS4N CiAgICAgICAgIGEgY3Jvc3MtY2VydGlmaWNhdGUgaXMgbm90IGxpbmtlZCB0byBhbiBBQSBjZXJ0 aWZpY2F0ZS4NCiAgICAgICAgIGFuIEF1dGhvcml0eSBDZXJ0aWZpY2F0ZSBpcyBub3QgbGlua2Vk IHRvIGFuIEF0dHJpYnV0ZSBDZXJ0aWZpY2F0ZS4NCg0KVGhpcyBpcyBvbmx5IGEgc3RhcnQgLi4u DQoNCkRlbmlzDQotLS0tLSBNZXNzYWdlIHJl53UgLS0tLS0gDQpEZSA6IG93bmVyLWlldGYtcGtp eCANCsAgOiB4NTAwc3RhbmRhcmQsJ1BLSVgnIA0KRGF0ZSA6IDIwMDktMDQtMDMsIDE3OjAwOjAx DQpTdWpldCA6IFJFOiBbeDUwMHN0YW5kYXJkXSBDZXJ0aWZpY2F0ZSBkZWZpbml0aW9ucw0KDQoN CkkgdGFrZSBzaWxlbmNlIGFzIGFwcHJvdmFsLg0KDQpFcmlrIEFuZGVyc2VuDQpBbmRlcnNlbidz IEwtU2VydmljZQ0KRWxzZXZlaiA0OCwgREstMzUwMCBWYWVybG9lc2UNCkRlbm1hcmsNCk1vYmls ZTogKzQ1IDIwOTcgMTQ5MA0KZW1haWw6IGVyYUB4NTAwLmV1DQp3d3cueDUwMC5ldQ0Kd3d3Lng1 MDBzdGFuZGFyZC5jb20NCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IHg1MDBz dGFuZGFyZC1ib3VuY2VAZnJlZWxpc3RzLm9yZyBbbWFpbHRvOng1MDBzdGFuZGFyZC1ib3VuY2VA ZnJlZWxpc3RzLm9yZ10gT24gQmVoYWxmIE9mIEVyaWsgQW5kZXJzZW4NClNlbnQ6IDEuIGFwcmls IDIwMDkgMTQ6NDANClRvOiBEaXJlY3RvcnkgbGlzdDsgUEtJWA0KU3ViamVjdDogW3g1MDBzdGFu ZGFyZF0gQ2VydGlmaWNhdGUgZGVmaW5pdGlvbnMNCg0KSGkNCg0KSSBnb3QgYSBudW1iZXIgb2Yg cmVzcG9uc2VzIG9uIHVzZXIgY2VydGlmaWNhdGVzLCBidXQgcXVpdGUgbGl0dGxlIHRoYXQgYWN0 dWFsbHkgYW5zd2VyZWQgbXkgcXVlc3Rpb24uDQoNCkkgaGF2ZSB0cmllZCB0byBkaWcgYSBsaXR0 bGUgYml0IG1vcmUgaW4gWC41MDkgdG8gZ2V0IGhvbGQgb2YgdGhlIHRlcm1pbm9sb2d5IGFuZCB0 aGVuIHByb2R1Y2VkIGJlbG93IGZpZ3VyZS4gSSB3aWxsIG5vdCBjb21tZW50IGFsbCB0aGUgYm94 ZXMuDQoNCg0KDQpJIHdpbGwgbGlrZSB5b3UgdG8gY29tbWVudHMgYXMgdG8gdGhlIGNvcnJlY3Ru ZXNzIG9mIGFib3ZlIGZpZ3VyZS4NCg0KVGhlIGVuZC1lbnRpdHkgY2VydGlmaWNhdGUgaXMgbm90 IGRlZmluZWQgaW4gdGhlIGRlZmluaXRpb24gY2xhdXNlLiBIb3dldmVyIGl0IGlzIHVzZWQgd2lk ZWx5IGluIHRoZSBtYWluIHRleHQuIEl0IGlzIG1lbnRpb25lZCB0aGUgZmlyc3QgdGltZSBpbiBj bGF1c2UgNyBhcyBhIHB1YmxpYy1rZXkgY2VydGlmaWNhdGUuIFRoZXJlIGFyZSBzZXZlcmFsIG90 aGVyIHBsYWNlcyB3aGVyZSBpdCBpcyBhIHB1YmxpYy1rZXkgY2VydGlmaWNhdGUuIEluIDE1LjUu Mi40IGlzIHVzZWQgaW4gdGhlIGNvbnRleHQgb2YgYXR0cmlidXRlIGNlcnRpZmljYXRlcy4gVGhl IGNvbmNsdXNpb24gbXVzdCBiZSB0aGF0IGFuIGVuZC1lbnRpdHkgY2VydGlmaWNhdGUgY2FuIGVp dGhlciBiZSBhIGVuZC1lbnRpdHkgcHVibGljLWtleSBjZXJ0aWZpY2F0ZSBvciBhbiBlbmQtZW50 aXR5IGF0dHJpYnV0ZSBjZXJ0aWZpY2F0ZS4gSG93ZXZlciwgaW4gbW9zdCBwbGFjZXMsIGl0IGlz IGltcGxpZWQgdGhhdCB3ZSBvbmx5IHRhbGtzIGFib3V0IHB1YmxpYy1rZXkgY2VydGlmaWNhdGVz LiBGb3IgdmV0ZXJhbnMsIHRoaXMgaXMgbm90IGEgbWFqb3IgcHJvYmxlbSwgYnV0IG5ldy1jb21l cnMgbWF5IGdldCBjb25mdXNlZC4gQW55d2F5LCBJIHRoaW5nIG91ciBzcGVjaWZpY2F0aW9ucyBz aG91bGQgYmUgY2xlYXIgYW5kIG5vdCBzdWJqZWN0IHRvIGludGVycHJldGF0aW9uLiBSRkMgNTI4 MCBkb2VzIG5vdCB1c2UgdGhlIHRlcm0gYXQgYWxsLiBJdCBzZWVtcyBqdXN0IHRvIHVzZSB0aGUg dGVybSCTY2VydGlmaWNhdGWUIGFzIGEgc3lub255bSBmb3Igk2VuZC1lbnRyaXR5IHB1YmxpYyBr ZXkgY2VydGlmaWNhdGWULg0KDQpUaGUgk1VzZXIgQ2VydGlmaWNhdGWUICBpcyBub3QgZGVmaW5l ZCBpbiBYLjUwOSwgYnV0IGlzIHdpZGUgdXNlZC4gSXQgc2VlbXMgdG8gYmUgYSBzeW5vbnltIGZv ciCTZW5kLWVudHJpdHkgcHVibGljIGtleSBjZXJ0aWZpY2F0ZZQuIEl0IGlzIGFsc28gdXNlZCBp biBYLjUxMS4gUkZDIDUyODAgdXNlcyB0aGUgdGVybSBvbmNlIHdpdGhvdXQgZGlmZmVyZW50aW5n IGl0IGZyb20ganVzdCCTY2VydGlmaWNhdGWULg0KDQpUaGUgdGVybSCTY3Jvc3MtY2VydGlmaWNh dGWUIHNob3VsZCBwcm9iYWJseSBhbHNvIGJlIHF1YWxpZmllZC4NCg0KSSBzdWdnZXN0IHRvIGFk ZCBpbiBYLjUwOSBkZWZpbml0aW9ucyBmb3I6DQoNCpNlbmQtZW50aXR5IHB1YmxpYy1rZXkgY2Vy dGlmaWNhdGWUDQqTdXNlciBjZXJ0aWN0YXRllCBhcyBhIHN5bm9ueW0gZm9yIJNlbmQtZW50aXR5 IHB1YmxpYy1rZXkgY2VydGlmaWNhdGWUDQqTZW5kLWVudGl0eSBhdHRydWJ1dGUgY2VydGlmaWNh dGWUDQoNClRoZSBYLjUwOSB0ZXh0IHNob3VsZCBiZSB1cGRhdGVkIHRvIG1ha2UgdXNlIG9mIHRo ZXNlIGRlZmluaXRpb25zLg0KDQpYLjUwOSBoYXMgZm91ciBhdHRyaWJ1dGUgdHlwZXMgZm9yIGhv bGRpbmcgY2VydGlmaWNhdGVzLg0KDQpVc2VyQ2VydGlmaWNhdGU6IEZvciBlbmQtZW50aXR5IHB1 YmxpYy1rZXkgY2VydGlmaWNhdGVzDQpjQWNlcnRpZmljYXRlOiBGb3IgQ0EgY2VydGlmaWNhdGVz DQphdHRyaWJ1dGVDZXJ0aWZpY2F0ZUF0dHJpYnV0ZTogRm9yIGVuZC1lbnRpdHkgYXR0cnVidXRl IGNlcnRpZmljYXRlcw0KYUFDZXJ0aWZpY2F0ZTogRm9yIEFBIENlcnRpZmljYXRlcw0KDQpBbnkg Y29tbWVudHM/DQoNCkVyaWsgQW5kZXJzZW4NCkFuZGVyc2VuJ3MgTC1TZXJ2aWNlDQpFbHNldmVq IDQ4LCBESy0zNTAwIFZhZXJsb2VzZQ0KRGVubWFyaw0KTW9iaWxlOiArNDUgMjA5NyAxNDkwDQpl bWFpbDogZXJhQHg1MDAuZXUNCnd3dy54NTAwLmV1DQp3d3cueDUwMHN0YW5kYXJkLmNvbQ0K ------=_NextPart_09040317330148873280414_002 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: base64 PEhUTUw+PEhFQUQ+PFRJVExFPjwvVElUTEU+DQo8TUVUQSBjb250ZW50PSJLc0RIVE1MRURMaWIu b2N4LCBGcmVlV2FyZSBIVE1MIEVkaXRvciAxLjE2NC4yLCCpIEt1cnQgU2VuZmVyIiANCm5hbWU9 R0VORVJBVE9SPg0KPFNUWUxFPg0KPCEtLQ0KIC8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCiBAZm9u dC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkhlbHZldGljYTsNCglwYW5vc2UtMToyIDExIDYgNCAyIDIg MiAyIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OlRpbWVzOw0KCXBhbm9zZS0xOjIg MiA2IDMgNSA0IDUgMiAzIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseTpUYWhvbWE7DQoJ cGFub3NlLTE6MiAxMSA2IDQgMyA1IDQgNCAyIDQ7fQ0KIC8qIFN0eWxlIERlZmluaXRpb25zICov DQogcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGNt Ow0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFt aWx5OiJUaW1lcyBOZXcgUm9tYW4iO30NCmgzDQoJe21hcmdpbi10b3A6OS4wNXB0Ow0KCW1hcmdp bi1yaWdodDowY207DQoJbWFyZ2luLWJvdHRvbTo2LjBwdDsNCgltYXJnaW4tbGVmdDowY207DQoJ dGV4dC1hbGlnbjpqdXN0aWZ5Ow0KCXBhZ2UtYnJlYWstYWZ0ZXI6YXZvaWQ7DQoJZm9udC1zaXpl OjEwLjBwdDsNCglmb250LWZhbWlseTpUaW1lczt9DQpwLk1zb1RvYzQsIGxpLk1zb1RvYzQsIGRp di5Nc29Ub2M0DQoJe21hcmdpbi10b3A6MGNtOw0KCW1hcmdpbi1yaWdodDowY207DQoJbWFyZ2lu LWJvdHRvbTowY207DQoJbWFyZ2luLWxlZnQ6ODcuOXB0Ow0KCW1hcmdpbi1ib3R0b206LjAwMDFw dDsNCgl0ZXh0LWFsaWduOmp1c3RpZnk7DQoJdGV4dC1pbmRlbnQ6LTQ1LjM1cHQ7DQoJZm9udC1z aXplOjEwLjBwdDsNCglmb250LWZhbWlseToiVGltZXMgTmV3IFJvbWFuIjt9DQpwLk1zb1RvYzUs IGxpLk1zb1RvYzUsIGRpdi5Nc29Ub2M1DQoJe21hcmdpbi10b3A6MGNtOw0KCW1hcmdpbi1yaWdo dDowY207DQoJbWFyZ2luLWJvdHRvbTowY207DQoJbWFyZ2luLWxlZnQ6NDguMHB0Ow0KCW1hcmdp bi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1l cyBOZXcgUm9tYW4iO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7Y29sb3I6Ymx1ZTsN Cgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxp bmtGb2xsb3dlZA0KCXtjb2xvcjpwdXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9 DQpwLk1zb0F1dG9TaWcsIGxpLk1zb0F1dG9TaWcsIGRpdi5Nc29BdXRvU2lnDQoJe21hcmdpbjow Y207DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1m YW1pbHk6IlRpbWVzIE5ldyBSb21hbiI7fQ0KcC5BU04xLCBsaS5BU04xLCBkaXYuQVNOMQ0KCXtt YXJnaW4tdG9wOjYuOHB0Ow0KCW1hcmdpbi1yaWdodDowY207DQoJbWFyZ2luLWJvdHRvbTowY207 DQoJbWFyZ2luLWxlZnQ6MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglwdW5jdHVhdGlv bi13cmFwOnNpbXBsZTsNCgl0ZXh0LWF1dG9zcGFjZTpub25lOw0KCWZvbnQtc2l6ZTo5LjBwdDsN Cglmb250LWZhbWlseTpIZWx2ZXRpY2E7DQoJZm9udC13ZWlnaHQ6Ym9sZDt9DQpwLmFzbjEwLCBs aS5hc24xMCwgZGl2LmFzbjEwDQoJe21hcmdpbi10b3A6Ni44cHQ7DQoJbWFyZ2luLXJpZ2h0OjBj bTsNCgltYXJnaW4tYm90dG9tOjBjbTsNCgltYXJnaW4tbGVmdDowY207DQoJbWFyZ2luLWJvdHRv bTouMDAwMXB0Ow0KCXB1bmN0dWF0aW9uLXdyYXA6c2ltcGxlOw0KCXRleHQtYXV0b3NwYWNlOm5v bmU7DQoJZm9udC1zaXplOjkuMHB0Ow0KCWZvbnQtZmFtaWx5OkhlbHZldGljYTsNCglmb250LXdl aWdodDpib2xkO30NCnNwYW4uZW1haWxzdHlsZTIxDQoJe2ZvbnQtZmFtaWx5OkFyaWFsOw0KCWNv bG9yOndpbmRvd3RleHQ7fQ0Kc3Bhbi5FbWFpbFN0eWxlMjMNCgl7Zm9udC1mYW1pbHk6QXJpYWw7 DQoJY29sb3I6bmF2eTt9DQpAcGFnZSBTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBwdDsN CgltYXJnaW46NzIuMHB0IDkwLjBwdCA3Mi4wcHQgOTAuMHB0O30NCmRpdi5TZWN0aW9uMQ0KCXtw YWdlOlNlY3Rpb24xO30NCi0tPg0KPC9TVFlMRT4NCg0KPE1FVEEgaHR0cC1lcXVpdj1Db250ZW50 LVR5cGUgY29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PWlzby04ODU5LTEiPjwvSEVBRD4NCjxC T0RZIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBUYWhvbWEiIGxlZnRNYXJn aW49NSB0b3BNYXJnaW49NSANCiNmZmZmZmY+DQo8RElWPkVyaWMsPC9ESVY+DQo8RElWPiZuYnNw OzwvRElWPg0KPERJVj5TaWxlbmNlIGRvZXMgbm90IG1lYW4gYXBwcm92YWwuPC9ESVY+DQo8RElW PiZuYnNwOzwvRElWPg0KPERJVj5JdCBtYXkgbWVhbiZuYnNwO3RoYXQgdGhlIGNvcnJlY3Rpb25z IGFyZSZuYnNwO3NvIG51bWVyb3VzIHRoYXQgaXQgd291bGQgDQp0YWtlIHRvbyBsb25nIHRvIHJl c3BvbmQ8L0RJVj4NCjxESVY+YW5kIHRoYXQgcGVvcGxlIGRvIG5vdCBoYXZlIHRoYXQgdGltZSBh dmFpbGFibGUgYXQgdGhlIG1vbWVudC48L0RJVj4NCjxESVY+Jm5ic3A7PC9ESVY+DQo8RElWPmUu Zy46Jm5ic3A7IGFuIEVuZC1lbnRpdHkgYXR0cmlidXRlIGNlcnRpZmljYXRlIGlzIG5vdCBsaW5r ZWQgdG8gYSANCnB1YmxpYy1rZXkgY2VydGlmaWNhdGUuPC9ESVY+DQo8RElWPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyBhIGNyb3NzLWNlcnRpZmljYXRl IGlzIG5vdCANCmxpbmtlZCB0byBhbiBBQSBjZXJ0aWZpY2F0ZS48L0RJVj4NCjxESVY+Jm5ic3A7 Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IGFuIEF1dGhvcml0eSBD ZXJ0aWZpY2F0ZSANCmlzIG5vdCBsaW5rZWQgdG8gYW4gQXR0cmlidXRlIENlcnRpZmljYXRlLjwv RElWPg0KPERJVj4mbmJzcDs8L0RJVj4NCjxESVY+VGhpcyBpcyBvbmx5Jm5ic3A7YSBzdGFydCAu Li48L0RJVj4NCjxESVY+Jm5ic3A7PC9ESVY+DQo8RElWPkRlbmlzPC9ESVY+DQo8QkxPQ0tRVU9U RSANCnN0eWxlPSJQQURESU5HLVJJR0hUOiAwcHg7IFBBRERJTkctTEVGVDogNXB4OyBNQVJHSU4t TEVGVDogNXB4OyBCT1JERVItTEVGVDogIzAwMDAwMCAycHggc29saWQ7IE1BUkdJTi1SSUdIVDog MHB4Ij4NCiAgPERJViANCiAgc3R5bGU9IkZPTlQtV0VJR0hUOiBub3JtYWw7IEZPTlQtU0laRTog OXB0OyBMSU5FLUhFSUdIVDogbm9ybWFsOyBGT05ULVNUWUxFOiBub3JtYWw7IEZPTlQtVkFSSUFO VDogbm9ybWFsIj4tLS0tLSANCiAgTWVzc2FnZSByZed1IC0tLS0tIDwvRElWPg0KICA8RElWIA0K ICBzdHlsZT0iRk9OVC1XRUlHSFQ6IG5vcm1hbDsgRk9OVC1TSVpFOiA5cHQ7IEJBQ0tHUk9VTkQ6 ICNlNGU0ZTQ7IExJTkUtSEVJR0hUOiBub3JtYWw7IEZPTlQtU1RZTEU6IG5vcm1hbDsgRk9OVC1W QVJJQU5UOiBub3JtYWw7IGZvbnQtY29sb3I6IGJsYWNrIj48Qj5EZSANCiAgOjwvQj4gPEEgaHJl Zj0ibWFpbHRvIDpvd25lci1pZXRmLXBraXhAbWFpbC5pbWMub3JnIj5vd25lci1pZXRmLXBraXg8 L0E+IA0KPC9ESVY+DQogIDxESVYgDQogIHN0eWxlPSJGT05ULVdFSUdIVDogbm9ybWFsOyBGT05U LVNJWkU6IDlwdDsgTElORS1IRUlHSFQ6IG5vcm1hbDsgRk9OVC1TVFlMRTogbm9ybWFsOyBGT05U LVZBUklBTlQ6IG5vcm1hbCI+PEI+wCANCiAgOjwvQj4gPEEgDQogIGhyZWY9Im1haWx0byA6eDUw MHN0YW5kYXJkQGZyZWVsaXN0cy5vcmcsaWV0Zi1wa2l4QGltYy5vcmciPng1MDBzdGFuZGFyZCwn UEtJWCc8L0E+IA0KICA8L0RJVj4NCiAgPERJViANCiAgc3R5bGU9IkZPTlQtV0VJR0hUOiBub3Jt YWw7IEZPTlQtU0laRTogOXB0OyBMSU5FLUhFSUdIVDogbm9ybWFsOyBGT05ULVNUWUxFOiBub3Jt YWw7IEZPTlQtVkFSSUFOVDogbm9ybWFsIj48Qj5EYXRlIA0KICA6PC9CPiAyMDA5LTA0LTAzLCAx NzowMDowMTwvRElWPg0KICA8RElWIA0KICBzdHlsZT0iRk9OVC1XRUlHSFQ6IG5vcm1hbDsgRk9O VC1TSVpFOiA5cHQ7IExJTkUtSEVJR0hUOiBub3JtYWw7IEZPTlQtU1RZTEU6IG5vcm1hbDsgRk9O VC1WQVJJQU5UOiBub3JtYWwiPjxCPlN1amV0IA0KICA6PC9CPiBSRTogW3g1MDBzdGFuZGFyZF0g Q2VydGlmaWNhdGUgZGVmaW5pdGlvbnM8L0RJVj4NCiAgPERJVj48QlI+PC9ESVY+DQogIDxESVY+ PC9ESVY+DQogIDxESVY+PC9ESVY+DQogIDxESVY+DQogIDxESVYgY2xhc3M9U2VjdGlvbjE+DQog IDxQIGNsYXNzPU1zb05vcm1hbD48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6ZT0yPjxT UEFOIGxhbmc9RU4tR0IgDQogIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IENPTE9SOiBuYXZ5OyBG T05ULUZBTUlMWTogQXJpYWwiPkkgdGFrZSBzaWxlbmNlIGFzIA0KICBhcHByb3ZhbC48L1NQQU4+ PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsPjxGT05UIGZhY2U9QXJpYWwgY29sb3I9 bmF2eSBzaXplPTI+PFNQQU4gbGFuZz1FTi1HQiANCiAgc3R5bGU9IkZPTlQtU0laRTogMTBwdDsg Q09MT1I6IG5hdnk7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8L1A+ DQogIDxESVY+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWc+PEZPTlQgZmFjZT1BcmlhbCBjb2xvcj1u YXZ5IHNpemU9Mj48U1BBTiANCiAgc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgQ09MT1I6IG5hdnk7 IEZPTlQtRkFNSUxZOiBBcmlhbCI+RXJpayANCiAgQW5kZXJzZW48L1NQQU4+PC9GT05UPjwvUD4N CiAgPFAgY2xhc3M9TXNvQXV0b1NpZz48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6ZT0y PjxTUEFOIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1GQU1J TFk6IEFyaWFsIj5BbmRlcnNlbidzIA0KICBMLVNlcnZpY2U8L1NQQU4+PC9GT05UPjwvUD4NCiAg PFAgY2xhc3M9TXNvQXV0b1NpZz48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6ZT0yPjxT UEFOIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1GQU1JTFk6 IEFyaWFsIj5FbHNldmVqIDQ4LCBESy0zNTAwIA0KICBWYWVybG9lc2U8L1NQQU4+PC9GT05UPjwv UD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZz48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6 ZT0yPjxTUEFOIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1G QU1JTFk6IEFyaWFsIj5EZW5tYXJrPC9TUEFOPjwvRk9OVD48L1A+DQogIDxQIGNsYXNzPU1zb0F1 dG9TaWc+PEZPTlQgZmFjZT1BcmlhbCBjb2xvcj1uYXZ5IHNpemU9Mj48U1BBTiBsYW5nPUVOLUdC IA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1GQU1JTFk6IEFy aWFsIj5Nb2JpbGU6ICs0NSAyMDk3IA0KICAxNDkwPC9TUEFOPjwvRk9OVD48L1A+DQogIDxQIGNs YXNzPU1zb0F1dG9TaWc+PEZPTlQgZmFjZT1BcmlhbCBjb2xvcj1uYXZ5IHNpemU9Mj48U1BBTiBs YW5nPUVOLUdCIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1G QU1JTFk6IEFyaWFsIj5lbWFpbDogDQogIGVyYUB4NTAwLmV1PC9TUEFOPjwvRk9OVD48L1A+DQog IDxQIGNsYXNzPU1zb0F1dG9TaWc+PEZPTlQgZmFjZT1BcmlhbCBjb2xvcj1uYXZ5IHNpemU9Mj48 U1BBTiBsYW5nPUVOLUdCIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsg Rk9OVC1GQU1JTFk6IEFyaWFsIj53d3cueDUwMC5ldTwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBj bGFzcz1Nc29BdXRvU2lnPjxGT05UIGZhY2U9QXJpYWwgY29sb3I9bmF2eSBzaXplPTI+PFNQQU4g DQogIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IENPTE9SOiBuYXZ5OyBGT05ULUZBTUlMWTogQXJp YWwiPnd3dy54NTAwc3RhbmRhcmQuY29tPC9TUEFOPjwvRk9OVD48L1A+PC9ESVY+DQogIDxQIGNs YXNzPU1zb05vcm1hbD48Rk9OVCBmYWNlPUFyaWFsIGNvbG9yPW5hdnkgc2l6ZT0yPjxTUEFOIA0K ICBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBDT0xPUjogbmF2eTsgRk9OVC1GQU1JTFk6IEFyaWFs Ij48L1NQQU4+PC9GT05UPiZuYnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsIHN0eWxlPSJN QVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1UYWhvbWEgc2l6ZT0yPjxTUEFOIA0KICBsYW5n PUVOLVVTIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBUYWhvbWEiPi0tLS0t T3JpZ2luYWwgDQogIE1lc3NhZ2UtLS0tLTxCUj48Qj48U1BBTiBzdHlsZT0iRk9OVC1XRUlHSFQ6 IGJvbGQiPkZyb206PC9TUEFOPjwvQj4gDQogIHg1MDBzdGFuZGFyZC1ib3VuY2VAZnJlZWxpc3Rz Lm9yZyBbbWFpbHRvOng1MDBzdGFuZGFyZC1ib3VuY2VAZnJlZWxpc3RzLm9yZ10gDQogIDxCPjxT UEFOIHN0eWxlPSJGT05ULVdFSUdIVDogYm9sZCI+T24gQmVoYWxmIE9mIDwvU1BBTj48L0I+RXJp ayANCiAgQW5kZXJzZW48QlI+PEI+PFNQQU4gc3R5bGU9IkZPTlQtV0VJR0hUOiBib2xkIj5TZW50 OjwvU1BBTj48L0I+IDEuIGFwcmlsIDIwMDkgDQogIDE0OjQwPEJSPjxCPjxTUEFOIHN0eWxlPSJG T05ULVdFSUdIVDogYm9sZCI+VG86PC9TUEFOPjwvQj4gRGlyZWN0b3J5IGxpc3Q7IA0KICBQS0lY PEJSPjxCPjxTUEFOIHN0eWxlPSJGT05ULVdFSUdIVDogYm9sZCI+U3ViamVjdDo8L1NQQU4+PC9C PiBbeDUwMHN0YW5kYXJkXSANCiAgQ2VydGlmaWNhdGUgZGVmaW5pdGlvbnM8L1NQQU4+PC9GT05U PjwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZP TlQgZmFjZT0iVGltZXMgTmV3IFJvbWFuIiANCiAgc2l6ZT0zPjxTUEFOIHN0eWxlPSJGT05ULVNJ WkU6IDEycHQiPjwvU1BBTj48L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29Ob3JtYWwg c3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9OVCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiAN CiAgbGFuZz1FTi1HQiBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwi PkhpPC9TUEFOPjwvRk9OVD48L1A+DQogIDxQIGNsYXNzPU1zb05vcm1hbCBzdHlsZT0iTUFSR0lO LUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdC IA0Kc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj48L1NQQU4+PC9G T05UPiZuYnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsIHN0eWxlPSJNQVJHSU4tTEVGVDog MzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Igc3R5bGU9 IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5JIGdvdCBhIG51bWJlciBvZiAN CiAgcmVzcG9uc2VzIG9uIHVzZXIgY2VydGlmaWNhdGVzLCBidXQgcXVpdGUgbGl0dGxlIHRoYXQg YWN0dWFsbHkgYW5zd2VyZWQgbXkgDQogIHF1ZXN0aW9uLjwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8 UCBjbGFzcz1Nc29Ob3JtYWwgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9OVCBmYWNlPUFy aWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCnN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7 IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8L1A+DQogIDxQIGNsYXNz PU1zb05vcm1hbCBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6 ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFN SUxZOiBBcmlhbCI+SSBoYXZlIHRyaWVkIHRvIGRpZyBhIA0KICBsaXR0bGUgYml0IG1vcmUgaW4g WC41MDkgdG8gZ2V0IGhvbGQgb2YgdGhlIHRlcm1pbm9sb2d5IGFuZCB0aGVuIHByb2R1Y2VkIA0K ICBiZWxvdyBmaWd1cmUuIEkgd2lsbCBub3QgY29tbWVudCBhbGwgdGhlIGJveGVzLjwvU1BBTj48 L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29Ob3JtYWwgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0 Ij48Rk9OVCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCnN0eWxlPSJG T05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8 L1A+DQogIDxQIGNsYXNzPU1zb05vcm1hbCBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05U IGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6 IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PElNRyBoZWlnaHQ9MjcxIA0KICBzcmM9ImNpZDpB dHRyXzMzMDE0ODgyODEwIiB3aWR0aD00Nzk+PC9TUEFOPjwvRk9OVD48L1A+DQogIDxQIGNsYXNz PU1zb05vcm1hbCBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6 ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0Kc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1G QU1JTFk6IEFyaWFsIj48L1NQQU4+PC9GT05UPiZuYnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0 b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxT UEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBB cmlhbCI+SSB3aWxsIGxpa2UgeW91IHRvIA0KICBjb21tZW50cyBhcyB0byB0aGUgY29ycmVjdG5l c3Mgb2YgYWJvdmUgZmlndXJlLjwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRv U2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQ QU4gDQogIGxhbmc9RU4tR0IgDQpzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTog QXJpYWwiPjwvU1BBTj48L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0 eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQog IGxhbmc9RU4tR0Igc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5U aGUgZW5kLWVudGl0eSANCiAgY2VydGlmaWNhdGUgaXMgbm90IGRlZmluZWQgaW4gdGhlIGRlZmlu aXRpb24gY2xhdXNlLiBIb3dldmVyIGl0IGlzIHVzZWQgd2lkZWx5IA0KICBpbiB0aGUgbWFpbiB0 ZXh0LiBJdCBpcyBtZW50aW9uZWQgdGhlIGZpcnN0IHRpbWUgaW4gY2xhdXNlIDcgYXMgYSBwdWJs aWMta2V5IA0KICBjZXJ0aWZpY2F0ZS4gVGhlcmUgYXJlIHNldmVyYWwgb3RoZXIgcGxhY2VzIHdo ZXJlIGl0IGlzIGEgcHVibGljLWtleSANCiAgY2VydGlmaWNhdGUuIEluIDE1LjUuMi40IGlzIHVz ZWQgaW4gdGhlIGNvbnRleHQgb2YgYXR0cmlidXRlIGNlcnRpZmljYXRlcy4gVGhlIA0KICBjb25j bHVzaW9uIG11c3QgYmUgdGhhdCBhbiBlbmQtZW50aXR5IGNlcnRpZmljYXRlIGNhbiBlaXRoZXIg YmUgYSBlbmQtZW50aXR5IA0KICBwdWJsaWMta2V5IGNlcnRpZmljYXRlIG9yIGFuIGVuZC1lbnRp dHkgYXR0cmlidXRlIGNlcnRpZmljYXRlLiBIb3dldmVyLCBpbiANCiAgbW9zdCBwbGFjZXMsIGl0 IGlzIGltcGxpZWQgdGhhdCB3ZSBvbmx5IHRhbGtzIGFib3V0IHB1YmxpYy1rZXkgY2VydGlmaWNh dGVzLiANCiAgRm9yIHZldGVyYW5zLCB0aGlzIGlzIG5vdCBhIG1ham9yIHByb2JsZW0sIGJ1dCBu ZXctY29tZXJzIG1heSBnZXQgY29uZnVzZWQuIA0KICBBbnl3YXksIEkgdGhpbmcgb3VyIHNwZWNp ZmljYXRpb25zIHNob3VsZCBiZSBjbGVhciBhbmQgbm90IHN1YmplY3QgdG8gDQogIGludGVycHJl dGF0aW9uLiBSRkMgNTI4MCBkb2VzIG5vdCB1c2UgdGhlIHRlcm0gYXQgYWxsLiBJdCBzZWVtcyBq dXN0IHRvIHVzZSANCiAgdGhlIHRlcm0gk2NlcnRpZmljYXRllCBhcyBhIHN5bm9ueW0gZm9yIJNl bmQtZW50cml0eSBwdWJsaWMga2V5IA0KICBjZXJ0aWZpY2F0ZZQuPC9TUEFOPjwvRk9OVD48L1A+ DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9OVCBm YWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCnN0eWxlPSJGT05ULVNJWkU6 IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8L1A+DQogIDxQ IGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9OVCBmYWNlPUFy aWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiBzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBG T05ULUZBTUlMWTogQXJpYWwiPlRoZSCTVXNlciANCiAgQ2VydGlmaWNhdGWUJm5ic3A7IGlzIG5v dCBkZWZpbmVkIGluIFguNTA5LCBidXQgaXMgd2lkZSB1c2VkLiBJdCBzZWVtcyB0byBiZSBhIA0K ICBzeW5vbnltIGZvciCTZW5kLWVudHJpdHkgcHVibGljIGtleSBjZXJ0aWZpY2F0ZZQuIEl0IGlz IGFsc28gdXNlZCBpbiBYLjUxMS4gDQogIFJGQyA1MjgwIHVzZXMgdGhlIHRlcm0gb25jZSB3aXRo b3V0IGRpZmZlcmVudGluZyBpdCBmcm9tIGp1c3QgDQogIJNjZXJ0aWZpY2F0ZZQuPC9TUEFOPjwv Rk9OVD48L1A+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0 Ij48Rk9OVCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCnN0eWxlPSJG T05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+PC9TUEFOPjwvRk9OVD4mbmJzcDs8 L1A+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9O VCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiBzdHlsZT0iRk9OVC1TSVpF OiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPlRoZSB0ZXJtIA0KICCTY3Jvc3MtY2VydGlmaWNh dGWUIHNob3VsZCBwcm9iYWJseSBhbHNvIGJlIHF1YWxpZmllZC48L1NQQU4+PC9GT05UPjwvUD4N CiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZh Y2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0Kc3R5bGU9IkZPTlQtU0laRTog MTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj48L1NQQU4+PC9GT05UPiZuYnNwOzwvUD4NCiAgPFAg Y2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJp YWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZP TlQtRkFNSUxZOiBBcmlhbCI+SSBzdWdnZXN0IHRvIGFkZCBpbiANCiAgWC41MDkgZGVmaW5pdGlv bnMgZm9yOjwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJN QVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9 RU4tR0IgDQpzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPjwvU1BB Tj48L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4t TEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Ig c3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj6TZW5kLWVudGl0eSBw dWJsaWMta2V5IA0KICBjZXJ0aWZpY2F0ZZQ8L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9 TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6 ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFN SUxZOiBBcmlhbCI+k3VzZXIgY2VydGljdGF0ZZQgYXMgYSANCiAgc3lub255bSBmb3Igk2VuZC1l bnRpdHkgcHVibGljLWtleSBjZXJ0aWZpY2F0ZZQ8L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAgY2xh c3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwg c2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQt RkFNSUxZOiBBcmlhbCI+k2VuZC1lbnRpdHkgYXR0cnVidXRlIA0KICBjZXJ0aWZpY2F0ZZQ8L1NQ QU4+PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6 IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0Kc3R5 bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj48L1NQQU4+PC9GT05UPiZu YnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQi PjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05U LVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+VGhlIFguNTA5IHRleHQgc2hvdWxkIA0K ICBiZSB1cGRhdGVkIHRvIG1ha2UgdXNlIG9mIHRoZXNlIGRlZmluaXRpb25zLjwvU1BBTj48L0ZP TlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+ PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0IgDQpzdHlsZT0iRk9O VC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPjwvU1BBTj48L0ZPTlQ+Jm5ic3A7PC9Q Pg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZPTlQg ZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Igc3R5bGU9IkZPTlQtU0laRTog MTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5YLjUwOSBoYXMgZm91ciANCiAgYXR0cmlidXRlIHR5 cGVzIGZvciBob2xkaW5nIGNlcnRpZmljYXRlcy48L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAgY2xh c3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwg c2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0Kc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9O VC1GQU1JTFk6IEFyaWFsIj48L1NQQU4+PC9GT05UPiZuYnNwOzwvUD4NCiAgPFAgY2xhc3M9TXNv QXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0y PjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZ OiBBcmlhbCI+VXNlckNlcnRpZmljYXRlOiBGb3IgDQogIGVuZC1lbnRpdHkgcHVibGljLWtleSBj ZXJ0aWZpY2F0ZXM8L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHls ZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBs YW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+Y0Fj ZXJ0aWZpY2F0ZTogRm9yIENBIA0KICBjZXJ0aWZpY2F0ZXM8L1NQQU4+PC9GT05UPjwvUD4NCiAg PFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9 QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAx MHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPmF0dHJpYnV0ZUNlcnRpZmljYXRlQXR0cmlidXRlOiBG b3IgDQogIGVuZC1lbnRpdHkgYXR0cnVidXRlIGNlcnRpZmljYXRlczwvU1BBTj48L0ZPTlQ+PC9Q Pg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZPTlQg ZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Igc3R5bGU9IkZPTlQtU0laRTog MTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5hQUNlcnRpZmljYXRlOiBGb3IgQUEgDQogIENlcnRp ZmljYXRlczwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJN QVJHSU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9 RU4tR0IgDQpzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPjwvU1BB Tj48L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4t TEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Ig c3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5BbnkgDQogIGNvbW1l bnRzPzwvU1BBTj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJH SU4tTEVGVDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4t R0IgDQpzdHlsZT0iRk9OVC1TSVpFOiAxMHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPjwvU1BBTj48 L0ZPTlQ+Jm5ic3A7PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVG VDogMzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIHN0eWxlPSJGT05ULVNJ WkU6IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+RXJpayBBbmRlcnNlbjwvU1BBTj48L0ZPTlQ+ PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZP TlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZP TlQtRkFNSUxZOiBBcmlhbCI+QW5kZXJzZW4ncyANCiAgTC1TZXJ2aWNlPC9TUEFOPjwvRk9OVD48 L1A+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAzNnB0Ij48Rk9O VCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgc3R5bGU9IkZPTlQtU0laRTogMTBwdDsgRk9O VC1GQU1JTFk6IEFyaWFsIj5FbHNldmVqIDQ4LCBESy0zNTAwIA0KICBWYWVybG9lc2U8L1NQQU4+ PC9GT05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2 cHQiPjxGT05UIGZhY2U9QXJpYWwgc2l6ZT0yPjxTUEFOIA0KICBzdHlsZT0iRk9OVC1TSVpFOiAx MHB0OyBGT05ULUZBTUlMWTogQXJpYWwiPkRlbm1hcms8L1NQQU4+PC9GT05UPjwvUD4NCiAgPFAg Y2xhc3M9TXNvQXV0b1NpZyBzdHlsZT0iTUFSR0lOLUxFRlQ6IDM2cHQiPjxGT05UIGZhY2U9QXJp YWwgc2l6ZT0yPjxTUEFOIA0KICBsYW5nPUVOLUdCIHN0eWxlPSJGT05ULVNJWkU6IDEwcHQ7IEZP TlQtRkFNSUxZOiBBcmlhbCI+TW9iaWxlOiArNDUgMjA5NyANCiAgMTQ5MDwvU1BBTj48L0ZPTlQ+ PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+PEZP TlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIGxhbmc9RU4tR0Igc3R5bGU9IkZPTlQtU0la RTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj5lbWFpbDogDQogIGVyYUB4NTAwLmV1PC9TUEFO PjwvRk9OVD48L1A+DQogIDxQIGNsYXNzPU1zb0F1dG9TaWcgc3R5bGU9Ik1BUkdJTi1MRUZUOiAz NnB0Ij48Rk9OVCBmYWNlPUFyaWFsIHNpemU9Mj48U1BBTiANCiAgbGFuZz1FTi1HQiANCiAgc3R5 bGU9IkZPTlQtU0laRTogMTBwdDsgRk9OVC1GQU1JTFk6IEFyaWFsIj53d3cueDUwMC5ldTwvU1BB Tj48L0ZPTlQ+PC9QPg0KICA8UCBjbGFzcz1Nc29BdXRvU2lnIHN0eWxlPSJNQVJHSU4tTEVGVDog MzZwdCI+PEZPTlQgZmFjZT1BcmlhbCBzaXplPTI+PFNQQU4gDQogIHN0eWxlPSJGT05ULVNJWkU6 IDEwcHQ7IEZPTlQtRkFNSUxZOiBBcmlhbCI+d3d3Lng1MDBzdGFuZGFyZC5jb208L1NQQU4+PC9G T05UPjwvUD4NCiAgPFAgY2xhc3M9TXNvTm9ybWFsIHN0eWxlPSJNQVJHSU4tTEVGVDogMzZwdCI+ PEZPTlQgZmFjZT0iVGltZXMgTmV3IFJvbWFuIiANCiAgc2l6ZT0zPjxTUEFOIGxhbmc9RU4tR0Ig DQogIHN0eWxlPSJGT05ULVNJWkU6IDEycHQiPjwvU1BBTj48L0ZPTlQ+Jm5ic3A7PC9QPjwvRElW PjwvRElWPjwvQkxPQ0tRVU9URT48L0JPRFk+PC9IVE1MPg0K ------=_NextPart_09040317330148873280414_002-- ------=_NextPart_09040317330148873280414_001 Content-Type: image/gif; name="image001.gif" Content-ID: Content-Transfer-Encoding: base64 R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_09040317330148873280414_001-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33F0Kk0094076 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 08:00:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33F0KdA094075; Fri, 3 Apr 2009 08:00:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail02.dandomain.dk (mail02.dandomain.dk [194.150.112.202]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33F07ck094052 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 3 Apr 2009 08:00:18 -0700 (MST) (envelope-from era@x500.eu) Received: from ERA1 ([212.27.29.184]) by mail02.dandomain.dk (DanDomain Mailserver) with ASMTP id KTD78801; Fri, 03 Apr 2009 17:00:01 +0200 From: "Erik Andersen" To: , "'PKIX'" Subject: RE: [x500standard] Certificate definitions Date: Fri, 3 Apr 2009 17:00:01 +0200 Message-ID: <3C35976D27EB42F590A0B142D903E7C7@ERA1> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0022_01C9B47D.A32BACF0" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6838 In-Reply-To: <1C740690094340D3B49DADD21AD98606@ERA1> X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Thread-Index: AcmyxvW/KkzbCBxjQ/eyg7S7tJNM1wBpdYcg Importance: Normal Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0022_01C9B47D.A32BACF0 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0023_01C9B47D.A32BACF0" ------=_NextPart_001_0023_01C9B47D.A32BACF0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I take silence as approval. =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 -----Original Message----- From: x500standard-bounce@freelists.org [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen Sent: 1. april 2009 14:40 To: Directory list; PKIX Subject: [x500standard] Certificate definitions =20 Hi =20 I got a number of responses on user certificates, but quite little that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first time in = clause 7 as a public-key certificate. There are several other places where it = is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term = at all. It seems just to use the term "certificate" as a synonym for "end-entrity public key certificate". =20 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is also = used in X.511. RFC 5280 uses the term once without differenting it from just "certificate". =20 The term "cross-certificate" should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 "end-entity public-key certificate" "user certictate" as a synonym for "end-entity public-key certificate" "end-entity attrubute certificate" =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attrubute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------=_NextPart_001_0023_01C9B47D.A32BACF0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I take silence = as approval.

 

Erik Andersen

Andersen's = L-Service

Elsevej 48, DK-3500 = Vaerloese

Denmark

Mobile: +45 2097 = 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com

 

-----Original Message-----
From: x500standard-bounce@freelists.org = [mailto:x500standard-bounce@freelists.org] On Behalf Of Erik Andersen
Sent: 1. april 2009 = 14:40
To: Directory list; = PKIX
Subject: [x500standard] Certificate definitions

 

Hi

 

I got a number = of responses on user certificates, but quite little that actually answered = my question.

 

I have tried = to dig a little bit more in X.509 to get hold of the terminology and then = produced below figure. I will not comment all the boxes.

 

 

I will like = you to comments as to the correctness of above figure.

 

The end-entity certificate is not defined in the definition clause. However it is used = widely in the main text. It is mentioned the first time in clause 7 as a = public-key certificate. There are several other places where it is a public-key certificate. In 15.5.2.4 is used in the context of attribute = certificates. The conclusion must be that an end-entity certificate can either be a = end-entity public-key certificate or an end-entity attribute certificate. However, = in most places, it is implied that we only talks about public-key certificates. = For veterans, this is not a major problem, but new-comers may get confused. = Anyway, I thing our specifications should be clear and not subject to = interpretation. RFC 5280 does not use the term at all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.

 

The = “User Certificate”  is not defined in X.509, but is wide used. It = seems to be a synonym for “end-entrity public key certificate”. It is = also used in X.511. RFC 5280 uses the term once without differenting it from = just “certificate”.

 

The term “cross-certificate” should probably also be = qualified.

 

I suggest to = add in X.509 definitions for:

 

“end-entity public-key certificate”

“user certictate” as a synonym for “end-entity public-key certificate”

“end-entity attrubute certificate”

 

The X.509 text = should be updated to make use of these definitions.

 

X.509 has four = attribute types for holding certificates.

 

UserCertificate: For end-entity public-key certificates

cAcertificate: = For CA certificates

attributeCertificateAttribut= e: For end-entity attrubute certificates

aACertificate: = For AA Certificates

 

Any = comments?

 

Erik = Andersen

Andersen's = L-Service

Elsevej 48, DK-3500 = Vaerloese

Denmark

Mobile: +45 = 2097 1490

email: = era@x500.eu

www.x500.eu

www.x500standard.com<= /font>

 

------=_NextPart_001_0023_01C9B47D.A32BACF0-- ------=_NextPart_000_0022_01C9B47D.A32BACF0 Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_000_0022_01C9B47D.A32BACF0-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33ES959091918 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 07:28:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33ES9Rp091913; Fri, 3 Apr 2009 07:28:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33ERt8X091869 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 3 Apr 2009 07:28:07 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha2.nist.gov [129.6.16.198]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id n33ERbgn014609; Fri, 3 Apr 2009 10:27:37 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id n33ERR29029220; Fri, 3 Apr 2009 10:27:29 -0400 Message-ID: <49D61CCF.3020001@nist.gov> Date: Fri, 03 Apr 2009 10:27:27 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.19 (X11/20090114) MIME-Version: 1.0 To: =?windows-1252?Q?=3F=3F=3F?= , pkix , Stephen Farrell Subject: Re: WG Last Call on draft-ietf-pkix-tac-03 Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: 8bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I think that Stephen makes a great point.  Stephen's point is that in many cases it is possible to learn someone's true identity even if one is only provided the IP address from which the person was communicating.  So, it would not matter that the TAC protocol does not provide the AI with any identity information.

I also do not agree that the TAC cannot be sent directly from the BI to the user.  The protocol could be reworked to address Stephen's concern.  The basic idea for the protocol would be as follows:

step 1: The user creates a certificate request message and encrypts it with a session key, which is in turn encrypted using the AI's public key.

step 2: The user authenticates to the BI and provides the BI with the encrypted certificate request message.

step 3: The BI creates a Token for the user and sends the Token and the encrypted certificate request message to the AI over a channel that is protected using two-way authenticated TLS.

step 4: The AI decrypts the certificate request message and creates the TBSCertificate.

(If it is considered necessary): steps 5 and 6:  The AI and the BI jointly sign the TBSCertificate using the blinded, split signature scheme.

step 7: The AI encrypts the signed certificate (TAC) using the session key that was created by the user in step 1 and sends the encrypted TAC and the Token to the BI.

step 8: The BI sends the encrypted TAC to the user.

[Note that to maximize privacy, the encrypted certificate request message and the encrypted TAC could both be padded to a fixed length to ensure that the BI could not learn anything from the lengths of these messages.]

I wrote out this protocol fairly quickly, so I may not have gotten all of the details correct, but I think the basic idea is correct.  It seems to retain all of the properties of the current protocol while also helping to address the flaw that Stephen identified.

Dave

SangHwan Park wrote:

Dear Stephen,

 

Thank you for the comments.

 

Ive included my responses inline below.

 

> A couple of comments:

 

>#1: Top of p7:

>  "To effect issuance of the TAC, the AI interacts with

>   the BI, over a secure channel, to jointly create the signature on

>   the TAC, and sends the signed TAC to the user.

> 

>   The AI does this without learning the user's real identity

>   (either from the user or from the BI)."

> 

>If the AI sends the TAC to the user, then it will know some

>form of identity for that user, even if that's only an IP

>address. (And with the likes of SAVI, that could well be

>enough to establish a real identity.)

> 

>I'd have thought it'd be much better to return the TAC

>via the BI and not require any user<->AI direct connections?

 

According to the concept of separation of CA authorities in this document, BI only identify users real identity and AI only issue TAC with the help of BI without disclosing users real identity. As you suggested if we allow BI to send TAC to users not from AI, BI can trace users real identity unilaterally. It means it is against our concept. And AI cant trace their real identity with IP address alone, collected in the issuance process because AI does not have any identity information for users. For this reason, it makes sense to require AI to send TAC to users.

 


Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n33Ct0MO083600 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 3 Apr 2009 05:55:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n33Ct0sx083599; Fri, 3 Apr 2009 05:55:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n33CsnPO083582 for ; Fri, 3 Apr 2009 05:54:59 -0700 (MST) (envelope-from CWallace@cygnacom.com) Received: (qmail 7004 invoked from network); 3 Apr 2009 12:53:42 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 3 Apr 2009 12:53:42 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B45B.5EE05B7D" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: using TA constraints Date: Fri, 3 Apr 2009 08:54:47 -0400 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: using TA constraints Thread-Index: Acm0W1589UgdzM3iRxyRIAWqfL7mGQ== From: "Carl Wallace" To: "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B45B.5EE05B7D Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable As mentioned during the WG group meeting last week, the individual draft that describes the usage of TA-based constraints during path processing has been submitted and can be retrieved here: http://www.ietf.org/internet-drafts/draft-wallace-using-ta-constraints-0 0.txt.=20 ------_=_NextPart_001_01C9B45B.5EE05B7D Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

As mentioned during the WG group meeting last week, = the individual draft that describes the usage of TA-based constraints during = path processing has been submitted and can be retrieved here: http://www.ietf.org/internet-drafts/draft-wallace-using-ta-= constraints-00.txt.

------_=_NextPart_001_01C9B45B.5EE05B7D-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3320a33042577 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 19:00:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n3320awB042576; Thu, 2 Apr 2009 19:00:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from spam.kisa.or.kr (sniper.kisa.or.kr [211.252.150.22]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n3320XPA042570 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 19:00:34 -0700 (MST) (envelope-from shpark@kisa.or.kr) Message-Id: <200904030200.n3320XPA042570@balder-227.proper.com> Received: (snipe 3772 invoked by alias); 3 Apr 2009 10:59:49 +0900 Received: from unknown (HELO ms.kisa.or.kr) (211.252.150.23) by 211.252.150.22 with SMTP; 3 Apr 2009 10:59:49 +0900 Received: (qmail 25201 invoked from network); 3 Apr 2009 01:55:52 -0000 Received: from unknown (HELO LocalHost) (172.16.7.93) by ms.kisa.or.kr with SMTP; 3 Apr 2009 01:55:52 -0000 From: =?ks_c_5601-1987?B?udq788iv?= To: Subject: RE: WG Last Call on draft-ietf-pkix-tac-03 Date: Fri, 3 Apr 2009 11:00:37 +0900 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0019_01C9B44B.6BB7E310" X-Mailer: Microsoft Office Outlook, Build 11.0.5510 Thread-Index: Acmz//u9kIeAUIqTQsaOIo84VDru4A== X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0019_01C9B44B.6BB7E310 Content-Type: text/plain; charset="ks_c_5601-1987" Content-Transfer-Encoding: quoted-printable Dear Stephen, =20 Thank you for the comments. =20 I=A1=AFve included my responses inline below. =20 > A couple of comments: =20 >#1: Top of p7: > "To effect issuance of the TAC, the AI interacts with > the BI, over a secure channel, to jointly create the signature on > the TAC, and sends the signed TAC to the user. >=20 > The AI does this without learning the user's real identity > (either from the user or from the BI)." >=20 >If the AI sends the TAC to the user, then it will know some >form of identity for that user, even if that's only an IP >address. (And with the likes of SAVI, that could well be >enough to establish a real identity.) >=20 >I'd have thought it'd be much better to return the TAC >via the BI and not require any user<->AI direct connections? =20 According to the concept of separation of CA authorities in this = document, BI only identify user=A1=AFs real identity and AI only issue TAC with = the help of BI without disclosing user=A1=AFs real identity. As you suggested if = we allow BI to send TAC to users not from AI, BI can trace user=A1=AFs real identity unilaterally. It means it is against our concept. And AI = can=A1=AFt trace their real identity with IP address alone, collected in the = issuance process because AI does not have any identity information for users. For this reason, it makes sense to require AI to send TAC to users. =20 >#2: Section 5.2 claims that the AI can't unilaterally fool >the BI into revealing the real identity. But the only thing >that stops that seems to be the RP client identity verified >by the BI when the RP establishes a mutual-auth TLS connection >to the BI. =20 >So how can the BI really know that its not the AI making that >connection? =20 We have adopted two-way authentication channel, in order for BI to = identify and ensure communicating party=A1=AFs identity. It means BI can realize the communicating party is eligible for the = request for user=A1=AFs real identity.=20 For this reason, i don=A1=AFt think it is necessary to add the notes to = imply BI must reject AI=A1=AFs request for user=A1=AFs real identity. =20 Stephen. =20 ------------------- SangHwan Park=20 Senior Researcher / CISA / CISSP / ITIL Korea Information Security Agency(KISA) +82-2-405-5428, shpark@kisa.or.kr =20 =20 =20 ------------------- SangHwan Park=20 Senior Researcher / CISA / CISSP / ITIL Korea Information Security Agency(KISA) +82-2-405-5428, shpark@kisa.or.kr =20 ------=_NextPart_000_0019_01C9B44B.6BB7E310 Content-Type: text/html; charset="ks_c_5601-1987" Content-Transfer-Encoding: quoted-printable

Dear = Stephen,

 

Thank = you for the comments.

 

I=A1=AFve included my responses inline below.

 

> A = couple of comments:

 

>#1: = Top of p7:

>  "To = effect issuance of the TAC, the AI interacts with

>   the = BI, over a secure channel, to jointly create the signature = on

>   the = TAC, and sends the signed TAC to the user.

> =

>   The = AI does this without learning the user's real = identity

>   = (either from the user or from the BI)."

> =

>If = the AI sends the TAC to the user, then it will know some

>form of identity = for that user, even if that's only an IP

>address. (And = with the likes of SAVI, that could well be

>enough to = establish a real identity.)

> =

>I'd = have thought it'd be much better to return the TAC

>via = the BI and not require any user<->AI direct = connections?

 

According to the concept of separation of CA authorities in this document, BI only identify user=A1=AFs real = identity and AI only issue TAC with the help of BI without disclosing user=A1=AFs real identity. As you suggested if we allow BI to send TAC to users not from AI, BI can = trace user=A1=AFs real = identity unilaterally. It means it is against our concept. And AI can=A1=AFt trace their real identity with IP address alone, collected in the issuance = process because AI does not have any identity information for users. For this = reason, it makes sense to require AI to send TAC to users.

 

>#2: = Section 5.2 claims that the AI can't unilaterally fool

>the = BI into revealing the real identity. But the only thing

>that stops that = seems to be the RP client identity verified

>by = the BI when the RP establishes a mutual-auth TLS connection

>to = the BI.

 

>So = how can the BI really know that its not the AI making that

>connection?<= /o:p>

 

We have adopted two-way authentication channel, in order for BI to identify = and ensure communicating party=A1=AFs identity.

It means BI can realize the communicating party is eligible for the request = for user=A1=AFs real = identity.

For this reason, i don=A1=AFt think it is = necessary to add the notes to imply BI must reject AI=A1=AFs request for user=A1=AFs real = identity.

 

Stephen.

 

-------------------

SangHwan Park

Senior Researcher / CISA / CISSP = / ITIL

Korea Information Security = Agency(KISA)

+82-2-405-5428, shpark@kisa.or.kr

 

 

 

-------------------

SangHwan Park

Senior Researcher / CISA / CISSP / ITIL

Korea Information Security Agency(KISA)

+82-2-405-5428, shpark@kisa.or.kr

 

------=_NextPart_000_0019_01C9B44B.6BB7E310-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n331ftir041912 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 18:41:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n331ft1R041911; Thu, 2 Apr 2009 18:41:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from spam.kisa.or.kr (sniper.kisa.or.kr [211.252.150.22]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n331fdl2041897 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 18:41:51 -0700 (MST) (envelope-from shpark@kisa.or.kr) Message-Id: <200904030141.n331fdl2041897@balder-227.proper.com> Received: (snipe 745 invoked by alias); 3 Apr 2009 10:40:53 +0900 Received: from unknown (HELO ms.kisa.or.kr) (211.252.150.23) by 211.252.150.22 with SMTP; 3 Apr 2009 10:40:53 +0900 Received: (qmail 20693 invoked from network); 3 Apr 2009 01:36:56 -0000 Received: from unknown (HELO LocalHost) (172.16.7.93) by ms.kisa.or.kr with SMTP; 3 Apr 2009 01:36:56 -0000 From: =?ks_c_5601-1987?B?udq788iv?= To: Cc: , "'Stephen Kent'" Subject: Re: WG Last Call on draft-ietf-pkix-tac-03 Date: Fri, 3 Apr 2009 10:41:41 +0900 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_000E_01C9B448.C6868740" X-Mailer: Microsoft Office Outlook, Build 11.0.5510 Thread-Index: Acmz/VaHWyNzFQ9dTo+BOrGe56LV8A== X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_000E_01C9B448.C6868740 Content-Type: text/plain; charset="ks_c_5601-1987" Content-Transfer-Encoding: quoted-printable Dear Stephen, =20 Thank you for the comments. =20 I=A1=AFve included my responses inline below. =20 > A couple of comments: =20 >#1: Top of p7: > "To effect issuance of the TAC, the AI interacts with > the BI, over a secure channel, to jointly create the signature on > the TAC, and sends the signed TAC to the user. >=20 > The AI does this without learning the user's real identity > (either from the user or from the BI)." >=20 >If the AI sends the TAC to the user, then it will know some >form of identity for that user, even if that's only an IP >address. (And with the likes of SAVI, that could well be >enough to establish a real identity.) >=20 >I'd have thought it'd be much better to return the TAC >via the BI and not require any user<->AI direct connections? =20 According to the concept of separation of CA authorities in this = document, BI only identify user=A1=AFs real identity and AI only issue TAC with = the help of BI without disclosing user=A1=AFs real identity. As you suggested if = we allow BI to send TAC to users not from AI, BI can trace user=A1=AFs real identity unilaterally. It means it is against our concept. And AI = can=A1=AFt trace their real identity with IP address alone, collected in the = issuance process because AI does not have any identity information for users. For this reason, it makes sense to require AI to send TAC to users. =20 >#2: Section 5.2 claims that the AI can't unilaterally fool >the BI into revealing the real identity. But the only thing >that stops that seems to be the RP client identity verified >by the BI when the RP establishes a mutual-auth TLS connection >to the BI. =20 >So how can the BI really know that its not the AI making that >connection? =20 We have adopted two-way authentication channel, in order for BI to = identify and ensure communicating party=A1=AFs identity. It means BI can realize the communicating party is eligible for the = request for user=A1=AFs real identity.=20 For this reason, i don=A1=AFt think it is necessary to add the notes to = imply BI must reject AI=A1=AFs request for user=A1=AFs real identity. =20 Stephen. =20 ------------------- SangHwan Park=20 Senior Researcher / CISA / CISSP / ITIL Korea Information Security Agency(KISA) +82-2-405-5428, shpark@kisa.or.kr =20 ------=_NextPart_000_000E_01C9B448.C6868740 Content-Type: text/html; charset="ks_c_5601-1987" Content-Transfer-Encoding: quoted-printable

Dear Stephen,

 

Thank you for the = comments.

 

I=A1=AFve included my responses inline = below.

 

> A couple of = comments:

 

>#1: Top of = p7:

>  "To effect issuance of the = TAC, the AI interacts with

>   the BI, over a secure = channel, to jointly create the signature on

>   the TAC, and sends the signed = TAC to the user.

> 

>   The AI does this without = learning the user's real identity

>   (either from the user or from = the BI)."

> 

>If the AI sends the TAC to the user, then = it will know some

>form of identity for that user, even if = that's only an IP

>address. (And with the likes of SAVI, that = could well be

>enough to establish a real = identity.)

> 

>I'd have thought it'd be much better to = return the TAC

>via the BI and not require any = user<->AI direct connections?

 

According = to the concept of separation of CA authorities in this document, BI only identify = user=A1=AFs real identity and AI only issue TAC with the help of BI without disclosing = user=A1=AFs real identity. As you suggested if we allow BI to send TAC to users not from = AI, BI can trace user=A1=AFs real = identity unilaterally. It means it is against our concept. And AI can=A1=AFt trace their real identity with IP address alone, collected in the issuance = process because AI does not have any identity information for users. For this reason, it = makes sense to require AI to send TAC to users.

 

>#2: Section 5.2 claims that the AI can't = unilaterally fool

>the BI into revealing the real identity. = But the only thing

>that stops that seems to be the RP client = identity verified

>by the BI when the RP establishes a = mutual-auth TLS connection

>to the BI.

 

>So how can the BI really know that its not = the AI making that

>connection?

 

We have = adopted two-way authentication channel, in order for BI to identify and ensure = communicating party=A1=AFs = identity.

It means = BI can realize the communicating party is eligible for the request for user=A1=AFs real identity.

For this = reason, i don=A1=AFt think it is necessary to add the notes to imply BI must reject = AI=A1=AFs request for user=A1=AFs real = identity.

 

Stephen.

 

-------------------

SangHwan Park

Senior Researcher / CISA / CISSP / ITIL

Korea Information Security Agency(KISA)

+82-2-405-5428, shpark@kisa.or.kr

 

------=_NextPart_000_000E_01C9B448.C6868740-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32L5kG0026605 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 14:05:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32L5k9k026604; Thu, 2 Apr 2009 14:05:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32L5ab6026580 for ; Thu, 2 Apr 2009 14:05:46 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: Renew/Rekey/Modification Date: Thu, 2 Apr 2009 17:05:34 -0400 Message-ID: <200904022105.n32L5ZXD014427@stingray.missi.ncsc.mil> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSwACiN0dAACdj+0A== References: <49D2D476.3030000@lockstep.com.au> From: "Kemp, David P." To: X-OriginalArrivalTime: 02 Apr 2009 21:00:25.0140 (UTC) FILETIME=[0B571740:01C9B3D6] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: As Santosh said, if the old key is compromised and used first by an adversary to rekey, then the subscriber will detect the compromise when he tries to rekey and is rejected. If the subscriber rekeys first, then the adversary is out of luck. The subscriber could be allowed to spawn multiple new rekeyed certificates (such as generating an email encryption certificate based on a signature certificate) as long as the validity is not extended from old to new, but should be allowed only one rekey with a new validity period. -----Original Message----- From: EXT-Glatting, Dennis P >>=20 >> It should be. The goal here is to use the current certificate to >> authenticate to create new certificates. >>=20 > > I'm a little confused here. If we're getting rid of the key because it's > getting old, then how is it young enough to validate a new key? A > problem is there is an implicit "continuance of legacy" in the new key > of the old key that doesn't end with the immediate generation but > follows all generations of the original key. >=20 > I'm not suggesting something is "wrong" but there seems like there is a > logic error somewhere.=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32K21vx021761 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 13:02:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32K21bH021760; Thu, 2 Apr 2009 13:02:01 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32K1x72021750 for ; Thu, 2 Apr 2009 13:01:59 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 30006 invoked from network); 2 Apr 2009 20:00:53 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 20:00:53 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3CD.E106C77B" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 16:01:54 -0400 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABFiEVAAC4yzwAAcZhjA= References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <2788466ED3E31C418E9ACC5C3166155768B35F@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B3CD.E106C77B Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable The post and attached word document with comments on Phil's draft may not have made it to the list due to the word attachment. =20 So, the URL below can be used to download my commented version of 2007 draft from Phil. =20 http://www.orionsec.net/draft-hallambaker-ocspagility-sc-round%202.doc =20 ________________________________ From: Santosh Chokhani=20 Sent: Thursday, April 02, 2009 11:12 AM To: 'Hallam-Baker, Phillip'; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 Phil, =20 See the attached. =20 In addition, posts circa October 2007 on relevant thread from me will have the comments. =09 ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Thursday, April 02, 2009 9:48 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 On the contrary, each time I asked for a substantive argument you used exactly the same non argument you are using here. =20 I have put a substantive argument on the table here. "I am not convinced" or "I answered the question some other time" with no links to the specific points are not a substantive response. You may think that you gave a substantive explanation of how a client that only supports ECC can obtain a comprehensible response from a generic OCSP server that also supports RSA. However I do not beleive that it is possible in the current protocol. =20 If you think you have demonstrated this in the past then please point to the email. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B3CD.E106C77B Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
The post and attached word document with = comments on=20 Phil's draft may not have made it to the list due to the word=20 attachment.
 
So, the URL below can be used to download my = commented=20 version of 2007 draft from Phil.
 
http://www.orionsec.net/draft-hallambaker-ocspagility-sc-round%= 202.doc
 


From: Santosh Chokhani =
Sent:=20 Thursday, April 02, 2009 11:12 AM
To: 'Hallam-Baker, = Phillip';=20 Stefan Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

Phil,
 
See the attached.
 
In addition, posts circa October 2007 on = relevant thread=20 from me will have the comments.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, = 2009 9:48=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

On the = contrary, each=20 time I asked for a substantive argument you used exactly the same = non=20 argument you are using here.
 
I have put a substantive = argument on=20 the table here. "I am not convinced" or "I answered the question = some other=20 time" with no links to the specific points are not a substantive = response.=20 You may think that you gave a substantive explanation of how a = client that=20 only supports ECC can obtain a comprehensible response from a = generic OCSP=20 server that also supports RSA. However I do not beleive that it is = possible=20 in the current protocol.
 
If you think you have = demonstrated this=20 in the past then please point to the email.
 


From: Santosh Chokhani=20 [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54=20 AM
To: Hallam-Baker, Phillip; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I have no objection to having an extension, = but if in the=20 long term SHA-1 will not be there, it seems defining a new response = type=20 (say basic 2) would be the way to go so that SHA-1 based key ID can = be=20 stripped off.
 
If SHA-1 is not getting ripped off in the long = term, I do not see value in extension except that it may make = every one=20 happy: those who do not care will not include it on the Server = side=20 and/or will ignore it on the client side.
 
It would appear that the extension should be=20 NC.
 
Phil,
 
I would not respond to the arguments on KISS = and security=20 since in this case both are straightforward.  Also, in this = thread, the=20 comments were not meant for or directed at you.
 
As you know, I have provided extensive = comments to you=20 when you first posted the OCSP Agility I-D and my position and = reasons are=20 matter of PKIX archives for anyone to scrutinize.  When you = ignore=20 every single cogent point, there is no sense in me commenting on = next=20 iteration.  I do think that the OCSP Agility I-D is a solution = looking=20 for a problem that I do not see.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, = 2009=20 12:53 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

I think = we have no=20 choice but to leave the Key ID CHOICE to be SHA-1 = based.
 
But that does not = preclude adding an=20 extension that allows the KeyID to be specified using a stronger=20 algorithm. There are two reasons for this:
 
1) Optics, even if = there is no=20 security implication, a protocol that uses weak crypto = necessitates an=20 (expensive) security review to prove that there is no problem. And = these=20 must be performed repeatedly by many different parties as relying = on the=20 analysis of others is a good way to cause issues. Been there, done = that.
 
2) We are designing for = long time=20 spans, ten years or more. While simple compressor collisions may = not be a=20 concern, there is no guarantee that the attacks will stop at that = point.=20 MD4 has been broken repeatedly and they are now at the stage of = jumping up=20 and down on the little pieces. It will probably happen to MD5 and = we=20 should be cautious in case it happens to SHA-1.
 
 
On the claim of 'Keep = it simple=20 STUPID', I find it rather offensive to have my position = characterized as=20 stupid. My designs are not exactly known for being verbose or = overly=20 elaborate. If I propose something it is because there is a reason. = It is=20 very easy to defend the status quo by derriding proposals as = unnecessary,=20 but the fact is that making OCSP too simple will simply cause the=20 complexity to blow out somewhere else.
 
There is an = architectural princple of=20 modular design that demands that the core of PKIX as it now stands = (the=20 certificate profile and OCSP) be capable of stand alone use. We = cannot fix=20 issues in OCSP with LTANS or other layered-on protocols as some = have=20 proposed. It does not simplify my OCSP deployment to have to graft = on an=20 entire different protocol in addition or to re-engineer my = document=20 archival protocol to cover defects in OCSP.
 
 
Simply adding new = algorithms to a=20 protocol does nothing to improve security. You only improve = security if=20 you withdraw insecure algorithms from use.
 
To make the system work = you have to=20 have a means of negotiating between the client and the server. = Otherwise=20 there is no way for an OCSP responder to ensure that it receives a = secure,=20 supported response to querries for certificates that do not = exist yet=20 or are not known to the responder.
 
In the case of an OCSP = responder=20 being driven by CRLs collected from various sources, there is no = way for=20 the CA to know if a certificate even exists, all it knows is if = the status=20 is definitively revoked.
 
In the case of many = transactional=20 architectures the OCSP validation is performed independently of=20 certificate chain validation.
 
 
Experience of small = scale PKI=20 deployment in which any box can be upgraded at will is simply not=20 representative of large scale real world deployment.
 


From:=20 owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent:=20 Wed 4/1/2009 8:39 PM
To: Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1


I am saying that "Do you agree that 2560 can be = left alone=20 for Responder
ID's key ID CHOICE being SHA-1 = based?"

>=20 -----Original Message-----
> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh = Chokhani;=20 IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
>
> Santosh,
>
>=20 In-line
>
>
> On 4/1/09 10:31 PM, "Santosh = Chokhani"=20 <SChokhani@cygnacom.com> wrote:
>
> >
> = >=20 Stefan,
> >
> > See responses in-line.
>=20 >
> >> -----Original Message-----
> >> = From:=20 Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> = To:=20 Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> = Subject:=20 Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>
>=20 >> Santosh,
> >>
> >> If you are = talking=20 about adding other options to calculate the
> >> = KeyHash value=20 in ResponderID then I strongly disagree.
> >>
> = >>=20 If you add unspecified options you change the properties
> = of the=20 field
> >> from deterministic to a completely unknown=20 value.
> >> It does not matter if RFC2560 isn't = explicit in=20 its description of
> >> the use of the field. The fact = is that=20 OCSP explicitly
> defines this
> >> value and as = such=20 will allow a client to deterministically compare
> >> = this=20 value with the certificate selected to validate the = response
>=20 >> signature.
> >
> > I hope no one is = doing the=20 matching of Responder ID with
> hash of a key
> > = in place=20 of responder signature verification.  That would
> be = real=20 bad.
> >
>
> Yes it would. That is not at all = what I=20 talk about. But a
> client could use this value to locate a=20 responder certificate.
>
> >> If you = allow
>=20 >> other ways to calculate the value but do not provide any = means=20 to
> >> signal what method that was used, then this = feature is=20 lost.
> >
> > The most common use will be to use = this=20 field to prioritize the
> > certificates of the responder = to use=20 for sigature
> verification on the
> > = response.
>=20 >
>
> Do you know this for a fact, or are you=20 guessing?
> If a single implementation verifies that the = certificate=20 used
> to validate the response matches the ResponderID = value,=20 and
> choose to go into an error state because of mismatch, = then=20 we
> have created great problems. So we can't guess. We have = to
> know that no single implementation will fail because of = this.
> And that may be very hard.
>
>
>=20 >>
> >> In worst case we will cause current=20 implementation to fail.
> >
> > That is why I am = asking=20 what problems if any will the vendors have.
> = >
>
>=20 Even if no vendor speaks up here, it will not guarantee = that
> this=20 will not create any problems.
>
> >>
> = >> I=20 really don't think its worth the effort to change this field. = We
>=20 >> have a very large base of implementations that we = really
>=20 don't want
> >> to mess up unless its absolutely=20 necessary.
> >
> > So, we agree that leaving = this field=20 hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new=20 hash functions.  Right?
> >
>
> I fail = to=20 understand this sentence. Despite reading it many
> times=20 over.
>
> > My only reason to align with 5280 is = that if=20 some one were
> ever want
> > to strip off SHA-1 = altogether=20 from their Responder or client,
> > permitting other = methods does=20 it.
> >
>
> I don't believe this argument is = valid as=20 I don't think it is
> possible to strip off SHA-1 in any = reasonable=20 future. In any
> case. If we compare the positive side with = allowing=20 this
> change and the negative consequences to make = OCSP
>=20 incompatible with itself, my choice is easy.
>
>=20 /Stefan

>
> >>
> >> As = the=20 only property of this field is to provide a convenient
> = >>=20 identifier, it is far from absolutely necessary to change = it.
>=20 >> Remember that there is a second choice to to identify = responder=20 by
> >> name. For names we have accepted the = possibility of=20 collisions. In
> >> that comparison, upgrading from = SHA-1 is=20 really redundant.
> >>
> >> = /Stefan
>=20 >>
> >>
> >>
> = >>
>=20 >> On 4/1/09 4:05 PM, "Santosh Chokhani"
>=20 <SChokhani@cygnacom.com> wrote:
> >>
>=20 >>>
> >>> My resident ASN.1 expert = apprised me of=20 the fact that
> >> adding a choice
> = >>> will=20 break backward compatibility.  Thus, extension is a
> = >>=20 fifth option
> >>> (probably third in the=20 priority).
> >>>
> >>> Based on what = I know=20 of OCSP implementations, not changing
> >> anything = in
>=20 >>> terms of bits on the wire and aligning the Key ID = with=20 SKID
> >> in 5280 is
> >>> the best=20 approach.  I do not think it will hurt backward
> = >>=20 compatibility.
> >>>
> >>> OCSP = Responder=20 and OCSP client vendors should speak up if I
> >> am=20 wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh = Chokhani
>=20 >>>> Sent: Tuesday, March 31, 2009 12:51 PM
>=20 >>>> To: 'Massimiliano Pala'; IETF-pkix
>=20 >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
> >>>>
> >>>> = Max,
>=20 >>>>
> >>>> I do not see where and = what=20 extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
>=20 >>>> For key id, we need to enhance or broaden the=20 options.
> >>>>
> >>>>>=20 -----Original Message-----
> >>>>> From:=20 owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20 On Behalf Of
> >> Massimiliano Pala
>=20 >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> = Subject:=20 Re: OCSP RFC (RFC 2560) Dependence on SHA-1
>=20 >>>>>
> >>>>> Hi all,
>=20 >>>>>
> >>>>> as I said during = last=20 meeting - as the use of SHA-1 does
> >>>> not = have=20 any
> >>>>> security implication in the OCSP, = another=20 viable way
> would be to
> >>>>> define = an=20 extension where other digest algorithms can be
> = >>>>=20 added to the
> >>>>> = request/responses.
>=20 >>>>>
> >>>>> It is a simple = addition=20 and does not require any change in
> >>>> the = RFC,=20 it
> >>>>> can be done as a separate document = for=20 those who what to
> >> use other
> = >>>>>=20 digest algorithms.
> >>>>>
>=20 >>>>> After all, isn't this an example of why we=20 allow
> >> extensions to the
> = >>>>>=20 messages ?
> >>>>>
> = >>>>>=20 Later,
> >>>>> Max
>=20 >>>>>
> >>>>>
>=20 >>>>> Santosh Chokhani wrote:
>=20 >>>>>> Tom,
> = >>>>>>
>=20 >>>>>> Adding a new choice and aligning it with = 5280=20 SKID is fine.
> >>>>>>
>=20 >>>>>> I would not add anything about matching = this=20 field with
> >>>>> anything since
>=20 >>>>>> RFC 2560 does not say anything about = it.
>=20 >>>>>>
> >>>>>> If one = were to=20 add something, one should describe how this
> = >>>>>=20 field can
> >>>>>> be used to select from = multiple=20 Responder certificates.
> >>>>>>
>=20 >>>>>>> -----Original Message-----
>=20 >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20 >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
>=20 >>>>>>> To: Santosh Chokhani
>=20 >>>>>>> Cc: IETF-pkix
>=20 >>>>>>> Subject: Re: OCSP RFC (RFC 2560) = Dependence=20 on SHA-1
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 Santosh:
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 The RFC 5280 method just describes "two common
> = >>>>=20 methods for
> >>>>>>> generating key=20 identifiers from the public key"
> = >>>>>>> and=20 says that other methods are acceptable.  The comment
>=20 >>>>> to KeyHash
> = >>>>>>> in=20 RFC 2560 4.2.1 is not as permissive.  Of course, it's
> = >>>> the same
> >>>>>>> = field as=20 SKID, and I would support either stating "if the
>=20 >>>>> KeyHash is
> = >>>>>>> not=20 precisely 20 octets long, it should be matched
> against = the
>=20 >>>>>>> Subject Key Identifier extension of = the=20 signing
> certificate" or
> = >>>>>>>=20 adding another choice like byID [3] OCTET STRING --
>=20 >>>>> matches the value
>=20 >>>>>>> of SKID.
>=20 >>>>>>>
>=20 = >>>>>>>       &nb= sp;        =20 Tom Gindin
> >>>>>>>
>=20 >>>>>>> P.S. - The above opinions are mine, = and not=20 necessarily
> >>>>> those of my
>=20 >>>>>>> employer
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> "Santosh Chokhani"=20 <SChokhani@cygnacom.com> Sent by:
>=20 >>>>>>> owner-ietf-pkix@mail.imc.org
>=20 >>>>>>> 03/26/2009 10:39 PM
>=20 >>>>>>>
> >>>>>>>=20 To
> >>>>>>> "IETF-pkix"=20 <ietf-pkix@imc.org>
> >>>>>>> = cc
>=20 >>>>>>>
> >>>>>>>=20 Subject
> >>>>>>> OCSP RFC (RFC 2560)=20 Dependence on SHA-1
> >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> RFC 2560 dependence on SHA-1 does not = appear=20 to be
> >>>>> difficult to deal
>=20 >>>>>>> with.
>=20 >>>>>>>
> >>>>>>> = Section=20 4.3 lists SHA-1 as mandatory and RSA as
> >>>>=20 optional.  We can
> >>>>>>> update = this to=20 add SHA-2 series as optional.
> = >>>>>>>
>=20 >>>>>>> The Responder ID has SHA-1 = hardwired. =20 But, that is no
> >>>>> different = than
>=20 >>>>>>> key ID extensions in RFC 5280.  = Here are=20 some options
> >> in order of
>=20 >>>>>>> preference:
>=20 >>>>>>>
> >>>>>>> = 1. =20 Align the language with subject key ID language
> in RFC=20 5280.
> >>>>>>>
>=20 >>>>>>> 2.  Keep on using SHA-1.  = This=20 field is not security
> >>>>> relevant.  = RFC
> >>>>>>> 2560 does not even = describe how=20 to use this field.  So,
> >>>>> having=20 SHA-1
> >>>>>>> and accidental or = intentional=20 collisions will not hurt the
> >>>>> = security
>=20 >>>>>>> of the protocol.
>=20 >>>>>>>
> >>>>>>> = 3. =20 If you do not believe in KISS principle, you can
>=20 >>>>> define another
> = >>>>>>>=20 response type and enhance the key ID ASN.1 syntax so
> that=20 hash
> >>>>>>> algorithm is = identified.
>=20 >>>>>>>
> >>>>>>> = 4. =20 Another option is for the Responder to use the
> same=20 hashing
> >>>>>>> algorithm as the one = in the=20 first certID entry.
> >>>>>>>
>=20 >>>>>>>
> >>>>>>> = Santosh=20 Chokhani
> >>>>>>> CygnaCom = Solutions
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>
> >>>>>>
>=20 >>>>>
> >>>>>
>=20 >>>>> --
> >>>>>
>=20 >>>>> Best Regards,
> = >>>>>
>=20 >>>>> Massimiliano Pala
>=20 >>>>>
> >>>>>=20 = --o-----------------------------------------------------------
>=20 >>>>> -------------
> >>>>>=20 Massimiliano Pala [OpenCA Project Manager]
> = >>>>>=20 Massimiliano.Pala@dartmouth.edu
>=20 = >>>>>         = ;    
>=20 >>>>> project.manager@openca.org
>=20 >>>>>
> >>>>> Dartmouth = Computer=20 Science=20 = Dept           &nb= sp;  =20 Home Phone: +1
> >>>>> (603) 369-9332
> = >>>>> PKI/Trust=20 = Laboratory          &nb= sp;           &nbs= p;  =20 Work Phone: +1
> >>>>> (603) 646-9179
> = >>>>>=20 = --o-----------------------------------------------------------
>=20 >>>>> -------------
> = >>>>>
>=20 >>>>> People who think they know everything are a = great=20 annoyance
> >>>> to those
> = >>>>>=20 of us who do.
> >>>>>   --
>=20 >>>>> Isaac Asimov
> = >>>>>
>=20 >>>>
> >>>
> >>
>=20 >>
> >>
>=20 = >
>
>
>

<= /BLOCKQUOTE> ------_=_NextPart_001_01C9B3CD.E106C77B-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32JGsMA018657 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 12:16:54 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32JGsSR018656; Thu, 2 Apr 2009 12:16:54 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32JGhjp018637 for ; Thu, 2 Apr 2009 12:16:53 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 29614 invoked from network); 2 Apr 2009 19:15:37 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 19:15:37 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: Normative reference for 'CA rollover'? Date: Thu, 2 Apr 2009 15:16:42 -0400 Message-ID: In-Reply-To: <49D5089E.8000007@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Normative reference for 'CA rollover'? Thread-Index: AcmzxQ6TiTA2624ySai5iVyy1yerogAAVouA References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> <49D5089E.8000007@cs.tcd.ie> From: "Santosh Chokhani" To: "Stephen Farrell" , "max pritikin" Cc: "Russ Housley" , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: In the real world, given nuances of MSFT CAPI (CRL to be signed using the same key as the certificate in question), what many deployments do for both Root and Sub CA is: have a new DN associated with the new key. Thus, technically there is no roll over. The certificate issuance is manual. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org=20 > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Farrell > Sent: Thursday, April 02, 2009 2:49 PM > To: max pritikin > Cc: Russ Housley; ietf-pkix@imc.org > Subject: Re: Normative reference for 'CA rollover'? >=20 >=20 >=20 > Originally that text was something I wrote when all of PKIX=20 > was going to be done in a single RFC:-) When we split out the=20 > CMP stuff it probably ended up there just because I was a co-author. >=20 > As for doing a BCP, that'd be a fine idea, though I'm not=20 > sure how many CAs actually do use this, so I'd wonder if the=20 > CMP text is correct or sufficient compared to what CAs actually do? >=20 > Stephen. >=20 > max pritikin wrote: > >=20 > >=20 > > Thank you Russ. This is what I was looking for. I'll review and ask=20 > > questions as necessary. > >=20 > > I would support the idea of publishing this information=20 > independently=20 > > from a specific enrollment protocol. > >=20 > > - max > >=20 > > On Apr 2, 2009, at 11:22 AM, Russ Housley wrote: > >=20 > >> Believe it or not, the new-in-old and old-in-new procedure is=20 > >> documented in CMP. Many people fail to find it there. Perhaps it=20 > >> should be extracted from there and published as a BCP. > >> > >> Russ > >> > >> At 10:47 AM 4/2/2009, max pritikin wrote: > >> > >> > >>> Hi folks, > >>> > >>> I'm looking for a normative reference describing how a CA would=20 > >>> 'rollover' to a new keypair or 'modified' certificate. > >>> > >>> RFC5280 includes the following statements about 'rollover', here=20 > >>> quoted with minimal context: > >>> > >>> 4.2.1.10 Name Contraints: > >>> "Name constraints are not applied to self-issued certificates=20 > >>> (unless > >>> the certificate is the final certificate in the path). =20 > (This could > >>> prevent CAs that use name constraints from employing self-issued > >>> certificates to implement key rollover.)" > >>> > >>> 6.1. Basic Path Validation: > >>> "A certificate is self-issued if the same DN appears in=20 > the subject > >>> and issuer fields (the two DNs are the same if they=20 > match according > >>> to the rules specified in Section 7.1). In general,=20 > the issuer and > >>> subject of the certificates that make up a path are=20 > different for > >>> each certificate. However, a CA may issue a=20 > certificate to itself=20 > >>> to > >>> support key rollover or changes in certificate policies. These > >>> self-issued certificates are not counted when=20 > evaluating path length > >>> or name constraints." > >>> > >>> 8. Security Considerations: > >>> "Loss of a CA's private signing key may also be=20 > problematic. The CA > >>> would not be able to produce CRLs or perform normal key=20 > rollover." > >>> > >>> But it does not include a recommended description of this=20 > rollover=20 > >>> process itself. > >>> > >>> RFC3647 does not mention rollover at all, although it does define=20 > >>> 'renewal' and 'rekey'. > >>> > >>> I can find informative discussions of rollover for various CA's=20 > >>> (thanks Google). > >>> > >>> Can somebody point me in the right direction? Is there a=20 > normative=20 > >>> reference or should I be able to infer the "correct"=20 > behavior from=20 > >>> end entity rekey discussions as per the above notes? > >>> > >>> Thank you, > >>> > >>> - max > >>> > >> > >=20 > >=20 >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32ImE8A015560 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 11:48:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32ImEEi015559; Thu, 2 Apr 2009 11:48:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from relay.imagine.ie (dns1.dns.imagine.ie [87.232.1.40]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32Im1w8015540 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 11:48:13 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from mail2.int.imagine.ie (mail2 [87.232.1.153]) by relay.imagine.ie (Postfix) with ESMTP id 8488A32340; Thu, 2 Apr 2009 19:48:00 +0100 (IST) Received: from [10.87.48.2] (dsl-102-234.cust.imagine.ie [87.232.102.234]) by mail2.int.imagine.ie (8.13.4/8.13.4/Debian-3) with ESMTP id n32Ilvce008911 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 2 Apr 2009 19:47:57 +0100 Message-ID: <49D5089E.8000007@cs.tcd.ie> Date: Thu, 02 Apr 2009 19:49:02 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.21 (X11/20090302) MIME-Version: 1.0 To: max pritikin CC: Russ Housley , ietf-pkix@imc.org Subject: Re: Normative reference for 'CA rollover'? References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> In-Reply-To: <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Bayes-Prob: 0.0001 (Score 0) X-Spam-Score: 0.00 () [Hold at 8.00] X-Canit-Stats-ID: 39390268 - 45b1a9638068 (trained as not-spam) X-CanItPRO-Stream: outgoing X-Scanned-By: CanIt (www . roaringpenguin . com) on 87.232.1.53 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Originally that text was something I wrote when all of PKIX was going to be done in a single RFC:-) When we split out the CMP stuff it probably ended up there just because I was a co-author. As for doing a BCP, that'd be a fine idea, though I'm not sure how many CAs actually do use this, so I'd wonder if the CMP text is correct or sufficient compared to what CAs actually do? Stephen. max pritikin wrote: > > > Thank you Russ. This is what I was looking for. I'll review and ask > questions as necessary. > > I would support the idea of publishing this information independently > from a specific enrollment protocol. > > - max > > On Apr 2, 2009, at 11:22 AM, Russ Housley wrote: > >> Believe it or not, the new-in-old and old-in-new procedure is >> documented in CMP. Many people fail to find it there. Perhaps it >> should be extracted from there and published as a BCP. >> >> Russ >> >> At 10:47 AM 4/2/2009, max pritikin wrote: >> >> >>> Hi folks, >>> >>> I'm looking for a normative reference describing how a CA would >>> 'rollover' to a new keypair or 'modified' certificate. >>> >>> RFC5280 includes the following statements about 'rollover', here >>> quoted with minimal context: >>> >>> 4.2.1.10 Name Contraints: >>> "Name constraints are not applied to self-issued certificates >>> (unless >>> the certificate is the final certificate in the path). (This could >>> prevent CAs that use name constraints from employing self-issued >>> certificates to implement key rollover.)" >>> >>> 6.1. Basic Path Validation: >>> "A certificate is self-issued if the same DN appears in the subject >>> and issuer fields (the two DNs are the same if they match according >>> to the rules specified in Section 7.1). In general, the issuer and >>> subject of the certificates that make up a path are different for >>> each certificate. However, a CA may issue a certificate to itself >>> to >>> support key rollover or changes in certificate policies. These >>> self-issued certificates are not counted when evaluating path length >>> or name constraints." >>> >>> 8. Security Considerations: >>> "Loss of a CA's private signing key may also be problematic. The CA >>> would not be able to produce CRLs or perform normal key rollover." >>> >>> But it does not include a recommended description of this rollover >>> process itself. >>> >>> RFC3647 does not mention rollover at all, although it does define >>> 'renewal' and 'rekey'. >>> >>> I can find informative discussions of rollover for various CA's >>> (thanks Google). >>> >>> Can somebody point me in the right direction? Is there a normative >>> reference or should I be able to infer the "correct" behavior from end >>> entity rekey discussions as per the above notes? >>> >>> Thank you, >>> >>> - max >>> >> > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32IjmDC015366 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 11:45:48 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32IjmCN015365; Thu, 2 Apr 2009 11:45:48 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp122.rog.mail.re2.yahoo.com (smtp122.rog.mail.re2.yahoo.com [206.190.53.27]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32IjaEj015340 for ; Thu, 2 Apr 2009 11:45:47 -0700 (MST) (envelope-from thierry.moreau@connotech.com) Received: (qmail 23049 invoked from network); 2 Apr 2009 18:45:36 -0000 Received: from unknown (HELO connotech.com) (thierry.moreau@209.148.165.15 with plain) by smtp122.rog.mail.re2.yahoo.com with SMTP; 2 Apr 2009 18:45:36 -0000 X-YMail-OSG: X7WRd_sVM1kRKWF6bxp8KhGtFudFjBgZQp.1qny5WdgXz2cvp.fZ6URLaTH9zvH_Eg-- X-Yahoo-Newman-Property: ymail-3 Message-ID: <49D50A53.4070307@connotech.com> Date: Thu, 02 Apr 2009 13:56:19 -0500 From: Thierry Moreau User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:1.4) Gecko/20030624 Netscape/7.1 (ax) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Russ Housley CC: max pritikin , ietf-pkix@imc.org Subject: Re: Normative reference for 'CA rollover'? References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> In-Reply-To: <20090402162231.3E53E9A476F@odin.smetech.net> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Russ Housley wrote: > > Believe it or not, the new-in-old and old-in-new procedure is documented > in CMP. Many people fail to find it there. Perhaps it should be > extracted from there and published as a BCP. > Well, that's already a specifications-based "solution," i.e. better than nothing. I should have notice it before. If you follow the "catastrophic failure mode" analysis, you soon realize the equivalence between the failure mode that would trigger an emergency rollover and the very catastrophic failure mode (of the new-in-old and old-in-new procedure). Hence, not very secure. But you know because you are specifications-based. My suspicion is that if you attempt to make it a standalone document, you start another round of discussions on better alternate solutions (because you make security limitations more conspicuous than they are now), falling again in the "security by management exhaustion" vicious circle. But you (the community of which Max is representative by his question) do have a solution. Is there a need for a better slution? I guess not. (I actually think an equivalent procedure should be implemented in DNSSEC validating resolvers instead of comprehensive RFC5011 support, fulfilling the expectations of the vast majority of Internet users with respect to DNSSEC root key trustworthiness.) Regards, > Russ > > At 10:47 AM 4/2/2009, max pritikin wrote: > > >> Hi folks, >> >> I'm looking for a normative reference describing how a CA would >> 'rollover' to a new keypair or 'modified' certificate. >> >> RFC5280 includes the following statements about 'rollover', here >> quoted with minimal context: >> >> 4.2.1.10 Name Contraints: >> "Name constraints are not applied to self-issued certificates >> (unless >> the certificate is the final certificate in the path). (This could >> prevent CAs that use name constraints from employing self-issued >> certificates to implement key rollover.)" >> >> 6.1. Basic Path Validation: >> "A certificate is self-issued if the same DN appears in the subject >> and issuer fields (the two DNs are the same if they match according >> to the rules specified in Section 7.1). In general, the issuer and >> subject of the certificates that make up a path are different for >> each certificate. However, a CA may issue a certificate to itself >> to >> support key rollover or changes in certificate policies. These >> self-issued certificates are not counted when evaluating path length >> or name constraints." >> >> 8. Security Considerations: >> "Loss of a CA's private signing key may also be problematic. The CA >> would not be able to produce CRLs or perform normal key rollover." >> >> But it does not include a recommended description of this rollover >> process itself. >> >> RFC3647 does not mention rollover at all, although it does define >> 'renewal' and 'rekey'. >> >> I can find informative discussions of rollover for various CA's >> (thanks Google). >> >> Can somebody point me in the right direction? Is there a normative >> reference or should I be able to infer the "correct" behavior from end >> entity rekey discussions as per the above notes? >> >> Thank you, >> >> - max >> > > -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, Qc Canada H2M 2A1 Tel.: (514)385-5691 Fax: (514)385-5900 web site: http://www.connotech.com e-mail: thierry.moreau@connotech.com Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32HOker009120 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 10:24:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32HOkRO009119; Thu, 2 Apr 2009 10:24:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from sj-iport-3.cisco.com (sj-iport-3.cisco.com [171.71.176.72]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32HOZJu009103 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Thu, 2 Apr 2009 10:24:45 -0700 (MST) (envelope-from pritikin@cisco.com) X-IronPort-AV: E=Sophos;i="4.39,315,1235952000"; d="scan'208";a="149671683" Received: from sj-dkim-4.cisco.com ([171.71.179.196]) by sj-iport-3.cisco.com with ESMTP; 02 Apr 2009 17:24:34 +0000 Received: from sj-core-3.cisco.com (sj-core-3.cisco.com [171.68.223.137]) by sj-dkim-4.cisco.com (8.12.11/8.12.11) with ESMTP id n32HOYUA001539; Thu, 2 Apr 2009 10:24:34 -0700 Received: from [192.168.1.101] (sjc-vpn5-1659.cisco.com [10.21.94.123]) by sj-core-3.cisco.com (8.13.8/8.13.8) with ESMTP id n32HOXf7001816; Thu, 2 Apr 2009 17:24:34 GMT Cc: ietf-pkix@imc.org Message-Id: <52B7B6AB-2B7D-4272-8621-578571AB0A80@cisco.com> From: max pritikin To: Russ Housley In-Reply-To: <20090402162231.3E53E9A476F@odin.smetech.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Normative reference for 'CA rollover'? Date: Thu, 2 Apr 2009 12:24:33 -0500 References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> <20090402162231.3E53E9A476F@odin.smetech.net> X-Mailer: Apple Mail (2.930.3) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=2418; t=1238693074; x=1239557074; c=relaxed/simple; s=sjdkim4002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=pritikin@cisco.com; z=From:=20max=20pritikin=20 |Subject:=20Re=3A=20Normative=20reference=20for=20'CA=20rol lover'? |Sender:=20; bh=iVnriq0ZJB212pieNLLFFvdly3fxfQrH5CDY+DZa7dw=; b=QAV9Eyx+SmJMNlsO3k1ch1OPPjRw9gHZJlFo/F32zIBHj2j7oWJl51No7H QPMME2T5Ws2jcTHe11Zt+3P2MzDVhpXsdtPAxwwkA96Tj5KkxL/n/PDWXTry svjvXbkCRw; Authentication-Results: sj-dkim-4; header.From=pritikin@cisco.com; dkim=pass ( sig from cisco.com/sjdkim4002 verified; ); Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Thank you Russ. This is what I was looking for. I'll review and ask questions as necessary. I would support the idea of publishing this information independently from a specific enrollment protocol. - max On Apr 2, 2009, at 11:22 AM, Russ Housley wrote: > Believe it or not, the new-in-old and old-in-new procedure is > documented in CMP. Many people fail to find it there. Perhaps it > should be extracted from there and published as a BCP. > > Russ > > At 10:47 AM 4/2/2009, max pritikin wrote: > > >> Hi folks, >> >> I'm looking for a normative reference describing how a CA would >> 'rollover' to a new keypair or 'modified' certificate. >> >> RFC5280 includes the following statements about 'rollover', here >> quoted with minimal context: >> >> 4.2.1.10 Name Contraints: >> "Name constraints are not applied to self-issued certificates >> (unless >> the certificate is the final certificate in the path). (This could >> prevent CAs that use name constraints from employing self-issued >> certificates to implement key rollover.)" >> >> 6.1. Basic Path Validation: >> "A certificate is self-issued if the same DN appears in the subject >> and issuer fields (the two DNs are the same if they match according >> to the rules specified in Section 7.1). In general, the issuer and >> subject of the certificates that make up a path are different for >> each certificate. However, a CA may issue a certificate to itself >> to >> support key rollover or changes in certificate policies. These >> self-issued certificates are not counted when evaluating path >> length >> or name constraints." >> >> 8. Security Considerations: >> "Loss of a CA's private signing key may also be problematic. The >> CA >> would not be able to produce CRLs or perform normal key rollover." >> >> But it does not include a recommended description of this rollover >> process itself. >> >> RFC3647 does not mention rollover at all, although it does define >> 'renewal' and 'rekey'. >> >> I can find informative discussions of rollover for various CA's >> (thanks Google). >> >> Can somebody point me in the right direction? Is there a normative >> reference or should I be able to infer the "correct" behavior from >> end >> entity rekey discussions as per the above notes? >> >> Thank you, >> >> - max >> > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32GO5pH004684 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 09:24:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32GO5dN004683; Thu, 2 Apr 2009 09:24:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stl-smtpout-01.boeing.com (stl-smtpout-01.boeing.com [130.76.96.56]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32GNskM004675 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 09:24:05 -0700 (MST) (envelope-from Dennis.P.Glatting@boeing.com) Received: from blv-av-01.boeing.com (blv-av-01.boeing.com [130.247.48.231]) by stl-smtpout-01.ns.cs.boeing.com (8.14.0/8.14.0/8.14.0/SMTPOUT) with ESMTP id n32GNpJg023845 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Thu, 2 Apr 2009 11:23:52 -0500 (CDT) Received: from blv-av-01.boeing.com (localhost [127.0.0.1]) by blv-av-01.boeing.com (8.14.0/8.14.0/DOWNSTREAM_RELAY) with ESMTP id n32GNp3I005739; Thu, 2 Apr 2009 09:23:51 -0700 (PDT) Received: from XCH-NWBH-11.nw.nos.boeing.com (xch-nwbh-11.nw.nos.boeing.com [130.247.55.84]) by blv-av-01.boeing.com (8.14.0/8.14.0/UPSTREAM_RELAY) with ESMTP id n32GNoau005700; Thu, 2 Apr 2009 09:23:50 -0700 (PDT) Received: from XCH-NW-10V2.nw.nos.boeing.com ([130.247.60.54]) by XCH-NWBH-11.nw.nos.boeing.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 2 Apr 2009 09:23:51 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: Renew/Rekey/Modification Date: Thu, 2 Apr 2009 09:23:43 -0700 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSwACiN0dA= References: <49D2D476.3030000@lockstep.com.au> From: "EXT-Glatting, Dennis P" To: "Santosh Chokhani" , , X-OriginalArrivalTime: 02 Apr 2009 16:23:51.0169 (UTC) FILETIME=[68900F10:01C9B3AF] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > > > > Colleagues, > > > > There are a few things about certificate "renewal" and > > "re-key" that have long confounded me. Things only seem to > > have got more convoluted in RFC 3647 and -- no offence! -- in > > newer Certificate Policies like the > > US FPKI Policy Authority document. Can anyone help me > > understand the > > rationale for the some of the following scenarios? Thanks in advance! > > > > > > > > Re-key is said (in the FPKI CP) to be a good idea because the > > older a key gets, the more susceptible it is to loss and > > compromise. Fair enough, but why wouldn't that consideration > > be factored into the chosen certificate validity period? >=20 > It should be. The goal here is to use the current certificate to > authenticate to create new certificates. >=20 I'm a little confused here. If we're getting rid of the key because it's getting old, then how is it young enough to validate a new key? A problem is there is an implicit "continuance of legacy" in the new key of the old key that doesn't end with the immediate generation but follows all generations of the original key. I'm not suggesting something is "wrong" but there seems like there is a logic error somewhere.=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32GMdji004624 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 09:22:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32GMdgg004623; Thu, 2 Apr 2009 09:22:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32GMSnQ004613 for ; Thu, 2 Apr 2009 09:22:39 -0700 (MST) (envelope-from housley@vigilsec.com) Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id E377F9A4797; Thu, 2 Apr 2009 12:22:31 -0400 (EDT) X-Virus-Scanned: amavisd-new at smetech.net Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id xfsTLmir1r32; Thu, 2 Apr 2009 12:22:27 -0400 (EDT) Received: from THINKPADR52.vigilsec.com (pool-71-191-197-15.washdc.fios.verizon.net [71.191.197.15]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id 3E53E9A476F; Thu, 2 Apr 2009 12:22:31 -0400 (EDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Thu, 02 Apr 2009 12:22:21 -0400 To: max pritikin , ietf-pkix@imc.org From: Russ Housley Subject: Re: Normative reference for 'CA rollover'? In-Reply-To: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Message-Id: <20090402162231.3E53E9A476F@odin.smetech.net> Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Believe it or not, the new-in-old and old-in-new procedure is documented in CMP. Many people fail to find it there. Perhaps it should be extracted from there and published as a BCP. Russ At 10:47 AM 4/2/2009, max pritikin wrote: >Hi folks, > >I'm looking for a normative reference describing how a CA would >'rollover' to a new keypair or 'modified' certificate. > >RFC5280 includes the following statements about 'rollover', here >quoted with minimal context: > > 4.2.1.10 Name Contraints: > "Name constraints are not applied to self-issued certificates >(unless > the certificate is the final certificate in the path). (This could > prevent CAs that use name constraints from employing self-issued > certificates to implement key rollover.)" > > 6.1. Basic Path Validation: > "A certificate is self-issued if the same DN appears in the subject > and issuer fields (the two DNs are the same if they match according > to the rules specified in Section 7.1). In general, the issuer and > subject of the certificates that make up a path are different for > each certificate. However, a CA may issue a certificate to itself >to > support key rollover or changes in certificate policies. These > self-issued certificates are not counted when evaluating path length > or name constraints." > > 8. Security Considerations: > "Loss of a CA's private signing key may also be problematic. The CA > would not be able to produce CRLs or perform normal key rollover." > >But it does not include a recommended description of this rollover >process itself. > >RFC3647 does not mention rollover at all, although it does define >'renewal' and 'rekey'. > >I can find informative discussions of rollover for various CA's >(thanks Google). > >Can somebody point me in the right direction? Is there a normative >reference or should I be able to infer the "correct" behavior from end >entity rekey discussions as per the above notes? > >Thank you, > >- max > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32FYO7P001732 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 08:34:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32FYOMA001731; Thu, 2 Apr 2009 08:34:24 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp117.rog.mail.re2.yahoo.com (smtp117.rog.mail.re2.yahoo.com [68.142.225.233]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32FYDJx001708 for ; Thu, 2 Apr 2009 08:34:24 -0700 (MST) (envelope-from thierry.moreau@connotech.com) Received: (qmail 55146 invoked from network); 2 Apr 2009 15:34:13 -0000 Received: from unknown (HELO connotech.com) (thierry.moreau@209.148.165.15 with plain) by smtp117.rog.mail.re2.yahoo.com with SMTP; 2 Apr 2009 15:34:13 -0000 X-YMail-OSG: d7APHhgVM1mCDJi2Ogrx_VHWCsY.l14nkiq3OnSDlodr8899SeMo7KEqh2irbRHGWA-- X-Yahoo-Newman-Property: ymail-3 Message-ID: <49D4DD78.7000200@connotech.com> Date: Thu, 02 Apr 2009 10:44:56 -0500 From: Thierry Moreau User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:1.4) Gecko/20030624 Netscape/7.1 (ax) X-Accept-Language: en-us, en MIME-Version: 1.0 To: max pritikin CC: ietf-pkix@imc.org Subject: Re: Normative reference for 'CA rollover'? References: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> In-Reply-To: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: max pritikin wrote: > > > Hi folks, > > I'm looking for a normative reference describing how a CA would > 'rollover' to a new keypair or 'modified' certificate. > > RFC5280 includes the following statements about 'rollover', here quoted > with minimal context: > > 4.2.1.10 Name Contraints: > "Name constraints are not applied to self-issued certificates (unless > the certificate is the final certificate in the path). (This could > prevent CAs that use name constraints from employing self-issued > certificates to implement key rollover.)" > > 6.1. Basic Path Validation: > "A certificate is self-issued if the same DN appears in the subject > and issuer fields (the two DNs are the same if they match according > to the rules specified in Section 7.1). In general, the issuer and > subject of the certificates that make up a path are different for > each certificate. However, a CA may issue a certificate to itself to > support key rollover or changes in certificate policies. These > self-issued certificates are not counted when evaluating path length > or name constraints." > > 8. Security Considerations: > "Loss of a CA's private signing key may also be problematic. The CA > would not be able to produce CRLs or perform normal key rollover." > > But it does not include a recommended description of this rollover > process itself. > > RFC3647 does not mention rollover at all, although it does define > 'renewal' and 'rekey'. > > I can find informative discussions of rollover for various CA's (thanks > Google). > > Can somebody point me in the right direction? Is there a normative > reference or should I be able to infer the "correct" behavior from end > entity rekey discussions as per the above notes? > This is a BIG issue from early days of e-commerce. VISA International had a patent (now extint due to non-payment of renewal fees) for essentially the RFC5011 solution that was selected by IETF for DNSSEC. You may have a look at http://www.watersprings.org/pub/id/draft-moreau-pkix-takrem-01.txt as the most sensible solution known to mankind (half jocking). Actually, there is no solution to this problem: either a) you admit that any key management scheme for top-level public key rollover has a "catastrophic failure mode" and you may agree with the preceding paragraph after some investigation, or b) you play the head-in-the-sand game, or security by management exhaustion (see last paragraph below) and then you may field an indefinite scheme. Obviously, b) has been emperically verified repeatedly. Security by management exhaustion: you recursively (or iteratively since we are speaking management) discuss the recourse to yet another security layer (crypto-based) as a means to lower the operating costs of having key custodians actually travelling with key material ... until the manager's attention time is elapsed. Then you field whatever technology is available, irrespective of the discussion. > Thank you, You are most welcome, regards, -- - Thierry Moreau Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32F5t15099570 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 08:05:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32F5t2g099569; Thu, 2 Apr 2009 08:05:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32F5rSq099563 for ; Thu, 2 Apr 2009 08:05:53 -0700 (MST) (envelope-from CWallace@cygnacom.com) Received: (qmail 27436 invoked from network); 2 Apr 2009 15:04:48 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 15:04:48 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3A4.843C68C1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 11:05:52 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABIERYQACTItw References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Carl Wallace" To: "Hallam-Baker, Phillip" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B3A4.843C68C1 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the case that we have an RSA1024-SHA1 signature on a document signed using a key that was subsequently compromised and the question the infrastructure needs to answer is whether the certificate was valid at the point it was signed. This was one of the original core use cases in the design of OCSP. =20 Ignoring hash algorithms for the moment, how does a client indicate its time of interest to the OCSP responder? ------_=_NextPart_001_01C9B3A4.843C68C1 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on SHA-1

The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the = case that we have an RSA1024-SHA1 signature on a document signed using a key that = was subsequently compromised and the question the infrastructure needs to = answer is whether the certificate was valid at the point it was signed. This was = one of the original core use cases in the design of OCSP.

 

Ignoring hash algorithms for the moment, how does a = client indicate its time of interest to the OCSP = responder?

------_=_NextPart_001_01C9B3A4.843C68C1-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32F0mdw099249 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 08:00:48 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32F0ml2099248; Thu, 2 Apr 2009 08:00:48 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32F0lOv099240 for ; Thu, 2 Apr 2009 08:00:47 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 27361 invoked from network); 2 Apr 2009 14:59:42 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 14:59:41 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3A3.CD82FBBD" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 Date: Thu, 2 Apr 2009 11:00:46 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 Thread-Index: AcmzjAxNtzBfJ61Ws0OScv3P3Q+ASgAFdSIfAABzz5A= References: From: "Santosh Chokhani" To: "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B3A3.CD82FBBD Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable No objection. =20 Steve can direct us to change this now or later since the current text is unlikely to lead some one astray. ________________________________ From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan Santesson Sent: Thursday, April 02, 2009 10:47 AM To: Stefan Santesson; IETF-pkix Subject: Re: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 =09 =09 Small correction, =09 I copied the text from the wrong draft, as you may see from the old title. =09 The actual text from draft-ietf-pkix-authorityclearanceconstraints-02 Is almost the same and has the same problem: =09 When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end PKC, the processing described in this section or an equivalent algorithm MUST be included in the certification path validation. The processing is presented as additions to the certification path validation algorithm described in section 6 of [RFC5280]. =09 =09 =09 This is just a nit that could be fixed at any later update. I would suggest the following small change: =09 =09 When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end PKC, the processing described in this section or an equivalent algorithm MUST be performed in addition to the certification path validation algorithm described in section 6 of [RFC5280]. =09 =09 =09 /Stefan =09 =09 =09 On 4/2/09 2:10 PM, "Stefan Santesson" wrote: =09 =09 I found a problem with draft-turner-caclearanceconstraints-02.txt =09 Section 4.1.1. Certification Path Processing states =09 When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end certificate, PKC, the processing described in this section or an equivalent algorithm MUST be included in the certification path validation. =09 It is problematic, and unnecessary to require ca clearance constraints processing to be "included" in certification path validation. None of the clearance constraints information is needed to determine the validity of the certificate, and as such it does not be processed as an integrated process. =09 It would be perfectly valid for an application who choose to rely on the clearance information, to process clearance constraints as a post process, i.e. after path validation is completed. =09 A requirement to integrate caclearance constraints into path validation would make this a lot harder to implement as it would require modification to core security components. =09 Stefan Santesson AAA-sec.com =09 =09 =09 =09 =09 ------_=_NextPart_001_01C9B3A3.CD82FBBD Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Re: Problem with = draft-ietf-pkix-authorityclearanceconstraints-02
No objection.
 
Steve can direct us to change this now or later = since the=20 current text is unlikely to lead some one = astray.


From: owner-ietf-pkix@mail.imc.org = [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan=20 Santesson
Sent: Thursday, April 02, 2009 10:47 = AM
To:=20 Stefan Santesson; IETF-pkix
Subject: Re: Problem with=20 draft-ietf-pkix-authorityclearanceconstraints-02

Small correction,

I copied the text = from the=20 wrong draft, as you may see from the old title.

The actual text = from=20  draft-ietf-pkix-authorityclearanceconstraints-02 Is almost the = same and=20 has the same problem:

  When=20 processing Authority Clearance Constraints certificate=20 extension
   for the purposes of validating = Clearance=20 attribute in the end PKC,
   the processing = described in=20 this section or an equivalent algorithm
   MUST be=20 included in the certification path validation.=20  The
   processing is presented as additions to = the=20 certification path
   validation algorithm described = in=20 section 6 of = [RFC5280].



This=20 is just a nit that could be fixed at any later update. I would suggest = the=20 following small change:


   When processing = Authority=20 Clearance Constraints certificate extension
   for = the=20 purposes of validating Clearance attribute in the end=20 PKC,
   the processing described in this section or = an=20 equivalent algorithm
   MUST be performed in = addition=20 to the certification path
   validation algorithm = described=20 in section 6 of=20 = [RFC5280].



/Stefan



On 4/2/09 2:10 PM, "Stefan = Santesson"=20 <stefan@aaa-sec.com>=20 wrote:

I found a problem with=20 draft-turner-caclearanceconstraints-02.txt

Section=20
4.1.1. Certification Path=20 Processing=20  states

  When=20 processing Authority Clearance Constraints certificate=20 extension
   for the purposes of validating = Clearance=20 attribute in the end certificate,
PKC,
  the processing = described in=20 this section or an equivalent algorithm
   MUST be = included in the certification path=20 validation.

It=20 is problematic, and unnecessary to require ca clearance constraints=20 processing to be “included” in certification path = validation.
None of the=20 clearance constraints information is needed to determine the = validity of the=20 certificate, and as such it does not be processed as an integrated=20 process.

It would be perfectly valid for an application who = choose to=20 rely on the clearance information, to process clearance constraints = as a=20 post process, i.e. after path validation is completed.

A = requirement=20 to integrate caclearance constraints into path validation would make = this a=20 lot harder to implement as it would require modification to core = security=20 components.

Stefan=20 Santesson
AAA-sec.com




------_=_NextPart_001_01C9B3A3.CD82FBBD-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32Ex0jj099109 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 07:59:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32Ex0TD099108; Thu, 2 Apr 2009 07:59:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32EwmBI099098 for ; Thu, 2 Apr 2009 07:58:58 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 27334 invoked from network); 2 Apr 2009 14:57:43 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 14:57:43 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B3A3.86E3D176" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 10:58:47 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABIERYQACKGjw References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B3A3.86E3D176 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Phil, =20 RFC 2560 already allows you to specify an algorithm for hash of cogent data in the request. BTW, that data is not certificate, but issuer DN and Issuer key hash separately. =20 So, I do not see an issue with respect to security in RFC 2560 except to add other algorithms to Section 4.3 ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 10:18 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 Let us divide the problem into two. KEYID actually has two (separable) uses: =20 =20 1) Client to server as a hash index to the cert 2) (Possibly implicit) Server to client as an authenticator of the actual cert =20 The situation I see here is this: The client has obtained a cert, it needs to know the status thereof. So it takes a digest of the certificate using SHA1 and sends it to the server which then uses it as a lookup key. =20 For this particular part of the problem, there does not appear to be any security concern. We are using SHA1 because it is a large hash function that has a minimal chance of accidental collision. But at this point we have not actually relied on the hash function for authentication purposes at either end. It is not being used as a cryptographic message digest. =20 So this seems to fit into a class that EKR once mentioned of cases where we use SHA1 or MD5 as a hash, not a message digest. =20 =20 The second half of the equation is where we can end up in (some) difficulty. Particularly if we are working in an archival situation. Imagine the case that we have an RSA1024-SHA1 signature on a document signed using a key that was subsequently compromised and the question the infrastructure needs to answer is whether the certificate was valid at the point it was signed. This was one of the original core use cases in the design of OCSP. =20 In this case there is little choice but to use the SHA1 hash as a message digest and then we have the problem. =20 =20 The simple fix here is to allow the server to specify its own digest for the actual cert whose status is being reported. You can think of it as being like using 96 bits of a digest as a hash and then supplying the full 256 bits to confirm that the located object was not subject to a collision. =20 =20 The former Area Director, now the IETF chair has expressed concern as to the long term management of cryptographic algorithms on many occasions. I think that it would be very unwise for the rest of us to dismiss the chance that he has a really, really good and specific reason for this concern. =20 While the specific reason may not be imminent, the problem may well hit many years down the line after infrastructure is widely deployed and embedded. We should avoid creating additional Y2K type problems. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B3A3.86E3D176 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
Phil,
 
RFC 2560 already allows you to specify an = algorithm for hash=20 of cogent data in the request.  BTW, that data is not certificate, = but=20 issuer DN and Issuer key hash separately.
 
So, I do not see an issue with respect to security = in RFC 2560=20 except to add other algorithms to Section 4.3


From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 10:18=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

Let us = divide the problem=20 into two. KEYID actually has two (separable) uses:
 
 
1) Client to server as a = hash index to=20 the cert
2) (Possibly implicit) = Server to client=20 as an authenticator of the actual cert
 
The situation I see here is = this: The=20 client has obtained a cert, it needs to know the status thereof. So it = takes a=20 digest of the certificate using SHA1 and sends it to the server which = then=20 uses it as a lookup key.
 
For this particular part of = the problem,=20 there does not appear to be any security concern. We are using SHA1 = because it=20 is a large hash function that has a minimal chance of accidental = collision.=20 But at this point we have not actually relied on the hash function for = authentication purposes at either end. It is not being used as a = cryptographic=20 message digest.
 
So this seems to fit into a = class that=20 EKR once mentioned of cases where we use SHA1 or MD5 as a hash, not a = message=20 digest.
 
 
The second half of the = equation is where=20 we can end up in (some) difficulty. Particularly if we are working in = an=20 archival situation. Imagine the case that we have an RSA1024-SHA1 = signature on=20 a document signed using a key that was subsequently compromised and = the=20 question the infrastructure needs to answer is whether the certificate = was=20 valid at the point it was signed. This was one of the original core = use cases=20 in the design of OCSP.
 
In this case there is = little choice but=20 to use the SHA1 hash as a message digest and then we have the=20 problem.
 
 
The simple fix here is to = allow the=20 server to specify its own digest for the actual cert whose status is = being=20 reported. You can think of it as being like using 96 bits of a = digest as=20 a hash and then supplying the full 256 bits to confirm that the = located object=20 was not subject to a collision.
 
 
The former Area Director, = now the IETF=20 chair has expressed concern as to the long term management of = cryptographic=20 algorithms on many occasions. I think that it would be very unwise for = the=20 rest of us to dismiss the chance that he has a really, really good and = specific reason for this concern.
 
While the specific reason = may not be=20 imminent, the problem may well hit many years down the line after=20 infrastructure is widely deployed and embedded. We should avoid = creating=20 additional Y2K type problems.
 


From: Santosh Chokhani=20 [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54=20 AM
To: Hallam-Baker, Phillip; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I have no objection to having an extension, but = if in the=20 long term SHA-1 will not be there, it seems defining a new response = type (say=20 basic 2) would be the way to go so that SHA-1 based key ID can be = stripped=20 off.
 
If SHA-1 is not getting ripped off in the long = term, I=20 do not see value in extension except that it may make every one happy: = those=20 who do not care will not include it on the Server side and/or = will ignore=20 it on the client side.
 
It would appear that the extension should be=20 NC.
 
Phil,
 
I would not respond to the arguments on KISS and = security=20 since in this case both are straightforward.  Also, in this = thread, the=20 comments were not meant for or directed at you.
 
As you know, I have provided extensive comments = to you when=20 you first posted the OCSP Agility I-D and my position and reasons are = matter=20 of PKIX archives for anyone to scrutinize.  When you ignore every = single=20 cogent point, there is no sense in me commenting on next = iteration.  I do=20 think that the OCSP Agility I-D is a solution looking for a problem = that I do=20 not see.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, = 2009 12:53=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I think = we have no choice=20 but to leave the Key ID CHOICE to be SHA-1 based.
 
But that does not = preclude adding an=20 extension that allows the KeyID to be specified using a stronger = algorithm.=20 There are two reasons for this:
 
1) Optics, even if there = is no security=20 implication, a protocol that uses weak crypto necessitates an = (expensive)=20 security review to prove that there is no problem. And these must be = performed repeatedly by many different parties as relying on the = analysis of=20 others is a good way to cause issues. Been there, done = that.
 
2) We are designing for = long time=20 spans, ten years or more. While simple compressor collisions may not = be a=20 concern, there is no guarantee that the attacks will stop at that = point. MD4=20 has been broken repeatedly and they are now at the stage of jumping = up and=20 down on the little pieces. It will probably happen to MD5 and we = should be=20 cautious in case it happens to SHA-1.
 
 
On the claim of 'Keep it = simple=20 STUPID', I find it rather offensive to have my position = characterized as=20 stupid. My designs are not exactly known for being verbose or overly = elaborate. If I propose something it is because there is a reason. = It is=20 very easy to defend the status quo by derriding proposals as = unnecessary,=20 but the fact is that making OCSP too simple will simply cause the = complexity=20 to blow out somewhere else.
 
There is an architectural = princple of=20 modular design that demands that the core of PKIX as it now stands = (the=20 certificate profile and OCSP) be capable of stand alone use. We = cannot fix=20 issues in OCSP with LTANS or other layered-on protocols as some have = proposed. It does not simplify my OCSP deployment to have to graft = on an=20 entire different protocol in addition or to re-engineer my document = archival=20 protocol to cover defects in OCSP.
 
 
Simply adding new = algorithms to a=20 protocol does nothing to improve security. You only improve security = if you=20 withdraw insecure algorithms from use.
 
To make the system work = you have to=20 have a means of negotiating between the client and the server. = Otherwise=20 there is no way for an OCSP responder to ensure that it receives a = secure,=20 supported response to querries for certificates that do not = exist yet=20 or are not known to the responder.
 
In the case of an OCSP = responder being=20 driven by CRLs collected from various sources, there is no way for = the CA to=20 know if a certificate even exists, all it knows is if the status is=20 definitively revoked.
 
In the case of many = transactional=20 architectures the OCSP validation is performed independently of = certificate=20 chain validation.
 
 
Experience of small scale = PKI=20 deployment in which any box can be upgraded at will is simply not=20 representative of large scale real world deployment.
 


From:=20 owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent:=20 Wed 4/1/2009 8:39 PM
To: Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1


I am saying that "Do you agree that 2560 can be = left alone=20 for Responder
ID's key ID CHOICE being SHA-1 based?"

>=20 -----Original Message-----
> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh = Chokhani;=20 IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
>
> Santosh,
>
>=20 In-line
>
>
> On 4/1/09 10:31 PM, "Santosh = Chokhani"=20 <SChokhani@cygnacom.com> wrote:
>
> >
> = >=20 Stefan,
> >
> > See responses in-line.
>=20 >
> >> -----Original Message-----
> >> = From:=20 Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> = To:=20 Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> = Subject: Re:=20 OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >>=20 Santosh,
> >>
> >> If you are talking about = adding=20 other options to calculate the
> >> KeyHash value in = ResponderID=20 then I strongly disagree.
> >>
> >> If you = add=20 unspecified options you change the properties
> of the = field
>=20 >> from deterministic to a completely unknown value.
> = >>=20 It does not matter if RFC2560 isn't explicit in its description = of
>=20 >> the use of the field. The fact is that OCSP = explicitly
>=20 defines this
> >> value and as such will allow a client = to=20 deterministically compare
> >> this value with the = certificate=20 selected to validate the response
> >> = signature.
>=20 >
> > I hope no one is doing the matching of Responder = ID=20 with
> hash of a key
> > in place of responder = signature=20 verification.  That would
> be real bad.
>=20 >
>
> Yes it would. That is not at all what I talk = about. But=20 a
> client could use this value to locate a responder=20 certificate.
>
> >> If you allow
> >> = other=20 ways to calculate the value but do not provide any means to
> = >>=20 signal what method that was used, then this feature is lost.
> = >
> > The most common use will be to use this field to=20 prioritize the
> > certificates of the responder to use for = sigature
> verification on the
> > response.
>=20 >
>
> Do you know this for a fact, or are you=20 guessing?
> If a single implementation verifies that the = certificate=20 used
> to validate the response matches the ResponderID value, = and
> choose to go into an error state because of mismatch, = then=20 we
> have created great problems. So we can't guess. We have=20 to
> know that no single implementation will fail because of=20 this.
> And that may be very hard.
>
>
>=20 >>
> >> In worst case we will cause current = implementation=20 to fail.
> >
> > That is why I am asking what = problems if=20 any will the vendors have.
> >
>
> Even if no = vendor=20 speaks up here, it will not guarantee that
> this will not = create any=20 problems.
>
> >>
> >> I really don't = think its=20 worth the effort to change this field. We
> >> have a = very large=20 base of implementations that we really
> don't want
> = >>=20 to mess up unless its absolutely necessary.
> >
> = > So, we=20 agree that leaving this field hard wired to SHA-1 is ok and
> = >=20 2560 can easily accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite = reading it=20 many
> times over.
>
> > My only reason to = align with=20 5280 is that if some one were
> ever want
> > to = strip off=20 SHA-1 altogether from their Responder or client,
> > = permitting=20 other methods does it.
> >
>
> I don't believe = this=20 argument is valid as I don't think it is
> possible to strip = off SHA-1=20 in any reasonable future. In any
> case. If we compare the = positive=20 side with allowing this
> change and the negative consequences = to make=20 OCSP
> incompatible with itself, my choice is = easy.
>
>=20 /Stefan

>
> >>
> >> As = the only=20 property of this field is to provide a convenient
> >>=20 identifier, it is far from absolutely necessary to change = it.
>=20 >> Remember that there is a second choice to to identify = responder=20 by
> >> name. For names we have accepted the possibility = of=20 collisions. In
> >> that comparison, upgrading from = SHA-1 is=20 really redundant.
> >>
> >> /Stefan
>=20 >>
> >>
> >>
> >>
> = >>=20 On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com>=20 wrote:
> >>
> >>>
> >>> My = resident ASN.1 expert apprised me of the fact that
> >> = adding a=20 choice
> >>> will break backward compatibility.  = Thus,=20 extension is a
> >> fifth option
> >>> = (probably=20 third in the priority).
> >>>
> >>> = Based on=20 what I know of OCSP implementations, not changing
> >> = anything=20 in
> >>> terms of bits on the wire and aligning the = Key ID=20 with SKID
> >> in 5280 is
> >>> the best=20 approach.  I do not think it will hurt backward
> = >>=20 compatibility.
> >>>
> >>> OCSP = Responder and=20 OCSP client vendors should speak up if I
> >> am = wrong.
>=20 >>>
> >>>> -----Original = Message-----
>=20 >>>> From: Santosh Chokhani
> >>>> = Sent:=20 Tuesday, March 31, 2009 12:51 PM
> >>>> To: = 'Massimiliano=20 Pala'; IETF-pkix
> >>>> Subject: RE: OCSP RFC (RFC = 2560)=20 Dependence on SHA-1
> >>>>
> = >>>>=20 Max,
> >>>>
> >>>> I do not see = where=20 and what extension we need to add for
> >> other = digest
>=20 >>>> algorithm.
> >>>>
>=20 >>>> For key id, we need to enhance or broaden the=20 options.
> >>>>
> >>>>> = -----Original=20 Message-----
> >>>>> From:=20 owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20 On Behalf Of
> >> Massimiliano Pala
> = >>>>>=20 Sent: Tuesday, March 31, 2009 1:37 PM
> >>>>> = To:=20 IETF-pkix
> >>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on SHA-1
> >>>>>
>=20 >>>>> Hi all,
> >>>>>
>=20 >>>>> as I said during last meeting - as the use of = SHA-1=20 does
> >>>> not have any
> = >>>>>=20 security implication in the OCSP, another viable way
> would = be=20 to
> >>>>> define an extension where other = digest=20 algorithms can be
> >>>> added to the
>=20 >>>>> request/responses.
> = >>>>>
>=20 >>>>> It is a simple addition and does not require = any change=20 in
> >>>> the RFC, it
> >>>>> = can be=20 done as a separate document for those who what to
> >> = use=20 other
> >>>>> digest algorithms.
>=20 >>>>>
> >>>>> After all, isn't = this an=20 example of why we allow
> >> extensions to the
>=20 >>>>> messages ?
> >>>>>
> = >>>>> Later,
> >>>>> Max
> = >>>>>
> >>>>>
>=20 >>>>> Santosh Chokhani wrote:
>=20 >>>>>> Tom,
> = >>>>>>
>=20 >>>>>> Adding a new choice and aligning it with = 5280 SKID=20 is fine.
> >>>>>>
> = >>>>>> I=20 would not add anything about matching this field with
>=20 >>>>> anything since
> >>>>>> = RFC=20 2560 does not say anything about it.
>=20 >>>>>>
> >>>>>> If one = were to add=20 something, one should describe how this
> >>>>> = field=20 can
> >>>>>> be used to select from multiple = Responder certificates.
> >>>>>>
>=20 >>>>>>> -----Original Message-----
>=20 >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20 >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
>=20 >>>>>>> To: Santosh Chokhani
>=20 >>>>>>> Cc: IETF-pkix
>=20 >>>>>>> Subject: Re: OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 Santosh:
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 The RFC 5280 method just describes "two common
> = >>>>=20 methods for
> >>>>>>> generating key = identifiers=20 from the public key"
> >>>>>>> and says = that=20 other methods are acceptable.  The comment
> = >>>>>=20 to KeyHash
> >>>>>>> in RFC 2560 4.2.1 is = not as=20 permissive.  Of course, it's
> >>>> the = same
>=20 >>>>>>> field as SKID, and I would support = either=20 stating "if the
> >>>>> KeyHash is
>=20 >>>>>>> not precisely 20 octets long, it should = be=20 matched
> against the
> >>>>>>> = Subject Key=20 Identifier extension of the signing
> certificate" or
>=20 >>>>>>> adding another choice like byID [3] = OCTET=20 STRING --
> >>>>> matches the value
>=20 >>>>>>> of SKID.
>=20 >>>>>>>
>=20 = >>>>>>>       &nb= sp;        =20 Tom Gindin
> >>>>>>>
>=20 >>>>>>> P.S. - The above opinions are mine, and = not=20 necessarily
> >>>>> those of my
>=20 >>>>>>> employer
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> "Santosh Chokhani"=20 <SChokhani@cygnacom.com> Sent by:
> = >>>>>>>=20 owner-ietf-pkix@mail.imc.org
> >>>>>>> = 03/26/2009=20 10:39 PM
> >>>>>>>
>=20 >>>>>>> To
> >>>>>>> = "IETF-pkix" <ietf-pkix@imc.org>
> = >>>>>>>=20 cc
> >>>>>>>
> = >>>>>>>=20 Subject
> >>>>>>> OCSP RFC (RFC 2560) = Dependence=20 on SHA-1
> >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> RFC 2560 dependence on SHA-1 does not = appear to=20 be
> >>>>> difficult to deal
>=20 >>>>>>> with.
>=20 >>>>>>>
> >>>>>>> = Section=20 4.3 lists SHA-1 as mandatory and RSA as
> >>>>=20 optional.  We can
> >>>>>>> update = this to=20 add SHA-2 series as optional.
> = >>>>>>>
>=20 >>>>>>> The Responder ID has SHA-1 = hardwired. =20 But, that is no
> >>>>> different than
>=20 >>>>>>> key ID extensions in RFC 5280.  = Here are=20 some options
> >> in order of
>=20 >>>>>>> preference:
>=20 >>>>>>>
> >>>>>>> = 1. =20 Align the language with subject key ID language
> in RFC = 5280.
>=20 >>>>>>>
> >>>>>>> = 2. =20 Keep on using SHA-1.  This field is not security
>=20 >>>>> relevant.  RFC
>=20 >>>>>>> 2560 does not even describe how to use = this=20 field.  So,
> >>>>> having SHA-1
>=20 >>>>>>> and accidental or intentional = collisions will=20 not hurt the
> >>>>> security
>=20 >>>>>>> of the protocol.
>=20 >>>>>>>
> >>>>>>> = 3. =20 If you do not believe in KISS principle, you can
>=20 >>>>> define another
> = >>>>>>>=20 response type and enhance the key ID ASN.1 syntax so
> that=20 hash
> >>>>>>> algorithm is = identified.
>=20 >>>>>>>
> >>>>>>> = 4. =20 Another option is for the Responder to use the
> same = hashing
>=20 >>>>>>> algorithm as the one in the first = certID=20 entry.
> >>>>>>>
>=20 >>>>>>>
> >>>>>>> = Santosh=20 Chokhani
> >>>>>>> CygnaCom = Solutions
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>
> >>>>>>
>=20 >>>>>
> >>>>>
>=20 >>>>> --
> >>>>>
>=20 >>>>> Best Regards,
> = >>>>>
>=20 >>>>> Massimiliano Pala
> = >>>>>
>=20 >>>>>=20 = --o-----------------------------------------------------------
>=20 >>>>> -------------
> >>>>> = Massimiliano=20 Pala [OpenCA Project Manager]
> >>>>>=20 Massimiliano.Pala@dartmouth.edu
>=20 = >>>>>         = ;    
>=20 >>>>> project.manager@openca.org
>=20 >>>>>
> >>>>> Dartmouth Computer = Science=20 = Dept           &nb= sp;  =20 Home Phone: +1
> >>>>> (603) 369-9332
>=20 >>>>> PKI/Trust=20 = Laboratory          &nb= sp;           &nbs= p;  =20 Work Phone: +1
> >>>>> (603) 646-9179
>=20 >>>>>=20 = --o-----------------------------------------------------------
>=20 >>>>> -------------
> = >>>>>
>=20 >>>>> People who think they know everything are a = great=20 annoyance
> >>>> to those
> = >>>>> of=20 us who do.
> >>>>>   --
>=20 >>>>> Isaac Asimov
> = >>>>>
>=20 >>>>
> >>>
> >>
>=20 >>
> >>
>=20 = >
>
>
>

<= /BLOCKQUOTE> ------_=_NextPart_001_01C9B3A3.86E3D176-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32Eoi24098617 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 07:50:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32EoiGN098616; Thu, 2 Apr 2009 07:50:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from sj-iport-1.cisco.com (sj-iport-1.cisco.com [171.71.176.70]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32EoXsO098605 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=FAIL) for ; Thu, 2 Apr 2009 07:50:43 -0700 (MST) (envelope-from pritikin@cisco.com) X-IronPort-AV: E=Sophos;i="4.39,314,1235952000"; d="scan'208";a="165640440" Received: from sj-dkim-1.cisco.com ([171.71.179.21]) by sj-iport-1.cisco.com with ESMTP; 02 Apr 2009 14:47:18 +0000 Received: from sj-core-4.cisco.com (sj-core-4.cisco.com [171.68.223.138]) by sj-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id n32ElHP8028720 for ; Thu, 2 Apr 2009 07:47:17 -0700 Received: from [10.0.1.195] (stealth-10-32-244-66.cisco.com [10.32.244.66]) by sj-core-4.cisco.com (8.13.8/8.13.8) with ESMTP id n32ElHlD015556 for ; Thu, 2 Apr 2009 14:47:17 GMT Message-Id: <3DE5002F-3921-4170-9C22-F6D389071DC5@cisco.com> From: max pritikin To: ietf-pkix@imc.org Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Normative reference for 'CA rollover'? Date: Thu, 2 Apr 2009 09:47:14 -0500 X-Mailer: Apple Mail (2.930.3) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=1784; t=1238683638; x=1239547638; c=relaxed/simple; s=sjdkim1004; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=pritikin@cisco.com; z=From:=20max=20pritikin=20 |Subject:=20Normative=20reference=20for=20'CA=20rollover'? |Sender:=20; bh=c9kmybihHCjmRWIWPY/VBn/McBf/ieX3eYeWdzksZ44=; b=CAHzhiVcYfidrOo1P1w1s/nDgTqL7alHJTA/XYZz/GtrXB3VFnlw2u98rB f8WVdkh4SnpGdzL4kuFEgLkFeg+P7VK/U910ajws/xXqCn8zDWAYG8IM9dm6 BFB5efUlqE9J1o32ncyJnkOcVk/KHMG37ZH4ZpZkUzV3pTjuHcaos=; Authentication-Results: sj-dkim-1; header.From=pritikin@cisco.com; dkim=pass ( sig from cisco.com/sjdkim1004 verified; ); Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Hi folks, I'm looking for a normative reference describing how a CA would 'rollover' to a new keypair or 'modified' certificate. RFC5280 includes the following statements about 'rollover', here quoted with minimal context: 4.2.1.10 Name Contraints: "Name constraints are not applied to self-issued certificates (unless the certificate is the final certificate in the path). (This could prevent CAs that use name constraints from employing self-issued certificates to implement key rollover.)" 6.1. Basic Path Validation: "A certificate is self-issued if the same DN appears in the subject and issuer fields (the two DNs are the same if they match according to the rules specified in Section 7.1). In general, the issuer and subject of the certificates that make up a path are different for each certificate. However, a CA may issue a certificate to itself to support key rollover or changes in certificate policies. These self-issued certificates are not counted when evaluating path length or name constraints." 8. Security Considerations: "Loss of a CA's private signing key may also be problematic. The CA would not be able to produce CRLs or perform normal key rollover." But it does not include a recommended description of this rollover process itself. RFC3647 does not mention rollover at all, although it does define 'renewal' and 'rekey'. I can find informative discussions of rollover for various CA's (thanks Google). Can somebody point me in the right direction? Is there a normative reference or should I be able to infer the "correct" behavior from end entity rekey discussions as per the above notes? Thank you, - max Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32ElFQ5098389 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 07:47:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32ElF5S098388; Thu, 2 Apr 2009 07:47:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32El2LB098369 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 2 Apr 2009 07:47:13 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 52585 invoked from network); 2 Apr 2009 14:47:06 -0000 Received: from s34.loopia.se (HELO s19.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 2 Apr 2009 14:47:06 -0000 Received: (qmail 17568 invoked from network); 2 Apr 2009 14:47:01 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s19.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 2 Apr 2009 14:47:01 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 16:47:00 +0200 Subject: Re: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 From: Stefan Santesson To: Stefan Santesson , IETF-pkix Message-ID: Thread-Topic: Problem with draft-ietf-pkix-authorityclearanceconstraints-02 Thread-Index: AcmzjAxNtzBfJ61Ws0OScv3P3Q+ASgAFdSIf In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321535621_12455632" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321535621_12455632 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Small correction, I copied the text from the wrong draft, as you may see from the old title. The actual text from draft-ietf-pkix-authorityclearanceconstraints-02 Is almost the same and has the same problem: When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end PKC, the processing described in this section or an equivalent algorithm MUST be included in the certification path validation. The processing is presented as additions to the certification path validation algorithm described in section 6 of [RFC5280]. This is just a nit that could be fixed at any later update. I would suggest the following small change: When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end PKC, the processing described in this section or an equivalent algorithm MUST be performed in addition to the certification path validation algorithm described in section 6 of [RFC5280]. /Stefan On 4/2/09 2:10 PM, "Stefan Santesson" wrote: > I found a problem with draft-turner-caclearanceconstraints-02.txt >=20 > Section 4.1.1. Certification Path Processing states >=20 > When processing Authority Clearance Constraints certificate extension > for the purposes of validating Clearance attribute in the end certific= ate, > PKC, > the processing described in this section or an equivalent algorithm > MUST be included in the certification path validation. >=20 > It is problematic, and unnecessary to require ca clearance constraints > processing to be =B3included=B2 in certification path validation. > None of the clearance constraints information is needed to determine the > validity of the certificate, and as such it does not be processed as an > integrated process. >=20 > It would be perfectly valid for an application who choose to rely on the > clearance information, to process clearance constraints as a post process= , > i.e. after path validation is completed. >=20 > A requirement to integrate caclearance constraints into path validation w= ould > make this a lot harder to implement as it would require modification to c= ore > security components. >=20 > Stefan Santesson > AAA-sec.com >=20 >=20 >=20 >=20 --B_3321535621_12455632 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: Problem with draft-ietf-pkix-authorityclearanceconstraints-02</T= ITLE> </HEAD> <BODY> <FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:11pt= '>Small correction,<BR> <BR> I copied the text from the wrong draft, as you may see from the old title.<= BR> <BR> The actual text from  draft-ietf-pkix-authorityclearanceconstraints-02= Is almost the same and has the same problem:<BR> <BR> </SPAN></FONT><FONT SIZE=3D"2"><FONT FACE=3D"Courier, Courier New"><SPAN STYLE=3D= 'font-size:10pt'>   When processing Authority Clearance Constraint= s certificate extension<BR>    for the purposes of validating Clearance attribute in the= end PKC,<BR>    the processing described in this section or an equivalent= algorithm<BR>    MUST be <B>included</B> in the certification path validat= ion.  The<BR>    processing is presented as additions to the certification= path<BR>    validation algorithm described in <FONT COLOR=3D"#0F00EF"><= U>section 6 of [RFC5280]</U></FONT>.<BR> <BR> <BR> <BR> This is just a nit that could be fixed at any later update. I would suggest= the following small change:<BR> <BR> <BR>    When processing Authority Clearance Constraints certifica= te extension<BR>    for the purposes of validating Clearance attribute in the= end PKC,<BR>    the processing described in this section or an equivalent= algorithm<BR>    MUST be <B>performed in addition</B> to the certification= path<BR>    validation algorithm described in <FONT COLOR=3D"#0F00EF"><= U>section 6 of [RFC5280]</U></FONT>.<BR> <BR> <BR> <BR> /Stefan<BR> </SPAN></FONT></FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN = STYLE=3D'font-size:11pt'><BR> <BR> <BR> On 4/2/09 2:10 PM, "Stefan Santesson" <<a href=3D"stefan@aaa-sec= .com">stefan@aaa-sec.com</a>> wrote:<BR> <BR> </SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><= SPAN STYLE=3D'font-size:11pt'>I found a problem with draft-turner-caclearancec= onstraints-02.txt<BR> <BR> Section </SPAN></FONT><FONT SIZE=3D"2"><FONT FACE=3D"Courier, Courier New"><SPA= N STYLE=3D'font-size:10pt'>4.1.1. Certification Path Processing</SPAN></FONT><= /FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size= :11pt'>  states<BR> <BR> </SPAN></FONT><FONT SIZE=3D"2"><FONT FACE=3D"Courier, Courier New"><SPAN STYLE=3D= 'font-size:10pt'>   When processing Authority Clearance Constraint= s certificate extension<BR>    for the purposes of validating Clearance <FONT COLOR=3D"#14= 8000"><B>attribute</B></FONT> in the end <FONT COLOR=3D"#F91B09">certificate,<= /FONT> <FONT COLOR=3D"#148000"><B>PKC,<BR> </B></FONT>   the processing described in this section or an equi= valent algorithm<BR>    MUST be included in the certification path validation.<BR= > <BR> </SPAN></FONT></FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN = STYLE=3D'font-size:11pt'>It is problematic, and unnecessary to require ca clea= rance constraints processing to be “included” in certification p= ath validation.<BR> None of the clearance constraints information is needed to determine the va= lidity of the certificate, and as such it does not be processed as an integr= ated process.<BR> <BR> It would be perfectly valid for an application who choose to rely on the cl= earance information, to process clearance constraints as a post process, i.e= . after path validation is completed.<BR> <BR> A requirement to integrate caclearance constraints into path validation wou= ld make this a lot harder to implement as it would require modification to c= ore security components.<BR> </SPAN></FONT><FONT COLOR=3D"#333333"><FONT SIZE=3D"2"><FONT FACE=3D"Tahoma, Verd= ana, Helvetica, Arial"><SPAN STYLE=3D'font-size:10pt'><BR> </SPAN></FONT></FONT></FONT><FONT SIZE=3D"2"><SPAN STYLE=3D'font-size:10pt'><FO= NT COLOR=3D"#008080"><FONT FACE=3D"Cambria"><B>Stefan Santesson<BR> </B></FONT></FONT><FONT FACE=3D"Cambria">AAA-sec.com<BR> <BR> <BR> </FONT></SPAN></FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN = STYLE=3D'font-size:11pt'><BR> <BR> </SPAN></FONT></BLOCKQUOTE> </BODY> </HTML> --B_3321535621_12455632-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32EIbc4096367 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 07:18:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32EIb6q096366; Thu, 2 Apr 2009 07:18:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32EIaZj096357 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ietf-pkix@imc.org>; Thu, 2 Apr 2009 07:18:36 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com [65.205.251.35]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id n32DqdH1027310; Thu, 2 Apr 2009 06:52:39 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 2 Apr 2009 07:18:28 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B39D.E4D38B09" Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 07:18:28 -0700 Message-ID: <2788466ED3E31C418E9ACC5C3166155768B360@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 thread-index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABIERYQ== References: <FAD1CF17F2A45B43ADE04E140BA83D48A9FE77@scygexch1.cygnacom.com> <C5F9B804.135B%stefan@aaa-sec.com> <FAD1CF17F2A45B43ADE04E140BA83D48A9FE85@scygexch1.cygnacom.com> <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> <FAD1CF17F2A45B43ADE04E140BA83D48A9FE92@scygexch1.cygnacom.com> From: "Hallam-Baker, Phillip" <pbaker@verisign.com> To: "Santosh Chokhani" <SChokhani@cygnacom.com>, "Stefan Santesson" <stefan@aaa-sec.com>, "IETF-pkix" <ietf-pkix@imc.org> X-OriginalArrivalTime: 02 Apr 2009 14:18:28.0987 (UTC) FILETIME=[E4FE2CB0:01C9B39D] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/> List-ID: <ietf-pkix.imc.org> List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe> This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B39D.E4D38B09 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Let us divide the problem into two. KEYID actually has two (separable) = uses: =20 =20 1) Client to server as a hash index to the cert 2) (Possibly implicit) Server to client as an authenticator of the = actual cert =20 The situation I see here is this: The client has obtained a cert, it = needs to know the status thereof. So it takes a digest of the = certificate using SHA1 and sends it to the server which then uses it as = a lookup key. =20 For this particular part of the problem, there does not appear to be any = security concern. We are using SHA1 because it is a large hash function = that has a minimal chance of accidental collision. But at this point we = have not actually relied on the hash function for authentication = purposes at either end. It is not being used as a cryptographic message = digest. =20 So this seems to fit into a class that EKR once mentioned of cases where = we use SHA1 or MD5 as a hash, not a message digest. =20 =20 The second half of the equation is where we can end up in (some) = difficulty. Particularly if we are working in an archival situation. = Imagine the case that we have an RSA1024-SHA1 signature on a document = signed using a key that was subsequently compromised and the question = the infrastructure needs to answer is whether the certificate was valid = at the point it was signed. This was one of the original core use cases = in the design of OCSP. =20 In this case there is little choice but to use the SHA1 hash as a = message digest and then we have the problem. =20 =20 The simple fix here is to allow the server to specify its own digest for = the actual cert whose status is being reported. You can think of it as = being like using 96 bits of a digest as a hash and then supplying the = full 256 bits to confirm that the located object was not subject to a = collision. =20 =20 The former Area Director, now the IETF chair has expressed concern as to = the long term management of cryptographic algorithms on many occasions. = I think that it would be very unwise for the rest of us to dismiss the = chance that he has a really, really good and specific reason for this = concern. =20 While the specific reason may not be imminent, the problem may well hit = many years down the line after infrastructure is widely deployed and = embedded. We should avoid creating additional Y2K type problems. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 I have no objection to having an extension, but if in the long term = SHA-1 will not be there, it seems defining a new response type (say = basic 2) would be the way to go so that SHA-1 based key ID can be = stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value = in extension except that it may make every one happy: those who do not = care will not include it on the Server side and/or will ignore it on the = client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this = case both are straightforward. Also, in this thread, the comments were = not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first = posted the OCSP Agility I-D and my position and reasons are matter of = PKIX archives for anyone to scrutinize. When you ignore every single = cogent point, there is no sense in me commenting on next iteration. I = do think that the OCSP Agility I-D is a solution looking for a problem = that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 = based. =20 But that does not preclude adding an extension that allows the KeyID to = be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that = uses weak crypto necessitates an (expensive) security review to prove = that there is no problem. And these must be performed repeatedly by many = different parties as relying on the analysis of others is a good way to = cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While = simple compressor collisions may not be a concern, there is no guarantee = that the attacks will stop at that point. MD4 has been broken repeatedly = and they are now at the stage of jumping up and down on the little = pieces. It will probably happen to MD5 and we should be cautious in case = it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to = have my position characterized as stupid. My designs are not exactly = known for being verbose or overly elaborate. If I propose something it = is because there is a reason. It is very easy to defend the status quo = by derriding proposals as unnecessary, but the fact is that making OCSP = too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that = the core of PKIX as it now stands (the certificate profile and OCSP) be = capable of stand alone use. We cannot fix issues in OCSP with LTANS or = other layered-on protocols as some have proposed. It does not simplify = my OCSP deployment to have to graft on an entire different protocol in = addition or to re-engineer my document archival protocol to cover = defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve = security. You only improve security if you withdraw insecure algorithms = from use. =20 To make the system work you have to have a means of negotiating between = the client and the server. Otherwise there is no way for an OCSP = responder to ensure that it receives a secure, supported response to = querries for certificates that do not exist yet or are not known to the = responder. =20 In the case of an OCSP responder being driven by CRLs collected from = various sources, there is no way for the CA to know if a certificate = even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is = performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be = upgraded at will is simply not representative of large scale real world = deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for = Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" <SChokhani@cygnacom.com> = wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > <SChokhani@cygnacom.com> wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" <ietf-pkix@imc.org> > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B39D.E4D38B09 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <HTML dir=3Dltr><HEAD><TITLE>RE: OCSP RFC (RFC 2560) Dependence on = SHA-1=0A= =0A= =0A= =0A=
=0A=
Let us divide = the problem into two. KEYID actually has two (separable) = uses:
=0A=
 
=0A=
 
=0A=
1) Client to server as a hash = index to the cert
=0A=
2) (Possibly implicit) Server = to client as an authenticator of the actual cert
=0A=
 
=0A=
The situation I see here is = this: The client has obtained a cert, it needs to know the status = thereof. So it takes a digest of the certificate using SHA1 and sends it = to the server which then uses it as a lookup key.
=0A=
 
=0A=
For this particular part of = the problem, there does not appear to be any security concern. We are = using SHA1 because it is a large hash function that has a minimal chance = of accidental collision. But at this point we have not actually relied = on the hash function for authentication purposes at either end. It is = not being used as a cryptographic message digest.
=0A=
 
=0A=
So this seems to fit into a = class that EKR once mentioned of cases where we use SHA1 or MD5 as a = hash, not a message digest.
=0A=
 
=0A=
 
=0A=
The second half of the = equation is where we can end up in (some) difficulty. Particularly if we = are working in an archival situation. Imagine the case that we have an = RSA1024-SHA1 signature on a document signed using a key that was = subsequently compromised and the question the infrastructure needs to = answer is whether the certificate was valid at the point it was signed. = This was one of the original core use cases in the design of = OCSP.
=0A=
 
=0A=
In this case there is little = choice but to use the SHA1 hash as a message digest and then we have the = problem.
=0A=
 
=0A=
 
=0A=
The simple fix here is to = allow the server to specify its own digest for the actual cert whose = status is being reported. You can think of it as being like = using 96 bits of a digest as a hash and then supplying the full 256 = bits to confirm that the located object was not subject to a = collision.
=0A=
 
=0A=
 
=0A=
The former Area Director, now = the IETF chair has expressed concern as to the long term management of = cryptographic algorithms on many occasions. I think that it would be = very unwise for the rest of us to dismiss the chance that he has a = really, really good and specific reason for this concern.
=0A=
 
=0A=
While the specific reason may = not be imminent, the problem may well hit many years down the line after = infrastructure is widely deployed and embedded. We should avoid creating = additional Y2K type problems.
=0A=
 
=0A=

=0A=
=0A= From: Santosh Chokhani = [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54 = AM
To: Hallam-Baker, Phillip; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
I have no objection to having an = extension, but if in the long term SHA-1 will not be there, it seems = defining a new response type (say basic 2) would be the way to go so = that SHA-1 based key ID can be stripped off.
=0A=
 
=0A=
If SHA-1 is not getting ripped off = in the long term, I do not see value in extension except that it = may make every one happy: those who do not care will not include it = on the Server side and/or will ignore it on the client = side.
=0A=
 
=0A=
It would appear that the extension = should be NC.
=0A=
 
=0A=
Phil,
=0A=
 
=0A=
I would not respond to the = arguments on KISS and security since in this case both are = straightforward.  Also, in this thread, the comments were not meant = for or directed at you.
=0A=
 
=0A=
As you know, I have provided = extensive comments to you when you first posted the OCSP Agility I-D and = my position and reasons are matter of PKIX archives for anyone to = scrutinize.  When you ignore every single cogent point, there is no = sense in me commenting on next iteration.  I do think that the OCSP = Agility I-D is a solution looking for a problem that I do not = see.
=0A=
=0A=
=0A=
=0A= From: Hallam-Baker, Phillip = [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53 AM
To: Santosh Chokhani; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
=0A=
I think we = have no choice but to leave the Key ID CHOICE to be SHA-1 = based.
=0A=
 
=0A=
But that does not preclude = adding an extension that allows the KeyID to be specified using a = stronger algorithm. There are two reasons for this:
=0A=
 
=0A=
1) Optics, even if there is = no security implication, a protocol that uses weak crypto necessitates = an (expensive) security review to prove that there is no problem. And = these must be performed repeatedly by many different parties as relying = on the analysis of others is a good way to cause issues. Been there, = done that.
=0A=
 
=0A=
2) We are designing for long = time spans, ten years or more. While simple compressor collisions may = not be a concern, there is no guarantee that the attacks will stop at = that point. MD4 has been broken repeatedly and they are now at the stage = of jumping up and down on the little pieces. It will probably happen to = MD5 and we should be cautious in case it happens to SHA-1.
=0A=
 
=0A=
 
=0A=
On the claim of 'Keep it = simple STUPID', I find it rather offensive to have my position = characterized as stupid. My designs are not exactly known for being = verbose or overly elaborate. If I propose something it is because there = is a reason. It is very easy to defend the status quo by derriding = proposals as unnecessary, but the fact is that making OCSP too simple = will simply cause the complexity to blow out somewhere else.
=0A=
 
=0A=
There is an architectural = princple of modular design that demands that the core of PKIX as it now = stands (the certificate profile and OCSP) be capable of stand alone use. = We cannot fix issues in OCSP with LTANS or other layered-on protocols as = some have proposed. It does not simplify my OCSP deployment to have to = graft on an entire different protocol in addition or to re-engineer my = document archival protocol to cover defects in OCSP.
=0A=
 
=0A=
 
=0A=
Simply adding new algorithms = to a protocol does nothing to improve security. You only improve = security if you withdraw insecure algorithms from use.
=0A=
 
=0A=
To make the system work you = have to have a means of negotiating between the client and the server. = Otherwise there is no way for an OCSP responder to ensure that it = receives a secure, supported response to querries for certificates = that do not exist yet or are not known to the responder.
=0A=
 
=0A=
In the case of an OCSP = responder being driven by CRLs collected from various sources, there is = no way for the CA to know if a certificate even exists, all it knows is = if the status is definitively revoked.
=0A=
 
=0A=
In the case of many = transactional architectures the OCSP validation is performed = independently of certificate chain validation.
=0A=
 
=0A=
 
=0A=
Experience of small scale PKI = deployment in which any box can be upgraded at will is simply not = representative of large scale real world deployment.
=0A=
 
=0A=
=0A=

=0A=
=0A=
=0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed 4/1/2009 8:39 PM
To: Stefan = Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

=0A=

=0A=

I am saying that "Do you agree that 2560 can be left = alone for Responder
ID's key ID CHOICE being SHA-1 = based?"

> -----Original Message-----
> From: Stefan = Santesson [mailto:stefan@aaa-sec.com]
>= Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani; = IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on = SHA-1
>
> Santosh,
>
> = In-line
>
>
> On 4/1/09 10:31 PM, "Santosh Chokhani" = <SChokhani@cygnacom.com> wrote:
>
> >
> > = Stefan,
> >
> > See responses in-line.
> = >
> >> -----Original Message-----
> >> From: = Stefan Santesson [mailto:stefan@aaa-sec.com]
>= >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >> Santosh,
> >>
> >> If you are talking = about adding other options to calculate the
> >> KeyHash = value in ResponderID then I strongly disagree.
> >>
> = >> If you add unspecified options you change the = properties
> of the field
> >> from deterministic to a = completely unknown value.
> >> It does not matter if RFC2560 = isn't explicit in its description of
> >> the use of the = field. The fact is that OCSP explicitly
> defines this
> = >> value and as such will allow a client to deterministically = compare
> >> this value with the certificate selected to = validate the response
> >> signature.
> >
> = > I hope no one is doing the matching of Responder ID with
> = hash of a key
> > in place of responder signature = verification.  That would
> be real bad.
> = >
>
> Yes it would. That is not at all what I talk about. = But a
> client could use this value to locate a responder = certificate.
>
> >> If you allow
> >> = other ways to calculate the value but do not provide any means = to
> >> signal what method that was used, then this feature = is lost.
> >
> > The most common use will be to use = this field to prioritize the
> > certificates of the responder = to use for sigature
> verification on the
> > = response.
> >
>
> Do you know this for a fact, or = are you guessing?
> If a single implementation verifies that the = certificate used
> to validate the response matches the = ResponderID value, and
> choose to go into an error state because = of mismatch, then we
> have created great problems. So we can't = guess. We have to
> know that no single implementation will fail = because of this.
> And that may be very = hard.
>
>
> >>
> >> In worst case we = will cause current implementation to fail.
> >
> > = That is why I am asking what problems if any will the vendors = have.
> >
>
> Even if no vendor speaks up here, it = will not guarantee that
> this will not create any = problems.
>
> >>
> >> I really don't think = its worth the effort to change this field. We
> >> have a = very large base of implementations that we really
> don't = want
> >> to mess up unless its absolutely = necessary.
> >
> > So, we agree that leaving this = field hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite reading = it many
> times over.
>
> > My only reason to align = with 5280 is that if some one were
> ever want
> > to = strip off SHA-1 altogether from their Responder or client,
> > = permitting other methods does it.
> >
>
> I don't = believe this argument is valid as I don't think it is
> possible = to strip off SHA-1 in any reasonable future. In any
> case. If we = compare the positive side with allowing this
> change and the = negative consequences to make OCSP
> incompatible with itself, my = choice is easy.
>
> /Stefan

>
> = >>
> >> As the only property of this field is to = provide a convenient
> >> identifier, it is far from = absolutely necessary to change it.
> >> Remember that there = is a second choice to to identify responder by
> >> name. = For names we have accepted the possibility of collisions. In
> = >> that comparison, upgrading from SHA-1 is really = redundant.
> >>
> >> /Stefan
> = >>
> >>
> >>
> >>
> = >> On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com> wrote:
> >>
> = >>>
> >>> My resident ASN.1 expert apprised me = of the fact that
> >> adding a choice
> >>> = will break backward compatibility.  Thus, extension is a
> = >> fifth option
> >>> (probably third in the = priority).
> >>>
> >>> Based on what I = know of OCSP implementations, not changing
> >> anything = in
> >>> terms of bits on the wire and aligning the Key = ID with SKID
> >> in 5280 is
> >>> the best = approach.  I do not think it will hurt backward
> >> = compatibility.
> >>>
> >>> OCSP Responder = and OCSP client vendors should speak up if I
> >> am = wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh Chokhani
> = >>>> Sent: Tuesday, March 31, 2009 12:51 PM
> = >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>
> >>>> Max,
> = >>>>
> >>>> I do not see where and what = extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
> = >>>> For key id, we need to enhance or broaden the = options.
> >>>>
> >>>>> = -----Original Message-----
> >>>>> From: = owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> >> Massimiliano Pala
> = >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>>>>
> >>>>> Hi all,
> = >>>>>
> >>>>> as I said during last = meeting - as the use of SHA-1 does
> >>>> not have = any
> >>>>> security implication in the OCSP, = another viable way
> would be to
> >>>>> = define an extension where other digest algorithms can be
> = >>>> added to the
> >>>>> = request/responses.
> >>>>>
> = >>>>> It is a simple addition and does not require any = change in
> >>>> the RFC, it
> = >>>>> can be done as a separate document for those who = what to
> >> use other
> >>>>> digest = algorithms.
> >>>>>
> >>>>> = After all, isn't this an example of why we allow
> >> = extensions to the
> >>>>> messages ?
> = >>>>>
> >>>>> Later,
> = >>>>> Max
> >>>>>
> = >>>>>
> >>>>> Santosh Chokhani = wrote:
> >>>>>> Tom,
> = >>>>>>
> >>>>>> Adding a new = choice and aligning it with 5280 SKID is fine.
> = >>>>>>
> >>>>>> I would not = add anything about matching this field with
> >>>>> = anything since
> >>>>>> RFC 2560 does not say = anything about it.
> >>>>>>
> = >>>>>> If one were to add something, one should = describe how this
> >>>>> field can
> = >>>>>> be used to select from multiple Responder = certificates.
> >>>>>>
> = >>>>>>> -----Original Message-----
> = >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
> >>>>>>> To: Santosh Chokhani
> = >>>>>>> Cc: IETF-pkix
> = >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence = on SHA-1
> >>>>>>>
> = >>>>>>>       &nb= sp; Santosh:
> >>>>>>>
> = >>>>>>>       &nb= sp; The RFC 5280 method just describes "two common
> = >>>> methods for
> >>>>>>> = generating key identifiers from the public key"
> = >>>>>>> and says that other methods are = acceptable.  The comment
> >>>>> to = KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as = permissive.  Of course, it's
> >>>> the = same
> >>>>>>> field as SKID, and I would = support either stating "if the
> >>>>> KeyHash = is
> >>>>>>> not precisely 20 octets long, it = should be matched
> against the
> = >>>>>>> Subject Key Identifier extension of the = signing
> certificate" or
> >>>>>>> = adding another choice like byID [3] OCTET STRING --
> = >>>>> matches the value
> = >>>>>>> of SKID.
> = >>>>>>>
> = >>>>>>>       &nb= sp;         Tom Gindin
> = >>>>>>>
> >>>>>>> P.S. - = The above opinions are mine, and not necessarily
> = >>>>> those of my
> >>>>>>> = employer
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> = "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by:
> = >>>>>>> owner-ietf-pkix@mail.imc.org
> = >>>>>>> 03/26/2009 10:39 PM
> = >>>>>>>
> >>>>>>> = To
> >>>>>>> "IETF-pkix" = <ietf-pkix@imc.org>
> >>>>>>> = cc
> >>>>>>>
> = >>>>>>> Subject
> = >>>>>>> OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> RFC = 2560 dependence on SHA-1 does not appear to be
> = >>>>> difficult to deal
> = >>>>>>> with.
> = >>>>>>>
> >>>>>>> = Section 4.3 lists SHA-1 as mandatory and RSA as
> >>>> = optional.  We can
> >>>>>>> update this = to add SHA-2 series as optional.
> = >>>>>>>
> >>>>>>> The = Responder ID has SHA-1 hardwired.  But, that is no
> = >>>>> different than
> >>>>>>> = key ID extensions in RFC 5280.  Here are some options
> = >> in order of
> >>>>>>> = preference:
> >>>>>>>
> = >>>>>>> 1.  Align the language with subject = key ID language
> in RFC 5280.
> = >>>>>>>
> >>>>>>> = 2.  Keep on using SHA-1.  This field is not security
> = >>>>> relevant.  RFC
> = >>>>>>> 2560 does not even describe how to use this = field.  So,
> >>>>> having SHA-1
> = >>>>>>> and accidental or intentional collisions = will not hurt the
> >>>>> security
> = >>>>>>> of the protocol.
> = >>>>>>>
> >>>>>>> = 3.  If you do not believe in KISS principle, you can
> = >>>>> define another
> >>>>>>> = response type and enhance the key ID ASN.1 syntax so
> that = hash
> >>>>>>> algorithm is = identified.
> >>>>>>>
> = >>>>>>> 4.  Another option is for the = Responder to use the
> same hashing
> = >>>>>>> algorithm as the one in the first certID = entry.
> >>>>>>>
> = >>>>>>>
> >>>>>>> = Santosh Chokhani
> >>>>>>> CygnaCom = Solutions
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>
> = >>>>>>
> >>>>>
> = >>>>>
> >>>>> --
> = >>>>>
> >>>>> Best Regards,
> = >>>>>
> >>>>> Massimiliano = Pala
> >>>>>
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano Pala [OpenCA Project Manager]
> >>>>> = Massimiliano.Pala@dartmouth.edu
> = >>>>>         = ;    
> >>>>> = project.manager@openca.org
> >>>>>
> = >>>>> Dartmouth Computer Science = Dept           &nb= sp;   Home Phone: +1
> >>>>> (603) = 369-9332
> >>>>> PKI/Trust = Laboratory          &nb= sp;           &nbs= p;   Work Phone: +1
> >>>>> (603) = 646-9179
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>>
> = >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> >>>>> = of us who do.
> >>>>>   --
> = >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
> = >>
> >>
> = >
>
>
>

<= /BODY> ------_=_NextPart_001_01C9B39D.E4D38B09-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32DtYnf094401 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 06:55:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32DtYAw094400; Thu, 2 Apr 2009 06:55:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from WA4EHSOBE002.bigfish.com (wa4ehsobe002.messaging.microsoft.com [216.32.181.12]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32DtMSE094376 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=FAIL) for ; Thu, 2 Apr 2009 06:55:33 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from mail223-wa4-R.bigfish.com (10.8.14.252) by WA4EHSOBE002.bigfish.com (10.8.40.22) with Microsoft SMTP Server id 8.1.340.0; Thu, 2 Apr 2009 13:55:22 +0000 Received: from mail223-wa4 (localhost.localdomain [127.0.0.1]) by mail223-wa4-R.bigfish.com (Postfix) with ESMTP id 841D358834D for ; Thu, 2 Apr 2009 13:55:22 +0000 (UTC) X-BigFish: VPS-25(zz1432R98dR1805Mzz1202hzz1033ILz2dh6bh87il61h) X-Spam-TCS-SCL: 0:0 X-FB-DOMAIN-IP-MATCH: fail Received: by mail223-wa4 (MessageSwitch) id 1238680519758419_8562; Thu, 2 Apr 2009 13:55:19 +0000 (UCT) Received: from imx2.tcd.ie (imx2.tcd.ie [134.226.1.156]) by mail223-wa4.bigfish.com (Postfix) with ESMTP id 878CB7A0050 for ; Thu, 2 Apr 2009 13:55:19 +0000 (UTC) Received: from Vams.imx2 (imx2.tcd.ie [134.226.1.156]) by imx2.tcd.ie (Postfix) with SMTP id E9AE068002 for ; Thu, 2 Apr 2009 14:55:18 +0100 (IST) Received: from imx2.tcd.ie ([134.226.1.156]) by imx2.tcd.ie ([134.226.1.156]) with SMTP (gateway) id A0743EE5B0A; Thu, 02 Apr 2009 14:55:18 +0100 Received: from [134.226.36.180] (sfarrell.dsg.cs.tcd.ie [134.226.36.180]) by imx2.tcd.ie (Postfix) with ESMTP id D7B4B68002 for ; Thu, 2 Apr 2009 14:55:18 +0100 (IST) Message-ID: <49D4C40D.5040501@cs.tcd.ie> Date: Thu, 2 Apr 2009 14:56:29 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.21 (X11/20090302) MIME-Version: 1.0 To: IETF-pkix Subject: Re: WG Last Call on draft-ietf-pkix-tac-03 References: In-Reply-To: X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit X-AntiVirus-Status: MessageID = A1743EE5B0A X-AntiVirus-Status: Host: imx2.tcd.ie X-AntiVirus-Status: Action Taken: X-AntiVirus-Status: NONE X-AntiVirus-Status: Checked by TCD Vexira. (version=1.60.2 VDF=10.102.30) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan Santesson wrote: > The authors of Traceable Anonymous Certificate > draft-ietf-pkix-tac-03.txt has requested WGLC. > > http://tools.ietf.org/html/draft-ietf-pkix-tac-03 > A couple of comments: #1: Top of p7: "To effect issuance of the TAC, the AI interacts with the BI, over a secure channel, to jointly create the signature on the TAC, and sends the signed TAC to the user. The AI does this without learning the user's real identity (either from the user or from the BI)." If the AI sends the TAC to the user, then it will know some form of identity for that user, even if that's only an IP address. (And with the likes of SAVI, that could well be enough to establish a real identity.) I'd have thought it'd be much better to return the TAC via the BI and not require any user<->AI direct connections? #2: Section 5.2 claims that the AI can't unilaterally fool the BI into revealing the real identity. But the only thing that stops that seems to be the RP client identity verified by the BI when the RP establishes a mutual-auth TLS connection to the BI. So how can the BI really know that its not the AI making that connection? Stephen. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32DpS45094055 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 06:51:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32DpSrG094054; Thu, 2 Apr 2009 06:51:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32DpH4M094037 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 2 Apr 2009 06:51:28 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN03.vcorp.ad.vrsn.com (mailer6.verisign.com [65.205.251.33]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id n32DPJ3B026359; Thu, 2 Apr 2009 06:25:19 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 2 Apr 2009 06:51:09 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B39A.1397BF01" Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 06:47:45 -0700 Message-ID: <2788466ED3E31C418E9ACC5C3166155768B35F@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 thread-index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAABFiEVA== References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , "Stefan Santesson" , "IETF-pkix" X-OriginalArrivalTime: 02 Apr 2009 13:51:09.0810 (UTC) FILETIME=[13F79D20:01C9B39A] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B39A.1397BF01 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable On the contrary, each time I asked for a substantive argument you used = exactly the same non argument you are using here. =20 I have put a substantive argument on the table here. "I am not = convinced" or "I answered the question some other time" with no links to = the specific points are not a substantive response. You may think that = you gave a substantive explanation of how a client that only supports = ECC can obtain a comprehensible response from a generic OCSP server that = also supports RSA. However I do not beleive that it is possible in the = current protocol. =20 If you think you have demonstrated this in the past then please point to = the email. =20 ________________________________ From: Santosh Chokhani [mailto:SChokhani@cygnacom.com] Sent: Thu 4/2/2009 7:54 AM To: Hallam-Baker, Phillip; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 I have no objection to having an extension, but if in the long term = SHA-1 will not be there, it seems defining a new response type (say = basic 2) would be the way to go so that SHA-1 based key ID can be = stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value = in extension except that it may make every one happy: those who do not = care will not include it on the Server side and/or will ignore it on the = client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this = case both are straightforward. Also, in this thread, the comments were = not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first = posted the OCSP Agility I-D and my position and reasons are matter of = PKIX archives for anyone to scrutinize. When you ignore every single = cogent point, there is no sense in me commenting on next iteration. I = do think that the OCSP Agility I-D is a solution looking for a problem = that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 = based. =20 But that does not preclude adding an extension that allows the KeyID to = be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that = uses weak crypto necessitates an (expensive) security review to prove = that there is no problem. And these must be performed repeatedly by many = different parties as relying on the analysis of others is a good way to = cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While = simple compressor collisions may not be a concern, there is no guarantee = that the attacks will stop at that point. MD4 has been broken repeatedly = and they are now at the stage of jumping up and down on the little = pieces. It will probably happen to MD5 and we should be cautious in case = it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to = have my position characterized as stupid. My designs are not exactly = known for being verbose or overly elaborate. If I propose something it = is because there is a reason. It is very easy to defend the status quo = by derriding proposals as unnecessary, but the fact is that making OCSP = too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that = the core of PKIX as it now stands (the certificate profile and OCSP) be = capable of stand alone use. We cannot fix issues in OCSP with LTANS or = other layered-on protocols as some have proposed. It does not simplify = my OCSP deployment to have to graft on an entire different protocol in = addition or to re-engineer my document archival protocol to cover = defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve = security. You only improve security if you withdraw insecure algorithms = from use. =20 To make the system work you have to have a means of negotiating between = the client and the server. Otherwise there is no way for an OCSP = responder to ensure that it receives a secure, supported response to = querries for certificates that do not exist yet or are not known to the = responder. =20 In the case of an OCSP responder being driven by CRLs collected from = various sources, there is no way for the CA to know if a certificate = even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is = performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be = upgraded at will is simply not representative of large scale real world = deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for = Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" = wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B39A.1397BF01 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1=0A= =0A= =0A= =0A=
=0A=
On the = contrary, each time I asked for a substantive argument you used exactly = the same non argument you are using here.
=0A=
 
=0A=
I have put a substantive = argument on the table here. "I am not convinced" or "I answered the = question some other time" with no links to the specific points are not a = substantive response. You may think that you gave a substantive = explanation of how a client that only supports ECC can obtain a = comprehensible response from a generic OCSP server that also supports = RSA. However I do not beleive that it is possible in the current = protocol.
=0A=
 
=0A=
If you think you have = demonstrated this in the past then please point to the = email.
=0A=
 
=0A=

=0A=
=0A= From: Santosh Chokhani = [mailto:SChokhani@cygnacom.com]
Sent: Thu 4/2/2009 7:54 = AM
To: Hallam-Baker, Phillip; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
I have no objection to having an = extension, but if in the long term SHA-1 will not be there, it seems = defining a new response type (say basic 2) would be the way to go so = that SHA-1 based key ID can be stripped off.
=0A=
 
=0A=
If SHA-1 is not getting ripped off = in the long term, I do not see value in extension except that it = may make every one happy: those who do not care will not include it = on the Server side and/or will ignore it on the client = side.
=0A=
 
=0A=
It would appear that the extension = should be NC.
=0A=
 
=0A=
Phil,
=0A=
 
=0A=
I would not respond to the = arguments on KISS and security since in this case both are = straightforward.  Also, in this thread, the comments were not meant = for or directed at you.
=0A=
 
=0A=
As you know, I have provided = extensive comments to you when you first posted the OCSP Agility I-D and = my position and reasons are matter of PKIX archives for anyone to = scrutinize.  When you ignore every single cogent point, there is no = sense in me commenting on next iteration.  I do think that the OCSP = Agility I-D is a solution looking for a problem that I do not = see.
=0A=
=0A=
=0A=
=0A= From: Hallam-Baker, Phillip = [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53 AM
To: Santosh Chokhani; Stefan Santesson; = IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1

=0A=
=0A=
=0A=
I think we = have no choice but to leave the Key ID CHOICE to be SHA-1 = based.
=0A=
 
=0A=
But that does not preclude = adding an extension that allows the KeyID to be specified using a = stronger algorithm. There are two reasons for this:
=0A=
 
=0A=
1) Optics, even if there is = no security implication, a protocol that uses weak crypto necessitates = an (expensive) security review to prove that there is no problem. And = these must be performed repeatedly by many different parties as relying = on the analysis of others is a good way to cause issues. Been there, = done that.
=0A=
 
=0A=
2) We are designing for long = time spans, ten years or more. While simple compressor collisions may = not be a concern, there is no guarantee that the attacks will stop at = that point. MD4 has been broken repeatedly and they are now at the stage = of jumping up and down on the little pieces. It will probably happen to = MD5 and we should be cautious in case it happens to SHA-1.
=0A=
 
=0A=
 
=0A=
On the claim of 'Keep it = simple STUPID', I find it rather offensive to have my position = characterized as stupid. My designs are not exactly known for being = verbose or overly elaborate. If I propose something it is because there = is a reason. It is very easy to defend the status quo by derriding = proposals as unnecessary, but the fact is that making OCSP too simple = will simply cause the complexity to blow out somewhere else.
=0A=
 
=0A=
There is an architectural = princple of modular design that demands that the core of PKIX as it now = stands (the certificate profile and OCSP) be capable of stand alone use. = We cannot fix issues in OCSP with LTANS or other layered-on protocols as = some have proposed. It does not simplify my OCSP deployment to have to = graft on an entire different protocol in addition or to re-engineer my = document archival protocol to cover defects in OCSP.
=0A=
 
=0A=
 
=0A=
Simply adding new algorithms = to a protocol does nothing to improve security. You only improve = security if you withdraw insecure algorithms from use.
=0A=
 
=0A=
To make the system work you = have to have a means of negotiating between the client and the server. = Otherwise there is no way for an OCSP responder to ensure that it = receives a secure, supported response to querries for certificates = that do not exist yet or are not known to the responder.
=0A=
 
=0A=
In the case of an OCSP = responder being driven by CRLs collected from various sources, there is = no way for the CA to know if a certificate even exists, all it knows is = if the status is definitively revoked.
=0A=
 
=0A=
In the case of many = transactional architectures the OCSP validation is performed = independently of certificate chain validation.
=0A=
 
=0A=
 
=0A=
Experience of small scale PKI = deployment in which any box can be upgraded at will is simply not = representative of large scale real world deployment.
=0A=
 
=0A=
=0A=

=0A=
=0A=
=0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed 4/1/2009 8:39 PM
To: Stefan = Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

=0A=

=0A=

I am saying that "Do you agree that 2560 can be left = alone for Responder
ID's key ID CHOICE being SHA-1 = based?"

> -----Original Message-----
> From: Stefan = Santesson [mailto:stefan@aaa-sec.com]
>= Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani; = IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on = SHA-1
>
> Santosh,
>
> = In-line
>
>
> On 4/1/09 10:31 PM, "Santosh Chokhani" = <SChokhani@cygnacom.com> wrote:
>
> >
> > = Stefan,
> >
> > See responses in-line.
> = >
> >> -----Original Message-----
> >> From: = Stefan Santesson [mailto:stefan@aaa-sec.com]
>= >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >> Santosh,
> >>
> >> If you are talking = about adding other options to calculate the
> >> KeyHash = value in ResponderID then I strongly disagree.
> >>
> = >> If you add unspecified options you change the = properties
> of the field
> >> from deterministic to a = completely unknown value.
> >> It does not matter if RFC2560 = isn't explicit in its description of
> >> the use of the = field. The fact is that OCSP explicitly
> defines this
> = >> value and as such will allow a client to deterministically = compare
> >> this value with the certificate selected to = validate the response
> >> signature.
> >
> = > I hope no one is doing the matching of Responder ID with
> = hash of a key
> > in place of responder signature = verification.  That would
> be real bad.
> = >
>
> Yes it would. That is not at all what I talk about. = But a
> client could use this value to locate a responder = certificate.
>
> >> If you allow
> >> = other ways to calculate the value but do not provide any means = to
> >> signal what method that was used, then this feature = is lost.
> >
> > The most common use will be to use = this field to prioritize the
> > certificates of the responder = to use for sigature
> verification on the
> > = response.
> >
>
> Do you know this for a fact, or = are you guessing?
> If a single implementation verifies that the = certificate used
> to validate the response matches the = ResponderID value, and
> choose to go into an error state because = of mismatch, then we
> have created great problems. So we can't = guess. We have to
> know that no single implementation will fail = because of this.
> And that may be very = hard.
>
>
> >>
> >> In worst case we = will cause current implementation to fail.
> >
> > = That is why I am asking what problems if any will the vendors = have.
> >
>
> Even if no vendor speaks up here, it = will not guarantee that
> this will not create any = problems.
>
> >>
> >> I really don't think = its worth the effort to change this field. We
> >> have a = very large base of implementations that we really
> don't = want
> >> to mess up unless its absolutely = necessary.
> >
> > So, we agree that leaving this = field hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite reading = it many
> times over.
>
> > My only reason to align = with 5280 is that if some one were
> ever want
> > to = strip off SHA-1 altogether from their Responder or client,
> > = permitting other methods does it.
> >
>
> I don't = believe this argument is valid as I don't think it is
> possible = to strip off SHA-1 in any reasonable future. In any
> case. If we = compare the positive side with allowing this
> change and the = negative consequences to make OCSP
> incompatible with itself, my = choice is easy.
>
> /Stefan

>
> = >>
> >> As the only property of this field is to = provide a convenient
> >> identifier, it is far from = absolutely necessary to change it.
> >> Remember that there = is a second choice to to identify responder by
> >> name. = For names we have accepted the possibility of collisions. In
> = >> that comparison, upgrading from SHA-1 is really = redundant.
> >>
> >> /Stefan
> = >>
> >>
> >>
> >>
> = >> On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com> wrote:
> >>
> = >>>
> >>> My resident ASN.1 expert apprised me = of the fact that
> >> adding a choice
> >>> = will break backward compatibility.  Thus, extension is a
> = >> fifth option
> >>> (probably third in the = priority).
> >>>
> >>> Based on what I = know of OCSP implementations, not changing
> >> anything = in
> >>> terms of bits on the wire and aligning the Key = ID with SKID
> >> in 5280 is
> >>> the best = approach.  I do not think it will hurt backward
> >> = compatibility.
> >>>
> >>> OCSP Responder = and OCSP client vendors should speak up if I
> >> am = wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh Chokhani
> = >>>> Sent: Tuesday, March 31, 2009 12:51 PM
> = >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>
> >>>> Max,
> = >>>>
> >>>> I do not see where and what = extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
> = >>>> For key id, we need to enhance or broaden the = options.
> >>>>
> >>>>> = -----Original Message-----
> >>>>> From: = owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> >> Massimiliano Pala
> = >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>>>>
> >>>>> Hi all,
> = >>>>>
> >>>>> as I said during last = meeting - as the use of SHA-1 does
> >>>> not have = any
> >>>>> security implication in the OCSP, = another viable way
> would be to
> >>>>> = define an extension where other digest algorithms can be
> = >>>> added to the
> >>>>> = request/responses.
> >>>>>
> = >>>>> It is a simple addition and does not require any = change in
> >>>> the RFC, it
> = >>>>> can be done as a separate document for those who = what to
> >> use other
> >>>>> digest = algorithms.
> >>>>>
> >>>>> = After all, isn't this an example of why we allow
> >> = extensions to the
> >>>>> messages ?
> = >>>>>
> >>>>> Later,
> = >>>>> Max
> >>>>>
> = >>>>>
> >>>>> Santosh Chokhani = wrote:
> >>>>>> Tom,
> = >>>>>>
> >>>>>> Adding a new = choice and aligning it with 5280 SKID is fine.
> = >>>>>>
> >>>>>> I would not = add anything about matching this field with
> >>>>> = anything since
> >>>>>> RFC 2560 does not say = anything about it.
> >>>>>>
> = >>>>>> If one were to add something, one should = describe how this
> >>>>> field can
> = >>>>>> be used to select from multiple Responder = certificates.
> >>>>>>
> = >>>>>>> -----Original Message-----
> = >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
> >>>>>>> To: Santosh Chokhani
> = >>>>>>> Cc: IETF-pkix
> = >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence = on SHA-1
> >>>>>>>
> = >>>>>>>       &nb= sp; Santosh:
> >>>>>>>
> = >>>>>>>       &nb= sp; The RFC 5280 method just describes "two common
> = >>>> methods for
> >>>>>>> = generating key identifiers from the public key"
> = >>>>>>> and says that other methods are = acceptable.  The comment
> >>>>> to = KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as = permissive.  Of course, it's
> >>>> the = same
> >>>>>>> field as SKID, and I would = support either stating "if the
> >>>>> KeyHash = is
> >>>>>>> not precisely 20 octets long, it = should be matched
> against the
> = >>>>>>> Subject Key Identifier extension of the = signing
> certificate" or
> >>>>>>> = adding another choice like byID [3] OCTET STRING --
> = >>>>> matches the value
> = >>>>>>> of SKID.
> = >>>>>>>
> = >>>>>>>       &nb= sp;         Tom Gindin
> = >>>>>>>
> >>>>>>> P.S. - = The above opinions are mine, and not necessarily
> = >>>>> those of my
> >>>>>>> = employer
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> = "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by:
> = >>>>>>> owner-ietf-pkix@mail.imc.org
> = >>>>>>> 03/26/2009 10:39 PM
> = >>>>>>>
> >>>>>>> = To
> >>>>>>> "IETF-pkix" = <ietf-pkix@imc.org>
> >>>>>>> = cc
> >>>>>>>
> = >>>>>>> Subject
> = >>>>>>> OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> RFC = 2560 dependence on SHA-1 does not appear to be
> = >>>>> difficult to deal
> = >>>>>>> with.
> = >>>>>>>
> >>>>>>> = Section 4.3 lists SHA-1 as mandatory and RSA as
> >>>> = optional.  We can
> >>>>>>> update this = to add SHA-2 series as optional.
> = >>>>>>>
> >>>>>>> The = Responder ID has SHA-1 hardwired.  But, that is no
> = >>>>> different than
> >>>>>>> = key ID extensions in RFC 5280.  Here are some options
> = >> in order of
> >>>>>>> = preference:
> >>>>>>>
> = >>>>>>> 1.  Align the language with subject = key ID language
> in RFC 5280.
> = >>>>>>>
> >>>>>>> = 2.  Keep on using SHA-1.  This field is not security
> = >>>>> relevant.  RFC
> = >>>>>>> 2560 does not even describe how to use this = field.  So,
> >>>>> having SHA-1
> = >>>>>>> and accidental or intentional collisions = will not hurt the
> >>>>> security
> = >>>>>>> of the protocol.
> = >>>>>>>
> >>>>>>> = 3.  If you do not believe in KISS principle, you can
> = >>>>> define another
> >>>>>>> = response type and enhance the key ID ASN.1 syntax so
> that = hash
> >>>>>>> algorithm is = identified.
> >>>>>>>
> = >>>>>>> 4.  Another option is for the = Responder to use the
> same hashing
> = >>>>>>> algorithm as the one in the first certID = entry.
> >>>>>>>
> = >>>>>>>
> >>>>>>> = Santosh Chokhani
> >>>>>>> CygnaCom = Solutions
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>
> = >>>>>>
> >>>>>
> = >>>>>
> >>>>> --
> = >>>>>
> >>>>> Best Regards,
> = >>>>>
> >>>>> Massimiliano = Pala
> >>>>>
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano Pala [OpenCA Project Manager]
> >>>>> = Massimiliano.Pala@dartmouth.edu
> = >>>>>         = ;    
> >>>>> = project.manager@openca.org
> >>>>>
> = >>>>> Dartmouth Computer Science = Dept           &nb= sp;   Home Phone: +1
> >>>>> (603) = 369-9332
> >>>>> PKI/Trust = Laboratory          &nb= sp;           &nbs= p;   Work Phone: +1
> >>>>> (603) = 646-9179
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>>
> = >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> >>>>> = of us who do.
> >>>>>   --
> = >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
> = >>
> >>
> = >
>
>
>

<= /BODY> ------_=_NextPart_001_01C9B39A.1397BF01-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CfYlH087505 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 05:41:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32CfYUh087504; Thu, 2 Apr 2009 05:41:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32CfWx1087495 for ; Thu, 2 Apr 2009 05:41:32 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 26164 invoked from network); 2 Apr 2009 12:40:27 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 12:40:27 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B390.59C32388" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 08:41:31 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAAATo3RwAAzaKg References: From: "Santosh Chokhani" To: "Stefan Santesson" , "Hallam-Baker, Phillip" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B390.59C32388 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Agree ________________________________ From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 Sent: Thursday, April 02, 2009 8:18 AM To: Santosh Chokhani; Hallam-Baker, Phillip; IETF-pkix Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I do agree to most things here. =09 I don't believe that implementations can strip off SHA-1 in any foreseeable future. It needs to be around, if nothing else, so for backwards compatibility. SHA-1 will continue to work in situations like this where no security properties are needed. =09 IMO, The added extension, even though I will not fight hard against it, would just be redundant complexity. =09 /Stefan =09 On 4/2/09 1:54 PM, "Santosh Chokhani" wrote: =09 =09 I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =09 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =09 It would appear that the extension should be NC. =09 Phil, =09 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =09 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. =09 =09 =20 =09 ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =20 =20 =20 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =09 =20 =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =09 =20 =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =09 =20 =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =09 =20 =20 =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =09 =20 =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =09 =20 =20 =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =09 =20 =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =09 =20 =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =09 =20 =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =09 =20 =20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =09 =20 =20 =20 =09 =20 =20 =09 ________________________________ =20 From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =20 =09 =20 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 =09 =09 ------_=_NextPart_001_01C9B390.59C32388 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Re: OCSP RFC (RFC 2560) Dependence on SHA-1
Agree


From: Stefan Santesson=20 [mailto:stefan@aaa-sec.com]
Sent: Thursday, April 02, 2009 = 8:18=20 AM
To: Santosh Chokhani; Hallam-Baker, Phillip;=20 IETF-pkix
Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I do agree to most things here.

I = don’t believe=20 that implementations can strip off SHA-1 in any foreseeable future. It = needs=20 to be around, if nothing else, so for backwards compatibility. SHA-1 = will=20 continue to work in situations like this where no security properties = are=20 needed.

IMO, The added extension, even though I will not fight = hard=20 against it,  would just be redundant = complexity.

/Stefan

On=20 4/2/09 1:54 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>=20 wrote:

I have no objection to having an extension, but if in = the long=20 term SHA-1 will not be there, it seems defining a new response type = (say=20 basic 2) would be the way to go so that SHA-1 based key ID can be = stripped=20 off.

If SHA-1 is not getting ripped = off in the=20 long term, I do not see value in extension except that it may make = every one=20 happy: those who do not care will not include it on the Server side = and/or=20 will ignore it on the client side.

It would appear that the = extension should be=20 NC.

Phil,

I would not respond to the = arguments on KISS=20 and security since in this case both are straightforward. =  Also, in=20 this thread, the comments were not meant for or directed at=20 you.

As you know, I have provided = extensive=20 comments to you when you first posted the OCSP Agility I-D and my = position=20 and reasons are matter of PKIX archives for anyone to scrutinize. =  When=20 you ignore every single cogent point, there is no sense in me = commenting on=20 next iteration.  I do think that the OCSP Agility I-D is a = solution=20 looking for a problem that I do not see.

 

From:=20 Hallam-Baker, Phillip  [mailto:pbaker@verisign.com]=20
Sent: Thursday, April 02, 2009 12:53 =  AM
To:=20 Santosh Chokhani; Stefan Santesson; =  IETF-pkix
Subject: RE:=20 OCSP RFC (RFC 2560) Dependence on  SHA-1

 
 
 
I think we have no choice  but to leave the Key = ID CHOICE=20 to be SHA-1 based.

 
 
But that does not preclude adding an  extension = that=20 allows the KeyID to be specified using a stronger algorithm. =  There=20 are two reasons for this:

 
 
1) Optics, even if there is no security =  implication, a=20 protocol that uses weak crypto necessitates an (expensive) =  security=20 review to prove that there is no problem. And these must be = performed=20  repeatedly by many different parties as relying on the = analysis of=20 others is a  good way to cause issues. Been there, done=20 that.

 
 
2) We are designing for long time spans,  ten = years or=20 more. While simple compressor collisions may not be a concern, =  there=20 is no guarantee that the attacks will stop at that point. MD4 has = been=20  broken repeatedly and they are now at the stage of jumping = up and=20 down on the  little pieces. It will probably happen to MD5 = and we=20 should be cautious in  case it happens to = SHA-1.

 
 
 
 
On the claim of 'Keep it simple STUPID',  I find = it rather=20 offensive to have my position characterized as stupid. My =  designs=20 are not exactly known for being verbose or overly elaborate. If I=20  propose something it is because there is a reason. It is = very easy=20 to defend  the status quo by derriding proposals as = unnecessary, but=20 the fact is that  making OCSP too simple will simply cause = the=20 complexity to blow out somewhere  else.

 
 
There is an architectural princple of  modular = design that=20 demands that the core of PKIX as it now stands (the =  certificate=20 profile and OCSP) be capable of stand alone use. We cannot fix=20  issues in OCSP with LTANS or other layered-on protocols as = some have=20 proposed.  It does not simplify my OCSP deployment to have to = graft=20 on an entire  different protocol in addition or to = re-engineer my=20 document archival protocol  to cover defects in = OCSP.

 
 
 
 
Simply adding new algorithms to a  protocol does = nothing=20 to improve security. You only improve security if you =  withdraw=20 insecure algorithms from use.

 
 
To make the system work you have to have  a = means of=20 negotiating between the client and the server. Otherwise there is =  no=20 way for an OCSP responder to ensure that it receives a secure,=20  supported response to querries for certificates that do not = exist=20 yet or  are not known to the responder.

 
 
In the case of an OCSP responder being  driven = by CRLs=20 collected from various sources, there is no way for the CA to =  know=20 if a certificate even exists, all it knows is if the status is=20  definitively revoked.

 
 
In the case of many transactional  architectures = the OCSP=20 validation is performed independently of certificate  chain=20 validation.

 
 
 
 
Experience of small scale PKI deployment  in = which any box=20 can be upgraded at will is simply not representative of large =  scale=20 real world deployment.

 
 
 

 
 


 
From:  owner-ietf-pkix@mail.imc.org = on=20 behalf of Santosh Chokhani
Sent: Wed  4/1/2009 8:39 = PM
To: Stefan Santesson; IETF-pkix
Subject: =  RE:=20 OCSP RFC (RFC 2560) Dependence on SHA-1

 

 

I=20 am saying that "Do you agree that 2560 can be left alone for=20  Responder
ID's key ID CHOICE being SHA-1 = based?"

>=20 -----Original  Message-----
> From: Stefan Santesson = [mailto:stefan@aaa-sec.com]
>= =20 Sent:  Wednesday, April 01, 2009 6:32 PM
> To: Santosh=20 Chokhani;  IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) = Dependence on  SHA-1
>
> Santosh,
>
> = In-line
>
>
>  On 4/1/09 10:31 PM, "Santosh = Chokhani" <SChokhani@cygnacom.com>=20  wrote:
>
> >
> > Stefan,
>=20 >
> > See  responses in-line.
> = >
>=20 >> -----Original  Message-----
> >> From: = Stefan=20 Santesson [mailto:stefan@aaa-sec.com]
>= =20  >> Sent: Wednesday, April 01, 2009 2:34 PM
> = >>=20 To: Santosh  Chokhani; Massimiliano Pala; IETF-pkix
> = >>=20 Subject: Re: OCSP RFC  (RFC 2560) Dependence on SHA-1
> = >>
> >>  Santosh,
> >>
> = >>=20 If you are talking about adding  other options to calculate=20 the
> >> KeyHash value in ResponderID  then I = strongly=20 disagree.
> >>
> >> If you add =  unspecified=20 options you change the properties
> of the field
>=20  >> from deterministic to a completely unknown = value.
>=20 >> It  does not matter if RFC2560 isn't explicit in its = description of
>  >> the use of the field. The = fact is=20 that OCSP explicitly
>  defines this
> >> = value and=20 as such will allow a client to  deterministically = compare
>=20 >> this value with the certificate  selected to = validate the=20 response
> >> signature.
>  >
> = > I=20 hope no one is doing the matching of Responder ID =  with
> hash=20 of a key
> > in place of responder signature =  verification.=20  That would
> be real bad.
> =  >
>
>=20 Yes it would. That is not at all what I talk about. But =  a
>=20 client could use this value to locate a responder=20  certificate.
>
> >> If you allow
> = >>=20 other ways  to calculate the value but do not provide any = means=20 to
> >> signal  what method that was used, then = this=20 feature is lost.
> >
>  > The most common = use will=20 be to use this field to prioritize the
>  > = certificates of=20 the responder to use for sigature
> verification on=20  the
> > response.
> >
>
> Do = you know=20 this for a  fact, or are you guessing?
> If a single=20 implementation verifies that  the certificate used
> to = validate the response matches the ResponderID  value, = and
>=20 choose to go into an error state because of mismatch, then=20  we
> have created great problems. So we can't guess. = We have=20 to
>  know that no single implementation will fail = because of=20 this.
> And that  may be very = hard.
>
>
>=20 >>
> >> In worst  case we will cause = current=20 implementation to fail.
> >
> >  That is = why I am=20 asking what problems if any will the vendors have.
>=20  >
>
> Even if no vendor speaks up here, it = will not=20 guarantee  that
> this will not create any=20 problems.
>
>  >>
> >> I really = don't=20 think its worth the effort to change  this field. We
> = >>=20 have a very large base of implementations that  we = really
>=20 don't want
> >> to mess up unless its absolutely=20  necessary.
> >
> > So, we agree that = leaving this=20 field hard  wired to SHA-1 is ok and
> > 2560 can = easily=20 accommodate new hash  functions.  Right?
>=20 >
>
> I fail to understand this  sentence. = Despite=20 reading it many
> times over.
>
> > My =  only=20 reason to align with 5280 is that if some one were
> ever=20  want
> > to strip off SHA-1 altogether from their = Responder=20 or  client,
> > permitting other methods does = it.
>=20  >
>
> I don't believe this argument is valid = as I=20 don't think  it is
> possible to strip off SHA-1 in any = reasonable future. In  any
> case. If we compare the = positive=20 side with allowing this
>  change and the negative = consequences=20 to make OCSP
> incompatible with  itself, my choice is=20 easy.
>
>  /Stefan
>
>
>=20 >>
> >> As the only  property of this field = is to=20 provide a convenient
> >> identifier,  it is far = from=20 absolutely necessary to change it.
> >> Remember =  that=20 there is a second choice to to identify responder by
> = >>=20  name. For names we have accepted the possibility of = collisions.=20 In
>  >> that comparison, upgrading from SHA-1 is = really=20 redundant.
>  >>
> >> /Stefan
> = >>
> >>
>  >>
> = >>
>=20 >> On 4/1/09 4:05 PM, "Santosh  Chokhani"
> = <SChokhani@cygnacom.com>=20 wrote:
>  >>
> >>>
> = >>> My=20 resident ASN.1 expert  apprised me of the fact that
> = >>=20 adding a choice
>  >>> will break backward=20 compatibility.  Thus, extension is  a
> >> = fifth=20 option
> >>> (probably third in the=20  priority).
> >>>
> >>> Based = on what I=20 know of  OCSP implementations, not changing
> >> = anything=20 in
>  >>> terms of bits on the wire and = aligning the=20 Key ID with  SKID
> >> in 5280 is
> = >>>=20 the best approach.   I do not think it will hurt=20 backward
> >> compatibility.
>=20  >>>
> >>> OCSP Responder and OCSP = client=20 vendors  should speak up if I
> >> am = wrong.
>=20 >>>
>  >>>> -----Original=20 Message-----
> >>>> From:  Santosh = Chokhani
>=20 >>>> Sent: Tuesday, March 31, 2009 12:51 =  PM
>=20 >>>> To: 'Massimiliano Pala'; IETF-pkix
>=20  >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence = on=20 SHA-1
>  >>>>
> >>>> = Max,
>=20  >>>>
> >>>> I do not see where = and=20 what  extension we need to add for
> >> other=20 digest
>  >>>> algorithm.
>=20 >>>>
> >>>>  For key id, we = need to=20 enhance or broaden the options.
> =  >>>>
>=20 >>>>> -----Original  Message-----
>=20 >>>>> From:  owner-ietf-pkix@mail.imc.org>=20 >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20  On Behalf Of
> >> Massimiliano Pala
>=20 >>>>>  Sent: Tuesday, March 31, 2009 1:37 = PM
>=20 >>>>> To:  IETF-pkix
> = >>>>>=20 Subject: Re: OCSP RFC (RFC 2560)  Dependence on SHA-1
> = >>>>>
> >>>>>  Hi = all,
>=20 >>>>>
> >>>>> as I said =  during=20 last meeting - as the use of SHA-1 does
> >>>> = not=20  have any
> >>>>> security implication = in the=20 OCSP,  another viable way
> would be to
>=20 >>>>> define an  extension where other digest=20 algorithms can be
> >>>> added  to = the
>=20 >>>>> request/responses.
>=20  >>>>>
> >>>>> It is a = simple=20 addition and  does not require any change in
> = >>>>=20 the RFC, it
>  >>>>> can be done as a = separate=20 document for those who what  to
> >> use = other
>=20 >>>>> digest  algorithms.
>=20 >>>>>
> >>>>> After  all, = isn't=20 this an example of why we allow
> >> extensions to=20  the
> >>>>> messages ?
>=20  >>>>>
> >>>>> = Later,
>=20  >>>>> Max
> = >>>>>
>=20  >>>>>
> >>>>> Santosh = Chokhani=20  wrote:
> >>>>>> Tom,
>=20  >>>>>>
> >>>>>> = Adding a=20 new choice  and aligning it with 5280 SKID is fine.
>=20  >>>>>>
> >>>>>> I = would=20 not add  anything about matching this field with
>=20 >>>>> anything  since
> = >>>>>>=20 RFC 2560 does not say anything about  it.
>=20 >>>>>>
> >>>>>> If one=20  were to add something, one should describe how this
>=20  >>>>> field can
> = >>>>>> be=20 used to  select from multiple Responder certificates.
> =  >>>>>>
> = >>>>>>>=20 -----Original  Message-----
> = >>>>>>>=20 From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20  >>>>>>> Sent: Monday, March 30, 2009 = 7:46=20 PM
>  >>>>>>> To: Santosh = Chokhani
>=20  >>>>>>> Cc: IETF-pkix
>=20  >>>>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on  SHA-1
> = >>>>>>>
>=20  >>>>>>>=20 =          Santosh:
>=20 >>>>>>>
> =  >>>>>>>=20          The RFC 5280 = method=20 just describes "two common
> >>>>  methods=20 for
> >>>>>>> generating key = identifiers=20  from the public key"
> >>>>>>> = and says=20 that other  methods are acceptable.  The comment
> = >>>>> to  KeyHash
> = >>>>>>>=20 in RFC 2560 4.2.1 is not as  permissive.  Of course,=20 it's
> >>>> the same
>=20  >>>>>>> field as SKID, and I would = support=20 either stating  "if the
> >>>>> KeyHash=20 is
>  >>>>>>> not precisely 20 = octets=20 long, it should be  matched
> against the
>=20 >>>>>>> Subject Key  Identifier = extension of the=20 signing
> certificate" or
> =  >>>>>>>=20 adding another choice like byID [3] OCTET STRING  --
>=20 >>>>> matches the value
>=20  >>>>>>> of SKID.
>=20  >>>>>>>
>=20  >>>>>>>=20 =             &= nbsp;    Tom=20 Gindin
> >>>>>>>
>=20  >>>>>>> P.S. - The above opinions are = mine, and=20 not  necessarily
> >>>>> those of = my
>=20  >>>>>>> employer
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
> =  >>>>>>>=20 "Santosh Chokhani" <SChokhani@cygnacom.com> =  Sent=20 by:
> >>>>>>>  owner-ietf-pkix@mail.imc.org>=20 >>>>>>> 03/26/2009  10:39 PM
>=20 >>>>>>>
> =  >>>>>>>=20 To
> >>>>>>>  "IETF-pkix" <ietf-pkix@imc.org>
>=20 >>>>>>>  cc
>=20 >>>>>>>
> >>>>>>>=20  Subject
> >>>>>>> OCSP RFC (RFC = 2560)=20 Dependence on  SHA-1
> = >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
> =  >>>>>>>=20 RFC 2560 dependence on SHA-1 does not appear to  be
>=20 >>>>> difficult to deal
>=20  >>>>>>> with.
>=20  >>>>>>>
> = >>>>>>>=20 Section 4.3  lists SHA-1 as mandatory and RSA as
>=20 >>>> optional.   We can
>=20 >>>>>>> update this to add SHA-2 series as=20  optional.
> >>>>>>>
>=20  >>>>>>> The Responder ID has SHA-1 = hardwired.=20  But,  that is no
> >>>>> different = than
>  >>>>>>> key ID extensions = in RFC=20 5280.  Here are  some options
> >> in order=20 of
> >>>>>>>  preference:
>=20 >>>>>>>
> =  >>>>>>> 1.=20  Align the language with subject key ID =  language
> in RFC=20 5280.
> >>>>>>>
>=20  >>>>>>> 2.  Keep on using SHA-1.=20  This field is  not security
> = >>>>>=20 relevant.  RFC
>  >>>>>>> = 2560 does=20 not even describe how to use this  field.  So,
>=20 >>>>> having SHA-1
>=20  >>>>>>> and accidental or intentional=20 collisions will not  hurt the
> >>>>>=20 security
>  >>>>>>> of the=20 protocol.
>  >>>>>>>
>=20 >>>>>>> 3.  If  you do not believe = in KISS=20 principle, you can
> >>>>>  define=20 another
> >>>>>>> response type and = enhance=20  the key ID ASN.1 syntax so
> that hash
>=20  >>>>>>> algorithm is = identified.
>=20  >>>>>>>
> = >>>>>>> 4.=20   Another option is for the Responder to use the
> = same=20 hashing
>  >>>>>>> algorithm as = the one in=20 the first certID  entry.
> = >>>>>>>
>=20  >>>>>>>
> = >>>>>>>=20 Santosh  Chokhani
> >>>>>>> = CygnaCom=20 Solutions
>  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>>
>=20 >>>>>>>
>=20  >>>>>>
> = >>>>>>
>=20  >>>>>
> >>>>>
>=20 >>>>>  --
> >>>>>
> = >>>>> Best  Regards,
>=20 >>>>>
> >>>>> =  Massimiliano=20 Pala
> >>>>>
> >>>>>=20 =  --o-----------------------------------------------------------
&= gt;=20  >>>>> -------------
> = >>>>>=20 Massimiliano  Pala [OpenCA Project Manager]
>=20 >>>>>  Massimiliano.Pala@dartmouth.edu<= /A>
>=20  >>>>>=20 =             <= BR>>=20  >>>>> project.manager@openca.org
>= ;=20  >>>>>
> >>>>> Dartmouth = Computer=20 Science  Dept=20 =             &= nbsp;  Home=20 Phone: +1
> >>>>> (603) 369-9332
>=20  >>>>> PKI/Trust  Laboratory=20 =             &= nbsp;           &n= bsp; Work=20 Phone: +1
> >>>>> (603) 646-9179
>=20  >>>>>=20 =  --o-----------------------------------------------------------
&= gt;=20  >>>>> -------------
>=20 >>>>>
>  >>>>> People who = think=20 they know everything are a great  annoyance
> = >>>>=20 to those
> >>>>> of us  who do.
>=20 >>>>>   --
> =  >>>>>=20 Isaac Asimov
> >>>>>
>=20  >>>>
> >>>
> = >>
>=20  >>
> >>
>=20 =  >
>
>
>


------_=_NextPart_001_01C9B390.59C32388-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CJ7El085209 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 05:19:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32CJ7FV085208; Thu, 2 Apr 2009 05:19:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CJ4Y4085201 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 2 Apr 2009 05:19:05 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 44178 invoked from network); 2 Apr 2009 12:18:34 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 2 Apr 2009 12:18:34 -0000 Received: (qmail 84293 invoked from network); 2 Apr 2009 12:18:29 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 2 Apr 2009 12:18:29 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 14:18:28 +0200 Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 From: Stefan Santesson To: Santosh Chokhani , "Hallam-Baker, Phillip" , IETF-pkix Message-ID: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoAAATo3Rw== In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321526709_11892108" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321526709_11892108 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable I do agree to most things here. I don=B9t believe that implementations can strip off SHA-1 in any foreseeable future. It needs to be around, if nothing else, so for backwards compatibility. SHA-1 will continue to work in situations like this where no security properties are needed. IMO, The added extension, even though I will not fight hard against it, would just be redundant complexity. /Stefan On 4/2/09 1:54 PM, "Santosh Chokhani" wrote: > I have no objection to having an extension, but if in the long term SHA-1= will > not be there, it seems defining a new response type (say basic 2) would b= e the > way to go so that SHA-1 based key ID can be stripped off. > =20 > If SHA-1 is not getting ripped off in the long term, I do not see value i= n > extension except that it may make every one happy: those who do not care = will > not include it on the Server side and/or will ignore it on the client sid= e. > =20 > It would appear that the extension should be NC. > =20 > Phil, > =20 > I would not respond to the arguments on KISS and security since in this c= ase > both are straightforward. Also, in this thread, the comments were not me= ant > for or directed at you. > =20 > As you know, I have provided extensive comments to you when you first pos= ted > the OCSP Agility I-D and my position and reasons are matter of PKIX archi= ves > for anyone to scrutinize. When you ignore every single cogent point, the= re is > no sense in me commenting on next iteration. I do think that the OCSP Ag= ility > I-D is a solution looking for a problem that I do not see. >> =20 >> =20 >>=20 >> From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] >> Sent: Thursday, April 02, 2009 12:53 AM >> To: Santosh Chokhani; Stefan Santesson; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>=20 >> =20 >> =20 >> =20 >> I think we have no choice but to leave the Key ID CHOICE to be SHA-1 ba= sed. >> =20 >> =20 >> =20 >> But that does not preclude adding an extension that allows the KeyID to= be >> specified using a stronger algorithm. There are two reasons for this: >> =20 >> =20 >> =20 >> 1) Optics, even if there is no security implication, a protocol that us= es >> weak crypto necessitates an (expensive) security review to prove that t= here >> is no problem. And these must be performed repeatedly by many different >> parties as relying on the analysis of others is a good way to cause iss= ues. >> Been there, done that. >> =20 >> =20 >> =20 >> 2) We are designing for long time spans, ten years or more. While simpl= e >> compressor collisions may not be a concern, there is no guarantee that = the >> attacks will stop at that point. MD4 has been broken repeatedly and the= y are >> now at the stage of jumping up and down on the little pieces. It will >> probably happen to MD5 and we should be cautious in case it happens to >> SHA-1. >> =20 >> =20 >> =20 >> =20 >> =20 >> On the claim of 'Keep it simple STUPID', I find it rather offensive to = have >> my position characterized as stupid. My designs are not exactly known f= or >> being verbose or overly elaborate. If I propose something it is because >> there is a reason. It is very easy to defend the status quo by derridin= g >> proposals as unnecessary, but the fact is that making OCSP too simple w= ill >> simply cause the complexity to blow out somewhere else. >> =20 >> =20 >> =20 >> There is an architectural princple of modular design that demands that = the >> core of PKIX as it now stands (the certificate profile and OCSP) be cap= able >> of stand alone use. We cannot fix issues in OCSP with LTANS or other >> layered-on protocols as some have proposed. It does not simplify my OCS= P >> deployment to have to graft on an entire different protocol in addition= or >> to re-engineer my document archival protocol to cover defects in OCSP. >> =20 >> =20 >> =20 >> =20 >> =20 >> Simply adding new algorithms to a protocol does nothing to improve secu= rity. >> You only improve security if you withdraw insecure algorithms from use. >> =20 >> =20 >> =20 >> To make the system work you have to have a means of negotiating between= the >> client and the server. Otherwise there is no way for an OCSP responder = to >> ensure that it receives a secure, supported response to querries for >> certificates that do not exist yet or are not known to the responder. >> =20 >> =20 >> =20 >> In the case of an OCSP responder being driven by CRLs collected from va= rious >> sources, there is no way for the CA to know if a certificate even exist= s, >> all it knows is if the status is definitively revoked. >> =20 >> =20 >> =20 >> In the case of many transactional architectures the OCSP validation is >> performed independently of certificate chain validation. >> =20 >> =20 >> =20 >> =20 >> =20 >> Experience of small scale PKI deployment in which any box can be upgrad= ed at >> will is simply not representative of large scale real world deployment. >> =20 >> =20 >> =20 >> =20 >>=20 >> =20 >> =20 >>=20 >> =20 >> =20 >> From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani >> Sent: Wed 4/1/2009 8:39 PM >> To: Stefan Santesson; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>=20 >> =20 >>=20 >> =20 >>=20 >> I am saying that "Do you agree that 2560 can be left alone for Responde= r >> ID's key ID CHOICE being SHA-1 based?" >>=20 >>> > -----Original Message----- >>> > From: Stefan Santesson [mailto:stefan@aaa-sec.com] >>> > Sent: Wednesday, April 01, 2009 6:32 PM >>> > To: Santosh Chokhani; IETF-pkix >>> > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>> > >>> > Santosh, >>> > >>> > In-line >>> > >>> > >>> > On 4/1/09 10:31 PM, "Santosh Chokhani" wro= te: >>> > >>>> > > >>>> > > Stefan, >>>> > > >>>> > > See responses in-line. >>>> > > >>>>> > >> -----Original Message----- >>>>> > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] >>>>> > >> Sent: Wednesday, April 01, 2009 2:34 PM >>>>> > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix >>>>> > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> > >> >>>>> > >> Santosh, >>>>> > >> >>>>> > >> If you are talking about adding other options to calculate the >>>>> > >> KeyHash value in ResponderID then I strongly disagree. >>>>> > >> >>>>> > >> If you add unspecified options you change the properties >>> > of the field >>>>> > >> from deterministic to a completely unknown value. >>>>> > >> It does not matter if RFC2560 isn't explicit in its description= of >>>>> > >> the use of the field. The fact is that OCSP explicitly >>> > defines this >>>>> > >> value and as such will allow a client to deterministically comp= are >>>>> > >> this value with the certificate selected to validate the respon= se >>>>> > >> signature. >>>> > > >>>> > > I hope no one is doing the matching of Responder ID with >>> > hash of a key >>>> > > in place of responder signature verification. That would >>> > be real bad. >>>> > > >>> > >>> > Yes it would. That is not at all what I talk about. But a >>> > client could use this value to locate a responder certificate. >>> > >>>>> > >> If you allow >>>>> > >> other ways to calculate the value but do not provide any means = to >>>>> > >> signal what method that was used, then this feature is lost. >>>> > > >>>> > > The most common use will be to use this field to prioritize the >>>> > > certificates of the responder to use for sigature >>> > verification on the >>>> > > response. >>>> > > >>> > >>> > Do you know this for a fact, or are you guessing? >>> > If a single implementation verifies that the certificate used >>> > to validate the response matches the ResponderID value, and >>> > choose to go into an error state because of mismatch, then we >>> > have created great problems. So we can't guess. We have to >>> > know that no single implementation will fail because of this. >>> > And that may be very hard. >>> > >>> > >>>>> > >> >>>>> > >> In worst case we will cause current implementation to fail. >>>> > > >>>> > > That is why I am asking what problems if any will the vendors hav= e. >>>> > > >>> > >>> > Even if no vendor speaks up here, it will not guarantee that >>> > this will not create any problems. >>> > >>>>> > >> >>>>> > >> I really don't think its worth the effort to change this field.= We >>>>> > >> have a very large base of implementations that we really >>> > don't want >>>>> > >> to mess up unless its absolutely necessary. >>>> > > >>>> > > So, we agree that leaving this field hard wired to SHA-1 is ok an= d >>>> > > 2560 can easily accommodate new hash functions. Right? >>>> > > >>> > >>> > I fail to understand this sentence. Despite reading it many >>> > times over. >>> > >>>> > > My only reason to align with 5280 is that if some one were >>> > ever want >>>> > > to strip off SHA-1 altogether from their Responder or client, >>>> > > permitting other methods does it. >>>> > > >>> > >>> > I don't believe this argument is valid as I don't think it is >>> > possible to strip off SHA-1 in any reasonable future. In any >>> > case. If we compare the positive side with allowing this >>> > change and the negative consequences to make OCSP >>> > incompatible with itself, my choice is easy. >>> > >>> > /Stefan >>> >=20 >>> > >>>>> > >> >>>>> > >> As the only property of this field is to provide a convenient >>>>> > >> identifier, it is far from absolutely necessary to change it. >>>>> > >> Remember that there is a second choice to to identify responder= by >>>>> > >> name. For names we have accepted the possibility of collisions.= In >>>>> > >> that comparison, upgrading from SHA-1 is really redundant. >>>>> > >> >>>>> > >> /Stefan >>>>> > >> >>>>> > >> >>>>> > >> >>>>> > >> >>>>> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" >>> > wrote: >>>>> > >> >>>>>> > >>> >>>>>> > >>> My resident ASN.1 expert apprised me of the fact that >>>>> > >> adding a choice >>>>>> > >>> will break backward compatibility. Thus, extension is a >>>>> > >> fifth option >>>>>> > >>> (probably third in the priority). >>>>>> > >>> >>>>>> > >>> Based on what I know of OCSP implementations, not changing >>>>> > >> anything in >>>>>> > >>> terms of bits on the wire and aligning the Key ID with SKID >>>>> > >> in 5280 is >>>>>> > >>> the best approach. I do not think it will hurt backward >>>>> > >> compatibility. >>>>>> > >>> >>>>>> > >>> OCSP Responder and OCSP client vendors should speak up if I >>>>> > >> am wrong. >>>>>> > >>> >>>>>>> > >>>> -----Original Message----- >>>>>>> > >>>> From: Santosh Chokhani >>>>>>> > >>>> Sent: Tuesday, March 31, 2009 12:51 PM >>>>>>> > >>>> To: 'Massimiliano Pala'; IETF-pkix >>>>>>> > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>> > >>>> >>>>>>> > >>>> Max, >>>>>>> > >>>> >>>>>>> > >>>> I do not see where and what extension we need to add for >>>>> > >> other digest >>>>>>> > >>>> algorithm. >>>>>>> > >>>> >>>>>>> > >>>> For key id, we need to enhance or broaden the options. >>>>>>> > >>>> >>>>>>>> > >>>>> -----Original Message----- >>>>>>>> > >>>>> From: owner-ietf-pkix@mail.imc.org >>>>>>>> > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of >>>>> > >> Massimiliano Pala >>>>>>>> > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM >>>>>>>> > >>>>> To: IETF-pkix >>>>>>>> > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>> > >>>>> >>>>>>>> > >>>>> Hi all, >>>>>>>> > >>>>> >>>>>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does >>>>>>> > >>>> not have any >>>>>>>> > >>>>> security implication in the OCSP, another viable way >>> > would be to >>>>>>>> > >>>>> define an extension where other digest algorithms can be >>>>>>> > >>>> added to the >>>>>>>> > >>>>> request/responses. >>>>>>>> > >>>>> >>>>>>>> > >>>>> It is a simple addition and does not require any change i= n >>>>>>> > >>>> the RFC, it >>>>>>>> > >>>>> can be done as a separate document for those who what to >>>>> > >> use other >>>>>>>> > >>>>> digest algorithms. >>>>>>>> > >>>>> >>>>>>>> > >>>>> After all, isn't this an example of why we allow >>>>> > >> extensions to the >>>>>>>> > >>>>> messages ? >>>>>>>> > >>>>> >>>>>>>> > >>>>> Later, >>>>>>>> > >>>>> Max >>>>>>>> > >>>>> >>>>>>>> > >>>>> >>>>>>>> > >>>>> Santosh Chokhani wrote: >>>>>>>>> > >>>>>> Tom, >>>>>>>>> > >>>>>> >>>>>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is f= ine. >>>>>>>>> > >>>>>> >>>>>>>>> > >>>>>> I would not add anything about matching this field with >>>>>>>> > >>>>> anything since >>>>>>>>> > >>>>>> RFC 2560 does not say anything about it. >>>>>>>>> > >>>>>> >>>>>>>>> > >>>>>> If one were to add something, one should describe how t= his >>>>>>>> > >>>>> field can >>>>>>>>> > >>>>>> be used to select from multiple Responder certificates. >>>>>>>>> > >>>>>> >>>>>>>>>> > >>>>>>> -----Original Message----- >>>>>>>>>> > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] >>>>>>>>>> > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM >>>>>>>>>> > >>>>>>> To: Santosh Chokhani >>>>>>>>>> > >>>>>>> Cc: IETF-pkix >>>>>>>>>> > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Santosh: >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> The RFC 5280 method just describes "two comm= on >>>>>>> > >>>> methods for >>>>>>>>>> > >>>>>>> generating key identifiers from the public key" >>>>>>>>>> > >>>>>>> and says that other methods are acceptable. The comm= ent >>>>>>>> > >>>>> to KeyHash >>>>>>>>>> > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, i= t's >>>>>>> > >>>> the same >>>>>>>>>> > >>>>>>> field as SKID, and I would support either stating "i= f the >>>>>>>> > >>>>> KeyHash is >>>>>>>>>> > >>>>>>> not precisely 20 octets long, it should be matched >>> > against the >>>>>>>>>> > >>>>>>> Subject Key Identifier extension of the signing >>> > certificate" or >>>>>>>>>> > >>>>>>> adding another choice like byID [3] OCTET STRING -- >>>>>>>> > >>>>> matches the value >>>>>>>>>> > >>>>>>> of SKID. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Tom Gindin >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessar= ily >>>>>>>> > >>>>> those of my >>>>>>>>>> > >>>>>>> employer >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: >>>>>>>>>> > >>>>>>> owner-ietf-pkix@mail.imc.org >>>>>>>>>> > >>>>>>> 03/26/2009 10:39 PM >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> To >>>>>>>>>> > >>>>>>> "IETF-pkix" >>>>>>>>>> > >>>>>>> cc >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Subject >>>>>>>>>> > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be >>>>>>>> > >>>>> difficult to deal >>>>>>>>>> > >>>>>>> with. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as >>>>>>> > >>>> optional. We can >>>>>>>>>> > >>>>>>> update this to add SHA-2 series as optional. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is = no >>>>>>>> > >>>>> different than >>>>>>>>>> > >>>>>>> key ID extensions in RFC 5280. Here are some option= s >>>>> > >> in order of >>>>>>>>>> > >>>>>>> preference: >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> 1. Align the language with subject key ID language >>> > in RFC 5280. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security >>>>>>>> > >>>>> relevant. RFC >>>>>>>>>> > >>>>>>> 2560 does not even describe how to use this field. = So, >>>>>>>> > >>>>> having SHA-1 >>>>>>>>>> > >>>>>>> and accidental or intentional collisions will not hu= rt the >>>>>>>> > >>>>> security >>>>>>>>>> > >>>>>>> of the protocol. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can >>>>>>>> > >>>>> define another >>>>>>>>>> > >>>>>>> response type and enhance the key ID ASN.1 syntax so >>> > that hash >>>>>>>>>> > >>>>>>> algorithm is identified. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> 4. Another option is for the Responder to use the >>> > same hashing >>>>>>>>>> > >>>>>>> algorithm as the one in the first certID entry. >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> Santosh Chokhani >>>>>>>>>> > >>>>>>> CygnaCom Solutions >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>>> > >>>>>>> >>>>>>>>> > >>>>>> >>>>>>>>> > >>>>>> >>>>>>>> > >>>>> >>>>>>>> > >>>>> >>>>>>>> > >>>>> -- >>>>>>>> > >>>>> >>>>>>>> > >>>>> Best Regards, >>>>>>>> > >>>>> >>>>>>>> > >>>>> Massimiliano Pala >>>>>>>> > >>>>> >>>>>>>> > >>>>> --o------------------------------------------------------= ----- >>>>>>>> > >>>>> ------------- >>>>>>>> > >>>>> Massimiliano Pala [OpenCA Project Manager] >>>>>>>> > >>>>> Massimiliano.Pala@dartmouth.edu >>>>>>>> > >>>>> =20 >>>>>>>> > >>>>> project.manager@openca.org >>>>>>>> > >>>>> >>>>>>>> > >>>>> Dartmouth Computer Science Dept Home Phone= : +1 >>>>>>>> > >>>>> (603) 369-9332 >>>>>>>> > >>>>> PKI/Trust Laboratory Work Phon= e: +1 >>>>>>>> > >>>>> (603) 646-9179 >>>>>>>> > >>>>> =20 >>>>>>>> --o----------------------------------------------------------- >>>>>>>> > >>>>> ------------- >>>>>>>> > >>>>> >>>>>>>> > >>>>> People who think they know everything are a great annoya= nce >>>>>>> > >>>> to those >>>>>>>> > >>>>> of us who do. >>>>>>>> > >>>>> -- >>>>>>>> > >>>>> Isaac Asimov >>>>>>>> > >>>>> >>>>>>> > >>>> >>>>>> > >>> >>>>> > >> >>>>> > >> >>>>> > >> >>>> > > >>> > >>> > >>> > >>=20 >=20 --B_3321526709_11892108 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Re: OCSP RFC (RFC 2560) Dependence on SHA-1 I do agree to most things here.

I don’t believe that implementations can strip off SHA-1 in any fores= eeable future. It needs to be around, if nothing else, so for backwards comp= atibility. SHA-1 will continue to work in situations like this where no secu= rity properties are needed.

IMO, The added extension, even though I will not fight hard against it, &nb= sp;would just be redundant complexity.

/Stefan

On 4/2/09 1:54 PM, "Santosh Chokhani" <SChokhani@cygnacom.com> wrote:

I have no objection to having an extension, but if in t= he long term SHA-1 will not be there, it seems defining a new response type = (say basic 2) would be the way to go so that SHA-1 based key ID can be strip= ped off.

If SHA-1 is not getting rip= ped off in the long term, I do not see value in extension except that it may= make every one happy: those who do not care will not include it on the Serv= er side and/or will ignore it on the client side.

It would appear that the ex= tension should be NC.

Phil,

I would not respond to the = arguments on KISS and security since in this case both are straightforward. =  Also, in this thread, the comments were not meant for or directed at y= ou.

As you know, I have provide= d extensive comments to you when you first posted the OCSP Agility I-D and m= y position and reasons are matter of PKIX archives for anyone to scrutinize.=  When you ignore every single cogent point, there is no sense in me co= mmenting on next iteration.  I do think that the OCSP Agility I-D is a = solution looking for a problem that I do not see.

 

From: Hallam-Baker, Phillip  [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 12:53  AM
To: Santosh Chokhani; Stefan Santesson;  IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on  SHA-1

 
 
 
I think we have no choice  but to leave the = Key ID CHOICE to be SHA-1 based.

 
 
But that does not preclude adding an  extens= ion that allows the KeyID to be specified using a stronger algorithm.  = There are two reasons for this:

 
 
1) Optics, even if there is no security  imp= lication, a protocol that uses weak crypto necessitates an (expensive)  = ;security review to prove that there is no problem. And these must be perfor= med  repeatedly by many different parties as relying on the analysis of= others is a  good way to cause issues. Been there, done that.

 
 
2) We are designing for long time spans,  te= n years or more. While simple compressor collisions may not be a concern, &n= bsp;there is no guarantee that the attacks will stop at that point. MD4 has = been  broken repeatedly and they are now at the stage of jumping up and= down on the  little pieces. It will probably happen to MD5 and we shou= ld be cautious in  case it happens to SHA-1.

 
 
 
 
On the claim of 'Keep it simple STUPID',  I = find it rather offensive to have my position characterized as stupid. My &nb= sp;designs are not exactly known for being verbose or overly elaborate. If I=  propose something it is because there is a reason. It is very easy to= defend  the status quo by derriding proposals as unnecessary, but the = fact is that  making OCSP too simple will simply cause the complexity t= o blow out somewhere  else.

 
 
There is an architectural princple of  modul= ar design that demands that the core of PKIX as it now stands (the  cer= tificate profile and OCSP) be capable of stand alone use. We cannot fix &nbs= p;issues in OCSP with LTANS or other layered-on protocols as some have propo= sed.  It does not simplify my OCSP deployment to have to graft on an en= tire  different protocol in addition or to re-engineer my document arch= ival protocol  to cover defects in OCSP.

 
 
 
 
Simply adding new algorithms to a  protocol = does nothing to improve security. You only improve security if you  wit= hdraw insecure algorithms from use.

 
 
To make the system work you have to have  a = means of negotiating between the client and the server. Otherwise there is &= nbsp;no way for an OCSP responder to ensure that it receives a secure,  = ;supported response to querries for certificates that do not exist yet or &n= bsp;are not known to the responder.

 
 
In the case of an OCSP responder being  driv= en by CRLs collected from various sources, there is no way for the CA to &nb= sp;know if a certificate even exists, all it knows is if the status is  = ;definitively revoked.

 
 
In the case of many transactional  architect= ures the OCSP validation is performed independently of certificate  cha= in validation.

 
 
 
 
Experience of small scale PKI deployment  in= which any box can be upgraded at will is simply not representative of large=  scale real world deployment.

 
 
 

 
 


 
From:  owner-ietf-pkix@mail.imc.org on beh= alf of Santosh Chokhani
Sent: Wed  4/1/2009 8:39 PM
To: Stefan Santesson; IETF-pkix
Subject:  RE: OCSP RFC (RFC 2560) Dependence on SHA-1

 

 

I am saying that "Do you agree that 2560 can be left alone for  R= esponder
ID's key ID CHOICE being SHA-1 based?"

> -----Original  Message-----
> From: Stefan Santesson [mailto:ste= fan@aaa-sec.com]
> Sent:  Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani;  IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on  SHA-1
>
> Santosh,
>
> In-line
>
>
>  On 4/1/09 10:31 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>  wrote:
>
> >
> > Stefan,
> >
> > See  responses in-line.
> >
> >> -----Original  Message-----
> >> From: Stefan Santesson [m= ailto:stefan@aaa-sec.com]
>  >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: Santosh  Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: Re: OCSP RFC  (RFC 2560) Dependence on SHA-1 > >>
> >>  Santosh,
> >>
> >> If you are talking about adding  other options to calcul= ate the
> >> KeyHash value in ResponderID  then I strongly disagree.<= BR> > >>
> >> If you add  unspecified options you change the propertie= s
> of the field
>  >> from deterministic to a completely unknown value.
> >> It  does not matter if RFC2560 isn't explicit in its des= cription of
>  >> the use of the field. The fact is that OCSP explicitly<= BR> >  defines this
> >> value and as such will allow a client to  deterministica= lly compare
> >> this value with the certificate  selected to validate th= e response
> >> signature.
>  >
> > I hope no one is doing the matching of Responder ID  with > hash of a key
> > in place of responder signature  verification.  That wo= uld
> be real bad.
>  >
>
> Yes it would. That is not at all what I talk about. But  a
> client could use this value to locate a responder  certificate. >
> >> If you allow
> >> other ways  to calculate the value but do not provide an= y means to
> >> signal  what method that was used, then this feature is = lost.
> >
>  > The most common use will be to use this field to prioritize= the
>  > certificates of the responder to use for sigature
> verification on  the
> > response.
> >
>
> Do you know this for a  fact, or are you guessing?
> If a single implementation verifies that  the certificate used > to validate the response matches the ResponderID  value, and
> choose to go into an error state because of mismatch, then  we > have created great problems. So we can't guess. We have to
>  know that no single implementation will fail because of this. > And that  may be very hard.
>
>
> >>
> >> In worst  case we will cause current implementation to f= ail.
> >
> >  That is why I am asking what problems if any will the vendo= rs have.
>  >
>
> Even if no vendor speaks up here, it will not guarantee  that
> this will not create any problems.
>
>  >>
> >> I really don't think its worth the effort to change  thi= s field. We
> >> have a very large base of implementations that  we reall= y
> don't want
> >> to mess up unless its absolutely  necessary.
> >
> > So, we agree that leaving this field hard  wired to SHA-1 is= ok and
> > 2560 can easily accommodate new hash  functions.  Right= ?
> >
>
> I fail to understand this  sentence. Despite reading it many
> times over.
>
> > My  only reason to align with 5280 is that if some one were<= BR> > ever  want
> > to strip off SHA-1 altogether from their Responder or  clien= t,
> > permitting other methods does it.
>  >
>
> I don't believe this argument is valid as I don't think  it is > possible to strip off SHA-1 in any reasonable future. In  any
> case. If we compare the positive side with allowing this
>  change and the negative consequences to make OCSP
> incompatible with  itself, my choice is easy.
>
>  /Stefan
>
>
> >>
> >> As the only  property of this field is to provide a conv= enient
> >> identifier,  it is far from absolutely necessary to chan= ge it.
> >> Remember  that there is a second choice to to identify r= esponder by
> >>  name. For names we have accepted the possibility of col= lisions. In
>  >> that comparison, upgrading from SHA-1 is really redunda= nt.
>  >>
> >> /Stefan
> >>
> >>
>  >>
> >>
> >> On 4/1/09 4:05 PM, "Santosh  Chokhani"
> <SChokhani@cygnacom.com> wr= ote:
>  >>
> >>>
> >>> My resident ASN.1 expert  apprised me of the fact th= at
> >> adding a choice
>  >>> will break backward compatibility.  Thus, exte= nsion is  a
> >> fifth option
> >>> (probably third in the  priority).
> >>>
> >>> Based on what I know of  OCSP implementations, not c= hanging
> >> anything in
>  >>> terms of bits on the wire and aligning the Key ID w= ith  SKID
> >> in 5280 is
> >>> the best approach.   I do not think it will hur= t backward
> >> compatibility.
>  >>>
> >>> OCSP Responder and OCSP client vendors  should speak= up if I
> >> am wrong.
> >>>
>  >>>> -----Original Message-----
> >>>> From:  Santosh Chokhani
> >>>> Sent: Tuesday, March 31, 2009 12:51  PM
> >>>> To: 'Massimiliano Pala'; IETF-pkix
>  >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
>  >>>>
> >>>> Max,
>  >>>>
> >>>> I do not see where and what  extension we need t= o add for
> >> other digest
>  >>>> algorithm.
> >>>>
> >>>>  For key id, we need to enhance or broaden the o= ptions.
>  >>>>
> >>>>> -----Original  Message-----
> >>>>> From:  owner-ietf-pkix@mail.imc.org
> >>>>> [ma= ilto:owner-ietf-pkix@mail.imc.org]  On Behalf Of
> >> Massimiliano Pala
> >>>>>  Sent: Tuesday, March 31, 2009 1:37 PM
> >>>>> To:  IETF-pkix
> >>>>> Subject: Re: OCSP RFC (RFC 2560)  Dependence= on SHA-1
> >>>>>
> >>>>>  Hi all,
> >>>>>
> >>>>> as I said  during last meeting - as the use = of SHA-1 does
> >>>> not  have any
> >>>>> security implication in the OCSP,  another v= iable way
> would be to
> >>>>> define an  extension where other digest algo= rithms can be
> >>>> added  to the
> >>>>> request/responses.
>  >>>>>
> >>>>> It is a simple addition and  does not requir= e any change in
> >>>> the RFC, it
>  >>>>> can be done as a separate document for thos= e who what  to
> >> use other
> >>>>> digest  algorithms.
> >>>>>
> >>>>> After  all, isn't this an example of why we = allow
> >> extensions to  the
> >>>>> messages ?
>  >>>>>
> >>>>> Later,
>  >>>>> Max
> >>>>>
>  >>>>>
> >>>>> Santosh Chokhani  wrote:
> >>>>>> Tom,
>  >>>>>>
> >>>>>> Adding a new choice  and aligning it wit= h 5280 SKID is fine.
>  >>>>>>
> >>>>>> I would not add  anything about matching= this field with
> >>>>> anything  since
> >>>>>> RFC 2560 does not say anything about  it= .
> >>>>>>
> >>>>>> If one  were to add something, one shoul= d describe how this
>  >>>>> field can
> >>>>>> be used to  select from multiple Respond= er certificates.
>  >>>>>>
> >>>>>>> -----Original  Message-----
> >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>  >>>>>>> Sent: Monday, March 30, 2009 7:46 P= M
>  >>>>>>> To: Santosh Chokhani
>  >>>>>>> Cc: IETF-pkix
>  >>>>>>> Subject: Re: OCSP RFC (RFC 2560) De= pendence on  SHA-1
> >>>>>>>
>  >>>>>>>       = ;   Santosh:
> >>>>>>>
>  >>>>>>>       = ;   The RFC 5280 method just describes "two common
> >>>>  methods for
> >>>>>>> generating key identifiers  from the= public key"
> >>>>>>> and says that other  methods are acc= eptable.  The comment
> >>>>> to  KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as  permiss= ive.  Of course, it's
> >>>> the same
>  >>>>>>> field as SKID, and I would support = either stating  "if the
> >>>>> KeyHash is
>  >>>>>>> not precisely 20 octets long, it sh= ould be  matched
> against the
> >>>>>>> Subject Key  Identifier extension of= the signing
> certificate" or
>  >>>>>>> adding another choice like byID [3]= OCTET STRING  --
> >>>>> matches the value
>  >>>>>>> of SKID.
>  >>>>>>>
>  >>>>>>>       = ;           Tom Gindi= n
> >>>>>>>
>  >>>>>>> P.S. - The above opinions are mine,= and not  necessarily
> >>>>> those of my
>  >>>>>>> employer
>  >>>>>>>
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>> "Santosh Chokhani" <SChokhani@cygnacom.com>  Sent by:=
> >>>>>>>  owner-ietf-pkix@mail.imc.org
> >>>>>>> 03/26/2009  10:39 PM
> >>>>>>>
>  >>>>>>> To
> >>>>>>>  "IETF-pkix" <ietf-pkix@imc.org>
> >>>>>>>  cc
> >>>>>>>
> >>>>>>>  Subject
> >>>>>>> OCSP RFC (RFC 2560) Dependence on  S= HA-1
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>> RFC 2560 dependence on SHA-1 does n= ot appear to  be
> >>>>> difficult to deal
>  >>>>>>> with.
>  >>>>>>>
> >>>>>>> Section 4.3  lists SHA-1 as mandator= y and RSA as
> >>>> optional.   We can
> >>>>>>> update this to add SHA-2 series as  = optional.
> >>>>>>>
>  >>>>>>> The Responder ID has SHA-1 hardwire= d.  But,  that is no
> >>>>> different than
>  >>>>>>> key ID extensions in RFC 5280. &nbs= p;Here are  some options
> >> in order of
> >>>>>>>  preference:
> >>>>>>>
>  >>>>>>> 1.  Align the language with su= bject key ID  language
> in RFC 5280.
> >>>>>>>
>  >>>>>>> 2.  Keep on using SHA-1.  = ;This field is  not security
> >>>>> relevant.  RFC
>  >>>>>>> 2560 does not even describe how to = use this  field.  So,
> >>>>> having SHA-1
>  >>>>>>> and accidental or intentional colli= sions will not  hurt the
> >>>>> security
>  >>>>>>> of the protocol.
>  >>>>>>>
> >>>>>>> 3.  If  you do not believe in K= ISS principle, you can
> >>>>>  define another
> >>>>>>> response type and enhance  the key I= D ASN.1 syntax so
> that hash
>  >>>>>>> algorithm is identified.
>  >>>>>>>
> >>>>>>> 4.   Another option is for the = Responder to use the
> same hashing
>  >>>>>>> algorithm as the one in the first c= ertID  entry.
> >>>>>>>
>  >>>>>>>
> >>>>>>> Santosh  Chokhani
> >>>>>>> CygnaCom Solutions
>  >>>>>>>
> >>>>>>>
>  >>>>>>>
> >>>>>>>
>  >>>>>>
> >>>>>>
>  >>>>>
> >>>>>
> >>>>>  --
> >>>>>
> >>>>> Best  Regards,
> >>>>>
> >>>>>  Massimiliano Pala
> >>>>>
> >>>>>  --o----------------------------------------= -------------------
>  >>>>> -------------
> >>>>> Massimiliano  Pala [OpenCA Project Manager]<= BR> > >>>>>  M= assimiliano.Pala@dartmouth.edu
>  >>>>>        &= nbsp;    
>  >>>>> projec= t.manager@openca.org
>  >>>>>
> >>>>> Dartmouth Computer Science  Dept   = ;            &nb= sp;Home Phone: +1
> >>>>> (603) 369-9332
>  >>>>> PKI/Trust  Laboratory   &nbs= p;            &n= bsp;          Work Phone: = +1
> >>>>> (603) 646-9179
>  >>>>>  --o----------------------------------= -------------------------
>  >>>>> -------------
> >>>>>
>  >>>>> People who think they know everything are a= great  annoyance
> >>>> to those
> >>>>> of us  who do.
> >>>>>   --
>  >>>>> Isaac Asimov
> >>>>>
>  >>>>
> >>>
> >>
>  >>
> >>
>  >
>
>
>


--B_3321526709_11892108-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CAnLb084468 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 05:10:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32CAnqr084467; Thu, 2 Apr 2009 05:10:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32CAk2l084448 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 2 Apr 2009 05:10:48 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 28396 invoked from network); 2 Apr 2009 12:10:49 -0000 Received: from s34.loopia.se (HELO s24.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 2 Apr 2009 12:10:49 -0000 Received: (qmail 41732 invoked from network); 2 Apr 2009 12:10:45 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s24.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 2 Apr 2009 12:10:45 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 14:10:44 +0200 Subject: Problem with draft-turner-caclearanceconstraints-02.txt From: Stefan Santesson To: IETF-pkix Message-ID: Thread-Topic: Problem with draft-turner-caclearanceconstraints-02.txt Thread-Index: AcmzjAxNtzBfJ61Ws0OScv3P3Q+ASg== Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321526245_11855927" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321526245_11855927 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable I found a problem with draft-turner-caclearanceconstraints-02.txt Section 4.1.1. Certification Path Processing states When processing Authority Clearance Constraints certificate extension for the purposes of validating Clearance attribute in the end certificate, PKC, the processing described in this section or an equivalent algorithm MUST be included in the certification path validation. It is problematic, and unnecessary to require ca clearance constraints processing to be =B3included=B2 in certification path validation. None of the clearance constraints information is needed to determine the validity of the certificate, and as such it does not be processed as an integrated process. It would be perfectly valid for an application who choose to rely on the clearance information, to process clearance constraints as a post process, i.e. after path validation is completed. A requirement to integrate caclearance constraints into path validation would make this a lot harder to implement as it would require modification to core security components. Stefan Santesson AAA-sec.com --B_3321526245_11855927 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Problem with draft-turner-caclearanceconstraints-02.txt I found a problem with draft-turner-caclearanceconstraints-02.txt

Section
4.1.1. Certification Path Processing<= /FONT>  states

  When processing Authority Clearance Constraint= s certificate extension
   for the purposes of validating Clearance attribute in the end certificate,<= /FONT> PKC,
  the processing described in this section or an equi= valent algorithm
   MUST be included in the certification path validation.
It is problematic, and unnecessary to require ca clea= rance constraints processing to be “included” in certification p= ath validation.
None of the clearance constraints information is needed to determine the va= lidity of the certificate, and as such it does not be processed as an integr= ated process.

It would be perfectly valid for an application who choose to rely on the cl= earance information, to process clearance constraints as a post process, i.e= . after path validation is completed.

A requirement to integrate caclearance constraints into path validation wou= ld make this a lot harder to implement as it would require modification to c= ore security components.

Stefan Santesson
AAA-sec.com



--B_3321526245_11855927-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32BsGsI082704 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 04:54:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32BsGVq082703; Thu, 2 Apr 2009 04:54:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n32Bs4ZG082686 for ; Thu, 2 Apr 2009 04:54:15 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 25825 invoked from network); 2 Apr 2009 11:52:59 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 11:52:59 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B389.B83C96F2" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Thu, 2 Apr 2009 07:54:02 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2AA7xVoA= References: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B389.B83C96F2 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I have no objection to having an extension, but if in the long term SHA-1 will not be there, it seems defining a new response type (say basic 2) would be the way to go so that SHA-1 based key ID can be stripped off. =20 If SHA-1 is not getting ripped off in the long term, I do not see value in extension except that it may make every one happy: those who do not care will not include it on the Server side and/or will ignore it on the client side. =20 It would appear that the extension should be NC. =20 Phil, =20 I would not respond to the arguments on KISS and security since in this case both are straightforward. Also, in this thread, the comments were not meant for or directed at you. =20 As you know, I have provided extensive comments to you when you first posted the OCSP Agility I-D and my position and reasons are matter of PKIX archives for anyone to scrutinize. When you ignore every single cogent point, there is no sense in me commenting on next iteration. I do think that the OCSP Agility I-D is a solution looking for a problem that I do not see. ________________________________ From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]=20 Sent: Thursday, April 02, 2009 12:53 AM To: Santosh Chokhani; Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I think we have no choice but to leave the Key ID CHOICE to be SHA-1 based. =20 But that does not preclude adding an extension that allows the KeyID to be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that uses weak crypto necessitates an (expensive) security review to prove that there is no problem. And these must be performed repeatedly by many different parties as relying on the analysis of others is a good way to cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple compressor collisions may not be a concern, there is no guarantee that the attacks will stop at that point. MD4 has been broken repeatedly and they are now at the stage of jumping up and down on the little pieces. It will probably happen to MD5 and we should be cautious in case it happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to have my position characterized as stupid. My designs are not exactly known for being verbose or overly elaborate. If I propose something it is because there is a reason. It is very easy to defend the status quo by derriding proposals as unnecessary, but the fact is that making OCSP too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that the core of PKIX as it now stands (the certificate profile and OCSP) be capable of stand alone use. We cannot fix issues in OCSP with LTANS or other layered-on protocols as some have proposed. It does not simplify my OCSP deployment to have to graft on an entire different protocol in addition or to re-engineer my document archival protocol to cover defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve security. You only improve security if you withdraw insecure algorithms from use. =20 To make the system work you have to have a means of negotiating between the client and the server. Otherwise there is no way for an OCSP responder to ensure that it receives a secure, supported response to querries for certificates that do not exist yet or are not known to the responder. =20 In the case of an OCSP responder being driven by CRLs collected from various sources, there is no way for the CA to know if a certificate even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be upgraded at will is simply not representative of large scale real world deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 =09 =09 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" =09 > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > =09 =09 ------_=_NextPart_001_01C9B389.B83C96F2 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
I have no objection to having an extension, but if = in the long=20 term SHA-1 will not be there, it seems defining a new response type (say = basic=20 2) would be the way to go so that SHA-1 based key ID can be stripped=20 off.
 
If SHA-1 is not getting ripped off in the long = term, I do=20 not see value in extension except that it may make every one happy: = those who do=20 not care will not include it on the Server side and/or will ignore = it on=20 the client side.
 
It would appear that the extension should be=20 NC.
 
Phil,
 
I would not respond to the arguments on KISS and = security=20 since in this case both are straightforward.  Also, in this thread, = the=20 comments were not meant for or directed at you.
 
As you know, I have provided extensive comments to = you when=20 you first posted the OCSP Agility I-D and my position and reasons are = matter of=20 PKIX archives for anyone to scrutinize.  When you ignore every = single=20 cogent point, there is no sense in me commenting on next = iteration.  I do=20 think that the OCSP Agility I-D is a solution looking for a problem that = I do=20 not see.

From: Hallam-Baker, Phillip=20 [mailto:pbaker@verisign.com]
Sent: Thursday, April 02, 2009 = 12:53=20 AM
To: Santosh Chokhani; Stefan Santesson;=20 IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) Dependence on=20 SHA-1

I think we = have no choice=20 but to leave the Key ID CHOICE to be SHA-1 based.
 
But that does not preclude = adding an=20 extension that allows the KeyID to be specified using a stronger = algorithm.=20 There are two reasons for this:
 
1) Optics, even if there is = no security=20 implication, a protocol that uses weak crypto necessitates an = (expensive)=20 security review to prove that there is no problem. And these must be = performed=20 repeatedly by many different parties as relying on the analysis of = others is a=20 good way to cause issues. Been there, done that.
 
2) We are designing for = long time spans,=20 ten years or more. While simple compressor collisions may not be a = concern,=20 there is no guarantee that the attacks will stop at that point. MD4 = has been=20 broken repeatedly and they are now at the stage of jumping up and down = on the=20 little pieces. It will probably happen to MD5 and we should be = cautious in=20 case it happens to SHA-1.
 
 
On the claim of 'Keep it = simple STUPID',=20 I find it rather offensive to have my position characterized as = stupid. My=20 designs are not exactly known for being verbose or overly elaborate. = If I=20 propose something it is because there is a reason. It is very easy to = defend=20 the status quo by derriding proposals as unnecessary, but the fact is = that=20 making OCSP too simple will simply cause the complexity to blow out = somewhere=20 else.
 
There is an architectural = princple of=20 modular design that demands that the core of PKIX as it now stands = (the=20 certificate profile and OCSP) be capable of stand alone use. We cannot = fix=20 issues in OCSP with LTANS or other layered-on protocols as some have = proposed.=20 It does not simplify my OCSP deployment to have to graft on an entire=20 different protocol in addition or to re-engineer my document archival = protocol=20 to cover defects in OCSP.
 
 
Simply adding new = algorithms to a=20 protocol does nothing to improve security. You only improve security = if you=20 withdraw insecure algorithms from use.
 
To make the system work you = have to have=20 a means of negotiating between the client and the server. Otherwise = there is=20 no way for an OCSP responder to ensure that it receives a secure,=20 supported response to querries for certificates that do not exist = yet or=20 are not known to the responder.
 
In the case of an OCSP = responder being=20 driven by CRLs collected from various sources, there is no way for the = CA to=20 know if a certificate even exists, all it knows is if the status is=20 definitively revoked.
 
In the case of many = transactional=20 architectures the OCSP validation is performed independently of = certificate=20 chain validation.
 
 
Experience of small scale = PKI deployment=20 in which any box can be upgraded at will is simply not representative = of large=20 scale real world deployment.
 


From:=20 owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed=20 4/1/2009 8:39 PM
To: Stefan Santesson; = IETF-pkix
Subject:=20 RE: OCSP RFC (RFC 2560) Dependence on SHA-1


I am saying that "Do you agree that 2560 can be left = alone for=20 Responder
ID's key ID CHOICE being SHA-1 based?"

> = -----Original=20 Message-----
> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= Sent:=20 Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani;=20 IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on=20 SHA-1
>
> Santosh,
>
> = In-line
>
>
>=20 On 4/1/09 10:31 PM, "Santosh Chokhani" <SChokhani@cygnacom.com>=20 wrote:
>
> >
> > Stefan,
> >
> = > See=20 responses in-line.
> >
> >> -----Original=20 Message-----
> >> From: Stefan Santesson [mailto:stefan@aaa-sec.com]
>= =20 >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh=20 Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: Re: = OCSP RFC=20 (RFC 2560) Dependence on SHA-1
> >>
> >>=20 Santosh,
> >>
> >> If you are talking about = adding=20 other options to calculate the
> >> KeyHash value in = ResponderID=20 then I strongly disagree.
> >>
> >> If you add = unspecified options you change the properties
> of the = field
>=20 >> from deterministic to a completely unknown value.
> = >> It=20 does not matter if RFC2560 isn't explicit in its description = of
>=20 >> the use of the field. The fact is that OCSP = explicitly
>=20 defines this
> >> value and as such will allow a client to = deterministically compare
> >> this value with the = certificate=20 selected to validate the response
> >> signature.
>=20 >
> > I hope no one is doing the matching of Responder ID=20 with
> hash of a key
> > in place of responder = signature=20 verification.  That would
> be real bad.
>=20 >
>
> Yes it would. That is not at all what I talk = about. But=20 a
> client could use this value to locate a responder=20 certificate.
>
> >> If you allow
> >> = other ways=20 to calculate the value but do not provide any means to
> = >> signal=20 what method that was used, then this feature is lost.
> = >
>=20 > The most common use will be to use this field to prioritize = the
>=20 > certificates of the responder to use for sigature
> = verification on=20 the
> > response.
> >
>
> Do you know = this for a=20 fact, or are you guessing?
> If a single implementation verifies = that=20 the certificate used
> to validate the response matches the = ResponderID=20 value, and
> choose to go into an error state because of = mismatch, then=20 we
> have created great problems. So we can't guess. We have = to
>=20 know that no single implementation will fail because of this.
> = And that=20 may be very hard.
>
>
> >>
> >> In = worst=20 case we will cause current implementation to fail.
> = >
> >=20 That is why I am asking what problems if any will the vendors = have.
>=20 >
>
> Even if no vendor speaks up here, it will not = guarantee=20 that
> this will not create any problems.
>
>=20 >>
> >> I really don't think its worth the effort to = change=20 this field. We
> >> have a very large base of = implementations that=20 we really
> don't want
> >> to mess up unless its = absolutely=20 necessary.
> >
> > So, we agree that leaving this = field hard=20 wired to SHA-1 is ok and
> > 2560 can easily accommodate new = hash=20 functions.  Right?
> >
>
> I fail to = understand this=20 sentence. Despite reading it many
> times over.
>
> = > My=20 only reason to align with 5280 is that if some one were
> ever=20 want
> > to strip off SHA-1 altogether from their Responder = or=20 client,
> > permitting other methods does it.
>=20 >
>
> I don't believe this argument is valid as I don't = think=20 it is
> possible to strip off SHA-1 in any reasonable future. In = any
> case. If we compare the positive side with allowing = this
>=20 change and the negative consequences to make OCSP
> incompatible = with=20 itself, my choice is easy.
>
>=20 /Stefan

>
> >>
> >> As the = only=20 property of this field is to provide a convenient
> >> = identifier,=20 it is far from absolutely necessary to change it.
> >> = Remember=20 that there is a second choice to to identify responder by
> = >>=20 name. For names we have accepted the possibility of collisions. = In
>=20 >> that comparison, upgrading from SHA-1 is really = redundant.
>=20 >>
> >> /Stefan
> >>
> = >>
>=20 >>
> >>
> >> On 4/1/09 4:05 PM, "Santosh = Chokhani"
> <SChokhani@cygnacom.com> wrote:
>=20 >>
> >>>
> >>> My resident ASN.1 = expert=20 apprised me of the fact that
> >> adding a choice
>=20 >>> will break backward compatibility.  Thus, extension = is=20 a
> >> fifth option
> >>> (probably third = in the=20 priority).
> >>>
> >>> Based on what I = know of=20 OCSP implementations, not changing
> >> anything = in
>=20 >>> terms of bits on the wire and aligning the Key ID with=20 SKID
> >> in 5280 is
> >>> the best = approach. =20 I do not think it will hurt backward
> >> = compatibility.
>=20 >>>
> >>> OCSP Responder and OCSP client = vendors=20 should speak up if I
> >> am wrong.
> = >>>
>=20 >>>> -----Original Message-----
> >>>> = From:=20 Santosh Chokhani
> >>>> Sent: Tuesday, March 31, = 2009 12:51=20 PM
> >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
>=20 >>>>
> >>>> Max,
>=20 >>>>
> >>>> I do not see where and what=20 extension we need to add for
> >> other digest
>=20 >>>> algorithm.
> >>>>
> = >>>>=20 For key id, we need to enhance or broaden the options.
>=20 >>>>
> >>>>> -----Original=20 Message-----
> >>>>> From:=20 owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org]=20 On Behalf Of
> >> Massimiliano Pala
> = >>>>>=20 Sent: Tuesday, March 31, 2009 1:37 PM
> >>>>> To: = IETF-pkix
> >>>>> Subject: Re: OCSP RFC (RFC = 2560)=20 Dependence on SHA-1
> >>>>>
> = >>>>>=20 Hi all,
> >>>>>
> >>>>> as I = said=20 during last meeting - as the use of SHA-1 does
> = >>>> not=20 have any
> >>>>> security implication in the = OCSP,=20 another viable way
> would be to
> >>>>> = define an=20 extension where other digest algorithms can be
> = >>>> added=20 to the
> >>>>> request/responses.
>=20 >>>>>
> >>>>> It is a simple = addition and=20 does not require any change in
> >>>> the RFC, = it
>=20 >>>>> can be done as a separate document for those who = what=20 to
> >> use other
> >>>>> digest=20 algorithms.
> >>>>>
> >>>>> = After=20 all, isn't this an example of why we allow
> >> extensions = to=20 the
> >>>>> messages ?
>=20 >>>>>
> >>>>> Later,
>=20 >>>>> Max
> >>>>>
>=20 >>>>>
> >>>>> Santosh Chokhani=20 wrote:
> >>>>>> Tom,
>=20 >>>>>>
> >>>>>> Adding a new = choice=20 and aligning it with 5280 SKID is fine.
>=20 >>>>>>
> >>>>>> I would not = add=20 anything about matching this field with
> >>>>> = anything=20 since
> >>>>>> RFC 2560 does not say anything = about=20 it.
> >>>>>>
> >>>>>> = If one=20 were to add something, one should describe how this
>=20 >>>>> field can
> >>>>>> be = used to=20 select from multiple Responder certificates.
>=20 >>>>>>
> >>>>>>> = -----Original=20 Message-----
> >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= =20 >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
>=20 >>>>>>> To: Santosh Chokhani
>=20 >>>>>>> Cc: IETF-pkix
>=20 >>>>>>> Subject: Re: OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 Santosh:
> >>>>>>>
>=20 = >>>>>>>       &nb= sp;=20 The RFC 5280 method just describes "two common
> = >>>>=20 methods for
> >>>>>>> generating key = identifiers=20 from the public key"
> >>>>>>> and says = that other=20 methods are acceptable.  The comment
> >>>>> = to=20 KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not = as=20 permissive.  Of course, it's
> >>>> the = same
>=20 >>>>>>> field as SKID, and I would support either = stating=20 "if the
> >>>>> KeyHash is
>=20 >>>>>>> not precisely 20 octets long, it should = be=20 matched
> against the
> >>>>>>> = Subject Key=20 Identifier extension of the signing
> certificate" or
>=20 >>>>>>> adding another choice like byID [3] OCTET = STRING=20 --
> >>>>> matches the value
>=20 >>>>>>> of SKID.
>=20 >>>>>>>
>=20 = >>>>>>>       &nb= sp;        =20 Tom Gindin
> >>>>>>>
>=20 >>>>>>> P.S. - The above opinions are mine, and = not=20 necessarily
> >>>>> those of my
>=20 >>>>>>> employer
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> "Santosh Chokhani" = <SChokhani@cygnacom.com>=20 Sent by:
> >>>>>>>=20 owner-ietf-pkix@mail.imc.org
> >>>>>>> = 03/26/2009=20 10:39 PM
> >>>>>>>
>=20 >>>>>>> To
> >>>>>>>=20 "IETF-pkix" <ietf-pkix@imc.org>
> = >>>>>>>=20 cc
> >>>>>>>
> = >>>>>>>=20 Subject
> >>>>>>> OCSP RFC (RFC 2560) = Dependence on=20 SHA-1
> >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>> RFC 2560 dependence on SHA-1 does not = appear to=20 be
> >>>>> difficult to deal
>=20 >>>>>>> with.
>=20 >>>>>>>
> >>>>>>> = Section 4.3=20 lists SHA-1 as mandatory and RSA as
> >>>> = optional. =20 We can
> >>>>>>> update this to add SHA-2 = series as=20 optional.
> >>>>>>>
>=20 >>>>>>> The Responder ID has SHA-1 = hardwired.  But,=20 that is no
> >>>>> different than
>=20 >>>>>>> key ID extensions in RFC 5280.  Here = are=20 some options
> >> in order of
> = >>>>>>>=20 preference:
> >>>>>>>
>=20 >>>>>>> 1.  Align the language with subject = key ID=20 language
> in RFC 5280.
> = >>>>>>>
>=20 >>>>>>> 2.  Keep on using SHA-1.  This = field is=20 not security
> >>>>> relevant.  RFC
>=20 >>>>>>> 2560 does not even describe how to use = this=20 field.  So,
> >>>>> having SHA-1
>=20 >>>>>>> and accidental or intentional collisions = will not=20 hurt the
> >>>>> security
>=20 >>>>>>> of the protocol.
>=20 >>>>>>>
> >>>>>>> = 3.  If=20 you do not believe in KISS principle, you can
> = >>>>>=20 define another
> >>>>>>> response type and = enhance=20 the key ID ASN.1 syntax so
> that hash
>=20 >>>>>>> algorithm is identified.
>=20 >>>>>>>
> >>>>>>> = 4. =20 Another option is for the Responder to use the
> same = hashing
>=20 >>>>>>> algorithm as the one in the first certID=20 entry.
> >>>>>>>
>=20 >>>>>>>
> >>>>>>> = Santosh=20 Chokhani
> >>>>>>> CygnaCom = Solutions
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>>
> = >>>>>>>
>=20 >>>>>>
> >>>>>>
>=20 >>>>>
> >>>>>
> = >>>>>=20 --
> >>>>>
> >>>>> Best=20 Regards,
> >>>>>
> >>>>>=20 Massimiliano Pala
> >>>>>
> = >>>>>=20 --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano=20 Pala [OpenCA Project Manager]
> >>>>>=20 Massimiliano.Pala@dartmouth.edu
>=20 = >>>>>         = ;    
>=20 >>>>> project.manager@openca.org
>=20 >>>>>
> >>>>> Dartmouth Computer = Science=20 = Dept           &nb= sp;  =20 Home Phone: +1
> >>>>> (603) 369-9332
>=20 >>>>> PKI/Trust=20 = Laboratory          &nb= sp;           &nbs= p;  =20 Work Phone: +1
> >>>>> (603) 646-9179
>=20 >>>>>=20 --o-----------------------------------------------------------
> = >>>>> -------------
> = >>>>>
>=20 >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> = >>>>> of us=20 who do.
> >>>>>   --
>=20 >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
>=20 >>
> >>
>=20 = >
>
>
>

= ------_=_NextPart_001_01C9B389.B83C96F2-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32AqMws077247 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 2 Apr 2009 03:52:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n32AqM4l077244; Thu, 2 Apr 2009 03:52:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n32Aq9cV077220 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 2 Apr 2009 03:52:21 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 33575 invoked from network); 2 Apr 2009 10:52:11 -0000 Received: from s34.loopia.se (HELO s19.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 2 Apr 2009 10:52:11 -0000 Received: (qmail 81579 invoked from network); 2 Apr 2009 10:52:07 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s19.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 2 Apr 2009 10:52:07 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 12:52:03 +0200 Subject: WG Last Call on draft-ietf-pkix-tac-03 From: Stefan Santesson To: IETF-pkix Message-ID: Thread-Topic: WG Last Call on draft-ietf-pkix-tac-03 Thread-Index: AcmzgQ5egTOzik0YFkGfRA2eOkK7rQ== Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3321521527_11592793" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3321521527_11592793 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit The authors of Traceable Anonymous Certificate draft-ietf-pkix-tac-03.txt has requested WGLC. http://tools.ietf.org/html/draft-ietf-pkix-tac-03 WG Last call on this document starts today and ends April 17 to give room for Easter holidays. /Stefan --B_3321521527_11592793 Content-type: text/html; charset="US-ASCII" Content-transfer-encoding: quoted-printable WG Last Call on draft-ietf-pkix-tac-03 The authors of Traceable Anonymous Certificate draft-ietf-pkix-tac-03.txt = has requested WGLC.

http://tools.ie= tf.org/html/draft-ietf-pkix-tac-03

WG Last call on this document starts today and ends April 17 to give room f= or Easter holidays.

/Stefan
--B_3321521527_11592793-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n324rG6l055520 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 21:53:16 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n324rFtQ055519; Wed, 1 Apr 2009 21:53:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n324r3g7055506 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Wed, 1 Apr 2009 21:53:14 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com [65.205.251.35]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id n324R7nm012537; Wed, 1 Apr 2009 21:27:07 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 1 Apr 2009 21:52:55 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C9B34E.E3525609" Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 21:52:55 -0700 Message-ID: <2788466ED3E31C418E9ACC5C3166155768B35D@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 thread-index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQAAIVKC2 References: From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , "Stefan Santesson" , "IETF-pkix" X-OriginalArrivalTime: 02 Apr 2009 04:52:55.0843 (UTC) FILETIME=[E3434F30:01C9B34E] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C9B34E.E3525609 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable I think we have no choice but to leave the Key ID CHOICE to be SHA-1 = based. =20 But that does not preclude adding an extension that allows the KeyID to = be specified using a stronger algorithm. There are two reasons for this: =20 1) Optics, even if there is no security implication, a protocol that = uses weak crypto necessitates an (expensive) security review to prove = that there is no problem. And these must be performed repeatedly by many = different parties as relying on the analysis of others is a good way to = cause issues. Been there, done that. =20 2) We are designing for long time spans, ten years or more. While simple = compressor collisions may not be a concern, there is no guarantee that = the attacks will stop at that point. MD4 has been broken repeatedly and = they are now at the stage of jumping up and down on the little pieces. = It will probably happen to MD5 and we should be cautious in case it = happens to SHA-1. =20 =20 On the claim of 'Keep it simple STUPID', I find it rather offensive to = have my position characterized as stupid. My designs are not exactly = known for being verbose or overly elaborate. If I propose something it = is because there is a reason. It is very easy to defend the status quo = by derriding proposals as unnecessary, but the fact is that making OCSP = too simple will simply cause the complexity to blow out somewhere else. =20 There is an architectural princple of modular design that demands that = the core of PKIX as it now stands (the certificate profile and OCSP) be = capable of stand alone use. We cannot fix issues in OCSP with LTANS or = other layered-on protocols as some have proposed. It does not simplify = my OCSP deployment to have to graft on an entire different protocol in = addition or to re-engineer my document archival protocol to cover = defects in OCSP. =20 =20 Simply adding new algorithms to a protocol does nothing to improve = security. You only improve security if you withdraw insecure algorithms = from use. =20 To make the system work you have to have a means of negotiating between = the client and the server. Otherwise there is no way for an OCSP = responder to ensure that it receives a secure, supported response to = querries for certificates that do not exist yet or are not known to the = responder. =20 In the case of an OCSP responder being driven by CRLs collected from = various sources, there is no way for the CA to know if a certificate = even exists, all it knows is if the status is definitively revoked. =20 In the case of many transactional architectures the OCSP validation is = performed independently of certificate chain validation.=20 =20 =20 Experience of small scale PKI deployment in which any box can be = upgraded at will is simply not representative of large scale real world = deployment. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Santosh Chokhani Sent: Wed 4/1/2009 8:39 PM To: Stefan Santesson; IETF-pkix Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com] > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > Santosh, > > In-line > > > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > > > > Stefan, > > > > See responses in-line. > > > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >> > >> Santosh, > >> > >> If you are talking about adding other options to calculate the > >> KeyHash value in ResponderID then I strongly disagree. > >> > >> If you add unspecified options you change the properties > of the field > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of > >> the use of the field. The fact is that OCSP explicitly > defines this > >> value and as such will allow a client to deterministically compare > >> this value with the certificate selected to validate the response > >> signature. > > > > I hope no one is doing the matching of Responder ID with > hash of a key > > in place of responder signature verification. That would > be real bad. > > > > Yes it would. That is not at all what I talk about. But a > client could use this value to locate a responder certificate. > > >> If you allow > >> other ways to calculate the value but do not provide any means to > >> signal what method that was used, then this feature is lost. > > > > The most common use will be to use this field to prioritize the > > certificates of the responder to use for sigature > verification on the > > response. > > > > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used > to validate the response matches the ResponderID value, and > choose to go into an error state because of mismatch, then we > have created great problems. So we can't guess. We have to > know that no single implementation will fail because of this. > And that may be very hard. > > > >> > >> In worst case we will cause current implementation to fail. > > > > That is why I am asking what problems if any will the vendors have. > > > > Even if no vendor speaks up here, it will not guarantee that > this will not create any problems. > > >> > >> I really don't think its worth the effort to change this field. We > >> have a very large base of implementations that we really > don't want > >> to mess up unless its absolutely necessary. > > > > So, we agree that leaving this field hard wired to SHA-1 is ok and > > 2560 can easily accommodate new hash functions. Right? > > > > I fail to understand this sentence. Despite reading it many > times over. > > > My only reason to align with 5280 is that if some one were > ever want > > to strip off SHA-1 altogether from their Responder or client, > > permitting other methods does it. > > > > I don't believe this argument is valid as I don't think it is > possible to strip off SHA-1 in any reasonable future. In any > case. If we compare the positive side with allowing this > change and the negative consequences to make OCSP > incompatible with itself, my choice is easy. > > /Stefan >=20 > > >> > >> As the only property of this field is to provide a convenient > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by > >> name. For names we have accepted the possibility of collisions. In > >> that comparison, upgrading from SHA-1 is really redundant. > >> > >> /Stefan > >> > >> > >> > >> > >> On 4/1/09 4:05 PM, "Santosh Chokhani" > wrote: > >> > >>> > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>> > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>> > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>> > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>> > >>>> Max, > >>>> > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>> > >>>> For key id, we need to enhance or broaden the options. > >>>> > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>> > >>>>> Hi all, > >>>>> > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way > would be to > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>> > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>> > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>> > >>>>> Later, > >>>>> Max > >>>>> > >>>>> > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>> > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>> > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>> > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>> > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> Santosh: > >>>>>>> > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched > against the > >>>>>>> Subject Key Identifier extension of the signing > certificate" or > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>> > >>>>>>> Tom Gindin > >>>>>>> > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>> > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>> > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>> > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>> > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>> > >>>>>>> 1. Align the language with subject key ID language > in RFC 5280. > >>>>>>> > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>> > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so > that hash > >>>>>>> algorithm is identified. > >>>>>>> > >>>>>>> 4. Another option is for the Responder to use the > same hashing > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>> > >>>>>>> > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>> > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> > >>>>> Best Regards, > >>>>> > >>>>> Massimiliano Pala > >>>>> > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager] > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>> > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>> > >>>> > >>> > >> > >> > >> > > > > > ------_=_NextPart_001_01C9B34E.E3525609 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP RFC (RFC 2560) Dependence on = SHA-1=0A= =0A= =0A= =0A=
=0A=
I think we = have no choice but to leave the Key ID CHOICE to be SHA-1 = based.
=0A=
 
=0A=
But that does not preclude = adding an extension that allows the KeyID to be specified using a = stronger algorithm. There are two reasons for this:
=0A=
 
=0A=
1) Optics, even if there is = no security implication, a protocol that uses weak crypto necessitates = an (expensive) security review to prove that there is no problem. And = these must be performed repeatedly by many different parties as relying = on the analysis of others is a good way to cause issues. Been there, = done that.
=0A=
 
=0A=
2) We are designing for long = time spans, ten years or more. While simple compressor collisions may = not be a concern, there is no guarantee that the attacks will stop at = that point. MD4 has been broken repeatedly and they are now at the stage = of jumping up and down on the little pieces. It will probably happen to = MD5 and we should be cautious in case it happens to SHA-1.
=0A=
 
=0A=
 
=0A=
On the claim of 'Keep it = simple STUPID', I find it rather offensive to have my position = characterized as stupid. My designs are not exactly known for being = verbose or overly elaborate. If I propose something it is because there = is a reason. It is very easy to defend the status quo by derriding = proposals as unnecessary, but the fact is that making OCSP too simple = will simply cause the complexity to blow out somewhere else.
=0A=
 
=0A=
There is an architectural = princple of modular design that demands that the core of PKIX as it now = stands (the certificate profile and OCSP) be capable of stand alone use. = We cannot fix issues in OCSP with LTANS or other layered-on protocols as = some have proposed. It does not simplify my OCSP deployment to have to = graft on an entire different protocol in addition or to re-engineer my = document archival protocol to cover defects in OCSP.
=0A=
 
=0A=
 
=0A=
Simply adding new algorithms = to a protocol does nothing to improve security. You only improve = security if you withdraw insecure algorithms from use.
=0A=
 
=0A=
To make the system work you = have to have a means of negotiating between the client and the server. = Otherwise there is no way for an OCSP responder to ensure that it = receives a secure, supported response to querries for certificates = that do not exist yet or are not known to the responder.
=0A=
 
=0A=
In the case of an OCSP = responder being driven by CRLs collected from various sources, there is = no way for the CA to know if a certificate even exists, all it knows is = if the status is definitively revoked.
=0A=
 
=0A=
In the case of many = transactional architectures the OCSP validation is performed = independently of certificate chain validation.
=0A=
 
=0A=
 
=0A=
Experience of small scale PKI = deployment in which any box can be upgraded at will is simply not = representative of large scale real world deployment.
=0A=
 
=0A=
=0A=

=0A=
=0A=
=0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Santosh = Chokhani
Sent: Wed 4/1/2009 8:39 PM
To: Stefan = Santesson; IETF-pkix
Subject: RE: OCSP RFC (RFC 2560) = Dependence on SHA-1

=0A=

=0A=

I am saying that "Do you agree that 2560 can be left = alone for Responder
ID's key ID CHOICE being SHA-1 = based?"

> -----Original Message-----
> From: Stefan = Santesson [mailto:stefan@aaa-sec.com]
>= Sent: Wednesday, April 01, 2009 6:32 PM
> To: Santosh Chokhani; = IETF-pkix
> Subject: Re: OCSP RFC (RFC 2560) Dependence on = SHA-1
>
> Santosh,
>
> = In-line
>
>
> On 4/1/09 10:31 PM, "Santosh Chokhani" = <SChokhani@cygnacom.com> wrote:
>
> >
> > = Stefan,
> >
> > See responses in-line.
> = >
> >> -----Original Message-----
> >> From: = Stefan Santesson [mailto:stefan@aaa-sec.com]
>= >> Sent: Wednesday, April 01, 2009 2:34 PM
> >> To: = Santosh Chokhani; Massimiliano Pala; IETF-pkix
> >> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> >>
> = >> Santosh,
> >>
> >> If you are talking = about adding other options to calculate the
> >> KeyHash = value in ResponderID then I strongly disagree.
> >>
> = >> If you add unspecified options you change the = properties
> of the field
> >> from deterministic to a = completely unknown value.
> >> It does not matter if RFC2560 = isn't explicit in its description of
> >> the use of the = field. The fact is that OCSP explicitly
> defines this
> = >> value and as such will allow a client to deterministically = compare
> >> this value with the certificate selected to = validate the response
> >> signature.
> >
> = > I hope no one is doing the matching of Responder ID with
> = hash of a key
> > in place of responder signature = verification.  That would
> be real bad.
> = >
>
> Yes it would. That is not at all what I talk about. = But a
> client could use this value to locate a responder = certificate.
>
> >> If you allow
> >> = other ways to calculate the value but do not provide any means = to
> >> signal what method that was used, then this feature = is lost.
> >
> > The most common use will be to use = this field to prioritize the
> > certificates of the responder = to use for sigature
> verification on the
> > = response.
> >
>
> Do you know this for a fact, or = are you guessing?
> If a single implementation verifies that the = certificate used
> to validate the response matches the = ResponderID value, and
> choose to go into an error state because = of mismatch, then we
> have created great problems. So we can't = guess. We have to
> know that no single implementation will fail = because of this.
> And that may be very = hard.
>
>
> >>
> >> In worst case we = will cause current implementation to fail.
> >
> > = That is why I am asking what problems if any will the vendors = have.
> >
>
> Even if no vendor speaks up here, it = will not guarantee that
> this will not create any = problems.
>
> >>
> >> I really don't think = its worth the effort to change this field. We
> >> have a = very large base of implementations that we really
> don't = want
> >> to mess up unless its absolutely = necessary.
> >
> > So, we agree that leaving this = field hard wired to SHA-1 is ok and
> > 2560 can easily = accommodate new hash functions.  Right?
> = >
>
> I fail to understand this sentence. Despite reading = it many
> times over.
>
> > My only reason to align = with 5280 is that if some one were
> ever want
> > to = strip off SHA-1 altogether from their Responder or client,
> > = permitting other methods does it.
> >
>
> I don't = believe this argument is valid as I don't think it is
> possible = to strip off SHA-1 in any reasonable future. In any
> case. If we = compare the positive side with allowing this
> change and the = negative consequences to make OCSP
> incompatible with itself, my = choice is easy.
>
> /Stefan

>
> = >>
> >> As the only property of this field is to = provide a convenient
> >> identifier, it is far from = absolutely necessary to change it.
> >> Remember that there = is a second choice to to identify responder by
> >> name. = For names we have accepted the possibility of collisions. In
> = >> that comparison, upgrading from SHA-1 is really = redundant.
> >>
> >> /Stefan
> = >>
> >>
> >>
> >>
> = >> On 4/1/09 4:05 PM, "Santosh Chokhani"
> = <SChokhani@cygnacom.com> wrote:
> >>
> = >>>
> >>> My resident ASN.1 expert apprised me = of the fact that
> >> adding a choice
> >>> = will break backward compatibility.  Thus, extension is a
> = >> fifth option
> >>> (probably third in the = priority).
> >>>
> >>> Based on what I = know of OCSP implementations, not changing
> >> anything = in
> >>> terms of bits on the wire and aligning the Key = ID with SKID
> >> in 5280 is
> >>> the best = approach.  I do not think it will hurt backward
> >> = compatibility.
> >>>
> >>> OCSP Responder = and OCSP client vendors should speak up if I
> >> am = wrong.
> >>>
> >>>> -----Original = Message-----
> >>>> From: Santosh Chokhani
> = >>>> Sent: Tuesday, March 31, 2009 12:51 PM
> = >>>> To: 'Massimiliano Pala'; IETF-pkix
> = >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>
> >>>> Max,
> = >>>>
> >>>> I do not see where and what = extension we need to add for
> >> other digest
> = >>>> algorithm.
> >>>>
> = >>>> For key id, we need to enhance or broaden the = options.
> >>>>
> >>>>> = -----Original Message-----
> >>>>> From: = owner-ietf-pkix@mail.imc.org
> >>>>> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> >> Massimiliano Pala
> = >>>>> Sent: Tuesday, March 31, 2009 1:37 PM
> = >>>>> To: IETF-pkix
> >>>>> Subject: = Re: OCSP RFC (RFC 2560) Dependence on SHA-1
> = >>>>>
> >>>>> Hi all,
> = >>>>>
> >>>>> as I said during last = meeting - as the use of SHA-1 does
> >>>> not have = any
> >>>>> security implication in the OCSP, = another viable way
> would be to
> >>>>> = define an extension where other digest algorithms can be
> = >>>> added to the
> >>>>> = request/responses.
> >>>>>
> = >>>>> It is a simple addition and does not require any = change in
> >>>> the RFC, it
> = >>>>> can be done as a separate document for those who = what to
> >> use other
> >>>>> digest = algorithms.
> >>>>>
> >>>>> = After all, isn't this an example of why we allow
> >> = extensions to the
> >>>>> messages ?
> = >>>>>
> >>>>> Later,
> = >>>>> Max
> >>>>>
> = >>>>>
> >>>>> Santosh Chokhani = wrote:
> >>>>>> Tom,
> = >>>>>>
> >>>>>> Adding a new = choice and aligning it with 5280 SKID is fine.
> = >>>>>>
> >>>>>> I would not = add anything about matching this field with
> >>>>> = anything since
> >>>>>> RFC 2560 does not say = anything about it.
> >>>>>>
> = >>>>>> If one were to add something, one should = describe how this
> >>>>> field can
> = >>>>>> be used to select from multiple Responder = certificates.
> >>>>>>
> = >>>>>>> -----Original Message-----
> = >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com]
>= >>>>>>> Sent: Monday, March 30, 2009 7:46 = PM
> >>>>>>> To: Santosh Chokhani
> = >>>>>>> Cc: IETF-pkix
> = >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence = on SHA-1
> >>>>>>>
> = >>>>>>>       &nb= sp; Santosh:
> >>>>>>>
> = >>>>>>>       &nb= sp; The RFC 5280 method just describes "two common
> = >>>> methods for
> >>>>>>> = generating key identifiers from the public key"
> = >>>>>>> and says that other methods are = acceptable.  The comment
> >>>>> to = KeyHash
> >>>>>>> in RFC 2560 4.2.1 is not as = permissive.  Of course, it's
> >>>> the = same
> >>>>>>> field as SKID, and I would = support either stating "if the
> >>>>> KeyHash = is
> >>>>>>> not precisely 20 octets long, it = should be matched
> against the
> = >>>>>>> Subject Key Identifier extension of the = signing
> certificate" or
> >>>>>>> = adding another choice like byID [3] OCTET STRING --
> = >>>>> matches the value
> = >>>>>>> of SKID.
> = >>>>>>>
> = >>>>>>>       &nb= sp;         Tom Gindin
> = >>>>>>>
> >>>>>>> P.S. - = The above opinions are mine, and not necessarily
> = >>>>> those of my
> >>>>>>> = employer
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> = "Santosh Chokhani" <SChokhani@cygnacom.com> Sent by:
> = >>>>>>> owner-ietf-pkix@mail.imc.org
> = >>>>>>> 03/26/2009 10:39 PM
> = >>>>>>>
> >>>>>>> = To
> >>>>>>> "IETF-pkix" = <ietf-pkix@imc.org>
> >>>>>>> = cc
> >>>>>>>
> = >>>>>>> Subject
> = >>>>>>> OCSP RFC (RFC 2560) Dependence on = SHA-1
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>> RFC = 2560 dependence on SHA-1 does not appear to be
> = >>>>> difficult to deal
> = >>>>>>> with.
> = >>>>>>>
> >>>>>>> = Section 4.3 lists SHA-1 as mandatory and RSA as
> >>>> = optional.  We can
> >>>>>>> update this = to add SHA-2 series as optional.
> = >>>>>>>
> >>>>>>> The = Responder ID has SHA-1 hardwired.  But, that is no
> = >>>>> different than
> >>>>>>> = key ID extensions in RFC 5280.  Here are some options
> = >> in order of
> >>>>>>> = preference:
> >>>>>>>
> = >>>>>>> 1.  Align the language with subject = key ID language
> in RFC 5280.
> = >>>>>>>
> >>>>>>> = 2.  Keep on using SHA-1.  This field is not security
> = >>>>> relevant.  RFC
> = >>>>>>> 2560 does not even describe how to use this = field.  So,
> >>>>> having SHA-1
> = >>>>>>> and accidental or intentional collisions = will not hurt the
> >>>>> security
> = >>>>>>> of the protocol.
> = >>>>>>>
> >>>>>>> = 3.  If you do not believe in KISS principle, you can
> = >>>>> define another
> >>>>>>> = response type and enhance the key ID ASN.1 syntax so
> that = hash
> >>>>>>> algorithm is = identified.
> >>>>>>>
> = >>>>>>> 4.  Another option is for the = Responder to use the
> same hashing
> = >>>>>>> algorithm as the one in the first certID = entry.
> >>>>>>>
> = >>>>>>>
> >>>>>>> = Santosh Chokhani
> >>>>>>> CygnaCom = Solutions
> >>>>>>>
> = >>>>>>>
> = >>>>>>>
> = >>>>>>>
> >>>>>>
> = >>>>>>
> >>>>>
> = >>>>>
> >>>>> --
> = >>>>>
> >>>>> Best Regards,
> = >>>>>
> >>>>> Massimiliano = Pala
> >>>>>
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>> = Massimiliano Pala [OpenCA Project Manager]
> >>>>> = Massimiliano.Pala@dartmouth.edu
> = >>>>>         = ;    
> >>>>> = project.manager@openca.org
> >>>>>
> = >>>>> Dartmouth Computer Science = Dept           &nb= sp;   Home Phone: +1
> >>>>> (603) = 369-9332
> >>>>> PKI/Trust = Laboratory          &nb= sp;           &nbs= p;   Work Phone: +1
> >>>>> (603) = 646-9179
> >>>>> = --o-----------------------------------------------------------
> = >>>>> -------------
> >>>>>
> = >>>>> People who think they know everything are a great = annoyance
> >>>> to those
> >>>>> = of us who do.
> >>>>>   --
> = >>>>> Isaac Asimov
> >>>>>
> = >>>>
> >>>
> >>
> = >>
> >>
> = >
>
>
>

------_=_NextPart_001_01C9B34E.E3525609-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n320dbMH044081 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 17:39:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n320dbrf044080; Wed, 1 Apr 2009 17:39:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n320dPQe044071 for ; Wed, 1 Apr 2009 17:39:36 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 18786 invoked from network); 2 Apr 2009 00:38:21 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 2 Apr 2009 00:38:20 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 20:39:23 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKkABFxqQA== References: From: "Santosh Chokhani" To: "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I am saying that "Do you agree that 2560 can be left alone for Responder ID's key ID CHOICE being SHA-1 based?" > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 > Sent: Wednesday, April 01, 2009 6:32 PM > To: Santosh Chokhani; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > Santosh, >=20 > In-line >=20 >=20 > On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: >=20 > >=20 > > Stefan, > >=20 > > See responses in-line. > >=20 > >> -----Original Message----- > >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] > >> Sent: Wednesday, April 01, 2009 2:34 PM > >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >> Santosh, > >>=20 > >> If you are talking about adding other options to calculate the=20 > >> KeyHash value in ResponderID then I strongly disagree. > >>=20 > >> If you add unspecified options you change the properties=20 > of the field=20 > >> from deterministic to a completely unknown value. > >> It does not matter if RFC2560 isn't explicit in its description of=20 > >> the use of the field. The fact is that OCSP explicitly=20 > defines this=20 > >> value and as such will allow a client to deterministically compare=20 > >> this value with the certificate selected to validate the response=20 > >> signature. > >=20 > > I hope no one is doing the matching of Responder ID with=20 > hash of a key=20 > > in place of responder signature verification. That would=20 > be real bad. > >=20 >=20 > Yes it would. That is not at all what I talk about. But a=20 > client could use this value to locate a responder certificate. >=20 > >> If you allow > >> other ways to calculate the value but do not provide any means to=20 > >> signal what method that was used, then this feature is lost. > >=20 > > The most common use will be to use this field to prioritize the=20 > > certificates of the responder to use for sigature=20 > verification on the=20 > > response. > >=20 >=20 > Do you know this for a fact, or are you guessing? > If a single implementation verifies that the certificate used=20 > to validate the response matches the ResponderID value, and=20 > choose to go into an error state because of mismatch, then we=20 > have created great problems. So we can't guess. We have to=20 > know that no single implementation will fail because of this.=20 > And that may be very hard. >=20 >=20 > >>=20 > >> In worst case we will cause current implementation to fail. > >=20 > > That is why I am asking what problems if any will the vendors have. > >=20 >=20 > Even if no vendor speaks up here, it will not guarantee that=20 > this will not create any problems. >=20 > >>=20 > >> I really don't think its worth the effort to change this field. We=20 > >> have a very large base of implementations that we really=20 > don't want=20 > >> to mess up unless its absolutely necessary. > >=20 > > So, we agree that leaving this field hard wired to SHA-1 is ok and=20 > > 2560 can easily accommodate new hash functions. Right? > >=20 >=20 > I fail to understand this sentence. Despite reading it many=20 > times over. >=20 > > My only reason to align with 5280 is that if some one were=20 > ever want=20 > > to strip off SHA-1 altogether from their Responder or client,=20 > > permitting other methods does it. > >=20 >=20 > I don't believe this argument is valid as I don't think it is=20 > possible to strip off SHA-1 in any reasonable future. In any=20 > case. If we compare the positive side with allowing this=20 > change and the negative consequences to make OCSP=20 > incompatible with itself, my choice is easy. >=20 > /Stefan > =20 >=20 > >>=20 > >> As the only property of this field is to provide a convenient=20 > >> identifier, it is far from absolutely necessary to change it. > >> Remember that there is a second choice to to identify responder by=20 > >> name. For names we have accepted the possibility of collisions. In=20 > >> that comparison, upgrading from SHA-1 is really redundant. > >>=20 > >> /Stefan > >>=20 > >>=20 > >>=20 > >>=20 > >> On 4/1/09 4:05 PM, "Santosh Chokhani"=20 > wrote: > >>=20 > >>>=20 > >>> My resident ASN.1 expert apprised me of the fact that > >> adding a choice > >>> will break backward compatibility. Thus, extension is a > >> fifth option > >>> (probably third in the priority). > >>>=20 > >>> Based on what I know of OCSP implementations, not changing > >> anything in > >>> terms of bits on the wire and aligning the Key ID with SKID > >> in 5280 is > >>> the best approach. I do not think it will hurt backward > >> compatibility. > >>>=20 > >>> OCSP Responder and OCSP client vendors should speak up if I > >> am wrong. > >>>=20 > >>>> -----Original Message----- > >>>> From: Santosh Chokhani > >>>> Sent: Tuesday, March 31, 2009 12:51 PM > >>>> To: 'Massimiliano Pala'; IETF-pkix > >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>=20 > >>>> Max, > >>>>=20 > >>>> I do not see where and what extension we need to add for > >> other digest > >>>> algorithm. > >>>>=20 > >>>> For key id, we need to enhance or broaden the options. > >>>>=20 > >>>>> -----Original Message----- > >>>>> From: owner-ietf-pkix@mail.imc.org=20 > >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > >> Massimiliano Pala > >>>>> Sent: Tuesday, March 31, 2009 1:37 PM > >>>>> To: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>> Hi all, > >>>>>=20 > >>>>> as I said during last meeting - as the use of SHA-1 does > >>>> not have any > >>>>> security implication in the OCSP, another viable way=20 > would be to=20 > >>>>> define an extension where other digest algorithms can be > >>>> added to the > >>>>> request/responses. > >>>>>=20 > >>>>> It is a simple addition and does not require any change in > >>>> the RFC, it > >>>>> can be done as a separate document for those who what to > >> use other > >>>>> digest algorithms. > >>>>>=20 > >>>>> After all, isn't this an example of why we allow > >> extensions to the > >>>>> messages ? > >>>>>=20 > >>>>> Later, > >>>>> Max > >>>>>=20 > >>>>>=20 > >>>>> Santosh Chokhani wrote: > >>>>>> Tom, > >>>>>>=20 > >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>>>=20 > >>>>>> I would not add anything about matching this field with > >>>>> anything since > >>>>>> RFC 2560 does not say anything about it. > >>>>>>=20 > >>>>>> If one were to add something, one should describe how this > >>>>> field can > >>>>>> be used to select from multiple Responder certificates. > >>>>>>=20 > >>>>>>> -----Original Message----- > >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>>>> To: Santosh Chokhani > >>>>>>> Cc: IETF-pkix > >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>>=20 > >>>>>>> Santosh: > >>>>>>>=20 > >>>>>>> The RFC 5280 method just describes "two common > >>>> methods for > >>>>>>> generating key identifiers from the public key" > >>>>>>> and says that other methods are acceptable. The comment > >>>>> to KeyHash > >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >>>> the same > >>>>>>> field as SKID, and I would support either stating "if the > >>>>> KeyHash is > >>>>>>> not precisely 20 octets long, it should be matched=20 > against the=20 > >>>>>>> Subject Key Identifier extension of the signing=20 > certificate" or=20 > >>>>>>> adding another choice like byID [3] OCTET STRING -- > >>>>> matches the value > >>>>>>> of SKID. > >>>>>>>=20 > >>>>>>> Tom Gindin > >>>>>>>=20 > >>>>>>> P.S. - The above opinions are mine, and not necessarily > >>>>> those of my > >>>>>>> employer > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>> "Santosh Chokhani" Sent by: > >>>>>>> owner-ietf-pkix@mail.imc.org > >>>>>>> 03/26/2009 10:39 PM > >>>>>>>=20 > >>>>>>> To > >>>>>>> "IETF-pkix" > >>>>>>> cc > >>>>>>>=20 > >>>>>>> Subject > >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>>>> difficult to deal > >>>>>>> with. > >>>>>>>=20 > >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >>>> optional. We can > >>>>>>> update this to add SHA-2 series as optional. > >>>>>>>=20 > >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>>>> different than > >>>>>>> key ID extensions in RFC 5280. Here are some options > >> in order of > >>>>>>> preference: > >>>>>>>=20 > >>>>>>> 1. Align the language with subject key ID language=20 > in RFC 5280. > >>>>>>>=20 > >>>>>>> 2. Keep on using SHA-1. This field is not security > >>>>> relevant. RFC > >>>>>>> 2560 does not even describe how to use this field. So, > >>>>> having SHA-1 > >>>>>>> and accidental or intentional collisions will not hurt the > >>>>> security > >>>>>>> of the protocol. > >>>>>>>=20 > >>>>>>> 3. If you do not believe in KISS principle, you can > >>>>> define another > >>>>>>> response type and enhance the key ID ASN.1 syntax so=20 > that hash=20 > >>>>>>> algorithm is identified. > >>>>>>>=20 > >>>>>>> 4. Another option is for the Responder to use the=20 > same hashing=20 > >>>>>>> algorithm as the one in the first certID entry. > >>>>>>>=20 > >>>>>>>=20 > >>>>>>> Santosh Chokhani > >>>>>>> CygnaCom Solutions > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>>=20 > >>>>>>=20 > >>>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> -- > >>>>>=20 > >>>>> Best Regards, > >>>>>=20 > >>>>> Massimiliano Pala > >>>>>=20 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>> Massimiliano Pala [OpenCA Project Manager]=20 > >>>>> Massimiliano.Pala@dartmouth.edu > >>>>> =20 > >>>>> project.manager@openca.org > >>>>>=20 > >>>>> Dartmouth Computer Science Dept Home Phone: +1 > >>>>> (603) 369-9332 > >>>>> PKI/Trust Laboratory Work Phone: +1 > >>>>> (603) 646-9179 > >>>>> --o----------------------------------------------------------- > >>>>> ------------- > >>>>>=20 > >>>>> People who think they know everything are a great annoyance > >>>> to those > >>>>> of us who do. > >>>>> -- > >>>>> Isaac Asimov > >>>>>=20 > >>>>=20 > >>>=20 > >>=20 > >>=20 > >>=20 > >=20 >=20 >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31MWJ3C037979 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 15:32:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31MWJB0037978; Wed, 1 Apr 2009 15:32:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31MW6a3037969 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 1 Apr 2009 15:32:17 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 72537 invoked from network); 1 Apr 2009 22:32:14 -0000 Received: from s34.loopia.se (HELO s42.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 1 Apr 2009 22:32:14 -0000 Received: (qmail 52688 invoked from network); 1 Apr 2009 22:32:05 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s42.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 1 Apr 2009 22:32:05 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Thu, 02 Apr 2009 00:32:04 +0200 Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 From: Stefan Santesson To: Santosh Chokhani , IETF-pkix Message-ID: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQAAZrbKk= In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh, In-line On 4/1/09 10:31 PM, "Santosh Chokhani" wrote: > > Stefan, > > See responses in-line. > >> -----Original Message----- >> From: Stefan Santesson [mailto:stefan@aaa-sec.com] >> Sent: Wednesday, April 01, 2009 2:34 PM >> To: Santosh Chokhani; Massimiliano Pala; IETF-pkix >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >> >> Santosh, >> >> If you are talking about adding other options to calculate >> the KeyHash value in ResponderID then I strongly disagree. >> >> If you add unspecified options you change the properties of >> the field from deterministic to a completely unknown value. >> It does not matter if RFC2560 isn't explicit in its >> description of the use of the field. The fact is that OCSP >> explicitly defines this value and as such will allow a client >> to deterministically compare this value with the certificate >> selected to validate the response signature. > > I hope no one is doing the matching of Responder ID with hash of a key > in place of responder signature verification. That would be real bad. > Yes it would. That is not at all what I talk about. But a client could use this value to locate a responder certificate. >> If you allow >> other ways to calculate the value but do not provide any >> means to signal what method that was used, then this feature is lost. > > The most common use will be to use this field to prioritize the > certificates of the responder to use for sigature verification on the > response. > Do you know this for a fact, or are you guessing? If a single implementation verifies that the certificate used to validate the response matches the ResponderID value, and choose to go into an error state because of mismatch, then we have created great problems. So we can't guess. We have to know that no single implementation will fail because of this. And that may be very hard. >> >> In worst case we will cause current implementation to fail. > > That is why I am asking what problems if any will the vendors have. > Even if no vendor speaks up here, it will not guarantee that this will not create any problems. >> >> I really don't think its worth the effort to change this >> field. We have a very large base of implementations that we >> really don't want to mess up unless its absolutely necessary. > > So, we agree that leaving this field hard wired to SHA-1 is ok and 2560 > can easily accommodate new hash functions. Right? > I fail to understand this sentence. Despite reading it many times over. > My only reason to align with 5280 is that if some one were ever want to > strip off SHA-1 altogether from their Responder or client, permitting > other methods does it. > I don't believe this argument is valid as I don't think it is possible to strip off SHA-1 in any reasonable future. In any case. If we compare the positive side with allowing this change and the negative consequences to make OCSP incompatible with itself, my choice is easy. /Stefan >> >> As the only property of this field is to provide a convenient >> identifier, it is far from absolutely necessary to change it. >> Remember that there is a second choice to to identify >> responder by name. For names we have accepted the possibility >> of collisions. In that comparison, upgrading from SHA-1 is >> really redundant. >> >> /Stefan >> >> >> >> >> On 4/1/09 4:05 PM, "Santosh Chokhani" wrote: >> >>> >>> My resident ASN.1 expert apprised me of the fact that >> adding a choice >>> will break backward compatibility. Thus, extension is a >> fifth option >>> (probably third in the priority). >>> >>> Based on what I know of OCSP implementations, not changing >> anything in >>> terms of bits on the wire and aligning the Key ID with SKID >> in 5280 is >>> the best approach. I do not think it will hurt backward >> compatibility. >>> >>> OCSP Responder and OCSP client vendors should speak up if I >> am wrong. >>> >>>> -----Original Message----- >>>> From: Santosh Chokhani >>>> Sent: Tuesday, March 31, 2009 12:51 PM >>>> To: 'Massimiliano Pala'; IETF-pkix >>>> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>> >>>> Max, >>>> >>>> I do not see where and what extension we need to add for >> other digest >>>> algorithm. >>>> >>>> For key id, we need to enhance or broaden the options. >>>> >>>>> -----Original Message----- >>>>> From: owner-ietf-pkix@mail.imc.org >>>>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of >> Massimiliano Pala >>>>> Sent: Tuesday, March 31, 2009 1:37 PM >>>>> To: IETF-pkix >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> >>>>> Hi all, >>>>> >>>>> as I said during last meeting - as the use of SHA-1 does >>>> not have any >>>>> security implication in the OCSP, another viable way would be to >>>>> define an extension where other digest algorithms can be >>>> added to the >>>>> request/responses. >>>>> >>>>> It is a simple addition and does not require any change in >>>> the RFC, it >>>>> can be done as a separate document for those who what to >> use other >>>>> digest algorithms. >>>>> >>>>> After all, isn't this an example of why we allow >> extensions to the >>>>> messages ? >>>>> >>>>> Later, >>>>> Max >>>>> >>>>> >>>>> Santosh Chokhani wrote: >>>>>> Tom, >>>>>> >>>>>> Adding a new choice and aligning it with 5280 SKID is fine. >>>>>> >>>>>> I would not add anything about matching this field with >>>>> anything since >>>>>> RFC 2560 does not say anything about it. >>>>>> >>>>>> If one were to add something, one should describe how this >>>>> field can >>>>>> be used to select from multiple Responder certificates. >>>>>> >>>>>>> -----Original Message----- >>>>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] >>>>>>> Sent: Monday, March 30, 2009 7:46 PM >>>>>>> To: Santosh Chokhani >>>>>>> Cc: IETF-pkix >>>>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>> >>>>>>> Santosh: >>>>>>> >>>>>>> The RFC 5280 method just describes "two common >>>> methods for >>>>>>> generating key identifiers from the public key" >>>>>>> and says that other methods are acceptable. The comment >>>>> to KeyHash >>>>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's >>>> the same >>>>>>> field as SKID, and I would support either stating "if the >>>>> KeyHash is >>>>>>> not precisely 20 octets long, it should be matched against the >>>>>>> Subject Key Identifier extension of the signing certificate" or >>>>>>> adding another choice like byID [3] OCTET STRING -- >>>>> matches the value >>>>>>> of SKID. >>>>>>> >>>>>>> Tom Gindin >>>>>>> >>>>>>> P.S. - The above opinions are mine, and not necessarily >>>>> those of my >>>>>>> employer >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> "Santosh Chokhani" Sent by: >>>>>>> owner-ietf-pkix@mail.imc.org >>>>>>> 03/26/2009 10:39 PM >>>>>>> >>>>>>> To >>>>>>> "IETF-pkix" >>>>>>> cc >>>>>>> >>>>>>> Subject >>>>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> RFC 2560 dependence on SHA-1 does not appear to be >>>>> difficult to deal >>>>>>> with. >>>>>>> >>>>>>> Section 4.3 lists SHA-1 as mandatory and RSA as >>>> optional. We can >>>>>>> update this to add SHA-2 series as optional. >>>>>>> >>>>>>> The Responder ID has SHA-1 hardwired. But, that is no >>>>> different than >>>>>>> key ID extensions in RFC 5280. Here are some options >> in order of >>>>>>> preference: >>>>>>> >>>>>>> 1. Align the language with subject key ID language in RFC 5280. >>>>>>> >>>>>>> 2. Keep on using SHA-1. This field is not security >>>>> relevant. RFC >>>>>>> 2560 does not even describe how to use this field. So, >>>>> having SHA-1 >>>>>>> and accidental or intentional collisions will not hurt the >>>>> security >>>>>>> of the protocol. >>>>>>> >>>>>>> 3. If you do not believe in KISS principle, you can >>>>> define another >>>>>>> response type and enhance the key ID ASN.1 syntax so that hash >>>>>>> algorithm is identified. >>>>>>> >>>>>>> 4. Another option is for the Responder to use the same hashing >>>>>>> algorithm as the one in the first certID entry. >>>>>>> >>>>>>> >>>>>>> Santosh Chokhani >>>>>>> CygnaCom Solutions >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>> >>>>>> >>>>> >>>>> >>>>> -- >>>>> >>>>> Best Regards, >>>>> >>>>> Massimiliano Pala >>>>> >>>>> --o----------------------------------------------------------- >>>>> ------------- >>>>> Massimiliano Pala [OpenCA Project Manager] >>>>> Massimiliano.Pala@dartmouth.edu >>>>> >>>>> project.manager@openca.org >>>>> >>>>> Dartmouth Computer Science Dept Home Phone: +1 >>>>> (603) 369-9332 >>>>> PKI/Trust Laboratory Work Phone: +1 >>>>> (603) 646-9179 >>>>> --o----------------------------------------------------------- >>>>> ------------- >>>>> >>>>> People who think they know everything are a great annoyance >>>> to those >>>>> of us who do. >>>>> -- >>>>> Isaac Asimov >>>>> >>>> >>> >> >> >> > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31M176E036211 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 15:01:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31M172n036210; Wed, 1 Apr 2009 15:01:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.ietf.org (mail.ietf.org [64.170.98.32]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31M17dQ036204 for ; Wed, 1 Apr 2009 15:01:07 -0700 (MST) (envelope-from root@core3.amsl.com) Received: by core3.amsl.com (Postfix, from userid 0) id 19EDB3A6909; Wed, 1 Apr 2009 15:00:01 -0700 (PDT) From: Internet-Drafts@ietf.org To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org Subject: I-D ACTION:draft-ietf-pkix-tac-03.txt Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 Message-Id: <20090401220006.19EDB3A6909@core3.amsl.com> Date: Wed, 1 Apr 2009 15:00:02 -0700 (PDT) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Traceable Anonymous Certificate Author(s) : S. Park, H. Park, Y. Won, J. Lee, S. Kent Filename : draft-ietf-pkix-tac-03.txt Pages : 32 Date : 2009-3-31 Public Key Infrastructure (PKI) provides a powerful means of authenticating individuals, organizations, and computers(e.g., web servers). However, when individuals use certificates to access resources on the public Internet, there are legitimate concerns about personal privacy, and thus there are increasing demands for privacy enhancing techniques on the Internet. In a PKI, an authorized entity such as a certification Authority (CA) or a Registration Authority (RA) may be perceived, from a privacy perspective, as a "big brother," even when a CA issues a certificate containing a Subject name that is a pseudonym. This is because such entities can always map a pseudonym in a certificate they issued to the name of the real user to whom it was issued. This document defines a practical architecture and protocols for offering privacy for a user who requests and uses an X.509 certificate containing a pseudonym, while still retaining the ability to map such a certificate to the real user who requested it. The architecture is compatible with IETF certificate request formats such as PKCS10 [3]and CMC[4]. The architecture separates the authorities involved in issuing a certificate: one for verifying ownership of a private key (Blind Issuer) and the other for validating the contents of a certificate (Anonymous Issuer). The end-entity(EE) certificates issued under this model are called Traceable Anonymous Certificates (TACs). A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-tac-03.txt Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Message/External-body; name="draft-ietf-pkix-tac-03.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2009-4-1145650.I-D@ietf.org> --NextPart-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31L0qR5032312 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 14:00:52 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31L0qIK032311; Wed, 1 Apr 2009 14:00:52 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n31L0pJI032303 for ; Wed, 1 Apr 2009 14:00:52 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 17220 invoked from network); 1 Apr 2009 20:59:47 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 1 Apr 2009 20:59:47 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: Renew/Rekey/Modification Date: Wed, 1 Apr 2009 17:00:50 -0400 Message-ID: In-Reply-To: <49D2D476.3030000@lockstep.com.au> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmydZMWT6hOmshVRjOIL4r3iaOQaAAlenSw References: <49D2D476.3030000@lockstep.com.au> From: "Santosh Chokhani" To: , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stephen, See responses in-line.=20 > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org=20 > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Wilson > Sent: Tuesday, March 31, 2009 10:42 PM > To: ietf-pkix@imc.org > Subject: Renew/Rekey/Modification >=20 >=20 >=20 > Colleagues, >=20 > There are a few things about certificate "renewal" and=20 > "re-key" that have long confounded me. Things only seem to=20 > have got more convoluted in RFC 3647 and -- no offence! -- in=20 > newer Certificate Policies like the=20 > US FPKI Policy Authority document. Can anyone help me=20 > understand the=20 > rationale for the some of the following scenarios? Thanks in advance! >=20 >=20 >=20 > Re-key is said (in the FPKI CP) to be a good idea because the=20 > older a key gets, the more susceptible it is to loss and=20 > compromise. Fair enough, but why wouldn't that consideration=20 > be factored into the chosen certificate validity period? It should be. The goal here is to use the current certificate to authenticate to create new certificates. >=20 >=20 > Is there ever a real world scenario when a Subject would of=20 > their own accord request re-key because they feel the key is=20 > getting old? PKI obligations and policy may require that subject perform the re-key and take some concrete action in order to be bound to the subscriber obligations and agreements. > If so, why wouldn't they revoke as well? Two reasons come to mind for not revoking. You do not want to invalidate existing, unexpired signatures. You do not want to have built in mechanism for large CRL. BTW, you can compensate for it by destroying the current key after re-key. > The=20 > FPKI CA says that after re-key "The old certificate may or=20 > may not be revoked". Why would you not revoke, given the=20 > possibility that the key has got too old? See previous response. > I don't think it=20 > would ever be sensible to keep using an old original key and=20 > a fresh key. And if I were a Relying Party, I might like to=20 > know about this possible quality difference, yet there would=20 > be nothing in a CRL or anywhere else to mark the fact that=20 > the Subscriber has re-keyed. >=20 You do not need to use the old authentication/signature key. You do not need to revoke it either. You can simply destroy it. You do need to keep old decryption keys. >=20 > The FPKI CA goes on to say that after re-key "The old certificate ...=20 > must not be further re-keyed, renewed, or modified". This=20 > seems almost oxymoronic. Consider that I have certificate A=20 > and then I re-key A to create certificate B. And then I=20 > re-key B to create certificate C. I would say that C is=20 > indistinguishable from a re-keyed A since A, B and C will=20 > only differ by key value. So how is it meaningful to forbid=20 > re-keying A more than once?=20 >=20 Certificates are not the only objects. CA and RA can keep other information that can be used to enforce that A is used to rekey only once. >=20 > Finally, why does RFC 3647 bother to describe "Certificate=20 > Modification"=20 > at all? The term is inherently confusing since one of the=20 > most obvious characteristics of a digital certificate is that=20 > it cannot be tampered with. I question the need for a=20 > special bit of counter intuitive jargon (and a whole slab of=20 > the RFC) to cover what is really a mundane scenario; viz a=20 > certificate Subject needs a certificate with different=20 > details in it. That is, it's just a new certificate. Why is=20 > it treated any differently from an original certificate application? Certificate Modification (like renewal and rekey) refer to the fact that a new certificate with different information is created. If you feel that the term is confusing, let us know of a better term. As to why deal with differently that original certificate is that the modification may be carried out using fully or partly automated process based on the current certificate to be modified. That is why framework identifies this. Of course, many certificate policies require initial process for certificate modification. For that matter, policies do not permit renewal and some require initial process for rekey as well. The framework tries to accommodate many plausible scenarios. >=20 >=20 > Cheers, >=20 > Stephen Wilson > Lockstep Technologies > www.lockstep.com.au/technologies. >=20 >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31KWFuv030379 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 13:32:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31KWFEq030378; Wed, 1 Apr 2009 13:32:15 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n31KW3xF030367 for ; Wed, 1 Apr 2009 13:32:13 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 16962 invoked from network); 1 Apr 2009 20:30:59 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 1 Apr 2009 20:30:58 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 16:31:58 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2QAB5FEQ References: From: "Santosh Chokhani" To: "Stefan Santesson" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stefan, See responses in-line. > -----Original Message----- > From: Stefan Santesson [mailto:stefan@aaa-sec.com]=20 > Sent: Wednesday, April 01, 2009 2:34 PM > To: Santosh Chokhani; Massimiliano Pala; IETF-pkix > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > Santosh, >=20 > If you are talking about adding other options to calculate=20 > the KeyHash value in ResponderID then I strongly disagree. >=20 > If you add unspecified options you change the properties of=20 > the field from deterministic to a completely unknown value.=20 > It does not matter if RFC2560 isn't explicit in its=20 > description of the use of the field. The fact is that OCSP=20 > explicitly defines this value and as such will allow a client=20 > to deterministically compare this value with the certificate=20 > selected to validate the response signature. I hope no one is doing the matching of Responder ID with hash of a key in place of responder signature verification. That would be real bad. > If you allow=20 > other ways to calculate the value but do not provide any=20 > means to signal what method that was used, then this feature is lost. The most common use will be to use this field to prioritize the certificates of the responder to use for sigature verification on the response. >=20 > In worst case we will cause current implementation to fail. That is why I am asking what problems if any will the vendors have. >=20 > I really don't think its worth the effort to change this=20 > field. We have a very large base of implementations that we=20 > really don't want to mess up unless its absolutely necessary. So, we agree that leaving this field hard wired to SHA-1 is ok and 2560 can easily accommodate new hash functions. Right? My only reason to align with 5280 is that if some one were ever want to strip off SHA-1 altogether from their Responder or client, permitting other methods does it. >=20 > As the only property of this field is to provide a convenient=20 > identifier, it is far from absolutely necessary to change it.=20 > Remember that there is a second choice to to identify=20 > responder by name. For names we have accepted the possibility=20 > of collisions. In that comparison, upgrading from SHA-1 is=20 > really redundant. >=20 > /Stefan >=20 >=20 >=20 >=20 > On 4/1/09 4:05 PM, "Santosh Chokhani" wrote: >=20 > >=20 > > My resident ASN.1 expert apprised me of the fact that=20 > adding a choice=20 > > will break backward compatibility. Thus, extension is a=20 > fifth option=20 > > (probably third in the priority). > >=20 > > Based on what I know of OCSP implementations, not changing=20 > anything in=20 > > terms of bits on the wire and aligning the Key ID with SKID=20 > in 5280 is=20 > > the best approach. I do not think it will hurt backward=20 > compatibility. > >=20 > > OCSP Responder and OCSP client vendors should speak up if I=20 > am wrong. > >=20 > >> -----Original Message----- > >> From: Santosh Chokhani > >> Sent: Tuesday, March 31, 2009 12:51 PM > >> To: 'Massimiliano Pala'; IETF-pkix > >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>=20 > >> Max, > >>=20 > >> I do not see where and what extension we need to add for=20 > other digest=20 > >> algorithm. > >>=20 > >> For key id, we need to enhance or broaden the options. > >>=20 > >>> -----Original Message----- > >>> From: owner-ietf-pkix@mail.imc.org > >>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of=20 > Massimiliano Pala > >>> Sent: Tuesday, March 31, 2009 1:37 PM > >>> To: IETF-pkix > >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>=20 > >>> Hi all, > >>>=20 > >>> as I said during last meeting - as the use of SHA-1 does > >> not have any > >>> security implication in the OCSP, another viable way would be to=20 > >>> define an extension where other digest algorithms can be > >> added to the > >>> request/responses. > >>>=20 > >>> It is a simple addition and does not require any change in > >> the RFC, it > >>> can be done as a separate document for those who what to=20 > use other=20 > >>> digest algorithms. > >>>=20 > >>> After all, isn't this an example of why we allow=20 > extensions to the=20 > >>> messages ? > >>>=20 > >>> Later, > >>> Max > >>>=20 > >>>=20 > >>> Santosh Chokhani wrote: > >>>> Tom, > >>>>=20 > >>>> Adding a new choice and aligning it with 5280 SKID is fine. > >>>>=20 > >>>> I would not add anything about matching this field with > >>> anything since > >>>> RFC 2560 does not say anything about it. > >>>>=20 > >>>> If one were to add something, one should describe how this > >>> field can > >>>> be used to select from multiple Responder certificates. > >>>>=20 > >>>>> -----Original Message----- > >>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] > >>>>> Sent: Monday, March 30, 2009 7:46 PM > >>>>> To: Santosh Chokhani > >>>>> Cc: IETF-pkix > >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>> Santosh: > >>>>>=20 > >>>>> The RFC 5280 method just describes "two common > >> methods for > >>>>> generating key identifiers from the public key" > >>>>> and says that other methods are acceptable. The comment > >>> to KeyHash > >>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's > >> the same > >>>>> field as SKID, and I would support either stating "if the > >>> KeyHash is > >>>>> not precisely 20 octets long, it should be matched against the=20 > >>>>> Subject Key Identifier extension of the signing certificate" or=20 > >>>>> adding another choice like byID [3] OCTET STRING -- > >>> matches the value > >>>>> of SKID. > >>>>>=20 > >>>>> Tom Gindin > >>>>>=20 > >>>>> P.S. - The above opinions are mine, and not necessarily > >>> those of my > >>>>> employer > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> "Santosh Chokhani" Sent by: > >>>>> owner-ietf-pkix@mail.imc.org > >>>>> 03/26/2009 10:39 PM > >>>>>=20 > >>>>> To > >>>>> "IETF-pkix" > >>>>> cc > >>>>>=20 > >>>>> Subject > >>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>> RFC 2560 dependence on SHA-1 does not appear to be > >>> difficult to deal > >>>>> with. > >>>>>=20 > >>>>> Section 4.3 lists SHA-1 as mandatory and RSA as > >> optional. We can > >>>>> update this to add SHA-2 series as optional. > >>>>>=20 > >>>>> The Responder ID has SHA-1 hardwired. But, that is no > >>> different than > >>>>> key ID extensions in RFC 5280. Here are some options=20 > in order of > >>>>> preference: > >>>>>=20 > >>>>> 1. Align the language with subject key ID language in RFC 5280. > >>>>>=20 > >>>>> 2. Keep on using SHA-1. This field is not security > >>> relevant. RFC > >>>>> 2560 does not even describe how to use this field. So, > >>> having SHA-1 > >>>>> and accidental or intentional collisions will not hurt the > >>> security > >>>>> of the protocol. > >>>>>=20 > >>>>> 3. If you do not believe in KISS principle, you can > >>> define another > >>>>> response type and enhance the key ID ASN.1 syntax so that hash=20 > >>>>> algorithm is identified. > >>>>>=20 > >>>>> 4. Another option is for the Responder to use the same hashing=20 > >>>>> algorithm as the one in the first certID entry. > >>>>>=20 > >>>>>=20 > >>>>> Santosh Chokhani > >>>>> CygnaCom Solutions > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>>=20 > >>>>=20 > >>>>=20 > >>>=20 > >>>=20 > >>> -- > >>>=20 > >>> Best Regards, > >>>=20 > >>> Massimiliano Pala > >>>=20 > >>> --o----------------------------------------------------------- > >>> ------------- > >>> Massimiliano Pala [OpenCA Project Manager]=20 > >>> Massimiliano.Pala@dartmouth.edu > >>> =20 > >>> project.manager@openca.org > >>>=20 > >>> Dartmouth Computer Science Dept Home Phone: +1 > >>> (603) 369-9332 > >>> PKI/Trust Laboratory Work Phone: +1 > >>> (603) 646-9179 > >>> --o----------------------------------------------------------- > >>> ------------- > >>>=20 > >>> People who think they know everything are a great annoyance > >> to those > >>> of us who do. > >>> -- > >>> Isaac Asimov > >>>=20 > >>=20 > >=20 >=20 >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31JmPLU027469 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 12:48:26 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31JmPsC027468; Wed, 1 Apr 2009 12:48:25 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout1-sn1.fre.skanova.net (pne-smtpout1-sn1.fre.skanova.net [81.228.11.98]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31JmEIW027449 for ; Wed, 1 Apr 2009 12:48:25 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from AndersPC (81.232.45.215) by pne-smtpout1-sn1.fre.skanova.net (7.3.129) id 49CCDA0700083DB2 for ietf-pkix@imc.org; Wed, 1 Apr 2009 21:48:14 +0200 Message-ID: <9551C16907D34653BD44A9E308F773CE@AndersPC> From: "Anders Rundgren" To: Subject: WG Advice on Reviving a multikey certificate I-D Date: Wed, 1 Apr 2009 21:48:23 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Windows Mail 6.0.6000.20661 X-MimeOLE: Produced By Microsoft MimeOLE V6.0.6000.16669 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Quite some time ago the following I-D was written and then left to expire (probably due to lack of interest): http://www.potaroo.net/ietf/all-ids/draft-lin-mpk-app-00.txt It seems that there is a class of applications that could use this scheme as an alternative to multiple certificates and that are devices that are to be pre-configured with device certificates. Such devices include mobile phones and routers (work is currently performed by IEEE). The router people are currently thinking in terms of hosting a single authentication certificate which in SOHO configurations would be used "as-is" as an easier alternative to shared secrets. However, for enterprise use, it is likely that corporate IT would like to unify the equipment to an in-house PKI. Although you could use the authentication certificate for credential bootstrapping, a better solution is making in-device key-generation with attested public keys. This calls for device attestation keys which in some way must be distinguishable from authentication keys. To avoid that devices get "split personalities" it would be nice to put the attestation key in the same certificate as normally used for authentications. Since attestations is something very specific not associated with standard applications, there is no impediment having to dig out the public key from a certificate in a slightly unusual way, it is just 20 lines extra to 2000 you already got :-) TrustedComputingGroup have addressed this topic using a virtual orgy of keys and certificates. I prefer simpler solutions. One Device => One Certificate => One ID I started with this issue (multiple keys) using DIAS scheme: http://webpki.org/papers/keygen2/keygen2-fips140-2.pdf but unfortunately DIAS does not translate well to ECDSA, but MPK certificates look like a *very* good alternative. So, how should I proceed with this I-D? Anybody out there interested? I don't intend to change anything in the expired I-D except for application space and minor stuff. One of the original authors have indicated interest in a revival. Anders Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31IYK88016098 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 11:34:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31IYKBS016097; Wed, 1 Apr 2009 11:34:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from s87.loopia.se (s87.loopia.se [194.9.95.112]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31IY7kJ016039 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 1 Apr 2009 11:34:18 -0700 (MST) (envelope-from stefan@aaa-sec.com) Received: (qmail 44914 invoked from network); 1 Apr 2009 18:34:13 -0000 Received: from s34.loopia.se (HELO s29.loopia.se) ([194.9.94.70]) (envelope-sender ) by s87.loopia.se (qmail-ldap-1.03) with AES256-SHA encrypted SMTP for ; 1 Apr 2009 18:34:13 -0000 Received: (qmail 23326 invoked from network); 1 Apr 2009 18:34:05 -0000 Received: from 90-229-233-249-no153.tbcn.telia.com (HELO [192.168.0.17]) (stefan@fiddler.nu@[90.229.233.249]) (envelope-sender ) by s29.loopia.se (qmail-ldap-1.03) with DES-CBC3-SHA encrypted SMTP for ; 1 Apr 2009 18:34:05 -0000 User-Agent: Microsoft-Entourage/12.15.0.081119 Date: Wed, 01 Apr 2009 20:34:05 +0200 Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 From: Stefan Santesson To: Santosh Chokhani , Massimiliano Pala , IETF-pkix Message-ID: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrAACXbF2Q== In-Reply-To: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh, If you are talking about adding other options to calculate the KeyHash value in ResponderID then I strongly disagree. If you add unspecified options you change the properties of the field from deterministic to a completely unknown value. It does not matter if RFC2560 isn't explicit in its description of the use of the field. The fact is that OCSP explicitly defines this value and as such will allow a client to deterministically compare this value with the certificate selected to validate the response signature. If you allow other ways to calculate the value but do not provide any means to signal what method that was used, then this feature is lost. In worst case we will cause current implementation to fail. I really don't think its worth the effort to change this field. We have a very large base of implementations that we really don't want to mess up unless its absolutely necessary. As the only property of this field is to provide a convenient identifier, it is far from absolutely necessary to change it. Remember that there is a second choice to to identify responder by name. For names we have accepted the possibility of collisions. In that comparison, upgrading from SHA-1 is really redundant. /Stefan On 4/1/09 4:05 PM, "Santosh Chokhani" wrote: > > My resident ASN.1 expert apprised me of the fact that adding a choice > will break backward compatibility. Thus, extension is a fifth option > (probably third in the priority). > > Based on what I know of OCSP implementations, not changing anything in > terms of bits on the wire and aligning the Key ID with SKID in 5280 is > the best approach. I do not think it will hurt backward compatibility. > > OCSP Responder and OCSP client vendors should speak up if I am wrong. > >> -----Original Message----- >> From: Santosh Chokhani >> Sent: Tuesday, March 31, 2009 12:51 PM >> To: 'Massimiliano Pala'; IETF-pkix >> Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >> >> Max, >> >> I do not see where and what extension we need to add for >> other digest algorithm. >> >> For key id, we need to enhance or broaden the options. >> >>> -----Original Message----- >>> From: owner-ietf-pkix@mail.imc.org >>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Massimiliano Pala >>> Sent: Tuesday, March 31, 2009 1:37 PM >>> To: IETF-pkix >>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>> >>> Hi all, >>> >>> as I said during last meeting - as the use of SHA-1 does >> not have any >>> security implication in the OCSP, another viable way would be to >>> define an extension where other digest algorithms can be >> added to the >>> request/responses. >>> >>> It is a simple addition and does not require any change in >> the RFC, it >>> can be done as a separate document for those who what to use other >>> digest algorithms. >>> >>> After all, isn't this an example of why we allow extensions to the >>> messages ? >>> >>> Later, >>> Max >>> >>> >>> Santosh Chokhani wrote: >>>> Tom, >>>> >>>> Adding a new choice and aligning it with 5280 SKID is fine. >>>> >>>> I would not add anything about matching this field with >>> anything since >>>> RFC 2560 does not say anything about it. >>>> >>>> If one were to add something, one should describe how this >>> field can >>>> be used to select from multiple Responder certificates. >>>> >>>>> -----Original Message----- >>>>> From: Tom Gindin [mailto:tgindin@us.ibm.com] >>>>> Sent: Monday, March 30, 2009 7:46 PM >>>>> To: Santosh Chokhani >>>>> Cc: IETF-pkix >>>>> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> >>>>> Santosh: >>>>> >>>>> The RFC 5280 method just describes "two common >> methods for >>>>> generating key identifiers from the public key" >>>>> and says that other methods are acceptable. The comment >>> to KeyHash >>>>> in RFC 2560 4.2.1 is not as permissive. Of course, it's >> the same >>>>> field as SKID, and I would support either stating "if the >>> KeyHash is >>>>> not precisely 20 octets long, it should be matched against the >>>>> Subject Key Identifier extension of the signing certificate" or >>>>> adding another choice like byID [3] OCTET STRING -- >>> matches the value >>>>> of SKID. >>>>> >>>>> Tom Gindin >>>>> >>>>> P.S. - The above opinions are mine, and not necessarily >>> those of my >>>>> employer >>>>> >>>>> >>>>> >>>>> >>>>> "Santosh Chokhani" Sent by: >>>>> owner-ietf-pkix@mail.imc.org >>>>> 03/26/2009 10:39 PM >>>>> >>>>> To >>>>> "IETF-pkix" >>>>> cc >>>>> >>>>> Subject >>>>> OCSP RFC (RFC 2560) Dependence on SHA-1 >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> RFC 2560 dependence on SHA-1 does not appear to be >>> difficult to deal >>>>> with. >>>>> >>>>> Section 4.3 lists SHA-1 as mandatory and RSA as >> optional. We can >>>>> update this to add SHA-2 series as optional. >>>>> >>>>> The Responder ID has SHA-1 hardwired. But, that is no >>> different than >>>>> key ID extensions in RFC 5280. Here are some options in order of >>>>> preference: >>>>> >>>>> 1. Align the language with subject key ID language in RFC 5280. >>>>> >>>>> 2. Keep on using SHA-1. This field is not security >>> relevant. RFC >>>>> 2560 does not even describe how to use this field. So, >>> having SHA-1 >>>>> and accidental or intentional collisions will not hurt the >>> security >>>>> of the protocol. >>>>> >>>>> 3. If you do not believe in KISS principle, you can >>> define another >>>>> response type and enhance the key ID ASN.1 syntax so that hash >>>>> algorithm is identified. >>>>> >>>>> 4. Another option is for the Responder to use the same hashing >>>>> algorithm as the one in the first certID entry. >>>>> >>>>> >>>>> Santosh Chokhani >>>>> CygnaCom Solutions >>>>> >>>>> >>>>> >>>>> >>>> >>>> >>> >>> >>> -- >>> >>> Best Regards, >>> >>> Massimiliano Pala >>> >>> --o----------------------------------------------------------- >>> ------------- >>> Massimiliano Pala [OpenCA Project Manager] >>> Massimiliano.Pala@dartmouth.edu >>> >>> project.manager@openca.org >>> >>> Dartmouth Computer Science Dept Home Phone: +1 >>> (603) 369-9332 >>> PKI/Trust Laboratory Work Phone: +1 >>> (603) 646-9179 >>> --o----------------------------------------------------------- >>> ------------- >>> >>> People who think they know everything are a great annoyance >> to those >>> of us who do. >>> -- >>> Isaac Asimov >>> >> > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31ErkXw078713 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 07:53:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31ErkGT078712; Wed, 1 Apr 2009 07:53:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31ErjZu078706 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 1 Apr 2009 07:53:46 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha2.nist.gov [129.6.16.198]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id n31Ersjh014107; Wed, 1 Apr 2009 10:53:55 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id n31ErUBl030443; Wed, 1 Apr 2009 10:53:31 -0400 Message-ID: <49D37FEA.8000200@nist.gov> Date: Wed, 01 Apr 2009 10:53:30 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.19 (X11/20090114) MIME-Version: 1.0 To: Stephen Wilson CC: ietf-pkix@imc.org Subject: Re: Renew/Rekey/Modification References: <49D2D476.3030000@lockstep.com.au> In-Reply-To: <49D2D476.3030000@lockstep.com.au> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stephen Wilson wrote: > The FPKI CA goes on to say that after re-key "The old certificate ... > must not be further re-keyed, renewed, or modified". This seems > almost oxymoronic. Consider that I have certificate A and then I > re-key A to create certificate B. And then I re-key B to create > certificate C. I would say that C is indistinguishable from a > re-keyed A since A, B and C will only differ by key value. So how is > it meaningful to forbid re-keying A more than once? Consider a scenario in which the private key corresponding to certificate A has been compromised (e.g., an attacker, without my knowledge, infects my computer with a virus, obtains a copy of the file containing the private key, and guesses the password used to encrypt the private key file). When certificate A is about to expire, if I wish to continue to have a certificate from this CA, then one of two scenarios may happen: 1) I perform re-key, authenticating myself using certificate A, and obtain certificate B. The attacker is now prevented from performing an on-line re-key to obtain a new certificate in my name, since the system will not permit any further re-key based on certificate A. Thus, the attacker's ability to impersonate me ends either immediately (if certificate A is revoked) or when certificate A expires. 2) The attacker performs a re-key, authenticating himself using the stolen private key, and obtains certificate B. Later, I attempt to perform a re-key and am unsuccessful, since the system will not permit any further re-key based on certificate A. I call the help desk and complain, which will (hopefully) result in certificate B being revoked. (It is unlikely that there would be a certificate C since many CAs will not allow re-key to be performed until the current certificate is approaching its expiration date. But, it wouldn't matter anyways, since presumably my help desk call would result (after authentication of my identity) in all of my certificates being revoked.) If the system permitted more than one re-key based on certificate A, then it would be more likely that the attacker could continue to impersonate me even after certificate A expired. Granted, this is not a foolproof, but I don't think it's moronic either. Dave Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31E5cjo074994 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 07:05:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31E5cYN074993; Wed, 1 Apr 2009 07:05:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n31E5R4b074977 for ; Wed, 1 Apr 2009 07:05:37 -0700 (MST) (envelope-from SChokhani@cygnacom.com) Received: (qmail 13553 invoked from network); 1 Apr 2009 14:04:23 -0000 Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 1 Apr 2009 14:04:23 -0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 Date: Wed, 1 Apr 2009 10:05:24 -0400 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP RFC (RFC 2560) Dependence on SHA-1 Thread-Index: AcmyIGh4vURVLwB0QOmggx7xJi+ihAAAFOIwACx2HrA= References: <49D254C3.5030901@Dartmouth.edu> From: "Santosh Chokhani" To: "Massimiliano Pala" , "IETF-pkix" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: My resident ASN.1 expert apprised me of the fact that adding a choice will break backward compatibility. Thus, extension is a fifth option (probably third in the priority). Based on what I know of OCSP implementations, not changing anything in terms of bits on the wire and aligning the Key ID with SKID in 5280 is the best approach. I do not think it will hurt backward compatibility. OCSP Responder and OCSP client vendors should speak up if I am wrong. > -----Original Message----- > From: Santosh Chokhani=20 > Sent: Tuesday, March 31, 2009 12:51 PM > To: 'Massimiliano Pala'; IETF-pkix > Subject: RE: OCSP RFC (RFC 2560) Dependence on SHA-1 >=20 > Max, >=20 > I do not see where and what extension we need to add for=20 > other digest algorithm. >=20 > For key id, we need to enhance or broaden the options.=20 >=20 > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Massimiliano Pala > > Sent: Tuesday, March 31, 2009 1:37 PM > > To: IETF-pkix > > Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > >=20 > > Hi all, > >=20 > > as I said during last meeting - as the use of SHA-1 does=20 > not have any=20 > > security implication in the OCSP, another viable way would be to=20 > > define an extension where other digest algorithms can be=20 > added to the=20 > > request/responses. > >=20 > > It is a simple addition and does not require any change in=20 > the RFC, it=20 > > can be done as a separate document for those who what to use other=20 > > digest algorithms. > >=20 > > After all, isn't this an example of why we allow extensions to the=20 > > messages ? > >=20 > > Later, > > Max > >=20 > >=20 > > Santosh Chokhani wrote: > > > Tom, > > >=20 > > > Adding a new choice and aligning it with 5280 SKID is fine. > > >=20 > > > I would not add anything about matching this field with > > anything since > > > RFC 2560 does not say anything about it. > > >=20 > > > If one were to add something, one should describe how this > > field can > > > be used to select from multiple Responder certificates. > > >=20 > > >> -----Original Message----- > > >> From: Tom Gindin [mailto:tgindin@us.ibm.com] > > >> Sent: Monday, March 30, 2009 7:46 PM > > >> To: Santosh Chokhani > > >> Cc: IETF-pkix > > >> Subject: Re: OCSP RFC (RFC 2560) Dependence on SHA-1 > > >> > > >> Santosh: > > >> > > >> The RFC 5280 method just describes "two common=20 > methods for=20 > > >> generating key identifiers from the public key" > > >> and says that other methods are acceptable. The comment > > to KeyHash > > >> in RFC 2560 4.2.1 is not as permissive. Of course, it's=20 > the same=20 > > >> field as SKID, and I would support either stating "if the > > KeyHash is > > >> not precisely 20 octets long, it should be matched against the=20 > > >> Subject Key Identifier extension of the signing certificate" or=20 > > >> adding another choice like byID [3] OCTET STRING -- > > matches the value > > >> of SKID. > > >> > > >> Tom Gindin > > >> > > >> P.S. - The above opinions are mine, and not necessarily > > those of my > > >> employer > > >> > > >> > > >> > > >> > > >> "Santosh Chokhani" Sent by:=20 > > >> owner-ietf-pkix@mail.imc.org > > >> 03/26/2009 10:39 PM > > >> > > >> To > > >> "IETF-pkix" > > >> cc > > >> > > >> Subject > > >> OCSP RFC (RFC 2560) Dependence on SHA-1 > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> RFC 2560 dependence on SHA-1 does not appear to be > > difficult to deal > > >> with. > > >> > > >> Section 4.3 lists SHA-1 as mandatory and RSA as=20 > optional. We can=20 > > >> update this to add SHA-2 series as optional. > > >> > > >> The Responder ID has SHA-1 hardwired. But, that is no > > different than > > >> key ID extensions in RFC 5280. Here are some options in order of > > >> preference: > > >> > > >> 1. Align the language with subject key ID language in RFC 5280. > > >> > > >> 2. Keep on using SHA-1. This field is not security > > relevant. RFC > > >> 2560 does not even describe how to use this field. So, > > having SHA-1 > > >> and accidental or intentional collisions will not hurt the > > security > > >> of the protocol. > > >> > > >> 3. If you do not believe in KISS principle, you can > > define another > > >> response type and enhance the key ID ASN.1 syntax so that hash=20 > > >> algorithm is identified. > > >> > > >> 4. Another option is for the Responder to use the same hashing=20 > > >> algorithm as the one in the first certID entry. > > >> > > >> > > >> Santosh Chokhani > > >> CygnaCom Solutions > > >> > > >> > > >> > > >> > > >=20 > > >=20 > >=20 > >=20 > > -- > >=20 > > Best Regards, > >=20 > > Massimiliano Pala > >=20 > > --o----------------------------------------------------------- > > ------------- > > Massimiliano Pala [OpenCA Project Manager]=20 > > Massimiliano.Pala@dartmouth.edu > > =20 > > project.manager@openca.org > >=20 > > Dartmouth Computer Science Dept Home Phone: +1=20 > > (603) 369-9332 > > PKI/Trust Laboratory Work Phone: +1=20 > > (603) 646-9179 > > --o----------------------------------------------------------- > > ------------- > >=20 > > People who think they know everything are a great annoyance=20 > to those=20 > > of us who do. > > -- > > Isaac Asimov > >=20 >=20 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31DjrQj073473 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 06:45:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31DjrHs073472; Wed, 1 Apr 2009 06:45:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31DjgQG073446 for ; Wed, 1 Apr 2009 06:45:53 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Subject: RE: Renew/Rekey/Modification Date: Wed, 1 Apr 2009 09:45:42 -0400 Message-ID: <200904011345.n31Djgn4017097@stingray.missi.ncsc.mil> In-Reply-To: <49D2D476.3030000@lockstep.com.au> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Renew/Rekey/Modification Thread-Index: AcmyeJ1hw/dR4nPHTv2WzSlFkRQG1wAVCi8Q References: <49D2D476.3030000@lockstep.com.au> From: "Kemp, David P." To: X-OriginalArrivalTime: 01 Apr 2009 13:40:33.0359 (UTC) FILETIME=[6E3325F0:01C9B2CF] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: You may be over-analyzing the terms. A certificate can be issued ab-initio, or it can be related to an existing certificate. If related, various things can be held constant while others are changed: * if only validity (and serial number, of course) changes, it's called renewal * if other information excluding the key changes, it's called an update or modification * if the key changes, it's called a rekey If a certificate is replaced because of a known key compromise, the cert is rekeyed and the old cert is revoked. If a cert is replaced because it is getting old (nearing the end of its validity) then the old cert may either be revoked or be allowed to expire. Key age is one factor in determining validity period, but so is other information - it may be useful to renew short-lived certificates many times without rekeying in order to avoid or minimize the burden of revocation. You are correct that if cert A is rekeyed twice, there isn't much difference between saying cert C is a rekey of B or of A. But there is a difference for renew and update - it is a management best practice not to renew or update A to produce C after rekeying A to produce B - once A's key has been replaced, no new certificates should be created with that key. It may also be good practice to say that if cert A has been rekeyed to produce B, then only B (and not A, even if still valid) should be used to authenticate the subject when rekeying to produce C. Dave -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Wilson Sent: Tuesday, March 31, 2009 10:42 PM To: ietf-pkix@imc.org Subject: Renew/Rekey/Modification Colleagues, There are a few things about certificate "renewal" and "re-key" that=20 have long confounded me. Things only seem to have got more convoluted=20 in RFC 3647 and -- no offence! -- in newer Certificate Policies like the US FPKI Policy Authority document. Can anyone help me understand the=20 rationale for the some of the following scenarios? Thanks in advance! Re-key is said (in the FPKI CP) to be a good idea because the older a=20 key gets, the more susceptible it is to loss and compromise. Fair=20 enough, but why wouldn't that consideration be factored into the chosen=20 certificate validity period? Is there ever a real world scenario when a Subject would of their own=20 accord request re-key because they feel the key is getting old? If so,=20 why wouldn't they revoke as well? The FPKI CA says that after re-key=20 "The old certificate may or may not be revoked". Why would you not=20 revoke, given the possibility that the key has got too old? I don't=20 think it would ever be sensible to keep using an old original key and a=20 fresh key. And if I were a Relying Party, I might like to know about=20 this possible quality difference, yet there would be nothing in a CRL or anywhere else to mark the fact that the Subscriber has re-keyed. The FPKI CA goes on to say that after re-key "The old certificate ...=20 must not be further re-keyed, renewed, or modified". This seems almost=20 oxymoronic. Consider that I have certificate A and then I re-key A to=20 create certificate B. And then I re-key B to create certificate C. I=20 would say that C is indistinguishable from a re-keyed A since A, B and C will only differ by key value. So how is it meaningful to forbid=20 re-keying A more than once?=20 Finally, why does RFC 3647 bother to describe "Certificate Modification" at all? The term is inherently confusing since one of the most obvious=20 characteristics of a digital certificate is that it cannot be tampered=20 with. I question the need for a special bit of counter intuitive jargon (and a whole slab of the RFC) to cover what is really a mundane=20 scenario; viz a certificate Subject needs a certificate with different=20 details in it. That is, it's just a new certificate. Why is it treated any differently from an original certificate application? Cheers, Stephen Wilson Lockstep Technologies www.lockstep.com.au/technologies. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31CnK3T069348 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 05:49:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31CnK00069347; Wed, 1 Apr 2009 05:49:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from a.mx.secunet.com (a.mx.secunet.com [213.68.205.161]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31Cn9nH069330 for ; Wed, 1 Apr 2009 05:49:19 -0700 (MST) (envelope-from Johannes.Merkle@secunet.com) Received: from localhost (alg3 [127.0.0.1]) by a.mx.secunet.com (Postfix) with ESMTP id DCB4020C0C6; Wed, 1 Apr 2009 14:49:07 +0200 (CEST) X-Virus-Scanned: by secunet Received: from mail-srv1.secumail.de (unknown [10.53.40.200]) by a.mx.secunet.com (Postfix) with ESMTP id 6AD8A20C0BD; Wed, 1 Apr 2009 14:49:07 +0200 (CEST) Received: from [10.208.1.240] ([10.208.1.240]) by mail-srv1.secumail.de with Microsoft SMTPSVC(6.0.3790.3959); Wed, 1 Apr 2009 14:49:07 +0200 Message-ID: <49D362C2.8020303@secunet.com> Date: Wed, 01 Apr 2009 14:49:06 +0200 From: Johannes Merkle User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: swilson@lockstep.com.au CC: ietf-pkix@imc.org Subject: Re: Renew/Rekey/Modification References: <49D2D476.3030000@lockstep.com.au> In-Reply-To: <49D2D476.3030000@lockstep.com.au> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-OriginalArrivalTime: 01 Apr 2009 12:49:07.0439 (UTC) FILETIME=[3ED91FF0:01C9B2C8] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Stephen, I do not know the FPKI documents but I think your questions generally refer to RFC 3647. > Re-key is said (in the FPKI CP) to be a good idea because the older a > key gets, the more susceptible it is to loss and compromise. Fair > enough, but why wouldn't that consideration be factored into the chosen > certificate validity period? > Typically, a certificate is re-keyed when or right before it expires. In this case, the maximum key lifetime is factored into the certificate. > > Is there ever a real world scenario when a Subject would of their own > accord request re-key because they feel the key is getting old? If so, Yes, right before the old certificate expires. An alternative scenario would be after revocation due to suspected key compromise, but in this case the application for the new cert can not be secured by the old one. > why wouldn't they revoke as well? The FPKI CA says that after re-key > "The old certificate may or may not be revoked". Why would you not > revoke, given the possibility that the key has got too old? I don't > think it would ever be sensible to keep using an old original key and a > fresh key. And if I were a Relying Party, I might like to know about > this possible quality difference, yet there would be nothing in a CRL or > anywhere else to mark the fact that the Subscriber has re-keyed. If the old certificate is going to expire very soon, revocation might not be necessary. However, it is considered good practice to revoke the old certificate in the process of re-keying. > The FPKI CA goes on to say that after re-key "The old certificate ... > must not be further re-keyed, renewed, or modified". This seems almost > oxymoronic. Consider that I have certificate A and then I re-key A to > create certificate B. And then I re-key B to create certificate C. I > would say that C is indistinguishable from a re-keyed A since A, B and C > will only differ by key value. So how is it meaningful to forbid > re-keying A more than once? > You are right, they are indistinguishable. However, the rule refers to the re-key application process. In this process the old certificate is used as a reference, typically to authenticate the certificate request and to verify the correctness of the certificate content data. I understand this rule to prohibit future certificate requests being authenticated and verified with the old certificate. In particular, if after a re-key a certificate modification has occured (e.g. because the subject attributes have changed), a re-key based on the re-keyed certificate could result in a certificate with the outdated attributes. > Finally, why does RFC 3647 bother to describe "Certificate Modification" > at all? The term is inherently confusing since one of the most obvious > characteristics of a digital certificate is that it cannot be tampered > with. I question the need for a special bit of counter intuitive jargon > (and a whole slab of the RFC) to cover what is really a mundane > scenario; viz a certificate Subject needs a certificate with different > details in it. That is, it's just a new certificate. Why is it treated > any differently from an original certificate application? > As far as I understand certificate modification covers any application for a new certificate where the data requested to include into the certificate differs from the old certificate in more than merely the public key. You are right, it is a new certificate for the subject, but this also holds for re-key or renewal. The reason why it is treated different from initial (original) certificate application is that registration process can be facilitated. For instance, subject identification and verification of unchanged data can be omitted. Furthermore, the old certificate can be used to authenticate and protect the certificate application process. I agree that the term "certificate modification" is a bit misleading. Johannes Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31CeEuc068671 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 1 Apr 2009 05:40:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n31CeExK068670; Wed, 1 Apr 2009 05:40:14 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail03.dandomain.dk (mail03.dandomain.dk [194.150.112.203]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n31Ce1M5068632 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 1 Apr 2009 05:40:12 -0700 (MST) (envelope-from era@x500.eu) Received: from ERA1 ([95.209.226.245]) by mail03.dandomain.dk (DanDomain Mailserver) with ASMTP id IQO57056; Wed, 01 Apr 2009 14:39:56 +0200 From: "Erik Andersen" To: "Directory list" , "PKIX" Subject: Certificate definitions Date: Wed, 1 Apr 2009 14:39:56 +0200 Message-ID: <1C740690094340D3B49DADD21AD98606@ERA1> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_0027_01C9B2D7.BAEC4950" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6838 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579 Thread-Index: AcmyxvW/KkzbCBxjQ/eyg7S7tJNM1w== Importance: Normal Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0027_01C9B2D7.BAEC4950 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0028_01C9B2D7.BAEC4950" ------=_NextPart_001_0028_01C9B2D7.BAEC4950 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi =20 I got a number of responses on user certificates, but quite little that actually answered my question. =20 I have tried to dig a little bit more in X.509 to get hold of the terminology and then produced below figure. I will not comment all the boxes. =20 =20 I will like you to comments as to the correctness of above figure. =20 The end-entity certificate is not defined in the definition clause. = However it is used widely in the main text. It is mentioned the first time in = clause 7 as a public-key certificate. There are several other places where it = is a public-key certificate. In 15.5.2.4 is used in the context of attribute certificates. The conclusion must be that an end-entity certificate can either be a end-entity public-key certificate or an end-entity attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term = at all. It seems just to use the term "certificate" as a synonym for "end-entrity public key certificate". =20 The "User Certificate" is not defined in X.509, but is wide used. It = seems to be a synonym for "end-entrity public key certificate". It is also = used in X.511. RFC 5280 uses the term once without differenting it from just "certificate". =20 The term "cross-certificate" should probably also be qualified. =20 I suggest to add in X.509 definitions for: =20 "end-entity public-key certificate" "user certictate" as a synonym for "end-entity public-key certificate" "end-entity attrubute certificate" =20 The X.509 text should be updated to make use of these definitions. =20 X.509 has four attribute types for holding certificates. =20 UserCertificate: For end-entity public-key certificates cAcertificate: For CA certificates attributeCertificateAttribute: For end-entity attrubute certificates aACertificate: For AA Certificates =20 Any comments? =20 Erik Andersen Andersen's L-Service Elsevej 48, DK-3500 Vaerloese Denmark Mobile: +45 2097 1490 email: era@x500.eu www.x500.eu www.x500standard.com =20 ------=_NextPart_001_0028_01C9B2D7.BAEC4950 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi

 

I got a number of responses on user = certificates, but quite little that actually answered my question.

 

I have tried to dig a little bit more in X.509 = to get hold of the terminology and then produced below figure. I will not = comment all the boxes.

 

 

I will like you to comments as to the = correctness of above figure.

 

The end-entity certificate is not defined in = the definition clause. However it is used widely in the main text. It is = mentioned the first time in clause 7 as a public-key certificate. There are = several other places where it is a public-key certificate. In 15.5.2.4 is used in the = context of attribute certificates. The conclusion must be that an end-entity = certificate can either be a end-entity public-key certificate or an end-entity = attribute certificate. However, in most places, it is implied that we only talks = about public-key certificates. For veterans, this is not a major problem, but new-comers may get confused. Anyway, I thing our specifications should = be clear and not subject to interpretation. RFC 5280 does not use the term at = all. It seems just to use the term “certificate” as a synonym for “end-entrity public key certificate”.

 

The “User Certificate”  is = not defined in X.509, but is wide used. It seems to be a synonym for “end-entrity public key certificate”. It is also used in = X.511. RFC 5280 uses the term once without differenting it from just = “certificate”.

 

The term “cross-certificate” = should probably also be qualified.

 

I suggest to add in X.509 definitions = for:

 

“end-entity public-key = certificate”

“user certictate” as a synonym for “end-entity public-key certificate”

“end-entity attrubute = certificate”

 

The X.509 text should be updated to make use = of these definitions.

 

X.509 has four attribute types for holding certificates.

 

UserCertificate: For end-entity public-key certificates

cAcertificate: For CA = certificates

attributeCertificateAttribute: For end-entity attrubute certificates

aACertificate: For AA = Certificates

 

Any comments?

 

Erik Andersen

Andersen's L-Service

Elsevej 48, DK-3500 Vaerloese

Denmark

Mobile: +45 2097 1490

email: era@x500.eu

www.x500.eu

www.x500standard.com

 

------=_NextPart_001_0028_01C9B2D7.BAEC4950-- ------=_NextPart_000_0027_01C9B2D7.BAEC4950 Content-Type: image/gif; name="image001.gif" Content-Transfer-Encoding: base64 Content-ID: R0lGODlh3wEPAXcAACH/C01TT0ZGSUNFOS4wGAAAAAxtc09QTVNPRkZJQ0U5LjAC8Zm0lgAsAAAA AN8BDwGAAAAA////Av+Mj6nL7Q+jnLRaBrLevPsPhuJIluKFpurKtu4Lx/JMK0CN59Ct9/4PDAqH RAOviEwdk8ym8wmNOpbSaoBqzWq33O4C60WCw+Sy+Twbo33qtfsNh7fjabr9ju/O8609/w8YGOMn aEFYiJio+LXoctgIGZn3KGlTeYkJSJl5xen5ubaZKQpaahpEepl6ytoqszqlIcFDKzvL5pqrKwSL UbtDlUEh3NO7e4zcYGz5JevRyWFku3E1bTuYnK3NsoxAnHBEXW0k3WkuTFtuvg7Tvf3e6q7u/aH+ e/N9YF0djQ3/DxBDHXDBfp3DN05funH5BgZ8GFCePYP4KJZbSI2YxoX//iB6fCdRWr59/A4e3OgM JY2QH1sKYhkIpsuZeGT+sUkz5xuck3T6NMWz5s+hnoLeMUo0aRWkdJgqfdrEqRyoVBNJ3Vk1a0xt V7V6xdE11NexTbmSPesmLBq1aNteYGsGrtu5EeSSsUs3bzMTfPv6/QsYhN7BdsSV6UA4MSLDaREr fty04VHHkCvruVbomeXNUDBH0sw59A/GnOqJPt3OMyvQqFsPk4yMtevZCmGDpEz7tOqWsnMTJv2z t++zwKkKHw5199jjyHMWp8u8eUTbik1LjweMOufo1yXZfp6bOd7uYDEr795bO/k4gtdnz3jefWPw 8pW1r88eN/7X/faH/7Lu3wTc+RdYgQYeiOB4TCTIYIMO6peVglxIKIYU6iVBISQZZrHhEB0uRdaH FpYiYhQlZmYWKCc+seJW2bSoA4wLhpjiJzJiSOOLJNbo1Y0VqsijVj4WMaRDseWYTJGvBBkhk5go yQuSRwKp43JOqnJlcrV9Fww5D1zoC5jQiCQmO+DsaJ83+jBzoTsYxXfmLVZO1EycdYmyETD0VEAd lO3YF45BdcbyQkNlJlQXknmiJM6bkqFTS6NLgAHfM45JCilofhYKaEWI9QNqpIzS802ln2IqKj+p MjJnQpCSeZGXgsbqap7zKAQrrRrJihBDFdmDJiO2DkvnqLWu6Wuuu/8yxKtJw1KqqKTK9vprmJ4C aKh16AD7aEqabeqILxdR9Oa4sH47qWnLbtvtq8KBmxaue6qqK6L0wkdQtvPKy6yr9i66G7zcWPvq sSYley+l6RIELLMj3VPtFNEyHOo5ze5Z8KwTTYPotv6e5CnC4QS7b8YWHZspschmbPA9vGbaskCt Ztueo1gAbGu+gRZM78eoXmuYwCsoTCrM6/6MatFb1rrPqtFY852UC34otApVgyU1kYcSSfIxVx+W pXdhK/X1Sl3vUnYYaS9JZZJZ67L2MGMnFfefbU/5Vd2c3u3127nonWiVec/dCOB9+O2K4V8SPpTi Q58NN+LY8Y225Iv/wakm5ZEv92DnnhdI4ueij05CgHrycsJ0AHZk+l1wlf536jk4HtrWbIzwJO5R tn5YibDfpDuOvLu+VvBxGd/Z8MRHFgKHyHOovNpX/46K7HFF74Xt/1lf6PNiYT8h7aquPov3ZYG/ hfaaPG/+TeinL/57JmD5vvOJ+0V//UvFrzP54/vvPv3trxLUE1D7piJAC9WtgN3j3vcS2JmqMXA0 B9QC/6ozIPg5MILN0wMEWQQhDd6neBuUWXn680EihDBGBixhYdqnvhbSJ4XFmOEr+lTBy3WwZyux IQ1nh7lBXCOHpZmgI3z4wxNS0IgvAmAfYoge0klxikhUBBWvKEXL/6mwejO8YOZkCMXAmUiLVoST F5FlwNGAqFVFmcMZveQ2NvZNc38jI+Tyh7ceMc6Ke/TJG+Vkoz7q5I9iLIognXPIlyRyJoTcwR0T Z0c6EnCRLmnk4iQ5ucEJzpCbFNKW/GC7XplpL4QQZRXb8McxqCdiYtwDEql1SkfOjE+UeNiXNDYo ft1JYpqLD89ec8tbiUuXu7ykJkcZKtKYCmj/u5UqvZVMY5kqV6N8Eik3pi2opSxn1VymN6eVMmrC UY/UBFhJ5CUtj5mMmNikVb9cJrKTBdISz4onysqVs26VE5ay0lW1uGnJ3SFzVR1T16/IZcv+pRNX rDwX0JY1z3mt0/9kpfpnO4l5H3Wmo10HxU1AUYFGdA5RP+ZEaEEYJlFTIiSh7oIW5U5lLmOJ7KK6 1Jc/ycHSjipDUTaA2Dkv6q556DNmi2Loy0KmsmrisaC+0qk9j8ZORm00UAezWUmSOk5PkolczVQa ziIlTHHii4caleo5g9a1h52KJNI6SVjJmpKl+UybIeNhVpvkhDDiApMUVFsklehBvsZIr0D4aGEp GcA4HjOPpUHsRwzLqogyFq+K5WRltXrZUTjWI5BlhmTnuFjQWnayVemsnUYrWsySdqmVk2NrP/ta cmbWmp2k7GonWdvSYnG3ngsdb3/LoCh2o4rkIS6hkpivNATxOsb/jcVywfdcFKBwPdM9YnRNd92h NXc72+UPYZuTXet+FzrhVUJ1W1deIY6XOOnlRnfDs94ntjdE703NfGsXX/XmlyjnFUN9LXPf2wWY bgPu4X9/s9/BFpiRB15ignukpP4KqcGoW/CEwSXhp1DYvxbW8IMxlOFBbjivI25c3ELMmxJz8MOc NRyKVXdiFUOkw66jcRFZbAUZp/anuVNmal8cEx3HY2Gn6A+O5bCzI2cPOKal5S9X48QbA1lDQVNy GYXMhwx6Z4W+vVaLp2wjMC9CzKPgchPNDGUyZwbNRVYziIELZwMpNM50nl/R6oznAuZ5zyUIUpND qlRIftHBbvbQ/5+zemgzJbpLTfSzozu56EWf9sePTpKkB01pSHPl0oCObaAzeVe4cTrUdcS0pyMt V1nyiR1uXK7NDqEGRusMkHIb2elWxiZa79TUm+u0qH3NS2Dua1BtOqmwIxvqWhqCyM7FWKyLaUxS CxrY9/P105gMTWaOz5nW+t9KndGzpKGV1zf7WU+3ue1LFUSq6N72OrxcHFkzFtViBau93s2xfoV7 2GhsK0Lr5U5bW3uk/bx3kpvlU2QyVWVFRbi1J33qTT9cJCHVVsC/zW9vM9zepPpkoyCucJwKXOMr 4yc0jE1Vhhv1qNWVd6YtPfGfarvfF7frQFEKVR5DNN4gv9maSv/lbpq/k6BbTfi6Vg6yaH96NSCP XcxJIlJbe8xgKeXWyVSSMIZyxOV3lbowse4soRr7ng2Dqjm72XQZonTWtxAVrO1G7TSuXWmBc7uA UvNJmrd85/tsaL3/bRFzX3UkPf84y88NR6dx818PnStdKa4crgu7ouV+a08zHsy9xf1O6778vXNp +TR1D4SB3bwKMyT5u1+T1wmzFLjDDU2br5r1ak81qb357bKmaprmjYqVH0f7028o9dA+U0LtVOWq Ojzs0i7k0h1J+ON/0d9lB/jUV/H785keKGm/tUQznlGT+52u7yV+ManK6nKj62LjZ3d6s8+e7jM9 +Kq+86Q8zy//jYr8+7KXrvxviTSmZlM5x0pH813wh0Dbl1ZWk3CMRycnt3JHl3UzpQT/J3oI44BE dXUY4VDm8nzHBXwf6FylBDJvJzf0Z15i8mqqNzsWOILOlC5qJXYbZ1beEoLNl3n1RncUxzTKB3s2 OF+ENXLLFno1VUvKhoJvgUv4V4SgVwPmN38KqCKuJFPv1ndeNnDbNE2KF079B2gh8UxamHuwNCq8 xzoiyDf0JnpMVnL6pkw+t08+CE/yhEoueGzTx1bV904BZyRo+FlqmEts+DJF5xk0Qxn6B4HJ1VTg AYVKeG7qxn6fR34d1ojcl4ShA4KCmH6FCIcYlXJWx39PtmtS/3iC/LZx+4dO4tSHo+aHbZR52KaB qFh1u1JRctiBMTOKOChdXJWIBHhUZNeKusaKgBgmbzVSUGOMxziDG1iDYGdCuriLMtiDzGh3NriK lRYbw4iNL5eN2xhxmtZo4HhZ2hiO4+iNvQaNmCiO83aOTreO3AiPaEOO5viO8shn97g6+KiP07WP /bhu/niPyAVEFNZeNvZCiRYgbLZsQoiA4dOQAmloWFZiBnk8DwmRNYRlO3hD8ZORF1lhFNltCvYZ IOmRCtaRL1hYenOSJalfJFk+D2mRAoaQAKaQXBSTn8c8N8mSBKOTKEliNeGSO/mSQSle+wMlKymU PElCHUKUG/85k3lTaCDUk8W3ZFMJQVpWlTJilT6ZlC25lQ30lXeoQE2ZQlh5F3cWGXYId0HXlZdo lsWzVZPAcbcTl22piI9IllNTk0uJFFG2k9GUlysWmB8ZFG+JXDskZWGpXCe5lxA5QompmF6JE4YZ HACJj51imXmGmZlZZ7k1GWd4iZLEiui4Y6SIWqEJW6U2W+komptVOFkymqbZWKs5bZ51W7FZm6XJ mqm5m6epmrcJm645Zj00ioTHNuHyjKNnQtphDPLwbCkZmfXnacipSk2InNdpm9QpM0fmnLk4WLKZ V555gzyIhYlHeYlXG7Y3MMl5OIpYnuQpV3V1jN3JnljziDr/d55bRJsMKHAmh2s49XP/OSa9qXSo +ZJ693UBaoX+MjJDuJ7IxkKe53UASqDYOZ3KuX6Zo4zo6W3g6Z0GKncZmp4FZzGECHRrqZYPOn1a tzM/clvtyWhVqIwTKnQWCqKqF6P29no0Woge+qE++haRhX4yBzNqtJ8VqHwas3VWKHUbBaTZeaOX FHgJSqE8yqBPCqVYemxLSqKmpJ8vmoItejD9lp9wdXCal6XalZ+4lG97OIiqqKIp6l4nyoN1OpjB SFu02SJs8ZxHaol6ehk62adg+qfAKZ64CWq6iad5mqa5SZoXWqGMKqea5adhKidi6nxmU5/yRYL4 hoY8Maj2/0WCn6hrTyie2mV6NlU+xfCj7pWqY7eqEQqhR/SqmAeCLVipQboXhHhyGzp4zoimkyqd I2op9zKiv1pXx9moVrOrGgdvxxp7PIaij2qjTLqBJcqBH7OowbasSIp8uCiB2Xp9fRilBdqgpBqu Bcd3ygqpcRqX6DeHiMc0+RWq1fo0qegz8tpuoKmlUHqvEZitHTevYHiqzJqd8Apw/wlR5NqvPYd8 5VKiCitKmjqr7YlpC3N1cSJPFKuoqBqJCOum4rqx1RqpOTilZSeu6mpR7FqumXilAKuuKtsw/Oqo YCmwGHtxBAWsJLutABiD44SIYpp8NlavRQmfN7t1MrWzPD4bhYYKqAVbqIqKqIjatFIbnFD7SIna smKzqTXrtV87tcLJR4d6tbnKm2BbtoTaZZzZmTzJtnC2mW8LXFtQAAA7 ------=_NextPart_000_0027_01C9B2D7.BAEC4950--