Thanks, Sean

Let me add the LAMPS working group mailing list so we have more eyes on this.
[blind copying anima WG mailing list so WG members interested in this disus can 
subscribe
to LAMPS WG mailing list ([email protected]) ]
Inline replies/Q's to your analysis at the end of this mail.

To repeat and expand the goal of this discussion from what i was saying that
the LAMPS mike in IETF102:

- In ANIMA draft-ietf-anima-autonomic-control-plane (ACP), we use EST (RFC7030)
  to renew certificates. We would like to make installations with short-lived
  certificates work reliable, but devices may be disconnected longer than
  the short-lived time, so renewal may only happen after the cert is expired.

- In the ANIMA WG, we seem to not be clear on the rules for renewing expired 
certs.
  RFC7030 section 3.3.2 sounds as if it mandatory for the EST server to
  validate the client certificate according to RFC5280, so we where concluding
  that an expired client certificate might not be something that the client
  could use if he wanted to comply to all IETF PKIX regulations.
  
  [ technically it would of course be fine to us the expired client certificate,
  and it might be necessary to use it because for renewals, the certificate
  to be renewed must be carried in the TLS authentication (if i understand it
  correctly, it would not be re-signaled inside the EST connection because
  the EST server wants to have prof of posession of the cert by the client,
  and thats done by TLS and does not need to be duplicate). ]

- Yaron reminded me that in draft-ietf-acme-star certificates renewed 
certificates
  are not handled as an entity that requires authentication of the recipient
  but instead something that can be pre-created and cached in various places
  to overcome problems with nomadic connectivity. This to me looks like
  quite different from the approach by EST.

- My thinking is somewhat in the middle between what i think EST says and what
  draft-ietf-acme-star says:

  - In EST, you do want identification with the pre-existing (expired) 
certificate.
  - The proof of posession of the expired certificate can help the registrar
    to determine aliveness of the client and reset any policy that could exist
    to determine whether the client is dead (after a long enough period of time)
    and stop reneweing certificates.
  - The proof of posession is also necessary IMHO when rekeying is required.

- Which brings us back to Seans analysis of existing PKIX texts:
  (inline)

On Mon, Jul 23, 2018 at 08:08:10AM -0400, Sean Turner wrote:
> Toreless,
> 
> I do not believe there is any prohibition against the use of expired or even 
> revoked certificates for renew/rekey in the PKIX suite of RFCs.

That wold be great.

> The path validation algorithm in 5280 does consider whether the certificate 
> is revoked/expired, but does hard fail on that status.

But that would contradict your above statement, would it not ? With RFC7030
3.3.2 requiring RFC5280, it would have to fail for expired certificates. No ?

> There???s nothing in the management protocols 2986 (PKCS#10), 5272 (CMC), and 
> 4210 (CMP) about it either.

Ok, so we can ignore those docs ;-)

> But, the real reason it might be allowed is based on the CP (Certificate 
> Policy) and that follows 3647; this RFC does have sections on "Identification 
> and authentication for re-key after revocation???; I say ???might??? here 
> because it is a policy decision (some CPs I???ve written allow it some do 
> not).

Ok, so RFC3647 does seem to not describe the case of a purely 
expired certificate, but just the re-keying of a certificate that
was revoked, and even in that case it would be permitted based
on a policy, so it would be ok.

Seems to leave 5280 as the existing doc standing in the way ?
If so, how to most easily fix this ?

Cheers
    Toerless

> spt
> 
> > On Jul 19, 2018, at 17:29, Toerless Eckert <[email protected]> wrote:
> > 
> > Sean,
> > 
> > wrt to the reply you gave me in Lamps wrt to:
> > "Do existing authoritative IETF PKIX documents permit to use expired
> > certificates as authentication for certificate renewal"
> > 
> > Could you please point us to the reference that you mentioned whether
> > or not this is allowed by current PKI standards ?
> > 
> > Note that specifically in the case of BRSKI, we are talking about
> > using an expired client cert in a TLS connection to an RA, so that
> > TLS connection would only be used for renewal.
> > 
> > Aka: I am not even sure if the expired cert would need to be "permitted"
> > for this operartion by a PKIX document and/or by TLS.
> > 
> > To me this is key missing piece to make ANIMA enrollment/renewal
> > rock-solid in the face of non-contiguous full reachability of RA/CA.
> > 
> > If we know and can point to how this is permissible it should
> > be simple for us to have short informative text explaining this
> > crucial option.
> > 
> > Thanks!
> >    Toerless

_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima

Reply via email to