On Tue, Jun 30, 2020 at 08:59:24PM +0200, Eliot Lear wrote:
> Hi Toerless,
>
> I think either a URI or otherName are pretty much functionally equivalent. I
> might go with URI for one particular reason, which is that the tooling ??? in
> particular OpenSSL ??? will handle it better.
Thanks, Eliot. This was/is my initial thinking. let me see what i can
put into the ntext rev. quickly.
Just learned of one benefit of otherName in that it should also be
possible to signal it in IKEv2 for IDi/IDr via ID_DER_ASN1_GN...
I think ultimately we can define them to be interchangeably, but not quite sure
how yet.
Cheers
toerless
>
> Eliot
>
> > On 30 Jun 2020, at 18:10, Toerless Eckert <[email protected]> wrote:
> >
> > Just had a call with Russ and Barry (thanks Russ, Barry), and here is
> > what transpired, and it comes with a Q to the ANIMA WG wrt. to
> > solution options (see below). Hopefully Russ/Barry will correct me if i
> > misrepresent anything.
> >
> > Russ and Barry agreed that a solutions where email addresses are not
> > primarily intended to be used for actual emails (e.g.: using SMTP/RFC5321)
> > may be something found in the wild, but in their opinion, it would create
> > harm (to i guess the Internet email system), significant enough to warrant
> > an IESG DISCUSS if such use was to be defined into an Internet Standard.
> >
> > If i understood it correctly, the choice of otherName by previous solutions
> > similar might have also been influenced by the same rejection to use
> > rfc822Name
> > It sounded to me from the call as if email address/rfc822Name might have
> > been desired to be used first by e.g.: XMPP but then they had to move to
> > an otherName (RFC3920 i think) because of resistance to get that
> > standardized.
> > That at least would be a detail i was missing from the prior explanations on
> > this thread.
> >
> > I continue to disagree, but i think the resolution of this basic
> > argument would create an inacceptable timeline to progress ANIMA,
> > so i do not want to afford this discussion any longer for the ACP draft.
> > [ Hopefully i can get back to after ACP is done because i still think it
> > is quite fundamental. ]
> >
> > a) Russ promised me a text stub or pointers thereto necessary/sufficient to
> > define a new
> > use (and i guess IANA registration). Probably something similar to
> > what is e.g.: found in rfc8398.
> >
> > I think IANA registration is here:
> > https://www.iana.org/assignments/smi-numbers/smi-numbers.xml
> > See e.g.: id-on-SmtpUTF8Mailbox,
> > registration procedure: spec required, expert: Russ Housley
> >
> > b) I brought up the point that using uniformResourceIdentifier instead
> > of a new otherName would avoid that any part of the ecosystem including
> > diagnostic tools would have to be software updated with new ASN.1
> > en/decode work and create unique names useable outside certificates as
> > well.
> >
> > If we used "acp:<local>@<acp-domain-name>", this would require
> > review process for the new "acp:" scheme, which according to my reading of
> > process would take maybe up to one month. Barry suggested to simply
> > register an IETF URN parameter (RFC3553), e.g.:
> >
> > urn:ietf:params:acp:<local>@<acp-domain-name>
> >
> > IANA registry: https://www.iana.org/assignments/params/params.xhtml
> > Registration procedure: IETF review (which i guess is the ACP draft
> > IETF review).
> >
> > So, would love to hear opinions of a) vs. b). Am i overselling the URI
> > option
> > vs. the otherName option ? I have no experience on this backend side, i am
> > just trying find the most pragmatic, easy to adopt option for operators,
> > and i have seen a of backend systems (inventory management or the like)
> > where names are shuffled around, and we started using email addresses
> > because
> > those are always supported identifier types in backend systems. No idea if
> > URI are that common,
> > but at least they could be there because they are an existing defined
> > name/address type.
> > For otherName, those uses outside certificates would need to come up with
> > their own
> > field type i think.
> >
> > Given how this is not an email address anymore, it
> > would be prudent to introduce one degree of extensibility easier to manage:
> >
> > otherName: node:local@acp-domain-name
> > URN: urn:ietf:params:acp:node:<local>@<acp-domain-name>
> >
> > Where "node" is the value we define in ACP, and other values here
> > are the extension points.
> >
> > Final note: of course we loose the ability to use public CA that an
> > sign rfc822Name, e.g.: via ietf-acme-email-smime, which we would have
> > if we whee permitted to use email addresses as ACP names, and i was getting
> > fond of that option, but given how we did not perceive this nice option
> > when we started ACP, its at least no set-back from the original ACP goals.
> >
> > Cheers
> > Toerless
> >
> > On Sun, Jun 28, 2020 at 06:11:49PM +0200, Toerless Eckert wrote:
> >>
> >> On Sun, Jun 28, 2020 at 10:47:51AM -0400, Russ Housley wrote:
> >>> Brian:
> >>>
> >>> The point of a certificate is to bind the public key to the identity of
> >>> the private key holder. The certificate supports many different forms of
> >>> names to support many different protocols. The rfc822name is used to
> >>> bind to an email address.
> >>
> >> How do you think IETF should decide on what is a semantic correct
> >> email address ? RFC5280 simply inherited the non-crypto definitions
> >> of email address/mailbox.
> >>
> >> Do you think it is appropriate for you to recommend blocking progress
> >> of a document through IESG review based on your interpretation what
> >> does and what does not constitute a semantic correct email address ?
> >>
> >> Do you think that there are rfc2821 email addresses that are
> >> semantically correct if not used in a certificate, but that are
> >> not semantically correct for use in rfc5280 certificates ? If so,
> >> can you please explain how such a differentiation would be justified
> >> by existing RFC text ?
> >>
> >> If you do not think that there is a semantic correct email addresses
> >> outside and inside of certificate/rfc822Name use, how then would
> >> it be appropriate for you, Ben or LAMPS to decide on what is and
> >> what is not a semantic correct email address.
> >>
> >>> And, something else is going on here.
> >>
> >> Are you saying the addresses are (1) semantic correct email addresses AND
> >> something else is going on, or are you saying (2) they are NOT
> >> semantic correct email addresses AND something else is going on.
> >>
> >> If you are saying (1), we are back to the above discussion of
> >> the standing of how to decide what does and what does not
> >> consitute a semantic correct email address.
> >>
> >> If you are saying (2), i fully agree, but i would need an explanation
> >> of how such "something else" would invalidate the use of such
> >> email addresses in rfc822Name, because i see no further requirements
> >> against email addresses in rfc822Name other than what you showed
> >> in a prior mair on this thread.
> >>
> >> If a terminal is assigned an email address of
> >> "[email protected]", and the software says to the
> >> user "you are sitting in Room17 on Terminal5", because the
> >> software expected a particular formed local part of its
> >> email address and parsed it, that is something else going on.
> >>
> >> If the same email address is then use together as an
> >> identifier together with a password for the terminal to
> >> access some resources, oh, like a library database, that is
> >> also something else going on.
> >>
> >> This is pretty much what ACP does. What is IMHO is NOT going
> >> on here is that these additional aspects render
> >> [email protected] into a non semantic correct
> >> email address. They just do more with it.
> >>
> >>> That is why I recommend otherName instead of rfc822name.
> >>
> >> No, if you would just recommend an alternative that would be great,
> >> but you are blocking progress of a document that has a lot of
> >> in our opinion crucial explanations how that alternative would
> >> create more use-case harm than the solution choosen in the document.
> >>
> >>> I think that everyone understands that at this point.
> >>
> >> I do not understand how a recommendation like yours can raise to
> >> a blocking DISCUSS in an IESG review.
> >>
> >>> Eric:
> >>>
> >>> Please change the write-up for this document. It currently says:
> >>>
> >>> (10) Has anyone threatened an appeal or otherwise indicated extreme
> >>> discontent?
> >>> If so, please summarise the areas of conflict in separate email messages
> >>> to the
> >>> Responsible Area Director. (It should be in a separate email because this
> >>> questionnaire is publicly available.)
> >>>
> >>> No. There was unanimous support for this work and nobody raised any
> >>> objections.
> >>> This is no longer the case.
> >>
> >> So, it is not a recommendation you are voicing, it is instead
> >> "extreme discontent".
> >>
> >> I wonder what rules of IETF are for betting how such "extreme miscontent"
> >> has to be technically founded or just needs to be taken into account
> >> without suficient technical argument. I think you have provided
> >> no clear technical reasoning for:
> >>
> >> - How does the documents choice cause more harm than the alternative
> >> proposed for the use-cases or any other possible victims ?
> >> - How is the choice in violation of any relevant RFC ?
> >> - How are the email addresses not syntactic and semantic correct addresses
> >> according to rfc2821 ?
> >> - How are otherwise statements like "i do not think this is the right
> >> thing" and
> >> "there is something else going on here" sufficient arguments for blocking
> >> IESG progressing the document.
> >>
> >> Cheers
> >> Toerless
> >>
> >>>
> >>> Russ
> >>>
> >>>
> >>>> On Jun 27, 2020, at 11:09 PM, Brian E Carpenter
> >>>> <[email protected]> wrote:
> >>>>
> >>>> Hi Eric,
> >>>>
> >>>> On 28-Jun-20 10:58, Eric Rescorla wrote:
> >>>>> I'm not Russ, but I don't take his point to be about ACME one way or
> >>>>> the other.
> >>>>>
> >>>>> Rather, I take his point to be (as he just said in his response to
> >>>>> Brian) that while this is *formatted* as an e-mail address, it does not
> >>>>> in fact correspond to something to which e-mail can be delivered
> >>>>
> >>>> It might do, simply because it is so formatted.
> >>>>
> >>>>> and therefore does not match the semantics of RFC 5280.
> >>>>
> >>>> RFC5280 does not require such a mailbox to exist. Is there another
> >>>> normative document, e.g. a BCP, that does require one? It's entirely
> >>>> possible that the authors of RFC5280 assumed that such a mailbox would
> >>>> exist, but this is not written anywhere that I can see. So IMNSHO, this
> >>>> objection to the ACP draft is attempting to hold it to a standard that
> >>>> isn't documented.
> >>>>
> >>>>> Taking a step back from the substantive issue, it seems to me that to
> >>>>> the extent to which their is debate about the meaning of 5280, this is
> >>>>> a discussion which cannot be resolved entirely on this list, but
> >>>>> instead needs to involve the LAMPS WG.
> >>>>
> >>>> That may be true, but it's not ANIMA's fault and the discussion first
> >>>> arose last year, so why hasn't LAMPS already considered it, if it's
> >>>> important enough to continue obstructing ANIMA's progress?
> >>>>
> >>>> Brian
> >>>>
> >>>>>
> >>>>> -Ekr
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> On Sat, Jun 27, 2020 at 3:46 PM Toerless Eckert <[email protected]
> >>>>> <mailto:[email protected]>> wrote:
> >>>>>
> >>>>> On Sat, Jun 27, 2020 at 11:52:20AM -0400, Russ Housley wrote:
> >>>>>> Toerless:
> >>>>>>
> >>>>>> I think Brian actually made my point. While the filed contains an
> >>>>>> email address, using it as such would result in a delivery failure.
> >>>>>> The private key holder cannot be reached by this address.
> >>>>>
> >>>>> Russ, i said:
> >>>>>
> >>>>>> First of all, you can if you want to,
> >>>>> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> >>>>>
> >>>>> Aka: Yes, if an ACP admin thinks ACME style challenge/reply
> >>>>> email authentication mechanism is useful, then he can of course
> >>>>> set up those email addresses accordingly. I did reply to that
> >>>>> point exhaustively in my reply about the ACME email mechanism.
> >>>>>
> >>>>> Why do you ignore that answer ?
> >>>>>
> >>>>>> and secondly, i contest that it is a requirement to be able
> >>>>>> to do that if the recipient doesn't need to support it.
> >>>>> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> >>>>>
> >>>>>> Think about [email protected]
> >>>>>> <mailto:[email protected]>.
> >>>>>> You do want to make sure though that you are in control of
> >>>>>> the electronic mail address though, and that is given for ACP
> >>>>>> addresses.
> >>>>>
> >>>>> Where in rfc5280 or any other generic RFC about certificates does
> >>>>> it say you MUST have a mailbox that is reachable ? Where does it
> >>>>> say that all certificiates with rfc822Name must be email boxes
> >>>>> that support ACME email style challenge-reply about the email address
> >>>>> ?
> >>>>> I think this is a non-existing requirement against email addresses.
> >>>>>
> >>>>> Of course, [email protected]
> >>>>> <mailto:[email protected]> can have a certificate with
> >>>>> that rfc822Name. It just can't use the ACME mechanism to be
> >>>>> generated. But the signed mails sent from that address can be
> >>>>> authenticated.
> >>>>>
> >>>>> Or there are never emails, because the email address just serves
> >>>>> as identifier of an entity such as in wifi roaming identification
> >>>>> and authentication. In that case you are not authenticating
> >>>>> e.g.: password ownership for the email address via actual emails
> >>>>> but via AAA protocols against a DNS domain known AAA server
> >>>>> for the domain part of the email address.
> >>>>>
> >>>>> If you want to write a standards track RFC that all email addresses
> >>>>> used in any X.509v3 certificate MUST support an ACME style
> >>>>> challenge/reply email, then please do that, and seee if you get
> >>>>> thast through. If would invalidate a lot of solutions like
> >>>>> those wifi roaming ones. It WOULD NOT invalidate the ACP
> >>>>> solution, because as said (no several times) the ACP solution
> >>>>> can perfectly be set up to support this. It just does not
> >>>>> need to.
> >>>>>
> >>>>> Cheers
> >>>>> Toerless
> >>>>>
> >>>>>> Russ
> >>>>>>
> >>>>>>
> >>>>>>> On Jun 27, 2020, at 1:40 AM, Toerless Eckert <[email protected]
> >>>>>>> <mailto:[email protected]>> wrote:
> >>>>>>>
> >>>>>>> Russ,
> >>>>>>>
> >>>>>>> Top posting re. your ACP vs. ACME question.
> >>>>>>>
> >>>>>>> ACP rfc822name are meant to be under control of the ACP network
> >>>>>>> operations.
> >>>>>>> aka: the ACP registrars could be controlling rfcSELF*@example.com
> >>>>>>> <http://example.com> mailboxes using
> >>>>>>> ACME S/MIME to get rfcSELF*@example.com <http://example.com>
> >>>>>>> certificates or IMHO easier control
> >>>>>>> the acp.example.com <http://acp.example.com> MTA. Just no
> >>>>>>> need/benefit to do this now IMHO:
> >>>>>>>
> >>>>>>> An ACP is a private network which is ideally isolated from other
> >>>>>>> ACP networks by use of private TA. Using the ACME rfc822name scheme
> >>>>>>> would
> >>>>>>> IMHO create a lot of attack components (all the MTA in the mail path
> >>>>>>> and domain names) if used acros the Internet - without benefits for
> >>>>>>> ACP. Of course, if it was all a private ACME setup within an
> >>>>>>> enterprise,
> >>>>>>> and using mailboxes and ACME is a popular choice - sure, why not.
> >>>>>>> But for private CA setups there are existing IMO easier options
> >>>>>>> (private CA VMs using EST or the like).
> >>>>>>>
> >>>>>>> IMHO public ACME CAwith S/MIME authenitcation could make sense
> >>>>>>> in the future to enable authentication across different ACP domains.
> >>>>>>>
> >>>>>>> Any network has links into other domains and today they are usually
> >>>>>>> unauthenticated, that could be solved IMHO fairly easily.
> >>>>>>>
> >>>>>>> "private" CA of ACP domain , lets call it acpCA signs all ACP certs.
> >>>>>>> Its own cert is not self-signed, but signed by ACME CA via S/MIME,
> >>>>>>> maybe email is [email protected] <mailto:[email protected]> (no
> >>>>>>> ACP IPv6 address in it)
> >>>>>>>
> >>>>>>> Now the ACP nodes actually use acpCA PLUS ACMA CA's as TA.
> >>>>>>> After IKEv2 authenticates neigbor the followup ACP domain membership
> >>>>>>> step checks if the TA of the peer is acpCA. If yes, then peer
> >>>>>>> becomes ACP member, otherwise we have an authenticated signalling
> >>>>>>> channel to an interdomain / different CA peer. And that of course
> >>>>>>> would enable better/secure auto-configuration of such interdomain
> >>>>>>> links.
> >>>>>>>
> >>>>>>> This gives me good mix of security: Its still only relying on
> >>>>>>> well controlled private TA to get into ACP, but also doubles
> >>>>>>> at less secure but best available "Internet/Interdomain"
> >>>>>>> authentication.
> >>>>>>>
> >>>>>>> Cheers
> >>>>>>> Toerless
> >>>>>>>
> >>>>>>> On Sun, Jun 21, 2020 at 12:36:06PM -0400, Russ Housley wrote:
> >>>>>>>>> On Jun 21, 2020, at 12:28 PM, Michael Richardson
> >>>>>>>>> <[email protected] <mailto:mcr%[email protected]>> wrote:
> >>>>>>>>>
> >>>>>>>>>
> >>>>>>>>> Russ Housley <[email protected] <mailto:[email protected]>>
> >>>>>>>>> wrote:
> >>>>>>>>>> One cannot send email to the character string in this
> >>>>>>>>>> specification, so
> >>>>>>>>>> it should not be carried in the rfc822name.
> >>>>>>>>>
> >>>>>>>>> You can send email to that character string if you configure the MX.
> >>>>>>>>> It was designed specifically to accomodate that.
> >>>>>>>>>
> >>>>>>>>> I objected at the time: I thought it was a stupid feature, that no
> >>>>>>>>> sensible IKEv2 daemon
> >>>>>>>>> was going to have to send/receive email.
> >>>>>>>>>
> >>>>>>>>> But, Toerless was paranoid that if we did anything at all out of the
> >>>>>>>>> ordinary, that the corporate CA people, in order to protect their
> >>>>>>>>> fiefdom,
> >>>>>>>>> would freak out and throw some huge roadblock in the way of
> >>>>>>>>> deploying the ACP.
> >>>>>>>>>
> >>>>>>>>> And, now have an ACME method past WGLC that does certificate
> >>>>>>>>> validation by
> >>>>>>>>> SMTP.
> >>>>>>>>
> >>>>>>>> Looking at the email certificate enrollment work in the ACME WG
> >>>>>>>> (draft-ietf-acme-email-smime-08), I have a hard time seeing how the
> >>>>>>>> device that knows the private key could participate in such a
> >>>>>>>> protocol. How do you see it working?
> >>>>>>>>
> >>>>>>>> Russ
> >>>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>> _______________________________________________
> >>>>>>>> Anima mailing list
> >>>>>>>> [email protected] <mailto:[email protected]>
> >>>>>>>> https://www.ietf.org/mailman/listinfo/anima
> >>>>>>>
> >>>>>>>
> >>>>>>> --
> >>>>>>> ---
> >>>>>>> [email protected] <mailto:[email protected]>
> >>>>>
> >>>>> --
> >>>>> ---
> >>>>> [email protected] <mailto:[email protected]>
> >>>>>
> >>>>> _______________________________________________
> >>>>> Anima mailing list
> >>>>> [email protected] <mailto:[email protected]>
> >>>>> https://www.ietf.org/mailman/listinfo/anima
> >>>>>
> >>>>>
> >>>>> _______________________________________________
> >>>>> Anima mailing list
> >>>>> [email protected]
> >>>>> https://www.ietf.org/mailman/listinfo/anima
> >>>>>
> >>>>
> >>
> >> --
> >> ---
> >> [email protected]
> >>
> >> _______________________________________________
> >> Anima mailing list
> >> [email protected]
> >> https://www.ietf.org/mailman/listinfo/anima
> >
> > --
> > ---
> > [email protected]
> >
> > _______________________________________________
> > Anima mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/anima
--
---
[email protected]
_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima