ANIMA is working on a more construction focused version of BRSKI, which you
can read about in 
https://datatracker.ietf.org/doc/draft-ietf-anima-brski-async-enroll/,
in which the last few meters of connectivity are by sneaker-net.
(Literally: technicians walking up/down stairs into the basement of new
construction with some commissioning device.  Using object-security CMP
rather than EST, and store-and-forward use case.  Round trips are expensive
until the network is up)

The trend in building automation is that people are paranoid about downtime
due to certificate expiry, and so long-lived certificates (multiple years to
small number of decades) are deployed.
In the case of new construction (a subdivision of houses), it might be a year
before the building is occupied by the first owner.

We were discussing the various transfers of ownership that we need to
support.  These include:
  1) the building is sold
  2) the building owner changes building management companies
  3) the building management company changes technical maintenance companies
  4) the building owner fires the building management company
  5) the bank forecloses on the building owner, and forces a sale
  6) the technical mainenance company is acquired by another company
  7) the company providing the tools to the technical maintenance company
     (the "registrar") does a major product change, and/or is acquired
     by another company

While (5) might be forced and require a "flash" rekeying, we think that all
the rest of the transitions should be accomodated without downtime/flag days.
If we could say that every device will check in with the Registrar frequently
enough using EST, then we could push new trust anchors down and issue new
certificates against the new trust anchors.
So this argues for short-lived, STAR-type certificates.
But, paranoia and concern about initial occupancy, and even long periods when
there might be no occupant argues for longer-lived certificates.
OTH, frequent renewal has the advantage that failures are caught much faster.

As far as I know, the only signal for when to renew is notAfter.
Generally, one should renew sometimes after the half-way point.
(LetsEncrypt policy of 90 days, but discouraged to renew until 60 days)

It seems that a CA ought to be able to express some other kind of renewal
period directly.   Is there any work in this area?

I think that a smooth transition from one CA anchor to another can be
accomplished by signing of the old CA by the new CA, and VV.  I don't know
how successful this has been in reality: I sense that it's a practice which
is good in theory, but not in practice.

--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to