Deb Cooley <[email protected]> wrote:
> 1. Section 8.2: I'm still struggling with finding the point here. I'd
> like to be a bit more cohesive. State the issues/recommendations up
> front (i.e tell a story). It looks like you are claiming that the end
> customer 'has to' run a private PKI, the manufacturer 'could' run a
> private PKI for the whole thing, or the manufacturer 'could' use some
> subset of Web PKI Trust Anchors (which you call something else). I've
> tried to do the 'use the public WebPKI' part below.
RFC8995 (BRSKI) is for end customers that want to enroll a device into their
private PKI (in a zero-touch way).
So I really don't understand what you are complaining about here.
There are options.
8.2 is about the tussle between being inclusive and reducing attack surface.
Manufacturers that want to install IDevID into the devices (which BRSKI
requires), already MUST have a private PKI for that. The conflicting lifetime
requirements prevent using a "Web PKI Trust Anchor".
(There is also a SAN contents struggle, but there are workarounds for that)
Is "Web PKI Trust Anchor" (set) even a well-defined term?
It's not a single set, as much as people would like to think it is.
AFAIK, CABFORUM does not define it, web browser and OS vendors decide on a
case-by-case basis (based upon criteria established by CABFORUM), if they will
accept any specific anchor into their trusted set.
> 2. Section 8.2, last three paras: These are actually just three
> sentences. Let's see if we can make a paragraph out of them. Put the
> last sentence first, and second sentence second, and first sentence
> last. Something like: "It is recommended for Manufacturers to work
> with their VARs to determine if there is a subset of publicly trusted
> (Web) PKI Trust Anchors that would satisfy all their VARs, and to ship
> only that subset. Manufacturers need to include enough trust anchors
> in their devices (the Pledges) so that all expected Cloud Registrar's
> can be validated. While there is no requirement that Cloud Registrar's
> certificates are part of the public (WebPKI) Trust Anchors, it is
> likely simpler and cheaper for most such systems to use these easily
> obtained certificates."
okay, I'll see wehat we can do.
> Nits: 8.1, para 2: 'device.is sheltered'/'device is sheltered . 8.2,
> para 3: 'operate enough of a private PKI'/'operate a private PKI'
okay.
--
] Never tell me the odds! | ipv6 mesh networks [
] Michael Richardson, Sandelman Software Works | IoT architect [
] [email protected] http://www.sandelman.ca/ | ruby on rails [
_______________________________________________
Anima mailing list -- [email protected]
To unsubscribe send an email to [email protected]