Geoff,

On Feb 10, 2014, at 5:43 PM, Geoff Huston <gih...@gmail.com> wrote:

> 
> On 11 Feb 2014, at 3:23 am, Roque Gagliano (rogaglia) <rogag...@cisco.com> 
> wrote:
> 
>> Hi Goeff,
>> 
>> On Feb 9, 2014, at 11:05 PM, Geoff Huston <gih...@gmail.com> wrote:
>> 
>>> Hi,
>>> 
>>> I took the text n draft-ietf-sidr-multiple-publication-points as it related 
>>> to TAs and placed it into the RFC6490bis draft without change.
>>> 
>>> The syntax of the TAL is not something I care a lot about either - I 
>>> suppose that one could get worried about rogue TA:s that try to place 1 
>>> million  URIs into the TAL, and get into the whole JSON / plain ascii thing 
>>> - I thought that the draft-ietf-sidr-multiple-publication-points document 
>>> already had a certain level of WG buy-in behind it - I guess that was not a 
>>> very good assumption on my part. I'll happily add what the WG wants here.
>> 
>> The document went through the adoption process and was open to discussions 
>> for almost 2 years. We never went through WGLC, which is when most people 
>> pays a closer attention. The only formal comment that we received on the 
>> format was about the blank line Randy mentioned and that was incorporated.
> 
> no criticism was intended here Roque about the previous process. I was trying 
> to explain my assumptions when incorporating this text into 6490bis. I agree 
> that in general it takes a Last Call to elicit readers and comments, although 
> there are always exceptions and this call for adoption is one of them.
> 

(Roque) No problem and thank you for taking over the work.

> 
>> 
>>> The issue about multiple CA certs that are different was something the 
>>> earlier draft was silent about. They simply said that they MUST be the same 
>>> and left it at that. I'm not sure how critical an issue this is, and whet 
>>> forms of additional mechanism are necessary to allow RPs to retrieve all 
>>> the referenced CA certs and define an algorithm for them to follow to 
>>> select the "best". My simplistic thinking about the original intent in 
>>> draft-ietf-sidr-multiple-publication-points was that an RP would pick oine 
>>> URI, and if that was unresponsive after some local threshold it wuould try 
>>> another, and so on. The discussion so far has been based on an assumption 
>>> that an RP would retrieve the CA cert from 2 or more URI's and then worry 
>>> about the case where the URIs differ. I am not sure what to add here to the 
>>> draft - the WG will need to provide further guidance on this. I worry about 
>>> a proposal for RPs to check all URIs - it seems to me to be adding to the 
>>> total load and I'm then not sure wh
 ere 
>>> the benefit of multiple URIs in TAs comes from in such a scenario.
>> 
>> I believe you should use Section 3.2 of 
>> draft-ietf-sidr-multiple-publication-points  as a starting point. As you can 
>> see the recommended behaviour is to select a rule to fetch the TA 
>> certificate and stop when you fetch one that matches the TAL public key.
>> 3.2.  Rules for Relying Parties (RP)
>> 
>> 
>> 
>>   A RP can use different rules to select the URI from where fetch the
>>   Trust Anchor certificate.  Some examples are:
>> 
>>   o  Using the order provided in the TAL file
>> 
>>   o  Selecting the URI randomly from the available list
>> 
>>   o  Creating a prioritized list of URIs based on RP specific
>>      parameters such as connection establishment delay
>> 
>>   If the connection to the preferred URI fails or the fetched
>>   certificate public key does not match the TAL public key, the RP
>>   SHOULD fetch the TA certificate from the next URI of preference.
>> 
> 
> 
> I can (and will) certainly add that text to section 3 of the bis document.
> 
> However, the question raised by Randy and commented on by Tim still remains - 
> what should a RP do if it chooses to retrieve the material from 2 or more 
> URIs and finds that the CA certificates that are retrieved in this manner 
> differ? And from Tim, some further contemplation about that the TA publisher 
> could do to provide hints to the RP in such a situation.

(Roque)  Two different problems:
        1) Fetching two different TA certificates that match the public key but 
do not have the same content: This problem can happen today as even if you have 
one URI, you can have two different "real" rsync servers behind, we are just 
making it evident. I personally believe we should stay only what is the 
expected behaviour rather than enumerating all the alternatives.

        2) Tim proposal to expand the TAL verbosity: I am sympathetic to the 
idea of using key=value style. However, as we only have two "keys", I see 
little incremental value on the changes from one version to the next one. On 
the other side, I am skeptical to add more verbosity to the TAL with 
information that we cannot cryptographically verify (the TAL is a plain text 
not signed document.)  I remember Carlos proposed the idea of having a special 
TAL signed object only available at the TA's publication point that would add 
information referring to the TAL lifecycle (maybe including a new TAL file to 
be replacing the existing one.) This seams to be a more appropriate way to 
solve the problem of replacing the TA key and keep the compatibility with the 
old install base (and as long as it is not been compromised :-) ).

Regards,
Roque

> regards,
> 
>   Geoff
> 

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to