The sentence I sent was in addition to Hannes language to address the multiple 
CWT case discussed in the thread - not a replacement for it.

                                -- Mike

-----Original Message-----
From: Jim Schaad <[email protected]> 
Sent: Saturday, June 23, 2018 9:05 AM
To: Mike Jones <[email protected]>; Hannes Tschofenig 
<[email protected]>; [email protected]
Cc: [email protected]
Subject: RE: Key IDs ... RE: [Ace] WGLC on 
draft-ietf-ace-cwt-proof-of-possession-02

No not really, Hannes's language is much closer to what I am looking for.  I 
don't care if they are different kinds of CWTs.  I care about impersonation.

> -----Original Message-----
> From: Mike Jones <[email protected]>
> Sent: Friday, June 22, 2018 10:44 PM
> To: Jim Schaad <[email protected]>; Hannes Tschofenig 
> <[email protected]>; draft-ietf-ace-cwt-proof-of- 
> [email protected]
> Cc: [email protected]
> Subject: RE: Key IDs ... RE: [Ace] WGLC on 
> draft-ietf-ace-cwt-proof-of-
> possession-02
> 
> I think you're looking for language something along these lines, right
Jim?
> 
> "Likewise, if PoP keys are used for multiple different kinds of CWTs 
> in an application and the PoP keys are identified by Key IDs, care 
> must be taken
to
> keep the keys for the different kinds of CWTs segregated so that an
attacker
> cannot cause the wrong PoP key to be used by using a valid Key ID for 
> the wrong kind of CWT."
> 
>                               -- Mike
> 
> -----Original Message-----
> From: Jim Schaad <[email protected]>
> Sent: Friday, June 22, 2018 7:59 AM
> To: Hannes Tschofenig <[email protected]>; Mike Jones 
> <[email protected]>; draft-ietf-ace-cwt-proof-of- 
> [email protected]
> Cc: [email protected]
> Subject: RE: Key IDs ... RE: [Ace] WGLC on 
> draft-ietf-ace-cwt-proof-of-
> possession-02
> 
> That language works if you assume that there is only one CWT that an 
> RS
will
> look to.  If there are multiple CWTs then one needs coordination 
> language between them.
> 
> > -----Original Message-----
> > From: Hannes Tschofenig <[email protected]>
> > Sent: Friday, June 22, 2018 6:36 AM
> > To: Jim Schaad <[email protected]>; 'Mike Jones'
> > <[email protected]>; draft-ietf-ace-cwt-proof-of- 
> > [email protected]
> > Cc: [email protected]
> > Subject: Key IDs ... RE: [Ace] WGLC on draft-ietf-ace-cwt-proof-of-
> > possession-02
> >
> > Hi Jim,
> >
> > I would like to comment on this issue.
> >
> > -----
> > > > 14.  I have real problems w/ the use of a KID for POP 
> > > > identification.  It
> > may
> > > identify the wrong key or, if used for granting access, may have 
> > > problems
> > w/
> > > identity collisions.  These need to be spelt out someplace to help 
> > > people tracking down questions of why can't I verify w/ this CWT, 
> > > I know it's
> > right.
> > >
> > > The Key ID is a hint to help identify which PoP key to use.  Yes, 
> > > if a Key
> > ID is
> > > sent that doesn't correspond to the right PoP key, failures may occur.
> > > I
> > view
> > > that as usage bug - not a protocol problem.  If keys aren't 
> > > consistently
> > known
> > > and identified by both parties, there are lots of things that can 
> > > go
> > wrong, and
> > > this is only one such instance.  That said, I can try to say 
> > > something
> > about the
> > > need for keys to be consistently and known by both parties, if you 
> > > think
> > that
> > > would help.
> >
> > > My problem is that if there are two different people with the same 
> > > Key ID,
> > either intentionally or unintentionally, then using the key ID to 
> > identify
> the
> > key may allow the other person to masquerade as the first person.  I 
> > am unworried about the instance of a failure to get a key based on a 
> > key
id.
> > That is not the problem you are proposing to address.
> >
> > -----
> >
> > I think we should document this issue. Here is some text proposal 
> > that
> could
> > go into a separate operational consideration section (or into the 
> > security consideration section instead).
> >
> > "
> > - Operational Considerations
> >
> > The use of CWTs with proof-of-possession keys requires additional 
> > information to be shared between the involved parties in order to 
> > ensure correct processing. The recipient needs to be able to use 
> > credentials to
> verify
> > the authenticity, integrity and potentially the confidentiality of 
> > the CWT
> and
> > its content. This requires the recipient to know information about 
> > the
> issuer.
> > Like-wise there needs to be an upfront agreement between the issuer 
> > and the recipient about the claims that need to be present and what 
> > degree of trust can be put into those.
> >
> > When an issuer creates a CWT containing a key id claim, it needs to 
> > make sure that it does not issue another CWT containing the same key 
> > id with a different content, or for a different subject, within the 
> > lifetime of the
> CWTs,
> > unless intentionally desired. Failure to do so may allow one party 
> > to impersonate another party with the potential to gain additional
> privileges.
> > "
> >
> >
> > Ciao
> > Hannes
> >
> > IMPORTANT NOTICE: The contents of this email and any attachments are 
> > confidential and may also be privileged. If you are not the intended
> recipient,
> > please notify the sender immediately and do not disclose the 
> > contents to
> any
> > other person, use it for any purpose, or store or copy the 
> > information in
> any
> > medium. Thank you.


_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to