I shared my understanding of why the field exists and the language in existing 
docs supporting that understanding. As an optimist I hoped that manufacturers 
wouldn’t re-use serial numbers, although MCR followed up with examples, so I 
focussed on a rosy future where anima concepts are well established and a MASA 
service could be marketed to multiple manufacturers.

Between those two scenarios I think your suggestion of clarifying in RFC8366bis 
makes sense. Working group feedback could clarify if others feel it adds value 
or is unnecessary complexity.

- max

On Jul 26, 2021, at 11:52 AM, Toerless Eckert 
<t...@cs.fau.de<mailto:t...@cs.fau.de>> wrote:

Thanks, Max

My point was that reuse of serial number by e..: a MASA service supporting
multiple vendors is not a sufficient example why you would need this field.
The way i understand it, you would also need to assume that the two
devices with the same serial number have the same trust anchor against
which a voucher would be compared.

So, if for example the serial number is a bad format not well identifying the
vendor (VID/PID etc..), then the same serial number could happen across
different vendors served by the same MASA, but there would be no collision,
because these would have different TA.

I hope i correctly analyzed this.

Which gets us back to the case you mention, which is one and the same vendor
(shudder) reusing serial numbers.

a) Are we aware of any actual instance of this ?
b) If not, can we create an example that sounds reasonable ?

  For example, i am manufacturing cheap low-end compuate, SBC or
  constrained CPU nodes (the like of ESP32 or so). These have an
  ethrenet interface but i sell too many to actually buy unique
  MAC addresses from IEEE. But still i thought it is a great
  idea for VID/PID to include model-type, but as the numeric
  component the ethernet-MAC, because i really didn't wan to have
  a unique identification (yes, i know this sounds stupid to me,
  but i am trying to come up with an example, and i have seen all
  type of stupid industry stuff).

  So, later on this security stuff gets added, BRSKI, voucher,
  devices have no reasonable insecure serial-numer, but their
  IDevID derived from such useless insecure serial number does
  have a unique differentiar,namely that KeyIdentifier.

If something like this would be a stupid but possible case, then
i would like us to write somehing short about this into rfc8366bis
so readers can understand why this differentiation by KeyIdentifier
may be useful to have.

Cheers
   Toerless

On Fri, Jul 23, 2021 at 10:00:40PM +0000, Max Pritikin (pritikin) wrote:
Inline,

On Jul 23, 2021, at 11:34 AM, Toerless Eckert 
<t...@cs.fau.de<mailto:t...@cs.fau.de>> wrote:


Unfortunately, i have to pile on instead of just answering:

I can not remember that we ever constructed a case where his
field was necessary when we wrote rfc8366. At least, we did
not document it e.g. in the examples. Such an example, explanation
would now be very helpfull in answering your question. Or at leas
for me to wrap my head around it.

I for once can not come up with a case where this field would
be anything else than what is in the CMS signerInfo, aka: this
field is redundant. And creating correct interop for
a redundant field is some somewhat non-motivational.

So, if anyone can lay out an example where this field is
actually required,

Pulling from the YANG module description in s5.3 of RFC8366

This leaf is "Optional since some serial-numbers are already unique within the 
scope of a MASA” because, within the scope of a manufacturer authorized signing 
authority that is truly provided by the manufacturer one could reasonably 
expect the serial number to be unique. I mean, what kind of manufacturer would 
sell multiple devices with the same serial number? They’d just be shooting 
themselves in the foot.

So the use case here is for a MASA servicing devices that might plausibly have 
the same serial number; where "the statistically unique key identifier ensures 
statistically unique identification of the hardware”. This could obviously 
occur if a manufacture was, shudder, re-using serial numbers. It is more likely 
to occur when the MASA is a service authorized by the manufacturer that also 
handles multiple manufacturers.

For example in: 
https://datatracker.ietf.org/doc/html/draft-friel-anima-brski-cloud-04.html#section-1.2

"While a Cloud Registrar will typically handle all the devices of a
  particular product line from a particular manufacturer there are no
  restrictions on how the Cloud Registrar is horizontally (many sites)
  or vertically (more equipment at one site) scaled.  It is also
  entirely possible that all devices sold by through a particular VAR
  might be preloaded with a configuration that changes the Cloud
  Registrar URL to point to a VAR.

Now to the original question, is this the entire “AuthorityKeyIdentifier” 
SEQUENCE or the KeyIdentifier OCTET STRING?

My intuition is Interpretation #1, just the KeyIdentifier.

- max

i would be a lot more incentivised
to think about an answer. But primarily i'd like tha
type of example to be added to rfc8366bis.

Cheers
  Toerless

P.S.: I think it is [1], primarily because it would be
strange to map a CMS structure just into a single CMS
octet string field instead of mapping it 1:1.

On Fri, Jul 23, 2021 at 03:30:39PM +0000, Esko Dijk wrote:
Hello all,

From the hackathon/interop we hit an interesting difference in spec-reading 
viewpoints that I would like to bring to the list.

*** Question and context
The question is what is included in the ‘idevid-issuer’ field? RFC 8366 states 
that it is binary and:

         The Authority Key Identifier OCTET STRING (as defined in
         https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1) from 
the pledge's IDevID
         certificate.

Sounds like at least the start for an errata against RFC8366.
Not sure if we can start filing an errata when we agree that
the spec is ambiguous *sigh*.

We can look at the 4.2.1.1 RFC 5280 definition:

 AuthorityKeyIdentifier ::= SEQUENCE {
    keyIdentifier             [0] KeyIdentifier           OPTIONAL,
    authorityCertIssuer       [1] GeneralNames            OPTIONAL,
    authorityCertSerialNumber [2] CertificateSerialNumber OPTIONAL  }

 KeyIdentifier ::= OCTET STRING

*** Interpretation #1
take the OCTET STRING part of the Authority Key Identifier, i.e. the " 
Authority Key Identifier OCTET STRING "  which is the last line == 
KeyIdentifier.
So only the ASN.1 bytes encoding 'KeyIdentifier' are included there because 
this is the OCTET STRING part of it as indicated. That is why OCTET STRING is 
written in capitals in RFC 8366.

Note that the keyIdentifier MUST be there for non-self-signed certs per RFC 
5280:
“The keyIdentifier field of the authorityKeyIdentifier extension MUST
 be included in all certificates generated by conforming CAs to
 facilitate certification path construction”

So for this reason one can rely on purely the keyIdentifier part of the AKI; 
and one could think that RFC 8366 was stating this.

*** Interpretation #2
The OCTET STRING is the entire structure AuthorityKeyIdentifier , encoded in 
ASN.1 format (=JSON Octet String encoding in a JSON Voucher, or in CBOR voucher 
a ‘byte string’ CBOR type).
Even though the AuthorityKeyIdentifier  SEQUENCE is not labeled as “OCTET 
STRING” in capitals in RFC 5280, this is what is intended because it can be 
encoded as an octet string in the voucher and is also encoded as octet string 
(coding for ASN.1 SEQUENCE) in ASN.1.

Now I wonder which is right/intended?
And furthermore for constrained use cases would it be ok to take it out as the 
text in RFC 8366 suggests is okay? E.g. if serialNumber is unique across all 
Pledges made by Vendor X.

Best regards
Esko


IoTconsultancy.nl<http://IoTconsultancy.nl>  |  Email/Teams: 
esko.d...@iotconsultancy.nl<mailto:esko.d...@iotconsultancy.nl>    |   +31 6 
2385 8339

_______________________________________________
Anima mailing list
Anima@ietf.org<mailto:Anima@ietf.org>
https://www.ietf.org/mailman/listinfo/anima

--
---
t...@cs.fau.de<mailto:t...@cs.fau.de>

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima


--
---
t...@cs.fau.de<mailto:t...@cs.fau.de>

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to