We've discussed this exact idea in 2022/2023 - it is captured in the issue 
https://github.com/anima-wg/constrained-voucher/issues/239 .
This was marked as future update for cBRSKI, because it would require extending 
the base BRSKI protocol and its resources.

With that resource available, in cBRSKI the Pledge could perform a DTLS 
handshake while sending only 1 certificate to the Registrar: its IDevID EE 
certificate.
(This reduces the size of the entire onboarding exchange quite a bit.)
All the rest in the chain can then be fetched by the Registrar by doing a /crts 
request to MASA, using the MASA URI provided.

The extreme reduction case I mention does have a slight security/privacy 
disadvantage: the Registrar can't evaluate the cert chain as a whole prior to 
deciding whether to contact the MASA URI, or not.
I.e. the MASA/vendor can potentially harvest more sensitive data about what its 
customers are trying to do.
There's also less extreme scenarios possible of course e.g. where only the root 
CA is elided in the handshake.

> That would keep the size of the subordinate certificates out of the BRSKI-EST.
Just to note on this: In cBRSKI, this size is only included once in the 
handshake traffic. Certificates are not present in the signed PVR - only a 
signature is there.

Esko

-----Original Message-----
From: Michael Richardson <mcr+i...@sandelman.ca> 
Sent: woensdag 15 januari 2025 19:35
To: Esko Dijk <esko.d...@iotconsultancy.nl>; anima@ietf.org
Subject: Re: [Anima] Discussion on BRSKI/cBRSKI/BRSKI-PRM requirements on 
signing the PVR


Esko Dijk <esko.d...@iotconsultancy.nl> wrote:
    > We have some discussion (to be continued) whether the Registrar can be
    > expected to be preloaded with all CAs in the chains, or a subset of
    > only the highest sub-CAs, or only the root CA ?  The more the Registrar
    > already knows, the less the Pledge has to send in its PVR, given that
    > the MASA would know all its own CAs for sure.

I wonder if we should mandate that the MASA be willing to answer a /crts
request (on the BRSKI-MASA protocol) which the complete list of all CAs and
subordinate CAs. 
That would keep the size of the subordinate certificates out of the BRSKI-EST.
That's important today for cBRSKI, but later on, in a quantum-safe world, it
might also matter to (fat)BRSKI.

You convinced me on Tuesday that I should ask for adoption of the operational
considerations documents already.  But the above proposal goes beyond
operation *considerations*, right?

-- 
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [

_______________________________________________
Anima mailing list -- anima@ietf.org
To unsubscribe send an email to anima-le...@ietf.org

Reply via email to