> I'm not sure that the Registrar can get a full chain my doing just TLS with
> the MASA.  The MASA's https port *ought* to have a public WebPKI anchor, not
> a private one.

That's right, a public PKI seems the best option for MASA. Other options are 
listed in RFC 8995 5.4.1, which allows non-PKI / private certificate chains 
also.
Because this may not be a source for getting the chain of the Pledge, I 
mentioned that in cBRSKI the Registrar gets it from the Pledge's DTLS handshake.

For a non-promiscuous Registrar: the topmost CA certificate of what the Pledge 
sends has to be somehow pre-installed as a Trust Anchor at the Registrar.
I.e. that Registrar type would only accept Pledges from vendors it knows about 
beforehand. And it would not resolve the MASA URI further, if it's an unknown 
Pledge.
So, in that case having the MASA provide a "/crts" resource for Registrar would 
not make any difference, because the Registrar wouldn't connect to the MASA 
anyhow.

> I really think we need a new BRSKI-MASA exchange to get the right chain.

Not sure  - for cBRSKI this seems not needed, unless we need to make the 
handshake smaller, which is not proposed right now. 
And for PRM with JWS-voucher, the entire chain will be in the PVR's 
envelope/container so the Registrar will get it.  There's opportunity to make 
the PVR data smaller, but that's also not proposed so far.

>  We could save those bytes and make a standards track document on promiscuous
>  registrar operations, which would include some way to get the subordinate
>  certificates needed.

Or maybe you are proposing to make this size optimization here and write a 
document :)
Not yet sure if that's worth the effort.

Esko

-----Original Message-----
From: Michael Richardson <mcr+i...@sandelman.ca> 
Sent: maandag 20 januari 2025 19:52
To: Esko Dijk <esko.d...@iotconsultancy.nl>
Cc: anima@ietf.org
Subject: [Anima] Re: Discussion on BRSKI/cBRSKI/BRSKI-PRM requirements on 
signing the PVR


Esko Dijk <esko.d...@iotconsultancy.nl> wrote:
    > We've discussed this exact idea in 2022/2023 - it is captured in the
    > issue https://github.com/anima-wg/constrained-voucher/issues/239 .

Thank you for reminding us of the discussion.

I'm not sure that the Registrar can get a full chain my doing just TLS with
the MASA.  The MASA's https port *ought* to have a public WebPKI anchor, not
a private one.

I really think we need a new BRSKI-MASA exchange to get the right chain.

    > This was marked as future update for cBRSKI, because it would require
    > extending the base BRSKI protocol and its resources. 

That's true *only* for the promiscuous Registrar.
We could save those bytes and make a standards track document on promiscuous
registrar operations, which would include some way to get the subordinate
certificates needed.

I'm okay with going forward with this advice now.

    > The extreme reduction case I mention does have a slight
    > security/privacy disadvantage: the Registrar can't evaluate the cert
    > chain as a whole prior to deciding whether to contact the MASA URI, or
    > not.

Yes, I agree that this is a risk.
There might be multiple ways to get that chain though: DNS CERT records, DNS
TLSA records, and maybe other to-be-defined industry trust anchor stores.

    > I.e. the MASA/vendor can potentially harvest more sensitive data about
    > what its customers are trying to do. 
    > There's also less extreme scenarios possible of course e.g. where only
    > the root CA is elided in the handshake.

Up to you.

    >> That would keep the size of the subordinate certificates out of the
    >> BRSKI-EST.

    > Just to note on this: In cBRSKI, this size is only included once in the
    > handshake traffic. Certificates are not present in the signed PVR -
    > only a signature is there.

Good point.

-- 
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




_______________________________________________
Anima mailing list -- anima@ietf.org
To unsubscribe send an email to anima-le...@ietf.org

Reply via email to