Thanks for that. I look forward to reading the revision. RFC 8520, if only.... [I do get tired of people running up 'oh my, oh my, oh my, our certificates have been exposed!!'. My reply is usally 'so what?'] It is a common mistake, and probably pedantic on my part. But PKI is complicated, and hard to understand. LOL
Deb On Sat, Apr 13, 2024 at 9:42 AM Eliot Lear <l...@lear.ch> wrote: > Hi Deb, > > Taking both your messages into account, I agree that we should retitle > Section 3 and make clear that we are discussing risks. I also agree that > we should clearly reference 802.1AR, and that we state it's limitations. > In brief, 802.1AR specifies the form of the Subject, the crypto to be used, > and which extensions are required. These sorts of profiles for IOT are > pretty common. I also agree that we should take care to separate certs and > keys in our language. I wish you had been available to do the 8520 review > ;-) > > Thanks, > > > > On 13.04.2024 15:26, Deb Cooley wrote: > > Thanks for the site config fix. > > 802.1AR you say? No mention of 802.1 in the draft at all. If the PKI > rules are different in 802, seems like that would be good to at least > mention. At least distinguish whether we are talking about L2 or L3 (or > app layer - wherever HTTPS lives) > > Deb > > On Thu, Apr 4, 2024 at 8:26 AM Eliot Lear <l...@lear.ch> wrote: > >> Hi Deb, >> >> On 04.04.2024 13:45, Deb Cooley via Datatracker wrote: >> > >> > Shepherd writeup: It would be nice to enumerate the manufacturers that >> have >> > implemented this concept. The link to 'https://mudmaker.org' causes >> my browser >> > to throw big flashy warning signs. When I click through them, it tells >> me to >> > 'GO AWAY'. fun... >> >> Hi Deb. There was a config error on a server. It's fixed. Thanks for >> pointing it out. >> >> >> > Section 3.1 upgrade causes vulnerabilities: One would think that this >> > situation should be avoided at all costs. There could be a way for the >> device >> > to signal which version of F/W it is running, allowing the MUD file to >> be >> > tailored. >> >> This may or may not be possible. It depends on how the MUD URL is >> communicated. If it's communicated in a certificate, then the cert >> would have to change, and as 802.1AR makes clear, that's not supposed to >> happen. I hold out hope that SUIT will provide a better path here, but >> these are still early days. >> >> I should point out that in the vast majority of cases, a MUD URL rarely >> has to change because you can have a superset of access that won't be at >> all harmful (a good example would be adding a new new endpoint that is >> used by new versions). The corner case is primarily about services >> being turned off. >> >> > >> > Section 3.2: The same applies for this section as well. False >> positives can >> > be just as dangerous (because they bury the real positives). >> > >> > Section 4: Updating IDevID URLs can't be updated with a F/W update? >> F/W >> > updates are signed by the manufacturer's signing key, correct? >> >> See above. Not permitted by 802.1AR. But there may be a more SUITable >> fix over time. >> >> I'll leave the the rest to Michael. >> >> Eliot >> >> > >> > Section 4.2: Just how hard would it be to specify the CA certificate >> paired >> > with a subject name (subject alt name, or CN)? Seems like this is more >> secure >> > than your proposed methods. Oddly enough, Section 5.1 proposes this. >> > >> > Section 5, last para: Instead of subject names, SKI should be used >> [RFC5280, >> > section 4.2.1.2]. This can be easily checked in a certificate validate >> that is >> > presented. >> > >> > Section 5.2: Can't this be used all the time? >> > >> > Section 5.3.3: Classically to change a 'root' one signs the new with >> the old >> > and signs the old with the new. If it is done this way, I suspect one >> could >> > change whatever names, CAs one needs to change. >> > >> > Section 7: One might argue that the use of server authenticated TLS >> might >> > mitigate a bunch of concerns. >> > >> > Section 9. This is confusing. Please seperate the before issues and >> the after >> > issues into seperate sections (at least). There are many potential >> > vulnerabilities listed earlier in the draft. Please consolidate those >> here >> > (possibly with draft section links to where the mitigation is >> suggested). >> > >> > >> > ---------------------------------------------------------------------- >> > COMMENT: >> > ---------------------------------------------------------------------- >> > >> > >> > Nits: >> > Section 1, para 6: change 'check the signatures, rejecting files whose >> > signatures do not match' to '... whose signatures do not validate'. >> Using >> > language like 'match' leads to bad behavior, when the entity should be >> taking a >> > positive action to validate the signature. >> > >> > Section 9, last sentence: jargon? I'm not sure I know what this >> means, and >> > English is my (only) language. >> > >> > >> > >> > _______________________________________________ >> > OPSAWG mailing list >> > OPSAWG@ietf.org >> > https://www.ietf.org/mailman/listinfo/opsawg >> > >> >
_______________________________________________ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg