On Sat, Mar 23, 2019 at 3:08 AM Wang Haiguang < wang.haiguang.shield...@huawei.com> wrote:
> Hi, Eric > > Thanks very much for the clarification. > > Regarding the raw public key, could you please elaborate a little bit more > on the actual definition on the raw public key? > I don't understand this question. -Ekr > Regards. > > Haiguang > > ------------------------------ > *From:* Eric Rescorla [e...@rtfm.com] > *Sent:* Saturday, 23 March, 2019 1:13:03 AM > *To:* Wang Haiguang > *Cc:* tls@ietf.org > *Subject:* Re: [TLS] draft-wang-tls-raw-public-key-with-ibc-10 > > > > On Fri, Mar 22, 2019 at 8:28 AM Wang Haiguang < > wang.haiguang.shield...@huawei.com> wrote: > >> Hi, Eric >> >> Thanks very much for your comments. >> >> Please see my reply inline. Our draft is still under development, we will >> improve >> >> it continuously based on the comments from experts in this area. >> >> ------------------------------ >> *From:* Eric Rescorla [e...@rtfm.com] >> *Sent:* Thursday, 21 March, 2019 9:46:07 PM >> *To:* Wang Haiguang >> *Cc:* tls@ietf.org >> *Subject:* Re: [TLS] draft-wang-tls-raw-public-key-with-ibc-10 >> >> I have taken an initial look at this draft [0]. Comments follow. >> >> First the motivation for this technique appears rather >> weak. Primarily, you argue that a PKI is complicated to implement and >> this is simpler. However, there are a number of factors to consider. >> >> [HG] The statement "PKI is more complicated than raw public key" is from >> >> RFC 7250 (1st paragraph in the introduction section), and the raw public >> >> key has been supported in TLS 1.3. We share a similar point of view with >> >> the authors of RFC 7250. >> > > Yes, but IBC is not raw public key. It is effectively a > differently-construted PKI. > > > > Moreover, the advantage of using IBC is beyond succint key management. >> >> As analysed in [1] using of certificates has serious impact on the >> performance >> >> of resource contrained devices (see section 7) including RAM usage , >> bandwith cost, etc. >> > > Yes, but its not clear that IBC will be any better. > > > > Quote from [2] "MIKEY-SAKKE sped up the setup of HTTPS sessions by 7 times >> over standard TLS, >> >> meaning websites loaded over 200ms faster". >> > What algorithms is this comparing? If it's (say) BB versus RSA, that's not > really apples to apples. > > [1] H. Shafagh. Leveraging Public-key-based Authentication for the >> Internet of Things. >> >> Master thesis, >> https://people.inf.ethz.ch/mshafagh/master_thesis_Hossein_Shafagh_PKC_in_the_IoT.pdf >> ", >> >> [2] CESG. Using MIKEY-SAKKE Building secure multimedia services >> >> >> >> First, I believe the design you have selected is too simple to work >> outside of toy scenarios. Specifically, it doesn't seem to account for >> any form of revocation. How do you handle the case where someone's >> keys are compromised? There are a number of ways to handle this inside >> the context of an IBC system (time-based PKG parameters, have the >> identities have a timestamp built into them, etc.), >> but you don't specify these, and they add complexity. >> >> [HG] Regarding the revocation, we did not mention it in the draft, but we >> have >> >> considered it in the design. In practice, an >> >> expiring time can be included in the identity for the IBC system. >> > > In fact, in RFC 6507 page 7-8, authors have mentioned that expiration time >> may be included >> >> in the identity. That’s the reason we have not discussed the revocation >> issue in our draft. If experts in this >> >> group think we should address this issue, we can provide more information >> and details in the next draft. >> >> Besides, in ITU-T SG-17, we have specified a framework (x.ibc-iot) for >> using IBC over telecom >> > > This draft needs to provide a complete description. > > > > >> In a similar vein, another thing that adds complexity is having a >> certificate >> hierarchy rather than a single CA. If you are willing to have a >> single-level >> hierarchy then life is much simpler. With an IBC system, one typically >> either >> foregoes this or uses HIBC. Are these systems HIBC capable? >> >> [HG] At the moment, our target is to support a single-level IBC system. >> In the future, >> >> if there are needs from industry, we can add in the support of HIBC. >> > But again, this is an additional source of complexity. If you only want a > one-level CA system, you can have something much simpler than PKIX. > See, for instance: > https://datatracker.ietf.org/doc/draft-tschofenig-tls-cwt/ > > >> >> In addition, the innherent escrow capability that you describe in Section >> 7 >> is a way in which IBC systems are materially worse than PKI systems in a >> way we don't know how to ameliorate (as opposed to CT). >> >> [HG] For telecom operator networks, symmetric keys are used for >> authentication, the >> >> home operators always know the root key of a user device have in their >> SIM card. >> >> Therefore, the key escrow is not issue in telecom networks. Thus, >> whether key escrow >> >> being a severe issue depends on the application scenario. >> > > I don't think this is a demonstration that this is not severe. It's merely > a demonstration that the current situation is bad. > > > For these reasons, I don't think this WG should adopt this work, though >> the process allows you to have a code point without adoption. >> >> Thank you for your comments. It is better we do not make a decision at >> >> this moment. In fact, IBC sees an increasing acceptance in the industry: >> >> 3GPP has adopted the RFC 6507, RFC 6508 and RFC 6509 for mission critical >> >> communications, and UK government has already started to use it. >> >> Considering this, we would like to suggest that the group do consider our >> draft. >> > > You're of course free to request this, but you have not persuaded me. > > >> >> TECHNICAL COMMENTS >> I don't understand why you are sending the PKG parameters over the wire. >> Either the parameters are already known to the relying party, in which >> case they are unnecessary or they are not in which case they cannot >> be trusted. It seems like a hash of them would be sufficient. And of >> course this doesn't mesh well with multiple generations of PKG parameters >> (see above) unless you have signed parameters, but now you have a mini >> PKI. >> >> [HG] We agree with your comments, and for the single PKG case, we can >> >> use hash values. For multiple PKGs, it is reasonable to assume PKGs to >> trust >> >> each other, just like "root" CAs to trust each other. >> > > I don't understand what this means. First, in a PKI-based system trust > anchors don't > need to trust each other. It's true that in some cases a trust anchor will > sign another > trust anchor, but that's a delegation of trust. Are you assuming something > like that > here? If so, how would it work? > >> >> You need to specify the format of "ServerID". Is it a domain name? >> Something else? >> >> [HG] ServerID is simply the identity of the server, and the format of >> the identity >> >> is application-specific. >> > That is not going to promote interoperability. > > -Ekr > > > >> -Ekr >> >> >> [0] Note that it's much harder to review documents in PDF. Please send >> text in future. >> >> >> On Thu, Mar 21, 2019 at 12:33 AM Wang Haiguang < >> wang.haiguang.shield...@huawei.com> wrote: >> >>> Hello, everyone. >>> >>> Attached is an updated version to our personal draft on >>> draft-wang-tls-raw-public-key-with-ibc-10. >>> >>> The target of the draft is to use identity as raw public key over TLS.. >>> Idenitty-based signature (IBS) algorithms are used for peer/server >>> authentication. >>> >>> The draft has been updated from time to time and this is the 10th >>> version. >>> >>> The main change in this version is we have extended the draft to support >>> three other IBS algorithms, i.e. the ISO-IBS1, ISO-IBS2 and >>> ISO-Chinese-IBS. >>> Data structures for these three algorithms are has been defined. >>> >>> This version has not been submitted to the IETF data trackers yet. We >>> will submit it once it is reopen. >>> >>> It is appreciate if expert in this mailing list can provide comments and >>> help us to improve the draft. >>> >>> Best regards. >>> >>> Haiguang >>> >>> >>> _______________________________________________ >>> TLS mailing list >>> TLS@ietf.org >>> https://www.ietf.org/mailman/listinfo/tls >>> >>
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls