> Shouldn't it be possible to delay the addition to the CT log until the > confirmation (which may be based on decrypting the new cert or any other > challenge) by the EE has arrived at > the CA?
CT have two different modes. One where the final certificate is published to the CT log. This one could be delayed for sure. The other mode however is built on a step in the middle of the issuance process, where CT submission is done before the final certificate is signed, and responses from the CT log (SCTs) are embedded in the final certificate. Hence, no way to delay that. Not without changing how CT works, and I can't imagine a pain-free way forward there. Delaying publishing/logging is technically possible, but it will have architectural impact in currently deployed software. I think it will be complicated to scale, take long time and with high cost, and many failures during the way. I like the idea of questioning POP. For signature keys it's easy, so why not, for other keys do we really need it? We certainly have uses cases where a plain public key is sent to the CA. /Tomas ________________________________ From: von Oheimb, David <david.von.ohe...@siemens.com> Sent: Thursday, October 6, 2022 9:17 PM To: john.g...@entrust.com <john.g...@entrust.com>; Mike.Ounsworth=40entrust....@dmarc.ietf.org <Mike.Ounsworth=40entrust....@dmarc.ietf.org>; Tomas Gustavsson <tomas.gustavs...@keyfactor.com> Cc: morgan...@dataio.com <morgan...@dataio.com>; t...@thomwiggers.nl <t...@thomwiggers.nl>; sp...@ietf.org <sp...@ietf.org>; tls@ietf.org <tls@ietf.org>; u...@ll.mit.edu <u...@ll.mit.edu> Subject: Re: [lamps] [EXTERNAL] Re: [TLS] Q: Creating CSR for encryption-only cert? CAUTION: External Sender - Be cautious when clicking links or opening attachments. Please email info...@keyfactor.com with any questions. Shouldn't it be possible to delay the addition to the CT log until the confirmation (which may be based on decrypting the new cert or any other challenge) by the EE has arrived at the CA? Looks like anyway all known PoP mechanisms for keys that cannot be used for signing appear to require a second protocol step (except for the non-acceptable disclosure of the private key to the CA): * For the encrypted challenge by the CA, this is obvious. * Also for the encrypted cert, as I mentioned before, the CA needs to receive the hash value of the decrypted cert in order to learn the PoP. I agree with Tomas that a 2nd protocol step (i.e., a 2nd upstream message by the EE) is not nice (for several reasons, in particular the need to keep in between a transaction state), but I don't see any way to avoid it. Yet I think that at least a full 2nd round trip (such as the CMP pkiConf ack message by the CA) is not needed (well, unless the general protocol design, as for CMP, demands that all upstream messages are answered). David On Thu, 2022-10-06 at 17:09 +0000, John Gray wrote: This is indeed an interesting discussion. So from my reading and understanding, the Encrypted POP would NOT be ideal when paired with a CT log is because the preCertificate would already be logged before the entity requesting certification was able to do proof possession of the private key. If the end-entity does not have the private key, they can never decrypt the certificate and thus the CT log has an entry for a failed certificate. This could obviously be exploited by bad actors. >From 4211 section 4.2: POP for key encipherment keys is accomplished by one of three different methods. The private key can be provided to the CA/RA, an encrypted challenge from the CA/RA can be decrypted (direct method), or the created certificate can be returned encrypted and used as the challenge response (indirect method). For a use case like an HSM or TPM where private keys can never leave rules out option 1 (plus who wants to send their private key anyway unless it is for server backup or escrow purposes). Option 3 would work but is bad for CT log spamming. Option 2 of using an encrypted challenge seems like the best choice, but obviously causes a 2nd round trip. There doesn’t seem to be an ideal solution. I tried to think about whether using a KEM POP would be any better, but so far have concluded that it would have the same issues. Cheers, John Gray From: Spasm <spasm-boun...@ietf.org> On Behalf Of Mike Ounsworth Sent: Thursday, October 6, 2022 12:05 PM To: Thom Wiggers <t...@thomwiggers.nl>; Tomas Gustavsson <tomas.gustavs...@keyfactor.com> Cc: von Oheimb, David <david.von.ohe...@siemens.com>; u...@ll.mit.edu; openssl-us...@openssl.org; morgan...@dataio.com; sp...@ietf.org; tls@ietf.org Subject: Re: [lamps] [EXTERNAL] Re: [TLS] Q: Creating CSR for encryption-only cert? > Precertificates, the same "base" TBSCertificate as the final cert + Poison > extension, is signed by the CA Right. Same end result though: you can not use the CT precertificate to satisfy an indirect encryption PoP challenge where the final certificate is the challenge text. --- Mike Ounsworth From: Spasm <spasm-boun...@ietf.org<mailto:spasm-boun...@ietf.org>>On Behalf Of Thom Wiggers Sent: October 6, 2022 9:06 AM To: Tomas Gustavsson <tomas.gustavs...@keyfactor.com<mailto:tomas.gustavs...@keyfactor.com>> Cc: von Oheimb, David <david.von.ohe...@siemens.com<mailto:david.von.ohe...@siemens.com>>;u...@ll.mit.edu<mailto:u...@ll.mit.edu>; openssl-us...@openssl.org<mailto:openssl-us...@openssl.org>; morgan...@dataio.com<mailto:morgan...@dataio.com>;sp...@ietf.org<mailto:sp...@ietf.org>; tls@ietf.org<mailto:tls@ietf.org> Subject: [EXTERNAL] Re: [lamps] [TLS] Q: Creating CSR for encryption-only cert? WARNING: This email originated outside of Entrust. DO NOT CLICK links or attachments unless you trust the sender and know the content is safe. ________________________________ Hi Tomas, all, Good discussion today, I'm learning some new things :D Op do 6 okt. 2022 om 13:37 schreef Tomas Gustavsson <tomas.gustavs...@keyfactor.com<mailto:tomas.gustavs...@keyfactor.com>>: For CT logs as in 'CT used for public web sites' there is no possibility to delay submitting. Ah, of course it does. I must've been low on coffee when I forgot that the SCT is obviously computed through submission to a log, rather than over a promise to submit. I suppose that pretty much rules out the "implicit" challenge-is-encrypted-cert method described in CMRF/CMP for web certificates then. Otherwise one might spam CT logs? Cheers and thanks, Thom Any email and files/attachments transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system. On Thu, 2022-10-06 at 11:37 +0000, Tomas Gustavsson wrote: For CT logs as in 'CT used for public web sites' there is no possibility to delay submitting. The only currently used mechanism is submission to CT logs of pre-certificates, before the final certificate is signed. So CT log entries will always be there, and so must the final certificate be issued and responded to for OCSP requests, revoked or not. The only thing you can do in the Public TLS eco system is to revoke if something goes wrong after the pre-certificate submission. Two step protocols for certificate issuance is hard to scale up to large scale in a robust way imho. Not my favorite. Cheers, Tomas
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls