John Gray <john.g...@entrust.com> writes:

>You can replay the CSR and get the certificate request by the original
>party signed by whatever CA you want, but would that do you any good if
>you don't have the private key?

>That's exactly the point, which others have also made in the thread.  Yes, you 
>can do this, but then what?  Or, to be pedantic, "then what that's actually 
>useful in practice to an attacker rather than something that justifies a 
>conference paper?".

>In other words, what real-world problem are we actually solving by requiring 
>PoP, how much existing practice will it break by doing so, and is it worth the 
>cost?

Yes, I see your point Peter.  Other than "the standard says I have to do it", 
what does adding a signed P10 do when it can be easily replayed.   CRMF (4211) 
is used by many protocols, but I'll stop there to not make us go around in 
circles.  I'm working on the CMPv3 bis with David and Hendrik and Mike and we 
aren't planning on reworking the confirmation structure.  CMP is already large 
and complicated enough.

Thanks for your great points.  My world view on the purpose of the POP has been 
shaken!   Some of the newer PKCS#10 attributes like Key Attestation are very 
interesting, to get back to the proof of Origin, but I suppose without careful 
consideration as to how they are verified replay is possible.   An attribute 
that bound itself to a single CA entity that did key attestation could be 
interesting.  Maybe Sean and Carl will add that into their draft.    
https://datatracker.ietf.org/doc/draft-wallace-lamps-key-attestation-ext/      
However is that making things too complicated again... back to 80/20 rule and 
round and round we go...

Have a great weekend everyone!     It is Thanksgiving weekend here in Canada.

John Gray

Any email and files/attachments transmitted with it are confidential and are 
intended solely for the use of the individual or entity to whom they are 
addressed. If this message has been sent to you in error, you must not copy, 
distribute or disclose of the information it contains. Please notify Entrust 
immediately and delete the message from your system.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to