Last Call Review of draft-ietf-lamps-im-keyusage-02
review-ietf-lamps-im-keyusage-02-secdir-lc-rose-2024-10-27-00
Request | Review of | draft-ietf-lamps-im-keyusage |
---|---|---|
Requested revision | No specific revision (document currently at 03) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2024-11-12 | |
Requested | 2024-10-22 | |
Authors | Rohan Mahy | |
I-D last updated | 2024-10-27 | |
Completed reviews |
Artart Last Call review of -02
by Cullen Fluffy Jennings
(diff)
Genart Last Call review of -03 by Behcet Sarikaya Secdir Last Call review of -02 by Kyle Rose (diff) Secdir Last Call review of -03 by Kyle Rose |
|
Assignment | Reviewer | Kyle Rose |
State | Completed | |
Request | Last Call review on draft-ietf-lamps-im-keyusage by Security Area Directorate Assigned | |
Posted at | https://mailarchive.ietf.org/arch/msg/secdir/s_zTQErNzAciFVtV53XQfVfLeYg | |
Reviewed revision | 02 (document currently at 03) | |
Result | Has nits | |
Completed | 2024-10-27 |
review-ietf-lamps-im-keyusage-02-secdir-lc-rose-2024-10-27-00
I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. The summary of this review is Ready with Nits. The spec itself seems straightforward, but some of the text could be clarified. I'm a little confused about this: > Since IM clients could be very numerous, operators are reticent to issue > certificates for these users that might accidentally be used to validate a > TLS connection because it has the KeyPurposeId id-kp-serverAuth or > id-kp-clientAuth. First, what is an "operator" in this context? Second, is the worry that CAs might sign a certificate with the wrong KeyPurposeId? I'm unsure how this specification would prevent that. Or is it that absent this new purpose, there's nothing preventing a certificate from being used in both contexts, creating cross-protocol attack risks (as outlined in section 6 of RFC 9336)? It seems like this works only if every validator enforces a proper value for KeyPurposeId in received certificates, in which case this is just another purpose to be added to the registry so IM clients have a unique KeyPurposeId to check for. Is that right? This text could use some wordsmithing: > This specification defines the KeyPurposeId id-kp-imUri, which MAY be used > for signing messages to prove the identity of an Instant Messaging client. I don't think the KeyPurposeId is used for signing messages. You might want something like "This specification defines the KeyPurposeId id-kp-imUri, which MAY be included in certificates used to prove the identity of an Instant Messaging Client." Though I think to deal with the above concern, the entire certificate ecosystem MUST enforce the presence of an appropriate value. I wonder if the normative language even needs to be here, versus in the protocol specification.