[{"author": "Daniel Gillmor", "text": "<p>it's up goer 5 in the background! <a href=\"https://xkcd.com/1133/\">https://xkcd.com/1133/</a></p>", "time": "2024-03-21T05:39:04Z"}, {"author": "Mike Ounsworth", "text": "<p>By the way, Randall has a whole book like that. If you have a semi-nerdy 5 - 10 year old in your life, it's a great gift!<br>\n<a href=\"https://xkcd.com/thing-explainer/\">https://xkcd.com/thing-explainer/</a></p>", "time": "2024-03-21T05:45:07Z"}, {"author": "Daniel Gillmor", "text": "<p>that is one of my favorite books, and i'm more than 5-10 years old</p>", "time": "2024-03-21T05:46:20Z"}, {"author": "Tim Hollebeek", "text": "<p>This is extraordinarily wonky, but 3647 is informational ... if the definition of 'renewal' is used in a requirement in a normative way, that may or may not be a problem.  I'm not sure.</p>", "time": "2024-03-21T05:46:37Z"}, {"author": "Daniel Gillmor", "text": "<p>downrefs aren't showstoppers.  if it's reasonable to have the downref normatively referenced, that's still ok</p>", "time": "2024-03-21T05:47:22Z"}, {"author": "Daniel Gillmor", "text": "<p>as an example, RFC 8032 is informational, but it is normatively referenced in non-informational drafts that use EdDSA.</p>", "time": "2024-03-21T05:48:12Z"}, {"author": "Deb Cooley", "text": "<p>I'm  going to bet that RFC 5280 will be the normative one</p>", "time": "2024-03-21T05:49:32Z"}, {"author": "Deb Cooley", "text": "<p>(for AKID)</p>", "time": "2024-03-21T05:49:56Z"}, {"author": "Mike Ounsworth", "text": "<p>That sounds like an Informational reference to me (based on Aron's comments at mic)</p>", "time": "2024-03-21T05:51:58Z"}, {"author": "Mike Ounsworth", "text": "<p>Here is the on-list discussion comparing Brandon's ACME attest draft and draft-ietf-lamps-csr-attestation:<br>\n<a href=\"https://mailarchive.ietf.org/arch/msg/acme/5v422PrkjO340FyOaqiIyEcihdo/\">https://mailarchive.ietf.org/arch/msg/acme/5v422PrkjO340FyOaqiIyEcihdo/</a></p>", "time": "2024-03-21T06:01:36Z"}, {"author": "Aaron Gable", "text": "<p>(For what it is worth, Q Misell's pronouns are it/she, not he)</p>", "time": "2024-03-21T06:07:04Z"}, {"author": "Deb Cooley", "text": "<p>apologies.  I've used they in the past.  not an excuse, but it is late/early.</p>", "time": "2024-03-21T06:07:47Z"}, {"author": "Brandon Weeks", "text": "<p><span class=\"user-mention\" data-user-id=\"500\">@Mike Ounsworth</span> I wonder if it makes sense to add a section that puts the draft in the context of 'existed before RATS'?</p>", "time": "2024-03-21T06:11:37Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"225\">Brandon Weeks</span> <a href=\"#narrow/stream/57-acme/topic/ietf-119/near/115882\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"500\">Mike Ounsworth</span> I wonder if it makes sense to add a section that puts the draft in the context of 'existed before RATS'?</p>\n</blockquote>\n<p>Makes sense to me. I would be happy to work with you offline on some text.</p>", "time": "2024-03-21T06:12:16Z"}, {"author": "Mike Ounsworth", "text": "<p>draft-sweet-iot-acme seems to be proposing to run a self-signed CA within the local home / enterprise network for issuing .local certs, and somehow the browsers will trust that CA?<br>\nDoesn't that have all the same problems as to why browsers don't want publicly-trusted .local certs in the first place?</p>", "time": "2024-03-21T06:13:55Z"}, {"author": "Daniel Gillmor", "text": "<p>how does the client decide when to <em>not</em> trust that CA in the future?</p>", "time": "2024-03-21T06:15:23Z"}, {"author": "Mike Ounsworth", "text": "<p>.local is subnet-specific. So you would want to trust a .local CA per subnet or per wifi.<br>\n(it sounds like, from speaker comments, that the draft discusses distrust-on-network-disconnect)</p>", "time": "2024-03-21T06:16:05Z"}, {"author": "Tim Hollebeek", "text": "<p>I'd recommend against asking the user, that solution has never worked</p>", "time": "2024-03-21T06:17:29Z"}, {"author": "Daniel Gillmor", "text": "<p>automated, dynamic updates of the root store gives me the heebie-jeebies</p>", "time": "2024-03-21T06:18:09Z"}, {"author": "Tadahiko Ito", "text": "<p>do we really need .local? are't there any alternative ? use of site-specific domain sound better for me.</p>", "time": "2024-03-21T06:19:48Z"}, {"author": "Tim Hollebeek", "text": "<p>+1</p>", "time": "2024-03-21T06:19:55Z"}, {"author": "Yoav Nir", "text": "<p><span class=\"user-mention silent\" data-user-id=\"637\">Daniel Gillmor</span> <a href=\"#narrow/stream/57-acme/topic/ietf-119/near/115914\">said</a>:</p>\n<blockquote>\n<p>automated, dynamic updates of the root store gives me the heebie-jeebies</p>\n</blockquote>\n<p>Yeah, like the new printer joining the neighbor's network instead of my home network.  Or an attacker's device allowed to join, because everyone can join, because we need that for printers.</p>", "time": "2024-03-21T06:20:15Z"}, {"author": "Tim Hollebeek", "text": "<p>on automated, dynamic root store updates ... most browsers do it these days.  It's poorly managed dynamic updates that scare me ...</p>", "time": "2024-03-21T06:20:25Z"}, {"author": "Daniel Gillmor", "text": "<p>@tim, that's fair, i just presume most major browsers have some pretty serious guardrails there.</p>", "time": "2024-03-21T06:21:44Z"}, {"author": "Mike Ounsworth", "text": "<p>For example, you could connect to your local printer UI at</p>\n<div class=\"codehilite\"><pre><span></span><code>printer1a2b3c4d.printermanufacturer.com\n</code></pre></div>\n<p>where that is a DNS allias (inside the network) for 192.168.1.101, but on the public internet, the printer manufacturer could do ACME responses for that, and so get a public-trusted cert. I know that <span class=\"user-mention\" data-user-id=\"870\">@Tirumaleswar Reddy.K</span> is working on something very very similar.</p>", "time": "2024-03-21T06:22:05Z"}, {"author": "Andrew Fregly", "text": "<p>Have you looked at the work the DANCE WG produced.</p>", "time": "2024-03-21T06:22:52Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"1065\">Tim Hollebeek</span> <a href=\"#narrow/stream/57-acme/topic/ietf-119/near/115927\">said</a>:</p>\n<blockquote>\n<p>on automated, dynamic root store updates ... most browsers do it these days.  It's poorly managed dynamic updates that scare me ...</p>\n</blockquote>\n<p>There's a difference between \"Google pushed new roots\" and \"Ask the local router for a set of roots\".</p>", "time": "2024-03-21T06:23:16Z"}, {"author": "Tim Hollebeek", "text": "<p>well, except the local router being authoritative for .local, might actually make sense.  I'm not sure.</p>", "time": "2024-03-21T06:23:52Z"}, {"author": "Tim Hollebeek", "text": "<p>If it <em>is</em> authoritative, <em>then</em> having it manage a list of trust roots ... makes sense?</p>", "time": "2024-03-21T06:24:25Z"}, {"author": "Tim Hollebeek", "text": "<p>but is .local really intended to be managed in that way?  I'm not sure.</p>", "time": "2024-03-21T06:24:39Z"}, {"author": "Mike Ounsworth", "text": "<p>I don't disagree with Tim, but having the browser dynamically add new subnet-specific roots is <span aria-label=\"octopus\" class=\"emoji emoji-1f419\" role=\"img\" title=\"octopus\">:octopus:</span></p>", "time": "2024-03-21T06:26:12Z"}, {"author": "Tim Hollebeek", "text": "<p>yep, not arguing that.  The can of worms is fully open.</p>", "time": "2024-03-21T06:26:31Z"}, {"author": "Daniel Gillmor", "text": "<p>+1 to Aaron -- this draft proposes to touch a lot of things (browsers, root stores, network managers, etc), but it's not touching ACME itself all that much</p>", "time": "2024-03-21T06:26:41Z"}, {"author": "David Benjamin", "text": "<p>The subnet-specific parts is particularly goofy because the point of certificates in the web is not just to show a little icon in the corner. It's the thing that authenticates origins, the security principal used across the web. E.g. JS state is partitioned by that, etc. I don't think something like this could work without, at minimum, extending how origins work, which is a very big web-platform-level change.</p>", "time": "2024-03-21T06:28:24Z"}, {"author": "Mike Ounsworth", "text": "<p>This draft is dealing with the same problem as Tiru's presentation from earlier this week:<br>\n<a href=\"https://datatracker.ietf.org/meeting/119/materials/slides-119-add-why-host-encrypted-dns-forwarders-on-managed-cpes-00\">https://datatracker.ietf.org/meeting/119/materials/slides-119-add-why-host-encrypted-dns-forwarders-on-managed-cpes-00</a></p>", "time": "2024-03-21T06:29:11Z"}, {"author": "David Benjamin", "text": "<p>E.g. imagine if I do stuff with printer.local on network A. Then I visit my friend and visit printer.local on network B. That is a <em>different</em> printer.local and cannot have the same bucket of state.</p>", "time": "2024-03-21T06:29:16Z"}, {"author": "Tim Hollebeek", "text": "<p>yeah, Dave's comment is the same.  We need to figure out what to authenticate and how, instead of figuring out how to avoid authenticating.</p>", "time": "2024-03-21T06:29:45Z"}, {"author": "Daniel Gillmor", "text": "<p>@David, you don't want to send the second half of your print job to the new printer?  :P</p>", "time": "2024-03-21T06:30:09Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"829\">David Benjamin</span> <a href=\"#narrow/stream/57-acme/topic/ietf-119/near/115968\">said</a>:</p>\n<blockquote>\n<p>The subnet-specific parts is particularly goofy because the point of certificates in the web is not just to show a little icon in the corner. It's the thing that authenticates origins, the security principal used across the web. E.g. JS state is partitioned by that, etc. I don't think something like this could work without, at minimum, extending how origins work, which is a very big web-platform-level change.</p>\n</blockquote>\n<p>I guess the core question here is: would you trust your local gateway / DHCP server to act as a CA for <code>.local</code> ?<br>\nIt gives me the <span aria-label=\"octopus\" class=\"emoji emoji-1f419\" role=\"img\" title=\"octopus\">:octopus:</span> , but as Tim says, it might not be wrong.</p>", "time": "2024-03-21T06:31:07Z"}, {"author": "David Benjamin", "text": "<p>And the answer to that is no, because there is only one <code>.local</code> right now. Unless you can extend the notion of origin so that the different local gateways are different <code>.local</code>s.</p>", "time": "2024-03-21T06:32:05Z"}, {"author": "Daniel Gillmor", "text": "<p>@Mike, David is saying it <em>is</em> wrong, unless you expect that state to be shared across same-named devices on other networks, at layers like the browser's local storage</p>", "time": "2024-03-21T06:32:11Z"}, {"author": "A.J. Stein", "text": "<p><span class=\"user-mention silent\" data-user-id=\"637\">Daniel Gillmor</span> <a href=\"#narrow/stream/57-acme/topic/ietf-119/near/115979\">said</a>:</p>\n<blockquote>\n<p>@David, you don't want to send the second half of your print job to the new printer?  :P</p>\n</blockquote>\n<p>You joke and I am not saying it was a feature, but in a former life I administered print queue software for private universities with payment cards and for the college student doing the ill-advised (and often unaurhorized) printing of a whole medical textbook (more than once), that would have been a desirable feature.</p>\n<p>This software was awful and I won't impune it's good name, but you may be onto something, dkg.</p>\n<p>/endtangent</p>", "time": "2024-03-21T06:32:42Z"}, {"author": "Tim Hollebeek", "text": "<p>yeah, if the security context of .local changes when your network swaps, that breaks a whole host of security assumptions</p>", "time": "2024-03-21T06:32:50Z"}, {"author": "Mike Ounsworth", "text": "<p>I see.<br>\nNow an <code>origin</code> needs to be defined as the tuple <code>(scheme, host, port, subnet)</code>.</p>", "time": "2024-03-21T06:33:03Z"}, {"author": "Tim Hollebeek", "text": "<p>imagine refreshing your browser or a background webservice retry that sends the same request in a different security context because .local changed in the background</p>", "time": "2024-03-21T06:33:52Z"}, {"author": "David Benjamin", "text": "<p>Oh whoops yeah, I should have probably added myself to the queue. Thanks, Aaron! :-D</p>", "time": "2024-03-21T06:36:25Z"}, {"author": "Tadahiko Ito", "text": "<p>If .local was used for other purpose, and if this .local ca were compromise, then,  that other service would influence by that attack? I believe it is not good.</p>", "time": "2024-03-21T06:36:55Z"}, {"author": "Aaron Gable", "text": "<p>Thanks for pointing it out, @davidben! Sometimes I miss working on a browser, sometimes I don't :D</p>", "time": "2024-03-21T06:37:28Z"}, {"author": "Mike Ounsworth", "text": "<p>Sorry for the queue-jump.<br>\nI think there is a very real problem here that local devices with UIs don't play well with browser cert errors. So while I don't think this draft is the answer, I do think there is a very real problem that the IETF should work on.</p>", "time": "2024-03-21T06:39:04Z"}, {"author": "Tim Hollebeek", "text": "<p>in addition to DANCE, there was also HOMENET which I only payed a teeny bit of attention to, but IIRC was the same problem</p>", "time": "2024-03-21T06:39:16Z"}, {"author": "Deb Cooley", "text": "<p>@Mike what working group was Tiru working on</p>", "time": "2024-03-21T06:40:20Z"}, {"author": "Daniel Gillmor", "text": "<p>if we're just going to say \".local has different security properties\" and convince everyone who consumes domain names to treat them differently, then it seems like there might be some simpler paths to get there.  but it's still a huge lift</p>", "time": "2024-03-21T06:40:36Z"}, {"author": "Daniel Gillmor", "text": "<p>@Deb i think Tiru was presenting in ADD</p>", "time": "2024-03-21T06:41:10Z"}, {"author": "Deb Cooley", "text": "<p>TY</p>", "time": "2024-03-21T06:41:20Z"}, {"author": "Daniel Gillmor", "text": "<p><a href=\"https://datatracker.ietf.org/meeting/119/materials/slides-119-add-why-host-encrypted-dns-forwarders-on-managed-cpes\">https://datatracker.ietf.org/meeting/119/materials/slides-119-add-why-host-encrypted-dns-forwarders-on-managed-cpes</a></p>", "time": "2024-03-21T06:42:06Z"}, {"author": "Aaron Gable", "text": "<p>My gut feeling is that a) the second draft is talking about a problem that needs to be solved, but also b) I believe it can be solved entirely with mechanisms that already exist within ACME and may not need a full document (or maybe just an informational document describing how best to use those existing mechanisms)</p>", "time": "2024-03-21T06:59:10Z"}, {"author": "David Benjamin", "text": "<p>Was ACME designed assuming that the same ACME account key would be reused across multiple accounts? I'm not familiar enough with the details to know if there is a problem, but it's pretty easy for protocols to not survive such things. E.g. if a signature for account under CA1 can be used to spoof the account under CA2.</p>", "time": "2024-03-21T07:00:26Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"1226\">Aaron Gable</span> <a href=\"#narrow/stream/57-acme/topic/ietf-119/near/116041\">said</a>:</p>\n<blockquote>\n<p>My gut feeling is that a) the second draft is talking about a problem that needs to be solved, but also b) I believe it can be solved entirely with mechanisms that already exist within ACME and may not need a full document (or maybe just an informational document describing how best to use those existing mechanisms)</p>\n</blockquote>\n<p>Thanks Aaron!<br>\nWould you be willing to have a chat with me offline after 119?</p>", "time": "2024-03-21T07:00:38Z"}, {"author": "David Benjamin", "text": "<p>I.e. unless all the signatures include sufficient context, it's probably not safe to do as the presentation seems to suggest.</p>", "time": "2024-03-21T07:00:59Z"}]