[Opendnssec-develop] (long) My personal thoughts about identifiers, attributes and formats.
Roy Arends
roy at nominet.org.uk
Thu Mar 12 13:43:53 UTC 2009
To help the discussion surrounding the identification of objects in a
pkcs11 enabled environment, I have put my thoughts here. Please skip the
blurb below to the "QUESTIONS" section if you do not wish to submerge into
the boring material.
(1) Unique Identifiers
All key-pairs should be uniquely identifiable. They need to be unique, as
Jakob and John tell me, across "time and space". Though I found this
argument too strong before, I have reconsidered this thought. Unique
across time essentially means that key identifiers must be unique over
time. This restriction is important, since a key generator might not have
knowledge of prior generation of keys. Unique across space essentially
means that key identifiers must be unique in the presence of multiple
storage environments. This restriction is important, since a key generator
might not have knowledge of all available key storage.
The scenario that convinced me is that an organisation might migrate
storage of keys from a special purpose HSM to a general purpose HSM. That
is, an organisation might already have an HSM for SSL termination and/or
acceleration, and wants to use it to store DNSSEC related objects. Though
we might highly recommend a separate "security world", slot, keystore or
what not, for DNSSEC, the reality is, that the general HSM has objects
that should not confuse OpenDNSSEC, and OpenDNSSEC related objects should
not confuse existing applications (users).
Also, since key-generation and key-using events are unrelated (apart from
the order ;-) ). I can generate a key on HSM x, for zone y, but when
actually continuously signing records in bulk, for various zones, there
might be more than one HSM present.
UUID's satisfy this requirement, and I'm not unwilling to use it for this
purpose, so lets have a look:
(2) The source of identifier
UUID's are of fixed length (128 bits), and are not extendable. I'm sure
128 bits is more than enough. Then there is the question of how to
determine (or calculate) UUID's, and there is some guidance in rfc 4412 on
this. There are 5 defined ways of 'sourcing' uuids. There can be more but
have not been defined. There is no IANA registry for UUID versions, nor is
there a designated template for defining new versions.
I also like the UUID itself to be completely independent of the content of
the object. This avoids that an object is generated, and then need to be
re-read to determine an UUID. So, as a source for the UUID, I think that a
prng would do. The obvious choice is then version 4. Version 5 doesn't add
anything, as it would only hash the random number, ergo, if the random
number generator is not actually random enough, than hashing it won't make
it more random. This also avoid dependency on a hash algorithm and the
subsequent crypto grandstanding around it.
(3) Which attribute to use.
We still have to determine which pkcs11 object attribute (CKA_bladibla) we
will use to store the identifier.
The CKA_LABEL attribute is common across all objects of the storage class.
This storage class is inherited by the key class. The CKA_ID attribute
belongs to the KEY object class. PKCS11 generalizes between KEY and
CERTIFICATE classes. To clarify, the KEY object class refers to the
CERTIFICATE class when discussing CKA_ID usage. I've quoted the specific
sections below:
On CKA_LABEL usage:
a) 10.4 Storage objects
The CKA_LABEL attribute is intended to assist users in browsing.
On CKA_ID usage:
b) 10.7.2 Overview (10.7 Key objects)
The CKA_ID field is intended to distinguish among multiple keys. In the
case of public and private keys, this field assists in handling multiple
keys held by the same subject; the key identifier for a public key and its
corresponding private key should be the same. The key identifier should
also be the same as for the corresponding certificate, if one exists.
Cryptoki does not enforce these associations, however. (See Section 10.6
for further commentary.)
subsequently (since the previous quote refers to Section 10.6 for further
commentary):
c) 10.6.3 X.509 public key certificate objects
The CKA_ID attribute is intended as a means of distinguishing multiple
public-key/private-key pairs held by the same subject (whether stored in
the same token or not). (Since the keys are distinguished by subject name
as well as identifier, it is possible that keys for different subjects may
have the same CKA_ID value without introducing any ambiguity.)
The term "browsing" (from 'assist users in browsing') is undefined, but it
implies that it can be used by a user (application) to distinguish an
object when more than one is present. I would recommend against using a
combination of both. As for as formatting goes, CKA_LABEL is UTF-8 encoded
unicode, while the CKA_ID is an array of bytes, both do not restrict
usage. It seems that CKA_LABEL is persistent across all storage objects.
When I look at practises in other applications, it seems that CKA_ID is
used to tie key (objects) to certificate (objects). The quoted text seems
to substantiate that thought.
(4) Storage format.
Lastly, we have to determine if we store the source of the UUID, or the
UUID itself. My personal preference is to store the UUID itself. If we
only store the 128 bit value, we require all encompassing software that
relates the object identifier to a value to translate the identifier to
UUID and back. The UUID is then solely a presentation format.
After extensive sieving through the spec, I have the following questions:
QUESTIONS:
(1) Can I use UUID as an identification format.
(2) Can I use UUID version 4 (random numbers) as the source.
(3) Can I use the CKA_LABEL attribute to store the identifier.
(4) Can I store the UUID string without special formatting.
Thanks,
Regards,
Roy Arends
Sr. Researcher
Nominet UK
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opendnssec.org/pipermail/opendnssec-develop/attachments/20090312/4493abb0/attachment.htm>
More information about the Opendnssec-develop
mailing list