OASIS Key Management Interoperability Protocol (KMIP) TC

 View Only
  • 1.  RE: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded

    Posted 02-18-2014 21:39
    Chuck   In Slide 7, last bullet you suggest adding new operations for Suspend/Re-activate and associated date attributes   Instead of adding new operations one could leverage the Revoke operation to support this – We deferred support of the certificateHold and removeFromCRL revocation reasons from current KMIP versions mainly because we didn’t see folks using KMIP to support the suspending/unsuspending of public key certificates.  But SP800-130 support could be used as justification for adding the certificateHold and removeFromCRL options to the revocation reason enumerations.   If we leverage the Revoke operation in this way you could also leverage the existing Compromise Date to handle when the key was Suspended.  This assume folks are not bothered by using an attribute named ‘compromise’ for something which is ‘suspended’. A new attribute to track when the key was reactivated would still need to be added – assuming you don’t want to overload Activation Date.   Judy   From: kmip@lists.oasis-open.org [ mailto:kmip@lists.oasis-open.org ] On Behalf Of Charles White Sent: Thursday, February 13, 2014 7:49 AM To: kmip@lists.oasis-open.org Subject: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded   Submitter's message Good morning/evening KMIP TC! KMIP-SP800-130-152.pdf provides an overview of how NIST guidelines for Cryptographic Key Management Systems impact KMIP. Also this presentation provides options for further alignment of KMIP to NIST standards. Note there is a corresponding spreadsheet - NIST-KMIP CR.xlsx that documents the relationship between the collective set of standards. Thanks! Chuck -- Charles White Document Name : KMIP-SP800-130-152.pdf Description Review of NIST SP800-130 and NIST SP800-152. Discussing options to update KMIP 1.3 to align with NIST guidance. Note that there is a corresponding spreadsheet - NIST KMIP CR.xlsx Download Latest Revision Public Download Link Submitter : Charles White Group : OASIS Key Management Interoperability Protocol (KMIP) TC Folder : Drafts Date submitted : 2014-02-13 04:48:46  


  • 2.  Re: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded

    Posted 02-19-2014 01:10
    My concern is that NIST appears to be looking to update the SP800-57 Part 1 state model to include revoke, suspend and return to activation. The are also calling out these states in the Second Draft of SP800-152. It would be nice to consider at least the addition of the states to KMIP or as other attributes at a minimum so that they may be used by key owners without requiring server vendors getting in the way if NIST or someone else has a need. As for use cases there are potential use cases for these states for not just certificates but symmetric keys as well (e.g. Tape falls off the back of a truck but is found in the library two weeks later - real world use case that I have seen three or four times before). Robert A. (Bob) Lockhart Chief Solutions Architect - Key Management Thales e-Security, Inc. On Feb 18, 2014, at 1:39 PM, "Furlong, Judith" <judith.furlong@emc.com< mailto:judith.furlong@emc.com >> wrote: Chuck In Slide 7, last bullet you suggest adding new operations for Suspend/Re-activate and associated date attributes Instead of adding new operations one could leverage the Revoke operation to support this – We deferred support of the certificateHold and removeFromCRL revocation reasons from current KMIP versions mainly because we didn’t see folks using KMIP to support the suspending/unsuspending of public key certificates. But SP800-130 support could be used as justification for adding the certificateHold and removeFromCRL options to the revocation reason enumerations. If we leverage the Revoke operation in this way you could also leverage the existing Compromise Date to handle when the key was Suspended. This assume folks are not bothered by using an attribute named ‘compromise’ for something which is ‘suspended’. A new attribute to track when the key was reactivated would still need to be added – assuming you don’t want to overload Activation Date. Judy From: kmip@lists.oasis-open.org< mailto:kmip@lists.oasis-open.org > [ mailto:kmip@lists.oasis-open.org ] On Behalf Of Charles White Sent: Thursday, February 13, 2014 7:49 AM To: kmip@lists.oasis-open.org< mailto:kmip@lists.oasis-open.org > Subject: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded Submitter's message Good morning/evening KMIP TC! KMIP-SP800-130-152.pdf provides an overview of how NIST guidelines for Cryptographic Key Management Systems impact KMIP. Also this presentation provides options for further alignment of KMIP to NIST standards. Note there is a corresponding spreadsheet - NIST-KMIP CR.xlsx that documents the relationship between the collective set of standards. Thanks! Chuck -- Charles White Document Name: KMIP-SP800-130-152.pdf< https://www.oasis-open.org/apps/org/workgroup/kmip/document.php?document_id=52201 > ________________________________ Description Review of NIST SP800-130 and NIST SP800-152. Discussing options to update KMIP 1.3 to align with NIST guidance. Note that there is a corresponding spreadsheet - NIST KMIP CR.xlsx Download Latest Revision< https://www.oasis-open.org/apps/org/workgroup/kmip/download.php/52201/latest/KMIP-SP800-130-152.pdf > Public Download Link< https://www.oasis-open.org/committees/document.php?document_id=52201&wg_abbrev=kmip > ________________________________ Submitter: Charles White Group: OASIS Key Management Interoperability Protocol (KMIP) TC Folder: Drafts Date submitted: 2014-02-13 04:48:46


  • 3.  RE: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded

    Posted 02-19-2014 21:38
    Howdy Bob! It really has value when you see KMIP being applied to things that are used to communicate with each other. In some cases you just want to put the key on hold vs straight out revoking it. One use case is keys loaded on a satellite on processes of what you do in light of key lifecycle on a bird. Current approach has every key the satellite will ever have loaded at launch. Industry wants to change- but in the spirit of "make before break" giving them options to retire a key(ie suspend) vs revoke a key will bode well with those folks- this is just one example. From a NIST perspective, I'm thinking that they are looking a broad use of CKMS and they want to support applications, communications, and storage. What is cool about KMIP is that it can do all of that - the last mile is things like Security Attributes and adding an additional state to align the KMIP spec with what NIST is looking for. As a relative newbieconvert to KMIP - it is pretty cool to see it starting from this position. See y'all tomorrow. Thanks! Chuck Charles White Semper Fortis Solutions, LLC This message contains information from Semper Fortis Solutions, LLC which may be confidential and privileged. If you are not an intended recipient, please refrain from any disclosure, copying, distribution or use of this information and note that such actions are prohibited.


  • 4.  RE: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded

    Posted 02-19-2014 21:50
    That actually is a good use case for suspended state and return to activation transition. The use case I mentioned below for the tape falling off the back of the truck and then turning up in the library is not uncommon and it is a good use case for symmetric keys and the revoked state. When the tape is "magically found" two weeks later, the use case for Revoked (or what we call disabled) comes into play such that the key isn't returned to full service but a deactivated state for verification of what is on the tape because you never have duplicate bar codes occur (the tape storage folks will get this one). So basically I would like to see both states and their associated transitions date/times put into the KMIP model. I have a slide that has the eight states on it based on the one that was in the first draft of SP800-130 from NIST if it is needed during the face to face. Bob L. Robert A. (Bob) Lockhart Chief Solutions Architect - Key Management Thales e-Security,Inc


  • 5.  RE: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded

    Posted 02-19-2014 21:50
    Bob, In KMIP we never restricted the Revoke operation to just asymmetric keys and certificates. It can apply to any type of managed cryptographic or opaque object. Currently this is the operation to use if you want to say a symmetric key is compromised. However, if NIST is changing the state diagram and transitions to cover Suspend separate from Revoke then introducing new Suspend/Reactivate operations may make sense. We may also want to consider going back and restricting the Revoke operation to just asymmetric keys and certificates and introducing a Compromise operation to cover the symmetric key cases. But I would see these type of changes to be better suited for KMIIP 2.0 vs. KMIP 1.x. Judy


  • 6.  RE: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded

    Posted 02-19-2014 21:29
    Howdy Judy!   I agree with the idea of looking at certificateHold and removeFromCRL  as possible commands associated with certificates. That being said the idea of suspending and restoring a key (symmetric, asymmetric, or otherwise) has value for KMIP as we see the specification being utilized in other things like communications systems.   I suspect the folks from NIST will want some definitive lines in attributes. After digesting both SPs my first thought is that the folks who wrote those publications would take issue with mixing attributes – yes that means more attributes for better or for worse.   But I could be wrong. This is something to bring up at the Key Management working group next month at NIST – I will definitely do that.   Fundamentally speaking the code that does the revoke could be utilized (read instantiated for “Suspend”) as it is logically similar – as long as you don’t destroy the key after you revoke it.   Thanks!   Chuck   Charles White Semper Fortis Solutions, LLC   This message contains information from Semper Fortis Solutions, LLC which may be confidential and privileged. If you are not an intended recipient, please refrain from any disclosure, copying, distribution or use of this information and note that such actions are prohibited.   From: Furlong, Judith [mailto:judith.furlong@emc.com] Sent: Tuesday, February 18, 2014 4:39 PM To: Chuck White; kmip@lists.oasis-open.org Subject: RE: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded   Chuck   In Slide 7, last bullet you suggest adding new operations for Suspend/Re-activate and associated date attributes   Instead of adding new operations one could leverage the Revoke operation to support this – We deferred support of the certificateHold and removeFromCRL revocation reasons from current KMIP versions mainly because we didn’t see folks using KMIP to support the suspending/unsuspending of public key certificates.  But SP800-130 support could be used as justification for adding the certificateHold and removeFromCRL options to the revocation reason enumerations.   If we leverage the Revoke operation in this way you could also leverage the existing Compromise Date to handle when the key was Suspended.  This assume folks are not bothered by using an attribute named ‘compromise’ for something which is ‘suspended’. A new attribute to track when the key was reactivated would still need to be added – assuming you don’t want to overload Activation Date.   Judy   From: kmip@lists.oasis-open.org [ mailto:kmip@lists.oasis-open.org ] On Behalf Of Charles White Sent: Thursday, February 13, 2014 7:49 AM To: kmip@lists.oasis-open.org Subject: [kmip] Groups - KMIP-SP800-130-152.pdf uploaded   Submitter's message Good morning/evening KMIP TC! KMIP-SP800-130-152.pdf provides an overview of how NIST guidelines for Cryptographic Key Management Systems impact KMIP. Also this presentation provides options for further alignment of KMIP to NIST standards. Note there is a corresponding spreadsheet - NIST-KMIP CR.xlsx that documents the relationship between the collective set of standards. Thanks! Chuck -- Charles White Document Name : KMIP-SP800-130-152.pdf Description Review of NIST SP800-130 and NIST SP800-152. Discussing options to update KMIP 1.3 to align with NIST guidance. Note that there is a corresponding spreadsheet - NIST KMIP CR.xlsx Download Latest Revision Public Download Link Submitter : Charles White Group : OASIS Key Management Interoperability Protocol (KMIP) TC Folder : Drafts Date submitted : 2014-02-13 04:48:46