Re: [6lo] Roman Danyliw's Discuss on draft-ietf-6lo-nfc-19: (with DISCUSS and COMMENT)

"yhc@etri.re.kr" <yhc@etri.re.kr> Thu, 05 January 2023 06:10 UTC

Return-Path: <yhc@etri.re.kr>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1BA4C1516E2 for <6lo@ietfa.amsl.com>; Wed, 4 Jan 2023 22:10:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.876
X-Spam-Level:
X-Spam-Status: No, score=-6.876 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, NO_DNS_FOR_FROM=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, T_SPF_HELO_TEMPERROR=0.01, T_SPF_TEMPERROR=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dooray.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JvkM3xoBuomw for <6lo@ietfa.amsl.com>; Wed, 4 Jan 2023 22:10:24 -0800 (PST)
Received: from mscreen.etri.re.kr (mscreen.etri.re.kr [129.254.9.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 428B7C151537 for <6lo@ietf.org>; Wed, 4 Jan 2023 22:10:17 -0800 (PST)
Received: from unknown (HELO send002-relay.gov-dooray.com) (211.180.235.153) by 129.254.9.16 with ESMTP; 5 Jan 2023 14:43:35 +0900
X-Original-SENDERIP: 211.180.235.153
X-Original-MAILFROM: yhc@etri.re.kr
X-Original-RCPTTO: draft-ietf-6lo-nfc@ietf.org, 6lo@ietf.org, 6lo-chairs@ietf.org, iesg@ietf.org
Received: from [10.162.225.112] (HELO smtp002-imp.gov-dooray.com) ([10.162.225.112]) by send002-relay.gov-dooray.com with SMTP id 5ce31b9763b66387; Thu, 05 Jan 2023 14:43:35 +0900
DKIM-Signature: a=rsa-sha256; b=AvnJYOXJzW1UrXmDKkMM3yqraposCjFV4x9CvtoW64TmiahmDVxx2ic7zmj9clurT4zVrKwrNx 9qnDyRTeLOGxWKwLkoymLgVVqeQKCOlyuk/qu1U+gztEtg/4mJUcCxOhXpUbqevW6zHaN4+TKl3z aZIDwJ9MfwfWJLJua1C57YyqaUC4e3NGs4qc9RnzI5BIXPzrRWnQQIfqnAkVXdOynV+A8eGdF7M/ LpEuCduynYo3IJGUZmbaTuEf62sPMpsgBRSBPLNQUC47RJrJ6AWiTU4l57B6a+UkUeCmTEIk8Eb1 DQvaBdXkQ5wR9l4XLtsRbPhC8S3kzNyAfYScAa0Q==; c=relaxed/relaxed; s=selector; d=dooray.com; v=1; bh=f9hPn0z0rKFfUdOyJc/p03ugVXfK/BXErCHVFrKgnCo=; h=From:To:Subject:Message-ID;
Received: from [129.254.170.125] (HELO smtpclient.apple) ([129.254.170.125]) by smtp002-imp.gov-dooray.com with SMTP id ad772d9363b66386; Thu, 05 Jan 2023 14:43:34 +0900
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: "yhc@etri.re.kr" <yhc@etri.re.kr>
In-Reply-To: <167243984183.63460.16714312998545850958@ietfa.amsl.com>
Date: Thu, 05 Jan 2023 14:43:06 +0900
Cc: The IESG <iesg@ietf.org>, draft-ietf-6lo-nfc@ietf.org, 6lo-chairs@ietf.org, 6lo@ietf.org, Samita Chakrabarti <samitac.ietf@gmail.com>, Carles Gomez <carlesgo@entel.upc.edu>
Content-Transfer-Encoding: quoted-printable
Message-Id: <A7DA1267-E76A-4D98-90CE-487D70E2ED7C@etri.re.kr>
References: <167243984183.63460.16714312998545850958@ietfa.amsl.com>
To: Roman Danyliw <rdd@cert.org>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/9kQu7z4pjPiDrhO281sC5Ri4XW8>
Subject: Re: [6lo] Roman Danyliw's Discuss on draft-ietf-6lo-nfc-19: (with DISCUSS and COMMENT)
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jan 2023 06:10:31 -0000

Dear Roman Danyliw,

Many thanks for your comments.
Please find my answers inline bellows:

Best regards,
Younghwan Choi

> On Dec 31, 2022, at 7:37 AM, Roman Danyliw via Datatracker <noreply@ietf.org> wrote:
> 
> Roman Danyliw has entered the following ballot position for
> draft-ietf-6lo-nfc-19: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-6lo-nfc/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> (revised)
> 
> Multiple DISCUSes were filed during the March 2019 telechat on the basis of
> concerns that the underlying normative references were not available.  In
> response, the "NFC LLC v1.4" specification was shared in advance of the
> December 2022 telechat. However, it appears additional normative references are
> needed to evaluate the security claims of the protocol (NFC LLC v1.4).
> 
> Section 7.1 of NFC LLC v1.4 says:
> 
> Secure data transfer uses the NFC Authentication Protocol [NAP]. This
> subsection defines three processes: Security Setup, Bonding Process and
> Authentication Process. All three processes are mappings of the corresponding
> processes with the same names defined in [NAP].
> 
> Section 7 of this I-D says:
> 
>   Ad-hoc secure data transfer can be established between two
>   communication parties without any prior knowledge of the
>   communication partner.  Ad-hoc secure data transfer can be vulnerable
>   to Man-In-The-Middle (MITM) attacks.  Authenticated secure data
>   transfer provides protection against Man-In-The-Middle (MITM)
>   attacks.  In the initial bonding step, the two communicating parties
>   store a shared secret along with a Bonding Identifier.  For all
>   subsequent interactions, the communicating parties re-use the shared
>   secret and compute only the unique encryption key for that session.
>   Secure data transfer is based on the cryptographic algorithms defined
>   in the NFC Authentication Protocol (NAP).
> 
> The described security properties appear to depend on the “NFC Authentication
> Protocol” (NAP) which is neither formally referenced with a normative reference

I will put the reference, [NAP-1.0] in the Section of normative reference.

NEW: 

   [NAP-1.0] "NFC Authentication Protocol Candidate Technical Specification", Version 1.0", NFC
              Forum Technical Specification , December 2020.

> (like the NFC LLC v1.4 specification) and does not appear to be available.  It
> is challenging to evaluate the security claims without it.
> 
> Thank you to the document authors for responding to a preliminary version of
> this DISCUSS position which said that it is not possible to share the NAP
> specification. See
> https://mailarchive.ietf.org/arch/msg/6lo/ii9ANOvsJKr08kr7oOCWQ635GtI/.  If the
> specification is not available, it isn’t clear how the IETF consensus review
> process is possible.  The shepherd write-up says “Access to the NFC spec has
> been available for those that have needed it.”
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> ** Section 1.  Editorial.
> As of the writing, NFC is supported
>   by the main smartphone operating systems.
> 
> In what way is this germane?  Will this text age well?

I agree with you, I will remove "As of the writing, NFC is supported by the main smartphone operating systems.” In Section 1.
> 
> ** Section 3.4.  Most of these normative statement appear to be restatements of
> Section 4.5.2 of NFC Forum’s LLCP version 1.4.  The style of this document
> seems to be specifying behavior that is in fact already specified
> authoritatively elsewhere.

I got the similar comments from Éric Vyncke, and I will revise the normative statements as follow:

OLD:

When the MIUX parameter is used, the TLV Type field MUST be 0x02 and
the TLV Length field MUST be 0x02.  The MIUX parameter MUST be
encoded into the least significant 11 bits of the TLV Value field.
The unused bits in the TLV Value field MUST be set to zero by the
sender and ignored by the receiver.

NEW:

When the MIUX parameter is used, the TLV Type field is 0x02 and
the TLV Length field is 0x02.  The MIUX parameter MUST be
encoded into the least significant 11 bits of the TLV Value field.
The unused bits in the TLV Value field is set to zero by the
sender and ignored by the receiver.

> 
> ** Section 4.2.  Per the use of RFC713 to generate the interface identifiers,
> is there any guidance to provide on:
> 
> -- which hash function is to be used for F()

OLD:

The F() algorithm can provide secured and stable IIDs for NFC- enabled devices. 

NEW:

The F() algorithm with SHA-256 can provide secured and stable IIDs for NFC- enabled devices. 

> 
> -- how to generate the Network_ID

OLD:

Network_ID is used to increase the randomness of the generated IID. 

NEW:

Network_ID is used to increase the randomness of the generated IID with NFC link layer address (i.e., SSAP). 


> 
> -- generating the secret_key

NEW: (It will be put at the end of paragraph in Section 4.2)

The secret key SHOULD be of at least 128 bits.  It MUST be initialized to  a pseudo-random number [RFC4086].

In additon, I will put the following reference.

Section 9.

   [RFC4086]  Eastlake, D., Schiller, J., and S. Crocker, "Randomness
              Requirements for Security", BCP 106, RFC 4086, June 2005.



> 
> ** Section 4.2.  Editorial. What is Figure 4 showing that isn’t already stated
> in the previous sentence of “interface identifiers of all unicast addresses for
> NFC-enabled devices are 64 bits long and constructed by using the generation
> algorithm of random (but stable)    identifier (RID)”

I got the similar comments from Éric Vyncke as well. 
I will remove the Figure 4.

> 
> ** Section 7.
>   Ad-hoc secure data transfer can be established between two
>   communication parties without any prior knowledge of the
>   communication partner.  Ad-hoc secure data transfer can be vulnerable
>   to Man-In-The-Middle (MITM) attacks.  Authenticated secure data
>   transfer provides protection against Man-In-The-Middle (MITM)
>   attacks.  In the initial bonding step, the two communicating parties
>   store a shared secret along with a Bonding Identifier.  For all
>   subsequent interactions, the communicating parties re-use the shared
>   secret and compute only the unique encryption key for that session.
>   Secure data transfer is based on the cryptographic algorithms defined
>   in the NFC Authentication Protocol (NAP).
> 
> -- This entire text is cut-and-paste from Section 3.2.5 of NFC Forum LLC. 
> Given that this text is used verbatim shouldn’t it be cited?

Yes, I reused the sentences from LLCP-1.4. I put the reference, but I will change like follow:

Section 7.

OLD:

   LLCP[LLCP-1.4] of NFC provides protection of user data to ensure
   confidentiality of communications.  The confidentiality mechanism
   involves the encryption of user service data with a secret key that
   has been established during link activation.  LLCP of NFC has two
   modes (i.e., ad-hoc mode and authenticated mode for secure data
   transfer.  Ad-hoc secure data transfer can be established between two
   communication parties without any prior knowledge of the
   communication partner.  Ad-hoc secure data transfer can be vulnerable
   to Man-In-The-Middle (MITM) attacks.  Authenticated secure data
   transfer provides protection against Man-In-The-Middle (MITM)
   attacks.  In the initial bonding step, the two communicating parties
   store a shared secret along with a Bonding Identifier.  For all
   subsequent interactions, the communicating parties re-use the shared
   secret and compute only the unique encryption key for that session.
   Secure data transfer is based on the cryptographic algorithms defined
   in the NFC Authentication Protocol (NAP).

NEW: According to [LLCP-1.4],  LLCP of NFC provides protection of user data to ensure
   confidentiality of communications.  The confidentiality mechanism
   involves the encryption of user service data with a secret key that
   has been established during link activation.  LLCP of NFC has two
   modes (i.e., ad-hoc mode and authenticated mode for secure data
   transfer.  Ad-hoc secure data transfer can be established between two
   communication parties without any prior knowledge of the
   communication partner.  Ad-hoc secure data transfer can be vulnerable
   to Man-In-The-Middle (MITM) attacks.  Authenticated secure data
   transfer provides protection against Man-In-The-Middle (MITM)
   attacks.  In the initial bonding step, the two communicating parties
   store a shared secret along with a Bonding Identifier.  For all
   subsequent interactions, the communicating parties re-use the shared
   secret and compute only the unique encryption key for that session.
   Secure data transfer is based on the cryptographic algorithms defined
   in the NFC Authentication Protocol [NAP-1.0].

Section 9.

   [NAP-1.0] "NFC Authentication Protocol Candidate Technical Specification", Version 1.0", NFC
              Forum Technical Specification , December 2020.

> 
> -- If the text is going to be restated, in the spirit of inclusive language,
> please consider alternative language to “MiTM”.

Thanks. I will fix it with “MiTM”.

>