[Ace] EDHOC support

"Damm, Benjamin" <Benjamin.Damm@itron.com> Wed, 07 November 2018 22:56 UTC

Return-Path: <Benjamin.Damm@itron.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C133A130DCC for <ace@ietfa.amsl.com>; Wed, 7 Nov 2018 14:56:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=itron.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BnVqNCPsPd8X for <ace@ietfa.amsl.com>; Wed, 7 Nov 2018 14:56:39 -0800 (PST)
Received: from NAM05-BY2-obe.outbound.protection.outlook.com (mail-eopbgr710074.outbound.protection.outlook.com [40.107.71.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 62C231294D7 for <ace@ietf.org>; Wed, 7 Nov 2018 14:56:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=itron.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LuRxyYqU5Sf4rfoYdKdDuYjnTrezzBP81ykKcCLYZps=; b=BxvzRIRdd94DIX4YGdPzcJgEXnZfJ5SX3dGO1KwATYaksoXWPCvf/2efbndCiUzhxhMDeDtx7xu7z8tEkjUSs0ZvGAeU/2HAWhNkjrKce2nGAxsh66VQWO1Cz6j++bzAL9HPem9q63zixmAA0qq3xEd/95pSnWBiguNii4v9E0Q=
Received: from BYAPR04MB3893.namprd04.prod.outlook.com (52.135.214.156) by BYAPR04MB4725.namprd04.prod.outlook.com (52.135.240.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1294.20; Wed, 7 Nov 2018 22:56:35 +0000
Received: from BYAPR04MB3893.namprd04.prod.outlook.com ([fe80::3d0e:7c4:f6d5:ec0f]) by BYAPR04MB3893.namprd04.prod.outlook.com ([fe80::3d0e:7c4:f6d5:ec0f%5]) with mapi id 15.20.1294.034; Wed, 7 Nov 2018 22:56:35 +0000
From: "Damm, Benjamin" <Benjamin.Damm@itron.com>
To: "ace@ietf.org" <ace@ietf.org>
Thread-Topic: EDHOC support
Thread-Index: AQHUdu0iJWG4NhPtGUuVn8++xowxHg==
Date: Wed, 07 Nov 2018 22:56:35 +0000
Message-ID: <20181107225715.GA45413@itron.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-clientproxiedby: BYAPR02CA0058.namprd02.prod.outlook.com (2603:10b6:a03:54::35) To BYAPR04MB3893.namprd04.prod.outlook.com (2603:10b6:a02:ad::28)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Benjamin.Damm@itron.com;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [207.170.195.68]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BYAPR04MB4725; 6:EjW8C9jvHNKF/CzhRZDiV/VCYYgvlFqXbEv7pwiH53X9YmNXlxzLftb7ngaGNsOl6T83oWH/3ySTcIK9irV12BhZvG/1RBNBgJg+P4pFOASS69LByXwJz8euZZsyinoWeSiFgzaX5xKUxLs36prudqzetqXcer84cYv4nqlLdGybHLCl3FXmXCWPUrn5GRimQuHpkHF+SYe+XOHeQYOmCHajsjXZxUVgM+szXH2EFfLrSO7b6CMrn64taGIh6TiUVrf/LSzfkfo3iM016HZndPkKBHw0HJoOlI5ahggBxVMaDp8fBTa+L5ZhoVlBrQGSXM3q+X5zB71gRSyoZGEZXICvgKPb/uKVviEAAeBK+SUo+xsmOqnpZBHIdfkNCi+oAKAdgVyqdRB9Mx5sJM7LqNulynqZWbltoKLVm+EwlHmTyxOPNxEkP/V//r2iktH7aMnkBySHh16pkXCqt6spwQ==; 5:+Pff4ALChCoyqshN1cR09pxxhDLZY2U6EmZJAFO+DbeQyjWBxQ5mjwFyIGGzrbOhDio0G08/t1Mxr5jTSo5Xj1xPmbpotMkq8D+IE1idAsZUVicK+KHdQptJ0E08Zrb/Bc3vlGgLH6o0oyspalzvOK/Y3KXo5R2ptBaBYQDgoJk=; 7:sO6S/2DKeRRN6NcGkzXkEvdZRvZqAW9y7tS2aeE2NHqHwuZl2fiL9L92nz+qCIoc80wiqOEh6YkeQmm2JWYEHAIWSVsEuTm7e2m9v8gFuaXUjhh4/K03H83obJGjSkwhZSkFvb6DcqEQCTE5MBRRfA==
x-ms-office365-filtering-correlation-id: e751e6d4-589b-4caa-b763-08d645044481
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(5600074)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:BYAPR04MB4725;
x-ms-traffictypediagnostic: BYAPR04MB4725:
x-microsoft-antispam-prvs: <BYAPR04MB47255C043FF13F253906805FF8C40@BYAPR04MB4725.namprd04.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(3231382)(944501410)(52105095)(3002001)(10201501046)(6055026)(148016)(149066)(150057)(6041310)(20161123558120)(20161123564045)(20161123560045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699051)(76991095); SRVR:BYAPR04MB4725; BCL:0; PCL:0; RULEID:; SRVR:BYAPR04MB4725;
x-forefront-prvs: 08497C3D99
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(136003)(366004)(396003)(376002)(346002)(189003)(199004)(81166006)(102836004)(2351001)(1730700003)(26005)(68736007)(81156014)(106356001)(105586002)(8936002)(3480700005)(53936002)(316002)(7116003)(72206003)(8676002)(14454004)(52116002)(386003)(6506007)(6436002)(99286004)(86362001)(33656002)(5640700003)(3846002)(1076002)(6116002)(5660300001)(2906002)(36756003)(2900100001)(256004)(97736004)(6916009)(6486002)(186003)(66066001)(221733001)(14444005)(25786009)(2616005)(2501003)(478600001)(305945005)(7736002)(486006)(476003)(6512007)(71200400001)(71190400001); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR04MB4725; H:BYAPR04MB3893.namprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: itron.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: De9Nxf/K6PdLNisqllPytHWsw/I8xGi7VGMGihAdjktiqh9LHld/Bl33/H3POACkNSl5WBZF2WEhyfPDhgOzbPLDvN1D1WL3+fZLJGtWFkRMkCp6rFWziWNP3vOnepZ+yK61KjeuRlwEeB/r0j+NKbnBWgagFhuhSMHjiC5UZ1C2wvszgZ+EuwnP/W2638iYDspmxsel7PQ6rKvIQ3El4qb4wovZCaHq9MvZrZrFISH8KJAjUTzMXgObh/jhuE8Viw7mILfoEW62iEI+sHV2OASa6p8R46sBesRlz6kDOX3kyymN1oD1EFMN+ytl3Fs+EB3cKGmFG5PvAvC6vstqEmRzAN7g5m+7Tv8gzzAQfKs=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <80333F2149B63F4A9B340740E5E77973@namprd04.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: itron.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e751e6d4-589b-4caa-b763-08d645044481
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Nov 2018 22:56:35.5604 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5818bd20-bf25-47b1-b996-d419d7e6e8ba
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR04MB4725
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/9mMfliGWK4r683pNKyOgOtSESiM>
Subject: [Ace] EDHOC support
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Nov 2018 22:56:42 -0000

Hello ace,

We've done an internal review of EDHOC and support its movement towards
RFC.  A few questions:

* It isn't clear (to us) how EDHOC's message 2 achieves proof of
  possession prior to use. NIST SP-800-56A seems fairly clear that proof
  of possession is required before confirmation of a derived key, but
  message 2 seems to force U to derive and use a key before PoP can be
  done.  A pointer to why this is considered safe would be appreciated.

* The requirement to support curve x25519 is an odd one for us because
  our device fleet is using P-256. This is not a request to require
  P-256, but rather, that a required curve is not needed. Instead of a
  MUST I'd like to see this be a SHOULD.

* Given the spectre of PQC we think providing for some flexibility in
  algorithms a must. We use P-256 today but might use P-384 or other
  higher-order curves tomorrow. Transition periods mandate algorithm
  flexibility.

We're looking forward to applying EDHOC/OSCORE to secure end-to-end CoAP
application traffic that is transiting multiple proxies.

Ben