Re: [Ace] Secdir last call review of draft-ietf-ace-wg-coap-eap-09
Dan Garcia Carrillo <garciadan@uniovi.es> Thu, 25 January 2024 13:32 UTC
Return-Path: <garciadan@uniovi.es>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B2AFC14F69A; Thu, 25 Jan 2024 05:32:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=unioviedo.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sNtRijJcvVBA; Thu, 25 Jan 2024 05:32:23 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2088.outbound.protection.outlook.com [40.107.20.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58DE5C14F69E; Thu, 25 Jan 2024 05:32:21 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BujtN2FeWi8u8gQnA4M2cKW4Y27/h0kggVNfY8ADzdAdg5fzSm78BPSSk0wdu7xqx6uQeMopyhvc6G3vhjrszs2seRPp74Txqe6vOmgvy0qtQklLXT9ma1Zdn66RKXpqFEEFU+7ZaP7EnU8MHNosUOSOUWt0sVHxdifDvP+v8mDmvLFaWp5oDY/SlHD2+f+aBfntBnqWao4Noqhy3NRDYt/I1J8P/bOHp2ZraaMiQH05nkl7o559alECurmyLGFrAugAWa4lAEVl59IdQCzvNUTvM/DeUuKLHWU9pkx+Ni15QGqYriAa86mF8JxNcokUpKh2b2OkhffOZrh/OZprBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=SeUUwreRUvHGak1tVkqGv5+t2k8NgNAIT9XP6rkt+qQ=; b=MPKrQqCtJt+sksKDLoYvVdlWDq4A6Iqvj3whh04hEgiL7gd+Oh3nSnU8C3SvWcDnBEzINyaUVwf8Wngfi/HG21QNQmqOa9fg7wC/RfaAFILAJKOvewDfFMnR8blp3WQGa+2tCEavWy5G0fW/w9yTzyzm09SZPFKmQXeLehKFHA+Ajmo2JI+7b9Gv94FIt8wbpIIarJ2mD0xDZVilGP75Od4Rc+7J6aJgPEaHT2kjpxignWP1ypSwEYiWbpvmo/O20LrbhzceAD4vV2PBmv1rAA8qcMbRxKJAhnkL1WoTSQnAVaAv3Pwhdu7fBT83CT2Bk7fK8qGNst/VjC71Da7E0Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uniovi.es; dmarc=pass action=none header.from=uniovi.es; dkim=pass header.d=uniovi.es; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=unioviedo.onmicrosoft.com; s=selector2-unioviedo-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SeUUwreRUvHGak1tVkqGv5+t2k8NgNAIT9XP6rkt+qQ=; b=LI7oE03i7XJtAPJLcEXKYmMivT36k3U2iuSVlVR8zb5bxTE8vVVpI/6xzJTl/3x0/HzHBAWrPMYkmvUsMVFYDZYWt50Noj23Muns/eiT9gg1wzz8mXR2G5/Bd+eGaSTKhQ4H7kCfMd9FqVptkQ5A8ZrTjLhgFoKQBYTACbEYscg=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=uniovi.es;
Received: from AS4PR08MB8093.eurprd08.prod.outlook.com (2603:10a6:20b:588::18) by PAXPR08MB7419.eurprd08.prod.outlook.com (2603:10a6:102:2ba::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7228.22; Thu, 25 Jan 2024 13:32:18 +0000
Received: from AS4PR08MB8093.eurprd08.prod.outlook.com ([fe80::6790:fd23:1f81:c189]) by AS4PR08MB8093.eurprd08.prod.outlook.com ([fe80::6790:fd23:1f81:c189%6]) with mapi id 15.20.7228.026; Thu, 25 Jan 2024 13:32:18 +0000
Content-Type: multipart/alternative; boundary="------------93bTHFdFRG7Tntr0beFBYbFV"
Message-ID: <a8a49723-f083-408b-90a1-1876c024b15e@uniovi.es>
Date: Thu, 25 Jan 2024 14:32:16 +0100
User-Agent: Mozilla Thunderbird
Reply-To: garciadan@uniovi.es
Cc: garciadan@uniovi.es, secdir@ietf.org, ace@ietf.org, draft-ietf-ace-wg-coap-eap.all@ietf.org, last-call@ietf.org
Content-Language: en-GB
To: Deb Cooley <debcooley1@gmail.com>
References: <170601163753.46347.3725201997179804291@ietfa.amsl.com> <44875647-3537-430e-8e07-001ed61e7540@uniovi.es> <CAGgd1Oe9uZZs0wx=1zRGve5u+ttN+vui2X_B1Dt5RyUmB+GRjg@mail.gmail.com>
From: Dan Garcia Carrillo <garciadan@uniovi.es>
Organization: Universidad de Oviedo
In-Reply-To: <CAGgd1Oe9uZZs0wx=1zRGve5u+ttN+vui2X_B1Dt5RyUmB+GRjg@mail.gmail.com>
X-ClientProxiedBy: PA7P264CA0177.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:36f::14) To AS4PR08MB8093.eurprd08.prod.outlook.com (2603:10a6:20b:588::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: AS4PR08MB8093:EE_|PAXPR08MB7419:EE_
X-MS-Office365-Filtering-Correlation-Id: ff86bd37-645c-4677-45b5-08dc1daa0d5c
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS4PR08MB8093.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(366004)(376002)(346002)(39860400002)(136003)(396003)(230922051799003)(186009)(1800799012)(451199024)(64100799003)(31686004)(786003)(66946007)(66556008)(66476007)(6916009)(5660300002)(316002)(8936002)(4326008)(3450700001)(2616005)(8676002)(26005)(2906002)(83380400001)(6512007)(36916002)(86362001)(478600001)(41300700001)(33964004)(36756003)(53546011)(6506007)(31696002)(6486002)(38100700002)(45980500001)(43740500002); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: uniovi.es
X-MS-Exchange-CrossTenant-Network-Message-Id: ff86bd37-645c-4677-45b5-08dc1daa0d5c
X-MS-Exchange-CrossTenant-AuthSource: AS4PR08MB8093.eurprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Jan 2024 13:32:18.6315 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 05ea74a3-92c5-4c31-978a-925c3c799cd0
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: tJ2dVAEFhLFCcnnfKmYOhvTzoLFW9IjonUAyu+Sv5CPtvxUBHBXEo/wGV2r78YnxwxhCxf/N9K95zeCxKCcS7w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7419
X-MS-Exchange-CrossPremises-AuthSource: AS4PR08MB8093.eurprd08.prod.outlook.com
X-MS-Exchange-CrossPremises-AuthAs: Internal
X-MS-Exchange-CrossPremises-AuthMechanism: 14
X-MS-Exchange-CrossPremises-Mapi-Admin-Submission:
X-MS-Exchange-CrossPremises-MessageSource: StoreDriver
X-MS-Exchange-CrossPremises-BCC:
X-MS-Exchange-CrossPremises-OriginalClientIPAddress: 156.35.171.42
X-MS-Exchange-CrossPremises-TransportTrafficType: Email
X-MS-Exchange-CrossPremises-Antispam-ScanContext: DIR:Originating; SFV:NSPM; SKIP:0;
X-MS-Exchange-CrossPremises-SCL: 1
X-MS-Exchange-CrossPremises-Processed-By-Journaling: Journal Agent
X-OrganizationHeadersPreserved: PAXPR08MB7419.eurprd08.prod.outlook.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/IGhxNPmlZRodSs0rey1-lgjDtWg>
Subject: Re: [Ace] Secdir last call review of draft-ietf-ace-wg-coap-eap-09
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2024 13:32:28 -0000
Great, thank you. Best regards. El 25/1/24 a las 14:26, Deb Cooley escribió: > My 5.1 comment: I skimmed RFC 4017 and it seems sufficient. I also > looked to see if EAP methods include it as a reference (and many of > them do). It is my opinion that w/ the addition of a reference and > some clarifying text will allow you to claim that the MSK is a 'strong > cryptographic key', and therefore ok to use the HKDF KDF Expand directly. > > I apologize for not catching this in the early review! > > Deb > > On Thu, Jan 25, 2024 at 5:46 AM Dan Garcia Carrillo > <garciadan@uniovi.es> wrote: > > Dear Deb, > > Thank you for the update on the review. > > Please let us comment inline. > > El 23/1/24 a las 13:07, Deb Cooley via Datatracker escribió: >> Reviewer: Deb Cooley >> Review result: Has Nits >> >> I have reviewed this document as part of the security directorate's >> ongoing effort to review all IETF documents being processed by the >> IESG. These comments were written primarily for the benefit of the >> security area directors. Document editors and WG chairs should treat >> these comments just like any other last call comments. >> >> Document: draft-ietf-ace-wg-coap-eap-09 >> Reviewer: Deb Cooley >> Review Date: 2024-01-23 >> >> The summary of the review is 'Has Nits'. >> >> 0. All of my early review comments have been addressed. TY > Great, thank you. >> 1. Section 5.1, last paragraph: The MSK can be assumed to be 'fresh key >> material', but do all EAP methods yield 'strong cryptographic key' by Section >> 3.3 of RFC 5869? If some EAP methods do not yield strong keys, then either the >> KDF Extract should be used, or those methods should not be allowed. (I did not >> look this up, so telling me that you all checked is a fine answer) > > This is a very good point. > > In this sense, we limit the applicability of EAP methods to the > ones compliant with the mandatory requirements of RFC4017. We will > add this clarification to the text. > > Regarding the use of Extract, as it says in RFC5869, if we > understand that the MSK is cryptographically strong by the > requirements of RFC4017, we can directly use expand. > > > > RFC5869 > > In some applications, the input key material IKM may already be > > present as a cryptographically strong key (for example, the premaster > > secret in TLS RSA cipher suites would be a pseudorandom string, > > except for the first two octets).In this case, one can skip the > > extract part and use IKM directly to key HMAC in the expand step. > > > That said, we do not see any inconvenient, far from it, that in > addition to the requisites of RFC4017 for EAP methods to be used, > to use extract as well for the case of CoAP-EAP to create a > specific key. > > Do you think this is an adequate approximation, o could we leave > it as it currently is with these clarifications? > > Using extract would change the design a bit, and we would have to > define the new process, selecting the salt (e.g., a transcript > hash of the exchange up to that point to generate a PRK). We > understand that this would delay the process further and maybe we > will be doing something unnecessary. > > What do you think? > > >> 2. Section 5.2: It would be useful to have an actual example of the info part >> of the KDF. How is CS constructed - spaces, commas? Are there spaces between CS >> and the string? >> > We will add an example of this. > > Thank you. > > Best regards. >
- [Ace] Secdir last call review of draft-ietf-ace-w… Deb Cooley via Datatracker
- Re: [Ace] Secdir last call review of draft-ietf-a… Dan Garcia Carrillo
- Re: [Ace] Secdir last call review of draft-ietf-a… Deb Cooley
- Re: [Ace] Secdir last call review of draft-ietf-a… Dan Garcia Carrillo