Re: [Ace] Secdir last call review of draft-ietf-ace-wg-coap-eap-09

Deb Cooley <debcooley1@gmail.com> Thu, 25 January 2024 13:27 UTC

Return-Path: <debcooley1@gmail.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E42FC032109; Thu, 25 Jan 2024 05:27:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.857
X-Spam-Level:
X-Spam-Status: No, score=-1.857 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N2WXFNz2T7rP; Thu, 25 Jan 2024 05:27:00 -0800 (PST)
Received: from mail-il1-x135.google.com (mail-il1-x135.google.com [IPv6:2607:f8b0:4864:20::135]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 029F9C032102; Thu, 25 Jan 2024 05:26:59 -0800 (PST)
Received: by mail-il1-x135.google.com with SMTP id e9e14a558f8ab-3606ebda57cso34926965ab.2; Thu, 25 Jan 2024 05:26:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1706189219; x=1706794019; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=70QhsMJoXc46zaEZjQb7yyahqe3sAQwfsUs9GrhvkQo=; b=J8vRZtjNwLTx5zuzVwms0PTkyMQ4N9DSxSRmBlHF6EZsSVU2mY7QUwZjDs61EfNvM+ Kzh6Ps7XlCqAQnevHX7LkSJ9Yd7Npi03Fm/TqagZC6SO06S0GkgkxeUJ9eiVTnidxgbS mHXdm+oEyt99sMdTYalSJ2Njf2aDC41GliCba+zB6ZPrQP4WG2pyXAO7yCmuHD+BK7wU klQ7ucEqsIOk3r43BDGxCto/Re3FbIW2khN+QKidR2YwE44DHBz1nBkut7lsihdxI397 0SuK7oonv6lPCgR6pAN0q0B8U3jWTmF6vdGRaQjuNXpGgP/gnWaimVf0tM8hTEIOw5z3 ADKA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706189219; x=1706794019; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=70QhsMJoXc46zaEZjQb7yyahqe3sAQwfsUs9GrhvkQo=; b=msL5+j97mfQ3lR/etoULoyqYUAZQwiJmC45AZILCTgk4gyzrCaBb+LiBl0zL/jbcUP o0zyb2nIjaGaRJWeWAmbjkIO3y3+9dSwrpDBWzhOOL4BVCrO8HIjzzVszutGzhbj2f4I xngEC1cljEv1bwILg5Eif8dAg8Ng1LmLPAMgZ2+QFrkL1DCh+y+gVKVzgJNfwVjSi16B iTJLaYPa2k5v8ZLuxtyp0AASnsPYy0vWkdCZG1HFC4nyDvyeWyQ5hdcTHnwLNrs70ckg EFWhx323b5wuNNyWWBU/CrNCvquehoxI+ifnAkT+OSd7nFrFxngG9+77yB5tFqCw4kpS kfIg==
X-Gm-Message-State: AOJu0Yy1jhPQ5+X0CjvJQSwzDzii85qyUsgyKsgIUxWaT2DdrMxqwFZK uVlRllYjwh5mD1DTDfbZ39owRKSaIW3kES1N5TSNP7/8GaknAOAVbz/FeAOgtqbRmORrEFMXX0g 4423qfsi+eYXkO0JnFiarVDa/tw==
X-Google-Smtp-Source: AGHT+IHGcxOMmCYcJLPekW3RyGGMGVRMMFhHRNmcDY9i3N5CxyID6u9d+S2udqs28gfYJ9v9A+Iq17OyvD9Ux04lVw0=
X-Received: by 2002:a05:6e02:1c26:b0:35d:5995:1d71 with SMTP id m6-20020a056e021c2600b0035d59951d71mr1174840ilh.54.1706189218838; Thu, 25 Jan 2024 05:26:58 -0800 (PST)
MIME-Version: 1.0
References: <170601163753.46347.3725201997179804291@ietfa.amsl.com> <44875647-3537-430e-8e07-001ed61e7540@uniovi.es>
In-Reply-To: <44875647-3537-430e-8e07-001ed61e7540@uniovi.es>
From: Deb Cooley <debcooley1@gmail.com>
Date: Thu, 25 Jan 2024 08:26:40 -0500
Message-ID: <CAGgd1Oe9uZZs0wx=1zRGve5u+ttN+vui2X_B1Dt5RyUmB+GRjg@mail.gmail.com>
To: garciadan@uniovi.es
Cc: secdir@ietf.org, ace@ietf.org, draft-ietf-ace-wg-coap-eap.all@ietf.org, last-call@ietf.org
Content-Type: multipart/alternative; boundary="0000000000004efe1a060fc5226c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/rTlksnLyxFsYDKED7gJypmUkIJg>
Subject: Re: [Ace] Secdir last call review of draft-ietf-ace-wg-coap-eap-09
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2024 13:27:00 -0000

My 5.1 comment:  I skimmed RFC 4017 and it seems sufficient.  I also looked
to see if EAP methods include it as a reference (and many of them do).  It
is my opinion that w/ the addition of a reference and some clarifying text
will allow you to claim that the MSK is a 'strong cryptographic key', and
therefore ok to use the HKDF KDF Expand directly.

I apologize for not catching this in the early review!

Deb

On Thu, Jan 25, 2024 at 5:46 AM Dan Garcia Carrillo <garciadan@uniovi.es>
wrote:

> Dear Deb,
>
> Thank you for the update on the review.
>
> Please let us comment inline.
> El 23/1/24 a las 13:07, Deb Cooley via Datatracker escribió:
>
> Reviewer: Deb Cooley
> Review result: Has Nits
>
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.
>
> Document: draft-ietf-ace-wg-coap-eap-09
> Reviewer: Deb Cooley
> Review Date: 2024-01-23
>
> The summary of the review is 'Has Nits'.
>
> 0.  All of my early review comments have been addressed.  TY
>
> Great, thank you.
>
> 1.  Section 5.1, last paragraph:  The MSK can be assumed to be 'fresh key
> material', but do all EAP methods yield 'strong cryptographic key' by Section
> 3.3 of RFC 5869?  If some EAP methods do not yield strong keys, then either the
> KDF Extract should be used, or those methods should not be allowed.  (I did not
> look this up, so telling me that you all checked is a fine answer)
>
> This is a very good point.
>
> In this sense, we limit the applicability of EAP methods to the ones
> compliant with the mandatory requirements of RFC4017. We will add  this
> clarification to the text.
>
> Regarding the use of Extract, as it says in RFC5869, if we understand that
> the MSK is cryptographically strong by the requirements of RFC4017, we can
> directly use expand.
>
>
>
> RFC5869
>
> In some applications, the input key material IKM may already be
>
>    present as a cryptographically strong key (for example, the premaster
>
>    secret in TLS RSA cipher suites would be a pseudorandom string,
>
>    except for the first two octets).  In this case, one can skip the
>
>    extract part and use IKM directly to key HMAC in the expand step.
>
>
> That said, we do not see any inconvenient, far from it, that in addition
> to the requisites of RFC4017 for EAP methods to be used, to use extract as
> well for the case of CoAP-EAP to create a specific key.
>
> Do you think this is an adequate approximation, o could we leave it as it
> currently is with these clarifications?
>
> Using extract would change the design a bit, and we would have to define
> the new process, selecting the salt (e.g., a transcript hash of the
> exchange up to that point to generate a PRK). We understand that this would
> delay the process further and maybe we will be doing something unnecessary.
>
> What do you think?
>
>
> 2.  Section 5.2:  It would be useful to have an actual example of the info part
> of the KDF. How is CS constructed - spaces, commas? Are there spaces between CS
> and the string?
>
>
> We will add an example of this.
>
> Thank you.
>
> Best regards.
>