Re: [Ace] AD review draft-ietf-ace-key-groupcomm-16
Marco Tiloca <marco.tiloca@ri.se> Fri, 01 September 2023 13:53 UTC
Return-Path: <marco.tiloca@ri.se>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF71DC151072 for <ace@ietfa.amsl.com>; Fri, 1 Sep 2023 06:53:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, NICE_REPLY_A=-0.091, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a2JWp-KO0tgB for <ace@ietfa.amsl.com>; Fri, 1 Sep 2023 06:53:44 -0700 (PDT)
Received: from MM0P280CU005.outbound.protection.outlook.com (mail-swedensouthazon11011011.outbound.protection.outlook.com [52.101.76.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C10D0C29E1DC for <ace@ietf.org>; Fri, 1 Sep 2023 06:53:43 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mvB6E2NHmqX8tYB2KdzesY2ggn282k0XuAQrIkQGalMIInQcJVYBCh3Z1npIyLdXB1B2pbLPT0+byvr9t2LU6eydXQCyBonUTiEFBL9z3geLNHHJtOFjsM4EeinjP4fzngtakNxAKLVBuUOzajg9ByT3VtqUS9QUVNcdO8dXV8CadQwZOyANv5g36jyptpTXv7ZgPL12DeSmVyJJamDs9MP3uVUdPvqckkEPWSzqAQUtH5XTY0b3Gh7Zic9N7aN2xzm3GBMOZ3W+cT06kqfNLfZwWZd0n5wO6NQgrAU8aLL2KzkLpMLp0tkehoIu5La/44mPQ8HzCXe5JpcNvrpT6Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Uj/kXglb8Jkl8jOMXxTGGgtcKbrX6E1neQqOg7/t6ZU=; b=MSoNML7kiFJIMLdn4GztDO+85YFgHcz6NZqRoKPwka56/uEDt8e0nDtPFnsnFAAsrE8fWzg9iZf35ohu4ppudR66BssBDXEHJADJ/F2ZER1+d6s9GopYrdeUexPaf6yeNAPoy38fxREefkDwEEHJ5ASnP2bRezSQbw1jYphBnYR6TK/GOR19tkCMPNViOZRPM5X6Ej3KluaJa3CHfNkSZrUOu/HxAOFBwIEsqRc0E06n0JyZQwoNUgYb/+jZs8lJgggr3+583KXN3XBVCb+BjQ0WdcwdlJSfFG1lkzundy/AJ8FONqVCCSKdRg81OZeTX2USZCKASxQ3g5Ev3AUeSA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Uj/kXglb8Jkl8jOMXxTGGgtcKbrX6E1neQqOg7/t6ZU=; b=ddqm4n4Yl4Drs1jgcAn2oyOUpLXj5/Vr293agbPSwx/nZjL2pMjpRcAe2YtM1QExPBsX6NgTtc3xrCSmLDb2USxJfCq4N6XxCQGEtSx3xQ3UpL3tCJo25yel+B4U3VQ8CRt5fyH9lNOirQYqQ7RzIiBFNbwcJuqYaLdF3sLv9PU=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17) by GV3P280MB0100.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:f::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6768.15; Fri, 1 Sep 2023 13:53:40 +0000
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::3e13:8452:19b9:e5e7]) by GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::3e13:8452:19b9:e5e7%4]) with mapi id 15.20.6768.016; Fri, 1 Sep 2023 13:53:40 +0000
Message-ID: <4fcdb62b-8ad2-1732-7efd-b5d7e927be6b@ri.se>
Date: Fri, 01 Sep 2023 15:53:38 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0
Content-Language: en-US
To: Paul Wouters <paul.wouters@aiven.io>, Francesca Palombini <francesca.palombini@ericsson.com>, ace@ietf.org
References: <CAGL5yWZ+JQ3TtS2CMyzcfD8ETgcb4hH5h5qN5WRxbNU16u5y+Q@mail.gmail.com>
From: Marco Tiloca <marco.tiloca@ri.se>
In-Reply-To: <CAGL5yWZ+JQ3TtS2CMyzcfD8ETgcb4hH5h5qN5WRxbNU16u5y+Q@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------tpBkwyWgEzjGnwVRt1IGqh6E"
X-ClientProxiedBy: GVYP280CA0009.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:fa::23) To GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: GVYP280MB0464:EE_|GV3P280MB0100:EE_
X-MS-Office365-Filtering-Correlation-Id: 01667e8d-b856-46ff-31a2-08dbaaf2d8f2
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(136003)(346002)(376002)(396003)(366004)(39850400004)(1800799009)(186009)(451199024)(66476007)(66556008)(41300700001)(86362001)(66946007)(31696002)(2906002)(6512007)(316002)(4001150100001)(235185007)(8936002)(8676002)(2616005)(26005)(44832011)(36756003)(5660300002)(21480400003)(30864003)(83380400001)(38100700002)(45080400002)(966005)(478600001)(166002)(33964004)(31686004)(6506007)(6486002)(53546011)(110136005)(43740500002)(45980500001); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 01667e8d-b856-46ff-31a2-08dbaaf2d8f2
X-MS-Exchange-CrossTenant-AuthSource: GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Sep 2023 13:53:40.3069 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: V2TDlXg0l5fODC28YA6Ec0FI8aWh5WMBcrr7vyVajTAekSMZPfnu+XB91C155UYUA00VtZOaB183lpE2G80eFA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV3P280MB0100
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/yz2QUxTBj88i4oH-EdZLtp3sdjI>
Subject: Re: [Ace] AD review draft-ietf-ace-key-groupcomm-16
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Sep 2023 13:53:48 -0000
Hi Paul, Thank you for your review, we will start working on it. When addressing your comments, we will also process a few more recent points tracked as Github issues [0]. In particular: - Issues 148, 150, and 151 are about editorial fixes/improvements. - Issues 147 is about clarifications, while issue 149 is about fixes in the IANA considerations. - Issue 146 is about relaxing the now-mandatory inclusion of one parameter in a message. This issue 146 was first brought up to the WG at the ACE interim meeting on 2022-09-12, further elaborated on its Github entry, and then confirmed at the ACE interim meeting on 2022-12-19. Best, /Marco [0] https://github.com/ace-wg/ace-key-groupcomm/issues On 2023-09-01 02:26, Paul Wouters wrote: > > > You don't often get email from paul.wouters@aiven.io. Learn why this > is important <https://aka.ms/LearnAboutSenderIdentification> > > > Hi, > > Thanks for this document and my apologies for the long wait time. > > I think this document is mostly ready to go. I have a few questions > and some comments on what I think are changes needed for the IANA > Considerations section. > > > > 1) Race conditions with group rekey > > Section 2: > > When a group rekeys so an new member joining won't be able to read > old messages, how are race conditions prevented? eg one node wants to > send a message, but processes a group rekey, then sends the message it > had. Then the new member join is complete and that message can be read > by the new member. > > Section 6: > > The KDC MUST increment the version number NUM of the current > keying material, before distributing the newly generated keying > material with version number NUM+1 to the group. > > So when the KDC increments the version, and starts distributing the new > keying material, any client requesting "num" will believe it is behind > and request a new copy? Wouldn't this cause duplicate rekeys? > > I see this is partially addressed in the Security Considerations, but > I feel handling these race conditions is part of the actual protocol, > not merely a security consideration? > > 2) IV/counter re-use > > Section 4: > > Symmetric keys are shared between group members. How is it prevented that > same IVs/counters are used by different members of the group? (there is > some talk about Base IV and Partial IV, but that didn't seem to answer > my question > > 3) IANA port registration? > > optionally together with a port number (which defaults to 5683 > if omitted) > > Is this port going to be registered with IANA ? > > 4) PoP evidence with own nonce > > Section 4.5.1: > > The PoP evidence is computed over the nonce specified in the > 'kdc_nonce' parameter and taken as PoP input, by means of the > same method used when preparing the Join Response > > What is the point of the nonce here? Since the nonce comes from the > same party that > uses the nonce, it doesn't "prove" anything, eg it could be a replay > of a previously > observed/triggered nonce. Can you explain what the purpose of the > nonce is? > > Similar in Section 4.9.1.1 where the Client updates its Authentication > credential, > and uses its own nonce to prove possesion of the private key. > > COMMENTS: > > > Section 1: > > If the application requires backward and forward security > > What is "backward security" ? I assume a new member not seeing old > msgs. Maybe explain that? > > > Section 2: > > The full procedure can be separated > > The full procedure being "add member to group" ? > > The overview for "Dispatcher" does not make it clear whether it can read > the content to be dispatched from the client, or not. > > Section 4: > > As most important operation after trasferring the access token to > the KDC, the Client can perform a Join Request-Response exchange > with the KDC, by specifying the group it requests to join > > Should "group" be "group(s)" ? > > to join the specified group > > Should "group" be "group(s)" ? > > > /ace-group/GROUPNAME/creds : this resource is invariant once > established, and contains the authentication credentials of all > the members of the group with name GROUPNAME. > > How is this "invariant" when it changes depending on group members? Am > I misunderstanding the term "invariant" ? > > Section 4.1 > > The KDC can provide a list of group names that exist. Can this > access be restricted to a partial list depending on the client? > > Section 4.3.1 > > Group members MUST stop using the keying material to protect > outgoing messages and retrieve new keying material at the time > indicated in this field. > > Don't you mean "retrieve new keying material before this time" and "start > using the new key material after this time"? Related in 4.8.1.1 it says: > > In either case, if it wants to continue participating in the > group communication, the node has to request the latest keying > material from the KDC. > > and: > > if the Client wants to be sure that it has the latest group keying > material. If that is the case, the Client will receive from the > KDC the same group keying material it already has in memory. > > Seems to suggest key material is not available before expiry time. > That is, > there is always a downtime of a few RTTs when the keying material > expired, as > clients cannot prefetch new keying material ahead of time ? I think it > would > be a lot more robust if clients could prefetch the new key slightly before > the expiry time. Then adjust for group membership changes to ensure a > rekey > is done if the leaving member could (or has) obtained the num+1 keying > material? > > Section 4.8.2: > > Not providing the Client with newly generated, individual keying > material, but rather rekeying the whole group > > Doesn't this open up a denial of service possibility with a malicious > client? > The Security Considerations do warn about this and that requests for > rekeys > can be ignored by the KDC, so this is okay. > > What is "individual keying material" ? Is based on the security > association the client <-> KDC have based on the transport protocol? > > Section 5: > > A Client identified by NODENAME may be removed from a group > identified by GROUPNAME where it is a member, due to the > following reasons. > > I don't think the following list is a complete set of possible > reasons. I would > rephrase this along the lines of "for example, for the following reasons". > > Section 6: > > In case the KDC deletes the group, this also allows the KDC to > send an unsolicited 4.04 (Not Found) response > > What does "this" refer to? Making the resource Observable ? > > Section 6.2.1: > > COUNT, as a 1-byte unsigned integer associated with the used > encryption key. Its value is set to 0 when starting to perform > a new group rekeying instance, and is incremented after each > use of the encryption key. > > This limits the key to only be used for 256 messages. Is that enough for > large groups of thousands of devices? Or are groups to be expected to be > smaller? Or should those groups anticipate this and switch to one-to-many > rekey methods? Wouldn't 2 bytes create a much larger safety margin at > a very little cost? > > > Section 10.2: > > The KDC should renew the group keying material upon a > group membership change. Since the minimum number of group > members is one, the KDC should provide also a Client joining > an empty group with new keying material never used before in > that group. Similarly, the KDC should provide new group keying > material also to a Client that remains the only member in the > group after the leaving of other group members. > > Why are these "should"s not normative, eg SHOULDs ? > > Section 10.2.1 > > This (finally) addresses my race condition questions.... > > In any case, the recipient should actively ask the KDC for the > latest group keying material according to an application-defined > policy, for instance after a given number of unsuccessfully > decrypted incoming messages. > > Seeing that the KDC presumably is hard at work distributing new keying > material, > would nodes sending more requests to the KDC not just make things > worse? Maybe > it should also mention that it MUST first verify the signature of the > node sending > the encrypted payload before deciding it might need to ask for the > updated group > key material to prevent spoofed messages trying to trigger all clients > to send > requests to the KDC to overload it ? (I can also see that this is a > very obvious > thing to do anyway, so perhaps this advise is meaningless) > > Section 11: > > The IANA section mentions the IESG as Change Controller, but it is > prefered to use > IETF instead. (IANA will bug you about this later if not changed) > > Under which collection/grouping should the a "ACE Groupcomm" > registries appear ? > Under https://www.iana.org/assignments/ace/ace.xhtml > <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.iana.org%2Fassignments%2Face%2Face.xhtml&data=05%7C01%7Cmarco.tiloca%40ri.se%7C90f845f51ae441a280f808dbaa821350%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638291247875827690%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Vh6usMKEgwgUsG%2FxjgtT493TD7%2Fh3o9jI6ZKH0%2B2b6k%3D&reserved=0> > or under a sub-registry ace-groupcomm ? > Either way, it should be clarified to IANA. > > It should be noted that, in addition to the expert review, some > portions of the registry require a specification, potentially > a Standards Track RFC, to be supplied as well. > > Possibly rephrase as: > > Values in this registry are covered by different registration > policies as indicated > > Section 11.10 describes this as well, but it does indicate how/when > different policies apply. > (likely based on the Value field?) > > Section 11.11 doesn't list the maximum/minimum values (or limiting > size of the value) > > Section 11.13: > > The IANA Registries established in this document are defined > as expert review. > > It's a bit contentious whether a registry can be Standards Track PLUS > Expert Review. To > avoid issues around this, I would remove this entire sentence. > > > Specifications are needed for the first-come, first-serve range > if they are expected to be used outside of closed environments > in an interoperable way. > > I think for all non-private use entries, this is "expected", so I > would remove the part > starting at "if they are expected ....". > > When specifications are not provided, the description provided > needs to have sufficient information to identify what the point > is being used for. > > That feels a little odd to me. Not sure this makes much sense, since > even FSFC needs > a specification. Private use is well, private use. So which > registration cases would > there be that can leave out a specification? > > NITS: > > ** Downref: Normative reference to an Informational RFC: RFC 7967 > ** Downref: Normative reference to an Informational RFC: RFC 9053 > > These downrefs are okay. > > == Outdated reference: A later version (-19) exists of > draft-ietf-core-oscore-groupcomm-14 > > == Outdated reference: draft-ietf-cose-countersign has been published as > RFC 9338 > > -- Possible downref: Normative reference to a draft: ref. > 'I-D.ietf-cose-countersign' > > == Outdated reference: draft-ietf-ace-mqtt-tls-profile has been > published > as RFC 9431 > > == Outdated reference: A later version (-12) exists of > draft-ietf-core-coap-pubsub-10 > > == Outdated reference: A later version (-09) exists of > draft-ietf-core-groupcomm-bis-07 > > == Outdated reference: A later version (-06) exists of > draft-ietf-cose-cbor-encoded-cert-04 > > == Outdated reference: A later version (-13) exists of > draft-tiloca-core-oscore-discovery-11 > > These need updating (because of my long time to do my AD review. Again > my apologies) > > typoes/grammer: > > for those that aim to -> for those that aim for > > trasferring -> transfering > > consistently with the roles it has in the group -> consistent with the > roles it has in the group. > > the handler reply with a -> the handler replies with a > > Due to different reasons - > [remove entirely] > > ameliorate -> [pick a different more common term for this] > > This sentence does not parse: > > As long as both sides get the new group keying material, updating > group the keying material in the middle of a transfer will not > cause any issue. > > retro-compatibility -> backwards compatibility ? > > > Paul -- Marco Tiloca Ph.D., Senior Researcher Phone: +46 (0)70 60 46 501 RISE Research Institutes of Sweden AB Box 1263 164 29 Kista (Sweden) Division: Digital Systems Department: Computer Science Unit: Cybersecurity https://www.ri.se
- [Ace] AD review draft-ietf-ace-key-groupcomm-16 Paul Wouters
- Re: [Ace] AD review draft-ietf-ace-key-groupcomm-… Marco Tiloca
- Re: [Ace] AD review draft-ietf-ace-key-groupcomm-… Marco Tiloca
- Re: [Ace] AD review draft-ietf-ace-key-groupcomm-… Paul Wouters
- Re: [Ace] AD review draft-ietf-ace-key-groupcomm-… Paul Wouters