Re: [Ace] AD review draft-ietf-ace-key-groupcomm-16

Marco Tiloca <marco.tiloca@ri.se> Fri, 01 September 2023 13:53 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF71DC151072 for <ace@ietfa.amsl.com>; Fri, 1 Sep 2023 06:53:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, NICE_REPLY_A=-0.091, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a2JWp-KO0tgB for <ace@ietfa.amsl.com>; Fri, 1 Sep 2023 06:53:44 -0700 (PDT)
Received: from MM0P280CU005.outbound.protection.outlook.com (mail-swedensouthazon11011011.outbound.protection.outlook.com [52.101.76.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C10D0C29E1DC for <ace@ietf.org>; Fri, 1 Sep 2023 06:53:43 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mvB6E2NHmqX8tYB2KdzesY2ggn282k0XuAQrIkQGalMIInQcJVYBCh3Z1npIyLdXB1B2pbLPT0+byvr9t2LU6eydXQCyBonUTiEFBL9z3geLNHHJtOFjsM4EeinjP4fzngtakNxAKLVBuUOzajg9ByT3VtqUS9QUVNcdO8dXV8CadQwZOyANv5g36jyptpTXv7ZgPL12DeSmVyJJamDs9MP3uVUdPvqckkEPWSzqAQUtH5XTY0b3Gh7Zic9N7aN2xzm3GBMOZ3W+cT06kqfNLfZwWZd0n5wO6NQgrAU8aLL2KzkLpMLp0tkehoIu5La/44mPQ8HzCXe5JpcNvrpT6Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Uj/kXglb8Jkl8jOMXxTGGgtcKbrX6E1neQqOg7/t6ZU=; b=MSoNML7kiFJIMLdn4GztDO+85YFgHcz6NZqRoKPwka56/uEDt8e0nDtPFnsnFAAsrE8fWzg9iZf35ohu4ppudR66BssBDXEHJADJ/F2ZER1+d6s9GopYrdeUexPaf6yeNAPoy38fxREefkDwEEHJ5ASnP2bRezSQbw1jYphBnYR6TK/GOR19tkCMPNViOZRPM5X6Ej3KluaJa3CHfNkSZrUOu/HxAOFBwIEsqRc0E06n0JyZQwoNUgYb/+jZs8lJgggr3+583KXN3XBVCb+BjQ0WdcwdlJSfFG1lkzundy/AJ8FONqVCCSKdRg81OZeTX2USZCKASxQ3g5Ev3AUeSA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Uj/kXglb8Jkl8jOMXxTGGgtcKbrX6E1neQqOg7/t6ZU=; b=ddqm4n4Yl4Drs1jgcAn2oyOUpLXj5/Vr293agbPSwx/nZjL2pMjpRcAe2YtM1QExPBsX6NgTtc3xrCSmLDb2USxJfCq4N6XxCQGEtSx3xQ3UpL3tCJo25yel+B4U3VQ8CRt5fyH9lNOirQYqQ7RzIiBFNbwcJuqYaLdF3sLv9PU=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17) by GV3P280MB0100.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:f::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6768.15; Fri, 1 Sep 2023 13:53:40 +0000
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::3e13:8452:19b9:e5e7]) by GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::3e13:8452:19b9:e5e7%4]) with mapi id 15.20.6768.016; Fri, 1 Sep 2023 13:53:40 +0000
Message-ID: <4fcdb62b-8ad2-1732-7efd-b5d7e927be6b@ri.se>
Date: Fri, 01 Sep 2023 15:53:38 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0
Content-Language: en-US
To: Paul Wouters <paul.wouters@aiven.io>, Francesca Palombini <francesca.palombini@ericsson.com>, ace@ietf.org
References: <CAGL5yWZ+JQ3TtS2CMyzcfD8ETgcb4hH5h5qN5WRxbNU16u5y+Q@mail.gmail.com>
From: Marco Tiloca <marco.tiloca@ri.se>
In-Reply-To: <CAGL5yWZ+JQ3TtS2CMyzcfD8ETgcb4hH5h5qN5WRxbNU16u5y+Q@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------tpBkwyWgEzjGnwVRt1IGqh6E"
X-ClientProxiedBy: GVYP280CA0009.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:fa::23) To GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: GVYP280MB0464:EE_|GV3P280MB0100:EE_
X-MS-Office365-Filtering-Correlation-Id: 01667e8d-b856-46ff-31a2-08dbaaf2d8f2
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(136003)(346002)(376002)(396003)(366004)(39850400004)(1800799009)(186009)(451199024)(66476007)(66556008)(41300700001)(86362001)(66946007)(31696002)(2906002)(6512007)(316002)(4001150100001)(235185007)(8936002)(8676002)(2616005)(26005)(44832011)(36756003)(5660300002)(21480400003)(30864003)(83380400001)(38100700002)(45080400002)(966005)(478600001)(166002)(33964004)(31686004)(6506007)(6486002)(53546011)(110136005)(43740500002)(45980500001); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 01667e8d-b856-46ff-31a2-08dbaaf2d8f2
X-MS-Exchange-CrossTenant-AuthSource: GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Sep 2023 13:53:40.3069 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: V2TDlXg0l5fODC28YA6Ec0FI8aWh5WMBcrr7vyVajTAekSMZPfnu+XB91C155UYUA00VtZOaB183lpE2G80eFA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV3P280MB0100
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/yz2QUxTBj88i4oH-EdZLtp3sdjI>
Subject: Re: [Ace] AD review draft-ietf-ace-key-groupcomm-16
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Sep 2023 13:53:48 -0000

Hi Paul,

Thank you for your review, we will start working on it.

When addressing your comments, we will also process a few more recent 
points tracked as Github issues [0]. In particular:

- Issues 148, 150, and 151 are about editorial fixes/improvements.

- Issues 147 is about clarifications, while issue 149 is about fixes in 
the IANA considerations.

- Issue 146 is about relaxing the now-mandatory inclusion of one 
parameter in a message.

    This issue 146 was first brought up to the WG at the ACE interim 
meeting on 2022-09-12, further elaborated on its Github entry, and then 
confirmed at the ACE interim meeting on 2022-12-19.


Best,
/Marco

[0] https://github.com/ace-wg/ace-key-groupcomm/issues


On 2023-09-01 02:26, Paul Wouters wrote:
>
> 	
> You don't often get email from paul.wouters@aiven.io. Learn why this 
> is important <https://aka.ms/LearnAboutSenderIdentification>
> 	
>
> Hi,
>
> Thanks for this document and my apologies for the long wait time.
>
> I think this document is mostly ready to go. I have a few questions 
> and some comments on what I think are changes needed for the IANA 
> Considerations section.
>
>
>
> 1) Race conditions with group rekey
>
> Section 2:
>
> When a group rekeys so an new member joining won't be able to read
> old messages, how are race conditions prevented? eg one node wants to
> send a message, but processes a group rekey, then sends the message it
> had. Then the new member join is complete and that message can be read
> by the new member.
>
> Section 6:
>
>         The KDC MUST increment the version number NUM of the current
>         keying material, before distributing the newly generated keying
>         material with version number NUM+1 to the group.
>
> So when the KDC increments the version, and starts distributing the new
> keying material, any client requesting "num" will believe it is behind
> and request a new copy? Wouldn't this cause duplicate rekeys?
>
> I see this is partially addressed in the Security Considerations, but
> I feel handling these race conditions is part of the actual protocol,
> not merely a security consideration?
>
> 2) IV/counter re-use
>
> Section 4:
>
> Symmetric keys are shared between group members. How is it prevented that
> same IVs/counters are used by different members of the group? (there is
> some talk about Base IV and Partial IV, but that didn't seem to answer
> my question
>
> 3) IANA port registration?
>
>         optionally together with a port number (which defaults to 5683 
> if omitted)
>
> Is this port going to be registered with IANA ?
>
> 4) PoP evidence with own nonce
>
> Section 4.5.1:
>
>         The PoP evidence is computed over the nonce specified in the
>         'kdc_nonce' parameter and taken as PoP input, by means of the
>         same method used when preparing the Join Response
>
> What is the point of the nonce here? Since the nonce comes from the 
> same party that
> uses the nonce, it doesn't "prove" anything, eg it could be a replay 
> of a previously
> observed/triggered nonce. Can you explain what the purpose of the 
> nonce is?
>
> Similar in Section 4.9.1.1 where the Client updates its Authentication 
> credential,
> and uses its own nonce to prove possesion of the private key.
>
> COMMENTS:
>
>
> Section 1:
>
>         If the application requires backward and forward security
>
> What is "backward security" ? I assume a new member not seeing old
> msgs. Maybe explain that?
>
>
> Section 2:
>
>         The full procedure can be separated
>
> The full procedure being "add member to group" ?
>
> The overview for "Dispatcher" does not make it clear whether it can read
> the content to be dispatched from the client, or not.
>
> Section 4:
>
>         As most important operation after trasferring the access token to
>         the KDC, the Client can perform a Join Request-Response exchange
>         with the KDC, by specifying the group it requests to join
>
> Should "group" be "group(s)" ?
>
>         to join the specified group
>
> Should "group" be "group(s)" ?
>
>
>         /ace-group/GROUPNAME/creds : this resource is invariant once
>         established, and contains the authentication credentials of all
>         the members of the group with name GROUPNAME.
>
> How is this "invariant" when it changes depending on group members? Am
> I misunderstanding the term "invariant" ?
>
> Section 4.1
>
>         The KDC can provide a list of group names that exist. Can this
>         access be restricted to a partial list depending on the client?
>
> Section 4.3.1
>
>         Group members MUST stop using the keying material to protect
>         outgoing messages and retrieve new keying material at the time
>         indicated in this field.
>
> Don't you mean "retrieve new keying material before this time" and "start
> using the new key material after this time"? Related in 4.8.1.1 it says:
>
>         In either case, if it wants to continue participating in the
>         group communication, the node has to request the latest keying
>         material from the KDC.
>
> and:
>
>         if the Client wants to be sure that it has the latest group keying
>         material. If that is the case, the Client will receive from the
>         KDC the same group keying material it already has in memory.
>
> Seems to suggest key material is not available before expiry time. 
> That is,
> there is always a downtime of a few RTTs when the keying material 
> expired, as
> clients cannot prefetch new keying material ahead of time ? I think it 
> would
> be a lot more robust if clients could prefetch the new key slightly before
> the expiry time. Then adjust for group membership changes to ensure a 
> rekey
> is done if the leaving member could (or has) obtained the num+1 keying 
> material?
>
> Section 4.8.2:
>
>         Not providing the Client with newly generated, individual keying
>         material, but rather rekeying the whole group
>
> Doesn't this open up a denial of service possibility with a malicious 
> client?
> The Security Considerations do warn about this and that requests for 
> rekeys
> can be ignored by the KDC, so this is okay.
>
> What is "individual keying material" ? Is based on the security
> association the client <-> KDC have based on the transport protocol?
>
> Section 5:
>
>         A Client identified by NODENAME may be removed from a group
>         identified by GROUPNAME where it is a member, due to the
>         following reasons.
>
> I don't think the following list is a complete set of possible 
> reasons. I would
> rephrase this along the lines of "for example, for the following reasons".
>
> Section 6:
>
>         In case the KDC deletes the group, this also allows the KDC to
>         send an unsolicited 4.04 (Not Found) response
>
> What does "this" refer to? Making the resource Observable ?
>
> Section 6.2.1:
>
>         COUNT, as a 1-byte unsigned integer associated with the used
>         encryption key. Its value is set to 0 when starting to perform
>         a new group rekeying instance, and is incremented after each
>         use of the encryption key.
>
> This limits the key to only be used for 256 messages. Is that enough for
> large groups of thousands of devices? Or are groups to be expected to be
> smaller? Or should those groups anticipate this and switch to one-to-many
> rekey methods? Wouldn't 2 bytes create a much larger safety margin at
> a very little cost?
>
>
> Section 10.2:
>
>         The KDC should renew the group keying material upon a
>         group membership change. Since the minimum number of group
>         members is one, the KDC should provide also a Client joining
>         an empty group with new keying material never used before in
>         that group. Similarly, the KDC should provide new group keying
>         material also to a Client that remains the only member in the
>         group after the leaving of other group members.
>
> Why are these "should"s not normative, eg SHOULDs ?
>
> Section 10.2.1
>
> This (finally) addresses my race condition questions....
>
>         In any case, the recipient should actively ask the KDC for the
>         latest group keying material according to an application-defined
>         policy, for instance after a given number of unsuccessfully
>         decrypted incoming messages.
>
> Seeing that the KDC presumably is hard at work distributing new keying 
> material,
> would nodes sending more requests to the KDC not just make things 
> worse? Maybe
> it should also mention that it MUST first verify the signature of the 
> node sending
> the encrypted payload before deciding it might need to ask for the 
> updated group
> key material to prevent spoofed messages trying to trigger all clients 
> to send
> requests to the KDC to overload it ?  (I can also see that this is a 
> very obvious
> thing to do anyway, so perhaps this advise is meaningless)
>
> Section 11:
>
> The IANA section mentions the IESG as Change Controller, but it is 
> prefered to use
> IETF instead. (IANA will bug you about this later if not changed)
>
> Under which collection/grouping should the a "ACE Groupcomm" 
> registries appear ?
> Under https://www.iana.org/assignments/ace/ace.xhtml 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.iana.org%2Fassignments%2Face%2Face.xhtml&data=05%7C01%7Cmarco.tiloca%40ri.se%7C90f845f51ae441a280f808dbaa821350%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638291247875827690%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Vh6usMKEgwgUsG%2FxjgtT493TD7%2Fh3o9jI6ZKH0%2B2b6k%3D&reserved=0> 
> or under a sub-registry ace-groupcomm ?
> Either way, it should be clarified to IANA.
>
>         It should be noted that, in addition to the expert review, some
>         portions of the registry require a specification, potentially
>         a Standards Track RFC, to be supplied as well.
>
> Possibly rephrase as:
>
>         Values in this registry are covered by different registration 
> policies as indicated
>
> Section 11.10 describes this as well, but it does indicate how/when 
> different policies apply.
> (likely based on the Value field?)
>
> Section 11.11 doesn't list the maximum/minimum values (or limiting 
> size of the value)
>
> Section 11.13:
>
>         The IANA Registries established in this document are defined 
> as expert review.
>
> It's a bit contentious whether a registry can be Standards Track PLUS 
> Expert Review. To
> avoid issues around this, I would remove this entire sentence.
>
>
>         Specifications are needed for the first-come, first-serve range
>         if they are expected to be used outside of closed environments
>         in an interoperable way.
>
> I think for all non-private use entries, this is "expected", so I 
> would remove the part
> starting at "if they are expected ....".
>
>         When specifications are not provided, the description provided
>         needs to have sufficient information to identify what the point
>         is being used for.
>
> That feels a little odd to me. Not sure this makes much sense, since 
> even FSFC needs
> a specification. Private use is well, private use. So which 
> registration cases would
> there be that can leave out a specification?
>
> NITS:
>
>   ** Downref: Normative reference to an Informational RFC: RFC 7967
>   ** Downref: Normative reference to an Informational RFC: RFC 9053
>
> These downrefs are okay.
>
>   == Outdated reference: A later version (-19) exists of
>      draft-ietf-core-oscore-groupcomm-14
>
>   == Outdated reference: draft-ietf-cose-countersign has been published as
>      RFC 9338
>
>   -- Possible downref: Normative reference to a draft: ref.
>      'I-D.ietf-cose-countersign'
>
>   == Outdated reference: draft-ietf-ace-mqtt-tls-profile has been 
> published
>      as RFC 9431
>
>   == Outdated reference: A later version (-12) exists of
>      draft-ietf-core-coap-pubsub-10
>
>   == Outdated reference: A later version (-09) exists of
>      draft-ietf-core-groupcomm-bis-07
>
>   == Outdated reference: A later version (-06) exists of
>      draft-ietf-cose-cbor-encoded-cert-04
>
>   == Outdated reference: A later version (-13) exists of
>      draft-tiloca-core-oscore-discovery-11
>
> These need updating (because of my long time to do my AD review. Again 
> my apologies)
>
> typoes/grammer:
>
> for those that aim to  -> for those that aim for
>
> trasferring -> transfering
>
> consistently with the roles it has in the group -> consistent with the 
> roles it has in the group.
>
> the handler reply with a -> the handler replies with a
>
> Due to different reasons - >  [remove entirely]
>
> ameliorate -> [pick a different more common term for this]
>
> This sentence does not parse:
>
>         As long as both sides get the new group keying material, updating
>         group the keying material in the middle of a transfer will not
>         cause any issue.
>
> retro-compatibility  -> backwards compatibility ?
>
>
> Paul

-- 
Marco Tiloca
Ph.D., Senior Researcher

Phone: +46 (0)70 60 46 501

RISE Research Institutes of Sweden AB
Box 1263
164 29 Kista (Sweden)

Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity

https://www.ri.se