Re: [acvp] ACVP draft comments

"Barry Fussell (bfussell)" <bfussell@cisco.com> Fri, 10 May 2019 15:45 UTC

Return-Path: <bfussell@cisco.com>
X-Original-To: acvp@ietfa.amsl.com
Delivered-To: acvp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 955181201B7 for <acvp@ietfa.amsl.com>; Fri, 10 May 2019 08:45:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=kGpO6OA/; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=ZsQP24S2
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ElavYLUf1CL0 for <acvp@ietfa.amsl.com>; Fri, 10 May 2019 08:45:51 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD6CB120139 for <acvp@ietf.org>; Fri, 10 May 2019 08:45:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25466; q=dns/txt; s=iport; t=1557503150; x=1558712750; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=pR2XHddMw6q4fJzIZKfv0eb9bjDepCAkTvKC7gRl+GI=; b=kGpO6OA/Js65FnnFDCCWetRq0VlEqha5aq7sWimMnHv3dL3MacvmL5Qg ZojLC9o5pVD41ur152UYnQUWrexEhAEr/tMDbN/a6sI+QCtE4gRS+o2vf HJXcoEyORB6MvFIEBlHmKWCVUffQ1Rb/mAeb2IXHWRUtDDIv1zwLxAlE+ 4=;
IronPort-PHdr: =?us-ascii?q?9a23=3AvMmBBRLWE2hw6l2RntmcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvKd2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXEf1MeXxYig+NM9DT1RiuXq8NBsdFQ=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AlAABxm9Vc/5tdJa1kGwEBAQEDAQE?= =?us-ascii?q?BBwMBAQGBUgUBAQELAYEOLyknA2lVIAQLKIQRg0cDjn6CV4k/iRmETYEuFIE?= =?us-ascii?q?QA1QJAQEBDAEBGAEKCgIBAYRAAheBdCM1CA4BAwEBBAEBAgEEbRwMhUoBAQE?= =?us-ascii?q?EAQEQEQoTAQEsCwEPAgEGAhEBAwEBFwEQAwICAh8GCxQDBggCBAENBQgagko?= =?us-ascii?q?3gR1NAx0BDpFCkF4CgTWIX3GBL4J5AQEFhQINC4IPCYEcFgGKC4ElHheBQD+?= =?us-ascii?q?BEUaCTD6CGkcBAQEHgSEYAQEIGCsJCAoCgkAXG4Imin4SBgKCRYRQIIF1ki0?= =?us-ascii?q?sOQkCggmGH4Q4g05fg3CCE2WFZo0LixmBGIZUgU6MYQIEAgQFAg4BAQWBUAE?= =?us-ascii?q?2KRqBFHAVO4JsCYIGgSQBCIJChRSFPgFyAYEojQANFweCJQEB?=
X-IronPort-AV: E=Sophos;i="5.60,453,1549929600"; d="scan'208,217";a="338673385"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 May 2019 15:45:49 +0000
Received: from XCH-ALN-011.cisco.com (xch-aln-011.cisco.com [173.36.7.21]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id x4AFjnFq020474 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 10 May 2019 15:45:49 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-ALN-011.cisco.com (173.36.7.21) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 10 May 2019 10:45:48 -0500
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 10 May 2019 11:45:47 -0400
Received: from NAM05-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 10 May 2019 10:45:47 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pR2XHddMw6q4fJzIZKfv0eb9bjDepCAkTvKC7gRl+GI=; b=ZsQP24S2zdxO30C5SM1ZjiJ5sh/Uwwc6mWxGzC4LR6Gg5Hoh928xLOzY9opoO5kRlgJlcGoocnesBv4ldb4niOHn52FbIw6+XbwvcDkHutT7K62UwBhP8ssFJ1t01ZpAp4DEwmMeipj/YDVW3uW9nPinxeFY/0/1VheDO0lrxWY=
Received: from BL0PR11MB3394.namprd11.prod.outlook.com (10.167.240.87) by BL0PR11MB3075.namprd11.prod.outlook.com (20.177.205.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1878.20; Fri, 10 May 2019 15:45:46 +0000
Received: from BL0PR11MB3394.namprd11.prod.outlook.com ([fe80::7924:299a:abd7:589b]) by BL0PR11MB3394.namprd11.prod.outlook.com ([fe80::7924:299a:abd7:589b%7]) with mapi id 15.20.1856.012; Fri, 10 May 2019 15:45:46 +0000
From: "Barry Fussell (bfussell)" <bfussell@cisco.com>
To: Vukasin Karadzic <vukasin.karadzic@gmail.com>, Yaron Sheffer <yaronf.ietf@gmail.com>
CC: "acvp@ietf.org" <acvp@ietf.org>
Thread-Topic: [acvp] ACVP draft comments
Thread-Index: AQHU5U+P+hfzviPLpk6hsJzZIPvSIqZRdGkAgBNNNTA=
Date: Fri, 10 May 2019 15:45:45 +0000
Message-ID: <BL0PR11MB3394829B38E2126CE78FB7EBD40C0@BL0PR11MB3394.namprd11.prod.outlook.com>
References: <4e4587bf-6444-d9a1-21bb-400b69e9548b@gmail.com> <CAEQ8ZZfd+81QyHmYVfC7gAh16SAKyP6Wfq8RNeAXsCKdsqmq7Q@mail.gmail.com>
In-Reply-To: <CAEQ8ZZfd+81QyHmYVfC7gAh16SAKyP6Wfq8RNeAXsCKdsqmq7Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=bfussell@cisco.com;
x-originating-ip: [2001:420:c0c4:1008::54]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 95b8d9eb-35ad-4007-616f-08d6d55e9142
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:BL0PR11MB3075;
x-ms-traffictypediagnostic: BL0PR11MB3075:
x-ms-exchange-purlcount: 6
x-microsoft-antispam-prvs: <BL0PR11MB3075C87651003A1F7E4378F4D40C0@BL0PR11MB3075.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0033AAD26D
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(376002)(39860400002)(136003)(396003)(366004)(199004)(189003)(74316002)(7736002)(55016002)(76116006)(71200400001)(733005)(68736007)(316002)(52536014)(99286004)(33656002)(517774005)(71190400001)(606006)(110136005)(6436002)(229853002)(8936002)(7696005)(5070765005)(66946007)(76176011)(73956011)(66446008)(66476007)(66556008)(64756008)(14444005)(256004)(6506007)(6246003)(53936002)(53546011)(102836004)(86362001)(46003)(5660300002)(2906002)(4326008)(53386004)(478600001)(186003)(81166006)(8676002)(790700001)(81156014)(25786009)(11346002)(966005)(486006)(446003)(14454004)(6306002)(54896002)(236005)(476003)(6116002)(9686003); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB3075; H:BL0PR11MB3394.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: tSWCaQy1r8YDBiKvsG3VrdQeBnlUf5u9tIP+wLaGvwrD5bBUeEwEiDnnbEzmKLbAzc3N6YeEjWrZLZnMZtjRk5dRVDG0+pBO+MYFFyZpsY+QVpF+3y+G+/m5RmgoRyLTKQSqOePK+wIE/bJ0XHhYY6TGUfTw7Pi4hJPPNLUThVS7HbGCmhiE5pSCQX8XH+BDVr75LSnLr7vaWCL4yEfZ6VsPsy0y50acpUTnlLzbmshHhdFlhUMKh4WDdK/DExf7KBpnFmvtjprsihgLmmcTPgWZ9TEG7QElSDDXyUn6ZOsrMjDgcCyq1nBh8WTdl2o/LFd7bQEI0HtrW92c3cKU7S9N9WKb83xPJUD/MPXsVXmy9eGLuUPWB1e5ap93s//4CpcFlrvHAeXXiIWW44gc0wLmn8wqk3vCmcWH+nqH3GQ=
Content-Type: multipart/alternative; boundary="_000_BL0PR11MB3394829B38E2126CE78FB7EBD40C0BL0PR11MB3394namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 95b8d9eb-35ad-4007-616f-08d6d55e9142
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2019 15:45:45.8283 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3075
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.21, xch-aln-011.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/acvp/hKdZTw5HBANa_f1giJu8Gffl4gc>
Subject: Re: [acvp] ACVP draft comments
X-BeenThere: acvp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Automated Cryptographic Validation Protocol <acvp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acvp>, <mailto:acvp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acvp/>
List-Post: <mailto:acvp@ietf.org>
List-Help: <mailto:acvp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acvp>, <mailto:acvp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 May 2019 15:45:56 -0000

See [BF] inline…

From: acvp <acvp-bounces@ietf.org>; On Behalf Of Vukasin Karadzic
Sent: Sunday, April 28, 2019 4:51 AM
To: Yaron Sheffer <yaronf.ietf@gmail.com>;
Cc: acvp@ietf.org
Subject: Re: [acvp] ACVP draft comments

Dear list,

I agree with Yaron on all of his comments. This point I understand differently:

* Figure 1: I would think the DUT is only the crypto module, and does not include the ACV client which is not actually being tested.

I interpret that as DUT *does* contain the ACVP client. Can the draft authors explain in more details how should the Figure 1. be interpreted?
Don't know if it's possible, but I would like if the different architectures could be explained more (sections 4.1, 4.2, 4.3).

[BF] Correct, for the architecture depicted in Figure 1 the DUT does include both ACV client and the crypto module. Take into consideration
the case of FIPS validation, many times the entire physical box is considered the device under test, not just the crypto module. However,
I also understand Yaron’s point and it may be helpful to add an additional diagram to document the case where the DUT is simply the
crypto module.  Additional explanation for the architectures seems a reasonable request, I’ll try and include that in the next draft.


Can we expect the updated version of the draft?

[BF] Yes, we will be updating to include these comments as well as some enhancements that are being finalized.  I hope to submit
an updated draft sometime in June.

Regards,
Vukasin Karadzic
[https://ssl.gstatic.com/ui/v1/icons/mail/images/cleardot.gif]

чет, 28. мар 2019. у 11:18 Yaron Sheffer <yaronf.ietf@gmail.com<mailto:yaronf.ietf@gmail.com>> је написао/ла:

Hi,



I reviewed the spec in some depth, but only skimmed the other major document. So here are a few comments. Thank you for this important work!



    Yaron



* FCS: expand the acronym: in the Terminology section?
* Why support HTTP (as opposed to HTTPS) at all? IMO TLS should be REQUIRED, not RECOMMENDED.
* What is the difference between validation testing and crypto assessment testing?
* The notion of "verifiable artifacts" is not well defined here or possibly even bogus (any crypto module can be subverted to produce fake results), so I wouldn't use it.
* Authentication should actually be in scope, at least to enable a minimum interoperable implementation.
* "Mutual authentication", you probably mean TLS with mutual certificate-based auth, please clarify.
* DRBG: expand.
* Figure 1: I would think the DUT is only the crypto module, and does not include the ACV client which is not actually being tested.
* 4.1: please clarify the notion of real-time vs. non-real time operation. It's not clear to me where real-time testing can be useful. (This is explained later, so maybe add a forward reference to the Terminology).
* I am sure you're already used to it, but first-timers will be highly confused by the sense of request+response which is opposite the usual: server to client. Can we rename them?
* 5.1, please use an example.com<http://example.com> URI (RFC 6761).
* 5.1, version numbers are later included in the URI, but not here. Why?
* 6.1, as noted above, IMO a single baseline authentication method should be mandated, though implementations may choose to add others.
* 7: the word "extensions" should be quoted. Better yet, give an example. It is also very common to have an IANA registry for extensions names, in order to avoid conflicts, and/or to give a naming convention such as using a DNS name of the organization (similar to Java packages).
* 8: this is not well-specified. What if a new port is NOT required? Also, what is the syntax for the secondary port? How is it authenticated? And in fact, why is it ever needed, i.e. why would a server agree to accept on an auxiliary port what it refuses to accept on the main port?
* 9. This section mentions "major/minor" but the examples all have "v1". In general this section needs a lot more clarity.
* 10. Maybe start the section with a quick overview of the message exchanges.
* 10.1. Primary contact? I'm not sure it is useful to configure people's names on the servers.
* 10.2. It is implied that you cannot have multiple outstanding requests in parallel for the same client. I suggest to make it explicit.
* 10.3. Alg:none should never be used in production, and also, never in a standard.
* 10.3. "Key agreement would follow RFC7518." I'm not sure what you mean. I suspect you want to say, Keys are pre-provisioned to the client and server according to RFC 7518.
* 10.3. More work is needed on the JWT: you want integrity protection, not encryption. Unless you're passing the database key, in which case you do need encryption. HS256 is obviously only integrity protection. Also, you'd want a public key (RS256) rather than a shared HMAC key, for better security.
* 10.3.2. Why use the expired token in the exchange? This means the server should have a special case where it accepts expired tokens - not very good.
* 10.5. Please avoid Markdown "bold", it doesn't render correctly in the text version.
* 10.5. We should discuss the use of JSON Schema (https://json-schema.org/) to avoid lengthy an ill-defined examples.
* Are you sure you want the complexity of PUT, with per-property updates? This breaks once you have arrays. For example, you cannot add or remove a single phone numbers, you have to specify them all.
* Having the DELETE methods as "optional" makes it very hard to test this API. I would suggest to have them as mandatory, but *allow* servers to refuse them based on policy (and then return an error code).
* 10.8.3. Dependency properties seem to introduce too much complexity. I would assume they can be hardcoded or maybe specified here, but not available for listing/parsing at run-time.
* Algorithms: in many cases you have a cross-product of name X key-length X mode. Maybe for these cases you want an array of available key-lengths and an array of available modes, provided all combinations are supported.
* What does "encrypt at rest" mean, and why is it a parameter at all?
* When listing sessions, I would expect a status field: not-started, in-progress, complete-passed, complete-failed.
* Why is there a per-session access token, why not reuse the on-going login based access token?
* "Expiry" field, please use standard ISO8601 time, as usual. Besides, the current format lacks a time zone.
* 13. Returned errors: please use RFC 7807 rather than creating a new format.
* IANA section: better incorporate it into the main document.
* draft-celi-block-ciph: is there any support for negative testing, specifically cases where AES-GCM decryption should fail because the auth tag is incorrect?
--
acvp mailing list
acvp@ietf.org<mailto:acvp@ietf.org>
https://www.ietf.org/mailman/listinfo/acvp