Re: [Anima] Benjamin Kaduk's Discuss on draft-ietf-anima-bootstrapping-keyinfra-28: (with DISCUSS and COMMENT)
Eliot Lear <lear@cisco.com> Wed, 17 June 2020 05:31 UTC
Return-Path: <lear@cisco.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AD483A0EBC; Tue, 16 Jun 2020 22:31:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.601
X-Spam-Level:
X-Spam-Status: No, score=-9.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JWTWWZq7Gvmp; Tue, 16 Jun 2020 22:31:22 -0700 (PDT)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 906E73A0EBA; Tue, 16 Jun 2020 22:31:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5823; q=dns/txt; s=iport; t=1592371882; x=1593581482; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=Owsz3tmevHdZpRSxeDnh6JjvfyI/VGmta6z3StUOjZg=; b=GTMbVtuB976RC14i5Hfp7bCP4NJoZacJkqR76pEy4Ku8DTKN2mQOGDrf Q1c51iu23KCyMOlyUoX3DTZ3XVpQ5LSZ7YAI7JdKwVJ8SRlZ2+465ZXml RpiAVi8lb4oNbBs7nfoTx+7HRQddfCXwczkaXi0Wg96eWQziJidG8hyEW s=;
X-Files: signature.asc : 488
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DBCwDvqele/xbLJq1mHAEBAQEBAQcBARIBAQQEAQFAgUoCgxdQBAEgEiyNJYgKm3wEBwEBAQkDAQEfEAQBAYFQgnUCgholOBMCAwEBCwEBBQEBAQIBBgRthVsMQgEQAYUeAQEBAQIBeQULCxgjC1cGE4MmAYJcILVxdIE0hVGFIxCBOAGBUolFgV2CAIERJxyCTT6BfoYGgi0Ejm6EQYZfmjSCZIMBgSaUeAMdnmisAoNOAgQGBQIVgWoiKYEtMxoIGxVlAYI+CTUSGQ2OKhcUgmaLLD8DMDcCBggBAQMJhiqIAi2CFwEB
X-IronPort-AV: E=Sophos;i="5.73,521,1583193600"; d="asc'?scan'208";a="27191345"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Jun 2020 05:31:17 +0000
Received: from ams3-vpn-dhcp4163.cisco.com (ams3-vpn-dhcp4163.cisco.com [10.61.80.66]) by aer-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 05H5VGut002248 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 17 Jun 2020 05:31:17 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <9B1718CC-EA1F-44E9-B175-B489B5BE7418@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_03704023-2E77-4104-AC4B-52BD2C02B42C"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Date: Wed, 17 Jun 2020 07:31:16 +0200
In-Reply-To: <32493.1572639262@localhost>
Cc: Benjamin Kaduk <kaduk@mit.edu>, draft-ietf-anima-bootstrapping-keyinfra@ietf.org, tte+ietf@cs.fau.de, anima-chairs@ietf.org, The IESG <iesg@ietf.org>, anima@ietf.org
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <157132132983.10248.1050846253932775557.idtracker@ietfa.amsl.com> <20191018012352.GB43312@kduck.mit.edu> <22000.1572299410@localhost> <20191029031843.GO69013@kduck.mit.edu> <32493.1572639262@localhost>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
X-Outbound-SMTP-Client: 10.61.80.66, ams3-vpn-dhcp4163.cisco.com
X-Outbound-Node: aer-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/Ro0lA5fYa2QzQa3vSGnX8NCmpXs>
Subject: Re: [Anima] Benjamin Kaduk's Discuss on draft-ietf-anima-bootstrapping-keyinfra-28: (with DISCUSS and COMMENT)
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jun 2020 05:31:25 -0000
Hi, Could we recap a bit on this? I have commented on the use of the rfc822Name myself, and was a bit concerned about misuse and misinterpretation prior to rfcSELF being present. Now that it is it represents a new convention. The question at hand is whether the information found on the LHS could be subject to misinterpretation by non-participants. I wonder if we could add an EKU as a SHOULD to break the logjam. Eliot > On 1 Nov 2019, at 21:14, Michael Richardson <mcr+ietf@sandelman.ca> wrote: > > Signed PGP part > > Benjamin Kaduk <kaduk@mit.edu> wrote: > doc> although it results in additional network traffic. The relying MASA > doc> implementation MAY leverage internal state to associate this request > doc> with the original, and by now already validated, voucher-request so > doc> as to avoid an extra crypto validation. >>> >>>> It seems that doing so would turn the voucher-request into a bearer >>>> token for retrieving audit-log information (if the MASA accepts >>>> unauthenticated clients). >>> >>> That's what's intended. > >> I can see why that functionality is needed, but it seems likely to >> introduce some privacy and/or security considerations to document. It's a >> bit too late in the day for me to reason through them, though. > > To be clear: any registrar which has ever formed a valid voucher-request MAY > retrieve the audit-log at regular intervals to verify the status of the > device. The words, "now already validated" means that the MASA agreed with > the voucher-request. Most implementations are going to log the > voucher-request as part of the internal audit log, so a memcmp() on that is enough. > > This would reveal new owners. Whether the new owner is legitimate or not is > not something we can answer: it might be that the device has been stolen, or > maybe it's legitimately lent, rented, sold, etc. > >>>> Section 11 >>> >>>> I am somewhat embarassed that I did not previously note that the >>>> mechanism used to generate the domainID needs to be >>>> second-preimage-resistant or an attacker can claim to be a registrar for >>>> a domain that already exists. >>> >>> Right now, that's in: >>> >>> 5.8.2. Calculation of domainID >>> >>> The domainID is a binary value (a BIT STRING) that uniquely >>> identifies a Registrar by the "pinned-domain-cert" >>> >>> If the "pinned-domain-cert" certificate includes the >>> SubjectKeyIdentifier (Section 4.2.1.2 [RFC5280]), then it is to be >>> used as the domainID. If not, the SPKI Fingerprint as described in >>> [RFC7469] section 2.4 is to be used. This value needs to be >>> calculated by both MASA (to populate the audit-log), and by the >>> Registrar (to recognize itself). >>> >>> We tried hard and found a way not to say SHA-1 directly, allowing SHA256 to >>> replace it appropriately. > >> That's all good and admirable; I'm suggesting that we add a note in the >> security considerations of this document noting that we rely on the >> domainID (however determined) to be second-preimage-resistant. > > I've added this to the security considerations as 11.2. > > doc> Although the nonce used by the Pledge in the voucher-request does not > doc> require a strong cryptographic randomness, the use of TLS in all of > doc> the protocols in this document does. >>> >>>> We discuss the need for strong randomness in the nonce in Section 11.3, >>>> so it's not clear this is actually true. >>> >>> We don't think that the voucher nonce has to be of the same quality as something that >>> goes into a KDF. It is at the level of TCP Sequeunce number, not seed for >>> generating a private key... > >> I mean, we literally say "Reducing the possibility of this is why the >> pledge is mandated to generate a strong random or pseudo-random number >> nonce." So to also say "the nonce [...] does not require a strong >> cryptographic randomness" seems to be in conflict with the former >> statement. >> Are you saying that "strong random" and "strong cryptographic random" mean >> different things, or am I misreading the document in some other way? > > I take your point, and I guess we were splitting hairs. > I'll just rephrase it to remove the Although statement. > > -- > ] Never tell me the odds! | ipv6 mesh networks [ > ] Michael Richardson, Sandelman Software Works | IoT architect [ > ] mcr@sandelman.ca http://www.sandelman.ca/ | ruby on rails [ > > > > -- > Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works > -= IPv6 IoT consulting =- > > > > >
- [Anima] Benjamin Kaduk's Discuss on draft-ietf-an… Benjamin Kaduk via Datatracker
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Benjamin Kaduk
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Michael Richardson
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Michael Richardson
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Benjamin Kaduk
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Michael Richardson
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Benjamin Kaduk
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Eliot Lear
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Michael Richardson
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Michael Richardson
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Michael Richardson
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Michael Richardson
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Eliot Lear
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Michael Richardson
- Re: [Anima] Benjamin Kaduk's Discuss on draft-iet… Eliot Lear