Re: [babel] Secdir last call review of draft-ietf-babel-information-model-11

"STARK, BARBARA H" <bs7652@att.com> Wed, 04 November 2020 23:34 UTC

Return-Path: <bs7652@att.com>
X-Original-To: babel@ietfa.amsl.com
Delivered-To: babel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9DE93A1163; Wed, 4 Nov 2020 15:34:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=att.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pRfwBsSflBLJ; Wed, 4 Nov 2020 15:34:15 -0800 (PST)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3D8A3A1162; Wed, 4 Nov 2020 15:34:15 -0800 (PST)
Received: from pps.filterd (m0049297.ppops.net [127.0.0.1]) by m0049297.ppops.net-00191d01. (8.16.0.43/8.16.0.43) with SMTP id 0A4NYCMR013055; Wed, 4 Nov 2020 18:34:15 -0500
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0049297.ppops.net-00191d01. with ESMTP id 34ke5bgs36-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 04 Nov 2020 18:34:14 -0500
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 0A4NYD7O025242; Wed, 4 Nov 2020 18:34:13 -0500
Received: from zlp27126.vci.att.com (zlp27126.vci.att.com [135.66.87.47]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 0A4NY878025163 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 4 Nov 2020 18:34:08 -0500
Received: from zlp27126.vci.att.com (zlp27126.vci.att.com [127.0.0.1]) by zlp27126.vci.att.com (Service) with ESMTP id 04FA4403072D; Wed, 4 Nov 2020 23:34:08 +0000 (GMT)
Received: from MISOUT7MSGED1DB.ITServices.sbc.com (unknown [135.66.184.185]) by zlp27126.vci.att.com (Service) with ESMTPS id CA7E2403072B; Wed, 4 Nov 2020 23:34:07 +0000 (GMT)
Received: from MISOUT7MSGED1AC.ITServices.sbc.com (135.66.184.173) by MISOUT7MSGED1DB.ITServices.sbc.com (135.66.184.185) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Wed, 4 Nov 2020 18:34:07 -0500
Received: from MISOUT7MSGETA02.tmg.ad.att.com (144.160.12.220) by MISOUT7MSGED1AC.ITServices.sbc.com (135.66.184.173) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4 via Frontend Transport; Wed, 4 Nov 2020 18:34:07 -0500
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.168) by edgeso2.exch.att.com (144.160.12.220) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2044.4; Wed, 4 Nov 2020 18:34:06 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fy2kka+oD3KGOgBUAPuSjqRrZwfktN26DaHIyknNiu4ZOQTHoMmaZVwcyL6LXuc4/ZKVIV1GmHAU3wgloEtSGswptAKLWjT5mlYKXUgso0xcc8KQWfbgzZwNj7h1tUsjwtN9PDPgSNyUOVDrF7mzGLQQGkHA4659/qEFhR26OnCqoLeYcNZJxtd3b51gQV9d458AlN0PuIOeTbhYLPA2x8SetFp118K6wqlne+4YzF6yf4FbibPn/lNIEcS/arKs4w2BTZKMxzy7FinTILyGzZOjePguyAXvvauZumhiEIxLbB2OWaTH3o6+WGLNJ1BoNNZA10oBzpItvWym61hNhQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dsMXCoS3BR6le2MGkHwqYOdVqJuG/HIVtAYe+uYKokQ=; b=mzlmc80e1P1ihW5BALol9oYLDoRE1ue+ux5+azwQgHj7kt4S09Y8Pl4Xj+XJxAxqXZUDjtu/Lo/MlnaszoU4pkMNPj1d8cYSSE5gdb4X9PWNMqeJdOrh00/sog3w9oY4wg7OQJRD5LR3BN2gWQbHbV/FeKRvF4L8hKgML03/+vAOhCj43R10j8/Nhfs4vmdm9sOTHtE+2oyDlXLFth5bb59wSLlHjuCCtS+p8Fqb/+sqOBPT0eH+0BI7SQanUO3+BpZEHjsq3Oat7kPteZVuQanfyXnAKnRmqucbWezDZaqvDTlAzJmQlocEVCz8SMHUiWxV8V6MAwxWdfy1UfDI9A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=att.com; dmarc=pass action=none header.from=att.com; dkim=pass header.d=att.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=att.onmicrosoft.com; s=selector2-att-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dsMXCoS3BR6le2MGkHwqYOdVqJuG/HIVtAYe+uYKokQ=; b=WUg58/GsSYj10E86OmXHZ19OGiiYmt76pVCKmkaEdOS1mWB5EhyYAK0VsQ+5i8HWhQ+o1TCY0xBbF1+tNHRg/CfNz7n47WTzoLJUCcraE0E8B1RyRKEY3GO0ImkmpJWpRR2YRvx2s+MhpR6K5HJEelGixx5g+/PjKhwnXPLemVU=
Received: from SN6PR02MB4512.namprd02.prod.outlook.com (2603:10b6:805:a4::13) by SN6PR02MB5471.namprd02.prod.outlook.com (2603:10b6:805:df::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.18; Wed, 4 Nov 2020 23:34:04 +0000
Received: from SN6PR02MB4512.namprd02.prod.outlook.com ([fe80::dc3c:5ad:4df8:f8af]) by SN6PR02MB4512.namprd02.prod.outlook.com ([fe80::dc3c:5ad:4df8:f8af%7]) with mapi id 15.20.3499.032; Wed, 4 Nov 2020 23:34:04 +0000
From: "STARK, BARBARA H" <bs7652@att.com>
To: "'Valery Smyslov'" <valery@smyslov.net>, "'secdir@ietf.org'" <secdir@ietf.org>
CC: "'last-call@ietf.org'" <last-call@ietf.org>, "'babel@ietf.org'" <babel@ietf.org>, "'draft-ietf-babel-information-model.all@ietf.org'" <draft-ietf-babel-information-model.all@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-babel-information-model-11
Thread-Index: AQHWq6fzcO41VWb3pEKu2D6snc0rJ6m1Uycw
Date: Wed, 4 Nov 2020 23:34:04 +0000
Message-ID: <SN6PR02MB45124993BD909C37B3A97B5DC3EF0@SN6PR02MB4512.namprd02.prod.outlook.com>
References: <160372407981.20077.17795340180313190981@ietfa.amsl.com>
In-Reply-To: <160372407981.20077.17795340180313190981@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: smyslov.net; dkim=none (message not signed) header.d=none;smyslov.net; dmarc=none action=none header.from=att.com;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [144.160.96.109]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 84d45a03-f794-4b61-ec3d-08d8811a1dd7
x-ms-traffictypediagnostic: SN6PR02MB5471:
x-microsoft-antispam-prvs: <SN6PR02MB54718FEEB946D2F557795A15C3EF0@SN6PR02MB5471.namprd02.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Ts2wsHl29zdpSLeoe/T24647hNkQ2HbRCUxZkAn3Kp9UIhJH0EdzFOgmtRQZJgkX64O7ggQEf948y+CGmiTlqRSj1cjTvBM3ZzY/xgrV/5haaLJVrDQncBPnRFNDnOVqjg/JAy2XqPaBkU7ZSkdgbPCQ8/DOTizTQoNxPRh3PeDWStSxWJ2iANJ6U8p7PR7R3/t6tELwfnETXzB86fWBWmF8YW9wWYcXu3TQ2eWLyCSFthYe71aytZT2J4SqE8mEOyIyrbaU4DGDFNBiSCbLx70O5+gO7DySNzKxZSYgX7/i4KGg2DngAYYoB74z9fDHx1G/OEGg4KuXyE0W+o8IAChZcaPnOQKa83MdI/5JMIXqOYubo0+J+cgBIb0EF/tF
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SN6PR02MB4512.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(39860400002)(396003)(346002)(136003)(376002)(26005)(186003)(54906003)(478600001)(7696005)(110136005)(83380400001)(8936002)(6506007)(55016002)(64756008)(66446008)(33656002)(82202003)(4326008)(2906002)(8676002)(66556008)(66476007)(71200400001)(30864003)(76116006)(9686003)(86362001)(5660300002)(52536014)(316002)(66946007)(491001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SN6PR02MB4512.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 84d45a03-f794-4b61-ec3d-08d8811a1dd7
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Nov 2020 23:34:04.1388 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e741d71c-c6b6-47b0-803c-0f3b32b07556
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jMrt3QpZY8ngt+E61ZmOPl4mHcmCdRhEWlSRW5FGHd+vmQdSIx3PzlZ+WmoRO0+U
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR02MB5471
X-OriginatorOrg: att.com
X-TM-SNTS-SMTP: 8387F2C5F1336A4A2ED0D865C29BAF259D599D1CF0D878C5129CC7EA680A1E852
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312, 18.0.737 definitions=2020-11-04_17:2020-11-04, 2020-11-04 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 malwarescore=0 bulkscore=0 suspectscore=0 impostorscore=0 mlxlogscore=999 spamscore=0 adultscore=0 phishscore=0 lowpriorityscore=0 clxscore=1011 priorityscore=1501 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2011040168
Archived-At: <https://mailarchive.ietf.org/arch/msg/babel/Sv6GEeLFapQ7xCmlT6TLxL04j5M>
Subject: Re: [babel] Secdir last call review of draft-ietf-babel-information-model-11
X-BeenThere: babel@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "A list for discussion of the Babel Routing Protocol." <babel.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/babel>, <mailto:babel-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/babel/>
List-Post: <mailto:babel@ietf.org>
List-Help: <mailto:babel-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/babel>, <mailto:babel-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Nov 2020 23:34:18 -0000

Hi Valery,
Thanks for your review. Taking into account Juliusz' response to your email, I'm proposing the following resolutions. For the first issue raised, I'm disagreeing slightly with Juliusz, so that may need further discussion. Please let me know if you disagree. I've copied Juliusz' responses here, so I can include my responses to your complete feedback and his in one email.
Roman specifically mentioned he agreed with your "recommendations about precise language around the names of the parameters". I think perhaps this was in reference to item 4 under nits? I didn't completely agree with your recommendation, so I'd appreciate some additional discussion on that.
Thx,
Barbara

> -----Original Message-----
> 
> Reviewer: Valery Smyslov
> Review result: Has Issues
> 
> I have reviewed this document as part of the security directorate's ongoing
> effort to review all IETF documents being processed by the IESG.  These
> comments were written primarily for the benefit of the security area
> directors.
> Document editors and WG chairs should treat these comments just like any
> other
> last call comments.
> 
> The document defines an informational model for Babel routing protocol.
> This
> informational model can be used as a basis for creating various data models
> (e.g. YANG). The document is properly structured and well written, however
> I think that it has some issues concerned with security.
> 
> Issues.
> 
> 1. Section 3.1:
> 
>    babel-mac-algorithms:  List of supported MAC computation algorithms.
>       Possible values include "HMAC-SHA256", "BLAKE2s".
> 
> BLAKE2s can produce MACs of different sizes from 1 to 32 bytes and the
> desired
> size of the MAC is a parameter for it. Where the size of MAC is specified? For
> HMAC with SHA256 I can at least imagine that full 256 bits output is used as a
> MAC...

Juliusz said:
> Right.  The intent is that Blake2s is used with 32-octet keys and 16-octet
> hashes (collision-resistance is not a concern for Babel-MAC while
> dictionary attacks are).  Barbara, I think that you should explicitly
> state that Blake2s implies 128-bit hashes.  (You may also consider
> renaming BLAKE2s to BLAKE2s-128.)

The defined values for babel-mac-algorithms come directly from draft-ietf-babel-hmac. The defined value names should map closely to the names used for the algorithms in in that draft -- which they currently do. 

If it needs to be explicitly stated somewhere that an implementation of draft-ietf-babel-hmac with BLAKE2s outputs 128-bit MACs, then draft-ietf-babel-hmac (which was already submitted for publication) would be the correct place to say that. The information model is not the right place, unless there's some expectation for the size to be configurable or reportable. I'm not seeing any request for the MAC size to be configured or reported via the information model. 

I'm proposing no change to the defined values of babel-mac-algorithms in order to maintain complete consistency with the names used in draft-ietf-babel-hmac-12.

> 2. Section 3.9:
> 
>    babel-cert-test:  An operation that allows a hash of the provided
>       input string to be created using the certificate public key and
>       the SHA-256 hash algorithm.  Input to this operation is a binary
>       string.  The output of this operation is the resulting hash, as a
>       binary string.
> 
> I failed to understand what this operation should do. Literally reading it is
> intended to produce SHA2-256 hash of public key and some arbitrary string
> (concatenated? in what order?). But then I failed to understand the purpose
> of
> this test. I would have understood if this operation provides signing of the
> arbitrary string using private key and SHA2-256 as a hash function (similarly
> to babel-mac-key-test), but it in not what is written...

One of the most common problems in configuring security mechanisms is in the format of the input key (hex, ASCII, base64, hashing that occurs to create "actual key", etc.). When a security mechanism fails to work, it is important for users or device managers to be able to trouble-shoot this specific point of failure. This test allows the user/manager to see if what this device thinks the MAC should be is the same as what another device thinks the MAC should be or is the same as the MAC being sent on the wire. Many ISPs have built a test like this into their ISP-supplied CE routers (invoked using the TR-069 protocol and TR-181 data model) to test various stored key values. It has proven useful.

> 3. Section 5 (Security Considerations):
> 
> I think that text about keys (their length and properties) needs some
> expansion. First, there are no any RFC2119 words discouraging using short
> and
> weak keys (there is some text, but without RFC2119 words and with no
> references
> it's just hand waving). Note, that draft-ietf-babel-hmac-12 has some text
> about
> the properties of the keys, so I believe at least it must be referenced here. I
> also suspect that explicitly allowing zero-length and short keys will lead to
> situations when some network operators will use them (because they are
> not
> prohibited), thus subverting security properties of MAC...

Thanks. I'll add a reference to draft-ietf-babel-hmac Security Considerations.

Zero length and short keys were discussed on the mailing list. The group considered it appropriate to
allow configuration of zero-length keys for testing but to advise people to follow best
current practices. I find the use of normative language to attempt to control the behavior of 
a home network owner (for example) or someone setting up an informal ad hoc mesh
network (for example) to be odd. IMO, the IETF should not seek to control
the choices of people putting together such relatively small-scale networks through 
the use of strong normative language in an information model specification. It's 
impossible to enforce and such people pretty much never read RFCs.

If there is a strong desire for some sort of normative language, then I could suggest
OLD
   MAC keys are allowed to be as short as zero-length.  This is useful
   for testing.  Network operators are advised to follow current best
   practices for key length and generation of keys related to the MAC
   algorithm associated with the key.  Short (and zero-length) keys and
   keys that make use of only alphanumeric characters are highly
   susceptible to brute force attacks.
NEW
   MAC keys are allowed to be as short as zero-length.  This is useful
   for testing.  Network operators are RECOMMENDED to follow current best
   practices for key length and generation of keys related to the MAC
   algorithm associated with the key.  Short (and zero-length) keys and
   keys that make use of only alphanumeric characters are highly
   susceptible to brute force attacks. See the Security Considerations
  section of [ID.draft-ietf-babel-hmac] for additional considerations 
  related to MAC keys.

> Nits.
> 
> 1. Section 1 (Introduction):
> 
>    [I-D.ietf-babel-hmac] defines a
>    security mechanism that allows Babel packets to be cryptographically
>    authenticated, and [I-D.ietf-babel-dtls] defines a security mechanism
>    that allows Babel packets to be encrypted.
> 
> DTLS provides both confidentiality and authentication of data, so to be
> formally correct, please add "both authenticated and" before "encrypted".

Thank you. I will make this change.
 
> 2. Section 2 (Overview) at the very end:
> 
>    Note that this overview is intended simply to be informative and is
>    not normative.  If there is any discrepancy between this overview and
>    the detailed information model definitions in subsequent sections,
>    the error is in this overview.
> 
> This phrase makes me puzzled. The tree-like description of the information
> model in the Overview is very useful, however this phrase seems to
> discourage
> using it, because authors are not sure it is correct. I think it would be
> better for readers if authors double check that no discrepancy exists
> between
> the overview and the subsequent detailed description and remove this
> phrase.

The authors have double- and triple-checked, but human error is still possible, since these were not auto-generated (like YANG does). Whenever redundant information is presented, it is critical that it be normative in only one place. This language makes it clear which is normative and what to do in the case of discrepancies. I propose no change. If there is a strong push to remove this language, then I believe the correct approach would be to remove the entire section (remove the redundancy) rather than to allow confusion if there is an error. But people have found this section useful, so I would prefer to leave it as is.
 
> 3. Section 3.3:
> 
>    babel-mac-verify  A Boolean flag indicating whether MAC hashes in
>       incoming Babel packets are required to be present and are
>       verified.  If this parameter is "true", incoming packets are
>       required to have a valid MAC hash.  An implementation MAY choose
>       to expose this parameter as read-only ("ro").
> 
> "MAC hashes" is strange wording, "MAC values" or just "MACs" are better in
> my
> opinion.

Thank you. I'll change it to MAC.

> 4. Section 3.8:
> 
>    babel-mac-key-use-sign:  Indicates whether this key value is used to
>       sign sent Babel packets.  Sent packets are signed using this key
>       if the value is "true".  If the value is "false", this key is not
>       used to sign sent Babel packets.  An implementation MAY choose to
>       expose this parameter as read-only ("ro").
> 
> "Sign" is not a good word when you describe symmetric key operations
> (which
> computing MAC belongs to). Although it is often used informally, I think that
> RFC should be more meticulous in selecting words. I'd rather replace it with
> "compute MAC" and rename the entry to babel-mac-key-use-compute or
> babel-mac-key-use-mac (if it is possible). Note, that using "verify MAC" is OK.

I've been thinking through this. I can't speak to the informal nature of "sign", but I can say that simply replacing "sign" with "compute" or "mac" wouldn't convey correctly what this parameter is about. This parameter is primarily concerned with whether or not a MAC is included in the sent packet. The sending is the critical piece, and not the computing (it's possible to compute the MAC without sending it; a MAC in a sent packet is assumed to have been computed). I could change the description to:
       Indicates whether this key value is used to compute a MAC and include that MAC in the
       sent Babel packet.  A MAC for sent packets is computed using this key
       if the value is "true".  If the value is "false", this key is not
       used to compute a MAC to include in sent Babel packets.  An implementation MAY choose to
       expose this parameter as read-only ("ro")

But I struggle with the proposed parameter renaming. I strongly believe the name should concisely describe that the Boolean value indicates whether or not to include a MAC in the sent packet. The term "sign" is one I've commonly seen to indicate that a MAC is included in the sent packet. I'm not aware of a different, similarly short word. "Compute" and "mac" do not convey the sending aspect. And sending is very asymmetric.
 
> 5. Section 3.8:
> 
>    babel-mac-key-value:
>        ...
>       This value is of a length suitable for the associated babel-mac-key-
>       algorithm.  If the algorithm is based on the HMAC construction
>       [RFC2104], the length MUST be between 0 and the block size of the
>       underlying hash inclusive (where "HMAC-SHA256" block size is 64
>       bytes as described in [RFC4868]).  If the algorithm is "BLAKE2s",
>       the length MUST be between 0 and 32 bytes inclusive, as described
>       in [RFC7693].
> 
> I wonder of the rationale for imposing the above restrictions on HMAC key
> length. HMAC can use keys of any length, but if the key is greater than block
> size of underlying hash function, then it's first hashed (small performance
> penalty). So I imagine that the rationale is to avoid this penalty. However, as
> RFC2104 states, key sizes greater than output length of the underlying hash
> function (32 bytes in case of SHA2-256) would not significantly increase the
> function strength, so it's just a waste of space. See also Issue 3 above.

Juliusz said:
> This was discussed at length on the mailing list.  It's not about
> performance, it's about making it more difficult to use an unsafe
> procedure for generating keys.
> 
> Since Babel-MAC is vulnerable to dictionary attacks, the key must either
> be drawn randomly or generated using a procedure that is hardened against
> such attacks (scrypt, etc.).  Applying the procedure described in RFC 2104
> to a user-provided passphrase is not safe, and therefore we try to make it
> difficult for a naive user to do so.
> 
> I am opposed to putting the RFC 2104 hashing procedure in the information
> model.  Doing so would be a disservice to our users.

In addition to the rationale Juliusz mentioned, we (babel WG) also noted that implementers
of the babel MAC function were using existing libraries for the HMAC-SHA256 algorithm.
The user interface (UI) that accepted manual key entry was also from an existing library. When
the same longer strings were entered into different UIs of the different implementations, these
strings were treated differently and resulted in non-interoperability. The "actual key" (using
RFC 2104 words) ended up different. Requiring entered keys to be directly usable as "actual
keys" solved this problem. BTW, I have considered UIs for direct management and configuration
to effectively be implementations of the information model. 

I recommend no changes to this text.
 
> 6.    Section 3.8:
> 
>    babel-mac-key-test:  An operation that allows the MAC key and hash
>       algorithm to be tested to see if they produce an expected outcome.
>       Input to this operation is a binary string.  The implementation is
>       expected to create a hash of this string using the babel-mac-key-
>       value and the babel-mac-key-algorithm.  The output of this
>       operation is the resulting hash, as a binary string.
> 
> The text mixes up words "hash" and "MAC". MAC is not a hash (even if MAC
> algorithm is often based on hash function). As with my previous grunt, I'd like
> RFC to be more meticulous in selecting words. Please, avoid using "hash"
> here.

If I understand, the suggestion is to reword as:
   babel-mac-key-test:  An operation that allows the MAC key and MAC
      algorithm to be tested to see if they produce an expected outcome.
      Input to this operation is a binary string.  The implementation is
      expected to create a MAC of this string using the babel-mac-key-
      value and the babel-mac-key-algorithm.  The output of this
      operation is the resulting MAC, as a binary string.

If this is right, I'll make that change.

> 7. Section 5 (Security Considerations):
> 
>    ... This model requires that private keys never be
>    exposed.  The Babel security mechanisms that make use of these
>    credentials (e.g., [I-D.ietf-babel-dtls], [I-D.ietf-babel-hmac])
>    identify what credentials can be used with those mechanisms.
> 
> Please add "and MAC keys" after "private keys" since formally private keys
> are
> only defined for public key cryptography.

Thank you. I'll make this change.
 
> 8. Section 5 (Security Considerations):
> 
>    MAC keys are allowed to be as short as zero-length.  This is useful
>    for testing.
> 
> I wonder what's benefit of allowing zero-length keys for testing purposes.
> What
> is intended to be tested in this case? Implementation of MAC? Is it really
> needed outside test lab? Am I missing something?

As with the -test actions, this allows someone to diagnose whether a problem they are having is with the formatting 
of the input key (hex, padded, ASCII, base64, etc.). This is by far one of the most common problems when attempting to
get different implementations to interoperate.

> 9. Section 5 (Security Considerations):
> 
>     Short (and zero-length) keys and
>    keys that make use of only alphanumeric characters are highly
>    susceptible to brute force attacks.
> 
> Formally, brute force attack with zero-length keys is not defined, since there
> is no key to find and all is in clear.

Juliusz said:
> The key length is not carried in the clear by the protocol.  Guessing the
> key length requires a brute-force attack, even when it is zero.

I propose no change. 

> Comments.
> 
> 1. The document contains an entry in the Informational model defining which
> hash functions can be used with HMAC authentication. However, there is no
> corresponding entry of which ciphersuites can be used with DTLS. Is it up to
> DTLS library to select ciphersuites?

Juliusz said:
> Yes.  Babel-DTLS is intended to inherit the security properties of the
> system's DTLS library.  If the DTLS library is unsafe, then Babel-DTLS
> must not be used until the library is fixed.