[Cfrg] PKEX update

Dan Harkins <dharkins@lounge.org> Mon, 28 November 2016 21:42 UTC

Return-Path: <dharkins@lounge.org>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 365D1129F77 for <cfrg@ietfa.amsl.com>; Mon, 28 Nov 2016 13:42:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SsAbngXoa-uA for <cfrg@ietfa.amsl.com>; Mon, 28 Nov 2016 13:42:51 -0800 (PST)
Received: from colo.trepanning.net (colo.trepanning.net [69.55.226.174]) by ietfa.amsl.com (Postfix) with ESMTP id 00058129EA7 for <cfrg@irtf.org>; Mon, 28 Nov 2016 13:42:50 -0800 (PST)
Received: from thinny.local (69-12-173-8.static.dsltransport.net [69.12.173.8]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by colo.trepanning.net (Postfix) with ESMTPSA id B85F8A888120 for <cfrg@irtf.org>; Mon, 28 Nov 2016 13:42:50 -0800 (PST)
To: "cfrg@irtf.org" <cfrg@irtf.org>
From: Dan Harkins <dharkins@lounge.org>
Message-ID: <5a4d1895-2819-ab7f-0163-06c12c00a609@lounge.org>
Date: Mon, 28 Nov 2016 13:42:47 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/KinKT2v6ZnC68uo44htMhP7ylVk>
Subject: [Cfrg] PKEX update
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Nov 2016 21:42:52 -0000

   Hello,

   I have submitted -02 of the PKEX draft to the repository. Main change is
that I have generated the role-specific elements that PKEX uses for several
popular elliptic curves.

   PKEX allows for the exchange of "raw" public keys. From the Introduction:

      Many authenticated key exchange protocols allow for authentication
      using uncertified, or "raw", public keys.  Usually these
      specifications-- e.g.  [RFC7250] for TLS and [RFC7670] for IKEv2--
      assume keys are exchanged in some out-of-band mechanism.

      [RFC7250] further states that "the main security challenge [to using
      'raw' public keys] is how to associate the public key with a specific
      entity.  Without a secure binding between identifier and key, the
      protocol will be vulnerable to man-in-the- middle attacks."

      The Public Key Exchange (PKEX) is designed to fill that gap: it
      establishs a secure binding between exchanged public keys and
      identifiers, it provides proof-of-possession of the exchanged public
      keys to each peer, and it enables the establishment of trust in
      public keys that can subsequently be used to faccilitate
      authentication in other authentication and key exchange protocols.

It addresses the "Password Authenticated Key Distribution" application
from our PAKE Requirements draft.

   Comments are solicited.

   regards,

   Dan.


On 11/28/16 1:25 PM, internet-drafts@ietf.org wrote:
> A new version of I-D, draft-harkins-pkex-02.txt
> has been successfully submitted by Dan Harkins and posted to the
> IETF repository.
>
> Name:		draft-harkins-pkex
> Revision:	02
> Title:		PKEX
> Document date:	2016-11-28
> Group:		Individual Submission
> Pages:		16
> URL:            https://www.ietf.org/internet-drafts/draft-harkins-pkex-02.txt
> Status:         https://datatracker.ietf.org/doc/draft-harkins-pkex/
> Htmlized:       https://tools.ietf.org/html/draft-harkins-pkex-02
> Diff:           https://www.ietf.org/rfcdiff?url2=draft-harkins-pkex-02
>
> Abstract:
>     This memo describes a password-authenticated protocol to allow two
>     devices to exchange "raw" (uncertified) public keys and establish
>     trust that the keys belong to their respective identities.