[CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13

Eric Rescorla <ekr@rtfm.com> Tue, 28 May 2024 20:04 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53856C14F6B1 for <cfrg@ietfa.amsl.com>; Tue, 28 May 2024 13:04:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.893
X-Spam-Level:
X-Spam-Status: No, score=-1.893 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mhxB9bvCFsqs for <cfrg@ietfa.amsl.com>; Tue, 28 May 2024 13:04:23 -0700 (PDT)
Received: from mail-yw1-x112b.google.com (mail-yw1-x112b.google.com [IPv6:2607:f8b0:4864:20::112b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5197BC14F5FE for <cfrg@irtf.org>; Tue, 28 May 2024 13:04:23 -0700 (PDT)
Received: by mail-yw1-x112b.google.com with SMTP id 00721157ae682-62a087c3a92so11387217b3.2 for <cfrg@irtf.org>; Tue, 28 May 2024 13:04:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20230601.gappssmtp.com; s=20230601; t=1716926662; x=1717531462; darn=irtf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=mpSVwc8Q5Lm7vSQqD8gqA12gwzpKbLmWuV9u182DTpo=; b=nENBJoH/bYhE6jIyCKHxi2iUBvMSE+Ks8q4m1V/zuHa8uKeJmnjHGr8ULW1GxVqTLg NUs6LlsPbVhRPNBCGh3t+2andBSgR8/4A5Da6DdewRC44En50E21P3zXerrp2TvR2FR2 GSlsvOM5dXSt8MeaEyGJTlF38shy5GQ9FwNqrqWJcEty+LJBQzc/H0P1RlyBD/mk8JOo wJZyorx3vMMTauT8wK1+NuZs/6eidNc8ENrENUiABtsu3mG7WzFEMA2a3PixBzlloylV VRhin1ibxJjgP7vBtxrGJwL0v74he9oUJLy7kuQdXGfPk0A2B10Ue4ZW131bonSreu67 c/gw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1716926662; x=1717531462; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=mpSVwc8Q5Lm7vSQqD8gqA12gwzpKbLmWuV9u182DTpo=; b=cQarnWD6vfJriBDSo1xLy6Qt3GImeX+m2G5ZxEj2zYf2BKBzpxg6NqCY8o0Nu/zQII Ze1ie0Gxi0z/cO8B2EeQcQitmdB4cziJng9BaWvgrPRQzOc5lFyMuhZvPOM5gm8IxWlm xpl4kdlPkubRcpLxeR1Pwo7VMJmnmehGNbtFA9THoHHcCH4IQXl3yadkB5BhccGGBrio Ln08OXGDgX9Ht53H+nUQ+VKP4pilUsvIPppTil7BTqp5h3t6supKzvUwgFKyJAgswR4+ HkhzI1YKQ8hTM3CYG5BLxDZd1qonhYDI8RvVD1xD0CoYfFAFdlAptNqzgDVVinkyg9qI iKeQ==
X-Forwarded-Encrypted: i=1; AJvYcCWj9YFVyv5nh6hvv3W9FApW5kH9IqLmRnZ2f4oQSTOPcK3sWD8rKukAsoy8KFcdrAkLUtvn7lUWP+DeZ3bX
X-Gm-Message-State: AOJu0YxIkVojvbHjgWj0V/C+DCUakt16z5dWbq1W5UyePmi+ypUr2WOk btHB+wEY8q+tkfxhpAiXsCmOhwGTMnaGcJAnZTdEVPxCok/46P7hgQxvsl+ywZesvVHC3t/wSdK 5k44KsxwjX854Lxik39DXFOjkn4FsbVtArE+Z8A==
X-Google-Smtp-Source: AGHT+IHmnJWuEAEitGQbeDjw9bHJ51bCh0Mm7UjsygLEFux5gVwcwEEaJkOjWjFEnsuiOvIBZhcUHkPopEc5q0t/9ys=
X-Received: by 2002:a81:a18f:0:b0:627:db26:7a2f with SMTP id 00721157ae682-62a08d5d2f1mr121436227b3.2.1716926661622; Tue, 28 May 2024 13:04:21 -0700 (PDT)
MIME-Version: 1.0
References: <CADi0yUNbiVTe9BaoCFgDaTC06Z1LMAx6q2hJDiWydpy6xFqtRQ@mail.gmail.com> <GV1PR01MB8436B6B6B75DEBC9F1FB30A9D6EA2@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUNCkk8Y5dQJH6DjR33cP7KXXrQsmHfA0UDRxjGuoXCaLA@mail.gmail.com> <GV1PR01MB8436DBCC8F5B167B0B44490AD6EA2@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUPcyc9oSM4NqWynkWuTPStnD9yqt4XwmAg7c=XjCtik4A@mail.gmail.com> <GV1PR01MB84364908B61E293E46012214D6EB2@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CADi0yUOtSBmCnQMP-MoyzzxF6LZQcrKfo03sN2cNuO6MS74NAg@mail.gmail.com> <GV1PR01MB84361129416DC8B621CAAEDFD6F42@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <y5y4iquyvrao7jtpyc2ycjtz4sg5dbzhrhddz5j6rv3eydyd2o@zy65yreteuoh> <GV1PR01MB8436B919FE24E2E022639155D6F52@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <2dhbnlfzwgllzqc7farahxqkct3zqcoi7wdj7vybivlzzwxrei@e7phsvy5i6ae> <GV1PR01MB843618C88187FE124B1F142ED6F02@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CACsn0c=M5OofNyG8YhO4vYOWwFvZW9yLpwMGMXkkDrXZ=Ty1jw@mail.gmail.com> <GV1PR01MB8436ACA18A87EA7AA8A4EA57D6F02@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CABcZeBP64AC_mSgyU-YyQwCz3bHrbvcqB0xk0TdXampdCtvu6A@mail.gmail.com> <GV1PR01MB8436DDBCAF9F00DDCF34D19BD6F02@GV1PR01MB8436.eurprd01.prod.exchangelabs.com> <CABcZeBPsVUaSsX-WOV9ow2tTSaZqspzeAoBhxLBBjJAav71C0g@mail.gmail.com> <CADi0yUO5QjyXhkA7S5z7js79OTQWFdwBnhAiSkR7BFC3H+B1oA@mail.gmail.com> <CACitvs_ngWdAmfSDD-EJG=0XVhkOmhhr=tvYQ+KB7bYXwqwEEw@mail.gmail.com>
In-Reply-To: <CACitvs_ngWdAmfSDD-EJG=0XVhkOmhhr=tvYQ+KB7bYXwqwEEw@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Tue, 28 May 2024 13:03:44 -0700
Message-ID: <CABcZeBOGhNtn3-WVMpPSsHHzyQ1wuzCGE8LOja2_G27TC4FJ3A@mail.gmail.com>
To: Kevin Lewi <lewi.kevin.k@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000c5a7eb0619892391"
Message-ID-Hash: 5GOKXOX3FHE4QA5LFIU6M3V27S75XUBL
X-Message-ID-Hash: 5GOKXOX3FHE4QA5LFIU6M3V27S75XUBL
X-MailFrom: ekr@rtfm.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-cfrg.irtf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Hugo Krawczyk <hugo@ee.technion.ac.il>, "Hao, Feng" <Feng.Hao@warwick.ac.uk>, IRTF CFRG <cfrg@irtf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/SfcACJfC_AViOUND3WqRteVXRYk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Owner: <mailto:cfrg-owner@irtf.org>
List-Post: <mailto:cfrg@irtf.org>
List-Subscribe: <mailto:cfrg-join@irtf.org>
List-Unsubscribe: <mailto:cfrg-leave@irtf.org>

This looks good. Perhaps add after "receiving the KE2 message"

"This allows the client to verify a guess at the password without sending
KE3, thus leaving some ambiguity about whether the client has the wrong
password or experienced a network error".

I think it would be OK as-is, however.

-Ekr


On Tue, May 28, 2024 at 11:04 AM Kevin Lewi <lewi.kevin.k@gmail.com> wrote:

> Hi all, some additional text has been added to the draft to address the
> above discussion, under the Implementation Considerations section on
> handling online guessing attacks:
>
> "Additionally, note that a client participating in the online login stage
> will learn whether or not authentication is successful after receiving the
> `KE2` message. This means that the server should treat any client which
> fails to
> send a subsequent `KE3` message as an authentication failure. This can be
> handled
> in applications that wish to track authentication failures by, for example,
> assuming by default that any client authentication attempt is a failure
> unless a `KE3`
> message is received by the server and passes `ServerFinish` without error."
>
> (see https://github.com/cfrg/draft-irtf-cfrg-opaque/pull/456)
>
> We believe the right way forward is to address this by offering ways to
> mitigate the attacks through the server's actions rather than directly
> modify the OPAQUE protocol itself.
>
> Hope this makes sense, and let us know if you think any of the wording
> should be adjusted.
>
> Thanks,
> Kevin
>
> On Mon, May 27, 2024 at 3:54 PM Hugo Krawczyk <hugo@ee.technion.ac.il>
> wrote:
>
>> There is an even better reason not to go with what Feng proposes. His
>> modified protocol is insecure. To achieve the property that the server
>> learns first whether the password was wrong, you would need to move
>> auth_tag to the fourth message and that modified protocol is insecure (in
>> the real sense of insecure, not as Feng's "undetectable attack").
>>
>> Let's move on.
>>
>> Hugo
>>
>> On Mon, May 27, 2024 at 6:47 PM Eric Rescorla <ekr@rtfm.com> wrote:
>>
>>>
>>>
>>> On Mon, May 27, 2024 at 3:15 PM Hao, Feng <Feng.Hao@warwick.ac.uk>
>>> wrote:
>>>
>>>> Hi Eric,
>>>>
>>>>
>>>>
>>>> What I propose is to remove the key confirmation string sent by the
>>>> server in the 2nd pass. The client sends its key confirmation in the 3
>>>> rd pass, and the server only sends its key confirmation string in the 4
>>>> th pass. This will be a revision in the protocol spec. I couldn’t see
>>>> how adding a piece of text could properly address this issue.
>>>>
>>>
>>> Thanks for the explanation.
>>>
>>> I don't see this as a realistic proposal, as it would mean that OPAQUE
>>> would not be able to fit into TLS 1.3 without significant surgery to the
>>> TLS 1.3 core, which is obviously undesirable for deployment reasons. It
>>> seems to me that we do want it to be possible to use PAKEs with TLS 1.3,
>>> and if the choices are to accept this property or to make big changes to
>>> TLS 1.3, then I think the right answer is probably to accept this property
>>> and document it in the specification.
>>>
>>> -Ekr
>>>
>>>
>>>>
>>>> Cheers,
>>>>
>>>> Feng
>>>>
>>>>
>>>>
>>>> *From: *Eric Rescorla <ekr@rtfm.com>
>>>> *Date: *Monday, 27 May 2024 at 23:00
>>>> *To: *Hao, Feng <Feng.Hao@warwick.ac.uk>
>>>> *Cc: *Watson Ladd <watsonbladd@gmail.com>, IRTF CFRG <cfrg@irtf.org>
>>>> *Subject: *Re: [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13
>>>>
>>>> Feng,
>>>>
>>>>
>>>>
>>>> This has been a very long thread, with a lot of back and forth, but
>>>> it's not clear to me what outcome you are looking for here.
>>>>
>>>>
>>>>
>>>> Do you have a proposed piece of text that you think should be in the
>>>> OPAQUE draft prior to it going to RFC? If so, what is that text?
>>>>
>>>>
>>>>
>>>> -Ekr
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On Mon, May 27, 2024 at 2:32 PM Hao, Feng <Feng.Hao=
>>>> 40warwick.ac.uk@dmarc.ietf.org> wrote:
>>>>
>>>> Hi Watson,
>>>>
>>>>
>>>>
>>>> That will be a standard online dictionary attack which applies to any
>>>> PAKE, and can be detected and “accurately” recorded by the server. Please
>>>> have a look at Ding and Horster’s 1995 paper which I posted earlier.
>>>> https://dl.acm.org/doi/pdf/10.1145/219282.219298 That paper explains
>>>> the difference between a standard (detectable) online dictionary attack and
>>>> an undetectable online dictionary attack. Similar attacks in various
>>>> different protocol settings have been well studied in the past 30 years.
>>>>
>>>>
>>>>
>>>> Cheers,
>>>>
>>>> Feng
>>>>
>>>>
>>>>
>>>> *From: *Watson Ladd <watsonbladd@gmail.com>
>>>> *Date: *Monday, 27 May 2024 at 21:49
>>>> *To: *Hao, Feng <Feng.Hao@warwick.ac.uk>
>>>> *Cc: *Riad S. Wahby <riad@cmu.edu>, IRTF CFRG <cfrg@irtf.org>
>>>> *Subject: *Re: [CFRG] Re: RGLC on draft-irtf-cfrg-opaque-13
>>>>
>>>> On Mon, May 27, 2024 at 6:13 AM Hao, Feng
>>>> <Feng.Hao=40warwick.ac.uk@dmarc.ietf.org> wrote:
>>>> >
>>>> > Hi Riad,
>>>> >
>>>> >
>>>> >
>>>> > The factual difference between OPAQUE and SRP-6a is that in OPAQUE,
>>>> the server is authenticated first, whilst in SRP-6a, the client is
>>>> authenticated first. The order of authentication has a profound implication
>>>> in security here. For the case of OPAQUE, the server leaks password
>>>> verification information via the key confirmation string in the 2nd pass
>>>> before the client is authenticated. If the client drops out, the server
>>>> can’t distinguish legitimate drop-outs from online guessing attacks. This
>>>> means that the server has to deal with false positives (denying legitimate
>>>> users hence causing the DoS attack to its own users) and false negatives
>>>> (letting an attacker guess the password without being detected or logged).
>>>> Managing the false positive and false negative can be complicated in
>>>> practice.
>>>>
>>>> Huh? An attacker can always carry out the full protocol to guess to
>>>> lock someone out. That a query amounts to a guess doesn't really
>>>> change this.
>>>>
>>>> --
>>>> Astra mortemque praestare gradatim
>>>>
>>>> _______________________________________________
>>>> CFRG mailing list -- cfrg@irtf.org
>>>> To unsubscribe send an email to cfrg-leave@irtf.org
>>>>
>>>> _______________________________________________
>>> CFRG mailing list -- cfrg@irtf.org
>>> To unsubscribe send an email to cfrg-leave@irtf.org
>>>
>> _______________________________________________
>> CFRG mailing list -- cfrg@irtf.org
>> To unsubscribe send an email to cfrg-leave@irtf.org
>>
>