Re: [core] WGLC draft-ietf-core-echo-request-tag-05

John Mattsson <john.mattsson@ericsson.com> Thu, 19 September 2019 13:20 UTC

Return-Path: <john.mattsson@ericsson.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBD57120074; Thu, 19 Sep 2019 06:20:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Vwu0V1xW2Er; Thu, 19 Sep 2019 06:20:22 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60072.outbound.protection.outlook.com [40.107.6.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 207B11200F6; Thu, 19 Sep 2019 06:20:18 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VdlMmNUkUkNWvvuUnNRr96104ShECv1qknZfdLcpyWj1x182JmHNlbB8YgMwjgB9Zw6ypfg5KFxmz8VFmf/41iU7TFFobWiJHKnMgzdxetfiWpYs1E7smvn4Depwn5TmzzhbVz9ijXJa7CeNMPo6cJeJfJSE/kZSkqQCd9wGmJKiKNWeg2N6p+/w3rd/RSLK1tlAq0FD0kqf646ohVw4dQ4V9+HPXE6SiBVGNW42w3fLVVi5dS6c5DrbHUn60vuLdcJOX7Ah4CapyVFqyQ+cdOE9FW5U6KYTjoR+GYfGNFW4IQO1d7u0Fr2XWBjK5sg1ivwCxiiLU5fhSQm8Kf877Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SUEyr//Bi7vijSJDS119j4FtGvh0/tx0G3fwRv/D06E=; b=CjClC7BhpWJYGR0vhefpnoH+cuh+DtJCeWRbyDbpVN6G2kA/Jo27UP6YwgFwmM251u2IjIiNMEeC1oatQnI/ArcTYV6ch9PQTjjQZJUOzc5EX7ie3W2fIP78iezA0lQQsDnu0tiXQyMCs2zvrwT0Tb8rsleWxuWVmAqnc6QfZuSwd64nPBPZRTVRaCDRuGFKxZZNaOax26I7hdG17g+apTqQzv0q2/U/0beVs7UxlaQlNu3MGUURen3ljkj3FNYZaFHIQBJZEBeb5DifQyn5AGHtB5IUmap2V5Jabxrs6WLg645pLuWjtdntpNxWmZMxg0xJQ0mF1dXRb3bcNMCdug==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SUEyr//Bi7vijSJDS119j4FtGvh0/tx0G3fwRv/D06E=; b=Bt6tXk8L9UrANz9nwVCHOyJ22LP2XkPd7ttcdZc0Fqw24+gAWE0z5v6gQCbRHX+HVixRC+k2/4/DbFZLC/A2koFxKROsuMv4QzgVB+xv9xHmVxL0V1TaI0H+eEE5DiX15SpZPZtkxyiFzvM1LBZE8U+XsLbeli34qZTQb2qs+XE=
Received: from HE1PR07MB4169.eurprd07.prod.outlook.com (20.176.165.153) by HE1PR07MB3420.eurprd07.prod.outlook.com (10.170.247.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2284.10; Thu, 19 Sep 2019 13:20:16 +0000
Received: from HE1PR07MB4169.eurprd07.prod.outlook.com ([fe80::c8fb:acc1:b00e:84ef]) by HE1PR07MB4169.eurprd07.prod.outlook.com ([fe80::c8fb:acc1:b00e:84ef%6]) with mapi id 15.20.2284.009; Thu, 19 Sep 2019 13:20:16 +0000
From: John Mattsson <john.mattsson@ericsson.com>
To: Jim Schaad <ietf@augustcellars.com>, "draft-ietf-core-echo-request-tag@ietf.org" <draft-ietf-core-echo-request-tag@ietf.org>
CC: 'core' <core@ietf.org>
Thread-Topic: WGLC draft-ietf-core-echo-request-tag-05
Thread-Index: AdU3R0WwUSXHRxh8Sg2AOFV0PmUcNg3tncSA
Date: Thu, 19 Sep 2019 13:20:16 +0000
Message-ID: <624A1C17-F891-4E19-B529-791A503A4500@ericsson.com>
References: <003901d5376d$27710960$76531c20$@augustcellars.com>
In-Reply-To: <003901d5376d$27710960$76531c20$@augustcellars.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1d.0.190908
authentication-results: spf=none (sender IP is ) smtp.mailfrom=john.mattsson@ericsson.com;
x-originating-ip: [82.214.46.143]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1816afab-2cb6-428a-59df-08d73d041caf
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600167)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3420;
x-ms-traffictypediagnostic: HE1PR07MB3420:
x-microsoft-antispam-prvs: <HE1PR07MB34203D399C24F9E9BC2220B489890@HE1PR07MB3420.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 016572D96D
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(136003)(346002)(376002)(396003)(39860400002)(199004)(189003)(51444003)(13464003)(446003)(102836004)(305945005)(229853002)(86362001)(58126008)(478600001)(316002)(25786009)(4326008)(5660300002)(66556008)(64756008)(66476007)(66946007)(11346002)(2616005)(66446008)(76116006)(110136005)(91956017)(71200400001)(71190400001)(7736002)(186003)(6436002)(44832011)(99286004)(2501003)(486006)(14454004)(81166006)(6116002)(3846002)(26005)(81156014)(6512007)(36756003)(76176011)(33656002)(8676002)(66066001)(8936002)(6246003)(2906002)(14444005)(476003)(6486002)(256004)(6506007)(53546011); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3420; H:HE1PR07MB4169.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 8SMOIL0EokGYkHDckJw6RHBKZ5OVc608kXCtkEskJgmwevZjYaFn3dqgtk6J0Tifq0IukxuqCxQcBlyXNqYmKu3g/MsEstPHsbkZFx6Oz5XF5dELLU5TC5IXm0uKCuLYY9FXNch0zSIan2RqXuNTC3FSwV7tSGeE/lfEa6AezYVv5zlFTEupxN1rOGDSMoNjOZMaNBqlNK0F3yeW07qP4xoVL+j2nS7rnITnVnAzt6PkJ8EnruBrEMOL0mnkYyzX3PgUzu6MOBlVHsYI40EvCC8Asv+onGX1LRVRJBm3WWPyhfmsnHp/b1DuqgiWjByQP6GMG/rEhICARx0UWTSwxgiZueDQzcUFVUhRnwAdDBM4+F9fsOVcf6eGioJdQ+jj/fQRqq8uekhdlUIfSIhHrq75vHcWtZnHGhoJufrBSyw=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <D361E9B0A96F5E4BAC654B2B8C5B0D49@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1816afab-2cb6-428a-59df-08d73d041caf
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Sep 2019 13:20:16.4733 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: CuGUv8IxiUwLqhRlkwHVP4mAjaz/FcOg4Ticm6jtCVn9NtfM+qyjr2wdKAhZo7JIcwmgS8tP/zGpKhnThHfQ//rgq5LrYpAi+zHZVvb9Y/8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3420
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/XVq-gSilHwzcOsNZcHJgvOjRjaQ>
Subject: Re: [core] WGLC draft-ietf-core-echo-request-tag-05
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Sep 2019 13:20:25 -0000

Thanks Jim!

>11. Section 6 - I am having problems with the idea of a forgery of an Echo
>option, if the option is visible to an attacker why would they need to forge
>it?
>
>12. Appendix A - I think we have a different definition of forgery for list
>item 1.  I would have labeled this as guessing not forgery.  That is
>probably my security background talking.

I changes "frogery" to "guessing" everwhere. 

>13. Appendix A - point 2 - The security is even higher if encryption rather
>than integrity is used here.

I added a sentence that "The use of encrypted timestamps in the Echo option increases security, ...."

We thought about this before and at some point we did have an solution example with encryption. But as most uses of Echo will be encrypted anyway DTLS/TLS/OSCORE and encryption requires an nonce, and as a nonce increases overhead we did not feel that the message overhead/complexity/security trade-off was good enough to have as an example and chose to have Integrity Protected Timestamp as an example instead.

Cheers,
John

-----Original Message-----
From: Jim Schaad <ietf@augustcellars.com>
Date: Thursday, 11 July 2019 at 00:17
To: "draft-ietf-core-echo-request-tag@ietf.org" <draft-ietf-core-echo-request-tag@ietf.org>
Cc: 'core' <core@ietf.org>
Subject: WGLC draft-ietf-core-echo-request-tag-05
Resent from: <alias-bounces@ietf.org>
Resent to: <christian@amsuess.com>, John Mattsson <john.mattsson@ericsson.com>, <goran.selander@ericsson.com>
Resent date: Thursday, 11 July 2019 at 00:16

    Here are some comments:
    
    1.  The Abstract needs to say that it updates RFC 7252 - and it would be
    nice if it summarized what it updated.
    
    2.  You can clean up the text dealing with core-object-security
    
    3.  In section 2.1 - It is not clear to me why one would use an outer option
    for the echo option.   The inner one would be end-to-end and thus does the
    freshness thing.  What does the outer one do?
    
    4.  In section 2.1 (or section 2.2) - There needs to be some text about
    where the echo options should be reflected in the event that either both
    inner and outer options are returned or just an outer is returned.  Can you
    use an inner w/o security for a new request?  I.e. is the inner echo value
    considered to be a security value?
    
    5.  Not sure if it is permissible for a proxy to modify the request in
    response to a 4.01 with an echo option or not.  Clarification might be
    useful on this topic.  I think I understand the paragraphs about proxies as
    servers.
    
    6.  In section 2.3 - item 1 star 2 - I would think that a server could
    proactively return an echo option even if the request did not come with one.
    Thus  GET - Content w/ echo - PUT w/ echo
    
    7.  In section 2.3 - item 2 - star 2 - s/expect/except/
    
    8.  In section 3 it says that the requests must be integrity protected, but
    in section 3.1 it says that this may be an outer option and is of class E
    not class I.  (And I recognize that it cannot be class I.)  I think that
    section 3 is probably the incorrect one.
    
    9.  I think that section 3.4.1 is missing something, but I have not figure
    out what it is yet.  I'll continue to mull this one over.
    
    10.  Section 3.4.2 - I think that it would be reasonable to highlight that
    two OSCORE blockwise operations meet these conditions as the path is hidden
    by security.
    
    11. Section 6 - I am having problems with the idea of a forgery of an Echo
    option, if the option is visible to an attacker why would they need to forge
    it?
    
    12. Appendix A - I think we have a different definition of forgery for list
    item 1.  I would have labeled this as guessing not forgery.  That is
    probably my security background talking.
    
    13. Appendix A - point 2 - The security is even higher if encryption rather
    than integrity is used here.
    
    jim