Re: [core] 🔔 Confirming adoption of draft-hoeglund-core-oscore-key-limits-02 as a CoRE WG document

Jaime Jiménez <jaime@iki.fi> Tue, 30 November 2021 09:12 UTC

Return-Path: <jaime@iki.fi>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBEA93A11B2 for <core@ietfa.amsl.com>; Tue, 30 Nov 2021 01:12:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.118
X-Spam-Level:
X-Spam-Status: No, score=-1.118 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B5JY3scGmqAD for <core@ietfa.amsl.com>; Tue, 30 Nov 2021 01:12:50 -0800 (PST)
Received: from forward2-smtp.messagingengine.com (forward2-smtp.messagingengine.com [66.111.4.226]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63B253A119E for <core@ietf.org>; Tue, 30 Nov 2021 01:12:49 -0800 (PST)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailforward.nyi.internal (Postfix) with ESMTP id 6986A194088B; Tue, 30 Nov 2021 04:12:48 -0500 (EST)
Received: from imap45 ([10.202.2.95]) by compute6.internal (MEProxy); Tue, 30 Nov 2021 04:12:48 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=x6nC40093K33IcxYNX4UbVm2xoI09zJynRJUd6Djf JU=; b=gvtEw+Wd0VFI9JFI0Rs/3PcluEooMd1q/Z/7H8ukVjR9ijWxZkpeYuyTf Z+Lb6VopuVQfYHna5DVvVTVjxVYCdRTpWhwjJppkochCziBOaoSx/3qr17EbEHWZ RBmB22WL0iaFTSxjrtBSe7fm00lqiTPSzWEngOCAuv8KmgeBKZ7SE8rfzRyE7XRL LXFLP38e/12N5tzobXrkbXjJBS4cCOojjAXgW2iNSNiLlfZNXNWODU92k3xuJjkB tb6OZ+cpkd4ifSYrMAKs/LzkZoaAl2GCbAHGpvl+XeY06DS+DsX7TcdR0qt11Ul8 P/1m/N5sUeEOFRMERpTZw1Vyamefw==
X-ME-Sender: <xms:D-ulYf9w1yO2eqfXcQ_O1Bit2selzBbMdi9rSN_ic0YDuMFrs6XQIA> <xme:D-ulYbtSSmcW3XXIrTFCU0XBkpSffN9aLM1IMgfmHvwH7urz7LSkq9nMtSP0aQv7- whQS0d79WJr77oFTw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvuddriedugddtudcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefofgggkfgjfhffhffvufgtgfesthhqredtreerjeenucfhrhhomheplfgrihhm vggplfhimhornhgviicuoehjrghimhgvsehikhhirdhfiheqnecuggftrfgrthhtvghrnh epleduieffieduteetudeutdduhfekffefudefueeggedvtedvffevudduheelkeeknecu vehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepjhgrihhmvg esihhkihdrfhhi
X-ME-Proxy: <xmx:D-ulYdCTvSZySuG0LP6R-m1OFPTCJ0WtkWKoMgDjiGqrIDGdcapH2Q> <xmx:D-ulYbc7KLqRGooTHPZPCdcmyOJOwAQXXDyTqi-t0FIm2JnijjghUg> <xmx:D-ulYUObv2PQ0iGKwZLFLy91KohQlMPYVfCha2Yc3QLt4P6_JyNl9A> <xmx:EOulYeVam3JpzRaqwZJFoIQ9BFVmmYVKq7C9jYZ2W_88i1fKPGDXiw>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id D4B3A24A0077; Tue, 30 Nov 2021 04:12:47 -0500 (EST)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.5.0-alpha0-4410-g5528bb82a8-fm-20211130.003-g5528bb82
Mime-Version: 1.0
Message-Id: <478aabff-d2c4-45e1-bae1-aaa08688a632@www.fastmail.com>
In-Reply-To: <YZJvIqiO9PebQ/u5@hephaistos.amsuess.com>
References: <97d7f098-ff89-4dae-a9dd-be09225553aa@www.fastmail.com> <YYqg2NNe5sYq7O6A@hephaistos.amsuess.com> <HE1PR0701MB30509A4728E4C8F88B45C00389989@HE1PR0701MB3050.eurprd07.prod.outlook.com> <YZJvIqiO9PebQ/u5@hephaistos.amsuess.com>
Date: Tue, 30 Nov 2021 11:11:56 +0200
From: Jaime Jiménez <jaime@iki.fi>
To: "core@ietf.org," <core@ietf.org>
Cc: Christian Amsüss <christian@amsuess.com>, John Mattsson <john.mattsson@ericsson.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/b5KGxBrWH7IVScKJCp-MHQ9rMmU>
Subject: Re: [core] 🔔 Confirming adoption of draft-hoeglund-core-oscore-key-limits-02 as a CoRE WG document
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Nov 2021 09:13:04 -0000

Dear all,

we are a week past the confirmation deadline, hearing no-one against the adoption and given the existing support I think it is time to adopt this document.

The authors are recommended to create a repository "oscore-key-limits" in the core-wg GitHub. 

Thank you!
-- 
Jaime Jiménez

On Mon, Nov 15, 2021, at 4:30 PM, Christian Amsüss wrote:
> Hello John, KUDOS authors,
>
> On Mon, Nov 15, 2021 at 10:22:46AM +0000, John Mattsson wrote:
>> I think it would be good to discuss if the KUDOS rekeying mechanism
>> should/could be used to also update the identifiers. KUDOS resets the
>> sequence numbers. I have not thought about this in any detail or that
>> it is something we should do, I just suggest that we discuss it.
>
> The two are related but at different layers; any solution combining them
> would need to operate on both. (KUDOS sending unprotected nonces, new
> KIDs would need to be negotiated in encrypted data).
>
> It may help to see them independent initially:
>
> * KUDOS allows using new key material from a preexisting context, with
>   sequence numbers starting at 0 again, but keeps the same KIDs.
>
> * KID switchovers could be announced using inner options -- "Please
>   address me as ${my_new_sender_ID} henceforth".
>
>   Keeping the master key, whoever changes their KID needs to be aware of
>   all KIDs previously used on that shared context. In particular, the ID
>   needs to stay unused until the peer has acknowledged (eg. by using the
>   new ID) that it didn't try to switch to that ID at the same time.
>
> The requirement to know history (lest a sender key get drived a second
> time) is what makes KID changes convenient to do at KUDOS time (when the
> list of previously used KIDs is empty again).
>
> BR
> c
>
> -- 
> To use raw power is to make yourself infinitely vulnerable to greater powers.
>   -- Bene Gesserit axiom
>
> Attachments:
> * signature.asc