Re: [core] Opsdir telechat review of draft-ietf-core-object-security-08

Göran Selander <goran.selander@ericsson.com> Fri, 23 February 2018 10:58 UTC

Return-Path: <goran.selander@ericsson.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0E0A129C59 for <core@ietfa.amsl.com>; Fri, 23 Feb 2018 02:58:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.321
X-Spam-Level:
X-Spam-Status: No, score=-4.321 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e4tOpX-ahp0O for <core@ietfa.amsl.com>; Fri, 23 Feb 2018 02:58:22 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D5F5127871 for <core@ietf.org>; Fri, 23 Feb 2018 02:58:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1519383500; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=OXfq3DzlCiKTuNpXaMgV4bQ8gyqOlcGnLM3yev6k0q0=; b=XEBoHpgFBvJ/4O3ByjnL9GaJs2ir0J4++KZCaFAXND+2KVmOe5isYN6WCwuQndiB 1DC+Fk3BOcHsQxeRB8DcnX2Pt+w70kx5uC59nMEuAwdDvmQMboZ3fayG5ie0weNV Pm68pwVrWrmnVN1N26Z4yc9hp0gOV2i5Fn329Z0Hn8E=;
X-AuditID: c1b4fb25-44ba69c000002d5f-2c-5a8ff3cc92cd
Received: from ESESSHC001.ericsson.se (Unknown_Domain [153.88.183.21]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id 54.F1.11615.CC3FF8A5; Fri, 23 Feb 2018 11:58:20 +0100 (CET)
Received: from ESESSMB107.ericsson.se ([169.254.7.129]) by ESESSHC001.ericsson.se ([153.88.183.21]) with mapi id 14.03.0352.000; Fri, 23 Feb 2018 11:58:19 +0100
From: Göran Selander <goran.selander@ericsson.com>
To: Éric Vyncke <evyncke@cisco.com>, "ops-dir@ietf.org" <ops-dir@ietf.org>
CC: "draft-ietf-core-object-security.all@ietf.org" <draft-ietf-core-object-security.all@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "core@ietf.org" <core@ietf.org>
Thread-Topic: Opsdir telechat review of draft-ietf-core-object-security-08
Thread-Index: AQHTq+nsZxF6pWnh9E6gxOB3W3sh+KOx0paA
Date: Fri, 23 Feb 2018 10:58:18 +0000
Message-ID: <D6B59157.9FFCB%goran.selander@ericsson.com>
References: <151930992776.8232.15713995276934864913@ietfa.amsl.com>
In-Reply-To: <151930992776.8232.15713995276934864913@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.3.170325
x-originating-ip: [83.251.191.108]
Content-Type: text/plain; charset="utf-8"
Content-ID: <7CB61CE1E45D194B90CEDF296CFD6563@ericsson.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrLIsWRmVeSWpSXmKPExsUyM2K7qO6Zz/1RBgfuylvse7ue2eJbzzxW iy/7FzBaPNs4n8Wit2kJswOrx5TfG1k9liz5yRTAFMVlk5Kak1mWWqRvl8CVsfvYXsaCHzYV zTNPMzYwbrDuYuTkkBAwkTj2/zgTiC0kcJhR4tVd/y5GLiB7CaPEtgnn2EASbAIuEg8aHoEV iQjESqx/f5sdpIhZYDmjxInG72AJYQFPiR1v3zNCFHlJTDn1mx3CNpLY/Ho/WA2LgKrE2lPb wWxeAQuJiZ+3skJsdpa4u2AT2DJOoGXXGs4xg9iMAmIS30+tAatnFhCXuPVkPhPE1QISS/ac Z4awRSVePv4HNkdUQE9ib0870BwOoLiSRM8GKRCTWUBTYv0ufYgp1hJPpy1khbAVJaZ0P2SH uEZQ4uTMJywTGMVnIVk2C6F7FpLuWUi6ZyHpXsDIuopRtDi1OCk33chYL7UoM7m4OD9PLy+1 ZBMjMBIPbvmtuoPx8hvHQ4wCHIxKPLxLnvZHCbEmlhVX5h5ilOBgVhLhLXsOFOJNSaysSi3K jy8qzUktPsQozcGiJM47R7g9SkggPbEkNTs1tSC1CCbLxMEp1cBY7iTN53O6bXKod4qN9qJf ZkmpMUv1LYwPWc7813FSLbpnY7f4L94/va4y7w49+snkxLgpO9DgephZ6huG0u2x1/O2lz3P DXHa1zB1dcS3pbFFNluZWX2+TJau19NYvdfxZd5cVpFotYm83WmPk9z/sWcEKc4123LoKUvO ofn6+VY6ltcO+iixFGckGmoxFxUnAgDqsza4wAIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/ba44d8epzIJIFXHbIjI2eRIpDEY>
Subject: Re: [core] Opsdir telechat review of draft-ietf-core-object-security-08
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Feb 2018 10:58:25 -0000

Hi Eric,

Thanks for your review. Comments inline.


On 2018-02-22 15:32, "Éric Vyncke" <evyncke@cisco.com> wrote:

>Reviewer: Éric Vyncke
>Review result: Has Issues
>
>Hello,
>
>I am the assigned OPS-DIR reviewer for this draft. The OPS DIrectorate
>reviews
>a great part of the IETF documents being processed by the IESG for the
>OPS ADs.
>Please treat with these comments as with all other IETF LC comments.
>Please
>wait for direction from your document shepherd or AD before posting a new
>version of the draft.
>
>This document defines a method for application-layer protection of CoAP
>called
>OSCORE, re-using CORE (RFC8152) for protection and designed for
>constrained
>nodes. It is specifically designed to avoid clear-text access by TLS
>proxies.
>
>_Please note that I am not following the CORE WG so some candid comments
>may be
>uneducated._
>
>As a side note, I wonder why the AEAD algorithm is in the common security
>context as it prevents using different crypto algorithm for the two
>directions
>of the traffic.

This has been discussed but no compelling use case were presented so for
simplicity this was left out.

>
>Section 3.2 states that the master secret shall be pre-established but
>*does
>not give any hint on how to provision this master secret*.


I-D.ietf-ace-oauth-authz is referenced in Section 3.2, but - as you remark
below - we should also add the specific reference to
I-D.ietf-ace-oscore-profile. There are also other options. Some
constrained device deployments provision pre-shared keys which may be used
as master secret. There are also two candidate key exchange protocols
(draft-selander-ace-cose-ecdhe and draft-mattsson-ace-tls-oscore) but
progress has been stalled by a discussion in ACE which protocol is right.


>Section 4.2 defines the behavior when new CoAP fields/options will be
>specified. Which is good of course for the future operations.
>
>The draft specifies a mandatory AEAD algorithm to be implemented

The IETF mandates specification of MTI algorithms.


>=> I am afraid
>when this algorithm will become less secure, a revised version of this
>I-D will
>be published but let's hope that the devices will be able to be
>upgraded...
>(this issue is obviously out of scope for this document)

The use of I-D.ietf-ace-oscore-profile, for example, allows in addition to
master secret also the specification of AEAD algorithm and KDF algorithm
and other default parameters used to derive the security context. If the
device supports more than one AEAD algorithm, a switch can be made with
this protocol. As you remark, the real issue is that the device may not
support multiple algorithms.


>
>The OSCORE message contains a version which is good for future versions.
>
>Section 8 does not discuss the situations when the receiving endpoints
>does not
>support the proposed method...

It wasn’t clear to me what the "proposed method” referred to. Are you
thinking of receiving endpoints not supporting OSCORE? CoAP (RFC7252
section 5.4.1) specifies the behaviour of a receiving endpoint which does
not support the Object-Security option:

"Unrecognized options of class "critical" that occur in a Confirmable
request MUST cause the return of a 4.02 (Bad Option) response. This
response SHOULD include a diagnostic payload describing the unrecognized
option(s) (see Section 5.5.2).”


The application decides the conditions for which OSCORE is required, and
if it invokes OSCORE also needs to handle the case that OSCORE is not
supported by the server (which SHOULD become known to the client by the
mechanism described above).

Do we need to specify something in this respect?


>This section should mention how to provision/discover whether the
>receiving side (and possibly all the on-path proxies) support OSCORE.


As mentioned above, the provisioning of the receiving side is described
e.g. in I-D.ietf-ace-oscore-profile.

OSCORE is designed to work with proxies which understand or don’t
understand OSCORE, providing different functionality. But the protection
of messages between endpoints and proxies is not in scope. It can be added
by defining a class I option. Or, if endpoints and proxies can be consider
to part of a security group, the extension to group communications can be
applied (draft-ietf-core-oscore-groupcomm), where the key provisioning is
specified in another ACE draft (draft-tiloca-ace-oscoap-joining).

Please provide some more details as to what kind of provisioning/discovery
mechanisms you are still missing and for what purpose.


>Section 9 very briefly mention a 'osc' attribut in a
>web link.

Yes, that is one way to indicate support for OSCORE. Did you miss anything
in this section?

>
>The establishement of security context is very succinctly described in
>section
>11.2 which refers to section 3.2 which does not specify how to provision
>this
>master secret. It would be useful to refer to I-D.ietf-ace-oauth-authz and
>I-D.ietf-ace-oscore-profile in section 3.2

Agreed, as mentioned above.

>
>In short my concerns are:
>- no description of the master secret provisioning (or is a reference to
>draft-ietf-ace-oauth-authz enough?) - no YANG model for provisioning (or
>is
>there an I-D for this in writing?) - no description how crypto algorithms
>can
>be negociated

I hope I have answered these items above, except YANG model: The planned
deployments I know of are not using YANG, but if that is required or
people are interested we can specify that in a separate draft. Let us know.

>
>Hope this helps


Thanks,
Göran