Re: [Curdle] call for adoption for draft-mu-curdle-ssh-xmss-00

"Panos Kampanakis (pkampana)" <pkampana@cisco.com> Wed, 20 November 2019 21:37 UTC

Return-Path: <pkampana@cisco.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B08671201E3 for <curdle@ietfa.amsl.com>; Wed, 20 Nov 2019 13:37:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Wp4oagJU; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=s+nksE08
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oc290frq1eC5 for <curdle@ietfa.amsl.com>; Wed, 20 Nov 2019 13:37:24 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B340E12021D for <curdle@ietf.org>; Wed, 20 Nov 2019 13:37:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17256; q=dns/txt; s=iport; t=1574285844; x=1575495444; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=U+7gdqIz8x7ZJj5zB/3YLLuA3kJixbKKHFTJgJ+fx08=; b=Wp4oagJUyDJgMlJlz8JkAaobMMb3xrALm+sAkATLQohclgJzXpjZ+1sg 8ICujQYFYnhtFdmVbceVWARh2Egr6X5pfPL8M4HF8DpITksWFyl972nWF kmdSxxAG9ALhA3JaCGvi0zTS+Bf/xqsilYR94jJIymDvVBhd2Ck8Pcf6f M=;
IronPort-PHdr: 9a23:gYyP9BU7kDNU4O3ucfiEQO1PfOjV8LGuZFwc94YnhrRSc6+q45XlOgnF6O5wiEPSA9yJ8OpK3uzRta2oGXcN55qMqjgjSNRNTFdE7KdehAk8GIiAAEz/IuTtankiH81HTFZj9lmwMFNeH4D1YFiB6nA=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ChAQAesdVd/5tdJa1lHAEBAQEBBwEBEQEEBAEBgW0EAQELAYEbLyknBWxYIAQLKoQqg0YDimyCXolYiUaEYoJSA1QJAQEBDAEBGAEKCgIBAYN7RQIXghAkNwYOAgMNAQEEAQEBAgEFBG2FNwyFUQEBAQEBAgEBEAsGChMBASwLAQ8CAQgRBAEBKAMCAgIfBgsUCQgCBAoEBQgagwGBeU0DLgECDKRwAoE4iGB1gTKCfgEBBYE0ARNBgwYNC4IXAwaBNgGMFRiBQD+BEUaCTD6CG0cBAQEBAQGBPQEBICsJgloygiyQFYVImBRBCoIrhxqKHYQzgj6HaY9tlwCCFIw+gwICBAIEBQIOAQEFgWgjKoEucBU7gmxQERSGRgsYgQQBCIJDgX+DFYU+AXQBAYEmixWCMQEB
X-IronPort-AV: E=Sophos;i="5.69,223,1571702400"; d="scan'208,217";a="666965430"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Nov 2019 21:37:23 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id xAKLbNT1024353 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 20 Nov 2019 21:37:23 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 20 Nov 2019 15:37:22 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 20 Nov 2019 16:37:21 -0500
Received: from NAM04-SN1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 20 Nov 2019 16:37:21 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NIpzeuBa2Typ3pE5tLc1A1D8SN1m+zKvH0v0CcovJSurBnqMDY4VjjDNW2PUmqgNOAJyBL3VZqXu9OlbAOjrKmYxPKCY8wMPTkZDUW3Jbu5yJ/Dw9+aDEijN84jn6dFyiNmlPYY05wIu4+cwLhOMyc40Hy5IVyuyPSN7FwZQNYr6X5IQD4y9QgPioXZU5dAjDoZJy28/AotXPOfEP3igGc7THGmYwVo618cHpikwvzFvwzJIl7FK5jSbJq2u+r9IBZOn8hCmR5f0SY9M4GNqMuPNMWDh+1buPpD3DdGWFpK/6EuyL6hNmnvS0SLHdustWGlEUaBi9Dkh8tRemqDsmw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=U+7gdqIz8x7ZJj5zB/3YLLuA3kJixbKKHFTJgJ+fx08=; b=b3xDQ8rIicKqCJSuZIxzQiNLrr+GmWiDh7fvCWV4iFdi3fxgQjgE+SPTKGduWa1VLJd/C7F23kzzKpCvV3+SrHJd/mhyWyuG91irwfKXRKKusv2km6EXD0l02M3clDmNjQSQ60f0Y2yXxAb4+iZcM3KnFoDEyTIbJNhHk1Y77BVgq0BvpQnosnxQkWwoLTZEunQFCA61XWSciQ5Ol2YNNaA0mJ88Qv83xlR0GwppHbrdbTCe5MDgMIG89OOIKmu86f3tzVBEppHhgXD7ZukyEfiizLVEE2i/nS3QvX9kPw+gesyxOnV0iQ7R4e2nwgjWz9lTdyrhxOuFemwvVMQ7BA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=U+7gdqIz8x7ZJj5zB/3YLLuA3kJixbKKHFTJgJ+fx08=; b=s+nksE086oNe7UfA9d93M0ZLs9f44jqp3d2AgfqvGfdpbt8JXiCJSTut9sGDe3Zj4jo+EGuP/6KAJfqIEHlyERs8gnTgzBmYGmwctFZCswwo2OGWnDvmafJxzR8nogfAuzhTQy5xBhkTWEDAK2BfGVtE31exRupgxkfoqjLkF4Y=
Received: from BN7PR11MB2547.namprd11.prod.outlook.com (52.135.255.146) by BN7PR11MB2834.namprd11.prod.outlook.com (52.135.252.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2474.17; Wed, 20 Nov 2019 21:37:20 +0000
Received: from BN7PR11MB2547.namprd11.prod.outlook.com ([fe80::5c82:bb6a:d0f0:b802]) by BN7PR11MB2547.namprd11.prod.outlook.com ([fe80::5c82:bb6a:d0f0:b802%6]) with mapi id 15.20.2474.018; Wed, 20 Nov 2019 21:37:20 +0000
From: "Panos Kampanakis (pkampana)" <pkampana@cisco.com>
To: denis bider <denisbider.ietf@gmail.com>
CC: Daniel Migault <daniel.migault=40ericsson.com@dmarc.ietf.org>, curdle <curdle@ietf.org>
Thread-Topic: [Curdle] call for adoption for draft-mu-curdle-ssh-xmss-00
Thread-Index: AQHVn7A4ZRh8LgRh50qUh00L3MEQ+6eUUtTAgAALfACAAAJsMA==
Date: Wed, 20 Nov 2019 21:37:20 +0000
Message-ID: <BN7PR11MB25470BC21C29CA4412E9778AC94F0@BN7PR11MB2547.namprd11.prod.outlook.com>
References: <CADZyTknBW54_qM627mYSdF7qKpcU4xrpS4jh4Os_hmqd2mn9ww@mail.gmail.com> <BN7PR11MB2547E06E6CE37E4BD7300977C94F0@BN7PR11MB2547.namprd11.prod.outlook.com> <CADPMZDAkBXSLpsiN9XNFJCPStn+vX4-6yuG_towbROjhLv50ow@mail.gmail.com>
In-Reply-To: <CADPMZDAkBXSLpsiN9XNFJCPStn+vX4-6yuG_towbROjhLv50ow@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pkampana@cisco.com;
x-originating-ip: [2001:420:c0c4:1002::b4]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 42a84911-ecf1-44a6-dad8-08d76e01d2e6
x-ms-traffictypediagnostic: BN7PR11MB2834:
x-ms-exchange-purlcount: 4
x-microsoft-antispam-prvs: <BN7PR11MB2834CF8CD99F4421C9EA1ED3C94F0@BN7PR11MB2834.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 02272225C5
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(376002)(346002)(136003)(39860400002)(396003)(199004)(189003)(7696005)(55016002)(64756008)(66476007)(66556008)(606006)(966005)(486006)(66446008)(66946007)(76116006)(46003)(14454004)(6436002)(478600001)(236005)(25786009)(54896002)(9686003)(2906002)(81156014)(6306002)(11346002)(476003)(256004)(790700001)(6116002)(14444005)(186003)(8676002)(5660300002)(81166006)(86362001)(6246003)(316002)(102836004)(71200400001)(71190400001)(54906003)(33656002)(229853002)(6916009)(7736002)(446003)(52536014)(8936002)(99286004)(76176011)(4326008)(6506007)(53546011)(74316002); DIR:OUT; SFP:1101; SCL:1; SRVR:BN7PR11MB2834; H:BN7PR11MB2547.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: czpCGSQJrYJ0G/6Y439AJHLsmj96bCPKtXJmzmDh4yAVnnI1N9Ndbgc9+F9XqPav+7tTCHHc3caXx60K8//Sk0YhhNbw6UneAvBF8VTqJnEn32O2j/5SyM9pHFRL1LTHEaaie/gYVeDmngOv5PBliPSuIH55WSwZkS7MafjYHlrAv2vN80UwJY/e9vaH+sI5iQrziprKsdiJTZMM7xu3AMK7EDNp65CGnGZXk5frqUpYiVLL9MDsINup98CUxuAtbnCIhIe+usi/Lxefn28t2AJe8mgHqK37wxLcCpOtNkceOBY1jLY6Gvtj2P95cj/boM3uZT0/rTfHZ/uHhFAF9KkaB7nK62JL4SRYGIgw0rZp5PoGNhIUfIcWOJGzksBvFEmqaeNdXNWJDbobNRiX8pZSXHO39eILEKq5Tti+xMUIbOb/cuv/k0vOh5Y2jtIROGPbuywisQcQwHR0Wfa5hI3mm33h2Q5WM3m/pvSjjJg=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BN7PR11MB25470BC21C29CA4412E9778AC94F0BN7PR11MB2547namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 42a84911-ecf1-44a6-dad8-08d76e01d2e6
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Nov 2019 21:37:20.6722 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: V+BNDvAOr68Rvv2vKCaHhpIrLvkO/D4p4oEenH0vQIvSv4XMloTGSNu+N90AGlagaabsa9AEDnQvhM1sS5H+jA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR11MB2834
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.13, xch-aln-003.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/3TQHRCxQd9tvIfdX1m-2p4Sa2Kg>
Subject: Re: [Curdle] call for adoption for draft-mu-curdle-ssh-xmss-00
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Nov 2019 21:37:29 -0000

Good points Denis. I hadn’t thought of these usecases.
These can increase the state management risk. We may be opening a can of worms by plainly adding Stateful HBS in SSH.

From: denis bider <denisbider.ietf@gmail.com>
Sent: Wednesday, November 20, 2019 1:18 PM
To: Panos Kampanakis (pkampana) <pkampana@cisco.com>
Cc: Daniel Migault <daniel.migault=40ericsson.com@dmarc.ietf.org>; curdle <curdle@ietf.org>
Subject: Re: [Curdle] call for adoption for draft-mu-curdle-ssh-xmss-00

SSH sessions are frequently established in a quick and short manner. Common examples:
- Git over SSH will establish a separate SSH session for each remote Git command.
- There exist file transfer clients (part of business applications and/or scripts) that will initiate a separate SSH session for each file they transfer via SFTP.
- There exist file transfer applications that will e.g. connect every 5-15 minutes to check for new files.

SSH is rife with short, ad-hoc sessions in practical usage; as well as long sessions that can last many days.


On Wed, Nov 20, 2019 at 11:47 AM Panos Kampanakis (pkampana) <pkampana@cisco.com<mailto:pkampana@cisco.com>> wrote:
I support the adoption of this draft.

I would like to see the addition of LMS along with XMSS in it. It is trivial to add both stateful HBS schemes in the draft.

I recommend more explicit and clear language in the Security Considerations regarding state management (HSMs, other techniques [1]). And an informative reference to NIST’s upcoming SP on Stateful HBS and [2]. Implementers need to be very careful with managing state of these signatures and the draft needs to make it clear. Also the security considerations need to make clear that SSH makes a good use-case for these signatures because SSH tunnels are usually not established in a “quick and short” fashion which would make stateful HBS even more risky because of the state management requirement.

Rgs,
Panos

[1]: https://eprint.iacr.org/2016/357.pdf
[2] https://csrc.nist.gov/Projects/Stateful-Hash-Based-Signatures


From: Curdle <curdle-bounces@ietf.org<mailto:curdle-bounces@ietf.org>> On Behalf Of Daniel Migault
Sent: Wednesday, November 20, 2019 9:38 AM
To: curdle <curdle@ietf.org<mailto:curdle@ietf.org>>
Subject: [Curdle] call for adoption for draft-mu-curdle-ssh-xmss-00

Hi,

This mail starts a call for adoption for draft-mu-curdle-ssh-xmss-00 XMSS public key algorithms for the Secure Shell (SSH) protocol. Please state on the mailing list whether you support the adoption of the draft or if you have any objection by December 5.

Yours,
Rich and Daniel

[1] https://datatracker.ietf.org/doc/draft-mu-curdle-ssh-xmss/

_______________________________________________
Curdle mailing list
Curdle@ietf.org<mailto:Curdle@ietf.org>
https://www.ietf.org/mailman/listinfo/curdle