Re: [Curdle] review of draft-ietf-curdle-des-des-des-die-die-die

Benjamin Kaduk <kaduk@mit.edu> Fri, 26 May 2017 04:28 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC51B1293D8; Thu, 25 May 2017 21:28:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NIlmVBVLE8qZ; Thu, 25 May 2017 21:28:53 -0700 (PDT)
Received: from dmz-mailsec-scanner-3.mit.edu (dmz-mailsec-scanner-3.mit.edu [18.9.25.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 77366126B71; Thu, 25 May 2017 21:28:53 -0700 (PDT)
X-AuditID: 1209190e-533ff700000074e2-12-5927af021840
Received: from mailhub-auth-4.mit.edu ( [18.7.62.39]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-3.mit.edu (Symantec Messaging Gateway) with SMTP id 70.92.29922.20FA7295; Fri, 26 May 2017 00:28:51 -0400 (EDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-4.mit.edu (8.13.8/8.9.2) with ESMTP id v4Q4SnTI029247; Fri, 26 May 2017 00:28:50 -0400
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id v4Q4SjAS019271 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 26 May 2017 00:28:48 -0400
Date: Thu, 25 May 2017 23:28:45 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: Daniel Migault <daniel.migault@ericsson.com>
Cc: "draft-ietf-curdle-des-des-des-die-die-die@ietf.org" <draft-ietf-curdle-des-des-des-die-die-die@ietf.org>, "curdle-chairs@ietf.org" <curdle-chairs@ietf.org>, 'curdle' <curdle@ietf.org>
Message-ID: <20170526042845.GB39245@kduck.kaduk.org>
References: <2DD56D786E600F45AC6BDE7DA4E8A8C118BDB433@eusaamb107.ericsson.se>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <2DD56D786E600F45AC6BDE7DA4E8A8C118BDB433@eusaamb107.ericsson.se>
User-Agent: Mutt/1.7.1 (2016-10-04)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrEIsWRmVeSWpSXmKPExsUixG6nrsu8Xj3S4GKPjMXMng3MFlsXzmK2 mDJ9D5vF064jTA4sHr++XmXzWLLkJ1MAUxSXTUpqTmZZapG+XQJXRt8uh4JZahVbZik1MH6U 7WLk5JAQMJE4vqaZtYuRi0NIYDGTxNWTTxghnI2MEv+WnWWBcK4ySeye2cLexcjBwSKgKtEz hQekm01ARaKh+zIziC0iYCDxcsJONpB6ZoELjBL77yxnBUkICzhIrPp/hB3E5gVad33SOjBb SMBX4sXzl0wQcUGJkzOfsIDYzAJaEjf+gcQ5gGxpieX/OEBMTgE/ic3T1EEqRAWUJf4evscy gVFgFpLmWUiaZyE0L2BkXsUom5JbpZubmJlTnJqsW5ycmJeXWqRrrJebWaKXmlK6iREUtJyS fDsYJzV4H2IU4GBU4uHdcE8tUog1say4MvcQoyQHk5Io7/R16pFCfEn5KZUZicUZ8UWlOanF hxglOJiVRHh3rgTK8aYkVlalFuXDpKQ5WJTEecU1GiOEBNITS1KzU1MLUotgsjIcHEoSvO4g QwWLUtNTK9Iyc0oQ0kwcnCDDeYCGt4LU8BYXJOYWZ6ZD5E8xKkqJ815eC5QQAElklObB9YKS ikT2/ppXjOJArwjzsoO08wATElz3K6DBTECDXe8qgwwuSURISTUwchXM4Xi9Kv/58grFd0Z6 j44JdZ89+K0754COUozHDcb3XG9Uj895Ys7Uvt3jSKLdIfu9J7Vdg7O2t052i92zO+7w7zk6 d0Lst20/+lnx7fybU+M++/NI13NVW6tc5T1YszVz2o4lBnoTlpicuZ9uf2ODlmeg7oJ3xbZh WqG/5r3tzX4z7fq5OiWW4oxEQy3mouJEAFHZeqMFAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/BlWCvqQpeBnX_Opxtu-9v9JsANk>
Subject: Re: [Curdle] review of draft-ietf-curdle-des-des-des-die-die-die
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 May 2017 04:28:56 -0000

On Thu, May 18, 2017 at 02:35:24AM +0000, Daniel Migault wrote:
> Hi,
> 
> The draft seems to me quite ready. Please find some small comments.
> 
> 
>   1.  Updates / obsoletes should be mentioned in the header, abstract and intro.

Gosh, for all the times I've reminded other people about this, I
feel silly having missed it.

> 
>   1.  Status: wouldn't standard track be more appropriated ?

Yes, that's another long-standing issue I failed to fix when
preparing the more recent updates.  Though, RFC 6649 is actually a
BCP, so maybe that is better than standards-track.  I'll go with bcp
in my working copy, but of course we can revise it as needed.

> Nits:
> 
> Section 5.2
> 
> 
> 
> to the has function
> 
> section 5.4:
> 
> 
> TGT needs to be defined.

Fixed.

> 
> """
> 
> It is now believed that all machines that might be broken by disabling RC4 are unsupported, and concerns about breaking them will be reduced.
> 
> """
> 
> 
> 
> I see this sentence as reflecting a support team point of view. If
> an application runs on W2003 and save lifes, I prefer not breaking
> it.
>
> 
> 
> I believe the issue is that an important aspect of support is
> addressing vulnerabilities. As patches are not provided for these
> versions, these systems becomes too vulnerable and authentication
> with Kerberos may provide limited protection. In such situation,
> could Kerberos be disabled, and alternate authentication may be
> used. Kerberos might be the preferred way to perform
> authentication but what would be the other ways. The typical use
> case I see is a that new client will not be able to connect the
> service. I hardly see KDC, Services being updated while client are
> not updated. I am fine clearly saying that upgrading to newer
> version is recommended.

Because of the nature of Kerberos deployments, with many shared
secrets across different parties, it is generally difficult to make
sweeping changes quickly.  So, I do not think the effect of this
document will be a rush for everyone to immediately remove the
affected shared keys; many will continue to exist for a long time.
Probably a good mental model for the desired transition is that new
clients being installed stop using it, and KDCs/servers start
considering turning them off, presumably with various exceptions as
appropriate.  Entirely new realms would hopefully not use them at
all, but existing ones would likely continue to have them enabled
for quite some time.  As a rough guideline, for MIT Kerberos we tend
to think of having to wait ten years before we can assume that some
new feature has sufficiently universal deployment that we should
expect it to "always" be present.

> 
> 
> OK, reading the name of the draft I expected RC4/3DES to be MUST NOT. If the status is SHOULD NOT, it gives time for the transition. In that case comment above may not require so detailed explanations. Then, do we have recommendation for the deprecation, such as specific message, logs...?

I think I initially wanted to do MUST NOT (in the mindset that
adoption of this standard will be gradual, that is still consistent
with the expected rollout procedure), but went with SHOULD NOT for
consistency with RFC 6649.  However, the generation of that document
predates my involvement, so I don't know offhand what went into
getting consensus for the SHOULD NOT.


> 
> Section 7.
> 
> If SHOULD NOT is specified, maybe we should mention that the status is expected to move to MUST NOT.

That seems consistent with a BCP designation, in that for now it is
SHOULD NOT, but the next update will make it MUST NOT.  If we target
BCP status, I don't feel a particular need to mention it, but if we
did, I would probably do it at the end of the "Recommendations"
section as:

    Future versions of this document are expected to change these
    recommendations from SHOULD NOT to MUST NOT.

> Nits from the datatracker:
> 
> 
>   Miscellaneous warnings:
>   ----------------------------------------------------------------------------
> 
>      (Using the creation date from RFC3961, updated by this document, for
>      RFC5378 checks: 2004-02-11)
> 
>   -- The document seems to lack a disclaimer for pre-RFC5378 work, but may
>      have content which was first submitted before 10 November 2008.  If you
>      have contacted all the original authors and they are all willing to grant
>      the BCP78 rights to the IETF Trust, then this is fine, and you can ignore
>      this comment.  If not, you may need to add the pre-RFC5378 disclaimer.
>      (See the Legal Provisions document at
>      http://trustee.ietf.org/license-info for more information.)

This document does not contain any content from RFC 3961, so I think
this one can be ignored.


Thanks for all the comments!

-Ben