Re: [Curdle] Diffie-Hellman modulus sizing in Kerberos PKINIT

mbaushke ietf <mbaushke.ietf@gmail.com> Mon, 02 August 2021 20:09 UTC

Return-Path: <mbaushke.ietf@gmail.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9737C3A1A8A; Mon, 2 Aug 2021 13:09:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id onLeVSRzECgt; Mon, 2 Aug 2021 13:09:08 -0700 (PDT)
Received: from mail-il1-x12c.google.com (mail-il1-x12c.google.com [IPv6:2607:f8b0:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A81D3A1A86; Mon, 2 Aug 2021 13:09:08 -0700 (PDT)
Received: by mail-il1-x12c.google.com with SMTP id z3so17542572ile.12; Mon, 02 Aug 2021 13:09:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=content-transfer-encoding:mime-version:subject:from:in-reply-to :date:cc:message-id:references:to; bh=8xFzMK/FC6lQ9XAvoCZMuwxAKuFa669cOQYt6OFrOBo=; b=AgF0BCc/JGxO/5y+q1qiwojsOoNnk1sn6QySp9s2HQ35FvIbIIWUYRCGc2mz1Pp6S9 DzwbUeFcxZ5YMu9ir03eWsegvDh24Mvo0tNB/QkWSWrSbRWMsijyMEE9sdSWDio48x1l ucG0E07OGYTVkiXQI9I4UbHefIsdYEVH8aZUUalULLWkj+Ed1MWJti77XAJRu9xfP1PQ a88Q3cKrxLzxCfHDvy+am83ZOsXOmZEUQnTQJ0ufsWclNkbJPf+yPPFJ0iDhIeDh0ssZ +JGDm6WD8lpmncOW32AS6hVlfew79nbJ/OGmioi3IW3HYF2JVugud1Fbh95beLgVDM9o JkGA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:mime-version:subject :from:in-reply-to:date:cc:message-id:references:to; bh=8xFzMK/FC6lQ9XAvoCZMuwxAKuFa669cOQYt6OFrOBo=; b=Hf+B57tjuHxRsbo2BFoc/on8STggUymAzUeGpC0O9XmPjd0Tp11c5O7nQmWKyhiP24 XWaYkyIlS8LJyoKHelRR3rJyV8D9qB3aNKmuvamhSmN2UdMR/vHGf4T//xL2A45i1vm6 BdcGqYwbZFNnGZcJDv149E3E7+8AiNjPN5Y4MAenzUxFrMbK+C4w1zyNEmJA5s1Z4Kso unSS8UYjMOZ/JL8ttw9aTmDNaaoHFlEACw/1wZGAiacQdGesEvPNYIc8/omskFgLFmB+ O62eC82crxURIP3fdLsDiBudP+aIaEN3s4Crgfld+lfN2ExRMOoFE6mZ5eOkXz3RQQ24 J/Yw==
X-Gm-Message-State: AOAM530pyLVvC7KZh1NdZ1nfDeY9H9RJFko/9ESBcQzkfEjxL7EN/btU fK4fpt0nsFKgZHPvGzPXV4CaQ1I8pEM=
X-Google-Smtp-Source: ABdhPJzebqP21mDtH2v0kJJAOjJM2cuGMJZ9A+vmEAlbt+h+4YochCfOeahdt/WGgwhJ1CWdIYjisg==
X-Received: by 2002:a05:6e02:ecd:: with SMTP id i13mr592576ilk.182.1627934946070; Mon, 02 Aug 2021 13:09:06 -0700 (PDT)
Received: from ?IPv6:2601:246:4e04:9f90:65e4:591a:17d8:7d87? ([2601:246:4e04:9f90:65e4:591a:17d8:7d87]) by smtp.gmail.com with ESMTPSA id x4sm6285024ilj.52.2021.08.02.13.09.05 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 02 Aug 2021 13:09:05 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (1.0)
From: mbaushke ietf <mbaushke.ietf@gmail.com>
In-Reply-To: <jlglf5jlqgu.fsf@redhat.com>
Date: Mon, 02 Aug 2021 15:09:04 -0500
Cc: "Mark Baushke (ietf)" <mbaushke@gmail.com>, curdle@ietf.org, kitten@ietf.org
Message-Id: <07B0C900-8C77-43B1-9B8E-F111E8D456C5@gmail.com>
References: <jlglf5jlqgu.fsf@redhat.com>
To: Robbie Harwood <rharwood@redhat.com>
X-Mailer: iPhone Mail (18D70)
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/ZTdrTHDp3xmeUYmRrSCAZWi6Ffs>
Subject: Re: [Curdle] Diffie-Hellman modulus sizing in Kerberos PKINIT
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Aug 2021 20:09:15 -0000

Hi Robbie,

A 3k group is 128 bit of security strength and I have no issues selecting such to be either SHOULD or MAY.

For example, the 3072-bit MODP group 15 is reasonable for use with 128 bit symmetric ciphers such as aes128-{ctr,gcm} or chch20-poly1305.

For the rest, yes, I agree.

        Enjoy!
        -- Mark

[Sent from my iPhone -- Please pardon
any auto-fix created typos.]


> On Aug 2, 2021, at 12:14 PM, Robbie Harwood <rharwood@redhat.com> wrote:
> 
> "Mark Baushke (ietf)" <mbaushke@gmail.com> writes:
> 
>> Hi Robbie,
>> 
>> I made a few mistakes in my last message.
> 
> No worries.  To be sure I understand, though, please let me know if this
> matches what you're suggesting:
> 
>    - 1k: MUST NOT (matches the draft)
>    - 2k: SHOULD NOT (strengthen the draft's MAY)
>    - 4k: MUST (matches the draft)
>    - 6k/8k: MAY (not present in draft)
> 
> I'm probably fine to add larger groups like the 6k and 8k you suggest at
> MAY.  If I read right, Heimdal implements MODP 6k and 8k already.
> 
> For completeness: Heimdal also implements 3072-, 1636-, and 768-bit
> MODP.  It seems worth taking a position on those groups as well.  I
> imagine that position would be imagine would be:
> 
>    - 3072: MAY
>    - 1636: SHOULD NOT
>    - 768: MUST NOT
> 
> (though it may be cleaner to adjust the language to address sizes rather
> than specific groups at that point).
> 
> Be well,
> --Robbie