Re: [Curdle] Kathleen Moriarty's Yes on draft-ietf-curdle-ssh-dh-group-exchange-05: (with COMMENT)

Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Fri, 15 September 2017 22:05 UTC

Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BAF5134226; Fri, 15 Sep 2017 15:05:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.697
X-Spam-Level:
X-Spam-Status: No, score=-2.697 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, LOTS_OF_MONEY=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dLv0epLS06D0; Fri, 15 Sep 2017 15:05:26 -0700 (PDT)
Received: from mail-yw0-x22f.google.com (mail-yw0-x22f.google.com [IPv6:2607:f8b0:4002:c05::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB9F0133209; Fri, 15 Sep 2017 15:05:25 -0700 (PDT)
Received: by mail-yw0-x22f.google.com with SMTP id l4so2228318ywa.6; Fri, 15 Sep 2017 15:05:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=hxsjyVTSlLIOuAgIp4VHJcihh6OAxnplFtxSA6fr2Xc=; b=j3bpjVCGeHdQAzjWrBKJASxf67P2yPTJ/nUmfWCYcqDwLZ4Cz1XWMz6xApXJMdju2o n3uMYhKqx/Hxf+w51nGPcW63BlUgR+8NuU/5LAzQNnVyM45H4P93lZQWtYo7o8OL+jlw IcLBBuBzZmnTCHrnoCgmxKniKv5Ii6xPwMT5ESMfa0KoFbm9kLMfKrj+b6fPc/crRTcT RAotEq39CvhS4+f4rS6rKr6uQBTm9+NbfAp+tZW+z5EwXaAR/K9ZPg6qPqnYB9DiCy4o ljA5YqsWSrT2On5aoKzBFJ3VVEJ8wo2ypXvOGyjVG1WFEA2HRDnkhgHQkg/QmoXqtHrL G3Ig==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=hxsjyVTSlLIOuAgIp4VHJcihh6OAxnplFtxSA6fr2Xc=; b=pQr1rhmwi2v1mSzUC4FJv8uVfZK2lNtiYhWrMHX4FAdAuQH5xnmO9VBD0vpUgWl9Jh A7F8IVyM4nI8S+Gulhm5FQXrc2Nj8UqhhvnwlDanSa6BoDwQu0/kl7c7jrRRfH7EVizZ Yz8l1sxUzecfcInFCpWZxHOh2mtVWQLLph/RhbYkZcd8dcyhx8plVHznDHlpWp700DWq 7bZom0jSKy3k3vUG8lUoYhAtjsEW/NJAj6AFZ3+ApVWRCHI9LKfNM2F24Ie77iXYRQf9 fXh5ldp5lDV8aJ06WbNdOcO3SZ5WXRECDrw4isAjLJWbEPghCk4quMdmSddik1tPdrv5 rhzQ==
X-Gm-Message-State: AHPjjUiAUO8hUMD3jJ/czhpMMze8LRTz41Ll3Q7ttT7zJFXjFOTOv9D6 MHP00tiyGUMsWx2t5RuUVJg3xjYyD+MLyfvEpVE=
X-Google-Smtp-Source: AOwi7QDyHpb7LRK2e6YXXaIlMAy5k6HV2BQJ8b5sPwYPgux6xMuVmo1CnogTN690tDzWP0d7MFbfkENqrZphmFHqalE=
X-Received: by 10.37.216.14 with SMTP id p14mr19605817ybg.75.1505513124967; Fri, 15 Sep 2017 15:05:24 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.37.2.15 with HTTP; Fri, 15 Sep 2017 15:05:24 -0700 (PDT)
In-Reply-To: <CAHbuEH7O=v2k7UWH-nw-+G80oW7q-pK=F7vxB91BfLRuGsXCJw@mail.gmail.com>
References: <CAHbuEH7O=v2k7UWH-nw-+G80oW7q-pK=F7vxB91BfLRuGsXCJw@mail.gmail.com>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Fri, 15 Sep 2017 17:05:24 -0500
Message-ID: <CAKKJt-d0qCZO8kwgwn2QRKC4xScuJLVPQLBxqHW96zYy9y6YSg@mail.gmail.com>
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Cc: "Mark D. Baushke" <mdb@juniper.net>, "Salz, Rich" <rsalz@akamai.com>, Loganaden Velvindron <logan@hackers.mu>, draft-ietf-curdle-ssh-dh-group-exchange <draft-ietf-curdle-ssh-dh-group-exchange@ietf.org>, curdle <curdle@ietf.org>, curdle <curdle-chairs@ietf.org>, The IESG <iesg@ietf.org>, Daniel Migault <daniel.migault@ericsson.com>
Content-Type: multipart/alternative; boundary="001a114fd3b204ba2e0559419712"
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/t3ZDR8uLUeWaEdQ9fI6Kwdr7KtM>
Subject: Re: [Curdle] Kathleen Moriarty's Yes on draft-ietf-curdle-ssh-dh-group-exchange-05: (with COMMENT)
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Sep 2017 22:05:28 -0000

Speaking as someone whose primary connection to crypto is transporting
bytes whether the transport protocol can understand them or not ...

On Fri, Sep 15, 2017 at 3:41 PM, Kathleen Moriarty <
kathleen.moriarty.ietf@gmail.com> wrote:

> Hi Mark,
>
> On Fri, Sep 15, 2017 at 3:59 PM, Mark D. Baushke <mdb@juniper.net> wrote:
> > Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> writes:
> >
> >> Mark,
> >>
> >> Thanks for your detailed response, I appreciate it.  Inline.
> >
> > Trimmed response, likewise inline.
> >
> >> On Fri, Sep 15, 2017 at 2:25 PM, Mark D. Baushke <mdb@juniper.net>
> wrote:
> >> > Salz, Rich <rsalz@akamai.com> writes:
> >> >
> >> Embedded equipment is a tough problem.
> >
> > Yes.
> >
> >> So for this, your worried about new purchases.
> >
> >> If it's already purchased, then we are talking an audit issue and
> >> possibly not having funds to buy some million dollar piece of
> >> equipment that happens to support less than 2048.
> >
> > Well, one hopes that with a million dollar piece of equipment, there is
> > a support cotract and a way to update the software in that box.
>
> One would think, but that's a real example and nothing could be done.
> It's not uncommon either.
>
> >
> > I was more concerned with needing to sell software to manage thousands
> > of very low price embedded devices and still be able to inter-operate
> > between the management station and the devices.
> >
> > For example, a conformant implementation that MUST use 2048 bit keys,
> > but needs to talk to a device only able to use 1024 bit keys has a
> > problem. Likewise if the embedded devices only support
> > diffie-hellman-group1-sha1 as they were two small and slow to manage
> > with diffie-hellman-group14-sha1 when deployed as a read-only device.
> >
> > Does my management station get to talk to those old devices when MUST is
> > present and exact conformance to the specification is mandated?
>
> OK, thanks for providing that example, it's helpful and I see your
> point better now.
>
> >
> >> Hmm, in the past, I've done thing to mitigate threats like isolating
> >> such hosts when the threat warranted measures. I see your point, I'm
> >> just trying to walk through real instances of issues to make sure we
> >> are considering options well.
> >
> > Yes, and I really appreciate that we are getting this into the archive.
> >
> >> > For draft-ietf-curdle-ssh-dh-group-exchange, RFC4419 does not use the
> >> > word "MUST" for the current 1024 bit value. So, in this case, just
> >> > updating a SHOULD from a SHOULD seems reasonable to me. If it were a
> >> > MUST, then I would probably advocate for SHOULD NOT as the step down.
> >> >
> >> > For example, I would have no objection to adding text which says that
> >> > the min value in the SSH_MSG_KEY_DH_GEX_REQUEST SHOULD NOT be less
> than
> >> > 2048.
> >> >
> >> > fwiw: I also suspect that 2048 will not survive more than another
> couple
> >> > of years and would not mind saying that "n SHOULD be 3072 or
> greater". I
> >> > do not believe that view is accepted by everyone, so 2048 bits is what
> >> > is in place for now.
> >>
> >> Hmm, than it would be good to make a note of this so those who are
> >> replacing embedded equipment make the leap to a higher value than
> >> 2048.  This can be in the non normative text.
>

I've had a comment with someone within the last 24 hours about whether
having text that says, roughly, if you're using less than 2048 bits and
can't go higher, you should probably expect that if this does become a
MUST, that might happen very suddenly ("attack + CERT advisory + vendors
who can go higher turning off anything lower than 2048 = you can only talk
to people who can't do 2048, and they're all vulnerable to a known exploit"
is a layperson's understanding, but I hope that's not too muddy to make
sense).

If that was a decent idea, and "you might want to be adding 3072 if you
can't do it now" is a good idea, this is turning into an advisory section,
and I like that, even if you don't have consensus for normative statements
now.

Is that going to make things better? (I'm assuming it won't make them
perfect)

Spencer


> >
> > So, using words like 'desirable' rather than recommended or should?
> > I guess that might be a way to approach it for this particular draft.
> >
> > I am less certain how to deal with the more general issue of algorithm
> > deprecation in the security area. Guessing wrong can be very expensive.
> >
> >> There are a few published RFCs (I think some CMS RFCs) that took on a
> >> notion of SHOULD - and SHOULD + as well as MUST + MUST -.  I see the
> >> JOSE algorithms RFC also uses recommended + and recommended -.  The
> >> minus shows that although this is kinda okay now, it really isn't
> >> recommended and shouldn't be in new products.
> >
> > Yes, I had used that in early drafts of draft-ietf-curdle-ssh-kex-sha2
> > and eventually removed it due to comments not liking it.
>
> Hmm, I still see a table with the SHOULD, MUST, etc. listed out for
> that draft?  I don't see the use of SHOULD +/-, MUST +/- and think it
> might help in cases like this draft where you have mushy guidance.
>
> I still think some warning that 2048 as the minimum recommendation may
> change to 3072 or greater in a couple of years should be in a non
> normative statement for developers to plan ahead as a minimum.
>
> >
> >> Do you think that approach could help to allow some flexibility, but
> >> also show 1024 is on it's way out the door and 2048 will follow soon?
> >
> > I do not think that moving to 'a min value of 2048  SHOULD+ be used'
> > will do much to help this particular case.
>
> I would actually be recommending min value of SHOULD - as it will not
> be recommended in a few years and is on a decline.  SHOULD + typically
> indicates that it will be required as a MUST next, whereas in this
> case, it will be deprecated in a few years.
>
> Thanks,
> Kathleen
>
> >
> >         -- Mark
>
>
>
> --
>
> Best regards,
> Kathleen
>