Re: [Curdle] RSA key transport for SSH (RFC 4432) and forward secrecy

Peter Gutmann <pgut001@cs.auckland.ac.nz> Thu, 11 February 2021 04:47 UTC

Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E13A93A1165 for <curdle@ietfa.amsl.com>; Wed, 10 Feb 2021 20:47:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.9
X-Spam-Level:
X-Spam-Status: No, score=-0.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, PDS_BAD_THREAD_QP_64=0.998, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kZPqB8poTWvT for <curdle@ietfa.amsl.com>; Wed, 10 Feb 2021 20:47:27 -0800 (PST)
Received: from au-smtp-delivery-117.mimecast.com (au-smtp-delivery-117.mimecast.com [124.47.189.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C34C3A1162 for <curdle@ietf.org>; Wed, 10 Feb 2021 20:47:26 -0800 (PST)
Received: from AUS01-SY4-obe.outbound.protection.outlook.com (mail-sy4aus01lp2176.outbound.protection.outlook.com [104.47.71.176]) (Using TLS) by relay.mimecast.com with ESMTP id au-mta-94-2Ysr8KDsNe-v17OeMhOgpQ-1; Thu, 11 Feb 2021 15:47:16 +1100
X-MC-Unique: 2Ysr8KDsNe-v17OeMhOgpQ-1
Received: from SG2PR0302CA0008.apcprd03.prod.outlook.com (2603:1096:3:2::18) by MEXPR01MB1062.ausprd01.prod.outlook.com (2603:10c6:200:1::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.23; Thu, 11 Feb 2021 04:47:10 +0000
Received: from SG2APC01FT058.eop-APC01.prod.protection.outlook.com (2603:1096:3:2:cafe::52) by SG2PR0302CA0008.outlook.office365.com (2603:1096:3:2::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.12 via Frontend Transport; Thu, 11 Feb 2021 04:47:09 +0000
X-MS-Exchange-Authentication-Results: spf=none (sender IP is 130.216.95.208) smtp.mailfrom=cs.auckland.ac.nz; mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=cs.auckland.ac.nz
Received: from uxcn13-ogg-e.UoA.auckland.ac.nz (130.216.95.208) by SG2APC01FT058.mail.protection.outlook.com (10.152.251.117) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.3846.25 via Frontend Transport; Thu, 11 Feb 2021 04:47:08 +0000
Received: from uxcn13-tdc-d.UoA.auckland.ac.nz (10.6.3.5) by uxcn13-ogg-e.UoA.auckland.ac.nz (10.6.2.8) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 11 Feb 2021 17:47:07 +1300
Received: from uxcn13-tdc-d.UoA.auckland.ac.nz ([fe80::c123:782b:aed6:3e56]) by uxcn13-tdc-d.UoA.auckland.ac.nz ([fe80::c123:782b:aed6:3e56%14]) with mapi id 15.00.1497.010; Thu, 11 Feb 2021 17:47:07 +1300
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: Benjamin Kaduk <kaduk@mit.edu>, "curdle@ietf.org" <curdle@ietf.org>
Thread-Topic: [Curdle] RSA key transport for SSH (RFC 4432) and forward secrecy
Thread-Index: AQHXAC4NqKqKV9dtiEe1pLBRKAvLp6pSYWSs
Date: Thu, 11 Feb 2021 04:47:07 +0000
Message-ID: <1613018828089.63687@cs.auckland.ac.nz>
References: <20210211042551.GV21@kduck.mit.edu>
In-Reply-To: <20210211042551.GV21@kduck.mit.edu>
Accept-Language: en-NZ, en-GB, en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [130.216.158.4]
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0bc3bd12-0608-463d-e9c3-08d8ce48170c
X-MS-TrafficTypeDiagnostic: MEXPR01MB1062:
X-Microsoft-Antispam-PRVS: <MEXPR01MB106202B1BEE6BE5A787B8CC9EE8C9@MEXPR01MB1062.ausprd01.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:8273
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:130.216.95.208; CTRY:NZ; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:uxcn13-ogg-e.UoA.auckland.ac.nz; PTR:natgate1-1.auckland.ac.nz; CAT:NONE; SFS:(4636009)(346002)(39860400002)(396003)(376002)(136003)(36840700001)(46966006)(4744005)(86362001)(5660300002)(70206006)(336012)(70586007)(36860700001)(478600001)(8936002)(186003)(26005)(82740400003)(7636003)(36906005)(2616005)(110136005)(2906002)(316002)(47076005)(82310400003)(786003)(356005)(8676002); DIR:OUT; SFP:1101
X-OriginatorOrg: cs.auckland.ac.nz
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Feb 2021 04:47:08.9734 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0bc3bd12-0608-463d-e9c3-08d8ce48170c
X-MS-Exchange-CrossTenant-Id: d1b36e95-0d50-42e9-958f-b63fa906beaa
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d1b36e95-0d50-42e9-958f-b63fa906beaa; Ip=[130.216.95.208]; Helo=[uxcn13-ogg-e.UoA.auckland.ac.nz]
X-MS-Exchange-CrossTenant-AuthSource: SG2APC01FT058.eop-APC01.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MEXPR01MB1062
Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CAU17A13 smtp.mailfrom=pgut001@cs.auckland.ac.nz
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: cs.auckland.ac.nz
Content-Language: en-NZ
Content-Type: text/plain; charset="WINDOWS-1252"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/vwS-A4E04Mg1A8avNfWqaXtZli0>
Subject: Re: [Curdle] RSA key transport for SSH (RFC 4432) and forward secrecy
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Feb 2021 04:47:29 -0000

Benjamin Kaduk <kaduk@mit.edu> writes:
 
>But most likely the best place to start would be to ask how widely it's
>implemented and if it's known to be in use anywhere...does anyone have data?

We could start with Mark Bauschke's KEX straw poll from a month ago, I think
pretty much everyone voted RSA a MUST NOT which would indicate that no-one's
going to miss it.

Peter.