Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt

Jan-Frederik Rieckers <rieckers@dfn.de> Tue, 05 March 2024 13:00 UTC

Return-Path: <rieckers@dfn.de>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2301FC14F71B for <emu@ietfa.amsl.com>; Tue, 5 Mar 2024 05:00:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.108
X-Spam-Level:
X-Spam-Status: No, score=-7.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dfn.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u68TNgfky4QO for <emu@ietfa.amsl.com>; Tue, 5 Mar 2024 04:59:58 -0800 (PST)
Received: from a1004.mx.srv.dfn.de (a1004.mx.srv.dfn.de [IPv6:2001:638:d:c301:acdc:1979:2:58]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AAFD3C14F6F0 for <emu@ietf.org>; Tue, 5 Mar 2024 04:59:55 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=dfn.de; h= content-type:content-type:in-reply-to:organization:from:from :references:content-language:subject:subject:user-agent :mime-version:date:date:message-id:received; s=s1; t=1709643590; x=1711457991; bh=N1er0RJJZTPE69u54wS/cMXeVaoZriD1J6ra4i8xnNM=; b= oDrjGqephhcg2ZBTBWxmYiqLe59oSg3OSfP45363+9Ul5HKzsG2ku7/VuFazF7oi pVUz0tv/EXEkaiQhCwwWJinzOeGBuO6yrAcOHLc7EMHvI5mULriJ+dNukVZYYlkA VKKTt2IekJkN9VspyrTVs9u8mtOBuVNf7nIJyVJ30YU=
Received: from mail.dfn.de (mail.dfn.de [IPv6:2001:638:d:c102::150]) by a1004.mx.srv.dfn.de (Postfix) with ESMTPS id 024E62000EA for <emu@ietf.org>; Tue, 5 Mar 2024 13:59:49 +0100 (CET)
Received: from [IPV6:2a02:8106:57:952a:c8a6:5f15:1740:f30c] (unknown [IPv6:2a02:8106:57:952a:c8a6:5f15:1740:f30c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mspool2.in.dfn.de (Postfix) with ESMTPSA id B9B5D3D6 for <emu@ietf.org>; Tue, 5 Mar 2024 13:59:49 +0100 (CET)
Message-ID: <3b96cb5d-a745-4dcf-bba8-cf67cdfc7e96@dfn.de>
Date: Tue, 05 Mar 2024 13:59:38 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
References: <170932527085.22824.18343512124707075119@ietfa.amsl.com> <66bca1b2-4b2d-429d-8f85-5c76d29005ad@dfn.de> <c2951f3d-bcc7-4b90-bcdd-077a506dd464@app.fastmail.com> <5e5f794d-a260-4fc4-b4c0-fbe13ed54691@dfn.de> <2A73CDC3-9D44-433B-8948-405917CA69F0@deployingradius.com> <bf52a9e3-bcf9-4e69-962d-42b6bb975142@app.fastmail.com> <CAA7Lko8diwXstKPKb1++tkS58xYFmoHTbR__ndz77-DkJ227ZA@mail.gmail.com> <9ddcd434-c72d-4bcf-aeb6-a57b5314becb@dfn.de> <3D962ED4-D5B4-4BAD-AB2C-AB8999EF7A48@deployingradius.com>
From: Jan-Frederik Rieckers <rieckers@dfn.de>
Organization: DFN e.V.
To: emu@ietf.org
In-Reply-To: <3D962ED4-D5B4-4BAD-AB2C-AB8999EF7A48@deployingradius.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-512"; boundary="------------ms050803080009040307080305"
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/DrRq7SSg0BGvaQXAOyd-eWZPyFU>
Subject: Re: [Emu] New Version Notification for draft-janfred-eap-fido-02.txt
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Mar 2024 13:00:02 -0000


On 05.03.24 13:40, Alan DeKok wrote:
> On Mar 5, 2024, at 5:46 AM, Jan-Frederik Rieckers <rieckers@dfn.de> wrote:
>> Well, the beauty of CBOR is that it is very easily extendable.
>> I completely agree that, with the limited list of map keys, using CBOR instead of TLVs seems like shooting cannons at mosquitos, but if in the future we want to do more with this, we can.
> 
>    Extensibility also has its downsides.  If we're not sure we need the functionality, then *unused* functionality is ripe for exploits or issues.

Definitely, and I'm keeping that in mind. (thanks for explicitly 
pointing it out though)

I think there are examples of both. Standards that are too restrictive, 
where people had to misuse some protocol aspects to extend it (or it 
just never reached a noticeable deployment stage, because elements were 
missing and they couldn't extend it without breaking compatibility), and 
too open standards where the extensibility itself was misused and a 
target vector for attacks.

I hope we can find some middle ground where everyone is happy about the 
limitations and the extensibility.

> 
>> Resource exhaustion is a problem in CBOR, as it is in any other serialization/deserialization solution.
> 
>    If we only need 3 pieces of data, none nested, then CBOR has more issues than TLVs, due to it's inherent nesting.
> 
>    i.e. the temptation for implementors is to pass the raw CBOR data to a CBOR library.  Which means nested structures, complex maps, etc.  And none of that will be used by EAP-FIDO.
> 
>    For now I'd suggest concentrating on getting the crypto right, and the request / response exchange.  Data encoding can always be changed before it's widely implemented.

+1
The current CBOR message format is actually for me too a reminder of 
what data needs to be sent when and by whom, this won't change if we 
switch to TLVs or use base64url-encoded XML for transmission. (/sarcasm 
hint: ok, the XML is maybe a bit too extreme)

> 
>> They also limit the length of a CBOR message, with a recommendation that every authenticator MUST support at least messages of 1024 bytes and that platforms have to respect the max message length signaled by the authenticator.
> 
>    So EAP-FIDO would also need to negotiate / signal message length?

Not necessarily. The negotiation between Authenticator and platforn in 
FIDO/CTAP is done because the authenticators possibly have very limited 
capabilities, so they need to negotiate that. For EAP-FIDO I think it 
would be reasonable to just go with the 16k limit for TLS record (if I 
remember correctly this is the limit for one TLS record)

> 
>> We could say something similar about the allowed depth and length of the CBOR messages sent in EAP-FIDO.
> 
>    Is that fixed, or negotiated?

If we stay with CBOR, I would just have that depth fixed in the 
specification. I think it is reasonable to have a limit on there. And if 
some extension in the future wants to have a deeper CBOR structure, 
there is always the possibility to encode the data as byte sequence, so 
implementations that don't understand this can just skip it, but 
implementations which do understand it can send any data they want.

Cheers,
Janfred

-- 
Herr Jan-Frederik Rieckers
Security, Trust & Identity Services

E-Mail: rieckers@dfn.de | Fon: +49 30884299-339 | Fax: +49 30884299-370
Pronomen: er/sein | Pronouns: he/him
__________________________________________________________________________________

DFN - Deutsches Forschungsnetz | German National Research and Education 
Network
Verein zur Förderung eines Deutschen Forschungsnetzes e.V.
Alexanderplatz 1 | 10178 Berlin
https://www.dfn.de

Vorstand: Prof. Dr.-Ing. Stefan Wesner | Prof. Dr. Helmut Reiser | 
Christian Zens
Geschäftsführung: Dr. Christian Grimm | Jochem Pattloch
VR AG Charlottenburg 7729B | USt.-ID. DE 136623822