Re: [Gen-art] Gen-ART LC Review of draft-ietf-dhc-forcerenew-nonce-03

Ben Campbell <ben@nostrum.com> Mon, 13 February 2012 21:25 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4ABD421E803A; Mon, 13 Feb 2012 13:25:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.523
X-Spam-Level:
X-Spam-Status: No, score=-102.523 tagged_above=-999 required=5 tests=[AWL=0.076, BAYES_00=-2.599, HTML_MESSAGE=0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WLuApz9pbQM9; Mon, 13 Feb 2012 13:25:14 -0800 (PST)
Received: from nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by ietfa.amsl.com (Postfix) with ESMTP id 71D0F21E8038; Mon, 13 Feb 2012 13:25:14 -0800 (PST)
Received: from dn3-53.estacado.net (vicuna-alt.estacado.net [75.53.54.121]) (authenticated bits=0) by nostrum.com (8.14.3/8.14.3) with ESMTP id q1DLP3Fp038815 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 13 Feb 2012 15:25:08 -0600 (CST) (envelope-from ben@nostrum.com)
Mime-Version: 1.0 (Apple Message framework v1257)
Content-Type: multipart/alternative; boundary="Apple-Mail=_FD17B377-A142-41D5-8A0D-80B8A1583758"
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <EADDD673-E8FF-4579-9996-1E15C8933A70@nominum.com>
Date: Mon, 13 Feb 2012 15:25:01 -0600
Message-Id: <D332B6D7-8855-44EE-8952-CACACCFE211D@nostrum.com>
References: <A57C4722-5E13-451E-ACB4-CAA8064FA68B@nostrum.com> <282BBE8A501E1F4DA9C775F964BB21FE3EC1467FB2@GRFMBX704BA020.griffon.local> <CEA6CD8F-7DCD-448C-8C31-EC64FD9902A3@nominum.com> <F184B794-3D1D-4A5A-860E-288DF2600DD6@nostrum.com> <EADDD673-E8FF-4579-9996-1E15C8933A70@nominum.com>
To: Ted Lemon <Ted.Lemon@nominum.com>
X-Mailer: Apple Mail (2.1257)
Received-SPF: pass (nostrum.com: 75.53.54.121 is authenticated by a trusted mechanism)
Cc: The IETF <ietf@ietf.org>, "gen-art@ietf.org Review Team" <gen-art@ietf.org>, "draft-ietf-dhc-forcerenew-nonce.all@tools.ietf.org" <draft-ietf-dhc-forcerenew-nonce.all@tools.ietf.org>, Ullio Mario <mario.ullio@telecomitalia.it>, "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>, Maglione Roberta <roberta.maglione@telecomitalia.it>
Subject: Re: [Gen-art] Gen-ART LC Review of draft-ietf-dhc-forcerenew-nonce-03
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/gen-art>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Feb 2012 21:25:15 -0000

On Feb 13, 2012, at 3:21 PM, Ted Lemon wrote:

> On Feb 13, 2012, at 4:06 PM, Ben Campbell wrote:
>> Do I infer correctly from your comment that the security properties of the mechanism don't really matter? That is, if the attacker we care about can't eavesdrop in the first place, does this really need to be an HMAC?
> 
> Hm, I thought about that a bit more after I wrote my response.   The HMAC allows us to avoid sending the nonce in the clear in the DHCPFORCERENEW.   I don't think this adds any value from a security perspective, actually, even though it feels more comfortable.   I suspect it was put in in the original version simply because of that—why send a secret over the wire when you don't have to?   However, the original motivation for using the mechanism from RFC3315 was to avoid defining a new mechanism for a legacy protocol.   If we do need to change it, it's going to require a major rework of the document, and a lot of delay, so if it causes no harm, I think that's not worth doing.

I concur it's probably not worth changing at this point--but it does inform the "is MD5 good enough" discussion, which might make it worth mentioning in the security considerations.

> 
> I too would like to see the text I proposed added to the security considerations, so that we can be clear about what is being accomplished with this draft.
>