Re: [Gen-art] Genart last call review of draft-ietf-core-object-security-08

Joel Halpern Direct <jmh.direct@joelhalpern.com> Fri, 23 February 2018 14:32 UTC

Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFA88124D6C; Fri, 23 Feb 2018 06:32:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FvDJzlMAL4FK; Fri, 23 Feb 2018 06:32:36 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D9971200FC; Fri, 23 Feb 2018 06:32:36 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 58EDD1C0691; Fri, 23 Feb 2018 06:32:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1519396356; bh=6Kdv+MN7ZOHs72CAWCtUntOiCu6nbdHzMLAfvMr4c5g=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=FCQZMAzTPFGMBM87qez1aD5Bk2JFLqiQRM26Ar74v3C+3OlSaJX1lo3ftlewtYJSM RCexsRIzBGXKY4Hjypb9cirxwfsfsRuq91/P2fXjNtS0E4BovStKq5LX3VbMS2L9AV KWvlsfRaIxUVYGc5EmvGmx6sslyc+OC4phTiPgcQ=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 8645C1C059F; Fri, 23 Feb 2018 06:32:35 -0800 (PST)
To: Göran Selander <goran.selander@ericsson.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "gen-art@ietf.org" <gen-art@ietf.org>
Cc: "draft-ietf-core-object-security.all@ietf.org" <draft-ietf-core-object-security.all@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "core@ietf.org" <core@ietf.org>
References: <151927150372.21177.1992679615718735268@ietfa.amsl.com> <D6B5A4CD.A00B9%goran.selander@ericsson.com> <f66dac5d-2bb8-dd17-645c-4ba53399d9cc@joelhalpern.com> <D6B5E2B8.A01B3%goran.selander@ericsson.com>
From: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Message-ID: <f913c2e0-2f1a-c1dc-5182-edde22b16956@joelhalpern.com>
Date: Fri, 23 Feb 2018 09:32:34 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <D6B5E2B8.A01B3%goran.selander@ericsson.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/AdFtuIc-LdAiFR9NVHvDV8MYrOo>
Subject: Re: [Gen-art] Genart last call review of draft-ietf-core-object-security-08
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Feb 2018 14:32:38 -0000

I guess it is up to you.  Personally, I like the idea of the verify 
description including some reference to how one actually does verify.
I will leave it to the authors and WG to decide what degree of clarity 
is called for here.

Yours,
Joel

On 2/23/18 9:30 AM, Göran Selander wrote:
> Hi Joel,
> 
> Thanks for quick feedback, inline.
> 
> On 2018-02-23 14:59, "Joel M. Halpern" <jmh@joelhalpern.com> wrote:
> 
>> In terms of my concerns, if Step 7 said "Verify and Decrypt the COSE
>> object using the Recipient Key as per RFC 5116 Section 2.2" that would
>> fill in the confusion for this reader.
> 
> Since the AEAD is used throughout the draft, in particular in other parts
> of this section I’m thinking that maybe we should add RFC 5116 to the list
> of specifications following "Readers are expected to be familiar with” in
> Section 1.1. Would that address your comment?
> 
> Thanks
> Göran
> 
> 
> 
>>
>> Yours,
>> Joel
>>
>> On 2/23/18 5:26 AM, Göran Selander wrote:
>>> Hi Joel,
>>>
>>> Thanks for your review. Comments inline.
>>>
>>>
>>> On 2018-02-22 04:51, "Joel Halpern" <jmh@joelhalpern.com> wrote:
>>>
>>>> Reviewer: Joel Halpern
>>>> Review result: Ready with Nits
>>>>
>>>> I am the assigned Gen-ART reviewer for this draft. The General Area
>>>> Review Team (Gen-ART) reviews all IETF documents being processed
>>>> by the IESG for the IETF Chair.  Please treat these comments just
>>>> like any other last call comments.
>>>>
>>>> For more information, please see the FAQ at
>>>>
>>>> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
>>>>
>>>> Document: draft-ietf-core-object-security-08
>>>> Reviewer: Joel Halpern
>>>> Review Date: 2018-02-21
>>>> IETF LC End Date: 2018-03-02
>>>> IESG Telechat date: 2018-03-08
>>>>
>>>> Summary: This document is ready for publication as a Proposed Standard
>>>> RFC
>>>>
>>>> Major issues: N/A
>>>>
>>>> Minor issues:
>>>>      In section 8.2 on verifying the request, step 5 says to "compose"
>>>> the
>>>>      Additional Authentication Data.  I would have expected it to be
>>>> "verify"
>>>>      the Additional Authentication Data.  I could imagine that the
>>>> verification
>>>>      consists of composing what it should be, and then comparing with
>>>> what
>>>> is
>>>>      received.  But I do not see the comparison step.  is it implicit in
>>>> some
>>>>      other step?  This occurs again in 8.4, so I presume I am simply
>>>> missing
>>>>      something.  This may suggest some clarification could be useful.
>>>
>>> The AAD is indeed “composed" both on encrypting and decrypting side from
>>> data which needs to be known to the endpoint at the time when the AEAD
>>> operation is performed. The authenticated decryption process is
>>> described
>>> in:
>>>
>>> https://tools.ietf.org/html/rfc5116#section-2.2
>>>
>>> So the verification consists of feeding the input, including the AAD, to
>>> the authenticated decryption which calculates the plain text or FAIL,
>>> and
>>> a failure may be - but is not necessarily - caused by wrong AAD.
>>>
>>> The AD review also indicated that we should move the reference to RFC
>>> 5116
>>> to an early section in the draft and that change is already included in
>>> the latest version on the CoRE WG Github.
>>>
>>>
>>> Best regards
>>> Göran
>>>
>