Re: [Gen-art] Gen-ART Last Call review of draft-iab-crypto-alg-agility-07.txt

Russ Housley <housley@vigilsec.com> Tue, 01 September 2015 23:41 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D1C71B502F; Tue, 1 Sep 2015 16:41:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id boOR2kVKDXT6; Tue, 1 Sep 2015 16:41:11 -0700 (PDT)
Received: from odin.smetech.net (x-bolt-wan.smeinc.net [209.135.219.146]) by ietfa.amsl.com (Postfix) with ESMTP id 4DA251B5085; Tue, 1 Sep 2015 16:41:11 -0700 (PDT)
Received: from localhost (unknown [209.135.209.5]) by odin.smetech.net (Postfix) with ESMTP id A7DEDF24126; Tue, 1 Sep 2015 19:41:00 -0400 (EDT)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([209.135.209.4]) by localhost (ronin.smeinc.net [209.135.209.5]) (amavisd-new, port 10024) with ESMTP id MfkCFWwcqHbN; Tue, 1 Sep 2015 19:39:43 -0400 (EDT)
Received: from [192.168.2.100] (pool-108-51-128-219.washdc.fios.verizon.net [108.51.128.219]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id A443DF2412B; Tue, 1 Sep 2015 19:40:39 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset="us-ascii"
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <E87B771635882B4BA20096B589152EF63A8C9181@eusaamb107.ericsson.se>
Date: Tue, 01 Sep 2015 19:40:28 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <B3AB6849-3274-423D-B508-34B93E0B4A1C@vigilsec.com>
References: <E87B771635882B4BA20096B589152EF63A8C9181@eusaamb107.ericsson.se>
To: Suresh Krishnan <suresh.krishnan@ericsson.com>
X-Mailer: Apple Mail (2.1085)
Archived-At: <http://mailarchive.ietf.org/arch/msg/gen-art/QTxV8HxXIkboymDG4IBfGbT1t98>
Cc: "draft-iab-crypto-alg-agility.all@ietf.org" <draft-iab-crypto-alg-agility.all@ietf.org>, General Area Review Team <gen-art@ietf.org>
Subject: Re: [Gen-art] Gen-ART Last Call review of draft-iab-crypto-alg-agility-07.txt
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Sep 2015 23:41:13 -0000

Suresh:

Thanks for the review.

> Summary: The draft is almost ready for publication as a BCP but I do 
> have some comments you may wish to address.
> 
> Minor
> =====
> 
> * Section 1
> 
> Not sure what becomes more feasible in this sentence. I am assuming that 
> it is an attack becoming more feasible. If so, suggest rewording to
> something like.
> 
> OLD:
> 
> As new cryptanalysis techniques are developed and computing capabilities 
> improve, the work factor to break a particular cryptographic algorithm 
> will reduce, becoming more feasible for more attackers.
> 
> NEW:
> 
> As new cryptanalysis techniques are developed and computing capabilities 
> improve, the work factor to break a particular cryptographic algorithm 
> will reduce, thus making it more susceptible to attackers.

Does this resolve your concern?  I have provided the whole paragraph because it pulls in some discussion from the SAAG list as well.

   Cryptographic algorithms age; they become weaker with time.  As new
   cryptanalysis techniques are developed and computing capabilities
   improve, the work required to break a particular cryptographic
   algorithm will reduce, making an attack on the algorithm more
   feasible for more attackers.  While it is unknown how cryptoanalytic
   attacks will evolve, it is certain that they will get better.  It is
   unknown how much better they will become, or when the advances will
   happen.  Advances in computing power available to the attacker will
   eventually make any algorithm obsolete.  For this reason, protocols
   need mechanisms to migrate from one algorithm suite to another over
   time.

> * Section 2.6
> 
> Would it be useful to put in a recommendation here to use strongest 
> possible algorithms/suites and longest possible keys for such long lived 
> trust anchor certificates?

I thought about that, but I was concerned that we would see silly key sizes.  I am aware of an attack that was mounted against a very well known site where the attacker provided bogus certificates that were signed with public keys that were 50,000+ bits long.  The attacker sent these over and over, until each of the servers in the data center were dong nothing but public key operations.  There were two fixes.  First, put a limit on the key size.  Second, validate the certificate before doing any operations with the embedded public key.  So, your suggestion is in violation to one part of the fix.

For performance, you want keys that are long enough to be safe and secure, perhaps with some margin, but not overkill.  I hope Section 2.7 already makes this point.

> * Section 3.4
> 
> The default server or
>    responder configuration SHOULD disable such algorithms

I do not understand this comment.

> * Security considerations
> 
> The reference to RFC5166 seems to be wrong and talks about evaluation of 
> congestion control mechanisms. Just randomly searching through the RFC 
> index led to me to RFC5116 that seems to be about authentication 
> encryption algorithms. If this is the correct reference, it needs to be 
> fixed in both this section and in the references section.

Oops.  It should reference RFC 5116.


> Editorial
> =========
> 
> * The document is missing a Table of contents. The ID guidelines 
> recommends a Table of Contents for drafts that are longer than 15 pages.

I added a Table of Contents.

> * Section 1
> 
> s/one or more algorithm identifier/one or more algorithm identifiers/

Fixed.

> * Section 2
> 
> OLD:
> one or more algorithm or suite identifier
> 
> NEW:
> one or more algorithm or suite identifiers

If you are talking about Section 2.1, this has been rewritten based on another comment:

   IETF protocols that make use of cryptographic algorithms MUST support
   one or more algorithm or suite.  The protocol MUST include a
   mechanism to identify the algorithm or suite that is being used.

> * Section 2.2
> 
> OLD:
> one or more strong mandatory-to-implement algorithm or suite
> 
> NEW:
> one or more strong mandatory-to-implement algorithm or suites

Fixed.

> * Section 3.1
> 
> s/The IETF has alway/The IETF has always/

Fixed.

> s/as well as meeting/and should also meet/

How about:

   The selected
   algorithms need to be resistant to side-channel attacks and also meet
   the performance, power, and code size requirements on a wide variety
   of platforms.


> s/depending of the population/depending on the population/

Fixed.

Thanks again,
  Russ