Re: [Gen-art] Gen-ART review of draft-ietf-marf-redaction-04

<david.black@emc.com> Wed, 11 January 2012 07:38 UTC

Return-Path: <david.black@emc.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98A1A21F884A; Tue, 10 Jan 2012 23:38:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.592
X-Spam-Level:
X-Spam-Status: No, score=-106.592 tagged_above=-999 required=5 tests=[AWL=0.007, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hVL1roMscuMS; Tue, 10 Jan 2012 23:38:57 -0800 (PST)
Received: from mexforward.lss.emc.com (mexforward.lss.emc.com [128.222.32.20]) by ietfa.amsl.com (Postfix) with ESMTP id AA66921F8846; Tue, 10 Jan 2012 23:38:57 -0800 (PST)
Received: from hop04-l1d11-si01.isus.emc.com (HOP04-L1D11-SI01.isus.emc.com [10.254.111.54]) by mexforward.lss.emc.com (Switch-3.4.3/Switch-3.4.3) with ESMTP id q0B7cksC029723 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 11 Jan 2012 02:38:47 -0500
Received: from mailhub.lss.emc.com (mailhub.lss.emc.com [10.254.222.129]) by hop04-l1d11-si01.isus.emc.com (RSA Interceptor); Wed, 11 Jan 2012 02:38:33 -0500
Received: from mxhub01.corp.emc.com (mxhub01.corp.emc.com [10.254.141.103]) by mailhub.lss.emc.com (Switch-3.4.3/Switch-3.4.3) with ESMTP id q0B7cTgd021556; Wed, 11 Jan 2012 02:38:29 -0500
Received: from mx14a.corp.emc.com ([169.254.1.99]) by mxhub01.corp.emc.com ([10.254.141.103]) with mapi; Wed, 11 Jan 2012 02:38:28 -0500
From: david.black@emc.com
To: msk@cloudmark.com, ietf@cybernothing.org, gen-art@ietf.org, ietf@ietf.org
Date: Wed, 11 Jan 2012 02:38:26 -0500
Thread-Topic: Gen-ART review of draft-ietf-marf-redaction-04
Thread-Index: AczQCujbMXhqirD5Sk6EB1sS2KVtOQACZtUQAAZ2BJA=
Message-ID: <7C4DFCE962635144B8FAE8CA11D0BF1E05A7B80D8B@MX14A.corp.emc.com>
References: <7C4DFCE962635144B8FAE8CA11D0BF1E05A7B80D63@MX14A.corp.emc.com> <F5833273385BB34F99288B3648C4F06F19C6C157F4@EXCH-C2.corp.cloudmark.com>
In-Reply-To: <F5833273385BB34F99288B3648C4F06F19C6C157F4@EXCH-C2.corp.cloudmark.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-EMM-MHVC: 1
Cc: presnick@qualcomm.com, marf@ietf.org
Subject: Re: [Gen-art] Gen-ART review of draft-ietf-marf-redaction-04
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/gen-art>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jan 2012 07:38:58 -0000

Hi Murray,

Thanks for the quick response.

> These are all good points.  My gut reaction is to say that this is all good advice and entirely
> correct but probably goes a little far for the problem space we're trying to address.  

That sounds reasonable to me, and I like John Levine's suggestion to add material to explain
more about the level of security that is appropriate for this problem space and why.  In light
of such an explanation, an HMAC-based mechanism could well be overkill.

> - make a SHOULD suggestion as to the minimum redaction key length (instead of a requirement)
> - make a SHOULD suggestion as to the type of hash to be used (instead of a requirement)

I have a hard time believing that the examples used in the review ("a" as the redaction
key, CRC as the hash) are ever acceptable, and for that reason, I think a couple of MUSTs
would be in order to prohibit that sort of nonsense.  In particular:

	- I think there ought to be a MUST minimum length requirement
		on the redaction key string to prevent really short ones.
	- I think use of a secure hash ought to be a MUST to prevent
		use of CRC and other bad ideas.

That could be accompanied by additional guidance that may or may not be "SHOULDs", e.g.,
suggest a SHA2 hash as a good secure hash, suggest use of a longer string than the
minimum requirement.

> > [2] The second open issue is absence of security considerations for the redaction
> > key.  The security considerations section needs to caution that the redaction key
> > is a secret key that must be managed and protected as a secret key.
> > Disclosure of a redaction key removes the redaction from all reports that used
> > that key. As part of this, guidance should be provided on when and how to change
> > the redaction key in order to limit the effects of loss of secrecy for a single
> > redaction key.
>
> Also a good point.  I don't think this is the right place to introduce advice about key rotation and
> the like as those are well-discussed concepts, so instead Security Considerations can simply make
> reference to such material elsewhere.  I'll go find some.  I know there's stuff like that in RFC6376
> (DKIM) but I'm sure there are better ones.

That would be fine - introducing the concept of key rotation as a means to reduce the impact of key
compromise accompanied by a reference to a longer explanation elsewhere seems reasonable.

Thanks,
--David

> -----Original Message-----
> From: Murray S. Kucherawy [mailto:msk@cloudmark.com]
> Sent: Tuesday, January 10, 2012 11:41 PM
> To: Black, David; ietf@cybernothing.org; gen-art@ietf.org; ietf@ietf.org
> Cc: marf@ietf.org; presnick@qualcomm.com
> Subject: RE: Gen-ART review of draft-ietf-marf-redaction-04
> 
> > -----Original Message-----
> > From: david.black@emc.com [mailto:david.black@emc.com]
> > Sent: Tuesday, January 10, 2012 6:44 PM
> > To: ietf@cybernothing.org; Murray S. Kucherawy; gen-art@ietf.org; ietf@ietf.org
> > Cc: david.black@emc.com; marf@ietf.org; presnick@qualcomm.com
> > Subject: Gen-ART review of draft-ietf-marf-redaction-04
> 
> Hi David, thanks for the review.
> 
> > [1] The first open issue is the absence of security guidance to ensure that this
> > redaction technique effectively hides the redacted information.  The redaction
> > technique is to concatenate a secret string (called the "redaction key") to the
> > information to be redacted, apply "any hashing/digest algorithm", convert the output
> > to base64 and use that base64 string to replace the redacted information.
> > [...]
> >
> > I suggest a couple of changes:
> > 1) Change "any hashing/digest algorithm" to require use of a secure hash, and
> > 	explain what is meant by "secure hash" in the security considerations section.
> > 2) Require a minimum length of the "redaction key" string, and strongly suggest
> > 	(SHOULD) that it be randomly generated (e.g., by running sufficient output
> > 	of an entropy-rich random number generator through a base64 converter).
> >
> > For the latter change, figure out the amount of entropy that should be used
> > for redaction - the recommended string length will be larger because printable
> > ASCII is not entropy-dense (at best it's good for 6 bits of entropy in each
> > 8-bit character, and human-written text such as this message has significantly
> > less).
> >
> > From a pure security perspective, use of HMAC with specified secure hashes
> > (SHA2-family) and an approach of hashing the "redaction key" down to a binary
> > key for HMAC would be a stronger approach. I suggest that authors consider
> > approach, but there may be practical usage concerns that suggest not
> > adopting it.
> 
> These are all good points.  My gut reaction is to say that this is all good advice and entirely
> correct but probably goes a little far for the problem space we're trying to address.  Thus, my
> inclination is to make the following changes (subject to WG consensus):
> 
> - add all of this advice to Security Considerations, with forward references to it elsewhere in the
> document
> - make a SHOULD suggestion as to the minimum redaction key length (instead of a requirement)
> - make a SHOULD suggestion as to the type of hash to be used (instead of a requirement)
> 
> Would those be sufficient?
> 
> > [2] The second open issue is absence of security considerations for the redaction
> > key.  The security considerations section needs to caution that the redaction key
> > is a secret key that must be managed and protected as a secret key.
> > Disclosure of a redaction key removes the redaction from all reports that used
> > that key. As part of this, guidance should be provided on when and how to change
> > the redaction key in order to limit the effects of loss of secrecy for a single
> > redaction key.
> 
> Also a good point.  I don't think this is the right place to introduce advice about key rotation and
> the like as those are well-discussed concepts, so instead Security Considerations can simply make
> reference to such material elsewhere.  I'll go find some.  I know there's stuff like that in RFC6376
> (DKIM) but I'm sure there are better ones.
> 
> > Editorial Nit: I believe that "anonymization" is a better description of what
> > this draft is doing (as opposed to "redaction"), particularly as the result is
> > intended to be correlatable via string match across reports from the
> > same source.
> 
> Fair enough.  We can add a sentence to that effect in the Introduction.
> 
> To the MARF working group: Please let me know if the above suggestions suffice (reply only to the marf
> list, please).  I will summarize and have a new version ready to publish when LC closes, and make sure
> David sees it around the same time.
> 
> -MSK