Re: [ieee-ietf-coord] Fwd: [802.1 - 11898] Proposed PAR: P802.1AR: Standard for Local and metropolitan area networks - Secure Device Identity

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 05 October 2016 20:21 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: ieee-ietf-coord@ietfa.amsl.com
Delivered-To: ieee-ietf-coord@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AFDC129474 for <ieee-ietf-coord@ietfa.amsl.com>; Wed, 5 Oct 2016 13:21:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.297
X-Spam-Level:
X-Spam-Status: No, score=-7.297 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-2.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PNX3GM88ZcpA for <ieee-ietf-coord@ietfa.amsl.com>; Wed, 5 Oct 2016 13:21:27 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D36E129893 for <ieee-ietf-coord@ietf.org>; Wed, 5 Oct 2016 13:21:24 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 2FFA4BE7B; Wed, 5 Oct 2016 21:21:21 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ftMNLf9bkxeS; Wed, 5 Oct 2016 21:21:17 +0100 (IST)
Received: from [10.87.48.210] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 0BD17BE74; Wed, 5 Oct 2016 21:21:17 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1475698877; bh=d9p3kQD+DjdZrxbEHzh3dzTA8t2lisHVCVUe2om1JfI=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=oqfaAIVWX0wd3sQF5CU1uHYK+uFMaPYvPqgquWmdpyZO/6rqXA/RNooFy67WgRprL 1vsOlKteUWHi+OZN8FNW96c6kLOqUB5qB7rI7LZ61uDdYvfvVqrfBYrmrltAPXqZKc TIo2+y3TPx880sLFb6F/tSRpljt79634gIXHfS6M=
To: Mick Seaman <mickseaman@sbcglobal.net>, Dan Romascanu <dromasca@gmail.com>, ieee-ietf-coord@ietf.org
References: <DB6PR0701MB27116693B152DB98A4CDBE5A8BC40@DB6PR0701MB2711.eurprd07.prod.outlook.com> <CAFgnS4WUEq4yr9qkLyaEuG2Yrrgef0RvA9LNwTXzWhNUVWcQ3w@mail.gmail.com> <2b2c098f-8d57-e775-bf6d-b77c819fbbaa@cs.tcd.ie> <030b90fc-0b28-38ea-c061-efe9574cd4a2@sbcglobal.net>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <ac93f508-adc1-51c9-ef04-34242c632829@cs.tcd.ie>
Date: Wed, 05 Oct 2016 21:21:17 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0
MIME-Version: 1.0
In-Reply-To: <030b90fc-0b28-38ea-c061-efe9574cd4a2@sbcglobal.net>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms070506070004090401000305"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ieee-ietf-coord/D_1KOxQrhfTzASlfnPzlxC8TZbo>
Cc: Mick Seaman <mick_seaman@ieee.org>, Glenn Parsons <glenn.parsons@ericsson.com>
Subject: Re: [ieee-ietf-coord] Fwd: [802.1 - 11898] Proposed PAR: P802.1AR: Standard for Local and metropolitan area networks - Secure Device Identity
X-BeenThere: ieee-ietf-coord@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Management-level discussions between IEEE and IETF on topics of interest to both SDOs <ieee-ietf-coord.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ieee-ietf-coord>, <mailto:ieee-ietf-coord-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ieee-ietf-coord/>
List-Post: <mailto:ieee-ietf-coord@ietf.org>
List-Help: <mailto:ieee-ietf-coord-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ieee-ietf-coord>, <mailto:ieee-ietf-coord-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2016 20:21:30 -0000

Hiya,

On 05/10/16 19:14, Mick Seaman wrote:
> Hi Stephen,
> 
> This proposed revision PAR for the existing IEEE Std 802.1AR-2009 will
> replace the amendment PAR P802.1ARce which just added P-384 SHA-384.
> 
> It turned out during the course of that work that the original 802.1AR
> was not constructed in a way that made extensions to new curves easy. It
> had started life very focused on RSA and ECC curves were shoehorned in
> late in the day. Basically taking the form "X is done like this but if
> you are using ECC then ..".

Yeah, we've seen that with IETF protocols too and ended up
re-structuring how we handle ECC in a number of cases. It
was well worth doing as some initial data structures were
far too over-general in ways that encouraged some weaknesses.

> 
> This resulted in a much longer project than desirable given the pressing
> need for P-384 SHA-384, 

I'm surprised about a pressing need? Unless it's some kind
of suite-B special thing that is. Many folks don't seem to
consider stronger than 128-bit equivalent that interesting
for ECC other than for window dressing (IMO the reason why
we ended up adding Curve448 was just for window dressing as
we knew someone would demand "stronger than that";-)

> and much more of a shake up to the document that
> could be justified under an amendment PAR - hence the revision PAR which
> will then be followed by withdrawal of the amendment PAR. That having
> been done it should now be much easier to add new curves (the starting
> point of this project is not a blank sheet or even the existing standard
> but a much updated amendment of the latter). However it would be sad if
> the emergence of new curves further delayed P-384 SHA-384. Having got
> the structured sorted out new curves can be added by an amendment, and
> the process of completing the Revision (as currently) scoped plus the
> addition of a further curve by amendment should not take any longer than
> holding the revision open to add a new curve. It is always quicker to
> take things in bite sized chunks.

I'm totally not following the IEEE minutiae there, but that's ok.

You didn't get to deterministic signatures. That's probably more
of a deal than new curves for 802 devices I'd say given how bad
we know folks are at finding good randomness. (That said, if the
main justification here is suite-B then you've no freedom to
improve there anyway so it doesn't matter.)

Anyway, if this is a suite-B thing, it'd be better to explicitly
say that. If not, then I'd really strongly recommend deterministic
signatures and then also adding in new curves into the mix explicitly.
(EDDSA as used in IETF protocols only does things deterministically.)

And just for those who might not follow all the fun of ECDSA, if
you ever sign twice with the same supposed-to-be-but-not-random
value (or a random output that repeats because it's not long enough
or your PRNG isn't good enough) then you give the world your private
key value. And that has been seen in the wild. I assume in this case
that'd mean that the attacker could enter the enterprise network
which is precisely the thing that signing was intended to prevent.

(Apologies if that's already handled in 802-land;-)

> 
> I should clarify further than these are not new long lived identifiers.
> They are X.509 certs (and the information around those to support/use
> them in particular ways). They are referenced by (and the way they were
> intended to be used fits with)  RFC 7030 Enrollment over Secure
> Transport (Standards Track), as well as by the informational internet
> draft draft-pritikin-bootstrapping-keyinfrastructures-1 Bootstrapping
> Key Infrastructures. The development of IEEE Std 802.1AR-2009 preceded
> and informed that IETF work with participants attending both groups.
> 
> A section on "Privacy considerations" already appears in the P802.1ARce
> draft (related material was already in 802.1AR-2009 but renaming that to
> fit the mood of the times is appropriate) . The "Scope" statement in the
> PAR matches exactly that of the existing IEEE Std 802.

Sure, and I don't know what implementers tend to add this kind of
thing. I can say that I'd prefer to not have it in kit in my home
at all, (or fully turned off if the code is there) but can see why
enterprises would like to use it. If those kinds of consideration
are going to be covered well, then that's great. If not, then I'd
worry a bit that we end up disimproving privacy yet again because
we didn't think enough about it. (And the "we" there isn't meant to
mean IEEE or IETF but all of us;-)

Cheers,
S.



> 
> Mick Seaman
> 
> Chair, IEEE 802.1 Security Task Group
> 
> 
> On 10/5/2016 3:22 AM, Stephen Farrell wrote:
>> Hiya,
>>
>> On 05/10/16 10:48, Dan Romascanu wrote:
>>> Please see below the proposed PAR of IEEE 802.1AR. If there are any
>>> questions, comments, or concerns from the IETF participants, please make
>>> sure that Glenn Parsons sees them.
>> I had a quick look at the PDFs included there and have a
>> couple of questions:
>>
>> 1) Wouldn't it be a fine plan to include consideration of
>> the privacy aspects of (new) long-lived identifiers in
>> this work? Given that IEEE are rightly considering things
>> like MAC address randomisation, the same issues that cause
>> us to be interested in that will cause us to want to try
>> be privacy sensitive when introducing any new long-lived
>> identifiers. The upshot of that might not be any change
>> to protocol, but could e.g. be a recommendation for the
>> kind(s) of nodes for which these new long-lived identifiers
>> are (un)suitable. Equally however, there could be protocol
>> features that would be more or less privacy-friendly so
>> explicitly considering that seems to me like it'd be a
>> good plan.
>>
>> 2) The PAR refers to NIST curves which is fine. In the IETF
>> context there is also a lot of interest in use of the
>> "cfrg curves" (Curve25519 and Curve448) which have some
>> properties that are desirable from a performance and
>> security POV. Similarly, deterministic signatures (i.e.
>> not requiring a good random number for each signature)
>> have significant security benefits. I wondered if these
>> kinds of issue would be in scope? (FWIW I think it'd be
>> a good plan if they were also considered.)
>>
>> Cheers,
>> S.
>>
>>
>>> Thanks and Regards,
>>>
>>> Dan
>>>
>>> ---------- Forwarded message ----------
>>> From: Glenn Parsons <glenn.parsons@ericsson.com>
>>> Date: Wed, Oct 5, 2016 at 8:25 AM
>>> Subject: [802.1 - 11898] Proposed PAR: P802.1AR: Standard for Local and
>>> metropolitan area networks - Secure Device Identity
>>> To: STDS-802-1-L@listserv.ieee.org
>>>
>>>
>>> Ballots due October 23: P802.1Qcc/D1.1, P802.1Xck D0.8
>>>    Due October 24: P802c/D1.2
>>> For particulars see
>>>    www.ieee802.org/1/email-pages/ballots.html
>>> This list strips out HTML. For  more format and size rules, see
>>> "Sending"
>>> at
>>> 802.1 list help: www.ieee802.org/1/email-pages/zmqw1113.html
>>> -----
>>>
>>> Colleagues
>>> This is a PAR  for a revision -- P802.1AR:  Standard for Local and
>>> metropolitan area networks - Secure Device Identity -- for
>>> pre-submission
>>> to the EC for approval in November.
>>> The September 802.1 interim meeting was authorized to discuss this and
>>> produced this PAR:
>>> http://ieee802.org/1/files/public/docs2016/ar-seaman-rev-
>>> draft-par-0916-v02.pdf
>>> As well as the accompanying CSD:
>>> http://ieee802.org/1/files/public/docs2016/ar-seaman-rev-
>>> draft-csd-0916-v02.pdf
>>> I would request that this be considered for review by all WGs at the
>>> November plenary, and also be considered for approval by the EC.
>>> Please let me know if you have any comments or questions.
>>> Cheers,
>>> Glenn.
>>>
>>> -- 
>>> Glenn Parsons - Chair, IEEE 802.1
>>> glenn.parsons@ericsson.com<mailto:glenn.parsons@ericsson.com>
>>> +1-613-963-8141
>>>
>>>
>>>
>>> ===
>>> Unsubscribe link: mailto:STDS-802-1-L-SIGNOFF-REQUEST@LISTSERV.IEEE.ORG
>>> IEEE. Fostering technological innovation and excellence for the
>>> benefit of
>>> humanity.
>>>
>>>
>>>
>>> _______________________________________________
>>> ieee-ietf-coord mailing list
>>> ieee-ietf-coord@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ieee-ietf-coord
>>>
> 
> _______________________________________________
> ieee-ietf-coord mailing list
> ieee-ietf-coord@ietf.org
> https://www.ietf.org/mailman/listinfo/ieee-ietf-coord