Re: [ieee-ietf-coord] Fwd: [802.1 - 11898] Proposed PAR: P802.1AR: Standard for Local and metropolitan area networks - Secure Device Identity

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 05 October 2016 21:05 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: ieee-ietf-coord@ietfa.amsl.com
Delivered-To: ieee-ietf-coord@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8C2A129458 for <ieee-ietf-coord@ietfa.amsl.com>; Wed, 5 Oct 2016 14:05:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.297
X-Spam-Level:
X-Spam-Status: No, score=-7.297 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-2.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XeR5Ovm-NuQk for <ieee-ietf-coord@ietfa.amsl.com>; Wed, 5 Oct 2016 14:05:13 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B508E129406 for <ieee-ietf-coord@ietf.org>; Wed, 5 Oct 2016 14:05:12 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id AEAFABE74; Wed, 5 Oct 2016 22:05:10 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X-R33tshcvmh; Wed, 5 Oct 2016 22:05:08 +0100 (IST)
Received: from [10.87.48.210] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id E417FBE73; Wed, 5 Oct 2016 22:05:07 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1475701508; bh=vq2765/gpdznKl4WfdVO0Op+pQSsicby0hY2MFDt2ZY=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=BdDrgIcZj3Yh/uYOrlxoYV4833d35LQK5N1Iv05agmX9J3BVH4A+c1zqXpPSXIgsO LaLbTlPLGdYGYhqhl30y3oWd6sD9PP5H0d+Zsrc6QH00eWdkD65hDHjmZiaMrpwMUS uOniPzKj6/8ghri7QcVBaFQXS8MuLR9CdkdKtLHc=
To: Mick Seaman <mickseaman@gmail.com>, Dan Romascanu <dromasca@gmail.com>, ieee-ietf-coord@ietf.org
References: <DB6PR0701MB27116693B152DB98A4CDBE5A8BC40@DB6PR0701MB2711.eurprd07.prod.outlook.com> <CAFgnS4WUEq4yr9qkLyaEuG2Yrrgef0RvA9LNwTXzWhNUVWcQ3w@mail.gmail.com> <2b2c098f-8d57-e775-bf6d-b77c819fbbaa@cs.tcd.ie> <030b90fc-0b28-38ea-c061-efe9574cd4a2@sbcglobal.net> <ac93f508-adc1-51c9-ef04-34242c632829@cs.tcd.ie> <0da64480-28b3-8b27-b181-f951916a84ac@gmail.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <4312b1ab-45ef-207d-be7c-1192e71050be@cs.tcd.ie>
Date: Wed, 05 Oct 2016 22:05:08 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0
MIME-Version: 1.0
In-Reply-To: <0da64480-28b3-8b27-b181-f951916a84ac@gmail.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms060907000200060507000804"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ieee-ietf-coord/J3RlvE3gkR39Ha1U1OtIzzFrunY>
Cc: Brian Weis <bew@CISCO.COM>, Karen Randall <karen@RANDALL-CONSULTING.COM>
Subject: Re: [ieee-ietf-coord] Fwd: [802.1 - 11898] Proposed PAR: P802.1AR: Standard for Local and metropolitan area networks - Secure Device Identity
X-BeenThere: ieee-ietf-coord@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Management-level discussions between IEEE and IETF on topics of interest to both SDOs <ieee-ietf-coord.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ieee-ietf-coord>, <mailto:ieee-ietf-coord-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ieee-ietf-coord/>
List-Post: <mailto:ieee-ietf-coord@ietf.org>
List-Help: <mailto:ieee-ietf-coord-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ieee-ietf-coord>, <mailto:ieee-ietf-coord-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2016 21:05:15 -0000

Hiya,

On 05/10/16 21:57, Mick Seaman wrote:
> Hi Stephen,
> 
> Given that we already have already approved P-384 SHA-384 project and
> those that wanted that still want it now, I don't think it would be fair
> play to take a ballot comment from the P802.1ARce Task Group ballot that
> said "turn this from an amendment into a revision for technical editing
> reasons" and come back with a response "yes, and delay this already
> approved  project". And yes, Suite B (I believe), but I don't think we
> need to go reargue the fact that we are adding P-384 SHA-384.

So if this is to meet the requirements of those with customers
who need Suite-B then just saying so would be much clearer and
would avoid folks (like me:-) commenting.

> 
> I agree with the sentiment on new curves and deterministic and RNGs, but
> that can be in an amendment.

Again, I'd argue deterministic should be included (and be the
default) unless "meets Suite-B needs" is more important than
security, in which case being explicit about that is wise really.
Either position can be reasonable but those who do not need
Suite-B would I'm sure appreciate knowing what's what if they
are encouraged to support this.

> Should be fairly easy for someone to look
> at our existing draft and come up with the couple of pages to add the
> required text and a proposal to do that and argue that specific case.
> Where I do not want to be with this project is refereeing a three
> cornered fight between the proponents of adding various other curves,
> those that want to minimize the number of curves for interoperability,
> and those still waiting for  the initial amendment to complete. There
> was a fair amount of proposed hostage taking first time round. Each
> specific curve proposal should stand or fall purely on its own merits,
> and that means taking them as separate items of projects and ruling out
> on-going horse-trading.

Yeah, CFRG had all the your-curve/my-curve fun a couple of years
back. But at least for IETF purposes I think that's all sorted
now and 25519 and 448 plus the legacy NIST curves are the ones,
and only ones, folks are looking at afaik. (Well, there's one
organisation who may still be holding out for other curves that
I can think of, but only one organisation.)

S.

> 
> Mick
> 
> 
> On 10/5/2016 1:21 PM, Stephen Farrell wrote:
>> Hiya,
>>
>> On 05/10/16 19:14, Mick Seaman wrote:
>>> Hi Stephen,
>>>
>>> This proposed revision PAR for the existing IEEE Std 802.1AR-2009 will
>>> replace the amendment PAR P802.1ARce which just added P-384 SHA-384.
>>>
>>> It turned out during the course of that work that the original 802.1AR
>>> was not constructed in a way that made extensions to new curves easy. It
>>> had started life very focused on RSA and ECC curves were shoehorned in
>>> late in the day. Basically taking the form "X is done like this but if
>>> you are using ECC then ..".
>> Yeah, we've seen that with IETF protocols too and ended up
>> re-structuring how we handle ECC in a number of cases. It
>> was well worth doing as some initial data structures were
>> far too over-general in ways that encouraged some weaknesses.
>>
>>> This resulted in a much longer project than desirable given the pressing
>>> need for P-384 SHA-384,
>> I'm surprised about a pressing need? Unless it's some kind
>> of suite-B special thing that is. Many folks don't seem to
>> consider stronger than 128-bit equivalent that interesting
>> for ECC other than for window dressing (IMO the reason why
>> we ended up adding Curve448 was just for window dressing as
>> we knew someone would demand "stronger than that";-)
>>
>>> and much more of a shake up to the document that
>>> could be justified under an amendment PAR - hence the revision PAR which
>>> will then be followed by withdrawal of the amendment PAR. That having
>>> been done it should now be much easier to add new curves (the starting
>>> point of this project is not a blank sheet or even the existing standard
>>> but a much updated amendment of the latter). However it would be sad if
>>> the emergence of new curves further delayed P-384 SHA-384. Having got
>>> the structured sorted out new curves can be added by an amendment, and
>>> the process of completing the Revision (as currently) scoped plus the
>>> addition of a further curve by amendment should not take any longer than
>>> holding the revision open to add a new curve. It is always quicker to
>>> take things in bite sized chunks.
>> I'm totally not following the IEEE minutiae there, but that's ok.
>>
>> You didn't get to deterministic signatures. That's probably more
>> of a deal than new curves for 802 devices I'd say given how bad
>> we know folks are at finding good randomness. (That said, if the
>> main justification here is suite-B then you've no freedom to
>> improve there anyway so it doesn't matter.)
>>
>> Anyway, if this is a suite-B thing, it'd be better to explicitly
>> say that. If not, then I'd really strongly recommend deterministic
>> signatures and then also adding in new curves into the mix explicitly.
>> (EDDSA as used in IETF protocols only does things deterministically.)
>>
>> And just for those who might not follow all the fun of ECDSA, if
>> you ever sign twice with the same supposed-to-be-but-not-random
>> value (or a random output that repeats because it's not long enough
>> or your PRNG isn't good enough) then you give the world your private
>> key value. And that has been seen in the wild. I assume in this case
>> that'd mean that the attacker could enter the enterprise network
>> which is precisely the thing that signing was intended to prevent.
>>
>> (Apologies if that's already handled in 802-land;-)
>>
>>> I should clarify further than these are not new long lived identifiers.
>>> They are X.509 certs (and the information around those to support/use
>>> them in particular ways). They are referenced by (and the way they were
>>> intended to be used fits with)  RFC 7030 Enrollment over Secure
>>> Transport (Standards Track), as well as by the informational internet
>>> draft draft-pritikin-bootstrapping-keyinfrastructures-1 Bootstrapping
>>> Key Infrastructures. The development of IEEE Std 802.1AR-2009 preceded
>>> and informed that IETF work with participants attending both groups.
>>>
>>> A section on "Privacy considerations" already appears in the P802.1ARce
>>> draft (related material was already in 802.1AR-2009 but renaming that to
>>> fit the mood of the times is appropriate) . The "Scope" statement in the
>>> PAR matches exactly that of the existing IEEE Std 802.
>> Sure, and I don't know what implementers tend to add this kind of
>> thing. I can say that I'd prefer to not have it in kit in my home
>> at all, (or fully turned off if the code is there) but can see why
>> enterprises would like to use it. If those kinds of consideration
>> are going to be covered well, then that's great. If not, then I'd
>> worry a bit that we end up disimproving privacy yet again because
>> we didn't think enough about it. (And the "we" there isn't meant to
>> mean IEEE or IETF but all of us;-)
>>
>> Cheers,
>> S.
>>
>>
>>
>>> Mick Seaman
>>>
>>> Chair, IEEE 802.1 Security Task Group
>>>
>>>
>>> On 10/5/2016 3:22 AM, Stephen Farrell wrote:
>>>> Hiya,
>>>>
>>>> On 05/10/16 10:48, Dan Romascanu wrote:
>>>>> Please see below the proposed PAR of IEEE 802.1AR. If there are any
>>>>> questions, comments, or concerns from the IETF participants, please
>>>>> make
>>>>> sure that Glenn Parsons sees them.
>>>> I had a quick look at the PDFs included there and have a
>>>> couple of questions:
>>>>
>>>> 1) Wouldn't it be a fine plan to include consideration of
>>>> the privacy aspects of (new) long-lived identifiers in
>>>> this work? Given that IEEE are rightly considering things
>>>> like MAC address randomisation, the same issues that cause
>>>> us to be interested in that will cause us to want to try
>>>> be privacy sensitive when introducing any new long-lived
>>>> identifiers. The upshot of that might not be any change
>>>> to protocol, but could e.g. be a recommendation for the
>>>> kind(s) of nodes for which these new long-lived identifiers
>>>> are (un)suitable. Equally however, there could be protocol
>>>> features that would be more or less privacy-friendly so
>>>> explicitly considering that seems to me like it'd be a
>>>> good plan.
>>>>
>>>> 2) The PAR refers to NIST curves which is fine. In the IETF
>>>> context there is also a lot of interest in use of the
>>>> "cfrg curves" (Curve25519 and Curve448) which have some
>>>> properties that are desirable from a performance and
>>>> security POV. Similarly, deterministic signatures (i.e.
>>>> not requiring a good random number for each signature)
>>>> have significant security benefits. I wondered if these
>>>> kinds of issue would be in scope? (FWIW I think it'd be
>>>> a good plan if they were also considered.)
>>>>
>>>> Cheers,
>>>> S.
>>>>
>>>>
>>>>> Thanks and Regards,
>>>>>
>>>>> Dan
>>>>>
>>>>> ---------- Forwarded message ----------
>>>>> From: Glenn Parsons <glenn.parsons@ericsson.com>
>>>>> Date: Wed, Oct 5, 2016 at 8:25 AM
>>>>> Subject: [802.1 - 11898] Proposed PAR: P802.1AR: Standard for Local
>>>>> and
>>>>> metropolitan area networks - Secure Device Identity
>>>>> To: STDS-802-1-L@listserv.ieee.org
>>>>>
>>>>>
>>>>> Ballots due October 23: P802.1Qcc/D1.1, P802.1Xck D0.8
>>>>>     Due October 24: P802c/D1.2
>>>>> For particulars see
>>>>>     www.ieee802.org/1/email-pages/ballots.html
>>>>> This list strips out HTML. For  more format and size rules, see
>>>>> "Sending"
>>>>> at
>>>>> 802.1 list help: www.ieee802.org/1/email-pages/zmqw1113.html
>>>>> -----
>>>>>
>>>>> Colleagues
>>>>> This is a PAR  for a revision -- P802.1AR:  Standard for Local and
>>>>> metropolitan area networks - Secure Device Identity -- for
>>>>> pre-submission
>>>>> to the EC for approval in November.
>>>>> The September 802.1 interim meeting was authorized to discuss this and
>>>>> produced this PAR:
>>>>> http://ieee802.org/1/files/public/docs2016/ar-seaman-rev-
>>>>> draft-par-0916-v02.pdf
>>>>> As well as the accompanying CSD:
>>>>> http://ieee802.org/1/files/public/docs2016/ar-seaman-rev-
>>>>> draft-csd-0916-v02.pdf
>>>>> I would request that this be considered for review by all WGs at the
>>>>> November plenary, and also be considered for approval by the EC.
>>>>> Please let me know if you have any comments or questions.
>>>>> Cheers,
>>>>> Glenn.
>>>>>
>>>>> -- 
>>>>> Glenn Parsons - Chair, IEEE 802.1
>>>>> glenn.parsons@ericsson.com<mailto:glenn.parsons@ericsson.com>
>>>>> +1-613-963-8141
>>>>>
>>>>>
>>>>>
>>>>> ===
>>>>> Unsubscribe link:
>>>>> mailto:STDS-802-1-L-SIGNOFF-REQUEST@LISTSERV.IEEE.ORG
>>>>> IEEE. Fostering technological innovation and excellence for the
>>>>> benefit of
>>>>> humanity.
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> ieee-ietf-coord mailing list
>>>>> ieee-ietf-coord@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/ieee-ietf-coord
>>>>>
>>> _______________________________________________
>>> ieee-ietf-coord mailing list
>>> ieee-ietf-coord@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ieee-ietf-coord
>