Re: [ANNOUNCE] new release of the ParrotTalk protocol specification, version 3.7

Benjamin Kaduk <kaduk@mit.edu> Sat, 24 November 2018 01:05 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 913DF130DD9 for <ietf@ietfa.amsl.com>; Fri, 23 Nov 2018 17:05:09 -0800 (PST)
X-Quarantine-ID: <aXikKqgGKrfN>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER SECTION, Non-encoded 8-bit data (char 9C hex): Received: ...s kaduk@ATHENA.MIT.EDU)\n\t\234by outgoing.mit[...]
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aXikKqgGKrfN for <ietf@ietfa.amsl.com>; Fri, 23 Nov 2018 17:05:06 -0800 (PST)
Received: from dmz-mailsec-scanner-3.mit.edu (dmz-mailsec-scanner-3.mit.edu [18.9.25.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28A76130DCF for <ietf@ietf.org>; Fri, 23 Nov 2018 17:05:06 -0800 (PST)
X-AuditID: 1209190e-dd5ff70000005fd9-32-5bf8a3bfe458
Received: from mailhub-auth-2.mit.edu ( [18.7.62.36]) (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-3.mit.edu (Symantec Messaging Gateway) with SMTP id B1.43.24537.0C3A8FB5; Fri, 23 Nov 2018 20:05:04 -0500 (EST)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-2.mit.edu (8.14.7/8.9.2) with ESMTP id wAO150Or002473; Fri, 23 Nov 2018 20:05:01 -0500
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) �by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id wAO14uUI019312 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 23 Nov 2018 20:04:58 -0500
Date: Fri, 23 Nov 2018 19:04:55 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Robert <robert.withers@pm.me>
Cc: IETF discussion list <ietf@ietf.org>
Subject: Re: [ANNOUNCE] new release of the ParrotTalk protocol specification, version 3.7
Message-ID: <20181124010455.GC68416@kduck.kaduk.org>
References: <SyrakryPyk1zzTAO_b_NyUPXPt4l3W1m9vt55Lg1m7sHhi1fi2TCmIbQCH5pqFtPpvR4rFWm-6DxNCGTCN7rSMBmGMnRSVx6v5xu_z2kKDI=@protonmail.com> <CAPt1N1n_kzQyeoy_fXKz3BLjiUYqWq2J9sm4=0STjeX51H+yjw@mail.gmail.com> <c1cFwZUvofxtc2Y63oyZ8Cz9iX3tT9IlAdPVAD-sfOh-fUy4sFXV9WEpO_tp7hownBT__us64FXidemK1QnrxGlShvK66z39f7ReNGj-j5s=@protonmail.com> <CABcZeBN64hbJ-hp+7Q9pzX+u0nv6Fiq0XYY_v22EB_no23Cy2A@mail.gmail.com> <c4Q4L5o9q57cegtvu6-TJHQnWk6TQ1viHoFm4gDiZCWVEHCZkZtJp2wqy8xwlaud8ND1vfwTM1sZglurtvhonqVhyJ29-TeGZ3BcawFZegs=@pm.me> <CABcZeBN1NfyhdBVudHQ=MgXmtun4T6RzCwO52aLV6k6DuPx8BA@mail.gmail.com> <t38KwxRgyMAO2FEgbcBgacosv9RyYIrEzW9WbGWm_k78VRe_OOj58fY_BEwYN_Zcpk3i52rZRuQHnb4MP2YSuZzbUoPX5cmVTDnPsqZrqVA=@pm.me>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <t38KwxRgyMAO2FEgbcBgacosv9RyYIrEzW9WbGWm_k78VRe_OOj58fY_BEwYN_Zcpk3i52rZRuQHnb4MP2YSuZzbUoPX5cmVTDnPsqZrqVA=@pm.me>
User-Agent: Mutt/1.9.1 (2017-09-22)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprNKsWRmVeSWpSXmKPExsUixG6nontg8Y9ogz9vdS2ebZzPYnFy1g4W ByaPJUt+Mnkc3XOOLYApissmJTUnsyy1SN8ugSvja6tfwbGEivZFrg2M8/27GDk5JARMJNYt +8nUxcjFISSwhkli9ooP7BDORkaJ76d/sUA4d5kkzl8+yQTSwiKgKvH84CJ2EJtNQEWiofsy M4gtIqAoMevuRUYQm1lAQ2LtxL9sILawQLRER8dcFhCbF2jdmxN3odadYZU48KQBKiEocXLm ExaIZnWJP/MuAQ3lALKlJZb/44AIy0s0b53NDNLLKdDIKLHo1CewI0QFlCX29h1in8AoOAvJ qFlIRs1CGDULyagFjCyrGGVTcqt0cxMzc4pTk3WLkxPz8lKLdI31cjNL9FJTSjcxgsKaU5Jv B+OkBu9DjAIcjEo8vAbMP6KFWBPLiitzDzFKcjApifLemg8U4kvKT6nMSCzOiC8qzUktPsQo wcGsJML7zQEox5uSWFmVWpQPk5LmYFES5/0l8jhaSCA9sSQ1OzW1ILUIJivDwaEkweu5CKhR sCg1PbUiLTOnBCHNxMEJMpwHaPgckBre4oLE3OLMdIj8KUZLjmt//09n5ni1vGkGM0fHumVz mIVY8vLzUqXEeblBGgRAGjJK8+BmgtKURPb+mleM4kAvCvMaglTxAFMc3NRXQAuZgBbKz/8O srAkESEl1cCoV1x9wO6y/i6f7RwzC3K1GKWSZd4xbdDuP5w7+XGM0dVvOTlqmz7qrTp43n6h 14wlWrJdG+df2lXadcuoTC/apifGqs3q/fWuFt/8Ook9Dj8ERSa9unHr972GiTr9h+9c4dm9 yCn+/8uLhSstrU4anZAJ3/ysJmpP4jn1/xbmR6f+KthzSNVbiaU4I9FQi7moOBEAWyIa/y4D AAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/gPlk1wDiO1SJFz843RUvN4WRLHs>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Nov 2018 01:05:10 -0000

Hi Robert,

I have two comments:

(1) You keep referring to an "IETF document", but linking to a PDF in a
github repo.  This is pretty jarring, as the normal IETF workflow is to
submit an internet-draft to the IETF datatracker (via
https://datatracker.ietf.org/submit/) and then we can use normal IETF tools
for viewing the document.  If there is no submitted I-D or intent to do so,
the work should not be called an "IETF document".  (In some usages of the
term, an "IETF document" would further need to be adopted by an IETF WG (or
similar) for the term to apply.)

(2) This list is the general IETF discussion list, with the list charter
at https://tools.ietf.org/html/rfc3005 .  Given that you are talking about
a new (to the IETF) key exchange protocol, I would suggest taking the
discussion to a more topical list, e.g., secdispatch@ietf.org, rather than
subjecting the entire IETF discusion list to this traffic, which is in
effect preliminary technical discussions that are likely to only be of
interest to those interested in the more specific topical area.

-Ben

On Wed, Nov 21, 2018 at 11:59:11PM +0000, Robert wrote:
> Hello Eric,
> 
> I have updated the IETF document. You are absolutely right, I derived this document from my implementations and much of it is still code pastes to document the hash padding, for instance. I went through and changed to the describing the message structures to now be proper ASN1 Structure definitions, but there are still many code pastes from Squeak and Java.
> 
> I added the text describing the Diffie Hellman Key Exchange is in Section 6.1 on page 12.
> 
> https://github.com/CallistoHouseLtd/ParrotTalk/blob/master/docs/draft-withers-parrot-talk-v36-01.pdf
> 
> I am sure I do not understand how to go about adding nonces, to the DH Key Exchange. Could you speak to how I should create and use them, please?  I am using this Java code to generate a secret:
> 
> SecureRandom random = SecureRandom.getInstance("SHA1PRNG");
> secret = definitePrime(prime.bitLength(), random);
> 
> I am unsure how to add Nonces. If nonces would produce more reliable security, I am all for adding it if I knew how. As well, I hear you say I should mix in the protocol transcript, by which I think you mean the bytes sent over the wire up to this point. I am using such transcript bytes in calculating the signature. Are you suggesting I add them into the DH calculation of the secret?
> 
> You see, I am very implementation focussed and not very bright when it comes to the abstract level of discussing security. I took this protocol from the VatTP of Erights.org and modified it somewhat. (I removed the searchPath). I am very grateful for you all taking the time to consider my proposal and giving me such good feedback.
> 
> Humbly,
> Robert
> 
> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On Wednesday, November 21, 2018 10:44 AM, Eric Rescorla <ekr@rtfm.com> wrote:
> 
> > On Wed, Nov 21, 2018 at 3:35 AM Robert <robert.withers@pm.me> wrote:
> >
> >> Yes, I should add the parameters used for difffieHellman. It is standard DH key exchange with a generator of 2 and the prime is prime from rfc3526: 2048-bit MODP Group (https://tools.ietf.org/html/rfc3526#section-3). SharedKeyPadPositiveByteArray, adds an intial 0 if the bytes are 2s complement negative. This matches the byteArray produced by Java's diffieHellman.
> >
> > OK. You should specify this. I would like to note two points here:
> >
> > - I do not see nonces being mixed in. This is potentially safe if you guarantee fresh DH shares for each connection, but if both sides replay their DH shares (which I don't see you forbidding), then you have some very serious key reuse problems. For this reason, you would be better served to add some nonces. Perhaps I missed something.
> > - It's generally not a good idea to assume that the DH function provides contributive behavior. If you compare to (e.g., TLS 1.3), you will see that the current style is to mix in most of the protocol transcript.
> >
> >> I will try to give my opinion why this protocol is superior. It is a minimal protocol to establish an encrypted connection. I view it as a positive that it does not use Certificates, you just need public and private keys for each agent.
> >
> > This is possible to do with TLS as well, using RFC 7250.
> >
> >> . For myself, that is the real advantage of the ParrotTalk protocol is its implementation in Squeak/Pharo and its Java implementation. I would suggest that you load the code and explore the design.
> >
> > I doubt that I or others are likely to do that. If you want people to review your protocol, it's usually necessary to produce a sufficiently clear document that they are able to understand the document without reference to the code. As I indicated in my previous message, in my opinion that is not the case for the document as-is.
> >
> >> After many iterations I came up with the ThunkStack, managing the connection. The other aspect which is a strong advantage is that all the headers used in the message flow are defined as ASN1 structures, so this represents a solid standard for messaging to bring about the minimal protocol. With my Java code, one can see the ASN1 encoder and the ParrotTalk impl can be easily ported to new languages, thus my one issue with ParrotTalk is to implement in C, C++, C#, Objective-C, Rust, Dart, etcetera. Port ASN1 then port ParrotTalk. Currently, ParrotTalk in Squeak/Pharo and Java are bit-compatible and interoperable.
> >
> > This form of interoperability is generally a property of all the protocols we design, regardless of the language used to specify the protocol.
> >
> > As you observe, it is often helpful to specify the protocol messages (PDUs) for a protocol in a formal language, and depending on the relative complexity of the PDUs compared to the complexity of the language, this might or might not minimize implementation effort. For instance, TLS is specified in such a language [0] though IKE is not (it uses bit diagrams). Of course, it is also possible to retroactively design formal languages which allow you to express PDU formats which were previously expressed in bit diagrams and the like. So I'm not sure if I perceive this to be a sufficiently large advantage to justify designing an entirely new AKE.
> >
> > -Ekr
> >
> > [0] And in fact I believe that there is at least one TLS implementation which processes the formal language more or less directly.
> >
> >> A frame has this structure:
> >> { 8-byte frame spec | ASN1 Header | [payload] }
> >>
> >> A data frame over the wire looks like this with frame embedding:
> >> {8-byte spec | MAC (20-byte mac) | [ spec | Encrypted (ivSequence) | [ spec | Encoded | [ spec | RawData | [ RavenMessage ] ] ] ] }
> >>
> >> Regarding the comm stack, during Rendezvous, prior to an encrypted connection settling, here is what the stack looks like with the send buffering thunk and the SessionOperations managing the state machine and the SecurityOps for rendezvous negotiation
> >> 1: RavenTerminal
> >> 2: Session
> >> 3: SendFramesBuffer
> >> 4: SessionOperations (SecurityOps)
> >> 5: ReceivingFrameBuffer
> >> 6: SocketThunk
> >>
> >> And when rendezvous completes the fully encrypted stack looks like this:
> >> 1: RavenTerminal
> >> 2: Session
> >> 3: EncoderThunk (for de/serialization)
> >> 4: CustomsThunk (for MAC validation)
> >> 5: CipherThunk (for encryption)
> >> 6:; ImmigrationThunk (for MAC access)
> >> 7: SessionOperations (SecurityOps cleared)
> >> 8: ReceivingFrameBuffer
> >> 9: SocketThunk
> >> When I find the time and motivation, I may work SSL and SSH into the ThunkStack design as both implementations in the Cryptography repository are BROKEN. In porting SSL (TLS 1.2) I may extend to the new TLS 1.3, which has a quick three msg negotiation.
> >>
> >> I primarily documented both versions of the ParrotTalk protocol in two slideshows in the specified PDFs from my earlier msg and documented in the readme.MD.
> >>
> >> I hope I answered your questions to your satisfaction.
> >>
> >> Best,
> >> Robert
> >> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> >> On Tuesday, November 20, 2018 2:31 PM, Eric Rescorla <ekr@rtfm.com> wrote:
> >>
> >>> Robert,
> >>>
> >>> I took a quick look at this document. To be honest, it's a bit hard to make sense of. There's quite a bit of code and code-like stuff, abd not very much text. So, for instance, looking at page 18, I see "sharedKey := diffieHellman sharedKeyPadPositiveByteArray", but I don't see definitions for either diffieHellman or sharedKeyPadPositiveByteArray, so I don't know how to do this computation. If you would like people to provide opinions on this document, you will probably need to flesh it out more..
> >>>
> >>> With that said, a preliminary question: can you expand on the ways in which you believe this protocol to be superior to other Authenticated Key Agreement protocols that we have already standardized in IETF, such as IKE, SSH, or TLS?
> >>>
> >>> -Ekr
> >>>
> >>> On Tue, Nov 20, 2018 at 8:37 AM Robert <robert.withers=40protonmail.com@dmarc.ietf.org> wrote:
> >>>
> >>>> I am unsure why Facebook is considered a violation of what a sensible person would reach to, as it is not any sort of phishing scam. I also have a github project (https://github.com/CallistoHouseLtd/ParrotTalk) and the README.MD should prove descriptive. To satisfy your curiousity regarding what ParrotTalk is here is a description.
> >>>>
> >>>> ParrotTalk is an encrypted connection framework. Currently allowing anonymous 2048-bit key negotiation to establish user-provided encryption cipher and user-provided encoding and decoding, both through a provided SessionAgentMap to a starting SessionAgent server. Please look in the test case ThunkHelloWorldTest for building these maps and running a connection iwth data passing after encryption is established. There is a 4-way negotiation, from ProtocolOffered/Accepted to Go/GoToo. In using RSA 2048 signature validation and DH 2048 primes to establish the key used within the selected Cipher. The Cipher and Encoder are selected by name through the negotiation protocol. Currently three Ciphers are selectable, AESede, DESede, and DES. There are two encoders tested, asn1der, and Bytes. This protocol is described here, in these documents.
> >>>>
> >>>> The two protocol documents v3.6 and v3.7 are hosted on github:
> >>>> https://github.com/CallistoHouseLtd/ParrotTalk/blob/master/docs/ParrotTalkFrameDesign-3.7.pdf
> >>>>
> >>>> and
> >>>>
> >>>> https://github.com/CallistoHouseLtd/ParrotTalk/blob/master/docs/ParrotTalkFrameDesign-3.6.pdf
> >>>>
> >>>> Here is the IETF draft I wrote up for version 3.6, though not yet updated for version 3.7. The slides should suffice:
> >>>>
> >>>> https://github.com/CallistoHouseLtd/ParrotTalk/blob/master/docs/draft-withers-parrot-talk-v36-00.pdf
> >>>>
> >>>> Kindly,
> >>>> Robert
> >>>>
> >>>> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> >>>> On Tuesday, November 20, 2018 8:44 AM, Ted Lemon <mellon@fugue.com> wrote:
> >>>>
> >>>>> It would help to give enough information about what ParrotTalk is so that we know whether it's worth visiting the link..   However, that's moot, since it's a facebook link, and no sensible person is going to visit it.
> >>>>>
> >>>>> On Tue, Nov 20, 2018 at 1:09 AM Robert <robert.withers=40protonmail.com@dmarc.ietf.org> wrote:
> >>>>>
> >>>>>> Please read my Facebook post introducing the features of the new version 3.7 protocol of ParrotTalk, now a 5 message handshake, 3 messages like TLS 1.3 and an initial 2 message negotiation to determin which version of the protocol to use. My release of the Squeak/Pharo implementation which is capable of supporting both v3.6 and v3.7 in the same SessionAgent, spawning Sessions with either version, based on the negotiation. The Java version at https://github.com/CallistoHouseLtd/ParrotTalk can only talk v3.6 right now. The interesting feature of the Squeak/Pharo implementation is that it supports version negotiation for either version. Tests are all green.
> >>>>>>
> >>>>>> https://www.facebook.com/robert.withers
> >>>>>>
> >>>>>> best regards,
> >>>>>> Robert