Re: [IPsec] AD review of draft-ietf-ipsecme-rfc7321bis

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Fri, 17 February 2017 20:02 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 168F412951B for <ipsec@ietfa.amsl.com>; Fri, 17 Feb 2017 12:02:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ll0vnbl-5Q05 for <ipsec@ietfa.amsl.com>; Fri, 17 Feb 2017 12:02:43 -0800 (PST)
Received: from mail-qt0-x22a.google.com (mail-qt0-x22a.google.com [IPv6:2607:f8b0:400d:c0d::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F7AC1294C6 for <ipsec@ietf.org>; Fri, 17 Feb 2017 12:02:43 -0800 (PST)
Received: by mail-qt0-x22a.google.com with SMTP id w20so49194564qtb.1 for <ipsec@ietf.org>; Fri, 17 Feb 2017 12:02:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=LfDHf5IihafyrG4BGKTLLIszS+OlJvblZYziG92UYBA=; b=TwZl+/9ElyaH8lHs6zIMFAFqMXJXKQkZt3SI2FmTlFL/BYyZS9WtCphCKAKplQlpxX ClVMWE06dLNBmNzDqUALGqyN+1mtOp3iiG0uvfi265VMkXqRrsup4xtNGrCtJyQE0/Ca c3KOAUM3hQGY9UjeF3Fh7uGGCEXtbMU2IRVkChQFCCZRuyHFZ3M46DX5o4AnuGPrQvzB y2TfeQ8jlGSDrRciIa2lJmI6136zFERy4DS8CzpgVLjhoVF9ccYDHlxOXeM7oBL3vSBb oM9N+kF4yH7Ha7tDCiQbQeChAFczPL4xKMgQTFn/QCsNjjAjMICspKURo8Yq7e41nmx3 2/Rg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=LfDHf5IihafyrG4BGKTLLIszS+OlJvblZYziG92UYBA=; b=bNGEeWeTQoUTJzyO70GSZrZTieS+wSKIqtuMKzbxcJDa1QPX3AkMYXaRCmm68fWNCl Jr6ISzLwONj2xHjeMJmnQu8GWPw1XdN7980+zRTYt47IQ7BS+6/6Fv3eeHCW9ERA7syG ill55+gHRhSX4f7DDYcaGrgTRrffv30BzVdIbWq/m9yfFqQy3TnIFRXNepeZOuQpH08H eJpwmVo89UKt59KKcTBFgrhS5+3QlAL25BTM7GoVT7EaFYhxeutPMosBc880FW6nyjR8 auu6u+EWQhMnHtlpqtjZtBy3z6Se0DDwVZcsh5O5QJox9Lw9JUMPG4PuO77jwhwntooA a1bw==
X-Gm-Message-State: AMke39lHH96Hthul7WosWJ5Qv8FcLwSIQgSivhJ627oMzi5UYoIIdk3y5VeBEhFIRDgpDJt9NPx07d+Pn0taLg==
X-Received: by 10.200.40.109 with SMTP id 42mr1582422qtr.257.1487361762671; Fri, 17 Feb 2017 12:02:42 -0800 (PST)
MIME-Version: 1.0
Received: by 10.12.170.30 with HTTP; Fri, 17 Feb 2017 12:02:42 -0800 (PST)
In-Reply-To: <alpine.LRH.2.20.1702171211350.17106@bofh.nohats.ca>
References: <CAHbuEH4K1MW8BitnOtmpoHwU6ZseqwNkYQTJ_YUE6cYxH9cshg@mail.gmail.com> <alpine.LRH.2.20.1702171211350.17106@bofh.nohats.ca>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Fri, 17 Feb 2017 15:02:42 -0500
Message-ID: <CAHbuEH4f_67DKywJNL=POTu-dF8Ewb7T0aYO6U=uxAd6ocxGKA@mail.gmail.com>
To: Paul Wouters <paul@nohats.ca>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/0bbDOpaZ7BtDtVN7RslTXWsy1M0>
Cc: "ipsec@ietf.org" <ipsec@ietf.org>
Subject: Re: [IPsec] AD review of draft-ietf-ipsecme-rfc7321bis
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Feb 2017 20:02:45 -0000

Hi Paul,

On Fri, Feb 17, 2017 at 12:17 PM, Paul Wouters <paul@nohats.ca> wrote:
> On Fri, 17 Feb 2017, Kathleen Moriarty wrote:
>
>> Thanks for your work on draft-ietf-ipsecme-rfc7321bis.  I just have
>> one big question and a nit to point out.
>>
>> Questions:  I see this:
>> 5.  ESP and AH Authentication Algorithms
>>
>>   Encryption without authentication MUST NOT be used.
>>
>> This is a big change from RFC7321 without much explanation. What about
>> the case of opportunistic security?  Can you explain the change and
>> justification?
>
>
> It is actually not much a change. If you look at 7321 Section 3, it states:
>
>         Confidentiality without authentication is not effective [DP07]
>         and therefore SHOULD NOT be used.

Yes, I saw that and agree security-wise that this is a bad practice.
But 7321 say a lot more on both ESP and AH authentication than that
one sentence.  What I am saying is that the change in this document
requires more text to explain it.

You also have the following text in that section:

   To provide both confidentiality and authentication, an authenticated
   encryption transform from Section 2.1 SHOULD be used in ESP, in
   conjunction with NULL authentication.

It's fine again with the following text:

   Alternatively, an ESP
   encryption transform and ESP authentication transform MAY be used
   together.  It is NOT RECOMMENDED to use ESP with NULL authentication
   in conjunction with AH; some configurations of this combination of
   services have been shown to be insecure [PD10].

Then at the end of the next paragraph:

   Therefore, an encryption
   transform MUST NOT be used with a NULL authentication transform
   (unless the encryption transform is an authenticated encryption
   transform from Section 2.1).

>
> Encryption without authentication is vulnerable to manipulation that can
> cause an oracle attack to compromise the encryption key as well.

yes.

>
> The 7321 document was a bit unclear with respect to encryption algos
> versus AEAD algos which might look like it allows a wider acceptance
> of encryption without authentication, but really does not intend to.

What I am saying is that it would be helpful to provide text to
explain the change.

>
>
>> Nits:
>> Section 4, third paragraph: s/theses/these/
>>
>>   Usually, the use of theses algorithms is limited to
>>   specific cases, and the absence of specification makes
>>   interoperability difficult for IPsec communications.
>
>
> I'll keep this in mind to correct at the RFC Editor round, unless we do
> another draft round if we need to change anything else.

Thanks.  I'd want it updated before IESG review, especially adding
text for the above changes.

>
> Thanks,
>
> Paul



-- 

Best regards,
Kathleen