Re: [jose] I-D Action: draft-ietf-jose-json-web-encryption-09.txt

Richard Barnes <rlb@ipv.sx> Thu, 25 April 2013 22:10 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AF0221F970D for <jose@ietfa.amsl.com>; Thu, 25 Apr 2013 15:10:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 4.898
X-Spam-Level: ****
X-Spam-Status: No, score=4.898 tagged_above=-999 required=5 tests=[FH_RELAY_NODNS=1.451, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_33=0.6, RCVD_IN_PBL=0.509, RCVD_IN_SORBS_DUL=1.615, RDNS_NONE=0.1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R84Qz8EyDL-E for <jose@ietfa.amsl.com>; Thu, 25 Apr 2013 15:10:08 -0700 (PDT)
Received: from mail-ob0-x22f.google.com (mail-ob0-x22f.google.com [IPv6:2607:f8b0:4003:c01::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 82C2521F9709 for <jose@ietf.org>; Thu, 25 Apr 2013 15:10:08 -0700 (PDT)
Received: by mail-ob0-f175.google.com with SMTP id wp18so3029851obc.34 for <jose@ietf.org>; Thu, 25 Apr 2013 15:10:08 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:x-originating-ip:in-reply-to:references :date:message-id:subject:from:to:cc:content-type:x-gm-message-state; bh=vepGnlhwWjqOYl8i6pq7qHFAVv0wrTZzVXM85g+PDpQ=; b=bJiNpq89SBEluCwW1zXAsGC+DAOwpFk4viyaVKGi0iQ+24mE9uXOLjp3RPMwxI/7g3 2EGwDAKr1QDBqsYNBdS4JE50EjL5ndj3Q7NjV2Qb3QonWFlHxD5THIxdP+vb1lw9n/VO p6FxHHOULebj4HlHBpwYuWVUs1nw2YCeAtna4ZX/fGdFh4WGArHyngFVarpUJuj4bj8/ mYUOF2L9MStamOu1wdFnqcgmb3I90Qq4uzDY1DgN8Mzn0CKosuDoEr7dtYM6aoLryZFY ESq39YpgeTr4hkObB/oan7Vx8K+dGBtmmr69Q+LTV0bRRiS9aQ6aEea4WEBbg6Ai9A6r JnSQ==
MIME-Version: 1.0
X-Received: by 10.60.56.168 with SMTP id b8mr13363592oeq.5.1366927808004; Thu, 25 Apr 2013 15:10:08 -0700 (PDT)
Received: by 10.60.41.225 with HTTP; Thu, 25 Apr 2013 15:10:07 -0700 (PDT)
X-Originating-IP: [76.21.182.222]
In-Reply-To: <95BF000E-50B4-4D42-8F21-A6D5BE9D7A59@cisco.com>
References: <20130424002901.19246.69134.idtracker@ietfa.amsl.com> <014201ce416a$82761a80$87624f80$@augustcellars.com> <B9EADFAC-382A-40C3-937C-C07E77777273@vigilsec.com> <4E1F6AAD24975D4BA5B1680429673943676C00E2@TK5EX14MBXC283.redmond.corp.microsoft.com> <CAL02cgTmv_A+cs4eJ6oK4v3AqgxZA2q=wdV69ey4xydcaupGuw@mail.gmail.com> <95BF000E-50B4-4D42-8F21-A6D5BE9D7A59@cisco.com>
Date: Thu, 25 Apr 2013 18:10:07 -0400
Message-ID: <CAL02cgS--HVHXNs9W7Z6zOzr1e+V-zQpXTyrdN5-4PCRwxKsTw@mail.gmail.com>
From: Richard Barnes <rlb@ipv.sx>
To: Matt Miller <mamille2@cisco.com>
Content-Type: multipart/alternative; boundary="089e0149ca966e137304db36ae85"
X-Gm-Message-State: ALoCoQk7uiBbU6Lls//yIHCwyOQhFl9mtpgLk0Jl3dyyYPOVUaNu4mIdHu0Am6GBZ0g5mIXOM4Xc
Cc: Mike Jones <Michael.Jones@microsoft.com>, Russ Housley <housley@vigilsec.com>, "jose@ietf.org" <jose@ietf.org>
Subject: Re: [jose] I-D Action: draft-ietf-jose-json-web-encryption-09.txt
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Apr 2013 22:10:09 -0000

On Thu, Apr 25, 2013 at 6:02 PM, Matt Miller <mamille2@cisco.com> wrote:

>
> On Apr 25, 2013, at 3:56 PM, Richard Barnes <rlb@ipv.sx>
>  wrote:
>
> > On Thu, Apr 25, 2013 at 3:09 PM, Mike Jones <Michael.Jones@microsoft.com
> >wrote:
> >
> >> Hi Russ,
> >>
> >> I agree that enabling GCM to be safely used in the multiple recipients
> >> case would be highly desirable.  It is currently prohibited because if
> the
> >> recipients share a common key and initialization vector (IV) but use
> >> different AAD values, this results in the identified vulnerability.  One
> >> possible solution that continues integrity protecting the headers but
> >> enables the safe use of GCM was identified off-list by John Bradley.
> >>
> >> That solution is to have each recipient always use the same key, IV, and
> >> AAD values.  This could be accomplished by including all the header
> values
> >> in a single combined AAD value, rather than having the integrity
> protection
> >> for each recipient's headers be independent.
> >>
> >> This change could be done in a manner that doesn't affect the
> computation
> >> for the single recipients case.  Given the upcoming interim JOSE meeting
> >> next week, and given the (understandable) strong negative reaction to
> the
> >> unusability of GCM with the current multiple recipients processing
> rules,
> >> I'll plan on quickly producing a draft -10 that changes the processing
> >> rules in the manner described above, so that idea can be concretely
> >> considered by the working group next week.
> >>
> >> Just so people are clear on the properties on the new processing rules -
> >> this would mean that the integrity computations for each recipients
> would
> >> no longer be independent.  The only downside of this (which could be an
> >> upside in some ways) is that it would no longer be possible to add
> >> recipients over time without performing a new encryption computation
> with a
> >> new CEK and IV.
> >>
> >
> > As I said to John, that is not an acceptable solution because it breaks
> the
> > XMPP use case.  The minimum sensible change is to remove the
> per-recipient
> > info from the integrity check.
> >
>
> It is not clear to me how John's suggestion utterly breaks the XMPP use
> case, unless you have this alternate-reality version of XMPP-E2E you've not
> yet told me about (-:
>
> The current XMPP document already separates per-recipient info from the
> actual protected content.
>


I reject your reality and substitute my own! [1]

In my preferred reality, XMPP E2E doesn't have to do the alg=dir hack that
it does now.  The base format will support multiple recipients cleanly
enough to support the XMPP case as well.

In any case, preventing incremental addition of recipients is an arbitrary
and capricious restriction in the name of a non-existent security benefit.

--Richard


[1] http://www.youtube.com/watch?v=W8qcccZy03s



>
>
> - m&m
>
> Matt Miller < mamille2@cisco.com >
> Cisco Systems, Inc.
>
>