Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-sha2-02

"Peck, Michael A" <mpeck@mitre.org> Fri, 23 May 2014 01:23 UTC

Return-Path: <mpeck@mitre.org>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E0761A02A5 for <kitten@ietfa.amsl.com>; Thu, 22 May 2014 18:23:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.851
X-Spam-Level:
X-Spam-Status: No, score=-4.851 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bdXS5wkJEB6b for <kitten@ietfa.amsl.com>; Thu, 22 May 2014 18:23:27 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id F3F9A1A02A3 for <kitten@ietf.org>; Thu, 22 May 2014 18:23:26 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 2FEE11F0F00; Thu, 22 May 2014 21:23:25 -0400 (EDT)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 170371F0EFF; Thu, 22 May 2014 21:23:25 -0400 (EDT)
Received: from IMCMBX04.MITRE.ORG ([169.254.4.72]) by IMCCAS03.MITRE.ORG ([129.83.29.80]) with mapi id 14.03.0174.001; Thu, 22 May 2014 21:23:24 -0400
From: "Peck, Michael A" <mpeck@mitre.org>
To: Benjamin Kaduk <kaduk@MIT.EDU>, "kitten@ietf.org" <kitten@ietf.org>
Thread-Topic: [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-sha2-02
Thread-Index: AQHPcx/5JCOL4NptgUaVEI9X1UFtfJtNYsoAgAACIIA=
Date: Fri, 23 May 2014 01:23:24 +0000
Message-ID: <CFA4177F.E034%mpeck@mitre.org>
References: <52AE9A65.1010700@oracle.com> <53799133.70201@oracle.com> <alpine.GSO.1.10.1405221659110.25244@multics.mit.edu>
In-Reply-To: <alpine.GSO.1.10.1405221659110.25244@multics.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.1.140326
x-originating-ip: [172.31.16.136]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <59F1BE9343F53C41892065B3784F1F63@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/kitten/2zW1N-lTm0utYRKVdyJ1NBDKeWs
Subject: Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-sha2-02
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 May 2014 01:23:29 -0000

Ben,

Thanks for the comments, I'll fix those.

Could you help me understand or give an example of what the pseudo-random
function defined in the protocol parameters is used for?  I'm not quite
following the RFC 3961 section 3 definition.

We already separately define how a base-key is derived from a passphrase
(in cases where a passphrase is used), and how the Kc, Ke, and Ki keys are
derived from the base-key. What are the additional use cases for a generic
PRF?

Right now our pseudo-random function definition refers to KDF-HMAC-SHA2,
which we define in section 3 but in the context of deriving the base-key,
Kc, Ke, or Ki key (so that we get the right output length) rather than
arbitrary keys, so we may need to clean up that language a bit.  Then
you're right that it just says "HMAC" which would mean an output of 256 or
384 bits, which probably isn't right (RFC 3961 says the "pseudo-random
function should generate an octet string of some size" - but how do we
know what size is needed?).  Also, calling HMAC a second time rather than
just passing the octet-string (and perhaps a desired output length?) into
KDF-HMAC-SHA2 may be redundant.

Thanks,
Mike

On 5/22/14, 5:15 PM, "Benjamin Kaduk" <kaduk@MIT.EDU> wrote:

>On Mon, 19 May 2014, Shawn M Emery wrote:
>
>>
>> This message officially starts the kitten Working Group Last Call for
>>the 
>> following document:
>>
>> AES Encryption with HMAC-SHA2 for Kerberos 5
>> http://tools.ietf.org/html/draft-ietf-kitten-aes-cts-hmac-sha2-02
>>
>> The Working Group Last Call for this document starts today on Sunday,
>>May 
>> 18th and will end on Sunday, June 1st.
>
>This looks pretty much okay.
>
>A few minor things:
>
>The specification of en/decryption in section 5 assigns the new
>cipherstate as "next-to-last 128-bit block of C"; this is slightly
>ambiguous when C does not end on a block boundary.  I believe the intent
>is that the last full block will be used in this case, but one could read
>the current text as saying that the next-to-last full block would be used.
>Also, the description of D() says it is an AES encryption function, not a
>decryption function.
>
>There are no test vectors for the PRF.  Having such vectors would also
>make it clear what the output length of the PRF is (luckily, we are not
>using the simplified profile, with its ambiguous language "truncate tmp1
>to multiple of m").  (The PRF output length looks to be 256 and 384 bits
>for the two variants, to me.)
>
>In section 8.1, "at least 128 bits of random" feels ungrammatical.  Also
>in that section, the third and fourth bullet points may be specific to
>the 
>MIT krb5 implementation; it might be worth tweaking the wording to
>reflect 
>that this is only known to affect some implementations, or something like
>that.
>
>I did not attempt to verify the test vectors.
>
>-Ben
>
>_______________________________________________
>Kitten mailing list
>Kitten@ietf.org
>https://www.ietf.org/mailman/listinfo/kitten