Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-sha2-02
"Peck, Michael A" <mpeck@mitre.org> Fri, 23 May 2014 01:23 UTC
Return-Path: <mpeck@mitre.org>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E0761A02A5 for <kitten@ietfa.amsl.com>; Thu, 22 May 2014 18:23:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.851
X-Spam-Level:
X-Spam-Status: No, score=-4.851 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bdXS5wkJEB6b for <kitten@ietfa.amsl.com>; Thu, 22 May 2014 18:23:27 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id F3F9A1A02A3 for <kitten@ietf.org>; Thu, 22 May 2014 18:23:26 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 2FEE11F0F00; Thu, 22 May 2014 21:23:25 -0400 (EDT)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 170371F0EFF; Thu, 22 May 2014 21:23:25 -0400 (EDT)
Received: from IMCMBX04.MITRE.ORG ([169.254.4.72]) by IMCCAS03.MITRE.ORG ([129.83.29.80]) with mapi id 14.03.0174.001; Thu, 22 May 2014 21:23:24 -0400
From: "Peck, Michael A" <mpeck@mitre.org>
To: Benjamin Kaduk <kaduk@MIT.EDU>, "kitten@ietf.org" <kitten@ietf.org>
Thread-Topic: [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-sha2-02
Thread-Index: AQHPcx/5JCOL4NptgUaVEI9X1UFtfJtNYsoAgAACIIA=
Date: Fri, 23 May 2014 01:23:24 +0000
Message-ID: <CFA4177F.E034%mpeck@mitre.org>
References: <52AE9A65.1010700@oracle.com> <53799133.70201@oracle.com> <alpine.GSO.1.10.1405221659110.25244@multics.mit.edu>
In-Reply-To: <alpine.GSO.1.10.1405221659110.25244@multics.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.1.140326
x-originating-ip: [172.31.16.136]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <59F1BE9343F53C41892065B3784F1F63@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/kitten/2zW1N-lTm0utYRKVdyJ1NBDKeWs
Subject: Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-sha2-02
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 May 2014 01:23:29 -0000
Ben, Thanks for the comments, I'll fix those. Could you help me understand or give an example of what the pseudo-random function defined in the protocol parameters is used for? I'm not quite following the RFC 3961 section 3 definition. We already separately define how a base-key is derived from a passphrase (in cases where a passphrase is used), and how the Kc, Ke, and Ki keys are derived from the base-key. What are the additional use cases for a generic PRF? Right now our pseudo-random function definition refers to KDF-HMAC-SHA2, which we define in section 3 but in the context of deriving the base-key, Kc, Ke, or Ki key (so that we get the right output length) rather than arbitrary keys, so we may need to clean up that language a bit. Then you're right that it just says "HMAC" which would mean an output of 256 or 384 bits, which probably isn't right (RFC 3961 says the "pseudo-random function should generate an octet string of some size" - but how do we know what size is needed?). Also, calling HMAC a second time rather than just passing the octet-string (and perhaps a desired output length?) into KDF-HMAC-SHA2 may be redundant. Thanks, Mike On 5/22/14, 5:15 PM, "Benjamin Kaduk" <kaduk@MIT.EDU> wrote: >On Mon, 19 May 2014, Shawn M Emery wrote: > >> >> This message officially starts the kitten Working Group Last Call for >>the >> following document: >> >> AES Encryption with HMAC-SHA2 for Kerberos 5 >> http://tools.ietf.org/html/draft-ietf-kitten-aes-cts-hmac-sha2-02 >> >> The Working Group Last Call for this document starts today on Sunday, >>May >> 18th and will end on Sunday, June 1st. > >This looks pretty much okay. > >A few minor things: > >The specification of en/decryption in section 5 assigns the new >cipherstate as "next-to-last 128-bit block of C"; this is slightly >ambiguous when C does not end on a block boundary. I believe the intent >is that the last full block will be used in this case, but one could read >the current text as saying that the next-to-last full block would be used. >Also, the description of D() says it is an AES encryption function, not a >decryption function. > >There are no test vectors for the PRF. Having such vectors would also >make it clear what the output length of the PRF is (luckily, we are not >using the simplified profile, with its ambiguous language "truncate tmp1 >to multiple of m"). (The PRF output length looks to be 256 and 384 bits >for the two variants, to me.) > >In section 8.1, "at least 128 bits of random" feels ungrammatical. Also >in that section, the third and fourth bullet points may be specific to >the >MIT krb5 implementation; it might be worth tweaking the wording to >reflect >that this is only known to affect some implementations, or something like >that. > >I did not attempt to verify the test vectors. > >-Ben > >_______________________________________________ >Kitten mailing list >Kitten@ietf.org >https://www.ietf.org/mailman/listinfo/kitten
- [kitten] WGLC on draft-ietf-kitten-sasl-oauth-12 Shawn M Emery
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Matt Miller (mamille2)
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Matt Miller (mamille2)
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Matt Miller (mamille2)
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Ryan Troll
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Ryan Troll
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills
- [kitten] WGLC on draft-ietf-kitten-aes-cts-hmac-s… Shawn M Emery
- Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hm… Benjamin Kaduk
- Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hm… Peck, Michael A
- Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hm… Benjamin Kaduk
- Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hm… Simon Josefsson
- Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hm… Benjamin Kaduk
- Re: [kitten] WGLC on draft-ietf-kitten-aes-cts-hm… Greg Hudson
- [kitten] WGLC on draft-ietf-krb-wg-cammac-08 Shawn M Emery
- Re: [kitten] WGLC on draft-ietf-krb-wg-cammac-08 Zheng, Kai
- Re: [kitten] WGLC on draft-ietf-krb-wg-cammac-08 Tom Yu
- Re: [kitten] WGLC on draft-ietf-krb-wg-cammac-08 Zheng, Kai
- [kitten] WGLC on draft-ietf-kitten-sasl-oauth-15 Shawn M Emery
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Benjamin Kaduk
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Benjamin Kaduk
- Re: [kitten] WGLC on draft-ietf-kitten-sasl-oauth… Bill Mills