Re: [kitten] draft-hansen-scram-sha256 and the hash iteration count

Tony Hansen <tony@att.com> Tue, 24 February 2015 17:31 UTC

Return-Path: <tony@att.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FBC81A875D for <kitten@ietfa.amsl.com>; Tue, 24 Feb 2015 09:31:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.188
X-Spam-Level:
X-Spam-Status: No, score=-3.188 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MISSING_HEADERS=1.021, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MjkascHjbJ_V for <kitten@ietfa.amsl.com>; Tue, 24 Feb 2015 09:31:19 -0800 (PST)
Received: from nbfkord-smmo07.seg.att.com (nbfkord-smmo07.seg.att.com [209.65.160.93]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D63D1A1BC3 for <kitten@ietf.org>; Tue, 24 Feb 2015 09:31:19 -0800 (PST)
Received: from unknown [144.160.229.23] (EHLO alpi154.enaf.aldc.att.com) by nbfkord-smmo07.seg.att.com(mxl_mta-7.2.4-5) over TLS secured channel with ESMTP id 465bce45.0.4955492.00-1980.13911134.nbfkord-smmo07.seg.att.com (envelope-from <tony@att.com>); Tue, 24 Feb 2015 17:31:19 +0000 (UTC)
X-MXL-Hash: 54ecb5675ccc2cd0-aba41c3951ee07ab9e8e221ffa515096e49dcfaf
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id t1OHVG7N027874 for <kitten@ietf.org>; Tue, 24 Feb 2015 12:31:16 -0500
Received: from alpi133.aldc.att.com (alpi133.aldc.att.com [130.8.217.3]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id t1OHVAV2027776 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <kitten@ietf.org>; Tue, 24 Feb 2015 12:31:11 -0500
Received: from alpi153.aldc.att.com (alpi153.aldc.att.com [130.8.42.31]) by alpi133.aldc.att.com (RSA Interceptor) for <kitten@ietf.org>; Tue, 24 Feb 2015 17:30:58 GMT
Received: from aldc.att.com (localhost [127.0.0.1]) by alpi153.aldc.att.com (8.14.5/8.14.5) with ESMTP id t1OHUwUW010374 for <kitten@ietf.org>; Tue, 24 Feb 2015 12:30:58 -0500
Received: from dns.maillennium.att.com (maillennium.att.com [135.25.114.99]) by alpi153.aldc.att.com (8.14.5/8.14.5) with ESMTP id t1OHUqnN010016 for <kitten@ietf.org>; Tue, 24 Feb 2015 12:30:52 -0500
Received: from tonys-macbook-pro.local (unknown[135.110.241.46](untrusted sender)) by maillennium.att.com (mailgw1) with ESMTP id <20150224173051gw1000ceeme>; Tue, 24 Feb 2015 17:30:51 +0000
X-Originating-IP: [135.110.241.46]
Message-ID: <54ECB54A.3040002@att.com>
Date: Tue, 24 Feb 2015 12:30:50 -0500
From: Tony Hansen <tony@att.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
CC: "kitten@ietf.org" <kitten@ietf.org>
References: <54DC00D0.2050900@cs.tcd.ie> <54EC66FF.50603@cs.tcd.ie> <54ECA7DA.40203@att.com> <CAKHUCzymihrk6QTFHWKG45kLiZkvkk3kasZPWtzTeDcwHn7y-A@mail.gmail.com>
In-Reply-To: <CAKHUCzymihrk6QTFHWKG45kLiZkvkk3kasZPWtzTeDcwHn7y-A@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------010807090105030404050302"
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-AnalysisOut: [v=2.0 cv=KNft+i5o c=1 sm=1 a=VXHOiMMwGAwA+y4G3/O+aw==:17 a]
X-AnalysisOut: [=9cW_t1CCXrUA:10 a=mJp9S24oyUUA:10 a=6ASjcdcU7ckA:10 a=BLc]
X-AnalysisOut: [eEmwcHowA:10 a=zQP7CpKOAAAA:8 a=0HtSIViG9nkA:10 a=zdOV5PIi]
X-AnalysisOut: [SKSzHpzq2iYA:9 a=QEXdDO2ut3YA:10 a=pGLkceISAAAA:8 a=H7dR8y]
X-AnalysisOut: [VHmTnR0TsgIuUA:9 a=_W_S_7VecoQA:10]
X-Spam: [F=0.2000000000; CM=0.500; S=0.200(2014051901)]
X-MAIL-FROM: <tony@att.com>
X-SOURCE-IP: [144.160.229.23]
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/3Pg9cbb52ih5MrdkJ7mtjBo7m6A>
Subject: Re: [kitten] draft-hansen-scram-sha256 and the hash iteration count
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Feb 2015 17:31:21 -0000

On 2/24/15 11:55 AM, Dave Cridland wrote:
>
> On 24 February 2015 at 16:33, Tony Hansen <tony@att.com 
> <mailto:tony@att.com>> wrote many things...
>
> As a thought, is it not worthwhile to distill all this into a 
> paragraph or two within the Security Considerations, such as:
>
> The strength of this mechanism is dependent in part on the iteration 
> count, as denoted by "i" in [RFC 5802]. As a rule of thumb, the 
> iteration count should be such that a modern machine will take 0.1 
> seconds to perform the complete algorithm; however this is unlikely to 
> be practical on mobile devices and other relatively low-performance 
> systems. At the time this was written, the rule of thumb gives around 
> 15,000 iterations required; however an iteration count of 4096 takes 
> around 0.5 seconds on current mobile handsets. This computational cost 
> can be avoided by caching the ClientKey (assuming the Salt and 
> iteration count is stable).
>
> Therefore the recommendation of this specification is that the 
> iteration count SHOULD be at least 4096, but careful consideration 
> ought to be given to using a significantly higher value, particularly 
> where mobile use is less important.

Thank you Dave. I think this is an excellent path forward.

     Tony Hansen