Re: [kitten] SPAKE Preauth

Nathaniel McCallum <npmccallum@redhat.com> Tue, 05 May 2015 00:16 UTC

Return-Path: <npmccallum@redhat.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24A801B2D16 for <kitten@ietfa.amsl.com>; Mon, 4 May 2015 17:16:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.911
X-Spam-Level:
X-Spam-Status: No, score=-5.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EOK5eVpH3B7B for <kitten@ietfa.amsl.com>; Mon, 4 May 2015 17:16:55 -0700 (PDT)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 071C31B2D10 for <kitten@ietf.org>; Mon, 4 May 2015 17:16:54 -0700 (PDT)
Received: from int-mx14.intmail.prod.int.phx2.redhat.com (int-mx14.intmail.prod.int.phx2.redhat.com [10.5.11.27]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t450GsBm032541 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 4 May 2015 20:16:54 -0400
Received: from vpn-59-107.rdu2.redhat.com (vpn-59-107.rdu2.redhat.com [10.10.59.107]) by int-mx14.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t450GrSr002830 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 4 May 2015 20:16:53 -0400
Message-ID: <1430785012.4335.1.camel@redhat.com>
From: Nathaniel McCallum <npmccallum@redhat.com>
To: Ken Hornstein <kenh@pobox.com>
Date: Mon, 04 May 2015 20:16:52 -0400
In-Reply-To: <20150504155338.AF0894D67D@pb-smtp1.pobox.com>
References: <20150504155338.AF0894D67D@pb-smtp1.pobox.com>
Content-Type: text/plain; charset="UTF-8"
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.27
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/TbhElOrVkj0mR6ma4nSp26SlyVo>
Cc: kitten@ietf.org
Subject: Re: [kitten] SPAKE Preauth
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 May 2015 00:16:57 -0000

On Mon, 2015-05-04 at 11:54 -0400, Ken Hornstein wrote:
> > > See, I think you've got the question all wrong.  My question is 
> > > NOT,
> > > "Is OTP supposed to be the only authentication factor?", it's, 
> > > "Which
> > > protocol is it actually possible for me to deploy successfully?"
> > 
> > I believe the tension you are seeing here is the result of
> > commoditization of 2FA. Early on, 2FA systems were entirely 
> > parallel
> > authentication stacks which authenticators would need to integrate
> > with. As 2FA commoditized, we see open protocols which can be
> > integrated into existing authentication stacks.
> 
> Well ... I understand why you'd say that, but I disagree.
> 
> We use the old, old SAM protocol with what you call a pre
> -commiditized
> 2FA system today.  So I was thinking of migrating that to FAST as 
> part
> of our long-overdue Kerberos upgrade.  But I hadn't really sat down 
> and
> understood FAST (I did try to start reading the RFC several times, 
> but
> man, it's pretty dense ... I mean, yeah, I understand it's a protocol
> document so that's just a necessity, but if you want a broad overview
> it's a tough read).  So now you spelled out, "Hey, you need ANOTHER 
> key
> to create the FAST channel" ... and that's really a non-starter for
> our environment, because those keys don't exist for our users that
> most need 2FA (and see previous discussion about the problems of 
> requiring
> anonymous pkinit).
> 
> > However, after 2FA commoditized the question becomes how can I 
> > augment
> > my existing authentication stack (1FA Kerberos) with a 2FA method.
> > This is what SPAKE Preauth provides.
> 
> Well ... again, I don't think that's really the "true" question that
> gets asked.  I mean, the people who are pushing the use of 2FA are
> generally not qualified to talk about Kerberos at a protocol level.
> Really, the question is, "Are you using 2FA with Kerberos?".  Well,
> actually, I doubt that the word "Kerberos" appears anywhere.  It's 
> more
> like there's a STIG or checklist somewhere that says, "2FA is 
> required",
> or maybe, "2FA is required when passwords are used".  As long as we
> can legitimately assert that 2FA is in use, that's really all we care
> about at a fundamental level; if it's "2FA + Kerberos password", 
> that is
> totally fine (that's what we have today).  Yes, I _personally_ care 
> that
> the crypto is the best that we can possibly do, but having something
> that is deployable is more important.
> 
> > Now, I think your questions here raise an interesting point: can 
> > and
> > should we require some standardization to use the 2FA feature of 
> > SPAKE
> > preauth? I think the answer is no. And I've come to think that the
> > SPAKESecondFactor type field should really be OBJECT IDENTIFIER.
> 
> I do not quite understand your point ... are you saying that your I-D
> should completely specify how all 2FA systems work with SPAKE?  And
> personally I'd vote to keeping SPAKESecondFactor an Int32 rather than
> an OID.

No. I'm saying a vendor can define their own 2FA and assign it an
enterprise OID number and use it out of the box. No standardization
required.

Then we would create some IETF OIDs for open protocols (such as OATH
and U2F).

Nathaniel