Re: [kitten] Merging ideas: Renegotiate, TLS-PSK, Key Derivation

Alexey Melnikov <alexey.melnikov@isode.com> Wed, 18 January 2023 11:47 UTC

Return-Path: <alexey.melnikov@isode.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78804C1524DA for <kitten@ietfa.amsl.com>; Wed, 18 Jan 2023 03:47:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isode.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SaNeyeft2nOQ for <kitten@ietfa.amsl.com>; Wed, 18 Jan 2023 03:47:04 -0800 (PST)
Received: from waldorf.isode.com (waldorf.isode.com [62.232.206.188]) by ietfa.amsl.com (Postfix) with ESMTP id E96C8C151524 for <kitten@ietf.org>; Wed, 18 Jan 2023 03:47:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1674042421; d=isode.com; s=june2016; i=@isode.com; bh=zLwVeCfAssUIQk95qChn4gfVWasfkzBjtsv1QcZT8pY=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=c3v0XXAtVpAUZANQ9Q6mBIPNllyE2/3AGArWbGISRWVR5fuJECjtmy7PWxkMtyjWRc+vYF lX77nDOjDcD+TsDIRDbdZnlYWHEnKM+kKd6nr6BbCYvX8+HttaM04DFxsI4jgI59lFSh9E 5JtnZGnTSYtqEpoZ8KGnHpyy9av06ec=;
Received: from [192.168.1.222] (host31-49-219-35.range31-49.btcentralplus.com [31.49.219.35]) by waldorf.isode.com (submission channel) via TCP with ESMTPSA id <Y8fcNABS6JSi@waldorf.isode.com>; Wed, 18 Jan 2023 11:47:01 +0000
Message-ID: <1c6ed563-7716-6701-4b2c-28af1f411c85@isode.com>
Date: Wed, 18 Jan 2023 11:46:59 +0000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1
To: kitten@ietf.org
References: <20230118094250.GB8431@openfortress.nl>
From: Alexey Melnikov <alexey.melnikov@isode.com>
In-Reply-To: <20230118094250.GB8431@openfortress.nl>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/fOoAli1orp28Uor_v77smUXWYDE>
Subject: Re: [kitten] Merging ideas: Renegotiate, TLS-PSK, Key Derivation
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jan 2023 11:47:08 -0000

Hi Rick,

On 18/01/2023 09:42, Rick van Rein wrote:
> Hi,
>
> The ideas presented yesterday sort-of melted together in my mind.
>
> The idea of renegotiation came up, and I wonder if that is specific
> to one SASL mechanism, or could be a general mechanism that can be
> offered for the second round.
I am thinking that renegotiation should work with most "modern" SASL 
mechanisms.
> Likewise, TLS-PSK expects integration with TLS from the application,
> but that is not necessarily impossible; the classical Security Layer
> also integrated into the application.  The SASL layer may facilitate
> by stating that a TLS-PSK key injection will be done (perhaps by
> flagging it as a mechanism that should never be selected).
>
> Both would benefit from the gut feeling I presented, that is key
> derivation based on SASL secret/entropy, which might be defined
> for OPAQUE and is in Section 2.7 of SXOVER-PLUS.  We should think
> carefully if key derivation may be retrofitted on other mechs when
> these facilities/mechs are offered.
I think adding it to SCRAM would be a good idea. I consider CRAM-MD5 and 
DIGEST-MD5 to be legacy SASL mechanisms, so I wouldn't bother extending 
them.
> I suppose the one thing to be careful about would be the timeout
> for the facilation of renegotiation; perhaps mechnames should
> somewhat like
>
> 	TLS-PSK-300      REPEAT-300
> 	TLS-PSK-3600     REPEAT-3600
> 	TLS-PSK-86400    REPEAT-86400
>
> to indicate the maximum client dependency time and the minimum
> server acceptance time.
>
> Would this make sense?

I have a mixed feeling about time limits being advertised in mechanism 
names. I think I would prefer to have a single (or maybe 2) SASL 
mechanisms and advertise the expiration limit inside the mechanism exchange.

Best Regards,

Alexey