Re: [kitten] [EXTERNAL] Re: Question about AES mode in Kerberos

Luke Howard Bentata <lukeh@padl.com> Fri, 06 January 2023 21:36 UTC

Return-Path: <lukeh@padl.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13432C14CF0C for <kitten@ietfa.amsl.com>; Fri, 6 Jan 2023 13:36:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=padl.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SPx8CvBkfPjU for <kitten@ietfa.amsl.com>; Fri, 6 Jan 2023 13:36:54 -0800 (PST)
Received: from us.padl.com (us.padl.com [216.154.215.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CABE4C14F74E for <kitten@ietf.org>; Fri, 6 Jan 2023 13:36:54 -0800 (PST)
Received: from auth (localhost [127.0.0.1]) by us.padl.com (8.14.7/8.14.7) with ESMTP id 306LanF5010642 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 6 Jan 2023 21:36:52 GMT
DKIM-Filter: OpenDKIM Filter v2.11.0 us.padl.com 306LanF5010642
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=padl.com; s=default; t=1673041013; bh=C20apY77eC411/ZXFkTW5v7qIcjOBVQ7N1k1tr0wJwE=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=jyfYM9spZRceBajc2vG0VmCYXIz0XGZmozPpxd/VjMxkFjI/SXVEWUvkO7I7VQL3X vMRv2DMGcagMXLG3BcfPcqfcEcKb9UqVl2cRSJuGeyaVEnvtfqgOzfnS48zHx63N9v 5C9cDb5cBStJnGrsND7ZRQIyjaPpdA3Fd1n+0y1mAukz5ZKehgJa49qBlCua5pDi1L JYHNQJrWUZX8niawMD+F16C8VqzhdJOcmTMvIQ29x+XZ6UTPC1x4crPPFj7Dmf/jz6 3bQQenTi5YXd90iS7mQdmSBAyoqN3d1e6ico3OlByy6JuqsK+jy4cCKnEr/ZH1gooe vXMaPaFBqqaKg==
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.200.110.1.12\))
From: Luke Howard Bentata <lukeh@padl.com>
In-Reply-To: <20230106122025.C9A8916DFE0@pb-smtp1.pobox.com>
Date: Sat, 07 Jan 2023 08:36:37 +1100
Cc: "kitten@ietf.org" <kitten@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <0DAF5C4E-AD76-42C9-9D8C-EA5E027CE886@padl.com>
References: <CAN-5tyGGJXoo9RfKEGTsk8XeQDpZ--VSnO7nunzvnBBzrRB0WQ@mail.gmail.com> <558f31de-7fac-26c7-fe81-8e486968f0ef@secure-endpoints.com> <7B46A5A4-4415-4627-B964-44F2516D84FE@padl.com> <9464B1FF-6784-4D59-A4F6-1B5D58C2B94F@padl.com> <MW4PR21MB1970090CC5E20FC4BADA0B469CFA9@MW4PR21MB1970.namprd21.prod.outlook.com> <B970CFE5-FB03-47C2-87F4-BFC82C87D13A@padl.com> <9ACBF03D-4137-4E9A-963E-4D07082FC805@padl.com> <20230106122025.C9A8916DFE0@pb-smtp1.pobox.com>
To: Ken Hornstein <kenh@pobox.com>
X-Mailer: Apple Mail (2.3731.200.110.1.12)
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/ucY3KXmYv0a5_1vC66Ez1yycg1A>
Subject: Re: [kitten] [EXTERNAL] Re: Question about AES mode in Kerberos
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Jan 2023 21:36:59 -0000

> On 6 Jan 2023, at 11:20 pm, Ken Hornstein <kenh@pobox.com> wrote:
> 
>> Nico points out we should use this opportunity to encrypt the AP-REP
>> enc-part in the initiator sub-session rather than the ticket session
>> key. Otherwise you can replay an AP-REP against an AP-REQ made with the
>> same ticket, which would be bad for GCM (as we are using a deterministic
>> IV). I haven’t updated the draft yet to reflect this.
> 
> My understanding is the AP-REP enc-part contains the authenticator
> timestamp from the AP-REQ, so replaying an AP-REP shouldn't be possible
> regardless of the details of the encryption mode.  Unless I am
> misunderstanding something which is always possible.

Right you are – comment withdrawn :)

Cheers,
Luke