Re: [Lake] Ways forward on MTI cipher suite text

Stephen Farrell <stephen.farrell@cs.tcd.ie> Tue, 15 February 2022 17:09 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: lake@ietfa.amsl.com
Delivered-To: lake@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C12533A0E6E for <lake@ietfa.amsl.com>; Tue, 15 Feb 2022 09:09:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.714
X-Spam-Level:
X-Spam-Status: No, score=-7.714 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.714, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LNfH-0wG37-g for <lake@ietfa.amsl.com>; Tue, 15 Feb 2022 09:09:22 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20709.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1b::709]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A28E63A0E77 for <lake@ietf.org>; Tue, 15 Feb 2022 09:09:22 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ekb3h8iBGRhqg8m84mLfFKcg2jWcgnVVsShCcgVXb0XaS1D6VCtTSY/XAK9Y4BDKuQViDgZcX7eNCxdClvySz+IjiVMwSjl/nC31DYcxYr6tzsAEg13Rgy/KT02YvwaLbJjNNLu+rf4hMkMzEIn9X1pqXHygplrzz4cwxzGfOF1100RD2wVrwqqqJDo1j2B5+VkO/2QWB4mAGGNHls+FZl+4Z51lotQLYD+CVSTxjNQ7a3pRpPAjqL5yjloS3SG2bW9Hdm86ECLl/6srXVvpGhUUPOKKh3wi5P1YLu96WCjwqETT84Bytbc6vnhpqFMywosTAxjOSvK24egCgllMNA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TR9e8rytK237CKW7pgQT23YLqG7jxoXcEJta4izPAOA=; b=L3a2wDDcWfpJ7eRNRSthsVG2EZBz+WpW46yzMAgpMFElRykz18XjNcxsJJxlAgeyr1MXCs69rLiP5YVGTsf3XpyA6iXvEXjaYHuwKNc5sot1O82YJxSexzK8f4IYKIMMKJPxmxyPvG+wJrQGNuvVrYrndndB1VoSWUnHaCGVtyR8zvo43rTPVOZzlZvwrij4TBzBPGQu5tJgGMz6co9wZPgSFrjNV+95dz4UCUqPGAPJams4ukzVN7L172TMJ88SF/ewgj/agQXhoLBAye9xjDMvZMVWJFoHyo2Cq7CSkXDjQYlkGvwR7Qux8eUHViUnOJK2Z56WiNaMP1UpoWUJJA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cs.tcd.ie; dmarc=pass action=none header.from=cs.tcd.ie; dkim=pass header.d=cs.tcd.ie; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cs.tcd.ie; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TR9e8rytK237CKW7pgQT23YLqG7jxoXcEJta4izPAOA=; b=IPXkWEMTN/I3sjp5xMh1oVmo2jloxgvGIT21cTAGM5DIp8HjoASX39Lavwfw5mL9SdFw4Ej7+HLV1lxwcLDp9X8FhwA0UfMM+afTlaDF6GDUWLdUBdR6FVpeHZkdhZ8lLf6upBVCzTw4zbLgRS2BUBwd0MlHrs5W36ijUtvNLWBnGbN+TRmMli9F+h5omgWH99xL7Kcm8lZNVTQu7lsvB5jYisSXNHN8Mne6ZIXmx37pBhgtMYb4xEeCuIvdXhbwskgMmUabDIBkRM4mxGHn7FOhIAJyoGC2CBnZpgV4IATfQ/oGHJXi3O2Z9CHgGB6eHeSc6nRqpUvpsbZGM0c3Wg==
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cs.tcd.ie;
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15) by AS8PR02MB6997.eurprd02.prod.outlook.com (2603:10a6:20b:2e6::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4995.14; Tue, 15 Feb 2022 17:09:14 +0000
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::e07e:60ee:a20b:5f2]) by DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::e07e:60ee:a20b:5f2%3]) with mapi id 15.20.4975.011; Tue, 15 Feb 2022 17:09:13 +0000
Message-ID: <191cfecb-89b2-014c-3475-16933550a43c@cs.tcd.ie>
Date: Tue, 15 Feb 2022 17:09:11 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: Göran Selander <goran.selander=40ericsson.com@dmarc.ietf.org>, "lake@ietf.org" <lake@ietf.org>
References: <2A2081E4-BAAF-4292-925E-0B683AA6CD23@inria.fr> <HE1PR0701MB30505089ECEB11415901D15789209@HE1PR0701MB3050.eurprd07.prod.outlook.com> <AM8P193MB0979A9D4407FB221A738BCB983209@AM8P193MB0979.EURP193.PROD.OUTLOOK.COM> <2F92EA32-DABB-4B39-811F-F8B7738BADA9@ll.mit.edu> <FB0757A5-69F0-45E0-B9EA-35CE7BAACF46@ericsson.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
In-Reply-To: <FB0757A5-69F0-45E0-B9EA-35CE7BAACF46@ericsson.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------PzpnuO8dQPVeWSs3SNYWwJf5"
X-ClientProxiedBy: DB6PR0301CA0061.eurprd03.prod.outlook.com (2603:10a6:4:54::29) To DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 79501880-2b35-44c4-898d-08d9f0a5e3f1
X-MS-TrafficTypeDiagnostic: AS8PR02MB6997:EE_
X-MS-Exchange-SharedMailbox-RoutingAgent-Processed: True
X-Microsoft-Antispam-PRVS: <AS8PR02MB69970FA7C5E5F26A2F8788CFA8349@AS8PR02MB6997.eurprd02.prod.outlook.com>
X-TCD-Routed-via-EOP: Routed via EOP
X-TCD-ROUTED: Passed-Transport-Routing-Rules
X-MS-Oob-TLC-OOBClassifiers: OLM:4125;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR02MB5113.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(8676002)(21480400003)(66476007)(66556008)(66574015)(31696002)(83380400001)(53546011)(86362001)(33964004)(66946007)(45080400002)(8936002)(36756003)(31686004)(6512007)(508600001)(2616005)(5660300002)(6486002)(966005)(235185007)(786003)(44832011)(6506007)(186003)(110136005)(316002)(38100700002)(2906002)(43740500002)(45980500001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: cs.tcd.ie
X-MS-Exchange-CrossTenant-Network-Message-Id: 79501880-2b35-44c4-898d-08d9f0a5e3f1
X-MS-Exchange-CrossTenant-AuthSource: DB7PR02MB5113.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Feb 2022 17:09:13.8069 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d595be8d-b306-45f4-8064-9e5b82fbe52b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /flG7HRl7qoNaGfjhgGPlGgTJzmDx7m/tshPaRl37lcbWr/sqa62DZsoz/eErl9B
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR02MB6997
Archived-At: <https://mailarchive.ietf.org/arch/msg/lake/PI0GE9PNSsOYLuqPVI1CfiTVcXk>
Subject: Re: [Lake] Ways forward on MTI cipher suite text
X-BeenThere: lake@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Lightweight Authenticated Key Exchange <lake.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lake>, <mailto:lake-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lake/>
List-Post: <mailto:lake@ietf.org>
List-Help: <mailto:lake-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lake>, <mailto:lake-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Feb 2022 17:09:28 -0000

Hi all,

I had a brief mail exchange with Mališa so hopefully
this mail represents both chairs take on where we see
WG participants being on this topic, at this time...

On 14/02/2022 09:48, Göran Selander wrote:
> Hi,
> 
> As discussed in the design meeting last week 

Just to note for the record that that was an informal
meeting, not a WG interim. (Which is a fine thing and
not a problem.)

> there seemed to be an
> agreement for a similar formulation as TLS (see #238), in this case
> to prepend the cipher suite requirements with:
> 
> "In the absence of an application profile specifying otherwise:"

We don't think the above is controversial. (But do correct
us if that's wrong.)

> 
> This also considering that the term "applicability template" used in
> the draft is replaced by the more intuitive "application profile"
> (#250).
> 
> With this in mind, we have the option to be more strict in terms of
> cipher suites, since it may be overridden by an application profile. 
> One proposal is in PR #239.
> 
> https://github.com/lake-wg/edhoc/pull/239/files

That PR seems to us (in chair mode) to perhaps be closer to
what might constitute WG consensus at this time. If people
disagree with that and prefer the status-quo, please speak
up now. That reflects a pretty rough (or maybe weak)
consensus but it seems to be where we're at, as of now.
Assuming no objections, the editors should merge that PR
in a few days. (But please do come back to the list if
further non-editoral changes are needed for that merge.)

I'll note here that the CFRG chairs have agreed to put this
topic (signature schemes for small devices that can be under
adversary-control) on their agenda for IETF113. I hope that
that will eventually result in more clarity as to what LAKE
and other WGs ought adopt as MTI in such circumstances and
maybe even some better signature scheme.

But that'll take time and we believe LAKE WG participants
don't want to wait on that discussion terminating, hence
our suggestion we accept the above PR. If the CFRG discussion
produces some new facts before this WG is done, then we can
discuss those at the relevant time. If not, then edhoc is
extensible so better suites can be defined later as needed.

Cheers,
S.

PS: Just to avoid potential future confusion - PR#239 isn't
where I'd personally have landed myself, but as chair it
seems closest to what WG participants want, and it's clearly
a credible position to adopt. So while I might argue for
something else as part of the CFRG discussion, that doesn't
affect this consensus call.


> 
> Note that in PR #239 this condition is added at the top of the
> section, i.e. prepending not only the cipher suite requirements.
> 
> Further comments are welcome.
> 
> Göran
> 
> 
> From: Lake <lake-bounces@ietf.org> on behalf of "Blumenthal, Uri -
> 0553 - MITLL" <uri@ll.mit.edu> Date: Wednesday, 26 January 2022 at
> 10:51 To: "Peter.Blomqvist@sony.com" <Peter.Blomqvist@sony.com>,
> "lake@ietf.org" <lake@ietf.org> Subject: Re: [Lake] Ways forward on
> MTI cipher suite text
> 
> I have had a preference to EdDSA, but In light of presentation from
> Rene I don’t think it is reasonable to make EdDSA an MTI. I concur.
> 
> From: Lake <lake-bounces@ietf.org> On Behalf Of John Mattsson Sent:
> den 26 januari 2022 08:04 To: lake@ietf.org Subject: Re: [Lake] Ways
> forward on MTI cipher suite text
> 
> Hi,
> 
> I noticed to nobody has argued for EdDSA in the recent discussion.
> One potential way forward would maybe be to reformulate the current
> text without cipher suites 0 and 1. There has been several people
> expressing that they want the requirement to implement one or more
> cipher suite to be stronger. This would lead to Option 3 below.
> 
> - Option 3: Remove cipher suites 0 and 1 from the current text.
> Reformulate according to current discussion. Make implementation
> requirements for cipher suite 0 and 1 stronger for some types of
> implementations such as maybe less constrained devices, software
> libraries, non-closed deployments....
> 
> People typically have strong opinions on details. It is sometimes
> easier to agree on nothing. Option 4 below would align with what COSE
> is doing.
> 
> - Option 4: Just remove current text and replace it with nothing.
> 
> (I ignored the “2, 3, or 2 and 3” issue above, that also need to be
> discussed)
> 
> Cheers, John
> 
> 
> From: Lake <lake-bounces@ietf.org<mailto:lake-bounces@ietf.org>> on
> behalf of Mališa Vučinić
> <malisa.vucinic@inria.fr<mailto:malisa.vucinic@inria.fr>> Date:
> Thursday, 20 January 2022 at 18:03 To:
> lake@ietf.org<mailto:lake@ietf.org>
> <lake@ietf.org<mailto:lake@ietf.org>> Subject: [Lake] Ways forward on
> MTI cipher suite text Dear all,
> 
> During the last LAKE interim meeting, we discussed the issue of an
> MTI cipher suite and we agreed for the chairs to open a thread on the
> subject. As a reminder, the previous discussion points on this topic
> are summarized in github [1] and in John’s mail dated 13 May 2021
> [2].
> 
> We’d like to see if there is rough consensus in the WG on this topic,
> at this moment in time. Knowing that the formal analysis of the
> EDHOC-12 specification is under way, we should keep in mind that
> additional input may arrive down the road from teams working in the
> computational model.
> 
> As a reminder, the most recently discussed text for this is in a PR
> [3] and states:
> 
> “For many constrained IoT devices it is problematic to support
> several crypto primitives. Existing devices can be expected to
> support either ECDSA or EdDSA. Cipher suites 0 (AES-CCM-16-64-128,
> SHA-256, 8, X25519, EdDSA, AES-CCM-16-64-128, SHA-256) and 1
> (AES-CCM-16-128-128, SHA-256, 16, X25519, EdDSA, AES-CCM-16-64-128,
> SHA-256) only differ in size of the MAC length, so supporting one or
> both of these is no essential difference. Similarly for cipher suites
> 2 (AES-CCM-16-64-128, SHA-256, 8, P-256, ES256, AES-CCM-16-64-128,
> SHA-256) and 3 (AES-CCM-16-128-128, SHA-256, 16, P-256, ES256,
> AES-CCM-16-64-128, SHA-256). To enable as much interoperability as
> possible, less constrained devices SHOULD implement all four cipher
> suites 0-3. Constrained endpoints SHOULD implement cipher suites 0
> and 1, or cipher suites 2 and 3. Implementations only need to
> implement the algorithms needed for their supported methods.”
> 
> The options we see at this moment in time are:
> 
> Option 1: Keep current text as-is unless/until more feedback is
> provided that motivates re-opening this issue Option 2: Proceed with
> selecting a single MTI cipher suite
> 
> We'd like to know if the WG can live with Option 1. Note that doesn't
> mean you think option 1 is perfect, just that it's something with
> which you can live. If you prefer option 2 or some other option
> please suggest specific text.
> 
> Mališa and Stephen
> 
> [1]
> https://github.com/lake-wg/edhoc/issues/22<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-8d8739cc42e1d2b1&q=1&e=7f8ca305-4d94-4316-99c0-3b8e69e4bd77&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fgithub.com%2Flake-wg%2Fedhoc%2Fissues%2F22__%3B%21%21JmoZiZGBv3RvKRSx%21oMZFCrrtaAFUdL_LPHRBXf_uvG-p-6Y0b9jHb6jNGAPkgHq66wHpNbRb-twIjtmwJiui%24>
>
> 
[2] 
https://mailarchive.ietf.org/arch/msg/lake/75nRaD6czYG6RqLT06Qe8C_lsaM/<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-8ee72b0658755668&q=1&e=7f8ca305-4d94-4316-99c0-3b8e69e4bd77&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Flake%2F75nRaD6czYG6RqLT06Qe8C_lsaM%2F__%3B%21%21JmoZiZGBv3RvKRSx%21oMZFCrrtaAFUdL_LPHRBXf_uvG-p-6Y0b9jHb6jNGAPkgHq66wHpNbRb-twIjmVyYhuw%24>
> [3]
> https://github.com/lake-wg/edhoc/pull/225/files<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-1c35d0ff14ead9d4&q=1&e=7f8ca305-4d94-4316-99c0-3b8e69e4bd77&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fgithub.com%2Flake-wg%2Fedhoc%2Fpull%2F225%2Ffiles__%3B%21%21JmoZiZGBv3RvKRSx%21oMZFCrrtaAFUdL_LPHRBXf_uvG-p-6Y0b9jHb6jNGAPkgHq66wHpNbRb-twIjjrL_38v%24>
>
> 
> 
> -- Lake mailing list Lake@ietf.org<mailto:Lake@ietf.org> 
> https://www.ietf.org/mailman/listinfo/lake<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-bbc313f3e273f8b1&q=1&e=7f8ca305-4d94-4316-99c0-3b8e69e4bd77&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Flake__%3B%21%21JmoZiZGBv3RvKRSx%21oMZFCrrtaAFUdL_LPHRBXf_uvG-p-6Y0b9jHb6jNGAPkgHq66wHpNbRb-twIjtnfowyW%24>
>
> 
>