Re: [Lake] Ways forward on MTI cipher suite text

Marco Tiloca <marco.tiloca@ri.se> Mon, 24 January 2022 08:40 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: lake@ietfa.amsl.com
Delivered-To: lake@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98B203A2336 for <lake@ietfa.amsl.com>; Mon, 24 Jan 2022 00:40:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.814
X-Spam-Level:
X-Spam-Status: No, score=-1.814 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_AFFORDABLE=1, NICE_REPLY_A=-0.714, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kaFQXaqfncxo for <lake@ietfa.amsl.com>; Mon, 24 Jan 2022 00:40:50 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2086.outbound.protection.outlook.com [40.107.22.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36A7F3A2334 for <lake@ietf.org>; Mon, 24 Jan 2022 00:40:49 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WO1uuE9FdABjMsCYRzRi1oXc03ByRcZqe/pxiBp0SR0vU4qZmNnZ9kopBUV4trmgXUCJ0Cn46vGTpz00kCygq27WJvopGlq1dK5IypZUqSs5unR/0Ugh/MDUIIQmg3sGtu2KCoS3pNA6RW48ciwDA3ebCP3khKHmr4FgKfMGaEmQo6yawsIWQ5Ep8y0GHKjONUw/hDjJyRWJNSlajUhtpyLfWwNWOf0Hyp2YkdkI0hZJsZ6aAG+kpLWyjkihRWaPcttUm6QWVNjykfdHwgDQP9xKUZGPVnNo9r/BWnviAnJmc1Rv0Subhf87G2L1vMsql/XgBCviayUPHrsFbPhFeQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PYTo1t3AToUi7NPNyeiGW953Gma2veFnRGrVDJw2k74=; b=ny9OIr8oNG/qwyHgY5tRHJMBzu/5NFPbKc9JTmnDF7HBH1DawAoaBJh5eA0IuhODOVO4X3B1a2tBlosOxy+0uj++d20vFHYmmaFqv5xkqN5Ud92bmJFTmuY5GUrn3t/FQ9V6KwutT0mydz6Krce6YeoJ7r/Te2rEchvhAMpWxYyHmWjJTGfWIr0z8MWdOdUR4YopDKnaBTnm5xT7EUXHvuTpdXLICXLpm3gfi5w4GY7ygGtltGDEMMxQbfIYg4U4SXhVZ4HNelFGfjyGQlP99hXwNfsyOcSKkQd9uFlsyYHn6Is7ahDkKh1UOlclI2BMqj7PT1Vok8uXeUwGKdOMtw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PYTo1t3AToUi7NPNyeiGW953Gma2veFnRGrVDJw2k74=; b=Fa9PPlNKIAAx121OxM4Xe9udSIwJ+n4TZgcXv5yUW6vV9LTEUAVY7gscJr47E0cL/mPjm4iolT4XIKwlyh0C+Y/cnyrHnLT+tRzkmIiFN3Vlr4UxxGk3BukJcO4UOGwBTFgpQzTsssBSaKXWvwno2XM052hv/0pyHLxaW/UNKMA=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by AM5P189MB0532.EURP189.PROD.OUTLOOK.COM (2603:10a6:206:1f::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4909.12; Mon, 24 Jan 2022 08:40:46 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::6800:bc0b:ccc:3a69]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::6800:bc0b:ccc:3a69%5]) with mapi id 15.20.4909.017; Mon, 24 Jan 2022 08:40:46 +0000
Message-ID: <50e51046-2892-2eee-d353-a8576bb1cfef@ri.se>
Date: Mon, 24 Jan 2022 09:40:44 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: lake@ietf.org
References: <2A2081E4-BAAF-4292-925E-0B683AA6CD23@inria.fr> <F8E1F91B-FEEB-44E9-B87F-1F0767123523@vigilsec.com> <AM8P193MB0979287A6652658C65E8B24D835B9@AM8P193MB0979.EURP193.PROD.OUTLOOK.COM>
From: Marco Tiloca <marco.tiloca@ri.se>
In-Reply-To: <AM8P193MB0979287A6652658C65E8B24D835B9@AM8P193MB0979.EURP193.PROD.OUTLOOK.COM>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------Fg7LmYH8E0W9dY4Nu0YuRljh"
X-ClientProxiedBy: GV3P280CA0118.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:8::31) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3e276535-1dbc-4a41-1232-08d9df153753
X-MS-TrafficTypeDiagnostic: AM5P189MB0532:EE_
X-Microsoft-Antispam-PRVS: <AM5P189MB0532B5B2B8A5331F001167EB995E9@AM5P189MB0532.EURP189.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(508600001)(8936002)(66574015)(316002)(966005)(8676002)(186003)(33964004)(4001150100001)(26005)(31686004)(45080400002)(6512007)(83380400001)(36756003)(6486002)(6506007)(2616005)(66476007)(66946007)(235185007)(38100700002)(2906002)(6916009)(21480400003)(66556008)(86362001)(31696002)(53546011)(5660300002)(44832011)(45980500001)(43740500002); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 3e276535-1dbc-4a41-1232-08d9df153753
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Jan 2022 08:40:46.6852 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: s/nY2R317nqYsA3DeX6ueVLkrEdBbwojBsavTmy5P5dNrFzuGXGT+EolPtRjL7Vx4cMg6kT4w2Z429tMkFg8nQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5P189MB0532
Archived-At: <https://mailarchive.ietf.org/arch/msg/lake/ZYmkY5W7RXp2qOUgIirM3jmBJ_E>
Subject: Re: [Lake] Ways forward on MTI cipher suite text
X-BeenThere: lake@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Lightweight Authenticated Key Exchange <lake.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lake>, <mailto:lake-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lake/>
List-Post: <mailto:lake@ietf.org>
List-Help: <mailto:lake-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lake>, <mailto:lake-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jan 2022 08:40:56 -0000

Hi all,

Personally I can live with Option 1 (current PR text as-is) and still 
tend to prefer it. I basically agree with the first sentence from the 
quoted text on which the following normative part builds, I believe 
pragmatically.

I also agree with what was pointed out at the 2021-12-15 interim 
meeting: implementors on constrained platforms would do what they 
want/can with what they have, thus making it difficult to avoid a 
practical risk of non interoperability altogether. For some, supporting 
a particular MTI cipher suite might not be practically affordable at 
least for some time.

While my non-constrained implementation for Californium has supported 
cipher suites 0/1/2/3 basically from the beginning, I remember of 
different supports from the implementations that took part to interop 
tests last year.

Just to recap, tested implementations supported the following cipher suites:

- Contiki-NG: 2
- C-based: 0
- C-based: 2/3
- C-based: 0
- Python-based: 0
- Python-based: 0/1/2 (I guess also 3, but not tested)
- Java-based: 0/1/2/3

Best,
/Marco

On 2022-01-21 08:32, Peter.Blomqvist@sony.com wrote:
> To really guarantee interoperability the MTI cipher suite needs to be unambiguous and I think the set should be  minimalistic to account for device constraints.
> I can live with  0/1 OR  2/3.
>
>
> Best
> Peter
>   
>   
>    
>
> -----Original Message-----
> From: Lake <lake-bounces@ietf.org> On Behalf Of Russ Housley
> Sent: den 20 januari 2022 21:22
> To: Mališa Vučinić <malisa.vucinic@inria.fr>
> Cc: lake@ietf.org
> Subject: Re: [Lake] Ways forward on MTI cipher suite text
>
> I would prefer to see one MTI (Option 2).  I can live with that MIT being 0/1 or 2/3, and I have a mild preference for 2/3.
>
> Russ
>
>
>> On Jan 20, 2022, at 12:03 PM, Mališa Vučinić <malisa.vucinic@inria.fr> wrote:
>>
>> Dear all,
>>
>> During the last LAKE interim meeting, we discussed the issue of an MTI
>> cipher suite and we agreed for the chairs to open a thread on the
>> subject. As a reminder, the previous discussion points on this topic
>> are summarized in github [1] and in John’s mail dated 13 May 2021 [2].
>>
>> We’d like to see if there is rough consensus in the WG on this topic,
>> at this moment in time. Knowing that the formal analysis of the
>> EDHOC-12 specification is under way, we should keep in mind that
>> additional input may arrive down the road from teams working in the
>> computational model.
>>
>> As a reminder, the most recently discussed text for this is in a PR
>> [3] and states:
>>
>> “For many constrained IoT devices it is problematic to support several crypto primitives. Existing devices can be expected to support either ECDSA or EdDSA. Cipher suites 0 (AES-CCM-16-64-128, SHA-256, 8, X25519, EdDSA, AES-CCM-16-64-128, SHA-256) and 1 (AES-CCM-16-128-128, SHA-256, 16, X25519, EdDSA, AES-CCM-16-64-128, SHA-256) only differ in size of the MAC length, so supporting one or both of these is no essential difference. Similarly for cipher suites 2 (AES-CCM-16-64-128, SHA-256, 8, P-256, ES256, AES-CCM-16-64-128, SHA-256) and 3 (AES-CCM-16-128-128, SHA-256, 16, P-256, ES256, AES-CCM-16-64-128, SHA-256). To enable as much interoperability as possible, less constrained devices SHOULD implement all four cipher suites 0-3. Constrained endpoints SHOULD implement cipher suites 0 and 1, or cipher suites 2 and 3. Implementations only need to implement the algorithms needed for their supported methods.”
>>
>> The options we see at this moment in time are:
>>
>> Option 1: Keep current text as-is unless/until more feedback is
>> provided that motivates re-opening this issue Option 2: Proceed with
>> selecting a single MTI cipher suite
>>
>> We'd like to know if the WG can live with Option 1. Note that doesn't
>> mean you think option 1 is perfect, just that it's something with
>> which you can live. If you prefer option 2 or some other option please
>> suggest specific text.
>>
>> Mališa and Stephen
>>
>> [1]
>> https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fgithub.com%2Flake-wg%2Fedhoc%2Fissues%2F22&amp;data=04%7C01%7Cmarco.tiloca%40ri.se%7Ce61dce2749624e3bea0708d9dcb045ad%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C637783472512429663%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=gAVTGJ2evkt7K%2Bo51G%2FSpI4bczj7nBkH4QnKH3lm0m8%3D&amp;reserved=0
>> __;!!JmoZiZGBv3RvKRSx!vR_zYuCKuM5OOd8c4klrvqgMTmgbSQ2HVUgsasnpK2W4f4zZ
>> c88K6QeGZ9L6HbSdy47x$ [2]
>> https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Flake&amp;data=04%7C01%7Cmarco.tiloca%40ri.se%7Ce61dce2749624e3bea0708d9dcb045ad%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C637783472512429663%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=GmsFyRG4gMDkwlfgys2cLh5imW5nVr1PHnAnJk5Iljk%3D&amp;reserved=0
>> /75nRaD6czYG6RqLT06Qe8C_lsaM/__;!!JmoZiZGBv3RvKRSx!vR_zYuCKuM5OOd8c4kl
>> rvqgMTmgbSQ2HVUgsasnpK2W4f4zZc88K6QeGZ9L6HZMhMsjh$
>> [3]
>> https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fgithub.com%2Flake-wg%2Fedhoc%2Fpull%2F225%2F&amp;data=04%7C01%7Cmarco.tiloca%40ri.se%7Ce61dce2749624e3bea0708d9dcb045ad%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C637783472512429663%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=I0HsePnWLgpIWj05yunrCld0GEhKLLo2AruQs2Hdu7s%3D&amp;reserved=0
>> files__;!!JmoZiZGBv3RvKRSx!vR_zYuCKuM5OOd8c4klrvqgMTmgbSQ2HVUgsasnpK2W
>> 4f4zZc88K6QeGZ9L6HQ_9_h3C$
> --
> Lake mailing list
> Lake@ietf.org
> https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Flake__%3B!!JmoZiZGBv3RvKRSx!vR_zYuCKuM5OOd8c4klrvqgMTmgbSQ2HVUgsasnpK2W4f4zZc88K6QeGZ9L6HTKkJ6oR%24&amp;data=04%7C01%7Cmarco.tiloca%40ri.se%7Ce61dce2749624e3bea0708d9dcb045ad%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C637783472512429663%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=1NHNOAoEl0eD6OBqTCiRZzxebC2oMf%2FQJa0%2FyF6%2FVkw%3D&amp;reserved=0

-- 
Marco Tiloca
Ph.D., Senior Researcher

Division: Digital System
Department: Computer Science
Unit: Cybersecurity

RISE Research Institutes of Sweden
https://www.ri.se

Phone: +46 (0)70 60 46 501
Isafjordsgatan 22 / Kistagången 16
SE-164 40 Kista (Sweden)