[Lake] Comments on draft-ietf-lake-edhoc-psk-03

Marco Tiloca <marco.tiloca@ri.se> Sat, 15 March 2025 10:57 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: lake@mail2.ietf.org
Delivered-To: lake@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 4AFE3B9B797 for <lake@mail2.ietf.org>; Sat, 15 Mar 2025 03:57:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=ri.se
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w3uSIVogny4b for <lake@mail2.ietf.org>; Sat, 15 Mar 2025 03:57:39 -0700 (PDT)
Received: from GVZP280CU001.outbound.protection.outlook.com (mail-swedencentralazon11021138.outbound.protection.outlook.com [52.101.81.138]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 16314B9B74B for <lake@ietf.org>; Sat, 15 Mar 2025 03:57:38 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dymXsWVm+ichuCqcRqRvqaCJtXySAx1wTwqg6FW2LVbPTkVTqRuydX+V0CQXDz19MCqgJNSRLv+4EWoaNyMJ8Qc++aphF4VhGGXl2gE4uw9fQsMhYqzkeaCaSJIWrjtaPsSayi+VDKn/N9EMT6KkIxHA5q3oIb0nUw8t8gGq8LhDjyrabt4EutBIDD3P1SygvEroRQjHZNhZts8mLFITh4E5945oS8fZrlD0f/yQTjm6epOTEouc+HrWAhXws8q4gIC15ObP2svpLMzhhs2mIulw5IcT8dJf26rz61GfksxGh8MLQR6oUQz1xNrragczfJ/RGW5YEs0o+9AxXkIZ5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=37C4l2SL1K5Aq1gaf7D80jGGKhWUBgJ4srM8qIw5pyA=; b=nrMcPqcHBeh91RDNfO92YbNdNFQKjVLNM04u9FURjzY/AUXLtk3bkMiDUALq1pcBG63EXQw+a4AnIlQOZsrQ1OPBM4caxss8Xv7rRLR6wS102KZ1hJGLkDl4j6ureu7HiHxO1+cosgnFG+QSKLCJQPHiiucjM6fmsm9Vz619hjRlFYAVfBdFQc9ZBp394gRkZ36iO2gZ/x/BpELHuj21rTli6F/HzYY/vfbnAypmdBVe+1QWxb+AzsDVk1oc2w0xRHArvaqC5diju9v1t3OfUn2fG/Xw0aYEuEpFusu32JUDcch+VLdm1ruvo1B/gROKkg+ISkxKT5Znz4Phm0xkEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=37C4l2SL1K5Aq1gaf7D80jGGKhWUBgJ4srM8qIw5pyA=; b=leWK4sCe6AqUueR5o0r9b2CwXgp7D4iyB9FEhWZXwKXQ6gWQphpyhdi7mV5aep/5wYdc9bl7sIEuqYHQznRW4EEliUzYEhJHP2Bq7j9fCqkMFB+bFr8OCcfgTMlotuA+7Wc+1kruUNlkNzh1LpuA0l16/vjWRQ2rSewPfBbBtwTb8ARQ+wAltCRnABDxIoU0rieXRGDC1BMbWLa37z8im0CRDDB92fBPk4evDD74WoNGThZ/AAj/IO+hXmpwIhHVqhBFj9ykh/4dRqHCrHXy0edPL3UAvydKP5WdJkmgNx+aHO9GiBiXa+tME6aYkjZqoPesZ843zXwYj3R8lyfIWQ==
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17) by GVYP280MB1632.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:24f::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Sat, 15 Mar 2025 10:57:36 +0000
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::b1d3:d63d:ce0b:3f70]) by GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::b1d3:d63d:ce0b:3f70%5]) with mapi id 15.20.8511.026; Sat, 15 Mar 2025 10:57:36 +0000
Message-ID: <161bc5cf-9742-4e0d-be3c-c3cd1799cb7d@ri.se>
Date: Sat, 15 Mar 2025 11:57:26 +0100
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: "lake@ietf.org" <lake@ietf.org>
From: Marco Tiloca <marco.tiloca@ri.se>
Autocrypt: addr=marco.tiloca@ri.se; keydata= xsBNBFSNeRUBCAC44iazWzj/PE3TiAlBsaWna0JbdIAJFHB8PLrqthI0ZG7GnCLNR8ZhDz6Z aRDPC4FR3UcMhPgZpJIqa6Zi8yWYCqF7A7QhT7E1WdQR1G0+6xUEd0ZD+QBdf29pQadrVZAt 0G4CkUnq5H+Sm05aw2Cpv3JfsATVaemWmujnMTvZ3dFudCGNdsY6kPSVzMRyedX7ArLXyF+0 Kh1T4WUW6NHfEWltnzkcqRhn2NcZtADsxWrMBgZXkLE/dP67SnyFjWYpz7aNpxxA+mb5WBT+ NrSetJlljT0QOXrXMGh98GLfNnLAl6gJryE6MZazN5oxkJgkAep8SevFXzglj7CAsh4PABEB AAHNNk1hcmNvIFRpbG9jYSAobWFyY28udGlsb2NhQHJpLnNlKSA8bWFyY28udGlsb2NhQHJp LnNlPsLAdwQTAQgAIQUCWkAnkAIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDuJmS0 DljaQwEvCACJKPJIPGH0oGnLJY4G1I2DgNiyVKt1H4kkc/eT8Bz9OSbAxgZo3Jky382e4Dba ayWrQRFen0aLSFuzbU4BX4O/YRSaIqUO3KwUNO1iTC65OHz0XirGohPUOsc0SEMtpm+4zfYG 7G8p35MK0h9gpwgGMG0j0mZX4RDjuywC88i1VxCwMWGaZRlUrPXkC3nqDDRcPtuEGpncWhAV Qt2ZqeyITv9KCUmDntmXLPe6vEXtOfI9Z3HeqeI8OkGwXpotVobgLa/mVmFj6EALDzj7HC2u tfgxECBJddmcDInrvGgTkZtXEVbyLQuiK20lJmYnmPWN8DXaVVaQ4XP/lXUrzoEzzsBNBFSN eRUBCACWmp+k6LkY4/ey7eA7umYVc22iyVqAEXmywDYzEjewYwRcjTrH/Nx1EqwjIDuW+BBE oMLRZOHCgmjo6HRmWIutcYVCt9ieokultkor9BBoQVPiI+Tp51Op02ifkGcrEQNZi7q3fmOt hFZwZ6NJnUbA2bycaKZ8oClvDCQj6AjEydBPnS73UaEoDsqsGVjZwChfOMg5OyFm90QjpIw8 m0uDVcCzKKfxq3T/z7tyRgucIUe84EzBuuJBESEjK/hF0nR2LDh1ShD29FWrFZSNVVCVu1UY ZLAayf8oKKHHpM+whfjEYO4XsDpV4zQ15A+D15HRiHR6Adf4PDtPM1DCwggjABEBAAHCwF8E GAECAAkFAlSNeRUCGwwACgkQ7iZktA5Y2kPGEwf/WNjTy3z74vLmHycVsFXXoQ8W1+858mRy Ad0a8JYzY3xB7CVtqI3Hy894Qcw4H6G799A1OL9B1EeA8Yj3aOz0NbUyf5GW+iotr3h8+KIC OYZ34/BQaOLzdvDNmRoGHn+NeTzhF7eSeiPKi2jex+NVodhjOVGXw8EhYGkeZLvynHEboiLM 4TbyPbVR9HsdVqKGVTDxKSE3namo3kvtY6syRFIiUz5WzJfYAuqbt6m3TxDEb8sA9pzaLuhm fnJRc12H5NVZEZmE/EkJFTlkP4wnZyOSf/r2/Vd0iHauBwv57cpY6HFFMe7rvK4s7ME5zctO Ely5C6NCu1ZaNtdUuqDSPA==
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------eR0ZBJioYi3bjJyoQXK700n5"
X-ClientProxiedBy: SG2PR02CA0102.apcprd02.prod.outlook.com (2603:1096:4:92::18) To GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: GVYP280MB0464:EE_|GVYP280MB1632:EE_
X-MS-Office365-Filtering-Correlation-Id: 9ff93e54-4190-4917-fc8d-08dd63b03203
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014|4053099003|13003099007|8096899003;
X-Microsoft-Antispam-Message-Info: UregbOZRDu7H9Ca04YVgA/tQDeYopuZAV7erlToJ5vAq38ZfdTwifbTSV9Tq5zmhLaslYpahHexQ4rbweE5R0hdbGfapsHxWZLHNJNgmnqsGI/zoAeNesIbBMg9UA+gNaNXg4CbjyZDcwh+134MHZvS8Cq+WBI2UVmZe/79i+twRgcECihsX0ooe7jzXC2MgzRkIza0SqEefZIf1DpU63e7A1SQV1aZEZqmxhzq+M96So7eDZ/fKrI8WQRQ06VqgpI7qXTANfVUyCeOqKjdmlmgXRP+lhI/RsN8eZJ1ioq/a1jQ2YqS9KcugGgk+B4IpSNTrTF6cCMeAdd3jVFYJKvIWruHhzV9hwpoSfvToT1P0Wk/PhuK5OuWeGILa1yJFMuo77RtHs08g8nED8vIKOLoN9pnLnIHW3+VVc7Krw2d821w1YxvM2DYqqLUNGSFH+xOOoysKWdAxA188Z2gtF6sYOAy2Rg5HL09U1scj3kZdcB9E6U9SAfVJfGFcZJxUTaxduNoFzLTUCTdCL+CoctfAImlWOk3P6ILZSl/vl5MYXwPYT5C+t3FIv7v3oHKOpiVnnHnxBnxM9s/paGkL8VAimmm5urQfmH6n2Mvf3dXZxMzlSds1BROXEJTvqitYuZI2E0d1W1XfpkTqwNATRaEdk6HeuVIzlOQWEt47qglZX+KSBFCnOPeic9/GQmy1nzCb9Zif0IgtHQbb4hpYVq85LmWI5iPH3Uy04UMceeFkKBTh5uNCfNRm50cWpo7uAoXdMjkIEnblde95RcfyRYAvxVPWRAK0Cf4xzzC8DYcSRRqGVtLOA5EasG8JDzjg7KosXmWhv8huG1Uom0YJmPE3TJcJFjnb02PX3IJxGcYnpCa/Mn97EsxYgjbG4jHfGQ5/Kw3ndGx+tKpkn+XZlyR2QSZtRuRdyMzqiyhQN6rXvA0YcFNApuLJzvHBv1PNblwgirhD4tOJUPDRYBLLrYxtgqnlQ8lCh7JpkHwb2luqzE/lq0AwcTO4qVbwDrfW1ZU13kAOBuglt18jsu2k0ArZ8bEosGGvi745cXg9z5J3S2IwctGyXBaGL44socBLe891DlMviysXXnoTgflW26sYf87OyDDyKOgPdkglnw9PKL6kLCn9lOZrGfQk30ytzTaCXd5bbn+LDl0Tys92AZqw2WGHYaIpwIizAqu1iOWfL77zR5A3rn/Qf2pmyYv8so1DfGXjHIl7mNPLwdPiJ7+osQqy9jkvKeRKXN5NlemA/L9GbZDzzSg+8IHLzm27O4QenSvW8Rq7HgkpCcI73W0AbH9StyuW1qcnKf5RdfhHCq8xetUH21vYrckH99xye2svs8CwmgSwokI7crJ+Rg==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(4053099003)(13003099007)(8096899003);DIR:OUT;SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 9ff93e54-4190-4917-fc8d-08dd63b03203
X-MS-Exchange-CrossTenant-AuthSource: GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2025 10:57:36.2211 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 3JmQiNmD36/hGkJ8SgZvTYpD1rGkiU/S055nTlLld0Jz0gNfcucYtf6v+dIQik/LL8vM+mVqWcY6igBz8VxQjA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GVYP280MB1632
Message-ID-Hash: TN5HHKKUFOYVFVURCVIXBRCGIJJ3IARM
X-Message-ID-Hash: TN5HHKKUFOYVFVURCVIXBRCGIJJ3IARM
X-MailFrom: marco.tiloca@ri.se
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Lake] Comments on draft-ietf-lake-edhoc-psk-03
List-Id: Lightweight Authenticated Key Exchange <lake.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/lake/rGkHkDUiLw7e2LiMoFHGCecH2Ho>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lake>
List-Help: <mailto:lake-request@ietf.org?subject=help>
List-Owner: <mailto:lake-owner@ietf.org>
List-Post: <mailto:lake@ietf.org>
List-Subscribe: <mailto:lake-join@ietf.org>
List-Unsubscribe: <mailto:lake-leave@ietf.org>

Hi all,

Please see below a few comments on draft-ietf-lake-edhoc-psk. Hope it helps!

Best,
/Marco

---------------


[Section 4]

* The labels for K_3 and IV_3 can simply be 3 and 4, respectively, like 
in Figure 6 of RFC 9528.

   (After all, they refer exactly to the same key and IV defined in RFC 
9528, only derived using a different first argument for EDHOC_KDF)

   That also means that you can remove the last two entries of the table 
in Section 8.3.


[Section 5.3.2]

Appendix G of RFC 9528 is now referred twice, about the case where 
PLAINTEXT_3A is too long.

It should be sufficient to refer to it only in the innermost bullet 
point starting with "If the length of PLAINTEXT_3A exceeds ..."


[Section 7]

* On resumption_psk_length and id_cred_psk_length, I suggest to follow 
the same approach used by RFC 9528 for the size of the OSCORE Master 
Secret and Master Salt.

   In practice, here it can be about:

   * Defining a default size, which can be overridden if the two peers 
rely on different agreement means that are out of the scope of this 
document.

   * The default size for resumption_psk_length can be the size of the 
key of the EDHOC AEAD Algorithm used in the EDHOC Session, i.e., in the 
session at the end of which EDHOC_Exporter is invoked.

   * The default size for id_cred_psk_length can be 2 or 3 bytes, 
although I believe that 2 bytes would be good enough. Clearly, there is 
a tension between communication overhead and likelihood of collision of 
PSK identifiers.


* From offline discussions, I understand that the following is intended 
to be admitted. I think that the document should mention it explicitly.

   At the end of a successful EDHOC session, it is always possible to 
derive a resumption PSK, irrespective of the method used in the present 
session. In particular:

      - After a first established session that used a method based on 
asymmetric authentication (e.g., one of the original methods 0-3), an 
EDHOC session is run as based on a PSK resumption key.

      - After an EDHOC session based on a PSK resumption key, a new 
resumption key is derived for a follow-up resumption.


* For simplicity and interoperability, I suggest to specify the following:

   When successfully completing an EDHOC session (irrespective of the 
method used and of being a resumption or not), a peer that support 
PSK-based resumption MUST derive a new resumption key to use for the 
next resumption in the present "session series".


* The previous point raises the question "When is it safe for a peer to 
delete an old resumption key?" This can be handled as below.

   - For the Initiator of a session: when that session uses a PSK K_i as 
resumption key, then the Initiator deletes K_i after having successfully 
verified EDHOC message_4.

     That is, the Responder will have derived the next K_(i+1), which 
the Initiator can know for sure, upon receiving EDHOC message_4.

   - For the Responder of a session: when a session uses a PSK K_i as 
resumption key, then the Responder deletes K_(i-1), if any, after having 
successfully sent EDHOC message_4.

     That is, upon receiving EDHOC message_3, the Responder knows for 
sure that the other peer did derive K_i at the end of the previous 
session in the "session series", thus making it safe to delete the 
previous resumption key K_(i-1).


[Section 7.1]

* It says:

   > If a resumption PSK is offered with a weaker ciphersuite than its 
original exchange, the recipient MUST reject the connection attempt.

   How is a ciphersuite defined to be "weaker" than another one? If 
there is no clear, general answer that can be followed, I suggest to 
change this to be something like:

   > If a resumption PSK is offered with a ciphersuite different from 
the one used in the original EDHOC session, the recipient can fail the 
present EDHOC session according to application-specific policies.


[Section 8.3]

* The label for KEYSTREAM_3 should be 11 (not 12), as previously 
indicated in Figure 2 of Section 4.


-- 
Marco Tiloca
Ph.D., Senior Researcher

Phone: +46 (0)70 60 46 501

RISE Research Institutes of Sweden AB
Box 1263
164 29 Kista (Sweden)

Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity

https://www.ri.se