Re: [Lurk] review of draft-cairns-tls-session-key-interface-01

Daniel Migault <daniel.migault@ericsson.com> Sun, 03 April 2016 14:09 UTC

Return-Path: <daniel.migault@ericsson.com>
X-Original-To: lurk@ietfa.amsl.com
Delivered-To: lurk@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5431B12D530; Sun, 3 Apr 2016 07:09:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bYqhSSBOEz0S; Sun, 3 Apr 2016 07:09:51 -0700 (PDT)
Received: from usplmg20.ericsson.net (usplmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6AC2012D0F5; Sun, 3 Apr 2016 07:09:51 -0700 (PDT)
X-AuditID: c618062d-f79216d00000767f-42-57011e1f0c5c
Received: from EUSAAHC004.ericsson.se (Unknown_Domain [147.117.188.84]) by usplmg20.ericsson.net (Symantec Mail Security) with SMTP id ED.EF.30335.F1E11075; Sun, 3 Apr 2016 15:43:59 +0200 (CEST)
Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC004.ericsson.se ([147.117.188.84]) with mapi id 14.03.0248.002; Sun, 3 Apr 2016 10:09:50 -0400
From: Daniel Migault <daniel.migault@ericsson.com>
To: "Fossati, Thomas (Nokia - GB)" <thomas.fossati@nokia.com>, "draft-cairns-tls-session-key-interface@ietf.org" <draft-cairns-tls-session-key-interface@ietf.org>
Thread-Topic: review of draft-cairns-tls-session-key-interface-01
Thread-Index: AQHRja2VvbyRpj+BFk2Jd1bnS0fsC594Q2Uw
Date: Sun, 03 Apr 2016 14:09:49 +0000
Message-ID: <2DD56D786E600F45AC6BDE7DA4E8A8C11223E50B@eusaamb107.ericsson.se>
References: <D3269D86.62A08%thomas.fossati@alcatel-lucent.com>
In-Reply-To: <D3269D86.62A08%thomas.fossati@alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.11]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpgkeLIzCtJLcpLzFFi42KZXLonRFdejjHc4G+7pcWpWQeYLN6u8bNo +fyJzYHZY8mSn0wed29dYgpgiuKySUnNySxLLdK3S+DKuPy/n63ggHTF4uft7A2My8W6GDk5 JARMJLYs/s4IYYtJXLi3nq2LkYtDSOAoo8SPle9ZIZxljBInJ29lBaliEzCSaDvUzw6SEAFJ 7Lm8BSzBLKAssffHRCYQW1jAQeLFo/lsILaIgKPE0ZlTGCFsI4kFX5qAbA4OFgEViaX7JUHC vAK+EnOWXQArERKwk1i0uAVsJKeAvcSOmdeYQWxGoOu+n1rDBLFKXOLWk/lMEFcLSCzZc54Z whaVePn4HyuErSTx8fd8doh6HYkFuz+xQdjaEssWvmaG2CsocXLmE5YJjGKzkIydhaRlFpKW WUhaFjCyrGLkKC0uyMlNNzLYxAiMl2MSbLo7GO9P9zzEKMDBqMTD+8CBIVyINbGsuDL3EKME B7OSCO9lJcZwId6UxMqq1KL8+KLSnNTiQ4zSHCxK4ryNwf/ChATSE0tSs1NTC1KLYLJMHJxS DYxmjwyNpgkYpimWGV0QK/pwVunoBG0uM+UZ/qdk98ht23WmJtDzEueFJ7k8KdN23BJNVDIN WXJdw0ZBo4Zrfs87vbpvvQ9Pbpx9qj75Vyz7w7CNu59+K3gXwX+1+5fw7ESmiKo5m38LszQ9 WMKVuyTyuKBM2PeFfvuPiDXZ79Z3j/dSDOE8xK/EUpyRaKjFXFScCABKZkdAkwIAAA==
Archived-At: <http://mailarchive.ietf.org/arch/msg/lurk/UvjNEJoCvvJYxpg3JYtLdK4MnAE>
Cc: "lurk@ietf.org" <lurk@ietf.org>
Subject: Re: [Lurk] review of draft-cairns-tls-session-key-interface-01
X-BeenThere: lurk@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Limited Use of Remote Keys <lurk.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lurk>, <mailto:lurk-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lurk/>
List-Post: <mailto:lurk@ietf.org>
List-Help: <mailto:lurk-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lurk>, <mailto:lurk-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Apr 2016 14:09:53 -0000

Hi Thomas, 

Thank you very much for your comments. Please see my response inline. 

-----Original Message-----
From: Fossati, Thomas (Nokia - GB) [mailto:thomas.fossati@nokia.com] 
Sent: Sunday, April 03, 2016 10:35 AM
To: draft-cairns-tls-session-key-interface@ietf.org
Cc: lurk@ietf.org
Subject: review of draft-cairns-tls-session-key-interface-01

Hi guys,

I've just finished reading your draft.  There's plenty of information & references in it, thank you.

A few comments below:

- The way the RSA interface is defined at the moment suffers from the "decryption oracle syndrome".  We should really try to avoid this and let the LURK box produce the MS instead -- as you're also hinting in the DISCUSSION para of Section 5.1.1.

MGLT: You are right and I share your opinion that with RSA only the MS or EMS should be returned. I am planning to explain this during the BoF and see if everyone agree with this. Actually this document very the very early version of lurk. It describes the architecture, as well as a first LURK implementation. Outside the architecture aspects, other sections have been addressed in separate draft such as [draft-mglt-lurk-tls-use-cases-00] for the use case,  [draft-mglt-lurk-tls-requirements-00 ] for an analysis of the authentication method performed with LURK, [draft-mglt-lurk-tls-abstract-api-00] for a first protocol description.

- LURK has use cases that need high throughput: we really want to be able to fill the pipe between the Edge and Key Server, and also treat each transaction independently.  That's why a UDP based protocol is attractive, vs. for example a HTTP2/TCP based one, which would incur HOL on packet loss.  Also an efficient encoding like the CBOR/CoAP that you are proposing looks really great to keep the overhead at a minimum.  I've never used CoAP in high throughput applications though (quite the opposite, really), so I'm not sure whether its default congestion control algorithm is OK for this scenario?  Have you done any experiment?

MGLT: Thanks for your input. This is also something I would like to discuss during the BoF. Instead of having one transaction per request, we could also use a HTTPS session and tunnel all transaction through that tunnel. Do you think that is a bad idea? I am really open to any suggestion, so your comment is very useful. Actually, the reason the draft [draft-mglt-lurk-tls-abstract-api-00] has this misleading title abstract API, is that it remains focused on the LURK protocol aspects and does not deal yet on the transport aspect.

- It's too early to nit-pick on the wire format, I know, but I'd be nice to have an explicit transaction id in the LURK payloads so that the Edge Server can correlate the TLS handshake with the specific LURK transaction (for logging/debugging/analysis purposes).

MGLT: I agree. 

- The same comments I sent for draft-erb-lurk-rsalg yesterday about the lack of "LURK box capability" and "Cert/key rotation" interfaces.

MGLT: I think that information in the transactions described in draft-erb-lurk are close to what I came too. I agree that LURK client should be able to check the capabilities of the Key Server, this enable to have a very evolutive LURK protocol and start with a core set of authentication methods.

Happy to discuss this further f2f.

MGLT: Great, happy to share your recommendations / thoughts.

Cheers, t