Re: [mile] Ben Campbell's Discuss on draft-ietf-mile-xmpp-grid-09: (with DISCUSS and COMMENT)

Florian Schmaus <flo@geekplace.eu> Tue, 26 March 2019 15:39 UTC

Return-Path: <fschmaus@gmail.com>
X-Original-To: mile@ietfa.amsl.com
Delivered-To: mile@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CEB612040C; Tue, 26 Mar 2019 08:39:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.25, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dtbm-zBM3BmW; Tue, 26 Mar 2019 08:39:50 -0700 (PDT)
Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AECBC120333; Tue, 26 Mar 2019 08:39:49 -0700 (PDT)
Received: by mail-wm1-f43.google.com with SMTP id o10so2679358wmc.1; Tue, 26 Mar 2019 08:39:49 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=pe2+V+x/QGcGq5GCzhDMIGJVLJ5MhD7+AzGBsaF2DC8=; b=rHdKVREFlKoEsPS2DhqhS22VN01Q6ccyI0V6S3Oci675nQclm69d5AyK8Mr2PXEBIX b8iVBqQlYSUMVT4pqGxkiJX+hpr08QafuQM+qNrJLhFITXEDhOnGfbqnfp/iWNu7oSF8 88C5ai12lFtQn/YbZD16sA7R/75Z4wsAWIzxA9IhoOa+QSE6rVKvmwpZnl5LDesHrqnT Enw75OFMVf9vUMlELQGo9fovTXN+0oZnzg6oNKduCD2HW5o96vgUECbRLQIxzxv0Xj8/ z7A4LrO7wLs3Fa4KGJI1wYDuqnBFzazjC5zjmOnH2x5LQV0j7J1WQQrb6RuIZ1Vi/8fX 558g==
X-Gm-Message-State: APjAAAX/+xBOhWabd4HdulV79JGyCxZ9X1uuXZytUFfmJuTKE9jLAKkx ktUHZO6192srD7mf4OcBshhJ46myXEJsPg==
X-Google-Smtp-Source: APXvYqxcsobb4p3e+S8CMUgSpo9LDK/JGPh+9acfNb2bkpQkw8X/ENvtobEZxiIe2niq5vBZeerI/w==
X-Received: by 2002:a1c:40d6:: with SMTP id n205mr9500187wma.140.1553614787060; Tue, 26 Mar 2019 08:39:47 -0700 (PDT)
Received: from [10.188.34.160] (nat-inf.rrze.uni-erlangen.de. [131.188.6.45]) by smtp.googlemail.com with ESMTPSA id h84sm521014wmf.15.2019.03.26.08.39.45 (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Tue, 26 Mar 2019 08:39:46 -0700 (PDT)
To: Peter Saint-Andre <stpeter@mozilla.com>, Ben Campbell <ben@nostrum.com>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
Cc: "draft-ietf-mile-xmpp-grid@ietf.org" <draft-ietf-mile-xmpp-grid@ietf.org>, "mile-chairs@tools.ietf.org" <mile-chairs@tools.ietf.org>, The IESG <iesg@ietf.org>, "mile-chairs@ietf.org" <mile-chairs@ietf.org>, "mile@ietf.org" <mile@ietf.org>
References: <154821326562.13271.17282561556237229622.idtracker@ietfa.amsl.com> <4BD85B49-9F10-4724-B5C7-B4257D8A83CD@cisco.com> <8125411B-783D-4469-B60B-422FA4E447FF@cisco.com> <50DCB5B2-8045-4878-ACA2-A9BE1246DFF1@cisco.com> <C92CD6AF-CC03-4734-8CB4-2FACD071EBFC@cisco.com> <840D870A-36F9-4B32-918B-8F4A3D04EBDF@cisco.com> <7F9B5B96-D304-44B4-88D3-A598450477FF@nostrum.com> <2cee29b8-99ce-2053-6044-2c2e4c501557@mozilla.com> <1d13de82-402c-a22c-c6af-8f12af72a389@mozilla.com> <11772ddd-9c24-ee9c-3980-99a57d5c67af@geekplace.eu> <46881488-6e8e-2840-27ad-8d705b537328@mozilla.com>
From: Florian Schmaus <flo@geekplace.eu>
Openpgp: preference=signencrypt
Autocrypt: addr=flo@geekplace.eu; prefer-encrypt=mutual; keydata= mQENBEw8UF4BCAC4H+pf0bJjP8iUvOXtyfM052WptOwK+YCVWx5y8TExQ6u2WuKnsLC5AhdQ qChyLU08zIkno2dvfhyRxxMqhUPmo60ckn6AjLrif28vZiHJRWCfJTipxL2mZO0xNW68d23k 9G4f7+hzNyjWV5SpFG2qg4DWKmwIonZHZMZAK3NtWK7h+3uIVXk32Veuseh/qACZRI63EuQH e+BhnHDFLbb7gYhm78tuzVobU1mEqiNSA783BpxoVUSCEine1/qB5kObmq9Nno0cwnPui8GS sAUmNItKC270UdwLimFdCnV8qEbVEVj+Nh+nE+LVMdNZJa95x/4HHz9oIj8TGc1/RNiXABEB AAG0IkZsb3JpYW4gU2NobWF1cyA8ZmxvQGdlZWtwbGFjZS5ldT6JAVcEEwEIAEECGwMFCwkI BwMFFQoJCAsFFgMCAQACHgECF4ACGQEWIQQTV7AYZbJQPBhFPSCMrCqWeFSONQUCWzoxDQUJ EsBHrwAKCRCMrCqWeFSONWwyB/9GdtTjAryks1OR5kbhSKiw132im4/Z0eDs681qHJlG/lyC uPORV+ru0fxxSNY4QxydG7+pJtJfaTtEn2562ziqr/peqtLdWw+F5RctJbiJD+TPEdAUdxA0 FlTdQoaGz3sC9NxVfYXDGTGGTvC2GUjI2PWgM6RCH1UA3/eWtDogypl4eXHJpjMwDclUxi/X rQjd65gCEAAt5YK+lF3cnvrVzc4AWHoVShVfPePyKAhJOdvFZn9f+3uRcNv5OsZUVZ8ZwAWv dqDp2MO1pjOTyO7aFc2sISjoXc5DQ+74F6e41/KyDImH6ims3mE5taD0RpgDfDxOMxaNvIGU MrzrmFbiuQENBEw8UF4BCADoJRRtsvwu0qPbYKZGxa+sJ44zDX8oLBr/UD8aESTPi7nXtc5V FRQ7v66JEKkKTYq9T/J29P5HsdxMomiR5pbaRUaAjeENscxzXY8BZTZVzSotqQ6ZHyOeGqkK XhNNVUx7pFZF1AO46bk8Ob++6jEFNCSIUNgiDsFggGwd3ngPLrpDblQQujC5pAT9JB6X+OnE 41cYSS5rCbDPaBKHtIyTftcCPwjsgic0qKMhXgthR86Qmna4ZUeHN9+8cEszk/LSEJysDv4Q +j9HiezRQxFXgKjsMyTdD8TAo3uVpZXc7vOrGagi7agK4QAMuozmbwVbOohYvR0w6mZmYEsE uh9fABEBAAGJATwEGAEIACYCGwwWIQQTV7AYZbJQPBhFPSCMrCqWeFSONQUCWzoxIwUJEsBH xQAKCRCMrCqWeFSONQdGB/9qe949moyhflZf/Gj8B4D7RQ+8z4taoo3LBbxl9Kp0gz2C0wgh kkeHDVt2Kf8yiRLkH9DdFnqowYb19qWHJ3+1dmUU2S8VWk24NYDE7svgw2lQOE8/pItXTG/C m9s7Rp8DHcTE1dqPwIGR7LhLtt/+U/NMZi8+cr/AiYlUCD88NcHEScqnO6srTzEWFye2BYRp m3ayR/DN2gJTIdWSqODT/yN07cFphYozg5aIgGzzy4nGGQnm5sLNmsvmu1oY2aAaK5LafqzA 60zEcnRKmX/MsGK7SiOHPIQrot33gjvhnhrtDcVfna26fTvdjkpZoczmpsQhjZdj0kU3VDyP yNkluQENBFdWjtMBCAC9XPyeOKXvBPiwMMqAZIXiqTpy7uKmElD1RpXYl/0ZC+oEvXhlYZE5 sAm3uRN3hulH86wNAP1lvV5nSRa/r4pPr1I8zqzfl1EN0CmVdeIR77UZOhfgLtEKRmUUf3YK 2ZIjVJ9zhYfBZpuuRd6ckoUzZsp2MgdID2ezxcpuBNL8EVkr15p5sEkEU+pqY/QUuXY1MCtf Cs0q4RWUO9UOiAX2tCbMVvDAxtItBEVIwJ5p94glK3tfaBfHE6787KbN5a5AV3vgKVGjlKHA FPr8yY+F5lj9fKjxCjgkga3nwz0vF+FX/8BbErBHU/gUgnFzbwZxq/+XtQxK297k5hc6kEVH ABEBAAGJArsEGAEIACYCGwIWIQQTV7AYZbJQPBhFPSCMrCqWeFSONQUCWzoxOAUJB6YJZQGJ wL0gBBkBCABmBQJXVo7TXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9wZW5wZ3Au ZmlmdGhob3JzZW1hbi5uZXQ5Nzc1MDU5RjNBMjFEQ0UxNkJFNEZCQUUyMjM5QTdFOEY1ODUy MDUyAAoJECI5p+j1hSBS7FsIAJVU3gkZdex8Tj+vwHeLdtupi5iGtcnkijnFyhC7Fbkzn83y Jj2QsYVpPGVC1X2zDFoqoV15GTqBnYoL3QayMZM4zglTP81nBSNbrOai2RYFnTMNv2ivgWPN j38y07+T0Z+boJ+0xrsTT5QYkk75cv8X694YhyaHTcljDwK56dhY+9i/h9cfPZON/cwWoymA PUxNsVqovUfFF+eX9gmZHjzqjEdsdcS5eXb1kr8sdXIhwYRfPeZutTzuKHEYzw1bIidxZeX8 +Q+qbZxC/IOTpE/JC++IAdABExtuZaaABirXXqXNTZPPROcF8Rfo9IoBuJ5s/2zR2j664fB/ p5JQyRwJEIysKpZ4VI41iYkIALMQ/+GvcUhdr0H8iYb1HeijZ2eTQRAv3j7cEAK+8dbBslYr b8eG7pO6swnuhXzEwuxSqoq1UA50sa7L++cN0oJk7S0FDkhVb7vDU1BNQ1DXTeiNbQpvLqXB Y7/drAwHGMo6PS4IkEhzBZfs7FP/Tewpr8LC9i4FdlzDcCxj5rHUVS/+aerd8KZtRKmXmes7 gBxZ+Klwj8eizPmLp4lRxwVjOLQxOSEielhWiuzSzlZGvz5RmBqumVc0sUSB/GTBKYpcIhP/ mBKGNutYkMzCK/JJ5LID/MCpsRsjH8Syd5aRg4shE0aeh1KV9WF/YiQPC/V03LO5Fx2JULpg wmAlqFE=
Message-ID: <fc030e2a-8a97-88f3-6054-74e80a790f8a@geekplace.eu>
Date: Tue, 26 Mar 2019 16:39:45 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.3
MIME-Version: 1.0
In-Reply-To: <46881488-6e8e-2840-27ad-8d705b537328@mozilla.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-GB
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/mile/b2TPn_wTb2k-ZsJ_B-Bfvf__BmE>
Subject: Re: [mile] Ben Campbell's Discuss on draft-ietf-mile-xmpp-grid-09: (with DISCUSS and COMMENT)
X-BeenThere: mile@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Managed Incident Lightweight Exchange, IODEF extensions and RID exchanges" <mile.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mile>, <mailto:mile-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mile/>
List-Post: <mailto:mile@ietf.org>
List-Help: <mailto:mile-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mile>, <mailto:mile-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Mar 2019 15:39:53 -0000

On 25.03.19 23:50, Peter Saint-Andre wrote:
> On 3/25/19 9:31 AM, Florian Schmaus wrote:
>> On 25.03.19 14:52, Peter Saint-Andre wrote:
>>> I propose adding a new subsection under "Countermeasures":
>>>
>>> 8.3.6.  End-to-End Encryption of Messages
>>>
>>>    Because it is expected that there will be a relatively large number
>>>    of Consumers for every Topic, for purposes of content discovery and
>>>    scaling this document specifies a "one-to-many" communications
>>>    pattern using the XMPP Publish-Subscribe extension.  Unfortunately,
>>>    there is no standardized technology for end-to-end encryption of one-
>>>    to-many messages in XMPP.  This implies that messages can be subject
>>>    to eavesdropping, data injection, and data modification attacks
>>>    within a Broker or Controller.  If it is necessary to mitigate
>>>    against such attacks, implementers would need to select a messaging
>>>    pattern other than [XEP-0060], most likely the basic "instant
>>>    messaging" pattern specified in [RFC6121] with a suitable XMPP
>>>    extension for end-to-end encryption (such as [RFC3923] or a more
>>>    modern method such as [XEP-0384]).  The description of such an
>>>    approach is out of scope for this document.
>>
>> I'd like to point out that XEP-0384 can sadly, in its current state, not
>> be used for this, as it only allows encryption of the <body/> element
>> content. But there is the series of "OpenPGP for XMPP" XEPs (XEP-0373,
>> -0374), which do support the encryption of arbitrary extension elements
>> and hence is suitable for this use case. Full disclaimer: I am one of
>> the authors of those XEPs and therefore should be considered biased.
> 
> The proposed text says that if you want one-to-many encryption, you'd
> need to NOT use pubsub and instead mimic that functionality using the IM
> pattern - i.e., each XMPP-Grid "Publisher" and "Consumer" would need to
> be a user@host JID, the Consumers would (likely) subscribe to the
> presence of each Publisher they want to receive information from, and
> the Publisher would send a 1:1 (not 1:many) end-to-end encrypted message
> to each Consumer. We're not recommending that model, but it's something
> that *could* be done.

Right. But my point was that you can not encrypt <IODEF-Document/>,
which is what I assume you would put into those end-to-end encrypted
messages to each Consumer, with XEP-0384 as is, unless you want to put
the XML as string into the <body/>. Sorry if that was not clear.

I would also argue that XEP-0373 provides a standardized technology
(building block) for end-to-end encryption of one-to-many messages in
XMPP, although the XEP is currently marked as 'experimental'.

- Florian