Re: [MLS] More clarity around validating proposals

thomas leavy <thomasleavy1@gmail.com> Fri, 13 May 2022 18:32 UTC

Return-Path: <thomasleavy1@gmail.com>
X-Original-To: mls@ietfa.amsl.com
Delivered-To: mls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15F42C18353E for <mls@ietfa.amsl.com>; Fri, 13 May 2022 11:32:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.846
X-Spam-Level:
X-Spam-Status: No, score=-1.846 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qDoScXZCw1uI for <mls@ietfa.amsl.com>; Fri, 13 May 2022 11:31:58 -0700 (PDT)
Received: from mail-qk1-x72d.google.com (mail-qk1-x72d.google.com [IPv6:2607:f8b0:4864:20::72d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1DE9CC180A9D for <mls@ietf.org>; Fri, 13 May 2022 11:31:51 -0700 (PDT)
Received: by mail-qk1-x72d.google.com with SMTP id w3so7686909qkb.3 for <mls@ietf.org>; Fri, 13 May 2022 11:31:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:from:mime-version:subject:date:message-id :references:cc:in-reply-to:to; bh=0PApOSVUC5u7SWAza6flYtxKLB1UQsh28mHO7fC2ALw=; b=cn87sL/WpTqkKbklglSclcCvnct6OvyN/kOXNqkjCU9lC4bCw5W9pTuQvhAMvnbg4T 18q/yx7sp8JnZYA0+6WEZ93F9GX4MdbljqP650YEA+YPmfed8+IWjcPpsadqFykFJU2u H/z3eR0n79wN3IdVheT6sZ6jBSVv4Xe5CMh1cfakbysWjxxe0Oyvp6+GNBZKOofYvBO3 oXcrgJsLvFtLQFNpQJTWTOnPUwAoaofBnOS6o/K7va5ftqEx+RmAXvTfoXqfR02dK0zn 6l25oGSmcznN9FVYJ5ToFmZ+7gDbNB6aLjOaBF+U2+k6GVwKmtWdEiJjRCPinFxDm5eW vQAg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:content-transfer-encoding:from:mime-version :subject:date:message-id:references:cc:in-reply-to:to; bh=0PApOSVUC5u7SWAza6flYtxKLB1UQsh28mHO7fC2ALw=; b=kGELYiXg3jRDp5XshLPxB28nbWKr2wk0375Zl5Nl9H0jTbsuSiqbYacAJt1bIaE7EL S7fKNYlGxrhImr6eWKa1UF9yiw4bQbxSf0Sk0tHDaM6WY3Rn4AnR++q606XefU0UpL2f NnoSYMq+OVUAopba6/sUeIa8f4GSZm/F7ZgIhUj1xd8hJtCQjuRvpOX4eaEnRxbLGmRu ppiQpZgnhGFP01lbrI0Y99fzXyF/F+sLBDeLaPw7eKdm8EC9N2/FE3sfxEe1qTHNct/Y WUzRSJVNiiGBYB/RS3jgGcc+0Tdu4DkL8rVm36wSzpKxVumdHg8jjj15C7Xdp+F5CCN9 Aubw==
X-Gm-Message-State: AOAM532Q+VfgShI/DHCOBo2llAjzcXRxhmZIlEb8OUUdyiebZiqxJYjE U81/ZiaGyT/922KqGeGeHL4DKZXfvos=
X-Google-Smtp-Source: ABdhPJw5tesM+tvf+y1Qwd/LymsBaorYG75aRqCEK6+AbBgC56cABET0V8lGdjNO/daTsq6VxG67Wg==
X-Received: by 2002:a05:620a:1928:b0:6a0:497a:9b2c with SMTP id bj40-20020a05620a192800b006a0497a9b2cmr4633059qkb.47.1652466709717; Fri, 13 May 2022 11:31:49 -0700 (PDT)
Received: from smtpclient.apple (pool-74-105-148-51.nwrknj.fios.verizon.net. [74.105.148.51]) by smtp.gmail.com with ESMTPSA id l18-20020a37f912000000b0069fc13ce20asm1822952qkj.59.2022.05.13.11.31.49 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 13 May 2022 11:31:49 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-B1CF57C7-C86A-4163-857E-35DEA04873C1"
Content-Transfer-Encoding: 7bit
From: thomas leavy <thomasleavy1@gmail.com>
Mime-Version: 1.0 (1.0)
Date: Fri, 13 May 2022 14:31:48 -0400
Message-Id: <79B1E29C-AF98-48E9-8296-CA7ECA43468D@gmail.com>
References: <067f3ffba04c4fcfad851323a9936339@inf.ethz.ch>
Cc: Mularczyk Marta <marta.mularczyk@inf.ethz.ch>, mls@ietf.org
In-Reply-To: <067f3ffba04c4fcfad851323a9936339@inf.ethz.ch>
To: Richard Barnes <rlb@ipv.sx>
X-Mailer: iPhone Mail (19E258)
Archived-At: <https://mailarchive.ietf.org/arch/msg/mls/MLQ6rrdT2tHj98SZex9q144ix4g>
Subject: Re: [MLS] More clarity around validating proposals
X-BeenThere: mls@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Messaging Layer Security <mls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mls>, <mailto:mls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mls/>
List-Post: <mailto:mls@ietf.org>
List-Help: <mailto:mls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mls>, <mailto:mls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 May 2022 18:32:02 -0000

Hey Richard,

One thing I think we should be careful about is just ensuring that whatever the spec says that it is prescriptive enough as to not break basic interoperability. What I mean by basic interoperability is that if the same application wanted to use one MLS implementation for a web client, and another implementation for a native client that interoperability would be a success assuming that the application implemented each required customization point the same way on both clients. 

If we leave it too open where one MLS implementation allows filtering proposals on receive, and another only inside processing a commit, then it becomes likely that it is not possible to make multiple MLS implementations work the same way across even across multiple clients of same application. I think the RFC does a good job with this around credential validation, it is very explicit about when the application needs to review, and what should happen if that review fails. 

We would be specifying a flow for first processing the set of available proposals to fixed rules that are already defined, and then saying that the remainder of proposals should be given to the application for additional filtering before the commit is created. On the receiving side we would just be looking for the application to identify rule violations that should result in error given the proposals in the commit. 

Thanks,

- Tom

> On May 13, 2022, at 2:04 PM, Mularczyk Marta <marta.mularczyk@inf.ethz.ch> wrote:
> 
> 
> Hi Richard,
> 
> Thanks for the input! In fact, we’re all for downgrading MUSTs to SHOULDs. I think it still makes sense to collect all the rules / guidance from the RFC into a single section 13.4. It would contain:
> 
> Properties that a committed vector of proposals MUST satisfy. They are required for correctness or security of MLS.E.g.
> There MUST NOT be a proposal removing the committer
> ExternalInit MUST only be used in external commit
> The signature MUST verify
> Properties that a committed vector of proposals SHOULD satisfy, i.e., general guidance). E.g.
> There SHOULD be at most one proposal affecting a leaf
> 
> 
> > Though I have to say I don't love the idea of trying to implement the logic to build such a maximal list.
> 
> Very simple :) Say you have a proposal list L. To build a maximal valid list, start with an empty list LVal. Then for each P in L, do: if LVal with P appended is valid, append P to LVal. Else, continue.
> 
> Best,
> Marta
> 
> From: MLS <mls-bounces@ietf.org> on behalf of Richard Barnes <rlb@ipv.sx>
> Sent: Friday, May 13, 2022 5:05:28 PM
> To: Mularczyk Marta
> Cc: mls@ietf.org
> Subject: Re: [MLS] More clarity around validating proposals
>  
> Hi Marta,
> 
> Thanks for thinking about this stuff, these are good issues to clarify.  I agree with your analysis, and the conclusion that the current text is ambiguous.  Though I think some of the ambiguity may have been intentional, to allow for the sorts of policies you describe.
> 
> It seems like there's a prerequisite question as to whether we need to be prescriptive about these things.  One could imagine leaving the set of proposals committed up to the application.  Different choices by the application would have implications that would be worth discussing in the spec (e.g., the members could refuse to commit a Remove sent by an external proposer), but both the risks and the possibilities to mitigate them seem more specific to application deployment contexts, as opposed to core parts of the protocol.  Personally, I have a pretty strong preference for this option.
> 
> If we were going to do that, I think the major impact would just be to downgrade the MUSTs on this front to SHOULDs.  We should probably provide some notes of the general character you describe, but we wouldn't need to be quite so precise because we would just be providing guidance, not hard requirements.
> 
> If we're going to go down the path you suggest, the text changes you propose sound about right.  Though I have to say I don't love the idea of trying to implement the logic to build such a maximal list.  It might be worth noting that it's possible for there to be multiple lists that are maximal in this sense, e.g. if two proposals are mutually exclusive with each other but compatible with the others.
> 
> --Richard
>> On Thu, May 12, 2022 at 12:44 PM Mularczyk Marta <marta.mularczyk@inf.ethz.ch> wrote:
>> Hi all,
>> 
>> Me, Tom Leavy and Joël Alwen think that the text in the RFC around validating proposals, choosing which proposals go into a commit and how to validate a received commit could do with a bit more work.
>> 
>> The root issue is that Section 13.2 states “The sender of a Commit MUST include all valid proposals that it has received during the current epoch. Invalid proposals include, for example, proposals with an invalid signature or proposals that are semantically invalid, such as an Add when the sender does not have the application-level permission to add new users.” There are two intertwined issues with this text:
>> The qualifier “MUST”
>> The text is too vague about what a “valid Proposal” is. E.g. it could be interpreted to mean a Proposal is “valid” relative to the current group state: Can it be applied to the group as it stands now? Then it’s “valid”.
>> 
>> Put simply, it doesn’t make sense to only validate proposals individually. Instead one should validate if the full list of proposals can be committed. Indeed, other parts of the RFC enforce validation steps that apply to the full list. E.g.
>> A ReInit proposal MUST be the only one in the commit, and other existing proposals SHOULD be preferred (13.2.1).
>> Out of multiple proposals affecting the same leaf, the committer MUST choose an arbitrary one (13.2, “If there are multiple (…)”).
>> Out of multiple PSK proposals with the same ID, the committer MUST choose an arbitrary one (13.2).
>> 
>> In fact, once extensions come into play there are likely many more similar situations, even ones affecting lists of otherwise benign proposals (e.g. Add/Remove). Suppose a chat app is built on MLS with a custom room moderator roles extension. The app wants MLS to enforce two rules: Only mods can Add/Remove. Rooms should always have at least 1 Mod. Here’s how the RFC’s current text can become a problem: A and B are the only mods in a room. A makes proposal P1 that removes B. Meanwhile, B makes prop P2 that removes A. C gets both proposals. What should C do?
>> Option 1: validate & cache both proposals. → Problem: C can no longer issue a commit as it “MUST include all valid proposals”. (Alternatively, it does commit to both as instructed by the RFC which leaves the room without a mod.)
>> Option 2: validate & cache the first prop received (say, P1), but reject P2 as validating both means C can’t commit. → Problem: If someone else commits to P2 by ref. C can’t process the commit as it doesn’t “know” P2.
>> 
>> So, to clean all this up a bit more we are working on a PR with 2 main changes:
>> In 13.2, replace “The sender of a Commit MUST include all valid proposals that it has received“ by ”The sender of a Commit MUST commit to a maximal valid list of proposals. The conditions making a list of proposals 'valid' for an epoch are described in Section 13.4. A valid list is 'maximal' if adding any other received proposal would result in an invalid list.“
>> Add Section 13.4 which collects all rules for validating proposals (currently in 13.2, 13.1, 11.1, 8.3) into 3 procedures: validating an incoming proposal, validating a list of proposals on creating a commit and on receiving a commit.
>> 
>> We’d be happy to hear what people think about this!
>> 
>> Marta
>> 
>> _______________________________________________
>> MLS mailing list
>> MLS@ietf.org
>> https://www.ietf.org/mailman/listinfo/mls
> _______________________________________________
> MLS mailing list
> MLS@ietf.org
> https://www.ietf.org/mailman/listinfo/mls