Re: [netconf] TLS 1.3 and pre-shared-keys and raw-public-keys (was: More complications)

tom petch <ietfc@btconnect.com> Thu, 08 July 2021 10:36 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36F993A1E16 for <netconf@ietfa.amsl.com>; Thu, 8 Jul 2021 03:36:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pm5mnSNN6Uqw for <netconf@ietfa.amsl.com>; Thu, 8 Jul 2021 03:36:33 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60124.outbound.protection.outlook.com [40.107.6.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D86953A1E13 for <netconf@ietf.org>; Thu, 8 Jul 2021 03:36:32 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kVe6bhPqEPnpwClVihgui4CSM/IGIC+NZaGgZsRiRpCO/Sl4XFLDMCywKghnULuWzz9nTNfl983mfRqn5ltw7IOEpGOWwAuqhgdBlUGD8Ao+hEaluU/HdfJbXzjPxrLheEcuAyD3BB24y5m7br6IXitQvoCCbChJKyIRRL4uU69704q5r5d2f4zQKxJRZPhyPPz6pl34qlSyYDwAsi8Jnp8ofZqi8G5lpr637gFv3PzYEe4Yk+Ao7vvnQGqYOpkNoHSQKwbrZgKK4gbo4nsU4L47Hyhd0FoNZxwtv/zG0RFwpN5XKFpCJE8/BnxCLLGKabuvODdUiKi3YSO+1M2RpA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=igcbMTn4205z4B9+4RyoZSBLRl9QV9IpvFQmzZlgM8I=; b=BsdrRtMNgnmHqmoZBqI8H/mT0kulGMnDmeXYKY4fJDaoV15oIyWQsZx3TPy8k3OsPWAFHVrTK+wgL1y76P2gJgeA/7bgrLzWiO8BsqxT0wwMpY2Xy17mWA2f/4uq3jq5/YhRFcsyIrybBfOK/Pt2JUkid4nqTDvd81DpMAOHl0MFwwADYACgG8D/Fpt/BlddGw3Y2LmM1lMEqoKOJEdxek59xNY94yVjGto3xbiSDtqjkY5s0v1e8p/LoO7D3brJkGLZUr7DpB3piKDCI47ZJbX7Ahy9h77LPccstfXXioqHMqg7oe1FVTGGkLgMHSRWgscgMFXyJ8Agot9sr/owjA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=igcbMTn4205z4B9+4RyoZSBLRl9QV9IpvFQmzZlgM8I=; b=Ptnj5GddByrEifXISeOdKLtESqCq4qN/3GnSxTQjo6q92BHJv5IFf1KApNlaWh82HRXHK8IqHEVudSQ6gwLmFk/iJF7xGqSAKmyaKempu6twtp84cUbib034/b7xsZHc9L+sCydkDlmwvLQngqycUF39wY5JdypWM9HbGhKtf68=
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com (2603:10a6:20b:134::11) by AM6PR07MB3847.eurprd07.prod.outlook.com (2603:10a6:209:31::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.11; Thu, 8 Jul 2021 10:36:29 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::fc5d:ca7a:e2ea:ca9d]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::fc5d:ca7a:e2ea:ca9d%9]) with mapi id 15.20.4308.020; Thu, 8 Jul 2021 10:36:29 +0000
From: tom petch <ietfc@btconnect.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Thread-Topic: TLS 1.3 and pre-shared-keys and raw-public-keys (was: More complications)
Thread-Index: AQHXbSgm1p+QF4Pjqk2AvMPGlpA4yassPBhdgAuIlQCAAC3ngIAA91bK
Date: Thu, 8 Jul 2021 10:36:28 +0000
Message-ID: <AM7PR07MB6248F32D8F4BF3A3A0A1892DA0199@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <0100017980c49236-7975b99d-b591-4da2-a118-f6598517c4e5-000000@email.amazonses.com> <AM7PR07MB624835D8BE54144D97221817A02B9@AM7PR07MB6248.eurprd07.prod.outlook.com> <010001798c0d947e-4d2d14f5-9f0e-450d-ac99-e18c260f0c2b-000000@email.amazonses.com> <AM7PR07MB6248FF0E1E5A053D4FA2BDC4A0299@AM7PR07MB6248.eurprd07.prod.outlook.com> <01000179a0aa5d37-4810234e-8db2-434d-b8fa-780c1648955a-000000@email.amazonses.com> <AM7PR07MB624888AD4CB3C09809B22702A0259@AM7PR07MB6248.eurprd07.prod.outlook.com> <01000179a5bdc371-b665451f-61d4-4364-9d55-e9369f3adc8e-000000@email.amazonses.com> <AM7PR07MB6248BBDEECB1134C56426F73A0239@AM7PR07MB6248.eurprd07.prod.outlook.com> <0100017a0aebfbf3-9e9c22e8-da12-4364-a572-8ce7fd43bf0f-000000@email.amazonses.com> <AM7PR07MB6248E24C8235FBD8573017C8A0309@AM7PR07MB6248.eurprd07.prod.outlook.com> <540b31e5-10a6-495f-cf44-820adb6213b3@sit.fraunhofer.de> <0100017a5987fa69-bb2b90f9-bdd5-44f7-935f-38c568121eeb-000000@email.amazonses.com> <AM7PR07MB624846BC347949725F339706A0019@AM7PR07MB6248.eurprd07.prod.outlook.com> <0100017a81dc358e-7a272368-3503-4b34-80c8-49bafb6d8694-000000@email.amazonses.com>, <DM4PR11MB543800E8C42C8558D311819EB51A9@DM4PR11MB5438.namprd11.prod.outlook.com>
In-Reply-To: <DM4PR11MB543800E8C42C8558D311819EB51A9@DM4PR11MB5438.namprd11.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=btconnect.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: deda5b26-fee5-4d51-940f-08d941fc3ec6
x-ms-traffictypediagnostic: AM6PR07MB3847:
x-microsoft-antispam-prvs: <AM6PR07MB38471A59B71F9CA0E53319AFA0199@AM6PR07MB3847.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: QcE7pkyb5OqEfwwL69xWLxTH1iO5nzgVheZEjF3tRycHgcAE8P1kmouutqa+/pApW4BprE/sLdF4T5PtH8sTuUbKTuypH46HF2xAMfndYnLaYGtWupkn+wdxHcUYaYdhPTJYHA1Rv/JyLao5pLJrZ2LFEPgh3lKHANp8954EjELp0+lani/PXnPowSwWX/6EAs2Y9WAyCyxlwSVl0GsSPk1CEUxDeoRxu4H8kOIZSf69bjNT05UogNta/L3tX334ZKt09OPvEzT4QIMZsi/BNPH3wQ31UZLw1s1eDG4JYOZ2Sx3fVYYbNYkCh80tNx8fVjx8Hvrod5P62pWWDerQHsuFwJ6GMGnfzAjK+n+hFy70X/6hHLaiFRS4NcoMpeG8SbUeScJ8mlR1QDK2LBIoARtlNtuTDcC25WD+SqCQV2/yGKf9yCWBBMZLqE9v7IB71d8bqvh5XsPYHsT+R0LHEplt5iEpg4nW+BU6tfPg5HWyx7hggbkCA1dYhfNnX49Ud+QeEYaIH1/AStVh5CMLcZk8qM0xidmGIJWS5SU2Xau/DDC0fJvIAfWXdAl+SXsNYKkUFfMnFANvaGGLQa+qgZEEPzINspPMHMBolufJzYszHNf+KJ/IP+KEhWlQNzgBR19f1o/8oLc75EXQVYLnBg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(110136005)(55016002)(54906003)(83380400001)(91956017)(86362001)(8936002)(2906002)(52536014)(38100700002)(7696005)(122000001)(9686003)(76116006)(186003)(66556008)(64756008)(66476007)(66446008)(4326008)(8676002)(66946007)(53546011)(6506007)(33656002)(5660300002)(498600001)(26005)(71200400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?eOq3a9LYzJRmYIJ8NkDn6sIxiQyBVSXbrgZeea/fR4ZJXCFJUkEuAXtK?= =?Windows-1252?Q?KEWKe78mmEmcawCoTDjr71iJWYTY5lUPSDkbBe9B6e9y8qqUGkC6MV3y?= =?Windows-1252?Q?xWgDL0+/L6xsqfv+dULityW3Wv0J/FfDDgUJN/rWSQ+gcy0XzSl5+ere?= =?Windows-1252?Q?wnCb/jC1tpAQxKmCySw/8uccaOwqK70qK3ENbusDaSWerW66aXgTg+Dw?= =?Windows-1252?Q?g2FUs5myCBjUlT4oJfdNKj0MLD8eR0aGtvJSyZhophnD60MpDMxOMGgI?= =?Windows-1252?Q?/VbFx53uCJd611jDOisj9w3COuTXaAFM54VOhs1tRPE9cPzTJu7zYap2?= =?Windows-1252?Q?ZbP1aiHLuSaY0XO4f5yp6Dl2xwOl8FSXAafrxI2tRkyOU2apZ6RGT9Sq?= =?Windows-1252?Q?rfsDPTNlmtp5qq+5KSMNL1whQKJ54i7ZtJKC2LBr83ZmrTjcJoCdcB/d?= =?Windows-1252?Q?tslDg/YjzMjddqR0rNZRoewcNS4MLIMm27isIvMRzsOoRSJJMXNu3suY?= =?Windows-1252?Q?COkLtzEErG61qPrTrTLRWd6U5ErDzo0y/A5V7RawiCD96pln/GEHZLUN?= =?Windows-1252?Q?JHvhPmtxm0OyeEnh16FoH9H5LypQOthI47zPMOOIMnisu7W1aFoFXiEm?= =?Windows-1252?Q?QZB6/oTfSnvLYbDME1rlmEApNFyqSWlHqdRimCpqgjTd30kcI3+/STex?= =?Windows-1252?Q?qUl3LhkMQYpmHX2xREzB8pudKpIt5xtK8p/LQntG2xGI4XPizpVyFZXZ?= =?Windows-1252?Q?ajxoC61kh8YEaAIXxKbj/Bw8MZRTK2q539CawV5tjaOAxYdKRrNnSxS5?= =?Windows-1252?Q?ihMG7htTr8vUSXDFetuLF25lSaJ74XwZkAkzIAOuujpxh85Yg5C1N2Sf?= =?Windows-1252?Q?VsiXuJf76s71yx1RTiQV0JmSSwY1nVMBdmnIhi5vJtICojymcMY5nH/p?= =?Windows-1252?Q?2FT3kJFVh/zc9gu/mgZt3zvFH40mgvG+R/Z03Uw87b51G12CIhuKIpJn?= =?Windows-1252?Q?5G4l1ltKM5ul8/ZQTBJzgEmGfLy6ZE9I34/PUJK/g9Mh/ZVSy+hsGv1e?= =?Windows-1252?Q?JA7JE+mBEIqBaEm2zAlvNUzmTXz7dgktUobFcOd39XWvcTtQ1DBCqWPq?= =?Windows-1252?Q?x9KTeyES9ZvXOU20Te/traRJ9XX1MOFpxwk1ja256iCoVyxY4tqv2trl?= =?Windows-1252?Q?5DjiCVg9+FngnTlQATmn+FwSEW21sWzvAxT6+/vsX2IrTUeObT8HIppO?= =?Windows-1252?Q?6RV2mVk6iaUETRAkDQ6EIu7O4n5sYQWKROaRVjfvK4wjzK/Fh/bgOh3/?= =?Windows-1252?Q?lFjBiBZ39Fbu7PBeGU1boPkbTKWF6vhHptUvPx3l9c1JO56vCZXy5lU5?= =?Windows-1252?Q?K95kv2dVLGSydI4RbNQKOdHWX31ro2yG6uw=3D?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: deda5b26-fee5-4d51-940f-08d941fc3ec6
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jul 2021 10:36:28.9734 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: saOGeY/cuHD0hOXFlGk/hRSuMyDgJyQK/iPQEUM9euD/XKsPSkIMy6nFJufvxm70lh4dOpxoF2FaZbRmbpahog==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR07MB3847
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Ao7FAyjyG3Bq3FgaqcIhUYwvo6M>
Subject: Re: [netconf] TLS 1.3 and pre-shared-keys and raw-public-keys (was: More complications)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Jul 2021 10:36:38 -0000

From: Rob Wilton (rwilton) <rwilton@cisco.com>
Sent: 07 July 2021 20:29

Hi Kent,

I think that the short answer is (1).

I've looked through the thread, but I'm not sure that I fully understand the implication of putting it in, or leaving it out.

If this is something that will take a couple of weeks to resolve then I think that delaying a couple of extra weeks to get the structure right is okay.

But if this will take longer to sort out, and it can be easily added in using augmentations then I don't think that we should delay this work further, even if it requires a bis in 6 months time.

<tp>
Rob

I am the one who has done most of the upsetting of the apple cart here.

FUD mostly but the IESG discussions on the EMU EAP I-D last January are an example of how the differences in TLS1.3 cause unforeseen complications (and that I-D is not yet back with the IESG), while the recent TLS1.3 profile for IoT
draft-ietf-uta-tls13-iot-profile-01 
goes into a lot of detail and is an example for me of what NETCONF (and other protocols) will have to do some time; but that is likely a year off.

Mostly, for me, it is about PSK with two TLS I-D thereon providing guidance, such as restricting the use of any one PSK, and without PSK then I feel on much firmer ground. No PSK, means no resumption means no early data.  UTA have just published rfc7525bis which is more input into the use of TLS1.3.  It does not cover PSK adequately (IMHO) but does say avoid early data because it is insecure (which I  find comforting).

Originally I was concerned about raw public keys but then realised that TLS treats them as a particular form of certificate and so require no special treatment so my concern is mostly about PSK.

HTH

Tom Petch

Regards,
Rob


-----Original Message-----
From: Kent Watsen <kent+ietf@watsen.net>
Sent: 07 July 2021 17:46
To: Rob Wilton (rwilton) <rwilton@cisco.com>
Cc: netconf@ietf.org; Henk Birkholz <henk.birkholz@sit.fraunhofer.de>de>; tom petch <ietfc@btconnect.com>
Subject: Re: TLS 1.3 and pre-shared-keys and raw-public-keys (was: More complications)

Hi Rob,

As AD, please advise.  Before the draft-submit window closes, should I:

1) post the suite of drafts with this open issue pending?
2) post the suite of drafts with support for pre-shared-keys and raw-public-keys removed?
3) not post an update to these drafts?

Regarding #2, I don’t think anyone in our WG cares about pre-shared-keys or raw-public-keys.  They were only added by request.  I appreciate us wanting these modules to be useful to groups other than our own, it’s beginning to affect our ability to finish our work.  If the support is removed, it would be removed only in ietf-tls-* drafts (not crypto-types, truststore, or keystore) and thus could be easily added back in by a future effort or proprietary augmentations.

K. // contributor


> On Jun 30, 2021, at 4:49 AM, tom petch <ietfc@btconnect.com> wrote:
>
> From: Kent Watsen <kent+ietf@watsen.net>
> Sent: 29 June 2021 21:48
>
> [tweaking the Subject line]
>
> Hi Henk,
>
> I just realized that I never replied to your question below regarding urgency.
>
> It would be good to get a high-level response ASAP so that a quick-patch can be made that will pass the eminent SecDir review.
>
> A more thorough response would ideally be "ASAP" also, but it is the case that this draft will remain open while a couple other drafts go through WGLC, so the hard-stop window is a few weeks out yet.
>
> <tp>
> On IoT, there is an I-D on this
> draft-ietf-uta-tls13-iot-profile-01
> which looks comprehensive and includes a statement about a plain PSK-based client but I am not clear that this covers the options.  It does cater for authentication by certificate followed by resumption with PSK with warnings about early data (which may be strong enough for a Security AD) but seems to skate over the case where no certificates are involved, in particular it makes no reference to the two TLS I-D about the use of PSK without certificates.  My understanding is that you need those two I-D to make PSK without certificates work and so the I-D is incomplete.  That apart, I think that it is the sort of TLS1.3 profile that the TLS WG expects to see for every application that uses TLS1.3 e.g Netconf must do something similar one day.
>
> raw-public-keys are, to me, different, TLS1.3 simply treats them as another kind of certificate (although the UTA I-D does not) and so does not create similar issues.
>
> Tom Petch
>
>
> Thanks,
> Kent
>
>
>> On Jun 15, 2021, at 7:53 AM, Henk Birkholz <henk.birkholz@sit.fraunhofer.de> wrote:
>>
>> Hi all,
>>
>> a fellow IETF'ler poked me to pay attention to this thread. Sorry for the latency.
>>
>> Hm - dropping PSK support for TLS 1.3 seems to be leaving a bunch of implementations in the IoT space behind that are inching towards migration, currently.
>>
>> How urgent is this? I can certainly massage the current YANG module, but (in theory) I am occupied by another SDO meeting this week.
>>
>> Viele Grüße,
>>
>> Henk
>>
>>
>> On 15.06.21 13:36, tom petch wrote:
>>> From: Kent Watsen <kent+ietf@watsen.net>
>>> Sent: 14 June 2021 15:27
>>> [CC-ing Henk, to whom a question is directed to below]
>>> Hi Tom,
>>>> Top posting a new and different issue.
>>> Thanks for updating the subject line.
>>>> server case psk references ServerKeyExchange and psk-identity-hint neither of which exist in TLS1.3.  The client sends an extension PreSharedKeyExtension which contains a list of identities from which the server selects one as selected-identity for which the identifier is uint16 indexing into the client's list. RFC8446 s.4.2.11.
>>>>
>>>> The client description also needs amending.
>>>>
>>>> TLS1.2 was extended to use tickets in this area to aid session resumption; these have now gone and been replaced by this extension.  I would not suggest adding support for tickets.
>>>>
>>>> As I may have said before, TLS 1.3 is different.
>>> Henk, could you help with these edits?   Support for PSK and raw public key were added to draft-ietf-netconf-tls-client-server per your request and, if memory serves me, didn’t you help me with the YANG update too?   I suppose what is needed is a either a “choice” statement (with cases for 1.2 and 1.3) *or* sibling-container statements (in case it’s necessary both are configured in case, e.g., the client sends one or the other)...
>>> <tp>
>>> Or else drop support for PSK with TLS1.3 at this time because too little is known about it outside the use for HTTP.  I am starting to see I-D about how to use TLS1.3 with application X, even for HTTP,  and I think that such an I-D will be needed for many applications with or without PSK.
>>> Tom Petch
>>>> Tom Petch
>>> Kent
>