Re: [netconf] ietf-ssh-server host key

Roman Janota <Roman.Janota@cesnet.cz> Thu, 17 August 2023 11:34 UTC

Return-Path: <Roman.Janota@cesnet.cz>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0419BC151063 for <netconf@ietfa.amsl.com>; Thu, 17 Aug 2023 04:34:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.197
X-Spam-Level:
X-Spam-Status: No, score=-2.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.091, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cesnet.cz
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EjgPcYDGtTvd for <netconf@ietfa.amsl.com>; Thu, 17 Aug 2023 04:34:35 -0700 (PDT)
Received: from office2.cesnet.cz (office2.cesnet.cz [IPv6:2001:718:1:101::144:244]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92477C14CE2E for <netconf@ietf.org>; Thu, 17 Aug 2023 04:34:32 -0700 (PDT)
Received: from [IPV6:2001:67c:1220:80c:7:8fa0:bf69:6f3c] (unknown [IPv6:2001:67c:1220:80c:7:8fa0:bf69:6f3c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by office2.cesnet.cz (Postfix) with ESMTPSA id EB76E40006E for <netconf@ietf.org>; Thu, 17 Aug 2023 13:34:29 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cesnet.cz; s=office2-2020; t=1692272069; bh=Ixb5FnaKKItme2MZvq3JOYo4q4wbdWpOtAktFb/ErRc=; h=Date:Subject:To:References:From:In-Reply-To; b=lua9c6u4M/OHzKcyN3ugKPi/3d9T3l3yLwmlRj2mMBXn0kwdXJeP2ZBlYQHTJ6SGg zlkF1NARCh/xpFWGc9+jSOca/YlGay0/Ny6Mz5OYyUdHAtuVvRrnKChR9W7s3Xf0hd hVU+i5geJfmrBEDxsQUloeZEWV6FJJVWXFUpR0VwGtEr5sVMwdJP0jLo+Q1mAcNjTT mVu2K6mQmhv1q0TAgefhqTK3uUFD5XgVocCQuv4+ydZs37uVaNvHlNL92c4WAuw/zW lmA6+fUI/vsm6IMwYnbpp7fAs9/pzFQgYLTIhCNj5xxPNlh6jdXVWoHMNXeONxrv9d Lcb+ZM6t1p+sg==
Message-ID: <065a704b-e378-3d9a-b33e-63969c9e1579@cesnet.cz>
Date: Thu, 17 Aug 2023 13:34:29 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.14.0
To: netconf@ietf.org
References: <674ad1df-38de-8e94-13ab-b37afe662075@cesnet.cz> <010001888b913090-26c9b881-0dd1-47a0-b005-9e3bad9782ae-000000@email.amazonses.com> <ad968ecd-5675-f217-3601-35f41f2daf3c@cesnet.cz> <BN8PR14MB3459C3178D3E77152917546A8D55A@BN8PR14MB3459.namprd14.prod.outlook.com> <01000188b68bc6a1-7845b1ca-30a7-4a36-94db-354cf8cc858b-000000@email.amazonses.com> <9f04d84e-5c66-7269-b1e6-ef62a002d705@cesnet.cz>
Content-Language: en-US
From: Roman Janota <Roman.Janota@cesnet.cz>
In-Reply-To: <9f04d84e-5c66-7269-b1e6-ef62a002d705@cesnet.cz>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms000201030908010004070505"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/LXCsf4p2sZm8jcXkoXBrGQtpKSA>
Subject: Re: [netconf] ietf-ssh-server host key
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Aug 2023 11:34:39 -0000

Hello,

are there any updates on this? We are still wondering if the 
restrictions on the public-key-format leaf are necessary.

Another somewhat similar issue regarding the leaves public-key and 
public-key-format is them being mandatory. This makes sense for example 
in the ssh-server-grouping/client-authentication/public-keys container 
of the ietf-ssh-server YANG module, because the public key is actually 
used (and can not be generated from the private key, because there is 
none). On the other hand, in the 
ssh-server-grouping/server-identity/host-key/public-key (same module), 
the public key is most likely not going to be used, because in most 
cases it will be generated from the private key. Then, in this case, it 
would be completely fine if the leaves public-key and public-key-format 
were left out.

Kind regards,

Roman Janota.

On 6/14/23 11:03, Michal Vasko wrote:
>
> Hi Kent, Jeff,
>
> I am in no way a security of SSH expert, mostly just a user of 
> cryptographic libraries so I am fine with keeping both the private and 
> public key nodes in the module. Making the public key optional would 
> be helpful for us, though.
>
> As for removing all the must conditions, I definitely support that as 
> it will allow some format pairs that we want to use but are forbidden. 
> Regarding all the places where they could be removed, when talking 
> about client authentication I was still referring to the server 
> configuration, specifically YANG ietf-ssh-server lines 281 - 291, so I 
> think all of those could be removed and perhaps mention that some 
> implementations may not support all the combinations of public-private 
> key formats, not sure how to solve this exactly. Also, I have yet to 
> hear any justification for all those must conditions in the form they 
> are now present in the modules.
>
> Regards,
> Michal
>
> On 13. 6. 2023 22:56, Kent Watsen wrote:
>> [Top-posting as my comment isn't line-specific]
>>
>> Thanks Jeff.
>>
>> The heart of the issue (IMO) is that the crypto-types module requires 
>> each instance of the "asymmetric-key-pair-grouping" to specify the 
>> public-key (unexpected) and the private-key (expected).
>>
>> Some suggest the public-key doesn't have to be specified, as it can 
>> always be extracted from the private-key.  But this assumes that 
>> access to the private key is given, which may not be the case if the 
>> private-key is:
>>
>>    1) restricted by access-control (e.g., NACM)
>>    2) encrypted-by another key
>>    3) or hidden by the system.
>>
>> Yet the public-key is needed in order to encrypt a message using it. 
>>   Other groupings (see keystore draft) enable X.509 certs to be 
>> configured on a per asymmetric-key-pair basis, and there are examples 
>> showing this being done for a "hidden" key (think a TPM-protected 
>> IDevID).
>>
>> So regardless if a public-key can or cannot be extracted from a 
>> private-key, there are other reasons for why having the public-key 
>> present is desirable.  The issue seems to teeter on if it MUST or MAY 
>> be present.
>>
>> In YANG, we could convert this:
>>
>>   grouping asymmetric-key-pair-grouping {
>>     uses public-key-grouping;
>>     ...
>>   }
>>
>> To this:
>>
>>   grouping asymmetric-key-pair-grouping {
>>     uses public-key-grouping {
>>       refine "public-key-format" {
>>             mandatory false;
>>           }
>>       refine "public-key" {
>>             mandatory false;
>>           }
>>       }
>>     }
>>     ...
>>   }
>>
>> And then deal with the resulting fallout, e.g., refinements made in 
>> the SSH/TLS modules anticipating that the public-key must exist, 
>> essentially the part that Jeff's response focused on.
>>
>> Thoughts?
>>
>> PS: Rich Salz (from Security area) agreed to review this issue 
>> sometime before next week.
>>
>> Kent  // author-hat
>>
>>
>>
>>
>>> On Jun 13, 2023, at 11:16 AM, Hartley, Jeff 
>>> <Jeff.Hartley=40commscope.com@dmarc.ietf.org> wrote:
>>>
>>> Hi Michal;
>>>
>>> Hi Kent,
>>>
>>>     Hi Michal,
>>>
>>>         Hello,
>>>
>>>         we are implementing these modules (ietf-netconf-server and
>>>         imports) and I have a question regarding the container
>>>         `/ietf-netconf-server:netconf-server/listen/endpoint/ssh/ssh-server-parameters/server-identity/host-key/public-key`.
>>>         It looks like this
>>>
>>>         +--rw public-key
>>>            +--rw (inline-or-keystore)
>>>               +--:(inline) {inline-definitions-supported}?
>>>               |  +--rw inline-definition
>>>               |     +--rw public-key-format     identityref
>>>               |     +--rw public-key            binary
>>>               |     +--rw private-key-format?   identityref
>>>               |     +--rw (private-key-type)
>>>               |        +--:(cleartext-private-key)
>>>         {cleartext-private-keys}?
>>>               |        |  +--rw cleartext-private-key?   binary
>>>               |        +--:(hidden-private-key) {hidden-private-keys}?
>>>               |        |  +--rw hidden-private-key?   empty
>>>               |        +--:(encrypted-private-key)
>>>         {encrypted-private-keys}?
>>>               |           +--rw encrypted-private-key
>>>               |              +--rw encrypted-by
>>>               |              +--rw encrypted-value-format    identityref
>>>               |              +--rw encrypted-value           binary
>>>               +--:(keystore)
>>>         {central-keystore-supported,asymmetric-keys}?
>>>                  +--rw keystore-reference?   ks:asymmetric-key-ref
>>>
>>>         What is there the public key for? For a key to be used as a
>>>         host key you only need the private key (technically, you can
>>>         always generate the public key from the private key but the
>>>         public key is not needed at all in this case) and it is
>>>         causing us some problems because it is even required to be
>>>         in the `ssh-public-key-format` without any information as to
>>>         why. Thanks for any explanation.
>>>
>>>     You are correct, the "public-key" node typically isn't needed
>>>     when configuring SSH.
>>>     The reason it is in the `SSH model is because:
>>>     1) sometimes (I forget which Security person said this) a
>>>     public-key cannot be extracted from a private-key, thus a
>>>     generic private-key type seems to be incomplete without its
>>>     public-key encoded also.  It would be good to reconfirm this claim.
>>>
>>> MV: That is indeed interesting and libssh nor OpenSSH sshd would 
>>> probably not be able to use such a key because they expect paths to 
>>> the private key when setting the host key. I must also correct 
>>> myself, it really seems the tools generate the public key themselves 
>>> because it is presented to the client when creating the SSH session.
>>>
>>>     2) albeit unusual, it isn't a hard thing for (my) code to encode
>>>     the public-key also, so I felt it was a minor nuisance to ensure
>>>     future-proofing.
>>>
>>> MV: The problem is with the required public key formats that make it 
>>> chaotic. Note that we have also defined our own identity for the 
>>> private key format which corresponds to 
>>> `subject-public-key-info-format` of the public key (X.509).
>>>
>>> So for SSH:
>>>
>>> private key format - rsa-private-key-format, ec-private-key-format 
>>> (, subject-private-key-info-format)
>>> public key format - ssh-public-key-format
>>>
>>> And for TLS:
>>>
>>> private key format - rsa-private-key-format, ec-private-key-format 
>>> (, subject-private-key-info-format)
>>> public key format - subject-public-key-info-format
>>>
>>> Now, some practical information that may also be relevant.
>>>
>>> libssh can directly work with:
>>>
>>> private key format - rsa-private-key-format, ec-private-key-format
>>> public key format - ssh-public-key-format
>>>
>>> And OpenSSL can directly load:
>>>
>>> private key format - subject-private-key-info-format
>>> public key format - subject-public-key-info-format
>>>
>>> We wanted to support both of these pairs for both SSH and TLS but 
>>> not to mix them because it requires much more code to make it work 
>>> ("manual" key creation using OpenSSL). So, SSH is fine, by default, 
>>> because libssh can be used to load both private and the public key. 
>>> We have encountered the problem when trying to use 
>>> `subject-private-key-info-format` with 
>>> `subject-public-key-info-format`, the latter was not allowed. But 
>>> with TLS the problem is there already, the allowed formats are not 
>>> really compatible and the private keys need to be created manually 
>>> to use OpenSSL for the TLS connection.
>>>
>>>     3) thus the propagation of the asymmetric-key-pair-grouping (in
>>>     crypto-types) makes it to the ssh-client-server draft.  FWIW,
>>>     this is why it's named "asymmetric-key-pair-grouping" and not
>>>     "private-key-grouping".
>>>     Can you say some more about why its presence is causing problems?
>>>     If this is a real problem (or perhaps even if just a nuisance),
>>>     the crypto-types drafts could define also a
>>>     "private-key-grouping" (having just the private-key) and then
>>>     recast  "asymmetric-key-pair-grouping" to use it.  Or, if it
>>>     turns out the claim (see #1) in unfounded,
>>>     the  "asymmetric-key-pair-grouping" could be discarded altogether.
>>>
>>> MV: I tried to describe the problem and I hope it can be understood. 
>>> I am not saying the YANG needs to reflect the APIs of common 
>>> libraries but am then wondering based on what were the restrictions 
>>> of SSH and TLS public key formats added. Furthermore, there can 
>>> always be new public key formats added by deriving from the provided 
>>> identity and these would not be possible to use because of the must 
>>> conditions. It actually seems the public key formats are restricted 
>>> for all their uses (even for SSH/TLS client authentication) so new 
>>> public key formats can never be used and the base identity is useless.
>>>
>>> What would make most sense based on our experiences would be to 
>>> either remove the public keys from the host key altogether or, if 
>>> there really are reasons for keeping them there, lift their severe 
>>> restrictions. Ideally, to only allow compatible pairs together but 
>>> that would require some non-trivial modelling work. It would also be 
>>> possible to remove all the conditions and let implementations decide 
>>> what they exactly support because there seems to be too many options 
>>> although it is always better if properly expressed in YANG. And one 
>>> should never forget to allow for new future formats which cannot 
>>> really be added and used, currently, at least for the public key.
>>>
>>> JH: If I’m hearing the proposal correctly:
>>>
>>> Module ietf-ssh-server:
>>>
>>>  1. We should remove the two refined constraints, lines 193-202.
>>>      This would allow for both the flexibility that Kent described,
>>>     as well as reducing the strict identity constraints that you
>>>     described.
>>>     I also recommend adding brief descriptive text capturing some of
>>>     the above commentary, where we describe the recommended
>>>     constraints as well as the intention of leaving implementers
>>>     this flexibility.  i.e., where we’re unable to explicitly
>>>     constrain in favor of implementation flexibility and
>>>     future-proofing, we should describe usage and **intended**
>>>     constraints.
>>>     (I also agree that attempting to refactor/model for every
>>>     possible valid combination is a monstrous task; it would likely
>>>     produce monstrous YANG.)
>>>  2. What about the two refine constraints, lines 215-224?
>>>
>>> Module ietf-tls-server:
>>>
>>>  3. Remove the two refine constraints, lines 215-224.  Same
>>>     motivation, and I’d make the same recommendation for verbose
>>>     usage/constraint recommendation text in a description.
>>>  4. What about 235-244?
>>>
>>> Module ietf-ssh-client:
>>>
>>>  5. You mentioned “even for SSH/TLS client authentication”, thus the
>>>     same question re: lines 171-178.
>>>  6. Same question re: lines 236-244.
>>>
>>> Module ietf-tls-client:
>>>
>>>  7. Same question re: lines 214-223.
>>>  8. Same question re: lines 234-243.
>>>
>>> Ideally, we can apply the group’s guidance regarding these 
>>> constraints and identities evenly across these similar grouping 
>>> usages in both client and server modules.   I’m happy to make the 
>>> edits and post them this week if the stakeholders agree upon the 
>>> constraint reductions, description text, and exactly where to apply 
>>> them.  (We at the BBF are eager to move forward with the 
>>> client-server suite.)
>>>
>>> Much appreciated;
>>>
>>> -Jeff Hartley
>>>
>>> _______________________________________________
>>> netconf mailing list
>>> netconf@ietf.org
>>> https://www.ietf.org/mailman/listinfo/netconf
>>
>>
>> _______________________________________________
>> netconf mailing list
>> netconf@ietf.org
>> https://www.ietf.org/mailman/listinfo/netconf
>
> _______________________________________________
> netconf mailing list
> netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf