Re: [netconf] crypto-types fallback strategy

Kent Watsen <kent+ietf@watsen.net> Mon, 07 October 2019 23:33 UTC

Return-Path: <0100016da8925c87-fabe62a7-897d-4cbe-98ea-7b4cff7c1c7d-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17A7B120112 for <netconf@ietfa.amsl.com>; Mon, 7 Oct 2019 16:33:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XLyJspLMBKkz for <netconf@ietfa.amsl.com>; Mon, 7 Oct 2019 16:33:49 -0700 (PDT)
Received: from a8-32.smtp-out.amazonses.com (a8-32.smtp-out.amazonses.com [54.240.8.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC7BC120110 for <netconf@ietf.org>; Mon, 7 Oct 2019 16:33:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1570491227; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=89uh9w22ff0F7Hkm6DEccy9VxJV2f1JOLSTr5crqlRk=; b=X+y+/zpuewU449NPWVh0S8R2Mm6b8qFVCw14Sjtzn4BeMeUu5MkUICx8z9XgnUcy YhJGDUlDBvtfmiZyUHpD5CJktmXycvVS5vzqvdcd6frEegGkxwkvbIy2SjR36Ir78Tr G0OelPa4kTDEPC6rs9cSaxJdmWONIoFFHfGTlLSM=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016da8925c87-fabe62a7-897d-4cbe-98ea-7b4cff7c1c7d-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_991A6319-AA5C-4601-85FA-512D8CF06A64"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 07 Oct 2019 23:33:47 +0000
In-Reply-To: <F87DD88B-E73C-4A89-99E7-70247E9C5E62@akamai.com>
Cc: Wang Haiguang <wang.haiguang.shieldlab@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
To: "Salz, Rich" <rsalz@akamai.com>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
References: <0100016d21ee2101-fb4f3288-1975-4a7d-a499-cb42ff8d9e14-000000@email.amazonses.com> <MN2PR11MB4366AE6CF9E03B15EBEA3A39B5B30@MN2PR11MB4366.namprd11.prod.outlook.com> <0100016d3afa694e-ce58ee3a-792f-4c0e-89bb-83d0128a5194-000000@email.amazonses.com> <MN2PR11MB4366F63419F6BD4EF106766FB58F0@MN2PR11MB4366.namprd11.prod.outlook.com> <8053FDA0-77EA-488F-B5A7-F203359105E0@akamai.com> <MN2PR11MB43669B3A47A39FD93B47292FB58F0@MN2PR11MB4366.namprd11.prod.outlook.com> <6924CAD5-F740-4512-8689-E0307AF0BD88@akamai.com> <MN2PR11MB4366B5C09B4348FDAE33E2BCB58F0@MN2PR11MB4366.namprd11.prod.outlook.com> <99BFF357-6A2A-49E0-BB38-37C25DB04213@akamai.com> <MN2PR11MB4366F20EE2FD6DF04B965125B58E0@MN2PR11MB4366.namprd11.prod.outlook.com> <EBE4757D-E99E-41EB-A52B-A25F023BF4BC@akamai.com> <MN2PR11MB4366E4ECE10DFB018941BA5FB58E0@MN2PR11MB4366.namprd11.prod.outlook.com> <0100016d44bda220-51590a9a-0a15-4b63-a49d-47efe712e82e-000000@email.amazonses.com> <2614C1E8-A015-4816-AA3B-F75D02F5701C@akamai.com> <0100016d45447f68-68073ae2-3f96-4c6d-846d-7c661c1cdb0c-000000@email.amazonses.com> <7AE47512-8974-4A8C-9756-699CAE220EF9@akamai.com> <1c08a27c27ea4177b9cfc524c92042f0@huawei.com> <F87DD88B-E73C-4A89-99E7-70247E9C5E62@akamai.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.10.07-54.240.8.32
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/UecQ6nMtYepAqdsf-k0H1I9Cs-4>
Subject: Re: [netconf] crypto-types fallback strategy
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Oct 2019 23:34:02 -0000

[CC-ing Henk, who lobbied for adding PSK and raw public keys to the trust store draft]


> >If I am not wrong, TLS 1.3 support to use raw public key between client and server.
> I think TLS + Raw public key has been specified in RFC 7250 and later merge in RFC 8446 (TLS 1.3)
>  
> You are not wrong.  But public keys do not need to be encrypted or protected by other privacy means.  Private keys still do.  So “TLS with raw keys” does not change the security requirements compared to “TLS with certificates.”
>  
> My issue is that I do not think “TLS with raw keys” is used very much, and we do not have to support it in the first versions of these documents.

I'd like to get Henk's opinion on this.   

Henk, we're talking about modifying the tls-client-server draft to reference all private-key types in Keystore. Specifically, a PSK is effectively a /keystore:asymmetric-keys/asymmetric-key, and a raw public-key is effectively a /keystore:symmetric-keys/symmetric-key, right?  So the question is, when requesting the ability to authenticate TLS servers using those mechanisms, is there also a need to configure the private keys?


All, looking at ietf-tls-client.yang and ietf-tls-server.yang, adding the ability to configure the "private" half of a PSK or raw public key would be something like:

	OLD
	    container <client-identity or server-identity> {
	      uses ks:local-or-keystore-end-entity-cert-with-key-grouping;

	NEW
	    container <client-identity or server-identity> {
	      choice auth-type {
	         uses ks:local-or-keystore-end-entity-cert-with-key-grouping;
	         uses ks:local-or-keystore-raw-public-key-grouping;
	         uses ks:local-or-keystore-pre-shared-key-grouping;

Kent