Re: [pcp] Posted auth req slide that was edited during meeting

<yoshihiro.ohba@toshiba.co.jp> Mon, 18 March 2013 13:36 UTC

Return-Path: <yoshihiro.ohba@toshiba.co.jp>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF83B21F8D90 for <pcp@ietfa.amsl.com>; Mon, 18 Mar 2013 06:36:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.089
X-Spam-Level:
X-Spam-Status: No, score=-6.089 tagged_above=-999 required=5 tests=[AWL=2.000, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_HI=-8, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c64iWQejibql for <pcp@ietfa.amsl.com>; Mon, 18 Mar 2013 06:36:57 -0700 (PDT)
Received: from imx12.toshiba.co.jp (imx12.toshiba.co.jp [61.202.160.132]) by ietfa.amsl.com (Postfix) with ESMTP id D608921F8D84 for <pcp@ietf.org>; Mon, 18 Mar 2013 06:36:56 -0700 (PDT)
Received: from tsbmgw-mgw01.tsbmgw-mgw01.toshiba.co.jp ([133.199.232.103]) by imx12.toshiba.co.jp with ESMTP id r2IDanSw017888 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 18 Mar 2013 22:36:49 +0900 (JST)
Received: from tsbmgw-mgw01 (localhost [127.0.0.1]) by tsbmgw-mgw01.tsbmgw-mgw01.toshiba.co.jp (8.13.8/8.14.5) with ESMTP id r2IDammA006225; Mon, 18 Mar 2013 22:36:48 +0900
Received: from localhost ([127.0.0.1]) by tsbmgw-mgw01 (JAMES SMTP Server 2.3.1) with SMTP ID 415; Mon, 18 Mar 2013 22:36:48 +0900 (JST)
Received: from arc11.toshiba.co.jp ([133.199.90.127]) by tsbmgw-mgw01.tsbmgw-mgw01.toshiba.co.jp (8.13.8/8.14.5) with ESMTP id r2IDamEK006222; Mon, 18 Mar 2013 22:36:48 +0900
Received: (from root@localhost) by arc11.toshiba.co.jp id r2IDam46021990; Mon, 18 Mar 2013 22:36:48 +0900 (JST)
Received: from ovp11.toshiba.co.jp [133.199.90.148] by arc11.toshiba.co.jp with ESMTP id YAA21989; Mon, 18 Mar 2013 22:36:48 +0900
Received: from mx.toshiba.co.jp (localhost [127.0.0.1]) by ovp11.toshiba.co.jp with ESMTP id r2IDalVG021486; Mon, 18 Mar 2013 22:36:48 +0900 (JST)
Received: from TGXML330.toshiba.local by toshiba.co.jp id r2IDalaU004362; Mon, 18 Mar 2013 22:36:47 +0900 (JST)
Received: from TGXML337.toshiba.local ([169.254.3.203]) by TGXML330.toshiba.local ([133.199.60.204]) with mapi id 14.02.0328.009; Mon, 18 Mar 2013 22:36:47 +0900
From: yoshihiro.ohba@toshiba.co.jp
To: hartmans@painless-security.com
Thread-Topic: [pcp] Posted auth req slide that was edited during meeting
Thread-Index: AQHOI9IjZVo7fOcKTKW7xX5uXeSScpirYUsA
Date: Mon, 18 Mar 2013 13:36:46 +0000
Message-ID: <674F70E5F2BE564CB06B6901FD3DD78B12CDB0CB@tgxml337.toshiba.local>
References: <341064315C6D0D498193B256F238CF9747C9C9@TK5EX14MBXW603.wingroup.windeploy.ntdev.microsoft.com> <5EF8B214-6563-47C7-9D48-621D9D5E1B29@yegin.org> <tslip4r42r3.fsf@mit.edu> <674F70E5F2BE564CB06B6901FD3DD78B12CD0A01@tgxml337.toshiba.local> <tslk3p4zyze.fsf@mit.edu>
In-Reply-To: <tslk3p4zyze.fsf@mit.edu>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
x-originating-ip: [133.199.16.60]
msscp.transfermailtomossagent: 103
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: pcp@ietf.org
Subject: Re: [pcp] Posted auth req slide that was edited during meeting
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Mar 2013 13:36:58 -0000

Sam,

We are discussing the posted auth req slide, and sorry I have no intention to deviate from that.

Regarding your question: " Would you care to explain why you think people set up security association expiration so we can evaluate whether this particular use opens up any attacks with regard to the design goals of security association expiration?", the design goal is to bind the SA with the authorization lifetime.  In this discussion, authorization lifetime is in terms of using keys to protect PCP messages (and not necessarily in terms of the PCP states).

If we use the SA after expiration, it can end up with a situation where a user who is not allowed to create or modify a PCP state after the SA expiration can do it using the expired SA, which is undesirable from security perspective.

In any case, we should follow the definition of EAP re-authentication in RFC 5247 about re-authentication timing.
I see absolutely no reason to change the definition.

Yoshihiro Ohba


-----Original Message-----
From: Sam Hartman [mailto:hartmans@painless-security.com] 
Sent: Monday, March 18, 2013 9:14 PM
To: ohba yoshihiro
Cc: alper.yegin@yegin.org; pcp@ietf.org
Subject: Re: [pcp] Posted auth req slide that was edited during meeting

>>>>>   <yoshihiro.ohba@toshiba.co.jp> writes:

    > Sam, It is quite obvious from the definition EAP re-authentication
    > in RFC 5247:

    > " EAP Re-Authentication EAP authentication between an EAP peer and
    > a server with whom the EAP peer shares valid unexpired EAP keying
    > material.  ^^^^^^^^^ "


I'm sorry, but that doesn't answer my question at all.  You're quoting definitions at me.  I was hoping you'd be willing to engage in a discussion of what security properties PCP needs and what attacks are enabled by various decisions we make here.
Would you be willing to do that?

--Sam