Re: draft-ietf-bfd-optimizing-authentication-13 nits

Alan DeKok <aland@deployingradius.com> Mon, 22 January 2024 01:09 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF17BC14F6A2; Sun, 21 Jan 2024 17:09:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RnXKYGdJi3Ya; Sun, 21 Jan 2024 17:09:18 -0800 (PST)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2ED99C14F5FC; Sun, 21 Jan 2024 17:09:16 -0800 (PST)
Received: from smtpclient.apple (135-23-95-173.cpe.pppoe.ca [135.23.95.173]) by mail.networkradius.com (Postfix) with ESMTPSA id 8E6C71FD; Mon, 22 Jan 2024 01:09:12 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
Subject: Re: draft-ietf-bfd-optimizing-authentication-13 nits
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <F7B727F3-DDE0-4F79-8D8B-7AE96B694D19@pfrc.org>
Date: Sun, 21 Jan 2024 20:09:10 -0500
Cc: Mahesh Jethanandani <mjethanandani@gmail.com>, "rtg-bfd@ietf. org" <rtg-bfd@ietf.org>, draft-ietf-bfd-optimizing-authentication@ietf.org, Ashesh Mishra <mishra.ashesh@gmail.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <FAEC1A4E-7E06-40D0-93CC-FFFB2AA34A3D@deployingradius.com>
References: <4F3695C8-3736-4E55-B5BB-84671FDC367E@pfrc.org> <A8D0BCD4-15FA-4061-A7F0-6D888158F5A3@gmail.com> <D3DB82BE-730A-4D7C-88B8-3B309C5AC3B9@pfrc.org> <9CDB2C7B-BAB6-476C-9F12-BFA7EAD6DD60@gmail.com> <B49A64C7-731F-4729-9D99-AC6C133983C8@deployingradius.com> <F7B727F3-DDE0-4F79-8D8B-7AE96B694D19@pfrc.org>
To: Jeffrey Haas <jhaas@pfrc.org>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/bv34wFeeAVCd9nMWgi5jitQJNT0>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jan 2024 01:09:22 -0000

On Jan 21, 2024, at 3:43 PM, Jeffrey Haas <jhaas@pfrc.org> wrote:
> The procedures in RFC 5880 for the various authentication types discusses what is covered by the authentication.  E.g. password doesn't provide a digest for any of the packet.
> 
> Thus, "Meticulous Keyed ISAAC" is perhaps a reasonable name, and the fact that it doesn't cover the entire packet isn't necessary in the naming.  I.e. none of the other procedures in their name hint as to what's covered.

  OK.  Sounds good.

>> i would lean towards forbidding "simple password", unless it uses a different password than is used for the stronger authentication methods.  Otherwise it leads to the password being exposed.
> 
> I'm supportive of that.  What text would you recommend?

  I'll push some text to github, but we could add text to the section "Updating RFC 5880":

  The use of "Simple Password" authentication is  NOT RECOMMENDED.  There is little security added by exposing a plain-text password "on the wire".

  Where Simple Password authentication is used, the password MUST NOT be used for other Auth Type methods.  Using Simple Password authentication for one packet and then the same password (for example) for Keyed SHA1 authentication would expose the password, and negate all security gained through the use of Keyed SHA1.


Q: 5880 says that Auth Key ID will identify a particular key. But it's not clear if the Auth Key ID field is meant to be different for each Auth Type, or do all Auth Types share the same Auth Key ID?

>> I would also ask if the ISAAC PRNG is reasonably secure, do we really need to occasionally swap to another Auth Type?
> 
> I think this is a matter of question for the generic optimizing procedures.  For the original proposals where we either had zero authentication going on or the latter NULL authentication mechanism with a sequence number, we wanted something that proved periodically that the session was actually up.  That required temporarily switching to strong authentication and, implicitly, one that had sequence numbers to prevent replay attacks.
> 
> For Meticulous Keyed ISAAC, we don't have a need for the periodic strong authentication. 

  I think so, yes.

> Since we now have split motivations, we need text that lets us decide when we should periodically use stronger authentication, or not, for staying in the Up state.

  This should be in the optimizing authentication draft, I suppose.  I have fewer opinions there.

  Off of the top of my head, swapping it once per second seems too high.  Once per day may be too low.  It all depends on how often the links stay up.

  Alan DeKok.