Re: [saag] Improving the CHAP protocol

Maurizio Lombardi <mlombard@redhat.com> Mon, 23 September 2019 10:29 UTC

Return-Path: <mlombard@redhat.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05D14120288 for <saag@ietfa.amsl.com>; Mon, 23 Sep 2019 03:29:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level:
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qVagdX6Bxxdw for <saag@ietfa.amsl.com>; Mon, 23 Sep 2019 03:29:46 -0700 (PDT)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 09318120105 for <saag@ietf.org>; Mon, 23 Sep 2019 03:29:46 -0700 (PDT)
Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 7749A3084031; Mon, 23 Sep 2019 10:29:45 +0000 (UTC)
Received: from [10.35.206.29] (unknown [10.35.206.29]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5D741600C4; Mon, 23 Sep 2019 10:29:44 +0000 (UTC)
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>, "saag@ietf.org" <saag@ietf.org>
References: <9641f69d-0ffb-1c1d-7fb6-98ef4a54ad2c@redhat.com> <1569087342890.52733@cs.auckland.ac.nz>
From: Maurizio Lombardi <mlombard@redhat.com>
Message-ID: <4354cf7e-74f2-d36c-5fa0-587a2118a507@redhat.com>
Date: Mon, 23 Sep 2019 12:29:42 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.7.0
MIME-Version: 1.0
In-Reply-To: <1569087342890.52733@cs.auckland.ac.nz>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Mon, 23 Sep 2019 10:29:45 +0000 (UTC)
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/ex0diUS_qK_9_U90WiXwq1yS0XI>
Subject: Re: [saag] Improving the CHAP protocol
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Sep 2019 10:29:49 -0000

Hello Peter,

Dne 21.9.2019 v 19:35 Peter Gutmann napsal(a):
> I think many people in this thread are missing the purpose of the exercise.
> CHAP is used because umpteen bajillion devices and systems need it, not
> because it's a very good protocol.  It's insecure because it's CHAP, not
> because it uses MD5.  Since it needs a one-way function, not a collision-
> resistant function, any hash function is as good - or bad since CHAP isn't
> very secure - as any other.  Switching from MD5 to polyquantumresistantind-
> ccaprovable2048bithash will make no difference whatsoever to its security.
> 
> What the original poster asked for is something FIPS compliant.  If you want
> to convince said umpteen bajillion devices to switch, you'd better use the
> universal-standard FIPS-compliant hash algorithm that everything supports,
> which is SHA-256, not a bunch of wierdo fashion-statement algorithms that
> nothing supports, which is most of the other stuff that's been suggested.

That's correct, what we need is just a FIPS-compliant hash function
that is very unlikely do be deprecated anytime soon; and we need it
because the non-compliance of MD5 is breaking iSCSI use cases for our customers now.

The collision resistance of the hash function is not a top priority for us.

Personally, I would like to see adopted something widely used,
SHA-256 and SHA3-256 are good candidates IMO.

Maurizio Lombardi