Re: [secdir] [Last-Call] Secdir last call review of draft-ietf-netconf-crypto-types-20
Valery Smyslov <valery@smyslov.net> Tue, 31 August 2021 07:56 UTC
Return-Path: <valery@smyslov.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B1F03A3763; Tue, 31 Aug 2021 00:56:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=smyslov.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5S7aOfowizco; Tue, 31 Aug 2021 00:56:07 -0700 (PDT)
Received: from direct.host-care.com (direct.host-care.com [198.136.54.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9DE03A3761; Tue, 31 Aug 2021 00:56:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=smyslov.net ; s=default; h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To: References:Cc:To:From:Sender:Reply-To:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=biQPn0sYKpES3YLipMAPnhiVH8u9WhGjSq/TWLtQRHs=; b=qKWPeLHCuAK76hIlYnFNhi6BOE i8SvQAqCa2LTi/RxQ9igPdYdGjFsp10dy/XuT3RBAGTF+arbgFTQ8eHyQLt8KLlB3QQrdR6pEzQCr 1Ytxz6Fh+8Haur5JHptWYFzC2tMD+SMxCXj0vAA6lA4E3sdrUcLlP9nY3cmH60r8Pr6R+M3qC+0RX 6gX79yk7CTLCTbQto27uwnjP6bAdqFFuPsw780fULM8iTTmXf3b0ZRAkj2DmwRNTkc/cTvV/8xPSI XvEymk8wg7vmmfdOg9xlVQ4yzuOctH867/5inehW3p3Ao6jPiS8HaBB0stuspJ9WW/HRc4K44U98v OwidMvrg==;
Received: from [93.188.44.204] (port=61675 helo=buildpc) by direct.host-care.com with esmtpsa (TLS1.2) tls TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from <valery@smyslov.net>) id 1mKycj-00033h-Cn; Tue, 31 Aug 2021 03:56:02 -0400
From: Valery Smyslov <valery@smyslov.net>
To: 'Kent Watsen' <kent+ietf@watsen.net>
Cc: secdir@ietf.org, draft-ietf-netconf-crypto-types.all@ietf.org, netconf@ietf.org
References: <162982978380.3381.17549750696257276827@ietfa.amsl.com> <0100017b8819bf19-1f20d528-72e4-462c-884a-6c29eff0769b-000000@email.amazonses.com> <017c01d79b5e$a00a0000$e01e0000$@smyslov.net> <0100017b89613006-504db539-c16c-4c87-8772-2b6676e9c295-000000@email.amazonses.com>
In-Reply-To: <0100017b89613006-504db539-c16c-4c87-8772-2b6676e9c295-000000@email.amazonses.com>
Date: Tue, 31 Aug 2021 10:56:00 +0300
Message-ID: <034d01d79e3d$a5b5d5b0$f1218110$@smyslov.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_034E_01D79E56.CB07A190"
X-Mailer: Microsoft Outlook 14.0
Content-Language: ru
Thread-Index: AQGndKy5sGszK4BuDx47nymU5VnBUwHC5W7jAisjdPUBQDIbDqvEDG5g
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - direct.host-care.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - smyslov.net
X-Get-Message-Sender-Via: direct.host-care.com: authenticated_id: valery@smyslov.net
X-Authenticated-Sender: direct.host-care.com: valery@smyslov.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/0j8S0pZo4vZmNVstXxlDOyKIZS4>
Subject: Re: [secdir] [Last-Call] Secdir last call review of draft-ietf-netconf-crypto-types-20
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Aug 2021 07:56:14 -0000
Hi Kent, please. see inline. Hi Valery, On Aug 27, 2021, at 12:14 PM, Valery Smyslov <valery@smyslov.net> wrote: Hi Kent, thank you for addressing my comments. A bit more inline. All good. [removing “last-call” alias] Hello Valery. Thank you for your SecDir review, it is very much appreciated and never too late! More comments below. Thanks, Kent On Aug 24, 2021, at 2:29 PM, Valery Smyslov via Datatracker < <mailto:noreply@ietf.org> noreply@ietf.org> wrote: Reviewer: Valery Smyslov Review result: Has Issues I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. When I was re-assigned to review this draft the indicated deadline was already missed by 8 months, so I don't know how relevant the review is. I reviewed the latest -20 version of the draft instead of -18, that was requested. Perfect. The draft defines common YANG data types and groupings useful for cryptography. I din't try to check the YANG module itself. Issues: Shouldn't a Privacy Considerations section be added to the draft? The draft defines quite a lot of privacy-sensitive information (like certificates) with no restriction on read access (as far as I understand). Both the "trust-anchor-cert-grouping” and “end-entity-cert-grouping” groupings have "nacm:default-deny-write” that, to your point, does not restrict reads. That said, only management protocols having mutual authentication (e.g., SSH and/or TLS based transport) can access the data. Is your concern that the certificate’s content would be visible to the administrators? Is your comment on end-entity certificates (containing personally-identifying information), more than trust-anchor-certificates? Yes, it’s mostly on end-entity certificates, however there may be quite a lot of interesting private information besides certificates. If this information is only visible to the administrators and the used management protocols must have mutual authentication, then it’s probably not a big deal. I would have still added a sentence about privacy of the stored data (i.e. that persons, that are allowed to access this data are able to learn quite a lot of private information from it). I don’t insist though, it’s up to you. I added the following to Section 3.8 (The "ietf-crypto-types" YANG Module). The "cert-data" node: The "cert-data" node, defined in both the "trust-anchor-cert-grouping" and "end-entity-cert-grouping" groupings, is additionally sensitive to read operations, as certificates sometimes convey personally identifying information (especially end-entity certificates). However, as it is commonly understood that certificates are "public", the NACM extension "nacm:default-deny-write" (not "default-deny-all") has been applied. It is RECOMMENDED that implementations adjust read-access to certificates to comply with local policy. Is this okay? Yes, thanks. Separately, I thought about if there are any other values in the module that may have privacy concerns but was unable to locate any. certificate-signing-request? Section 3.5. While I understand and support the idea, expressed in this section, I think that the way it is expressed makes it difficult to follow in practice. In general, it's not always obvious how to estimate the "strength" of the underlying secure transport. For this reason it's not clear for me how it is supposed to "compare" the "strength" of the transport with the "strength" of the keys being transported. All comments from this point to the end regard the Security Consideration "Strength of Keys Conveyed” (was "Strength of Keys Configured”). I rewrote the section as follows. Can you please check for accuracy? Strength of Keys Conveyed When accessing key values, it is desireable that implementations ensure that the strength of the keys being accessed is not greater than the strength of the underlying secure transport connection over which the keys are conveyed. However, comparing key strengths can be complicated and difficult to implement in practice. That said, expert Security opinion suggests that already it is infeasible to break a 128-bit key using a classical computer, and s/key/symmetric key/ thus the concern for conveying higher-strength keys begins to lose its allure. Implementations SHOULD only use transport algorithms to those s/transport algorithms/secure transport/ meeting local policy. A reasonable policy may, e.g., state that only algorithms listed as "recommended" by the IETF be used. s\algorithms/ciphersuites/ Another reasonable policy may be to only use quantum-resistant algorithms. Works for me with changes above. I would only add a few words at the end of the second para that things may change in the future (e.g. if full-size quantum computers appear), so it is recommended to follow up-to-date advise from crypto community when protecting transport channel. I would also remove the last sentence in the last para, mostly because it’s difficult to follow in practice (we still know not much about post-quantum crypto and generally it’s not yet widely supported in protocols like TLS) and instead reference RFC 7525 which contains recommendations how to use TLS in applications. I don’t know in similar RFC exists for SSH, sorry... Regards, Valery. Thanks! Kent, as author I saw language like this once in a DoD setting. I agree that it is difficult to implement in practice. I used “SHOULD” (not MUST) to buy some leeway for implementations to be compliant. Makes sense? My understanding of using RFC2119 language is that SHOULD is very close to MUST, but allows some exceptions. So, I still think that you put a responsibility to make security-related decisions on implementers, who often are not experts in this area. FWIW, my YANG-driven server is able to remember what key the client used for authentication (e.g., RSA 2048) and register a callback to test that no greater keys (e.g., 3072 or 4096) are configured by that client. Additional What if the other key configured for the client is X25519? Which is stronger? logic would be needed to prevent a low-strength client from *reading* a high-strength key configured by another client…though the issue can be alternatively resolved by configuring the TLS-stack to prevent low-strength algorithms. That was my point. I think that it’s better to require (by SHOULD) that only those ciphersuites that were “vetted” by IETF (i.e. got “Recommended” status) be used. This will make implementers’ life easier. In addition, the requirement, that "Implementations SHOULD fail the write-request if ever the strength of the private key is greater then the strength of the underlying transport" looks wrong to me. You don't need to have 1024 bits transport protocol strength to transfer 1024 bit key, since even for say 256 bits it's infeasible to break. IDK about this. Again, I saw this constraint once in a DoD setting. My (another) point was that there is generally no point to increase security strength beyond some level. Currently it is believed that 128 bit of symmetric key is infeasible to break (provided the algorithm is not broken itself), If you are lucky have full-sized Post Quantum computer, it’ll be 256 bits. It’s enough to transfer symmetric keys with say 1024 bits of entropy (FWIW). So the requirement that the strength of transport must be always greater than the strength of transported key seems not a good requirement to me. Instead require that the strength of transport be sufficient to make infeasible for an attacker to break it. I think that the better approach would be to advise using strong ciphersuites for transport protocols defined in corresponding RFCs. For example, for TLS 1.3 there are ciphersuites marked as "recommended", that were evaluated by IETF crypto community. I added this sentence: Implementations SHOULD configure allowed transport algorithms to include only those meeting local policy (e.g., listed as "recommended" by the IETF). Good? Perfect. Regards, Valery.
- [secdir] Secdir last call review of draft-ietf-ne… Valery Smyslov via Datatracker
- Re: [secdir] [Last-Call] Secdir last call review … Kent Watsen
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov
- Re: [secdir] [Last-Call] Secdir last call review … Kent Watsen
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov
- Re: [secdir] [Last-Call] Secdir last call review … Kent Watsen
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov
- Re: [secdir] [Last-Call] Secdir last call review … Kent Watsen
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov