[secdir] Re: Secdir early review of draft-pignataro-eimpact-icmp-02
Michael Welzl <michawe@ifi.uio.no> Sun, 19 May 2024 17:20 UTC
Return-Path: <michawe@ifi.uio.no>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49D13C14F6A1; Sun, 19 May 2024 10:20:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.997
X-Spam-Level:
X-Spam-Status: No, score=-6.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ifi.uio.no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BvHYE520UrYa; Sun, 19 May 2024 10:20:46 -0700 (PDT)
Received: from mail-out01.uio.no (mail-out01.uio.no [IPv6:2001:700:100:10::50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 350F3C14F6A9; Sun, 19 May 2024 10:20:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ifi.uio.no; s=key2309; h=References:To:Cc:In-Reply-To:Date:Subject:Mime-Version: Content-Type:Message-Id:From:Sender:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=H+ZlBE930v4nVqogGPIFebtuWwIw54kiFepwDMpO7yw=; b=fEdorymXMjak6Gh6gPdC+9sJT2 3ccIMh4qYkWEggy8+J2s9O9BEWCeJQ/gc03XcEuzVLcIW3IUe8l50JB1eZjJoXfEto0+EPYgxuf9V OXRBVCN8FAwcNYswv5sUPvyuGWsNBNKp5VO4Ui63tIOPAntKge+qWsjubYQwQNh4Y7h4FlqopmNeZ l7gwI9WyqvG+GEWS6FYAQ0a4fLJn26qZMDdqflPaN4/3kP64iEbJRO3wnBFYIs0DO+9Jo9nv3S6j7 t4bEERD9h2hjDaPaLGo+t0UWYwZhBQ2nCqiAcD2WhnKOXYMWbGXQ3LANBUVBlEaXf+NGDu6mtdLNM nJGJqh6A==;
Received: from mail-mx03.uio.no ([129.240.10.15]) by mail-out01.uio.no with esmtps (TLS1.2) tls TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (Exim 4.96.2) (envelope-from <michawe@ifi.uio.no>) id 1s8kDB-00Dk01-11; Sun, 19 May 2024 19:20:41 +0200
Received: from triforce.ifi.uio.no ([129.240.66.34] helo=smtpclient.apple) by mail-mx03.uio.no with esmtpsa (TLS1.2:ECDHE-ECDSA-AES256-GCM-SHA384:256) user michawe (Exim 4.96.2) (envelope-from <michawe@ifi.uio.no>) id 1s8kD8-000F8k-2E; Sun, 19 May 2024 19:20:41 +0200
From: Michael Welzl <michawe@ifi.uio.no>
Message-Id: <E22AC068-D940-4FFD-8D26-C8C278EA9F2F@ifi.uio.no>
Content-Type: multipart/alternative; boundary="Apple-Mail=_1323B097-1462-4159-84F8-76B1BB2A79BE"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.500.171.1.1\))
Date: Sun, 19 May 2024 19:20:28 +0200
In-Reply-To: <547644D7-8EF7-42CF-93BD-F5E2F207DA5E@gmail.com>
To: Carlos Pignataro <cpignata@gmail.com>
References: <9C8679E6-4E52-4A5A-A5B5-B55429A0EF51@ifi.uio.no> <547644D7-8EF7-42CF-93BD-F5E2F207DA5E@gmail.com>
X-Mailer: Apple Mail (2.3774.500.171.1.1)
X-UiO-SPF-Received: Received-SPF: neutral (mail-mx03.uio.no: 129.240.66.34 is neither permitted nor denied by domain of ifi.uio.no) client-ip=129.240.66.34; envelope-from=michawe@ifi.uio.no; helo=smtpclient.apple;
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.1, required=5.0, autolearn=disabled, AWL=-0.099,HTML_MESSAGE=0.001,UIO_MAIL_IS_INTERNAL=-5)
X-UiO-Scanned: E4A89362BCCD261DAF2230F0ED6209ED28300603
X-UiOonly: 40FE16F187EA97A5F40FA3938E3517F53FF213B9
Message-ID-Hash: TVDPPVDTE54RASKSAQNKGJBC7RIGVSJ7
X-Message-ID-Hash: TVDPPVDTE54RASKSAQNKGJBC7RIGVSJ7
X-MailFrom: michawe@ifi.uio.no
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-secdir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: draft-pignataro-eimpact-icmp.all@ietf.org, secdir@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [secdir] Re: Secdir early review of draft-pignataro-eimpact-icmp-02
List-Id: Security Area Directorate <secdir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/ZvokD7CmYUpWQ81PFsAU7iKdwXo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Owner: <mailto:secdir-owner@ietf.org>
List-Post: <mailto:secdir@ietf.org>
List-Subscribe: <mailto:secdir-join@ietf.org>
List-Unsubscribe: <mailto:secdir-leave@ietf.org>
I really like this (although whether that’s good enough is for Shawn to say, not me) - the only suggestions I have are: 1) s/component/components 2) expand the DPA acronym. Cheers, Michael > On May 18, 2024, at 7:51 PM, Carlos Pignataro <cpignata@gmail.com> wrote: > > Thanks Shawn and Michael! > > I’d say, Shawn, "very few to none", and devices would share power (not voltage). > > Based on this discussion, would it then be fair to acknowledge the potential, and say that there’s ongoing research without providing any 2119 guidance? > > Like: > > “High-fidelity reporting of power draw for the targeted node's memory, cache, or other component could allow an attacker to perform a remote side-channel attack (i.e., using DPA) during cryptographic operations in order to extract the associated secret key. This is an area of ongoing research and as such scope and countermeasures being researched. That said, this document provides a single power value, not a time series. Concerned vendors could introduce noise in the reported measure, concerned operators could have operational policies matching their requirements. “ > > What do you think? Feel free to edit ✍️ 😊 > > > Thanks! > > Thumb typed by Carlos Pignataro. > Excuze typofraphicak errows > >> On May 17, 2024, at 00:38, Michael Welzl <michawe@ifi.uio.no> wrote: >> >> Hi all ! >> >> Just a thought: a router or switch may not itself be much involved in crypto operations (in the absence of IPSec, and while no encrypted management protocol is in use). In such situations, DPA may be a non-problem. >> >> Devices can of course abstain from sharing power information. What if the security considerations section said that devices should allow their owner to configure if they should share this information while cryptographic operations are active? >> ( I say “allow their owner to configure” because there may be more concerns about sharing power information widely, so anyway an administrator may want to configure the device to share this information only within a certain network domain. ) >> >> Cheers, >> Michael >> >> >>> On May 17, 2024, at 7:16 AM, Shawn M Emery <shawn.emery@gmail.com> wrote: >>> >>> Hi Carlos, >>> >>> Comments begin with SME. >>> >>> On 5/12/24 4:41 PM, Carlos Pignataro wrote: >>>> Hi 👋🏼 Shawn, >>>> >>>> Many thanks for this very useful review!!! Very useful! >>> SME: Of course. >>>> We have been thinking about your review comments, tracked at >>>> https://github.com/cpignata/eimpact-icmp/issues/27 , and have some follow up questions for you (leaving only the relevant part of the review) >>>> >>>> 1. For DPA (as in differential power analysis), an attacker would need a “continuous” Current / Power over time curve while the crypto algo is executed. Would the fact that this is getting a single value (not a time series) be a fair high level counter measure? >>> SME: This countermeasure is still susceptible to divide-and-conquer attacks, where different parts of the secret key are learned over time. >>>> 2. Do these elements typically have DPA protection as in injecting noise? Should we in the results? >>> SME: Ideally yes, but this depends on individual component/system/software design and therefore could not assume one way or the other that this type of mitigation has been employed on any given device. >>>> 3. Could you please share a reference to DPA we could use to add text? And really welcome textual suggestions!!! 😉 >>> SME: Hmmm, this is an area of ongoing research, where promising countermeasures include a holistic approach, such as software flagging sensitive data for the hardware to treat this data with algorithmic noise, i.e., undifferentiated power consumption based on input. So if this type of mitigation was a MUST in this draft then how many network nodes could currently meet this requirement? If that answer is "very few to none" then this draft, IMO, would not be an appropriate source to provide guidance on how to counter remote side-channels attacks. What is the granularity of voltage that would be meaningful as a sustainability metric? >>> >>>> Thanks again, Shawn! >>> SME: NP >>> >>> Regards, >>> >>> Shawn. >>> >>> -- >>> >>>> On Fri, Apr 26, 2024 at 18:49 Shawn Emery via Datatracker <noreply@ietf.org <mailto:noreply@ietf.org>> wrote: >>>>> Reviewer: Shawn Emery >>>>> Review result: Has Issues >>>> […] >>>>> >>>>> However, one attack vector that I could >>>>> think of is a high-fidelity reporting of power draw for the targeted node's >>>>> memory, cache, or HSM component then an attacker could perform a remote >>>>> side-channel attack (i.e., using DPA) during cryptographic operations in order >>>>> to extract the associated secret key. >>>>> >>>>> General comments: >>>>> >>>>> Thank you for the use-case section. >>>>> >>>>> Editorial comments: >>>>> >>>>> None. >>>>> >>>>> >>> >>
- [secdir] Secdir early review of draft-pignataro-e… Shawn Emery via Datatracker
- [secdir] Re: Secdir early review of draft-pignata… Carlos Pignataro
- [secdir] Re: Secdir early review of draft-pignata… Shawn M Emery
- [secdir] Re: Secdir early review of draft-pignata… Michael Welzl
- [secdir] Re: Secdir early review of draft-pignata… Carlos Pignataro
- [secdir] Re: Secdir early review of draft-pignata… Michael Welzl
- [secdir] Re: Secdir early review of draft-pignata… Shawn M Emery
- [secdir] Re: Secdir early review of draft-pignata… Carlos Pignataro