Re: [secdir] [Last-Call] Secdir last call review of draft-ietf-netconf-crypto-types-20
Kent Watsen <kent+ietf@watsen.net> Tue, 14 September 2021 14:33 UTC
Return-Path: <0100017be4ba7624-b2b8c900-5ee4-431a-b902-422a4576bd62-000000@amazonses.watsen.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96C693A2198; Tue, 14 Sep 2021 07:33:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e6n9XNYid5at; Tue, 14 Sep 2021 07:33:54 -0700 (PDT)
Received: from a48-92.smtp-out.amazonses.com (a48-92.smtp-out.amazonses.com [54.240.48.92]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA3293A2199; Tue, 14 Sep 2021 07:33:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug; d=amazonses.com; t=1631630030; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=YNslsXyqBdvS0hZyf351RUAexr/OlJhqIIUqNZMpI6A=; b=agC2Kz2q0tzSK6cXwDVIrMcZrwDfN1xCWBlLMpcZFoLcstRy8Mcn4ht8SjY1LjNW tdInCuz4j8dpsNpD2pi2rxCmveNT3+9kCOmVV5/UbWvNNzGDBTfIIY1uWTr3+dUC3bF J691bYzeQ4k1ft/Rcq7GjX/NSiqzw/SvbONKipvQ=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100017be4ba7624-b2b8c900-5ee4-431a-b902-422a4576bd62-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_1E8278FA-2AD2-4C52-BDF0-4BDA2143D848"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Date: Tue, 14 Sep 2021 14:33:50 +0000
In-Reply-To: <034d01d79e3d$a5b5d5b0$f1218110$@smyslov.net>
Cc: secdir@ietf.org, draft-ietf-netconf-crypto-types.all@ietf.org, "netconf@ietf.org" <netconf@ietf.org>
To: Valery Smyslov <valery@smyslov.net>
References: <162982978380.3381.17549750696257276827@ietfa.amsl.com> <0100017b8819bf19-1f20d528-72e4-462c-884a-6c29eff0769b-000000@email.amazonses.com> <017c01d79b5e$a00a0000$e01e0000$@smyslov.net> <0100017b89613006-504db539-c16c-4c87-8772-2b6676e9c295-000000@email.amazonses.com> <034d01d79e3d$a5b5d5b0$f1218110$@smyslov.net>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
X-SES-Outgoing: 2021.09.14-54.240.48.92
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/d48svo0jy2lIZWE95HqiQkz25kc>
Subject: Re: [secdir] [Last-Call] Secdir last call review of draft-ietf-netconf-crypto-types-20
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Sep 2021 14:33:57 -0000
Hi Valery, Reducing to just the open bits… >> Is your concern that the certificate’s content would be visible to the administrators? Is your comment on end-entity certificates (containing personally-identifying information), more than trust-anchor-certificates? >> >> Yes, it’s mostly on end-entity certificates, however there may be quite a lot of interesting private information besides certificates. >> >> If this information is only visible to the administrators and the used management protocols must have mutual authentication, then it’s probably not a big deal. I would have still added a sentence about privacy of the stored data (i.e. that persons, that are allowed to access this data are able to learn quite a lot of private information from it). I don’t insist though, it’s up to you. > > I added the following to Section 3.8 (The "ietf-crypto-types" YANG Module). > > The "cert-data" node: > > The "cert-data" node, defined in both the "trust-anchor-cert-grouping" > and "end-entity-cert-grouping" groupings, is additionally sensitive to > read operations, as certificates sometimes convey personally identifying > information (especially end-entity certificates). However, as it is > commonly understood that certificates are "public", the NACM extension > "nacm:default-deny-write" (not "default-deny-all") has been applied. It > is RECOMMENDED that implementations adjust read-access to certificates > to comply with local policy. > > Is this okay? > > Yes, thanks. > > Separately, I thought about if there are any other values in the module that may have privacy concerns but was unable to locate any. > > certificate-signing-request? Of course, CSRs contain similar information as certs but, from the “crypto-types” module perspective, CSRs are never *configured*, as they are only conveyed in dynamic RPCs, and therefore the readability of them from any other than the originator is negligent. Hence I do not believe that extending the comment above to CSRs is warranted. Thoughts? > > >>> Section 3.5. >>> While I understand and support the idea, expressed in this section, I think that >>> the way it is expressed makes it difficult to follow in practice. In general, it's >>> not always obvious how to estimate the "strength" of the underlying secure transport. >>> For this reason it's not clear for me how it is supposed to "compare" the >>> "strength" of the transport with the "strength" of the keys being transported. > > > All comments from this point to the end regard the Security Consideration "Strength of Keys Conveyed” (was "Strength of Keys Configured”). I rewrote the section as follows. Can you please check for accuracy? > > Strength of Keys Conveyed > > When accessing key values, it is desireable that implementations > ensure that the strength of the keys being accessed is not greater > than the strength of the underlying secure transport connection > over which the keys are conveyed. However, comparing key strengths > can be complicated and difficult to implement in practice. > > That said, expert Security opinion suggests that already it is > infeasible to break a 128-bit key using a classical computer, and > > s/key/symmetric key/ amended. > thus the concern for conveying higher-strength keys begins to lose > its allure. > > Implementations SHOULD only use transport algorithms to those > > s/transport algorithms/secure transport/ > That substitution by itself seems to result in an incomplete sentence. How about this: "Implementations SHOULD only use secure transport algorithms meeting local policy.” > meeting local policy. A reasonable policy may, e.g., state that > only algorithms listed as "recommended" by the IETF be used. > > s\algorithms/ciphersuites/ > Done. > Another reasonable policy may be to only use quantum-resistant > algorithms. > > Works for me with changes above. I would only add a few words at the end of the second para that things may change in the future (e.g. if full-size quantum computers appear), so it is recommended to follow up-to-date advise from crypto community when protecting transport channel. > > I would also remove the last sentence in the last para, mostly because > it’s difficult to follow in practice (we still know not much about post-quantum crypto and generally it’s not yet widely supported in protocols like TLS) and instead reference RFC 7525 which contains recommendations how to use TLS in applications. I don’t know in similar RFC exists for SSH, sorry... > I removed the last sentence but did NOT add “a few words”, because the existing text already covers the “need to stay current” angle. The current “last” paragraph reads: Implementations SHOULD only use secure transport algorithms meeting local policy. A reasonable policy may, e.g., state that only ciphersuites listed as "recommended" by the IETF be used. Good? Kent
- [secdir] Secdir last call review of draft-ietf-ne… Valery Smyslov via Datatracker
- Re: [secdir] [Last-Call] Secdir last call review … Kent Watsen
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov
- Re: [secdir] [Last-Call] Secdir last call review … Kent Watsen
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov
- Re: [secdir] [Last-Call] Secdir last call review … Kent Watsen
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov
- Re: [secdir] [Last-Call] Secdir last call review … Kent Watsen
- Re: [secdir] [Last-Call] Secdir last call review … Valery Smyslov