[secdir] Re: [jose] Re: Secdir last call review of draft-ietf-jose-fully-specified-algorithms-08

Orie <orie@or13.io> Wed, 02 April 2025 17:50 UTC

Return-Path: <orie@or13.io>
X-Original-To: secdir@mail2.ietf.org
Delivered-To: secdir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id B8DF7168C269 for <secdir@mail2.ietf.org>; Wed, 2 Apr 2025 10:50:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=or13.io
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hvC7qdBNVZKQ for <secdir@mail2.ietf.org>; Wed, 2 Apr 2025 10:50:40 -0700 (PDT)
Received: from mail-ua1-x92f.google.com (mail-ua1-x92f.google.com [IPv6:2607:f8b0:4864:20::92f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id DA1B8168C242 for <secdir@ietf.org>; Wed, 2 Apr 2025 10:50:40 -0700 (PDT)
Received: by mail-ua1-x92f.google.com with SMTP id a1e0cc1a2514c-86d2fba8647so111401241.0 for <secdir@ietf.org>; Wed, 02 Apr 2025 10:50:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=or13.io; s=google; t=1743616240; x=1744221040; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=vRjy04yqqP88uDEq/0Kv8uUx6+1YZVDhp2m/9PhvfJE=; b=N6r851+25x4/vvJmXbE+cYiQkaufFZWfe0AXu0ZrA4vUA4nMKKKmxvYJSoU2Kv/bBb 7tWwHbcqaLsRSywFDINCH8Enu583fNvLcC3JJm5YJa5cuOIPpJNb2foh2HZVKTpUiNvt iaEihBJTkR97zylf2yM36J+tIiIWfcwUyWUELCC2Rwp+mddXzruNBekVNRuxELuXfIwf nshEw8kuK3+uu1xUfI0YNTz+m0lar8nbtspalYkg32oEObfZRM7rhfJ6dS4x8mEU4Qrk 4/T8Kod3nWIb8BiUFBqYGOPXrpfx92rcMlEsI5FHgryEC15cTmPtkm0gQqWssHlBQ/Bd cYtg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1743616240; x=1744221040; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=vRjy04yqqP88uDEq/0Kv8uUx6+1YZVDhp2m/9PhvfJE=; b=snF3kQqd1l4xRyiDVc8SzrUNgQxFMUavHxO28knjKAqswDDjSUsEPoYn1H+30fFzrd +wjRV1ax+uh/j0O+E0UNZ8x7Zn9WdKzpKXUkZ8JJ13wEh1FvXmwAANxqUibRtFc5jFW7 6H365bmLJWDbqoNZwsUSyrJf/FGRZp64sI0BpO7KILV1Y6Ixo8tSc/pEQXzZGHVJO4b5 s+cEMR+Z3RYZoxtxBRu0Al63QLSI83hdXdo5E52qYAC6xY548LrbwRgc4Ii6kGZLjP3r ChtWfXDktEYHePOL0KVsPLU7e2cMu1RjntdV5kTRownE5ro5DRpQaQQ3oFuMsKRH+k34 Jacg==
X-Forwarded-Encrypted: i=1; AJvYcCUznWoOsCTb5buUAaj8+SPIW5RDsDTbAQ2EF0ATmWP4zXyZYptvRzcKdbWx8DSzVx6ORf7lzXg=@ietf.org
X-Gm-Message-State: AOJu0YxHqcflM4UB/i8F5Fje8T1gPF1dqsU/GqxELk6sweHDq/v9nnv1 iZBs7GRw0ikOCNrhD9Ae1S8lqTvqQKOrDJ2touvwEp5ddg7q6c6q8PjqwZE36jL8N6OVIU376WP LCuPkg/bJEddFN/vY+KxVDikyHSWjU0+bUd39Iw==
X-Gm-Gg: ASbGnctv5yOFV+yr13YJ5SKPVp5JtM/yX/aYTYEtewSsv53P92hGszRVi9Fv1ND/N1k c7T2gKctrFAWhzDi2VHrG3BdmJch61/NzGgylhqLUKUwUC37q7QKowDUORTSefVxJx+k21KHyE1 w+rjwlnF/1tZm86Cba4M4IHoLFNZP7tR2Dh5PXmFcQdpYybC1CzE8L9wV73lkBOu5fSQW7NU4=
X-Google-Smtp-Source: AGHT+IG07RDRSfyR/BQ4rdrxu+tjK1+TYD1dChPMPUv6J1fsCCWSn5A94PehMY8RXexZNekFqjXzBUUAUhDCsqoSdfo=
X-Received: by 2002:a05:6102:5242:b0:4bb:c8e5:aa6d with SMTP id ada2fe7eead31-4c839ee3020mr3323542137.17.1743616240312; Wed, 02 Apr 2025 10:50:40 -0700 (PDT)
MIME-Version: 1.0
References: <PH7PR02MB92923B44693DC2AFB6DB632CB7AD2@PH7PR02MB9292.namprd02.prod.outlook.com> <6B3198D7-2D08-4341-A1AA-A8BE759E1A91@gmail.com>
In-Reply-To: <6B3198D7-2D08-4341-A1AA-A8BE759E1A91@gmail.com>
From: Orie <orie@or13.io>
Date: Wed, 02 Apr 2025 12:50:29 -0500
X-Gm-Features: ATxdqUENfTVFF2Pjx4J87Y-VlFRP6wtEaQR8d29w42LsYaSbHxJkcj26Qxww2jY
Message-ID: <CAMzqgozQX-UUKD7GJDhwwMcrFbh_Ky+wGdBcLG+_R-AufcFKzQ@mail.gmail.com>
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000a1027b0631cf4a26"
Message-ID-Hash: E3VI6DVS7MISEK7HBIXLFV2XYWZA4FV3
X-Message-ID-Hash: E3VI6DVS7MISEK7HBIXLFV2XYWZA4FV3
X-MailFrom: orie@or13.io
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-secdir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Michael Jones <michael_b_jones@hotmail.com>, secdir@ietf.org, draft-ietf-jose-fully-specified-algorithms.all@ietf.org, jose@ietf.org, last-call@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [secdir] Re: [jose] Re: Secdir last call review of draft-ietf-jose-fully-specified-algorithms-08
List-Id: Security Area Directorate <secdir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/izG_7bO6KoZwQDrPkRjIagUKUYg>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Owner: <mailto:secdir-owner@ietf.org>
List-Post: <mailto:secdir@ietf.org>
List-Subscribe: <mailto:secdir-join@ietf.org>
List-Unsubscribe: <mailto:secdir-leave@ietf.org>

Hi Kathleen!

Thanks for the secdir review.
We've published -09 which we hope addresses your comments.

https://author-tools.ietf.org/iddiff?url1=draft-ietf-jose-fully-specified-algorithms-08&url2=draft-ietf-jose-fully-specified-algorithms-09&difftype=--hwdiff

Regards,

OS

On Mon, Mar 31, 2025 at 1:57 PM Kathleen Moriarty <
kathleen.moriarty.ietf@gmail.com> wrote:

> Hello Mike!
>
> Sent from my mobile device
>
> > On Mar 31, 2025, at 1:15 PM, Michael Jones <michael_b_jones@hotmail.com>
> wrote:
> >
> > Any thoughts, Kathleen?  We'd like to update the draft to incorporate
> your feedback before the telechat.
> >
> >                Thanks,
> >                -- Mike
> >
> > -----Original Message-----
> > From: Michael Jones <michael_b_jones@hotmail.com>
> > Sent: Wednesday, March 26, 2025 5:46 PM
> > To: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>;
> secdir@ietf.org
> > Cc: draft-ietf-jose-fully-specified-algorithms.all@ietf.org;
> jose@ietf.org; last-call@ietf.org
> > Subject: RE: Secdir last call review of
> draft-ietf-jose-fully-specified-algorithms-08
> >
> > Hi Kathleen,
> >
> > Thanks for your review.  We have a mitigation for your first issue.  But
> before we add it to the draft, I wanted to better understand your second
> issue.
>
> Thank you for your considerations on the comments. I’ll respond in line to
> shed a bit more light.
> >
> > Are you saying that an attacker could vary the algorithms used when
> signing content?  That's of course true, but the attack scenario is not
> clear to me.  Are you saying that an attacker might be identifiable from
> the algorithm it chooses to use and that by changing algorithms, they could
> somewhat obscure their identity?  Can you describe an example of a scenario
> where this could occur in practice, so I can better understand it?
>
> Yes, this attack would apply to any polymorphic changeable set of
> algorithms. I’m only stating that you should acknowledge it in the security
> considerations, but I don’t think that there’s a way that you can fully
> address it. This is more to raise awareness and then someone like OWASP can
> help more.
>
> If the signature on the content sent changes any signature based detection
> methods would fail. One suggestion to put in the security considerations
> would be to suggest a focused on allow listing as opposed to deny listing
> where you might highlight any indicators of compromise that have been seen
> before in other attacks. In using an allow list if an organization we’re
> going to screen on content, they would be permitting what they expect to
> see. It’s usually a much shorter list and more effective.
>
> I’m not asking for a lot here just a couple of statements really to
> highlight a potential concern. Does that make sense and help?
>
> Thank you,
> Kathleen
>
> >
> > Also, as you wrote, this consideration applies whether the algorithms
> are fully-specified or polymorphic.  So it seems like it may have broader
> application than the specific algorithms defined in this document and this
> documents advice to avoid polymorphic algorithms.  Does it, for instance,
> apply to all of JOSE and all of COSE and all of X.509?  Without
> understanding the attack better, I can't tell.
> >
> >                Thanks,
> >                -- Mike
> >
> > -----Original Message-----
> > From: Kathleen Moriarty via Datatracker <noreply@ietf.org>
> > Sent: Tuesday, March 25, 2025 5:33 AM
> > To: secdir@ietf.org
> > Cc: draft-ietf-jose-fully-specified-algorithms.all@ietf.org;
> jose@ietf.org; last-call@ietf.org
> > Subject: Secdir last call review of
> draft-ietf-jose-fully-specified-algorithms-08
> >
> > Reviewer: Kathleen Moriarty
> > Review result: Has Issues
> >
> > Greetings!
> >
> > Sorry for my late review. In reviewing the draft, there are 2 easily
> resolvable findings. The first is that the term "cross mode" is used and
> never defined.
> > Tracing back to the reference provided, the closest I could find to
> "cross mode" was the following text in RFC 9459:
> >   "To avoid cross-protocol concerns, implementations MUST NOT use the
> >   same keying material with more than one mode.  For example, the same
> >   keying material must not be used with AES-CTR and AES-CBC."
> > Matching the language or proving a definition would help to resolve this
> concern.
> >
> > Second, as I was reading the draft, anther security consideration became
> clear and should be added. An attacker can easily avoid fingerprinting
> detection or signature detection by rotating the ciphersuite whether it be
> defined or polymorphic. If programmed to rotate, then the results will look
> different.
> > Awareness of flexibility in protocols to conduct attacks should be
> explicitly stated so that OWASP can write up mitigations sooner rather than
> later when attacks become prevalent.
> >
> > Thank you for addressing the concerns! I did check the has issues, but
> do think these are very easily addressed.
> >
> > Best regards,
> > Kathleen
> >
> >
> >
>
> _______________________________________________
> jose mailing list -- jose@ietf.org
> To unsubscribe send an email to jose-leave@ietf.org
>