Re: [secdir] secdir review of draft-ietf-lamps-cms-sha3-hash
Russ Housley <housley@vigilsec.com> Thu, 02 May 2024 16:25 UTC
Return-Path: <housley@vigilsec.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B995DC151551; Thu, 2 May 2024 09:25:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=vigilsec.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id co4jHdv9VIJi; Thu, 2 May 2024 09:25:27 -0700 (PDT)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8243C1D3D26; Thu, 2 May 2024 09:25:19 -0700 (PDT)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id 0577475A06; Thu, 2 May 2024 12:25:19 -0400 (EDT)
Received: from smtpclient.apple (unknown [96.241.2.243]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id D0D9375A80; Thu, 2 May 2024 12:25:18 -0400 (EDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.1\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <ybly18th6ny.fsf@wd.hardakers.net>
Date: Thu, 02 May 2024 12:25:08 -0400
Cc: draft-ietf-lamps-cms-sha3-hash.all@ietf.org, IETF SecDir <secdir@ietf.org>, IESG <iesg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <81467B87-A447-404B-B2FD-786E841264C5@vigilsec.com>
References: <ybly18th6ny.fsf@wd.hardakers.net>
To: Wes Hardaker <wjhns1@hardakers.net>
X-Mailer: Apple Mail (2.3731.700.6.1.1)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vigilsec.com; h=content-type:mime-version:subject:from:in-reply-to:date:cc:content-transfer-encoding:message-id:references:to; s=pair-202402141609; bh=jyYZZRJCLv30vBch6AsnHFipmRdKD883VGlOr9Fc4nM=; b=YrNLNxn9XcfbT0+0+OQlxx1HLt7PASuhuGmnlKjVn2C+AZ1BpZI4AMMrBke4Hmsa3QlVWlZEVrmYZhu8DQpeTsCUnLqhFACQeUyhg4EksgXg8zMguN8ehxnTKPDgAWOOvgCDcE1DQLGviWz6wbVZKbyVkJMPWJT7D1uCBdQPxvTaFGLAvg7cvuUCoSkq7rrVXeOKoaEy20sj2Zymqns6TDBJYNhVrgLLiPd0ylE9++h+/FsNnjc0XN5ekzm04UZTx+9mV2jjMCi7pID5Wl/zFlqlSkLcE6W/iTKG/BLbzgrvG1ix7RS+SFyY2dngQCaufFSwGDD7/rFoNDWCxTUssQ==
X-Scanned-By: mailmunge 3.11 on 66.39.134.11
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/xCAeMRhZzgrg5RhWXnx6JTB88-I>
Subject: Re: [secdir] secdir review of draft-ietf-lamps-cms-sha3-hash
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 May 2024 16:25:32 -0000
Wes: Thanks for the careful review. > I have reviewed this document as part of the security directorate's > ongoing effort to review all IETF documents being processed by the > IESG. These comments were written primarily for the benefit of the > security area directors. Document editors and WG chairs should treat > these comments just like any other last call comments. > > The summary of the review is: ready > > In general this is a well written document. I have some minor > thoughts/nits below. Note that I'm not a CMS expert, but certainly have > a decent amount of generic background (including ASN.1). > > - Section 2: The first paragraph has an odd line break after the > first sentence. I'm not sure what formatting has caused this, but it > is present in both the txt and pdf versions at least. I figured it out. Corrected in my edit buffer. > - Section 2 paragraph 2: it would be helpful to less familiar readers to > say what the fields were inside of what CMS structure. Paragraphs 2 and 3 are talking about the SignedData and DigestedData CMS structures. It is listing the fields in various CMS structures that contain digest algorithm identifiers. > - section 2, generally: by specifying exactly the list of fields where > this applies, it does limit future extensions to the base protocol to > not add new fields without updating this document as well. This may > be by design though. The idea was to say where an implementer might need to look to add support for the new message digest algorithm. If a new CMS structure is added in the future, I would not expect this list to be updated. > - section 3.1 and beyond: there is a discrepancy between how OIDs are > used in some places and the fully qualified OBJECT IDENTIFIERs are > used in other places. I note the appendix uses OID everywhere, but > the copied versions into the sections above. The OID convention was used only is Section 3.1 because the names that were already assigned in RFC 8017 are so long. If you find this confusing, the impact will be two lines for each of them. > - Why is sigAlgs and hashAlgs defined in this module but RSAPublicKey is > imported. Even though sigAlgs and hashAlgs are simply references, > wouldn't it be better to import them from somewhere else since I don't > think you're actually defining them. (my memory says you can import > simple OIDs from other places). My purist had would rather import > them rather that duplicate the definition, but this is a choice to > some extent (and yes, there is no actual harm in defining it in > multiple places or even having two different names assigned to the > same OID but then you get into proper coding practice and typos and > fun.) In RFC 5912, the author chose to no define these in a way that can be imported. For example: id-sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistAlgorithms(4) hashalgs(2) 3 } So, another RFC would have to be referenced to properly IMPORT these values. This way, all IMPORTed types come from RFC 5912. > - section 5.2: suggest changing "If any other value is used for S" to > "If any value is used for S", since you just said it must be absent if > there was no label. And unless "absent" is a value, then the word > "other" doesn't apply. Based on an earlier comment, this was changed to: When the id-kmac128 or id-kmac256 is used as part of an algorithm identifier, the parameters field MUST be absent when there is no customization label S. If any value is provided for S, then the parameters field MUST be present and contain the value of S, encoded as Customization. Customization ::= OCTET STRING > - section 5.2: it would be kinda helpful in the paragraph to also state > that S must be encoded as an OCTET STRING even though it's in the > definition too. I think the reworded paragraph makes that clear. > - section 5.3: you state "an algorithm identifier from section 2 is > carried in the parameter" but don't state what parameter. Since this > is sentences later, I'd suggest adding "KEMRecipientInfo" in front of > parameter (and if I got the parameter wrong, then you already have one > failed interpretation!) I suggest: The key-derivation function algorithm identifier is an object identifier and optional parameters. When KDF2 and KDF3 are used, they are identified by the id-kdf-kdf2 and id-kdf-kdf3 object identifiers, respectively. The key-derivation function algorithm identifier parameters carry a message digest algorithm identifier, which indicates the hash function that is being employed. To support SHA3, the key-derivation function algorithm identifier parameters contain an algorithm identifier from Section 2. > - section 6: suggest "...authentication is not provided" -> > "...authentication is not assured". Okay. That works for me. > - section 6, sentence starting with "An attacker may find"... The first > time I read this I had to read it multiple times to pull it all in and > marked it as "awkward". Now I seem to understand it better, but I'll > flag it as "could use some simplification and probably broken in 2" if > you want to do it to help past-me. How about this rewording: ... Instead of brute force searching the whole key space, an attacker may find it much easier to reproduce the PRNG environment that produced the keys, and then search the resulting small set of possibilities. ... > - I find it odd that the appendix doesn't have a letter and only a > title. When there is only one, I suppose this makes sense but I > vaguely normally remember seeing "Appendix A" even when there was only > a single appendix. maybe. I will leave this one to the RFC Editor. Russ
- [secdir] secdir review of draft-ietf-lamps-cms-sh… Wes Hardaker
- Re: [secdir] secdir review of draft-ietf-lamps-cm… Russ Housley
- Re: [secdir] secdir review of draft-ietf-lamps-cm… Wes Hardaker