Re: [sfc] [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Sat, 25 September 2021 11:20 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 771CA3A08FB; Sat, 25 Sep 2021 04:20:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.599
X-Spam-Level:
X-Spam-Status: No, score=-4.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_SUMOF=5, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Z1FjcWkd; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=M52Rvi05
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E50Bjh247i16; Sat, 25 Sep 2021 04:20:23 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AA133A08FA; Sat, 25 Sep 2021 04:20:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15626; q=dns/txt; s=iport; t=1632568823; x=1633778423; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=g+sAfZ8LbET/68yC8b+wQMXqRiihq/bZBrB7Z5veSBc=; b=Z1FjcWkdUJtfFwZ1wDKXE8N0NO+5eJrDHLuhOFdoSLG+DfJumrlbfZ++ SdbQfcV1k/wp8hTro2sYgv0SI3d0vjtLcxyXGnqN8R7uLSvZHlNwagiL6 oc8LxOzRELgDK9fLog6cBfo2B8PKLZmqJrwtesiLd/F65cGhXH5pyt+/I A=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:SCY4cRxT4wTKyzjXCzM/ngc9DxPP8530Iw8J558uzbRDbvfr85fjO RnZ4vNgxB/MUJ7A4v1Jw+zRr+j7WGMG7JrA1RJKcJFFWxIfz8lDmQsmDZ2FFEznIfvjKSo3A JcKWFps5XruN09TFY73bEHTpXvn6zkUF13/OAN5K/6zFJTVipG81vu5/NvYZAAb7Ac=
IronPort-Data: A9a23:br9/X6yVZqCiBVIaE6F6t+eFxirEfRIJ4+MujC+fZmUNrF6WrkVVz mEaX2mPPfyKZGf9eIogbI7i/UsBvpbVm9JmGgRppVhgHilAwSbn6Xt1DatR0we6dJCroJdPt p1GAjX4wUNdokb0/n9BCJC5xZVH/fzOFueU5NLsYHgrHFc1Ent50nqPpsZg6mJWqYnha++yk YuaT/33YDdJDBYtbwr4Q4rawP9elKyaVAEw5zTSVtgX1LPqrET5ObpETU2Hw9QUdaEPdgKyb 76rILhUZQo19T91Yj+uuu6TnkHn3tc+MCDW4ke6VZROjTB8qyYr2IB8LcEuM1cJjW+mnMwt2 Ipk4MnYpQcBZsUgmcwUVx1eVip5J6ADovnMIGO0toqYyEiun3nEmqo1Shpoe9RDvL8sXAmi9 tRAQNwJRh6JneW9w7S2YuJtnc8kasLsOevzv1k/kGyIXah/Gsirr6Pi+N5ZjRYBgZxyHO/0I PtGYGBzQCqQfEgaUrsQIMtuwLj37pXlSBVbslOOpaw+pXPa1wx41rvFP9/ce9jMTsJQ9m6Uv GvI4yH4Dw0UcceRwn+d6HWriKrIk2bnQosUD7yksPduhHWSy3AdThoMWjOTuveyok+zR9wZL FYbkgI1saUq9EGtCMj6QhC8pFaGphsbQdVZFasx7wTl4q7d+BrcDWEAShZAZcAo8sgsSlQCz V+Wks/pDHplsLSTRXuH95+bqDqzPW4eKmpqTTQJRgcE+fHirZ09yBXVQb5LELO0ktDwEBnw3 jGWoS03wbMekaY2O76T9FTDhXenoYLEC1Rz7QTMVWXj5QR8DGK4W2C2wWbW5+9KCsGAdWvbr CYCweed8LweUrjYwURhX94xNL2u4v+ENhjVjlhuA4Qt+lyRF5iLIN84DNZWeRcBDyoURdP6S BSI4FoOuve/KFPvPPEpPNPoYyg/5fK4fekJQMw4eTanjnJZXQuD8ScGiaW4gD21yRNEfU3Sx f6mnSuEBHIeD+FsyyC7Ar1b2r4wzSd4zmTWLXwa8/hF+efEDJJ2Ye5YWLdrUgzfxPnVyOky2 40FX/ZmMz0FDIXDjtD/qOb/12wiI3khHozRoMdKbOOFKQcOMDh/UKWMmeN7I9c/xPs9egL0E peVBxAwJL3X2CyvFOl2QisLhE7HBMwm9itrYUTAw37xgSVyCWpQ0EvvX8JnIeZ4nACS5fV1V PICM96RGehCTy+vxtjuRceVkWCWTzzy3VjmF3P8OFAXJsc8LySUqo6MVla+r0EmU3vo3eNg+ OfI/l2AHvI+q/FKUZ++hASHlAjq4xDwWYtaAiP1HzWkUB+3rdc2e3Cv1K9fzgNlAUyr+wZ2H j2+WX8wzdQhaadsmDUVrchod7uULtY=
IronPort-HdrOrdr: A9a23:Yo3206yxyIU+7Dimz4NdKrPxdOgkLtp133Aq2lEZdPULSK2lfp GV8sjziyWatN9IYgBepTiBUJPwJk80hqQFn7X5Wo3SHDUO2VHYbb2KiLGD/9SOIVyEygcw79 YET0E6MqyNMbEYt7e43ODbKadb/DDvysnB7o2yowYPPGNXguNbnnpE422gYytLrXx9dOIE/e 2nl7N6TlSbCBAqR/X+IkNAc/nIptXNmp6jSwUBHQQb5A6Hii7twKLmEjCDty1uEQ9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDPsqRkcIYQw+czzpAJb4RH4FqjgpF5t1H22xaye UkZC1QZ/ib3kmhOV1dZyGdgDUIngxesUMKgmXo8EcL6faJNA7STfAx2L6wtnDimhUdVBYW6t MW44vRjeslMTrQ2Cv6/NTGTBdsiw69pmcji/caizhFXZIZc6I5l/1TwKp5KuZKIMvB0vFsLA CuNrCq2N9GNVeBK3zJtGhmx9KhGnw1AxedW0AH/siYySJfknx1x1YRgJV3pAZOyLstD51fo+ jUOKVhk79DCscQcKJmHe8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR42Mi6PJgTiJcikp XIV11V8WY0ZkL1EMWLmIZG9xjcKV/NFQgFCvsurqSRn4eMCoYDHRfzPWzGovHQ1cn3WPerKc pbEKgmd8PeEQ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.85,321,1624320000"; d="scan'208";a="755986130"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Sep 2021 11:20:21 +0000
Received: from mail.cisco.com (xbe-aln-003.cisco.com [173.36.7.18]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 18PBKLBA005393 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Sat, 25 Sep 2021 11:20:21 GMT
Received: from xfe-rcd-003.cisco.com (173.37.227.251) by xbe-aln-003.cisco.com (173.36.7.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Sat, 25 Sep 2021 06:20:21 -0500
Received: from xfe-rtp-001.cisco.com (64.101.210.231) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Sat, 25 Sep 2021 06:20:20 -0500
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-001.cisco.com (64.101.210.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Sat, 25 Sep 2021 07:20:20 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WAcwF5Ejdz5CWWuDkzQFzf+O6CC1rjRfUGkqWqGue7iDs5OXUNJP6Q+Uz+tei2uSbGVAnfhYiZU2VKIS5cdqPOqOE6+ABwQwHKnSVCNQWWtHrzFwN1hxelBew6ujUuuyec0CtHvaRPflf80YwYuT2El30eNBkU8/Ccr+5+F5tk5F8Q2tIPwBdAQJpX6Z3ni6nGjjMOh7zMQFbNJjNSa0quj3E75mDO1l2N2TMqm9/jSfRUvQHyvLySlNlEudgedHHa69Ghkb+/9zPPkxF15taDbXz3TywnCm10MhpFNclmgvbH1E+hPsI71OZkBBeFVB2BdSAqFDE4D1vHiVDYxzeQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=g+sAfZ8LbET/68yC8b+wQMXqRiihq/bZBrB7Z5veSBc=; b=EQNqDvhK9s/aUtLp4yWmyG25rqbrF8wQePUCnsw6r8GtwQaAx1JoT/9NsA43w/gX0lbHrul4knNX9mWXesaAXWNEEOV38PCjsr4f4Vm66KXhJc6exgBPGt+pysNiSozZkreiRRdQhDMZ8LvA5kPga6JCKGNqn2T6JGTPLusy5HsfwKqHkhThTyvFPAXStX6ZHh5H/XO0hYD2Kqb352oXRJj6knVt7833alKQTBPaUKkoiBXjB8UPuWXOx4aIG7idkXo07CFofQGZIbk9yJ7neqS11qsGiohqrkJt7CqfcPH7j8wPQg1x+nWJq/vZTli90yqokqeYh1/Ps/EzkqBbfw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g+sAfZ8LbET/68yC8b+wQMXqRiihq/bZBrB7Z5veSBc=; b=M52Rvi05uljbb8pTUMlA3PXlFhBvCJ/xrsk5zO/3SEbe7mcErxDrlxbI3b5tVZz84Tl/27bzH7+S7rZqf3pUl7Cwubb/qfdo9ACsLE+o8kB4JPi8Ij5/kahZblzKPVoO55igJAGv3x1C2945qPOEO4agNzunJuaWZL9EYqUgn/A=
Received: from DM8PR11MB5606.namprd11.prod.outlook.com (2603:10b6:8:3c::23) by DM8PR11MB5591.namprd11.prod.outlook.com (2603:10b6:8:38::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4544.13; Sat, 25 Sep 2021 11:20:19 +0000
Received: from DM8PR11MB5606.namprd11.prod.outlook.com ([fe80::2544:292:4ad5:dd65]) by DM8PR11MB5606.namprd11.prod.outlook.com ([fe80::2544:292:4ad5:dd65%3]) with mapi id 15.20.4544.020; Sat, 25 Sep 2021 11:20:19 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Christian Huitema <huitema@huitema.net>, "secdir@ietf.org" <secdir@ietf.org>
CC: "shwetha.bhandari@gmail.com" <shwetha.bhandari@gmail.com>, "last-call@ietf.org" <last-call@ietf.org>, "Youell, Stephen" <stephen.youell@jpmorgan.com>, "sfc@ietf.org" <sfc@ietf.org>, "draft-ietf-sfc-proof-of-transit.all@ietf.org" <draft-ietf-sfc-proof-of-transit.all@ietf.org>, "krishna.sashank@gmail.com" <krishna.sashank@gmail.com>
Thread-Topic: [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08
Thread-Index: AQHXrdJnjOHuO4fhnU+wPCtBTLa6aaux/B8wgAAXGgCAAMvnUIAAc3MAgAFE1nA=
Date: Sat, 25 Sep 2021 11:20:19 +0000
Message-ID: <DM8PR11MB5606D099B760809CB3DD8326DAA59@DM8PR11MB5606.namprd11.prod.outlook.com>
References: <163210969860.31323.5718880916818308072@ietfa.amsl.com> <DM8PR11MB5606222AA0739CE8093A6777DAA39@DM8PR11MB5606.namprd11.prod.outlook.com> <7329d9eb-3597-0006-dbc5-892a4ada74ab@huitema.net> <DM8PR11MB56061C0D02BC169F39D41407DAA49@DM8PR11MB5606.namprd11.prod.outlook.com> <31b9ad77-1848-011c-9b3f-3787aee21e41@huitema.net>
In-Reply-To: <31b9ad77-1848-011c-9b3f-3787aee21e41@huitema.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: huitema.net; dkim=none (message not signed) header.d=none;huitema.net; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a48900ce-da60-4697-eeb6-08d98016755b
x-ms-traffictypediagnostic: DM8PR11MB5591:
x-microsoft-antispam-prvs: <DM8PR11MB559111D7A6DD788D46B80CEDDAA59@DM8PR11MB5591.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM8PR11MB5606.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(52536014)(83380400001)(8936002)(7696005)(66946007)(55016002)(66446008)(66476007)(66556008)(64756008)(966005)(4326008)(5660300002)(76116006)(8676002)(71200400001)(186003)(54906003)(508600001)(38070700005)(30864003)(110136005)(316002)(86362001)(122000001)(6506007)(38100700002)(53546011)(9686003)(26005)(33656002)(2906002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM8PR11MB5606.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a48900ce-da60-4697-eeb6-08d98016755b
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Sep 2021 11:20:19.5364 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 0qF76Xqy36/MEOEbXnIAD4sRXBHpuP6YVhcX1sZCWvlsC4Pm2vFWMn1JzuqfYgBFL4rm6UNpWcc5MeicTjtX8w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR11MB5591
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.18, xbe-aln-003.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/sVOlZ2wioSsdAzgrjGB9UHa9Gfo>
Subject: Re: [sfc] [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Sep 2021 11:20:29 -0000

Hi Christian,

Thanks for the follow-up. Please see below.

> -----Original Message-----
> From: Christian Huitema <huitema@huitema.net>
> Sent: Friday, 24 September 2021 17:16
> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>; secdir@ietf.org
> Cc: shwetha.bhandari@gmail.com; last-call@ietf.org; Youell, Stephen
> <stephen.youell@jpmorgan.com>; sfc@ietf.org; draft-ietf-sfc-proof-of-
> transit.all@ietf.org; krishna.sashank@gmail.com
> Subject: Re: [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-
> 08
> 
> 
> On 9/24/2021 1:39 AM, Frank Brockners (fbrockne) wrote:
> > Hi Christian,
> >
> > Thanks a lot for the detailed follow-up. Please see inline.
> >
> >> -----Original Message-----
> >> From: Christian Huitema <huitema@huitema.net>
> >> Sent: Thursday, 23 September 2021 22:13
> >> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>; secdir@ietf.org
> >> Cc: shwetha.bhandari@gmail.com; last-call@ietf.org; Youell, Stephen
> >> <stephen.youell@jpmorgan.com>; sfc@ietf.org; draft-ietf-sfc-proof-of-
> >> transit.all@ietf.org
> >> Subject: Re: [Last-Call] Secdir last call review of
> >> draft-ietf-sfc-proof-of-transit-
> >> 08
> >>
> >>
> >> On 9/23/2021 12:31 PM, Frank Brockners (fbrockne) wrote:
> >>> Hi Christian,
> >>>
> >>> Thanks a lot for your detailed review. Please see inline.
> >>>
> >>>> -----Original Message-----
> >>>> From: Christian Huitema via Datatracker <noreply@ietf.org>
> >>>> Sent: Monday, 20 September 2021 05:48
> >>>> To: secdir@ietf.org
> >>>> Cc: draft-ietf-sfc-proof-of-transit.all@ietf.org;
> >>>> last-call@ietf.org; sfc@ietf.org
> >>>> Subject: Secdir last call review of
> >>>> draft-ietf-sfc-proof-of-transit-08
> >>>>
> >>>> Reviewer: Christian Huitema
> >>>> Review result: Serious Issues
> >>>>
> >>>> I have reviewed this document as part of the security directorate's
> >>>> ongoing effort to review all IETF documents being processed by the
> >>>> IESG.  These comments were written primarily for the benefit of the
> >>>> security
> >> area directors.
> >>>> Document editors and WG chairs should treat these comments just
> >>>> like any other last call comments.
> >>>>
> >>>> This document proposes a security mechanism to prove that traffic
> >>>> transited through all specified nodes in a path. The mechanism
> >>>> works by adding a short option to each packet for which transit
> >>>> shall be verified. The option consists of a random number set by
> >>>> the originator of the packet, and a sum field to which each transit
> >>>> node adds a value depending on public parameters, on the random
> >>>> number and on secrets held by the node. The destination has access
> >>>> to all the secrets held by the nodes on the path, and can verify
> >>>> whether or not the final sum corresponds to the sum of expected
> >>>> values. The proposed size
> >> of the random number and the sum field is 64 bits.
> >>>> In the paragraph above, I described the mechanism without
> >>>> mentioning the algorithm used to compute these 64 bit numbers. The
> >>>> 64 bit size is obviously a
> >>>> concern: for cryptographic applications, 64 bits is not a large
> >>>> number, and that might be a weakness whatever the proposed algorithm.
> >>>> The actual algorithm appears to be a bespoke derivation of Shamir's
> >>>> Secret Sharing algorithm (SSS). In other word, it is a case of
> >>>> "inventing your
> >> own crypto".
> >>> ...FB: SSS is a well know algorithm and
> >>> draft-ietf-sfc-proof-of-transit does not
> >> modify it.
> >>> All draft-ietf-sfc-proof-of-transit does is to operationalize the
> >>> SSS algorithm
> >> for the proof of transit use case.
> >>> Also note that the draft does not require the use of 64 bit numbers.
> >>> Nor does draft require a minimum time between changing the secrets.
> >>> What particular attack are you concerned about where 64 bit numbers
> >>> are a
> >> concern?
> >>>> SSS relies on the representation of polynomials as a sum of
> >>>> Lagrange Basis Polynomials. Each of the participating nodes holds a
> >>>> share of the secret represented by a point on the polynomial curve.
> >>>> A polynomial of degree K on the field of integers modulo a prime
> >>>> number N can only be revealed if at list K+1 participants reveal
> >>>> the value of their point. The safety of the algorithm relies on the
> >>>> size of the number N and on the fact that the secret shall be revealed only
> once.
> >>>> But the algorithm does not use SSS directly, so it deserves its own
> >>>> security
> >> analysis instead of relying simply on Shamir's work.
> >>>> The proposed algorithm uses two polynomials of degree K for a path
> >>>> containing
> >>>> K+1 nodes, on a field defined by a prime number N of 64 bits. One
> >>>> K+of the
> >>>> polynomial, POLY-1, is secret, and only fully known by the verifying node.
> >>>> The other, POLY-2 is public, with the constant coefficient set at a
> >>>> random value RND for each packet.
> >>>>
> >>>> For each packet, the goal is compute the value of POLY-1 plus
> >>>> POLY-2 at the point 0 -- that is, the constant coefficient of
> >>>> POLY-3 = POLY-1 + POLY-
> >> 2.
> >>>> Without going in too much details, one can observe that the
> >>>> constant coefficient of POLY-3 is equal to the sum of the constant
> >>>> coefficients of POLY-1 and POLY-2, and that the constant
> >>>> coefficient of POLY-2 is the value RND present in each packet. In
> >>>> the example given in section 3.3.2, the numbers are computed modulo
> >>>> 53, the constant coefficient of POLY-1 is 10, and the value RND is
> >>>> 45. The final sum  CML is indeed
> >>>> 10 + 45 = 2 mod 53.
> >>>>
> >>>> To me, this appears as a serious weakness in the algorithm. If an
> >>>> adversary can observe the value RND and CML for a first packet, it
> >>>> can retrieve the constant coefficient of POLY-1, and thus can
> >>>> predict the value of CML for any other packet. That does not seem very
> secure.
> >>> ...FB: There seems to be a bit of confusion or misreading of how the
> >>> method
> >> works. In the above statement you seem to assume that the verifier
> >> would not be part of the proof-chain, so that the final CML value
> >> would be somehow exposed to an external entity along with RND. This
> >> is not the case. The verifier is the last node (k+1) in the proof-chain.
> >>> At concept level, the method reconstructs the polynomial hop by hop,
> >>> picking
> >> up a point on the curve at every hop. Only final node in the
> >> proof-chain, which is also the verifier, acts on the information of
> >> all the k+1 points and as such is able to reconstruct the polynomial.
> >>> In section 3.2.1, the draft explicitly states that the verifier *is*
> >>> part of the
> >> proof-chain: "Each of the k+1 nodes (including verifier) are assigned
> >> a point on the polynomial i.e., shares of the SECRET." The fact that
> >> the verifier, i.e., the last node in the proof-chain ("k+1"),  can
> >> retrieve the secret, is desired and intentional, because the verifier
> >> needs to compare the result of the iterative construction of the secret with
> the secret value it received from the controller.
> >> This is how the system is designed, and the calculation of (10+45)
> >> mod 53 = 2 is part of the verification.
> >>
> >> OK. That's slightly less bad. But it is still very bad crypto,
> >> because you are effectively doing a linear combination.
> >>
> >> You are evaluating POLY-3 = POLY-1 + POLY-2
> >>
> >> POLY-2 can be written as POLY-2 = RND + POLY-2-NC, in which POLY2-NC
> >> only contains the non constant terms -- that is, POLY-2-NC(0) = 0
> >>
> >> Then for any point X, we get POLY-3(X) = POLY-1(X) + POLY2-NC(X) +
> >> RND For a given value Xj of X, this means we can express : POLY-3(Xj)
> >> = Vj + RND In which Vj is a constant term = POLY-1(Xj) + POLY2-NC(Xj)
> >>
> >> Each node will increment the cumul by the value LPCj * POLY-3(Xj) =
> >> LPCj
> >> * (Vj + RND)
> >>
> >> Suppose that an adversary can observe the value of CML before and
> >> after being incremented by node Xj. Suppose that it could do that
> >> twice. Then it has the
> >> values:
> >>
> >> CML1-before-j = C1b
> >> CML1-after-j = C1a
> >> D1 = C1a - C1b = LPCj * (Vj + RND1)
> >>
> >> CML1-before-j = C2b
> >> CML1-after-j = C2a
> >> D2 = C2a - C2b = LPCj * (Vj + RND2)
> >>
> >> D2-D1 = LPCj*(RND2-RND1)
> >>
> >> LPCj = (RND2-RND1)/(D2-D1)
> >> Vj = D2/LPCj - RND2
> >>
> >> The inverse of numbers modulo a prime P is easily computed -- see
> >> Fermat's little theorem.
> >>
> >> Once the input and output of a node have been observed twice, it
> >> becomes easy to update the cumulative sum CML while bypassing these
> nodes.
> > ...FB: This is great. Thanks for spelling out the details.  You raise a good point:
> For the solution to make sense, we need to ensure that an attacker cannot
> observe the input and output of a node.
> > To ensure this does not happen, we must require the communication to/from
> the node to be encrypted, e.g., through link layer encryption of at least the
> proof-of-transit data fields.
> > We'll add this requirement to the draft - and also detail the threat you describe
> above in detail in the security considerations section.
> 
> That still will not be sufficient, because you also have to deal with the nodes
> themselves. By definition, they see the intermediate results of other nodes. For
> example, if the function chain is A->B->C->D->E, the node B sees the output of B
> and the node D sees the input of D. If B and D  collude, they have access to the
> input and output of C. They can easily find the secrets of C, and then execute a
> chain A->B---->D->E in which the input of D is "corrected" to hide the absence of
> C from the evaluator E.

Thanks much. You raise another valid point and we will add it to the security considerations section.
That said, IMHO we'd need to put the scenario you raise into perspective:
If the nodes B and D would be compromised by an attacker, the deployment would face a much more serious security issue than what any proof-of-transit method could protect against.

> 
> The linear combination scheme in the draft is not sound crypto. My
> recommendation is to present the problem and the threat model clearly to the
> crypto community, for example by presenting to the CFRG, and solicit advice on
> better algorithms.

There has been quite a bit of discussion on proof of transit in several WGs, even before the SFC WG picked it up. And the SFC working group has considered different approaches early on in the solution specification, including e.g., using nested encryption, which is probably more in line with your preferences. See https://datatracker.ietf.org/doc/html/draft-ietf-sfc-proof-of-transit-01#section-3.5.1. From my recollection of the discussion - others please chime in - one main reason of why the current approach was chosen was its computational simplicity, i.e., hardware platforms which do not support native encryption capabilities like AES-NI can implement it without considerable impact on the computational latency. So in other words, the current method is the result of a trade-off decision.

Cheers, Frank

> 
> -- Christian Huitema
> 
>