Re: [lamps] AD Review of draft-ietf-lamps-cms-kemri-07

Roman Danyliw <rdd@cert.org> Tue, 06 February 2024 21:08 UTC

Return-Path: <rdd@cert.org>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57D98C14F6E4 for <spasm@ietfa.amsl.com>; Tue, 6 Feb 2024 13:08:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dQhKrY6ch_gg for <spasm@ietfa.amsl.com>; Tue, 6 Feb 2024 13:08:38 -0800 (PST)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on0055.outbound.protection.office365.us [23.103.208.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F355C14F60E for <spasm@ietf.org>; Tue, 6 Feb 2024 13:08:38 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=MnqmeWgWu81cVSR/XIk0Xo1vMxyzixjF2Vc2LWUYn7thwoLnkHphpCzMOb+ayhT0EVs9ZbmODXm0zlbxb52dFLKYKDDpAyvJLbcq/mO442nJ098V5K1z+tgNNX4OAeWKrj/DCr5smvcEcpez58dfXo2PF++t6iXudI7DaJr9biJ5NGTSRDEAMbJL3qwtIn+gXOAMK4fOJnOYbJIzrvQgryDgtYetcyzRjEJBu7yATgST6eUe2TpWu3K/YAvD+rWLLPz2iagDiQhhZFj3gTghc3vo/56R7JcWD0lwShpIhyGqyWiytK8+QBAfK+pKZn+4gXP99WGT3PeH10yk6ZPyZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=h0I6iN+zCZQxDpoTOya9nBC7CVkpi83X7D1LQPpS64I=; b=K1w+tF5kFs27qt+C5g2waql4HPZdlkq4l1KaJZjFDHHSd7Y0vcY1INo9iWz7VLtf+yapawKnQvxIAvTd40Awi8aPp+xwZuJHfyx7Mh1x7D1u6Ojw+2Hr3GC38sJDIZXzTt+8D+p1eYKfwCELuYiFYMoy4A+86NCw587Kkp5ret+p7VgsSLsy9T8fo9sEyjyXGHCHXiApz7SKjFxKW+u1OXJBjEG6AO+MveqEH5I0X24KdkW1W1gt6sqRB2E+xEWzyrp2Oi1xe4ON/sG15CVEHENopEk1CHmJp2NE088jTJoU6MYyftAzDa+XEbE+nxFfFOWTdzUAKWGyJYUSNKqviw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h0I6iN+zCZQxDpoTOya9nBC7CVkpi83X7D1LQPpS64I=; b=KTZ+ihA75tRKajmncbpDSco+/4SrPFqvQsIq3R2HYrVOr+vWb0m0OZiLf2UNrNkQDdasGd60qMDtA/g1cZk5dLV4LBJqV6mU6sRs0bJqX77cxwvqCtTq0voR6H+bA3s5MAYmHomH4H2doxxC5aGUZpmngbuLQBw6lRrB9pIU8Yg=
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:168::11) by BN2P110MB0980.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:169::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.33; Tue, 6 Feb 2024 21:08:35 +0000
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::364:96fe:e2d6:b29f]) by BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::364:96fe:e2d6:b29f%4]) with mapi id 15.20.7249.032; Tue, 6 Feb 2024 21:08:35 +0000
From: Roman Danyliw <rdd@cert.org>
To: Russ Housley <housley@vigilsec.com>
CC: "spasm@ietf.org" <spasm@ietf.org>
Thread-Topic: [lamps] AD Review of draft-ietf-lamps-cms-kemri-07
Thread-Index: AdpYYE7zFocAApMORNmBPmHMh5CQkQAFsIGAADHYLPA=
Date: Tue, 06 Feb 2024 21:08:35 +0000
Message-ID: <BN2P110MB1107350F4F02C107DF6BB45FDC46A@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
References: <BN2P110MB11075090AAB266C26B0B663FDC47A@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM> <AD61BB66-30AC-485D-AF50-8BB7B67CE1AF@vigilsec.com>
In-Reply-To: <AD61BB66-30AC-485D-AF50-8BB7B67CE1AF@vigilsec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN2P110MB1107:EE_|BN2P110MB0980:EE_
x-ms-office365-filtering-correlation-id: d52c85d2-e3fd-48fd-6521-08dc2757c7fd
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: RW5QIFjAAfJEeXAtHKW3rsSYSgLidngS16XKJ2JRwMQE5AE7Lk/sZnhLAE4+Qitg6xwknijSQmsWXkP2KGAVu6hvxwQ+mHqKNs5OhVu7vIzvzuXHM+LOoXmPufrx9flOnT1W1uHZqJsJ/OaWGHvz8h4HXAzdNXMjxEokeghWqwR62mMBzQP2QUUFgUFUjVWPuy9JeTPUdhRX2UFAQFxSHEv7ILOx+RdRD6wndXVQe9XWBX8wk/ktxBfI7TLOBuz6J9aXpLkOyIw1DXobwsIX5DEsbXkBpHX6NQkrP9rNXbtIE0j+0GNe6DOoyQr6sUdUxI+wXMSG+6eSotL0Do+dCVLO+pQJxR6ApBqrUVGiViKotCfEIZxHDfAqb6pWDIXDBYLZxArXLoC6lo8VE3aCg1Sb2ILQPCZQPCHGSpfsW975VgKpWnLB2W4eEQdPb+WcJrgBl/nZjYOm17ljIsFoEJNgCYhxnTMpZskI7Oo8ObF7DrHCMprpBGuexAkylW/H4TYMzDskuYKYUu0q0IViR3R6uUXAly9q5jVTsFhfdgBLmpMYhHOLhW0WxepsNghS4QzN8KGgc4L636mNVDtstpJ1b1m4U+Jv30WXoqRPRi0=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(366004)(396003)(136003)(39830400003)(230273577357003)(230473577357003)(230922051799003)(1800799012)(451199024)(186009)(64100799003)(41320700001)(38070700009)(26005)(82960400001)(83380400001)(4326008)(8676002)(76116006)(38100700002)(6916009)(66556008)(5660300002)(8936002)(66446008)(7696005)(66946007)(122000001)(71200400001)(66476007)(52536014)(64756008)(6506007)(508600001)(9686003)(53546011)(86362001)(41300700001)(33656002)(2906002)(55016003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: d52c85d2-e3fd-48fd-6521-08dc2757c7fd
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Feb 2024 21:08:35.0247 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN2P110MB0980
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/S_jcCCJkkZ3fJWevc1JEG1qN1x4>
Subject: Re: [lamps] AD Review of draft-ietf-lamps-cms-kemri-07
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: This is the mail list for the LAMPS Working Group <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Feb 2024 21:08:43 -0000

Hi!

> -----Original Message-----
> From: Russ Housley <housley@vigilsec.com>
> Sent: Monday, February 5, 2024 4:06 PM
> To: Roman Danyliw <rdd@cert.org>
> Cc: spasm@ietf.org
> Subject: Re: [lamps] AD Review of draft-ietf-lamps-cms-kemri-07
> 
> Warning: External Sender - do not click links or open attachments unless you
> recognize the sender and know the content is safe.
> 
> 
> Roman:
> 
> > Last October, I performed an AD review on -05
> (https://mailarchive.ietf.org/arch/msg/spasm/DrkREuxsrIRWHRR4qj6yWxVufIQ
> /).  After IETF LC, new analysis of this document was reported
> (https://mailarchive.ietf.org/arch/msg/spasm/TTtMQlcpGRq_bThfJl-
> HnqqGLGI/) requiring WG deliberations.  After IETF 118, this document was
> sent back to the WG.  This document has gone through another WGLC and is
> back to the IESG with "publication requested."
> >
> > Thank you to Falko Strenzke and Johannes Roth for reporting this attach
> against CMS and the WG's timely response.  This is a second AD review on -07.
> Feedback is below.
> >
> > ** Section 1
> >
> >   In this environment, security depends on three things.  First, the
> >   KEM algorithm must be secure against adaptive chosen ciphertext
> >   attacks.  Second, the key-encryption algorithm must provide
> >   confidentiality and integrity protection.  Third, the choices of the
> >   KDF and the key-encryption algorithm need to provide the same level
> >   of security as the KEM algorithm.
> >
> > Should normative MUST be used to describe these three crucial properties of
> the environment?
> 
> I think this is saying where KEMRecipientInfo is appropriate to apply. Mostly,
> people that write RFCs that specify the conventions for a particular KEM will
> need to make sure they understand these requirements.  For example,
> rfc5990bis.  Likewise, the authors of the document that is written for ML-KEM
> will need to consider these too.

I think we agree.  My synthesize is that the above is roughly an applicability statement for KEMRecipientInfo -- that is, normative constraints on how/where the solution can be applied.  For that reason, I was wondering if this met the bar the RFC2119 language.

Roman