Re: [lamps] [EXTERNAL] draft-ietf-lamps-lightweight-cmp-profile-05 concern

"Scott Fluhrer (sfluhrer)" <sfluhrer@cisco.com> Wed, 17 March 2021 15:56 UTC

Return-Path: <sfluhrer@cisco.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E01B3A10BA for <spasm@ietfa.amsl.com>; Wed, 17 Mar 2021 08:56:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.62
X-Spam-Level:
X-Spam-Status: No, score=-9.62 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=alDg4yqx; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=MKNA3El9
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X17a0Lbm2jJL for <spasm@ietfa.amsl.com>; Wed, 17 Mar 2021 08:56:14 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B0AC3A10B7 for <spasm@ietf.org>; Wed, 17 Mar 2021 08:56:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3696; q=dns/txt; s=iport; t=1615996574; x=1617206174; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=Ab4yqg1SBEH292/QT9+YrJWN9xLKbuSulMNdA2aONXk=; b=alDg4yqxBc/IUb+D3pUwlxfhH++Jj2o2bn9vOil/3K1mpGAj9uoMLBrv G6KndwDOPmEQyOHCubDX1+LPbDnZ7ZJJ4yGNM30fFYZcM+MtkRH1pi7dD hArP9f/av6BpwYpMWrWaghObnGl+MoPY0kzjQCJqhTvQLIAVZ/1/+Kofy 4=;
X-IPAS-Result: A0DoAgAmJlJgkJNdJa1aHAEBAQEBAQcBARIBAQQEAQFAgVCBU1F9WjYxAweIAAOFOYhEA4kOhhGKDoFCgREDVAsBAQENAQEdCwoCBAEBgRYBgzkCgXcCJTgTAgMBAQEDAgMBAQEBBQEBAQIBBgQUAQEBAQEBhjgNhkQBAQEBAwEBOAYBASwMCwQCAQgRBAEBGQYGCicLHQgCBAESCIJoAYJVAy8BDqB2AolpNXWBNIMEAQEGRoEBQYJ+GIIUAwaBOYJ2ik0mHIFKQoERQ4JYPoJgAQEDgR0KARIBCRpNgnyCCSKCEzEFaVMvLAsyNxBHBQ4BOpA1jlaJJ5FMCoMEiVKTGKQelHaLUpIFRgIDEIQrAgICAgQFAg4BAQaBayFpcHAVO4JpUBcCDY4fDA0Jg02FFIVFcwI2AgYKAQEDCXyNY4EQATFdAQE
IronPort-PHdr: A9a23:XqeU3heZ2WU0+xBoXDKKrw7JlGM/T4qcDmYuwpM6l7JDdLii9J3+P UvZoO9gl0LNQZ6zw/5BgvDd9aHtRWJG5oyO4zgOc51JAhkCj8he3wktG9WMBkCzKvn2Jzc7E 8JPWB4AnTm7PEFZFdy4awjUpXu/vjIXEw/0cwt4OuqzHZTd3Iy70umo8MjVZANFzDO2fbJ1K kCwqgPc/skbiIdvMOA/0BzM93BJYO9Rg2hvIAH7og==
IronPort-HdrOrdr: A9a23:YWl8iKFFCxTI1EZopLqFkZXXdLJzesId70hD6mlYcjYQWtCEls yogfQQ3QL1jjFUY307hdWcIsC7IE/03aVepa0cJ62rUgWjgmunK4l+8ZDvqgePJwTXzcQY76 tpdsFFZ+HYJVJxgd/mpCyxFNg9yNeKmZrY+dv25XFrUA1sduVE5wB2Fg6UHiRNNXZ7LLA+E4 eR4dcCmiGpfm4ZYt/+Kn4OWeXCoNOjruOpXTctARk75A6SyQ658bKSKWnW4j4ycRNqhY0j/2 /MjhDj6syY082T5xfA2wbonuxrsfT7zN8rPr3otuE0LXHWhh+sdMBdXdS5zU0IicWOzHpvr9 XWuRcnOK1ImjLsV0W4uwHk1QWl8BtG0Q6Y9XaijXHuodP0SVsBYqIr7+80A3ipiXYIh91y3L lG2GiUrfNsfGn9tR7g7NvFXQwCrDvSnVMekPUeh3EacYwSZK45l/1nwGppEYwNFC+/1YY/EO MGNrC72N9qdzqhHhTkl1gq5ObpcmU4Hx+ATERHkNeSySJqkHdwyFZd7NADn18bnahNC6Vs1q DhCOBFhbtORsgZYeZWH+EaW/a6DWTLXFblLH+SG1L6D6sKUki96KLf0fEQ3qWHaZYIxJw9lN DqS1VDr1M/fEroFImo0IBU9AvOBEGwRy7kxM0bx5URgMy/eJPbdQm4DHw+mcqppPsSRufBXe yoBZ5QC/j/aWT0H4JE2BD/RolSJXESXNZ9gKd+Z3u+5ubwbqH6vO3Sd/jeYJD3Fyw/Z2/5Cn wfGDj/Tf8wqXyDazvdulz8Snntckvw8dZbC67B5dUez4ALK8lJuggRglKp+9GTJVR5w+oLVX o7BImivrKwpGGw82qNxX5uIABhAkFc56ilVWhLqw8MO0b9aq0CpN2bZGBX0BK8V1pCZvKTND Qai0V8+KqxIZDV7zslEcibPmWTiGZWuGiHVI4GmqqI5d7sf5QxCppOYt0pKSz7UzhO3Sp6om ZKbwEJAnLFHjT1kKO/kdg/H+fEbeRxhw+tPO9ZoX/Srl+nuMkqX3cXNgTeCfK/sEILfX50jk c027IDiLCA8AzfV1cXsaAdChlwT0i5RJhBFx+IYY1InKuDQnAAcU66wRqAix8yfWL28V41nW KJF1zORdj7RnxAp3tfzqHmtHRze2n1RTMsVllK9atgCG/BpnF/ldWuW5P2+W6QZlweq9ttag 3taScOIw9o2tC83AOUnjHHDnk92pAyJIXmfcQeWqCW1XW3JIKSk6YaW/dS4ZZ+Ldjr9vQGSO SFZmauXXnFIvJs3wyevXA+PiZo7HEijPPzwRXghVLIlEIXEL7XIF58QascLMzZ52/4R+yQ2J E8id4up+O/PiHwbdGBoJunJAJrO1fWoWSsSfsvpo0RtaUutKFrF52eSCDWzhh8rWIDBdaxkF lbTLVw4bjHNIMqd8sOezhB9l5skNiUNkMkvgH/H+dWRyBhs1bLe9eSp7bYo7smBUOM4BH9Pl SS6CVR9fbIVSnr789SN4sgZWBNLEQs4nVr++2PM5DKAAKxbudZ4R60NGS+fLI1ctnIJZwA6h Jhp9eGkO+ce3CmhETevT5nLrlP9GjiS8WoGw6IEfNJ9dv/OVnkuNre3OejyDPsDT28YAAEgI cAc0oaZMFKkCMjg406yTLacN2Anms1119FpSh6nVvs0JW86GjVHUtaIRTU668mLwV7IzyNl4 DZ6uCW23T2/Shd1ZTCHElWeMtSG9J4dPmCEw5+bc4KvLCp+KIzgiNMJBc2ZlRM+wzA4w==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.81,256,1610409600"; d="scan'208";a="682148941"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Mar 2021 15:56:13 +0000
Received: from mail.cisco.com (xbe-aln-005.cisco.com [173.36.7.20]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 12HFuD8f012639 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 17 Mar 2021 15:56:13 GMT
Received: from xfe-aln-003.cisco.com (173.37.135.123) by xbe-aln-005.cisco.com (173.36.7.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Wed, 17 Mar 2021 10:56:13 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Wed, 17 Mar 2021 10:56:12 -0500
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 17 Mar 2021 11:56:12 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gxoZHBwF0abyhzZ6/wnU6QjsUYN9JMLdPszwPmVNzlMpcC1p45RtHKqlv23I990lIC8tzUH1cpHG/ZpLyklvOHPLMTYYLip+Z3eEDaIz6h6In7GR7slPQD8HQgNtsF+EC5MItC60PEDKFU7n0iG3+Kvv6Vixr5i9nUvxWBWpRkkV+GbbsQkYSbOZ0AXP3pDIbE2mynBhmGAeMmMF5tSg8/5FO34etuLUeZuwl2EPjjMZoqH1dte8yN9EP+AQLlK3DUSyTizWKLVEZ4r8Ni5PRMl9fbzSalotC+cuJv+d+xbDL7FZJ41BqBIcjQ0gmaBtT7G9vaEzsnecSz7gW5h+rQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W2npDuZNI/+b/GHo2+ydfXC8K/PCtd4mHAyQYsSPYaY=; b=mX5QWMSRTGWb7PmByVMJKp74meYp9w7nxuHA2h9U4aKbpoy5vIkd2Prm8NyPmrO2Y1qypeNloXvdAkrfUxRf34Wm0vK4bIbfrU1uxyM5uUEsdNA0serRam50oY1xpoWZ33vnP0kpxdlsedXFusYj2u12WTLHRLskkCQ7lF96xfBnO/VeW977fvDoYaqePYcOIK2Zsq5PvTG0zsWi3Gxzl8CNz7pmVmYIAuJNwfk6xtvMsSKAHZyt530zZxDzoq+UAQBZdXujOa08DtzvpN7o5HOsa1Nt+WPG0H48YvON3i+G0ZJoZ44N0VvaapTo62DxVP+mnv9vGyXag8HKot1uGA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W2npDuZNI/+b/GHo2+ydfXC8K/PCtd4mHAyQYsSPYaY=; b=MKNA3El9+HqTH7VawQrvwx610F+y6wOeGrwDO+BDr09oM9w4449Jq0lv9YP0IeLFr6CRWH1sHYjJppMaGsCCA1MbgaimwcPZJg1aOJkMOAZ6cLdutTrn9AyOy1uTkPeGyBqVwhZ8jtuMVqr0hZ8f9EGfykxFgug2dg/SlMTOZzk=
Received: from BN7PR11MB2641.namprd11.prod.outlook.com (2603:10b6:406:b1::25) by BN6PR11MB1747.namprd11.prod.outlook.com (2603:10b6:404:102::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3933.31; Wed, 17 Mar 2021 15:56:10 +0000
Received: from BN7PR11MB2641.namprd11.prod.outlook.com ([fe80::4543:b45a:9f32:bde0]) by BN7PR11MB2641.namprd11.prod.outlook.com ([fe80::4543:b45a:9f32:bde0%7]) with mapi id 15.20.3955.018; Wed, 17 Mar 2021 15:56:10 +0000
From: "Scott Fluhrer (sfluhrer)" <sfluhrer@cisco.com>
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org>, Nick Lamb <njl@tlrmx.org>, "hendrik.brockhaus@siemens.com" <hendrik.brockhaus@siemens.com>, "spasm@ietf.org" <spasm@ietf.org>
Thread-Topic: [lamps] [EXTERNAL] draft-ietf-lamps-lightweight-cmp-profile-05 concern
Thread-Index: AQHXG0Q8uldb4m1Gf0y+0uEbQ+PZraqIVIuQ
Date: Wed, 17 Mar 2021 15:56:10 +0000
Message-ID: <BN7PR11MB2641B3CB357BE3D0362F19BAC16A9@BN7PR11MB2641.namprd11.prod.outlook.com>
References: <20210316161932.6e2d2075@totoro.tlrmx.org> <DM6PR11MB43807A80242CC755A6AE06BF9F6A9@DM6PR11MB4380.namprd11.prod.outlook.com>
In-Reply-To: <DM6PR11MB43807A80242CC755A6AE06BF9F6A9@DM6PR11MB4380.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [173.38.117.90]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: acc4e256-95c8-45b6-e5fe-08d8e95d2efc
x-ms-traffictypediagnostic: BN6PR11MB1747:
x-microsoft-antispam-prvs: <BN6PR11MB1747CE848491AABE1D0025EDC16A9@BN6PR11MB1747.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN7PR11MB2641.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(39860400002)(346002)(376002)(136003)(396003)(7696005)(33656002)(66446008)(83380400001)(52536014)(110136005)(53546011)(66556008)(76116006)(64756008)(71200400001)(6506007)(8936002)(9686003)(316002)(86362001)(2906002)(8676002)(26005)(186003)(66476007)(5660300002)(66946007)(478600001)(55016002)(966005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 25QF0AfcgurZgXttx1V8FULD0VtBCn84TraHMKu5BH4AjX6IrqnXOkKDDDjcz7cJ5gHtP+OWRZW5k+PkyF2lglseRe1v7MKyEs4igdvYx30mziIIzkIiAi+e/gxWP5fZ/KB6czAYgclI26AfHAKQisv0XppWW3YsuBIcfdJ0gqYDOcypytuuitG39948WaBOLiCirKiiTk4nVoPVXPKd98pRNA/FV4hGgOWurzfj/2S6e5zSaFMomZVJnq/DfvPfyaDhCtk3TKpfe0a30GStEUcwtkbUAj/ZJMB66NJ3K4SOSggWuxSd1KeV9qjO+97pRGgHWzKWueWR+Awk8ryoihFOf8sA0fE0pFYQaf+fzkxWaafMS/NZHFKuwTIjUXXeYlpoXKdN6QxtsRy7TWkz2ZI1K3kMn/h+xSNajHI2RvsvW0p6nyX7feBymYPv19utwtnSdHD+9k1QsvnvWYSP4XxkLd933tPb3iPD3zqj6tRaikrtcCJ0gnepXAx56nzQ+biRA3qcuSWiXv5BOF79hONI1KoQaQfed+2IJ/GT2Yx+zRT7o2053zGuILb+jOzHYaq2YHjpMpazXWS70FZ732MVorYxslgLTA2z2LdGrdLzQW2cJc/nAL1TWXR05kyPq9LYtcgozQv+hWilK2+2eT3D23KmcOSxo/usWG2r35S4ryeWsUxRPWrKrf7rIax9VCVTsl/AIM9OKGPjJfvexE1gbAL/OF2XChiHkmE3WAZ9p9VZoFuAXFyoJNPSodXk3X2mM3iUKWImyrcnSRIV7oRCaRLZ/qwYkTKtKHjToebN4EMPd6WSTviS5FtUD/xGfcsvdegy2MveM4p4tiKrB8oLeiqV6s1VYBjmUBC15a7yhKwQmCxf6jowty1u0Fd6xrZS0fAJxpqHhoyXx0oUdVg2GQVgy1L7bkTxc6PlbHUI6dsBVLMSjqvXUixZmrs6zmMI7mqR6ejsUC1/HxLzA1AUcYe4rTsPxLZ5D8iXjO91Nfc8sEagJU1OKaLRA2oTy6uifP8XNZYpDiqQR9wV9EPqiiTCsiiL2oWaZrgjZMetH7cSWBT0n/lLxwxIbIYEzBDm26e6l6gy5Cf+65AlO768oYHoAPkP3Zomi6g7Oa1kDo55KtSXrtiKTssY+KDLxJawX+loYf9jKs+OcKkWChAZQh8aSWyf1eJ6htyskgcz2cxh5Z/L3dG8iUDwO4osMoNXOTtJITyD8lnMdWy8+fF5ni8MpjqWxMxnVLspemuQmdQ4beVb+MGNteBBAc944MOviiOSjFr+9PNQQrtnRmNIcaMd00IdnOfqe273txrgNAKZ66K8LQUpdyGiIVUK
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN7PR11MB2641.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: acc4e256-95c8-45b6-e5fe-08d8e95d2efc
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2021 15:56:10.1012 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: uI4VZGCt70ZvI3qMHG0oRTbUrQYH9NriGi8SZTbvrZHe6praumi21Y7xuhTn/JxFrzCaXLFFeIMriNpwEKZBuQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB1747
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.20, xbe-aln-005.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/dmjGjKAMyaTgLmdv56YFM1TWkoA>
Subject: Re: [lamps] [EXTERNAL] draft-ietf-lamps-lightweight-cmp-profile-05 concern
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Mar 2021 15:56:16 -0000

Actually, there is new work attempting to integrate Opaque (an augmented PAKE) into TLS - https://datatracker.ietf.org/doc/draft-sullivan-tls-opaque/

This was discussed in the TLS WG meeting; I believe they intend to integrate this into TLS at some point...

> -----Original Message-----
> From: Spasm <spasm-bounces@ietf.org> On Behalf Of Mike Ounsworth
> Sent: Wednesday, March 17, 2021 11:43 AM
> To: Nick Lamb <njl@tlrmx.org>; hendrik.brockhaus@siemens.com;
> spasm@ietf.org
> Subject: Re: [lamps] [EXTERNAL] draft-ietf-lamps-lightweight-cmp-profile-05
> concern
> 
> Hi Nick,
> 
> That's what PAKEs are for, right? If I'm following the TLS WG properly, the TLS
> 1.3 PAKE draft (draft-barnes-tls-pake) expired in 2019 and PAKEs did not
> make it into 1.3. Is that right?
> 
> Looking at Hendrik's slides and I-D, I see proposals for specifying TLS 1.2 and
> 1.3 PSK cipher suites. I also see in the draft:
> 
>    *  The client MUST use its shared secret information for
>       authentication.
>    *  The server MUST use a suitable shared secret information for
>       authentication.
> 
> Nowhere does it refer to this shared secret as a "password". I assume this
> shared secret will be some kind of registration code that a PKI operator
> distributes out-of-band to the end entity requesting the certificate? Seems a
> bit out of scope for a CMP RFC to put constraints on how that is generated.
> 
> So I suppose this email thread boils down to a request to add a "garbage-in,
> garbage-out" security consideration statement to the draft that a low
> entropy shared secret will result in a low entropy TLS session?
> 
> ---
> Mike Ounsworth
> 
> -----Original Message-----
> From: Spasm <spasm-bounces@ietf.org> On Behalf Of Nick Lamb
> Sent: March 16, 2021 11:20 AM
> To: hendrik.brockhaus@siemens.com; spasm@ietf.org
> Subject: [EXTERNAL] [lamps] draft-ietf-lamps-lightweight-cmp-profile-05
> concern
> 
> WARNING: This email originated outside of Entrust.
> DO NOT CLICK links or attachments unless you trust the sender and know the
> content is safe.
> 
> __________________________________________________________
> ____________
> Hi
> 
> I am not a LAMPS working group member, but I watched a video of the
> presentation of this ID at IETF 110 on Youtube.
> 
> I noted with concern that the presenter suggests TLS 1.3's PSK modes are
> suitable for use with a password.
> 
> This is _explicitly_ not the case. To quote RFC 8446:
> 
> "Deriving a shared secret from a password or other low-entropy sources is
> not secure.  A low-entropy secret, or password, is subject to dictionary
> attacks based on the PSK binder.  The specified PSK authentication is not a
> strong password-based authenticated key exchange even when used with
> Diffie-Hellman key establishment."
> 
> If CMP or LAMPS generally needs a way to use passwords to authenticate TLS
> it's worth reaching out to the TLS WG to ask them what you should do here,
> or contrariwise if this profile for CMP is to use PSKs it should likewise make
> explicit that you must not use passwords and similar human memorable low-
> entropy secrets.
> 
> Nick.
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/spasm
> __;!!FJ-Y8qCqXTj2!I5B4z3nBjk83j5emJqmOydz-
> dI4c_Lj4PXWDA4IItw2znDIALakjPklbFa0pKhZIf1rnybj-xQ$
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm