Re: [tcpinc] Eric Rescorla's Discuss on draft-ietf-tcpinc-tcpcrypt-09: (with DISCUSS and COMMENT)

Daniel B Giffin <dbg@scs.stanford.edu> Tue, 28 November 2017 22:39 UTC

Return-Path: <dbg@scs.stanford.edu>
X-Original-To: tcpinc@ietfa.amsl.com
Delivered-To: tcpinc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D1F31275C5; Tue, 28 Nov 2017 14:39:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j_XOfKhs14yh; Tue, 28 Nov 2017 14:39:02 -0800 (PST)
Received: from market.scs.stanford.edu (www.scs.stanford.edu [IPv6:2001:470:806d:1::9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C99551274D0; Tue, 28 Nov 2017 14:38:57 -0800 (PST)
Received: from market.scs.stanford.edu (localhost [127.0.0.1]) by market.scs.stanford.edu (8.15.2/8.15.2) with ESMTP id vASMctJw011282; Tue, 28 Nov 2017 14:38:55 -0800 (PST)
Received: (from dbg@localhost) by market.scs.stanford.edu (8.15.2/8.15.2/Submit) id vASMctbV059174; Tue, 28 Nov 2017 14:38:55 -0800 (PST)
Date: Tue, 28 Nov 2017 14:38:55 -0800
From: Daniel B Giffin <dbg@scs.stanford.edu>
To: Kyle Rose <krose@krose.org>
Cc: "Black, David" <David.Black@dell.com>, Eric Rescorla <ekr@rtfm.com>, tcpinc <tcpinc@ietf.org>, "tcpinc-chairs@ietf.org" <tcpinc-chairs@ietf.org>, The IESG <iesg@ietf.org>, "draft-ietf-tcpinc-tcpcrypt@ietf.org" <draft-ietf-tcpinc-tcpcrypt@ietf.org>, David Mazieres expires 2018-01-14 PST <mazieres-ddragqirgwht7ezx2d39a3jw72@temporary-address.scs.stanford.edu>
Message-ID: <20171128223855.GE42654@scs.stanford.edu>
References: <20171124182842.GA80062@scs.stanford.edu> <CABcZeBORGhsgWem3P6GS=1qfkwBEZxX=CBGCOoU3R_+MsO4FrQ@mail.gmail.com> <CAJU8_nXA_1L_XVJAMGj+L4JY-so+LO79pxt_s=BTLWj_g47f_Q@mail.gmail.com> <CABcZeBNQEs6BKnxzQOuN4A4qvEDsk8kGQLt6S9Wy0OXsJ3u5cw@mail.gmail.com> <CAJU8_nWMn0_SSLUH+reS5La4J7t0uEN5u2zC8XFRXDMOffc1Qg@mail.gmail.com> <CABcZeBP2mN-Y3GFda3mqawFuFFqtzpwpsceseE5FNMH1iSpFPQ@mail.gmail.com> <CAJU8_nWk_Opuj+m4jv79qwFMUGqi5=JMk3S_3QfJLahOjL+77g@mail.gmail.com> <CE03DB3D7B45C245BCA0D243277949362FD89888@MX307CL04.corp.emc.com> <20171128041124.GA42654@scs.stanford.edu> <CAJU8_nUx=k-nKLcrY0iVeSL7THCVARanZymWbTHaNbR+FKavPw@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAJU8_nUx=k-nKLcrY0iVeSL7THCVARanZymWbTHaNbR+FKavPw@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpinc/KmA66vSWkmbKhy1tYIuOe5PLLPQ>
Subject: Re: [tcpinc] Eric Rescorla's Discuss on draft-ietf-tcpinc-tcpcrypt-09: (with DISCUSS and COMMENT)
X-BeenThere: tcpinc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Working group mailing list for TCP Increased Security \(tcpinc\)" <tcpinc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpinc/>
List-Post: <mailto:tcpinc@ietf.org>
List-Help: <mailto:tcpinc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpinc>, <mailto:tcpinc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Nov 2017 22:39:04 -0000

Kyle Rose wrote:
> On Mon, Nov 27, 2017 at 11:11 PM, Daniel B Giffin <dbg@scs.stanford.edu> wrote:
> > Whether or not we decide to go back to the WG to discuss the
> > mechanics of session resumption, we could make lightweight
> > changes to the current protocol in this last call that would
> > facilitate any "upgrades" that appear necessary after
> > deployment has begun.
> >
> > To wit, we propose:
> >
> >   - Replace the first byte of INIT1_MAGIC and INIT2_MAGIC
> >     with a "version" byte.  Implementations of the current
> >     protocol must send a zero version-byte, and must ignore
> >     what they receive.
> >
> >   - When receiving ENO suboptions for tcpcrypt TEPs with
> >     v=1, which are "resumption suboptions": if the
> >     resumption identifier-half is not the expected length
> >     (9 bytes), treat this suboption as a bare TEP byte with
> >     v=0; that is, an invitation to fresh key-exchange with
> >     that TEP.  This *almost* goes without saying; the
> >     current draft doesn't say what to do in this case of
> >     "malformatted" resumption identifiers.
> 
> Upon reflection, isn't this an oversight? It seems the draft should
> address this regardless of how we decide to deal with misuse
> tolerance.

Yes.  It makes sense that whenever you send a TEP identifier
(by itself or for resumption, even if you use some
yet-unspecified resumption-request format), you are willing
to do fresh key exchange with that TEP.  Thus I have added
this to section 3.5. Session Resumption:

   If a passive opener receives an ENO suboption with a TEP identifier
   and "v = 1", but the suboption data does not have length 9 bytes, it
   MUST behave as if the same TEP had been sent with "v = 0".  That is,
   the suboption MUST be interpreted as an offer to negotiate fresh key
   exchange with that TEP.

> 
> > The version byte is intended to allow implementations of
> > future protocol versions to identify each other (by sending
> > the highest version they support), which then allows them to
> > perform "advanced" resumption signaling later.
> 
> So is the idea that the format of INIT*_MAGIC would be fixed, and that
> the version can only affect subsequent messages? I suppose the
> alternative is that we burn a new set of TEPs whenever anything about
> the protocol changes, so putting that extensibility directly into
> tcpcrypt (where a much less constrained number of signaling bits are
> available) makes sense for future proofing, maybe even irrespective of
> this particular issue. I'm thinking of some analogy to ClientHello
> extensions in TLS, where you can send stuff that the server might not
> parse, and that's okay. Do we want an extra frame in/after the INIT
> messages for sending version-specific data on the first flight that
> old receiver versions will simply ignore (beyond including it in the
> handshake transcript), to avoid an extra RTT for version negotiation?

Because the new "version" byte would be the first byte sent
in each direction, it can be used to negotiate any future
protocol behavior to follow that byte.

Even without the version byte, the Init1/Init2 messages
already reserve trailing space for future uses, which
implementations of the current protocol are instructed to
ignore (although it is always part of the transcript).

> 
> Kyle

daniel