Re: [Teep] [Suit] Use of AES-CTR in TEEP?
dthaler1968@googlemail.com Wed, 11 October 2023 13:40 UTC
Return-Path: <dthaler1968@googlemail.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA733C151067; Wed, 11 Oct 2023 06:40:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.855
X-Spam-Level:
X-Spam-Status: No, score=-1.855 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=googlemail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2gGRtFhhNjjo; Wed, 11 Oct 2023 06:40:03 -0700 (PDT)
Received: from mail-pf1-x436.google.com (mail-pf1-x436.google.com [IPv6:2607:f8b0:4864:20::436]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 86AC3C14CE45; Wed, 11 Oct 2023 06:40:03 -0700 (PDT)
Received: by mail-pf1-x436.google.com with SMTP id d2e1a72fcca58-692ada71d79so5435434b3a.1; Wed, 11 Oct 2023 06:40:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20230601; t=1697031602; x=1697636402; darn=ietf.org; h=content-language:thread-index:content-transfer-encoding :mime-version:message-id:date:subject:in-reply-to:references:to:from :from:to:cc:subject:date:message-id:reply-to; bh=G02ruF2GD90HA4pcLe6BX/KkakPJRDmys90L7o9Xn0E=; b=gHdBNKaRSkG2lKBtcPyy9gYBcK309Gm1PZTS3TcdncHg+4EWFI2LMIfynVPjTf+gnC j30poZda4oVjO6fkaICDpga77yEUIzNGSbPe+TfHvryIwUn23TvI4d5a3eRewz6vAEIi VOrY2KneltCxHYCXwRzgYu3TDuhhrc5VNg+ad7/VvXNz4re8CtzkbTIcgvCE8LPxuJWM HWS9Q0Y5zS9kHNAhW3d5nwwfCGmnO0vPNdSBTnaBS0ZW824kEMjfZQynsdF39QlaM9Ag 0Yges9QKynH0l8aFuVix5TbCMsvUG1fBI7sAr3gmE//fx8rGuQLsL8xepfiXp2l7YraW bOTg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697031602; x=1697636402; h=content-language:thread-index:content-transfer-encoding :mime-version:message-id:date:subject:in-reply-to:references:to:from :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=G02ruF2GD90HA4pcLe6BX/KkakPJRDmys90L7o9Xn0E=; b=AYtNjKGJKpBmB356Q+QlpJ+7J5V+dASYqid4Awy5l1+16JfZGLAW7bSsBI4fQhxfCB nRKnoCAoalPHISUoNlfPSO0+UE57cY727lHQDhg+UBQ775m2TPZpDvAPVJiAfImOrncv ZeGVve02bIUnrm8hhRmcPcQGpBfs8KEekKxrpugUCh/6IjtWMlE9n0mJy8P8bSyi/wrp q4PQShtsCJLuhJHigJp1zdyZvSanGdPd+kNP26qPuKqHtkRNlySVq9CJRfvxdfWLpe9A qf97t4q0D3UvVNaGiaHcdLfX+CPCumPHdZHdgYyxnec/t23e34X2VTjqiJnQt3xKeLlK MTMA==
X-Gm-Message-State: AOJu0YybBrDr+MwH+VOV3k80dw/OdH8mAgIKo2Gn+Ohe8vLuanQ0LdHP iVnuBuqjhTrID2GT+7gWXqQTnRz/DwI=
X-Google-Smtp-Source: AGHT+IGPo5m/84osnMIRZaF0LMtRYaEbQuWo5ReiR2+5Z4F2eSML3ZSoPzvdofXQez5jLPNCqJVYeQ==
X-Received: by 2002:a05:6a20:1047:b0:16b:79b3:2b43 with SMTP id gt7-20020a056a20104700b0016b79b32b43mr12214892pzc.37.1697031602327; Wed, 11 Oct 2023 06:40:02 -0700 (PDT)
Received: from LAPTOPTI6QM5GV (c-67-170-74-237.hsd1.wa.comcast.net. [67.170.74.237]) by smtp.gmail.com with ESMTPSA id s18-20020a17090330d200b001bf5e24b2a8sm13955416plc.174.2023.10.11.06.40.00 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 11 Oct 2023 06:40:01 -0700 (PDT)
From: dthaler1968@googlemail.com
X-Google-Original-From: <dthaler1968@gmail.com>
To: "'Tschofenig, Hannes'" <hannes.tschofenig=40siemens.com@dmarc.ietf.org>, 'Dave Thaler' <dthaler=40microsoft.com@dmarc.ietf.org>, hannes.tschofenig@gmx.net, teep@ietf.org, suit@ietf.org
References: <PH7PR21MB3878F05953BAF6113F429396A3C9A@PH7PR21MB3878.namprd21.prod.outlook.com> <488eb665-30fc-4be9-832d-0ccc8409db36@gmx.net> <PH7PR21MB387889BB6C524006BD889B07A3CEA@PH7PR21MB3878.namprd21.prod.outlook.com> <02e701d9fb3a$9bf15660$d3d40320$@gmx.net> <PH7PR21MB3878C1969D2493B0FAF140D9A3CDA@PH7PR21MB3878.namprd21.prod.outlook.com> <034801d9fba3$8b38d960$a1aa8c20$@gmx.net> <PH7PR21MB38789801F26D624F00EB588EA3CDA@PH7PR21MB3878.namprd21.prod.outlook.com> <AS8PR10MB74273BFE98E73F945178E498EECCA@AS8PR10MB7427.EURPRD10.PROD.OUTLOOK.COM>
In-Reply-To: <AS8PR10MB74273BFE98E73F945178E498EECCA@AS8PR10MB7427.EURPRD10.PROD.OUTLOOK.COM>
Date: Wed, 11 Oct 2023 06:39:59 -0700
Message-ID: <000b01d9fc48$6ee7a520$4cb6ef60$@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQJ9CCLBr7EgUokC17mAn/qb7dmiWQMhVu8BAV7uXFkBUFbyKwL3pvgWAdTuoFIB9BfFAgJ1mW3lroZJGqA=
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/ruxwSmlAnDShDqpDZDhMHXkUAr0>
Subject: Re: [Teep] [Suit] Use of AES-CTR in TEEP?
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Oct 2023 13:40:07 -0000
I think using TEEP to manage firmware updates on constrained devices is a perfectly valid use case. When I *think* you're arguing is that GCM should be used for any (not specific to TEEP) SUIT manifests for NON-constrained devices, and draft-suit-mti should say so. Is that what you're saying? Dave > -----Original Message----- > From: Suit <suit-bounces@ietf.org> On Behalf Of Tschofenig, Hannes > Sent: Wednesday, October 11, 2023 1:40 AM > To: Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>; > hannes.tschofenig@gmx.net; teep@ietf.org; suit@ietf.org > Subject: Re: [Suit] [Teep] Use of AES-CTR in TEEP? > > Hi Dave, > > in my view TAMs are not going to manage firmware updates on constrained > IoT devices, like microcontrollers, and hence they don't need to support > algorithms that are specifically designed to take issues of those constrained > IoT devices into account. Of course, I would be interested to hear whether > someone is planning to do this. > > I am wondering whether it is better to create a new draft that lists the > algorithms for use with TEEP (to avoid confusion with the classical SUIT use > cases). The algorithms in draft-ietf-suit-mti are fine for the IoT use case. I am > not arguing about that. > > I hope it is clear what I try to avoid. I dont' want developers to use AES-CTR > (or AES-CBC) for use cases it was not designed for. If you can use an AEAD > cipher, you should do it. Here is what RFC 9459 says on this topic: > > " > This document specifies AES-CTR and AES-CBC for COSE, which are not > AEAD ciphers. The use of the ciphers is limited to special use > cases, such as firmware encryption, where integrity and > authentication is provided by another mechanism. > " > > > Ciao > Hannes > > -----Ursprüngliche Nachricht----- > Von: Suit <suit-bounces@ietf.org> Im Auftrag von Dave Thaler > Gesendet: Dienstag, 10. Oktober 2023 20:36 > An: hannes.tschofenig@gmx.net; teep@ietf.org; suit@ietf.org > Betreff: Re: [Suit] [Teep] Use of AES-CTR in TEEP? > > TEEP requires TAMs to support all MTI algorithms and allows Agents to pick > among MTI algorithms and may be constrained or not, support crypto offload > or not, etc. hence the allowing of choice. > > If I understand correctly, you're arguing that a TAM must support both CTR > and GCM, and an Agent can pick either one, and the suit-mti draft should > specify both profiles, did I get that right? > > Dave > > > > -----Original Message----- > > From: hannes.tschofenig@gmx.net <hannes.tschofenig@gmx.net> > > Sent: Tuesday, October 10, 2023 11:00 AM > > To: Dave Thaler <dthaler@microsoft.com>; teep@ietf.org; suit@ietf.org > > Subject: RE: [Teep] Use of AES-CTR in TEEP? > > > > Sorry for the confusion, Dave. I have hit the "send" button a bit too fast. > > > > It should, of course, read "This adds no new requirements to > > constrained IoT devices." > > > > Ciao > > Hannes > > > > -----Original Message----- > > From: TEEP <teep-bounces@ietf.org> On Behalf Of Dave Thaler > > Sent: Dienstag, 10. Oktober 2023 19:41 > > To: hannes.tschofenig@gmx.net; teep@ietf.org; suit@ietf.org > > Subject: Re: [Teep] Use of AES-CTR in TEEP? > > > > Hannes wrote, regarding draft-suit-mti:: > > > I would like to have a new profile added that defines > > > suit-sha256-es256-ecdh- a128gcm for use with TEEP. > > > This should be the default profile for use in TEEP. > > > > > > This adds new requirements to constrained IoT devices. Constrained > > > IoT devices should use one of the other 5 profiles already defined. > > > > Did I read that right, you want new requirements for _constrained_ devices? > > Your last two sentences seem to contradict each other, so either > > there's a typo or I'm not understanding. > > > > Dave > > > > _______________________________________________ > > TEEP mailing list > > TEEP@ietf.org > > https://www/. > > > i%2F&data=05%7C01%7Channes.tschofenig%40siemens.com%7C345c31b461 > 654c65 > > > e7bf08dbc9bfd29d%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C > 63832559 > > > 7948766603%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj > oiV2luMzI > > > iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=hB93IuYuq > pSRS1GW > > Op9zCxAxzhwR7vhGXuRvKbW%2BCCU%3D&reserved=0 > > > etf.org%2Fmailman%2Flistinfo%2Fteep&data=05%7C01%7Cdthaler%40micros > > > oft.com%7C71df398b41a948f442ec08dbc9baab47%7C72f988bf86f141af91ab > > > 2d7cd011db47%7C1%7C0%7C638325575811642807%7CUnknown%7CTWFpb > > > GZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6 > > > Mn0%3D%7C3000%7C%7C%7C&sdata=z%2BA0%2FHZQ7v%2Bi97e4R%2Bz7H > > qXwLE9q%2Bq93mb%2BNTXLtF%2F4%3D&reserved=0 > > _______________________________________________ > Suit mailing list > Suit@ietf.org > https://www.ietf.org/mailman/listinfo/suit > > _______________________________________________ > Suit mailing list > Suit@ietf.org > https://www.ietf.org/mailman/listinfo/suit
- [Teep] Use of AES-CTR in TEEP? Dave Thaler
- Re: [Teep] Use of AES-CTR in TEEP? Hannes Tschofenig
- Re: [Teep] Use of AES-CTR in TEEP? Dave Thaler
- Re: [Teep] Use of AES-CTR in TEEP? hannes.tschofenig
- Re: [Teep] Use of AES-CTR in TEEP? Dave Thaler
- Re: [Teep] Use of AES-CTR in TEEP? hannes.tschofenig
- Re: [Teep] Use of AES-CTR in TEEP? Dave Thaler
- Re: [Teep] Use of AES-CTR in TEEP? Tschofenig, Hannes
- Re: [Teep] [Suit] Use of AES-CTR in TEEP? dthaler1968
- Re: [Teep] [Suit] Use of AES-CTR in TEEP? Hannes Tschofenig