[TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt

Rob Sayre <sayrer@gmail.com> Mon, 17 March 2025 17:02 UTC

Return-Path: <sayrer@gmail.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 383F9D21908 for <tls@mail2.ietf.org>; Mon, 17 Mar 2025 10:02:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cGoU4dO763uL for <tls@mail2.ietf.org>; Mon, 17 Mar 2025 10:02:25 -0700 (PDT)
Received: from mail-pj1-x1032.google.com (mail-pj1-x1032.google.com [IPv6:2607:f8b0:4864:20::1032]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id DF67BD218FE for <tls@ietf.org>; Mon, 17 Mar 2025 10:02:25 -0700 (PDT)
Received: by mail-pj1-x1032.google.com with SMTP id 98e67ed59e1d1-2ff694d2d4dso3038451a91.0 for <tls@ietf.org>; Mon, 17 Mar 2025 10:02:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1742230945; x=1742835745; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=6yXGiOwP24BwPWdPmt95vSgEdV4hhhMAMaKHtdESskc=; b=At1NWKWJqeKLnqxWd2WFOeAryGvQhsGjoIHGVDqsyZSZFEhJPiYF+jC01x3Ek7h27T nmnILM7jH/43lgziADIa/HJ2/BOaL0O+v0uqiB4d/B2+iIw1KsTungkuzojYW8WZh1Sb sy9BoZ9e/AT30sb/D94bmvSuNaONjHyfjoT+hO+mvUcer8aD5kqzUHQm64IOUtHxn7Va aEN2bqKv+HbDIVfKoJzZAs3d1Vc2uQthaX+EF/JHCakltwPBln9FX2FXSdqEqrtCGUws Yl7St19+HEEuWcnuAe3YdM4rLFMe0i920/TaEX1kbPHE+zHk+6ySaNF9nAOS8Cgl2Fet X2Tg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742230945; x=1742835745; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=6yXGiOwP24BwPWdPmt95vSgEdV4hhhMAMaKHtdESskc=; b=h8RJ8v+B4XIv1pmHCf+BH/LpN735CPh2OOlS52ta8Ne3jtrujLrxZOXNGID9V75ysU k517dsYr/XJYx26OulFhAKiJx0ARjcbAQxeju68oOl8w8hYXGMEA4g3lThoA4dh6fLHm 9EFJLujcgCBnxLINqFmkAaDK9i3mXlFgKPxlNeucafUcdoRXBtLbPlQmnmbdkw1cKVVi motFmz8B6KCaUGYz4Idl9f3fnUS3RwPHW/pqLJRdW2FIR3ccPbeXXeJdqIpDJtTJom0k GHMJMo/Tlcolg/J/3qRdqYl8dHJcT2R9Tn9FsR9UYA8/PjU7b+1bOS81djs4bt+W2i0C y5iw==
X-Forwarded-Encrypted: i=1; AJvYcCX3WfZ+qVd3cLvt/AcbAVAKLrGrfWPGuJRrKfmVzcxCG/izvWNZMtnaQxi5+Gr00XLktQY=@ietf.org
X-Gm-Message-State: AOJu0Yz2M3uNZYHYJR1FLu9Vc6WE/XfIRNIVGqnb4LHnVxkZwOSJi0Pd fSJ54GHHQvAXfPXdeDvVP/lGgb2o/Kjw5F4MtaK/BteDgMa2hwbY2722LJLmWllmIC0chwlLLOP Budyl3nkYNddgtVcVYPtEMPc4TPQ=
X-Gm-Gg: ASbGncumfD8ArdwySXr3/1eJMeM9nx3Miao6umd7AXRji8VBGpE1oQZGxEE3z8lTimu IO5RW/ufdVNXWfiARStJtdLorkf8R31DqowkpRwakifU/V11b/uwPoizJBMc6IELG2HT2Y6KiBx hOEd02Gy8O/RTx0lxbH8lxSzunjhQKZ3uc9m2jPCqJeEsWohy37xU+nuk=
X-Google-Smtp-Source: AGHT+IGqegy7BfMKu9z0kFq+vXv3F/3p3ouhJ79/q2uPABfhat8frTKPjVt9xt66sCtnu97lafD1xn+M4fUEif7aDXQ=
X-Received: by 2002:a17:90b:1f8d:b0:2ff:71ad:e84e with SMTP id 98e67ed59e1d1-30151c9a357mr17566122a91.10.1742230944526; Mon, 17 Mar 2025 10:02:24 -0700 (PDT)
MIME-Version: 1.0
References: <05B28816-9AA9-4035-B451-8ACFFBE2D4DE@apple.com> <CAChr6Sy1Eew1J5z9at3qEwLRWn+7ZLm0f564LobNQGMD7ANQaA@mail.gmail.com> <CABcZeBOpk2cYAyie4=G5=c6V43HvGB70fKVf_e_bQqnt_4C9WQ@mail.gmail.com> <CAF8qwaAoYEZj_t56unUAqz+SaKw6CvMFJ2NmqNmE8skmjKKSpA@mail.gmail.com> <CAChr6Sw+9bZxjcaJMNbY8UZBbmv5ZDnyb7aGtCjXcrtxvfeoew@mail.gmail.com> <CABcZeBNFPLWcYDhv1axqSwTX_w_yatfbJyih8CUMhZfkK5484g@mail.gmail.com> <CAChr6Syji7TKs6GumtmpZ8_tKXb5UK10_b6HdR1PU8Oni0pTkw@mail.gmail.com> <CABcZeBOHSGBOj_4R0bVdCpaRTcVV6=uHOzvWcY9HFei7PbC1fw@mail.gmail.com>
In-Reply-To: <CABcZeBOHSGBOj_4R0bVdCpaRTcVV6=uHOzvWcY9HFei7PbC1fw@mail.gmail.com>
From: Rob Sayre <sayrer@gmail.com>
Date: Mon, 17 Mar 2025 10:02:13 -0700
X-Gm-Features: AQ5f1JqEzqMLVN19hmyNiKhrYy6osTSG1bdcOyfODvxuZCqJcRSurfobqVc5iEc
Message-ID: <CAChr6SxFNN4wH=45HANWuFZVX8_2HfX14mS2WayVSe_ide2RWg@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Content-Type: multipart/alternative; boundary="00000000000090b8d906308cc042"
Message-ID-Hash: 5SO3IUZMLZ6ULH7WK5XVBKVELK362PVT
X-Message-ID-Hash: 5SO3IUZMLZ6ULH7WK5XVBKVELK362PVT
X-MailFrom: sayrer@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Laura Bauman <l_bauman=40apple.com@dmarc.ietf.org>, tls@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: Feedback on draft-bmw-tls-pake13-01.txt
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/dHC4TcPGd9EGgvqrhJFd47O1GQE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

On Mon, Mar 17, 2025 at 9:38 AM Eric Rescorla <ekr@rtfm.com> wrote:

>
> As above, I don't see what this has to do with PAKEs at all. If you have a
> third
> party authentication system, whether sign in with Apple, Google, or some
> SSO
> provider, then you don't need to share any secret with the relying party.
>

In my mind, the idea is that you don't have to rely solely on WebPKI if you
have that information handy after registration. I am not sure what the
authors' intent is, but that is what I thought of. Maybe it's just so one
can register home devices that play a sound during setup, or take a picture
like a smart watch pairing.

At the time I was looking at this problem, there were some addresses on
these devices that couldn't be MITMed even with admin privileges. I asked
about the addresses for these features and I did get a response. It was
"why are you asking about this?" :) Then, I found IT security people fuming
about this issue online. So, I decided to let it be.

thanks,
Rob