Re: [tsvwg] DTLS 1.3 over SCTP

Magnus Westerlund <magnus.westerlund@ericsson.com> Tue, 18 July 2023 10:55 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 557DEC151093 for <tsvwg@ietfa.amsl.com>; Tue, 18 Jul 2023 03:55:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SGOTTxEeEx2q for <tsvwg@ietfa.amsl.com>; Tue, 18 Jul 2023 03:55:06 -0700 (PDT)
Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on2069.outbound.protection.outlook.com [40.107.105.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB775C15107D for <tsvwg@ietf.org>; Tue, 18 Jul 2023 03:55:05 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CIm8fcM/nWwko/yMdRPAdnkaTdODgLHw1o1ormwIhCyF3KRrSMIKbzicF6aj62zZIy4tPPdHaT0RhTOiuPtyuPV94x4ucQJFog2bCoasx73aC9CiRO3gEiKjWeWQ2CiGN6ucrKlI1i4BUOLfauNJkbJwfcC2xUrNTlvCyCTGop+O4E6HJCUkEbGp3v2kM/YO/c9FHThAP+NIj4wgQBLziSrl5o4wE/s/ozj9uY8CYyrSvAU2glFpUT35Oqrpy6MR+qhAUcP7wSkUt4NaWDOwqbh5GgQiLYyLvXfJ/51bkHnOe2Qof7AEru6vzlaZhPpSQm29oRWCpvkyk/XjmcWqcA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ridcTHRYmbzuUFJtMMMkClfiERDRgmBeSnXFhpXhkIM=; b=eRyenAekO9RV/a4VvSZ/zkDjXtSwIsQNr+9HkWjma5O+TxiLrpGSeqNcne8SSSQJQoC4sUiNWi5dFb8X6wgimReo4HtUZ2h2ZKAjQityiJpmrGsRKZi+wub1WM2GnyBF0CnRhIh/JXn11ncOkEqZCJaEltf++PeZ8hO1GLOqKlUGMXZbaFN+Q5cdAn4ZCrDRmLtZWy9mhLrMVOKmFvY2bIKaqN26rW699SkAd20C4pDojsXG2+RAg9NAq+7ALU9Rq5bMiqbqPeafREVupRZH10KdR3tDUP9nFOr/4RKVgOeASgIEx216mfxqZVe1zuph63M4XL7wdlY0qA0VW+LK8A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ridcTHRYmbzuUFJtMMMkClfiERDRgmBeSnXFhpXhkIM=; b=NLQuyU+duYpxwTbmH/mEutzXfY6i8tFUglO3hstmBvW5IvvUHYQ/vV3QjpTmOKVKNiGPL0bJWrwkwh4JluSiBeuSUavqQHMB15F6twLG/SnjgeFCtXtq1bg5jeYvK44V+wJQ0xXzpYkFM1g6yeao+BEh+skuAHmp9mDX+iWUM+U=
Received: from DU0PR07MB8970.eurprd07.prod.outlook.com (2603:10a6:10:40e::17) by AM8PR07MB7524.eurprd07.prod.outlook.com (2603:10a6:20b:236::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6588.32; Tue, 18 Jul 2023 10:55:00 +0000
Received: from DU0PR07MB8970.eurprd07.prod.outlook.com ([fe80::f42d:c1c8:7d3:f559]) by DU0PR07MB8970.eurprd07.prod.outlook.com ([fe80::f42d:c1c8:7d3:f559%7]) with mapi id 15.20.6588.031; Tue, 18 Jul 2023 10:55:00 +0000
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
To: Michael Tuexen <michael.tuexen@lurchi.franken.de>
CC: tsvwg IETF list <tsvwg@ietf.org>
Thread-Topic: [tsvwg] DTLS 1.3 over SCTP
Thread-Index: AQHZtZdYZRa9TnJdh0CQUleZ9o+qW6+5J6wRgAOJhoCAAQMdFIAAJ+OAgAAGAnaAAEhfAIABJJwj
Date: Tue, 18 Jul 2023 10:55:00 +0000
Message-ID: <DU0PR07MB8970BFB3F0428E800AD946DA9538A@DU0PR07MB8970.eurprd07.prod.outlook.com>
References: <0C990143-D450-4288-9390-E06D3469FF1D@lurchi.franken.de> <DU0PR07MB8970107616BF8A5E9D05AF939534A@DU0PR07MB8970.eurprd07.prod.outlook.com> <25FD6896-90BA-4298-A5BE-DDD869A71C37@lurchi.franken.de> <DU0PR07MB897089C304314A47B606EB82953BA@DU0PR07MB8970.eurprd07.prod.outlook.com> <6D224418-07D8-467E-A67D-A40B223207EB@lurchi.franken.de> <DU0PR07MB89707C2F5AB007DFE223408E953BA@DU0PR07MB8970.eurprd07.prod.outlook.com> <67272CCD-05F0-4A33-86F6-F1409EC57553@lurchi.franken.de>
In-Reply-To: <67272CCD-05F0-4A33-86F6-F1409EC57553@lurchi.franken.de>
Accept-Language: en-US, sv-SE
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU0PR07MB8970:EE_|AM8PR07MB7524:EE_
x-ms-office365-filtering-correlation-id: 557e871a-a425-4b1a-becd-08db877d6f15
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: hPQZWZTCtjxeQftu5mAixEyEJaSw28Sh1DNVxfEZpMmUAbfcZmpNoURP7hL+lPEJYA3Fb7c0bbvywXFiEWRoghtI9TsrUMMuFd7z+m6PpB41uNlseFfP7cHCkw2YSnKgzS6wik64tp5sVmRuEyeRzWwVoN5bYixHcVaV3h9ZUKLj5AAcJsTNihc47UvhSYF/rVWNqVD6eGgeRxRalwSNyxp8cZq5QAr4q0d5Oz/9jbxXEx2lgOpOa7v1mfef3YHbWg6wRHW5DSUK0j2Dluc54zUuIbZIG4E5XXSY11gHkMZkhYrwjauUw3xJE8QyX17sIPH0rNpk7QtJVAjT8hFWCx9d9zZNKtmPV1OXYSqa50/od74Nr75BEOMyuwXUKXtJdk/toeTcuM1Wj05IXveFvfu9jTpIbtuZxKI9a/nRtKD5TWZhpJEY5luvKO56veOKFHed7MWjyFI6h0rQ+5qnJSIwrxXzDrIAQZaPQgDsu/zo2wspJtmh1fHeR+1pgoscaJP7+IKGtxBlHUrh2/zWUAX94YjOu+D2oDt+0VkhvUpCTszcSzXz972o23dTt1L8sR5/+RCMu9yUV48ucYg8z6Uf/7BA1qLeL3ys9cyftqamge+Z276W2Hp1TTY/aba+n1HZuBA+xkIA4et+4dXzX9TXkGvcD7nJ1/xIC3tXE0gCfCmjc+TB2O1iXq2G+jX5
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU0PR07MB8970.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(366004)(346002)(396003)(39860400002)(136003)(376002)(451199021)(83380400001)(478600001)(166002)(186003)(7696005)(86362001)(26005)(6506007)(9686003)(966005)(2906002)(55016003)(66476007)(66446008)(52536014)(76116006)(66946007)(64756008)(38100700002)(66556008)(91956017)(44832011)(41300700001)(71200400001)(122000001)(82960400001)(6916009)(8676002)(4326008)(316002)(5660300002)(38070700005)(8936002)(33656002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DU0PR07MB8970BFB3F0428E800AD946DA9538ADU0PR07MB8970eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU0PR07MB8970.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 557e871a-a425-4b1a-becd-08db877d6f15
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2023 10:55:00.7387 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: q1kpJBMtGA7eUpNRzIlFULj3QzQ36/uZuk7nY7AQrpUzJ1doZhtgGbke6NvW/Ike8L9Zk9Z+EXLvIzM3x6pQgLBvSbt3GErF/Owgc1jn52c=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR07MB7524
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/TzD7at8AcEF_RV_j21Prvay9S58>
Subject: Re: [tsvwg] DTLS 1.3 over SCTP
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2023 10:55:10 -0000

Hi Michael

> This seems to be a generic to long living (D)TLS connections. This is not related to SCTP at all.
> Shouldn't such a text be in a BCP, preferably coming from the TLS WG? Wouldn't it make sense to
> address it in a generic way for (D)TLS?

MW: I don’t see how to address this in TLS WG without a substantial extension. I think it is equivalent to bringing back renegotiation for TLS. That would first need to be specified and then implemented. That works very poorly with the time plan we are trying to meet to deliver a solution to 3GPP. This is a problem we have had a solution in the SCTP/DTLS draft since https://datatracker.ietf.org/doc/draft-ietf-tsvwg-dtls-over-sctp-bis/02/ for by utilizing parallel DTLS connections. We are using the same solution in Crypto Chunk with DTLS. We have a work around that uses existing DTLS, that gives us the properties we have identified as what 3GPP need. This solution has been reviewed by Martin Thomson, and I have been promised more reviews by other prominent participants TLS WG to look at the updated version as soon as we have chosen a direction. So, I see no need to delay this work several years, which would be very negative for our cooperation with 3GPP.
>  So 3GPP has not expressed these requirements in any of the LS we have received. My understanding is that we have considered necessary requirements for the applications and their properties to meet modern security recommendations. John is on vacation, but I will see if I can learn if there exists some 3GPP documentation on requirements that I can point to, or if anyone else that can contribute their view on 3GPP.
> I hope you see that forward secrecy and the possibility to re-run (EC)DHE exchanges periodically is quite relevant to minimize the impact of any breach if it would occur for this very long lived SCTP associations that these 3GPP applications are using as well as for any other usage of this security mechanism.

> The above reads consistent and I'm not against it. I just saying that such non transport specific considerations
> might be best discussed in the, for example, TLS WG. I'm not sure if TSVWG is the right WG for it; and if
> a protocol specification is the right place. A BCP describing TLS policies seems more appropriate to me.

MW: Sorry, I think you need expand on your reasoning here. We are working on an integration of a security solution with a transport protocol. This requires combing the security mechanism with the transport protocol such that both the desired security properties and the transport protocol functionality is fulfilled. In this case 3GPP’s applications using SCTP are such that we have security requirements that exists in other works like IPsec but haven’t been in the forefront in other work such as QUIC, HTTP and DTLS.

I can understand the desire to make a minimal update to RFC 6083 work. But you have two different sets of requirements that https://datatracker.ietf.org/doc/draft-tuexen-tsvwg-rfc6083-bis/ don’t fulfill.

  1.  Support of large enough messages
  2.  Fulfil re-authentication and long lived sessions with good security properties
If you go to TLS WG and manages to get renegotiation extension for TLS you will likely have solved 2). However, issue 1) still remains. This while we have two different proposals that solve both of these sets and is what 3GPP needs. My focus for the upcoming meeting is to get a consensus decision not to long after the IETF meeting for which direction we are taking on this. I have no issue with you continuing with a proposal for updating RFC 6083 that is more limited however and potentially IPR free. However, for now can we focus on the solution that is more capable and fulfills 3GPPs requirements and make good progress on that and keeping these two separated.
When it comes https://datatracker.ietf.org/doc/draft-tuexen-tsvwg-rfc6083-bis/ I think you can consider how to get TLS WG to solve the long lived TLS connection issues. We would be supportive as this issue may arise again related to TLS but we will not consider such a direction for solving DTLS for SCTP until that work is very mature. Secondly, if you are extending the TLS record size beyond the 2^14 bytes the current limit is, then I really request that you get some analysis into what it does to the various ciphers’ properties. There are likely many that are fine with a four times expansion of the data per invocation, but maybe not all of them are. Nonce construction limits could exist, and key usage limits may be impacted by this change and therefore needing per cipher recommendations.
Regards
Magnus Westerlund