Re: review of draft-sheffer-emu-eap-eke-06

2010-05-04 Thread Simon Josefsson
Dan Harkins dhark...@lounge.org writes:

   Hi Simon,

 On Mon, May 3, 2010 3:32 pm, Simon Josefsson wrote:
 Dan Harkins dhark...@lounge.org writes:

   Issues with prf and prf+

   - In sections 5.1 and 5.2 the password is passed directly into prf+
 (which is the same as the one from RFC 2409 and uses HMAC-SHA1 or
 HMAC-SHA256). This is a key derivation type function and assumes it
 has been passed a key having properties, like a uniformly random
 distribution, that a low-entropy password does not have.

 I recommend deriving a key for Encr() in a 2-step process using and
 extractor and expander KDF. It might also be good to mention that
 the first, leftmost, length-of-cipher-key bits are used as the
 cipher
 key.

 I agree with your comments.  However would not salting and an iterative
 design, as provided by PKCS#5 PBKDF2, be more appropriate than
 extract-and-expand?  See section 4 of the extract-and-expand document to
 see why it is not always appropriate for passwords.

   I don't believe so. PBKDF2 does 1000 iterations of HMAC-ing to increase
 the work factor of brute force guessing the password. This is useful when
 the protocol using the password is not based on a zero knowledge proof.
 In this case it is, and an active attacker gets only one guess at the
 password per attack (a passive attacker gets zero guesses) and that
 would be the case even if the password is used directly as a key to
 an HMAC-based KDF.

   Section 4 of the extract-and-expand document says, In the case of
 password-based KDFs, a main goal is to slow down dictionary attacks using
 two ingredients: a salt value and the intentional slowing of the key
 derivation computation. HKDF naturally accommodates the use of salt;
 however, a slowing down mechanism is not part of this specification.
 But in the case of EAP-EKE a dictionary attack is foiled outright by the
 protocol. There is no need to use a KDF to slow one down.

Right.  I agree.

   Issues with elliptic curves cryptography

 This raises a question.  What is the patent status of the technologies
 used by this document?  I recall concerns with some non-HMAC-based
 password based authentication protocols.

   I believe it has been submitted:

https://datatracker.ietf.org/ipr/1071/

Thanks for the pointer.

/Simon
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: review of draft-sheffer-emu-eap-eke-06

2010-05-04 Thread Yaron Sheffer

Hi Simon,

to answer your last point: EKE is patented, see 
https://datatracker.ietf.org/ipr/1071/. The patent is due to expire on 
October of next year. This is (obviously) unrelated to any elliptic 
curve patents.


Thanks,
Yaron

Thanks,
Yaron

On 05/04/2010 01:32 AM, Simon Josefsson wrote:

Dan Harkinsdhark...@lounge.org  writes:


   Issues with prf and prf+

   - In sections 5.1 and 5.2 the password is passed directly into prf+
 (which is the same as the one from RFC 2409 and uses HMAC-SHA1 or
 HMAC-SHA256). This is a key derivation type function and assumes it
 has been passed a key having properties, like a uniformly random
 distribution, that a low-entropy password does not have.

 I recommend deriving a key for Encr() in a 2-step process using and
 extractor and expander KDF. It might also be good to mention that
 the first, leftmost, length-of-cipher-key bits are used as the cipher
 key.


I agree with your comments.  However would not salting and an iterative
design, as provided by PKCS#5 PBKDF2, be more appropriate than
extract-and-expand?  See section 4 of the extract-and-expand document to
see why it is not always appropriate for passwords.


   - Section 5.1 says If the password is non-ASCII, it SHOULD be normalized
 by the sender before the EAP-EKE message is constructed. The
 normalization method is SASLprep, [RFC4013]. Note that the password
 is not null-terminated.

 I don't think this will work. The SHOULD should be a MUST and the
 mention of SASLprep should use normative language-- i.e. it MUST
 be SASLprep. Is there a mandatory-to-implement format? Is support
 for ASCII a MUST? Also, there's no mention of unassigned code points?
 What happens if one of these is hit during normalization? I don't
 believe the text as written will assure interoperability and it will
 also be a DISCUSS target, said using the voice of experience :-)


I agree strongly with this comment as well.


   Issues with elliptic curves cryptography


This raises a question.  What is the patent status of the technologies
used by this document?  I recall concerns with some non-HMAC-based
password based authentication protocols.

/Simon

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kucherawy-authres-header-b (Authentication-Results Registration For Differentiating Among Cryptographic Results) to Proposed Standard

2010-05-04 Thread Alessandro Vesely

On 03/May/10 22:26, The IESG wrote:

The IESG has received a request from an individual submitter to consider
the following document:

- 'Authentication-Results Registration For Differentiating Among
Cryptographic Results '
draft-kucherawy-authres-header-b-01.txt  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
ietf@ietf.org mailing lists by 2010-05-31.


The I-D identifies a possible result forgery (section 6.2). Although I 
haven't fully grasped the reasons why such attack would be attempted, 
I think that condition is a case where the spoofed signature SHOULD be 
removed by the verifier. I'm not sure the latter spec would be an 
update of rfc 4871, since it says /Signers/ SHOULD NOT remove any 
DKIM-Signature header field [emphasis added]. (Other cases where 
signatures might be removed --mailing lists-- are currently being 
discussed on ietf-dkim.)


For a minor point, the example (A.1) the I-D makes does not illustrate 
the reason for introducing header.b. The exemplified signatures can 
already be distinguished by their header.i values. By setting that 
attribute also in this case, the example conveys the impression that 
header.b should not be omitted, even when it is unnecessary. If that's 
the intended meaning, it should be stated more explicitly, IMHO.


OTOH, the example shows a case where a signature had been validated 
before being broken (discussed on ietf-dkim and [1]). However, that is 
apparently the only part of the I-D discussing such topic.


--
[1] http://mipassoc.org/pipermail/mail-vet-discuss/2010q2/000602.html
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


[Gen-art] Gen-art review of draft-ietf-ipsecme-ikev2bis-08.txt

2010-05-04 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document: draft-ietf-ipsecme-ikev2bis-10.txt
Reviewer: Elwyn Davies
Review Date: 4 May 2010
IETF LC End Date: 18 March 2010
IESG Telechat date: 6 May 2010

Summary:
When I reviewed this document at IETF Last call, I discovered that compared to
previous documents, it contains no mention of mandatory to implement
ciphersuites.  In a discussion with Paul Hoffmann, I was pointed at various
other RFCs that specify ciphersuites, and informed that the IESG and WG had
approved the current situation.  However it seems to me that somebody looking at
the IKE documents would be likely to come to this document first and would find
it difficult to locate the auxiliary documents without considerable effort (and
risk of missing some).  I continue to believe that f there is not to be a list
of appropriate ciphersuites here, there needs to be some pointers to places to 
look.

A number of my comments have been implemented, but there are quite a few that I
have seen no response to amd have not been implemented.  The list below
represents the remaining comments. I have left in a number of comments regarding
the cut off time (publication date of RFC 3406) for updating of registration
tables.  It strikes me that it would be relatively little work and quite helpful
to bring these tables up to date.

There are also a number of relatively minor points where items and processes are
explicitly not fully specified.  Thus could lead to annoying corners where
implementations are totally interoperable (e.g., what is the complete set of
'terminators' forbidden in IP_FQDNs?  What is an acceptable 'sort of' email
address/NAI on EAP?)

Finally there are a number of points where it is recommended that network
traffic needs to be limited but no concrete guidelines are given.  I think that
some sort of suggestions for the parameters to be applied (e.g., time constants,
number of repeats, backoff algorithm) would be desirable.

Major issues:

s3.3.4: The draft states that the list of mandatory to implement suites has been
removed due to evolution going too fast.  However there are effectively some
mandatory to implement suites; they are listed in other documents.  There should
be a way of finding them so that users and implmenters can find them easily.

Minor issues:
s1: At para 6 in s1 the draft states:
The first request/response of an IKE session (IKE_SA_INIT) negotiates
security parameters for the IKE SA, sends nonces, and sends Diffie-
Hellman values.
As a (not really) naive reader, I asked myself 'Why does this text suddenly
mention that we need to send nonces and Diffie-Hellman values?'  Looking back at
the text so far I realized that the text has not introduced the techniques that
it is going to use to establish the authenticated IKE channel etc. It is assumed
that readers know that as soon as D-H is mentioned we are talking public key
cryptography. A paragraph explaining the underlying ideas would be useful.

s1.2, last para:
Note that IKE_AUTH messages do not contain KEi/KEr or Ni/Nr payloads.
Thus, the SA payloads in the IKE_AUTH exchange cannot contain
Transform Type 4 (Diffie-Hellman Group) with any value other than
NONE.  Implementations SHOULD omit the whole transform substructure
instead of sending value NONE.
Does 'cannot contain' conflict with the 'SHOULD'? I am unclear what an
implementer would do if s/he chose to do otherwise than omit the transform
structure in the light of the previous statement.

s2.1, last sentence:
 The retransmission policy for one-way messages is somewhat different
from that for regular messages.  Because no acknowledgement is ever
sent, there is no reason to gratuitously retransmit one-way messages.
Given that all these messages are errors, it makes sense to send them
only once per offending packet, and only retransmit if further
offending packets are received.  Still, it also makes sense to limit
retransmissions of such error messages.
Does this need to be more precise?  Some explicit policy for restricting
retransmissions? Possibly in s2.21.4.

s2.3: Should there be some discussion of the interaction of rekeying of the
IKE_SA and windows?  Presumably a rekey message should not be actioned until all
previous messages have been responded to.  Likewise receiving a Message ID with
a sequence number bigger than that in the rekey message should be very suspect!
 Should the INVALID_MESSAGE_ID notification be sent in this case (and before or
after the rekey?)  There might be some knock on into s2.8 where rekeying is
discussed. And maybe into s2.25?

s2.4, para 2:
 The INITIAL_CONTACT notification, if sent, MUST
be in the first IKE_AUTH request or response, not as a 

Re: Last Call: draft-ietf-netlmm-mip-interactions (Interactions betweenPMIPv6 and MIPv6: scenarios and related issues) to Informational RFC

2010-05-04 Thread Charles E. Perkins


Hello folks,

Here is a first installment of comments on the
abovementioned Internet Draft.




  The list is not
meant to be exhaustive.  Moreover, this document presents and
identifies all issues pertained to these scenarios and discusses
possible means and mechanisms that are recommended to enable them.

These two sentences clash, even though it's true
a logician can make sense of them.

Figure 2 is out of order.

The captions to all figures ought to be centered.

The following figure illustrates an example

following figure -- Figure 3 below

of this scenario, where the MN is moving from an access network
where PMIPv6 is supported (i.e.  MAG functionality is supported)
to a network where PMIPv6 is not supported (i.e.  MAG
functionality is not supported by the AR).  This implies that the
home link of the MN is actually a PMIPv6 domain.

It's true that the figure is drawn this way, but there
might be an unwanted inference that such heterogeneous
network support _always_ requires PMIP support in the
home network.  I reckon that was not intended.

This scenario is very similar to other hierarchical mobility
schemes, including a HMIPv6-MIPv6 scheme.

Please make the relevant citations.

Note that a race condition where the MN registers the
CoA at the HA before the CoA is actually bound to the MAG at the
LMA is not possible.

Better:
 Note that there is no race condition whereby the MN registers
 the CoA at the HA before the CoA is actually bound to the MAG
 at the LMA.

   In particular, based on the base
   specification [RFC3775],

Better:
In particular, based on [RFC3775],
Or, even better:
In particular, the base
  specification [RFC3775] doesn't require the MN to include any
  identifier, such as the MN-ID [RFC4283], in the Binding Update
  message other than its Home Address.

   As described in
 [RFC4877], the identifier of the MN is known by the Home Agent
 after the IKEv2 exchange, but this is not used in the MIPv6
 signaling, nor as a lookup key for the binding cache.

Which naturally leads to the question, Why Not?!
This is a problem that really needs to be fixed.

  Therefore PMIPv6 and MIPv6 will
 always create two different binding cache entries in the HA/
 LMA which implies that the HA and LMA are logically separated.

I think this statement is too strong.  If I were building such
a system, my HA/LMA would probably be aware that the MN-ID was
tightly bound to the MN-HoA.  So I would almost certainly make
sure that there was a single binding cache entry.

If you replace will always by might well, and are
by might be, then I would agree.

Also, it's unfortunate if the typography separates HA from
LMA in HA/LMA.

*  When the mobile node moves from a MIPv6 foreign network to the
   PMIPv6 home domain, the MAG registers the mobile node at the
   LMA by sending a Proxy Binding Update.  Subsequently, the LMA
   updates the mobile node's binding cache entry with the MAG
   address and the MAG emulates the mobile node's home link.
   Upon detection of the home link, the mobile node will send a
   de-registration Binding Update to its home agent.  It is
   necessary to make sure that the de-registration of the MIPv6
   BU does not change the PMIPv6 binding cache entry just created
   by the MAG.

To me this looks like a major design flaw.

It would be better if the mobile node were aware that its
registration authority was delegated to the MAG on the home link.
Then it would know to avoid this problem.

Stated another way, this would be a requirement induced by
PMIP on MIPv6-compliant nodes.  Asking the obvious, one
wonders why an operator of a home network would
a) assume that the nodes were MIPv6-unaware, necessitating
   a PMIP solution, and yet
b) assume that the nodes might be MIPv6-aware, so that there is
   danger of conflict with a PMIP solution.

What am I missing?

  *  MIPv6 and PMIPv6 use different mechanisms for handling re-
 ordering of registration messages and they are sent by
 different entities.

Looks like another design flaw to me.  If the HA/LMA
is aware of MIPv6 sequence numbers (i.e., actually _is_
a HA), why not require the MAG to _use_ sequence
numbers?  This would be a trivial matter of inclusion
into the PBA.

(or binging cache) -- (or binding cache)
:-)  thanks, I needed that  :-)
:-)  in fact, I need more $$ for my binges  :-)

  *  In this mixed scenario, both host-based and network-based
 security associations are used to update the same binding
 

Re: Last Call: draft-ietf-netlmm-mip-interactions (Interactions betweenPMIPv6 and MIPv6: scenarios and related issues) to Informational RFC

2010-05-04 Thread Charles E. Perkins


Hello folks,

Here are the rest of my comments on the
abovementioned Internet Draft.



   For this reason, it is recommended that when the MIPv6 home
  link is implemented as a PMIPv6 domain, the HA/LMA implementation
  treats the two protocol as independent.

Why not first recommend that the HA/LMA implement some
platform-specific mechanism for identifying the alternate
identifiers (e.g., MN-ID and MN-HoA)?

More in details the following principles ...

--  In more detail, the following principles ...

   ...  The mobile node needs to bootstrap

-- ...  The mobile node may need to bootstrap

  service continuity.  Therefore the following steps must be performed
  by the UE:

--

   service continuity.  Therefore the following steps might be
   performed by the MN:

In the following steps one and two: needs to -- may need to
In step three: assign -- may assign

Since all these steps must -- If all these steps must

that the mobile node establishes -- that the mobile node establish
or, better:
   it is recommended
that the mobile node establishes
--
 the mobile node SHOULD establish
along with a little rewording of the next subordinate clause.

has Mobile IPv6 stack active
-- continues to make use of Mobile IPv6

as if it is attached -- as if it were attached
-- BUT: in the scenario under discussion, isn't it?

[boot-integrated]:
This citation needs to be updated; and, apparently it now
has a distinguished author as well as an editor.  But, it's
been in the RFC editor's queue for TWO YEARS?!  That's a
new one on me.

MN-HoA.For -- MN-HoA.  For
is this a bug in xml2rfc?

  For this reason, the mobile
  node must be configured to propose MN-HoA as the home address in the
  IKEv2 INTERNAL_IP6_ADDRESS attribute during the IKEv2 exchange with
  the HA/LMA.

I think this qualifies as another requirement placed by PMIP
on MIPv6 nodes.  Maybe it would be a good idea to make a new
section and list these requirements newly placed by PMIP.

I'm starting to wonder whether these new mandates might
belong in rfc3775bis.

When the mobile node hands over -- When the mobile node migrates to
basestations perform handovers, not mobile nodes

The
mobile node may set the R bit defined in NEMO specification

a) citation required for NEMO specification
b) NEMO specification -- the NEMO specification
c) _ouch_!  Now we have a new mandate placed by PMIP onto NEMO.!

is created irrespective -- may be created regardless
I think it is unwise to prohibit implementers from
 coordinating the binding cache entries of PMIP and
 MIPv6 if they serve the same mobile node, as I have
 mentioned earlier

In this section it is assumed
--
In this section we consider the case where

 4.3.  Solutions related to scenario B

This conflicts with the sentence in section 1:

this document presents and
identifies all issues pertained to these scenarios and discusses
possible means and mechanisms that are recommended to enable them.





On 5/3/2010 7:24 AM, The IESG wrote:

The IESG has received a request from the Network-based Localized Mobility
Management WG (netlmm) to consider the following document:

- 'Interactions between PMIPv6 and MIPv6: scenarios and related issues '
draft-ietf-netlmm-mip-interactions-05.txt  as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
ietf@ietf.org mailing lists by 2010-05-17. Exceptionally,
comments may be sent to i...@ietf.org instead. In either case, please
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-netlmm-mip-interactions-05.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=17831rfc_flag=0

___
IETF-Announce mailing list
ietf-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Maastricht IETF Codesprint

2010-05-04 Thread IETF Chair
Maastricht IETF Codesprint

When:  24 July 2010 beginning at 9:30 AM

Where: IETF Hotel

What:  A bunch of hackers get together to work on code for the IETF.
  Some people may be preparing for the transition to a new
  database schema; some people may be preparing for the
  upcoming extensions to support working groups; some people
  may be adding exciting new functionality.  All code will
  become part of the open source IETF tools.

How:   See http://tools.ietf.org/tools/ietfdb/wiki/IETFSprintHowto

Who:   Hopefully you can help

Many of the results of previous codesprint activities are being
used every day by the IETF community.  Steve Conte will be helping
with advance planning.  Henrik Levkowetz will be coordinating the
event in Maastricht.  More information is available at:

 http://trac.tools.ietf.org/tools/ietfdb/wiki/IETF78Sprint

If you are able to participate, please sign up on the wiki at:

 http://trac.tools.ietf.org/tools/ietfdb/wiki/IETF78SprintSignUp

Please support the tools development effort,
  Russ


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-kucherawy-authres-header-b (Authentication-Results Registration For Differentiating Among Cryptographic Results) to Proposed Standard

2010-05-04 Thread Murray S. Kucherawy
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Alessandro Vesely
 Sent: Tuesday, May 04, 2010 2:46 AM
 To: ietf@ietf.org
 Subject: Re: Last Call: draft-kucherawy-authres-header-b
 (Authentication-Results Registration For Differentiating Among
 Cryptographic Results) to Proposed Standard
 
 For a minor point, the example (A.1) the I-D makes does not illustrate
 the reason for introducing header.b. The exemplified signatures can
 already be distinguished by their header.i values. By setting that
 attribute also in this case, the example conveys the impression that
 header.b should not be omitted, even when it is unnecessary. If that's
 the intended meaning, it should be stated more explicitly, IMHO.

Thanks, that was an oversight on my part.  I'll correct it in the next version.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Formal SPAM Compliant filed against Anderson...

2010-05-04 Thread Joe Baptista
Has anyone bother by Dean considered using filters as a means of dealing
with this?

Joe

On Mon, May 3, 2010 at 2:21 PM, todd glassey tglas...@earthlink.net wrote:

 On 5/3/2010 11:06 AM, Arnt Gulbrandsen wrote:
  On 05/03/2010 07:48 PM, todd glassey wrote:
  Maybe Joe but I do not want to be a party to his mailing lists, and he
  will not allow me off of them, so I have no choice but to file the spam
  compliant.
 
  I direct your attention to the IETF's standard for unilateral list
  unsubscription, RFC 5228 as extended by RFC 5429.

 Arnt
 These are extensions for Sendmail. The problem is that Dean created a
 list outside of the IETF and subscribed IETF members to it.  The members
 have NO passwords and cant get them without interacting with Dean making
 this harassment.

 As to whether the IETF postings are commercial or not they clearly are
 since they are work on standards for commercial networking.

 Todd
 
  Dean subscribed me too, but I had forgotten about it until just now.
 
  Arnt
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www.ietf.org/mailman/listinfo/ietf
 


 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf




-- 
Joe Baptista

www.publicroot.org
PublicRoot Consortium

The future of the Internet is Open, Transparent, Inclusive, Representative 
Accountable to the Internet community @large.

 Office: +1 (360) 526-6077 (extension 052)
Fax: +1 (509) 479-0084

Personal: http://baptista.cynikal.net/
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf