Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-04-04 Thread Sam Hartman
> "Dan" == Dan Harkins <[EMAIL PROTECTED]> writes:

Dan>   Sam,

Dan>   The keys in this hypothetical protocol are for network
Dan> access and giving them to authenticators for that purpose
Dan> would seem to fall under the "key scope" requirement.

Key scope means giving an authenticator a key for a specific
purpose--something like authentication for network access between peer
foo and authenticator bar--not something general like network access.

Dan>   These are not session keys so the text relating the session
Dan> keys is not applicable.

O, I definitely think they are session keys.

Dan>   So the domino effect is the only text that could seem to
Dan> prohibit this. As long as the same key wasn't given to more
Dan> than one authenticator though then this is satisfied. A way
Dan> to prevent the same key being sent to different
Dan> authenticators is to allow the authenticator to choose an
Dan> identity to advertise to the peer-- "I'm 'foo'"-- and to tell
Dan> the server-- "give me a key specific to 'foo'". That identity
Dan> is mixed into the key derivation function. This is
Dan> essentially what 802.11r is doing. This has channel
Dan> binding/lying NAS issues though. I'm not quite sure yet what
Dan> HOKEY is doing in this regard (how is the distributed key
Dan> separated from other keys) but it appears to suffer from the
Dan> same problems since people are advocating solutions that do
Dan> not fix this problem.

Wait, what's wrong with giving 100 authenticators 100 different keys
provided that each authenticator is authorized to claim the identity
it plans to claim?
Isn't that exactly the sort of thing we do want to do?



BTW, I think your questions exploring what key scope and session keys
mean are good.  The only issue I'm asking you to step away from at
this late point in the process is the question of whether clients
should be involved in deciding who their keys are given to.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-04-04 Thread Dan Harkins

  Sam,

  The keys in this hypothetical protocol are for network access and
giving them to authenticators for that purpose would seem to fall
under the "key scope" requirement.

  These are not session keys so the text relating the session keys
is not applicable.

  So the domino effect is the only text that could seem to prohibit
this. As long as the same key wasn't given to more than one authenticator
though then this is satisfied. A way to prevent the same key being sent
to different authenticators is to allow the authenticator to choose an
identity to advertise to the peer-- "I'm 'foo'"-- and to tell the server--
"give me a key specific to 'foo'". That identity is mixed into the key
derivation function. This is essentially what 802.11r is doing. This has
channel binding/lying NAS issues though. I'm not quite sure yet what HOKEY
is doing in this regard (how is the distributed key separated from other
keys) but it appears to suffer from the same problems since people are
advocating solutions that do not fix this problem.

  Finally, I'm not trying to delay anything. I said it before and I'll
say it again: if the general feeling is that the I-D already addresses
these issues or there is no consensus to solve the problem then publish it
as an RFC. It is important to have an RFC talking about these things, it's
just my personal opinion that it does not go far enough.

  Dan.

On Tue, April 3, 2007 5:23 pm, Sam Hartman wrote:
>> "Dan" == Dan Harkins <[EMAIL PROTECTED]> writes:
>
> Dan>   Sam,
>
> Dan>   I guess the question is, what text in this I-D would
> Dan> prevent a new key distribution protocol based on AAA in which
> Dan> the authentication server sent a copy of the peer's keys
> Dan> willy-nilly to every authenticator it had a security
> Dan> association with?
>
> First, note that I do not claim we have the text right; I'm asking
> Russ and Bernard to evaluate that.
>
> So, I'll tell you what the closest text is for this, but you are
> welcome to argue that the current text does not reflect our consensus.
>
> Under limit key scope:
>
>Following the principle of least privilege, parties MUST NOT
>have access to keying material that is not needed to perform
>their role.
> Also see:
>
>   Strong, fresh session keys
>
>While preserving algorithm independence, session keys MUST be
>strong and fresh.  Each session deserves an independent session
>key.
>A fresh cryptographic key is one that is generated specifically
>for the intended use.  In this situation, a secure association
>protocol is used to establish session keys.  The AAA protocol
>and EAP method MUST ensure that the keying material supplied as
>an input to session key derivation is fresh, and the secure
>association protocol MUST generate a separate session key for
>each session, even if the keying material provided by EAP is
>cached.  A cached key persists after the authentication
>exchange has completed.  For the AAA/EAP server, key caching
>can happen when state is kept on the server.  For the NAS or
>client, key caching can happen when the NAS or client does not
>destroy keying material immediately following the derivation of
>session keys.
>
>   Prevent the Domino effect
>
>  Compromise of a single peer MUST NOT compromise keying material
>  held by any other peer within the system, including session
>  keys and long-term keys.  Likewise, compromise of a single
>  authenticator MUST NOT compromise keying material held by any
>  other authenticator within the system.  In the context of a key
>  hierarchy, this means that the compromise of one node in the
>  key hierarchy must not disclose the information necessary to
>  compromise other branches in the key hierarchy.  Obviously, the
>  compromise of the root of the key hierarchy will compromise all
>  of the keys; however, a compromise in one branch MUST NOT
>  result in the compromise of other branches.
>
> I think given these requirements what you propose would not be
> appropriate.
>
>
> Dan>   Another question: has the peer no say in to whom its
> Dan> secrets are disclosed? If you think it does then what in the
> Dan> I-D addresses that concern and if you don't think it does
> Dan> then why?
>
> I find no requirements related to this.  I do not believe there is
> consensus to have such requirements nor do I believe it appropriate to
> delay the document while you attempt to build such a consensus.
>
> --Sam
>
>



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-04-04 Thread Sam Hartman
> "Dean" == Dean Anderson <[EMAIL PROTECTED]> writes:

Dean> On Mon, 2 Apr 2007, Sam Hartman wrote:
>> The IETf learned of Brown's patent application on 2006-11-29.

Dean> Can you elaborate?  From whom or what source did the IETF
Dean> learn of the application?

The IETF learned through an IPR disclosure filed by Brown.
You can see that disclosure on our IPR disclosure page.

>> At the IESG telechat held the next day, the IESG decided to
>> withdraw approval and the general direction of its mesage to
>> the community.  A significant delay was introduced while the
>> IESG reviewed its note with the IETF's lawyer.
>> 
>> 
>> Please note that Russ recused himself from the decisions
>> regarding this draft.  Also note that the 2006-11-30 meeting
>> was well before Russ knew he would be appointed IETF chair.

Dean> What was Housley's position on the earlier elliptic curve
Dean> crypto patent discussion that was suppressed on DNSEXT, and
Dean> was subsequently a topic of the PR action against me?

Dean> I don't have a record of Housley recusing himself from those
Dean> related issues.


Dean> -- Av8 Internet Prepared to pay a premium for better
Dean> service?  www.av8.net faster, more reliable, better service
Dean> 617 344 9000





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-04-04 Thread Mark Brown
Simon,

You observed:

> > Normal IPR disclosure process is to alert the IETF community via
> > the IETF
> > website that a patent has been filed.  I mistakenly thought that
> > adding the
> > boilerplate IPR statement at the top of the ID was sufficient to
> > say what
> > needed to be said.  However, I don't think IETF requires the
> > disclosure of
> > an unpublished patent application.
> 
> I believe that is required even for patent applications.  RFC 3979
> talks about patent applications in several places.

You're right, please let me correct myself again here.  My use of the term
"disclosure" was sloppy.  Here's what I was told by IESG:

> >The IESG has been informed by Mark Brown that he had knowledge of the 
> >September 2005 patent application filed by his employer at the time 
> >he submitted draft-housley-tls-authz-extns. Accordingly, he was 
> >obligated to disclose the existence of this patent application upon 
> >making this submission. Making a required IPR disclosure after a 
> >draft is approved does not meet the requirement to promptly make the 
> >disclosure. According to section 7 of RFC 3979 failure to make a 
> >required disclosure is a failure of process. It should be noted that 
> >the above disclosure obligations apply to unpublished patent 
> >applications. When a patent application that is required to be 
> >disclosed is unpublished, the discloser must 'indicate that the claim 
> >is based on unpublished patent applications', but is not required to 
> >list the application number (see RFC 3978 Section 6.4.1).

The content of the IETF-required IPR disclosure is this:

1. (YES) "the discloser must 'indicate that the claim is based on
unpublished patent applications'"

Not these:

2. (NO) "list the application number (see RFC 3978 Section 6.4.1)."
3. (NO) otherwise publish to the IETF the pending patent claims or
description of the invention disclosed in any unpublished patent
application(s)

What I meant to say in my earlier email is that I don't think IETF requires
disclosure of the body of the patent application, it's claims, etc. as in
(3). I recognize that IETF does require the required IPR disclosure made via
http://www.ietf.org/ipr-instructions as described in (1). 

This probably isn't news to any of you, but I wanted to correct my sloppy
use of the term "disclosure".

Thanks,

mark


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-04-04 Thread Mark Brown
Harald,

I want to apologize again for screwing up the IPR disclosure process.  

Normal IPR disclosure process is to alert the IETF community via the IETF
website that a patent has been filed.  I mistakenly thought that adding the
boilerplate IPR statement at the top of the ID was sufficient to say what
needed to be said.  However, I don't think IETF requires the disclosure of
an unpublished patent application. 

I finally made my disclosure on the IETF website (what I mistakenly thought
was a second disclosure) after my patent got published.  And, in all
honesty, even this disclosure got delayed because I sought advice.  Please
note that the filing's publication, the delay, and the IPR disclosure all
happened after the last IETF approval for the ID.  The right thing to do is
to use the IETF website the very day your file your first ID, and not hope
that the verbiage atop the ID will somehow disclose that IPR filings are in
progress.

As a result of my mistakes, the IETF withdrew approval of the ID and
explained the process to me.  That's fair.  But please keep in mind that
even for important things, it's easy to make mistakes your first time
through a process.

--mark


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf