My 5.1 comment:  I skimmed RFC 4017 and it seems sufficient.  I also looked
to see if EAP methods include it as a reference (and many of them do).  It
is my opinion that w/ the addition of a reference and some clarifying text
will allow you to claim that the MSK is a 'strong cryptographic key', and
therefore ok to use the HKDF KDF Expand directly.

I apologize for not catching this in the early review!

Deb

On Thu, Jan 25, 2024 at 5:46 AM Dan Garcia Carrillo <garcia...@uniovi.es>
wrote:

> Dear Deb,
>
> Thank you for the update on the review.
>
> Please let us comment inline.
> El 23/1/24 a las 13:07, Deb Cooley via Datatracker escribió:
>
> Reviewer: Deb Cooley
> Review result: Has Nits
>
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.
>
> Document: draft-ietf-ace-wg-coap-eap-09
> Reviewer: Deb Cooley
> Review Date: 2024-01-23
>
> The summary of the review is 'Has Nits'.
>
> 0.  All of my early review comments have been addressed.  TY
>
> Great, thank you.
>
> 1.  Section 5.1, last paragraph:  The MSK can be assumed to be 'fresh key
> material', but do all EAP methods yield 'strong cryptographic key' by Section
> 3.3 of RFC 5869?  If some EAP methods do not yield strong keys, then either 
> the
> KDF Extract should be used, or those methods should not be allowed.  (I did 
> not
> look this up, so telling me that you all checked is a fine answer)
>
> This is a very good point.
>
> In this sense, we limit the applicability of EAP methods to the ones
> compliant with the mandatory requirements of RFC4017. We will add  this
> clarification to the text.
>
> Regarding the use of Extract, as it says in RFC5869, if we understand that
> the MSK is cryptographically strong by the requirements of RFC4017, we can
> directly use expand.
>
>
>
> RFC5869
>
> In some applications, the input key material IKM may already be
>
>    present as a cryptographically strong key (for example, the premaster
>
>    secret in TLS RSA cipher suites would be a pseudorandom string,
>
>    except for the first two octets).  In this case, one can skip the
>
>    extract part and use IKM directly to key HMAC in the expand step.
>
>
> That said, we do not see any inconvenient, far from it, that in addition
> to the requisites of RFC4017 for EAP methods to be used, to use extract as
> well for the case of CoAP-EAP to create a specific key.
>
> Do you think this is an adequate approximation, o could we leave it as it
> currently is with these clarifications?
>
> Using extract would change the design a bit, and we would have to define
> the new process, selecting the salt (e.g., a transcript hash of the
> exchange up to that point to generate a PRK). We understand that this would
> delay the process further and maybe we will be doing something unnecessary.
>
> What do you think?
>
>
> 2.  Section 5.2:  It would be useful to have an actual example of the info 
> part
> of the KDF. How is CS constructed - spaces, commas? Are there spaces between 
> CS
> and the string?
>
>
> We will add an example of this.
>
> Thank you.
>
> Best regards.
>
_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to