Skip to main content

Early Review of draft-camwinget-tls-ts13-macciphersuites-06
review-camwinget-tls-ts13-macciphersuites-06-iotdir-early-richardson-2020-08-08-00

Request Review of draft-camwinget-tls-ts13-macciphersuites-06
Requested revision 06 (document currently at 12)
Type Early Review
Team Internet of Things Directorate (iotdir)
Deadline 2020-08-30
Requested 2020-08-02
Requested by Adrian Farrel
Authors Nancy Cam-Winget , Jack Visoky
I-D last updated 2020-08-08
Completed reviews Iotdir Early review of -06 by Michael Richardson (diff)
Comments
This document has been present for publication as an Informational RFC in the Independent Stream.
I am particularly interested to know whether the limited security environment proposed by the authors (for very low-end devices and use cases where confidentiality is not a requirement and where the management and auditing tools for these devices rely on the passive capture of the information for auditing purposes only) is realistic and wise (i.e., not dangerous or harmful to the Internet).
Publication on the Independent Stream does not require agreement by the IETF community that an idea is good, but it does require some care for the security of users and the Internet. Such care is either expressed through appropriately clear messages in the document, or through non-publication of harmful ideas.
Assignment Reviewer Michael Richardson
State Completed
Request Early review on draft-camwinget-tls-ts13-macciphersuites by Internet of Things Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/iot-directorate/EcGwiDMXxnqUYLnh03dDVuq_IhQ
Reviewed revision 06 (document currently at 12)
Result Ready
Completed 2020-08-08
review-camwinget-tls-ts13-macciphersuites-06-iotdir-early-richardson-2020-08-08-00
Reviewer: Michael Richardson
Review result: Ready with Nits
Document: draft-camwinget-tls-ts13-macciphersuites-06

I have reviewed this document.
I found it clear and well written.

I reviewed the discussion in the TLS WG list at:
   https://mailarchive.ietf.org/arch/msg/tls/0oy4wY4xiB1tASCBDWczh2xTVMM/

I found the discussion in the TLS list as to why the TLS WG should not adopt
it compelling, and I understand and agree with the reasons to go via the ISE.
I do not feel that this is a run-around the WG.

I did not find the three initial use cases at all compelling :-(
  SHA256, implemented in software, is not particularly faster than AES.
  See, for instance: https://cryptopp.com/benchmarks.html
  where we see ~100 MiB/s {O(10^2)} for most algorithms on "big CPU"
  (with some exceptions)
  I suspect they are all bound by memory I/O speeds, not details of the algorithm.
  I could not see an AEAD mode bench tested on that page.

On smaller CPUs, the difference MIGHT be more compelling, but on the smaller
such CPUs, there is usually AES acceleration, which would make use of
an hardware acclerated AES based AEAD algorithm likely better than SHA256.
Of course, there is probably some devices, built without any security in
mind, which lack even that.  I question whether or not they will be able to
do reasonable authentication of the TLS end points (the RSA or ECDSA operations).

The use which I *DID* find compelling was in the fourth case, and I suspect
that it covers many of the other cases.

   Furthermore, requirements for providing blackbox
   recording of the safety related network traffic can only be fulfilled
   through using integrity only ciphers, to be able to provide the
   safety related commands to a third party, which is responsible for
   the analysis after an accident.

I found this compelling, as it has nothing at all to do with relative speeds,
or perceived latencies, but on audit trails.