Skip to main content

Last Call Review of draft-ietf-jose-fully-specified-algorithms-08
review-ietf-jose-fully-specified-algorithms-08-secdir-lc-moriarty-2025-03-25-00

Request Review of draft-ietf-jose-fully-specified-algorithms
Requested revision No specific revision (document currently at 13)
Type IETF Last Call Review
Team Security Area Directorate (secdir)
Deadline 2025-03-07
Requested 2025-02-21
Authors Michael B. Jones , Orie Steele
I-D last updated 2025-05-13 (Latest revision 2025-05-11)
Completed reviews Secdir IETF Last Call review of -08 by Kathleen Moriarty (diff)
Genart IETF Last Call review of -07 by Vijay K. Gurbani (diff)
Artart IETF Last Call review of -07 by Jiankang Yao (diff)
Assignment Reviewer Kathleen Moriarty
State Completed
Request IETF Last Call review on draft-ietf-jose-fully-specified-algorithms by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/QIcm7NwIllF-GRjgOg3zdXnT5Co
Reviewed revision 08 (document currently at 13)
Result Has issues
Completed 2025-03-25
review-ietf-jose-fully-specified-algorithms-08-secdir-lc-moriarty-2025-03-25-00
Greetings!

Sorry for my late review. In reviewing the draft, there are 2 easily resolvable
findings. The first is that the term "cross mode" is used and never defined.
Tracing back to the reference provided, the closest I could find to "cross
mode" was the following text in RFC 9459:
   "To avoid cross-protocol concerns, implementations MUST NOT use the
   same keying material with more than one mode.  For example, the same
   keying material must not be used with AES-CTR and AES-CBC."
Matching the language or proving a definition would help to resolve this
concern.

Second, as I was reading the draft, anther security consideration became clear
and should be added. An attacker can easily avoid fingerprinting detection or
signature detection by rotating the ciphersuite whether it be defined or
polymorphic. If programmed to rotate, then the results will look different.
Awareness of flexibility in protocols to conduct attacks should be explicitly
stated so that OWASP can write up mitigations sooner rather than later when
attacks become prevalent.

Thank you for addressing the concerns! I did check the has issues, but do think
these are very easily addressed.

Best regards,
Kathleen