Lightweight Authenticated Key Exchange (LAKE) - IETF 123

Time

Chairs

Notetakers

Agenda

Minutes

Administrivia (chairs, 3 mins)

RN doing introductions

draft-ietf-lake-ra (YS, 10 mins)

YS presenting

MV: Will you present this at the RATS session on Friday?
YS: Yes, I will present in RATS on Friday afternoon
MV: Please review and provide comments on the mailing list.

draft-ietf-lake-edhoc-psk (ELP, 10 mins)

ELP presenting

JPM: With these changes I think we're ready for formal verification.
(after merging and then looking through the security claims.) Let's
start planning for formal verification
MV: For the next IETF meeting, we can aim triggering the formal
verification?
JPM: No need to wait. We still have to merge this and submit a new
version of the draft, but that will take less time.
MV: So as soon as we have consensus from all co-authors, we can start
the formal verification process.
JPM: Yes, and also ask the group if we're ready to trigger starting the
formal verification

MV: Elsa could you comment on the interop tests done during the
hackathon?
ELP: Did interop testing. Had 2 implementations, one in Rust from Inria
and one in C from University of Murcia. Managed to run in both
directions (initiator/responder). Worked for current draft version. Once
draft/implementation is updated, need a new interop event.
MV: All these interop events with results are documented and archived in
the Confluence page of LAKE. (lakewg.org)

draft-ietf-lake-authz (GF, 10 mins)

GF presenting

RN: Want to do WGLC for next IETF? Need more reviews?
GF: Yes, after merging further PRs...

CA (on chat): Feel free to poke me for a review.

draft-ietf-lake-edhoc-impl-cons (MT, 7 mins)

MT presenting

CA (in chat): minor remark (chat-only): With the new change of having a
CRED_I and a CRED_R in PSK, the change of "credentials associated
with" might not be so relevant any more.

GF: I can do a review of the draft, especially focusing on ELA.
RN: Want 1 more round and then WGLC.
MT: Yes 1 more round (since there's feedback coming)

CA (in chat): I'd like to review this too, but can do that in a WGLC
too.

GF: I'd like to make comments after the draft is updated, cause I need
to update the implementation

draft-ietf-lake-app-profiles (MT, 8 mins)

MT presenting

RN: Questions?
CA (chat): I agree it should work with an existing EAD item.

MV: We concluded adopted WG drafts, now going with individual
submissions.

draft-tiloca-lake-exporter-output-length (MT, 5 mins)

MT presenting

MV: Main question is whether to register a new EAD item or to merge this
into the -app-profiles draft.
(3 raised hands)

CA (on chat): Skimmed, not sure if that counts.

MV: Propose we continue discussing this and depending on the comments
decide on next steps

draft-spm-lake-pqsuites (GS/JPM, 10 mins )

JPM presenting

UB: A lot to discuss. I respectfully disagree that you cannot
authenticate with KEM as there are serveral drafts submitted
JPM: I'm only saying it requires new methods, you can't do it with the
current methods.
UB: There are options for KEM authentication which would be digital
signature sizes. As for which of those would, if at all, be standardized
by NIST or other bodies is a question. ML-DSA and FN-DSA exist now. One
has huge signatures and the other has problem with difficulty of
validating implementations.
JPM: Agree; we should look at having KEM-based authentication methods
for EDHOC. They are very orthogonal.
UB: Fully agree

QD: My guess would be that TBD1 has a tag of 128 bits?
JPM: Idea was to only go with 128 bit tags. It's aligned with the format
used in COSE, since EDHOC uses COSE.
QD: Same question about number on another line
JPM: That's 64 bit tags. This is related to JOSE/COSE naming for the
algorithms.
QD: Looks like we're doing level 1. What is motivation for using
SHAKE256?
JPM: It was already used here

FP (in chat):
https://www.iana.org/assignments/cose/cose.xhtml#algorithms
FP (in chat): example: AES-CCM-16-64-128 means AES-CCM mode 128-bit key,
64-bit tag, 13-byte nonce

KEM-based Authentication for EDHOC (LPF, 10 mins)

-- draft-pocero-authkem-edhoc
-- draft-pocero-authkem-ikr-edhoc

LPF presenting

CA (on chat): Going to to 5-message EDHOC, I think we can do it, but
we'll need to generalize how downstreams use EDHOC (eg. have methods
describe whether message 4 can be implicit, and starting from which
message, payload can be sent). EDHOC-CoAP can certainly be generalized
in that sense.
CA (on chat): (Possibly also things like "you can use exported keys in
message X/Y but with caveats (such as no PFS)")

GS (on chat): Can you combine the protocol with OSCORE, like in RFC9668,
to reduce the total number of round trips for the first application
message?
MT (on chat): as a gut feeling, yes, with the combined request
transporting message_5 instead of message_3 like in RFC 9668
CA (on chat): seems to me from the first glance that we could have the
same, just 1RTT later.

DH: You're trying to map to the static and ephemeral way things were
done, so doing a lot of KEMs. Even if using the same static key, it's
not like static-static DH. No need to add ephemeral component right?
LPF: So ephemeral KEM is not needed? Then we have no forward secrecy?
DH: ML-KEM encap generates a random number for each encap. So not gonna
have the static-static problem of DH.

JPM (on chat): I support work on KEM-based authentication.
I think adding roundtrips and keeping the strong security properties is
the right approach. In addition to a KEM-KEM method, two things that
should be discussed: KEM mixed with SIG? (Suggested by Thom Wiggers at
IETF 122); Methods where Initiotor has pre-knowledge of R's key, similar
to Noise IK?
RML (on chat): I also support working with KEM-based authentication

MV: Propose we continue on the mailing list

draft-uri-lake-pquake-00 (UB, 10 mins)

UB presenting

GS (on chat): It would be good to have a detailed comparison between the
difference between Lidia's and Uri's proposal. For the final result to
be meaningful to LAKE, it need so be both an EDHOC method, preferably
building on the existing methods, and (at least eventually) formally
verified.

Discussion on PQ EDHOC (all, 7 mins)

MV: I checked with Paul (AD). If we do work on these PQ items, we need
to recharter.

Show-of-hands poll: "Raise your hand if you believe the group should
work on PQ-resistant EDHOC"

MV: Consensus is that the WG should work on this.
MV: Next, question is what scope the WG should have. Input?
UB: Can you clarify?
MV: Either or both

JPM: If the charter does not allow to register new cipher suites, that's
strange and we should recharter at least to allow that.
QD: For the charter it would be nice to include general language that
allows looking into post-quantum designs that can do key exchange,
signatures, and see how people react to that.

JPM: COSE is now discussing to work on ASCON, which we may want to cover
in new EDHOC cipher suites to be registered in the future.
MV: We chairs will open a new thread on the mailing list about the
charter text.
CA (on chat): If we can't register even ASCON based suites, that'd sound
more like an editorial bug in the charter (can't imagine tha the
intention of the charter is that this won't work).

MV: We're in the lightweight authenticated key exchange WG, also need to
be thinking about intelligent solution to avoid transport of keys and
ciphertext to stick to being lightweight
UB: Fortunately the answer is pretty simple. In the use cases which
allow pre-loading public keys instead of exchanging over the wire,
protocols can exchange references to the keys.
JPM: It's already supported by means of credential by references.

LPF: The best way seems to allowing both signature and signature free
approaches. Also, methods can be generalized to allow for reducing
overhead

AOB

UB: There are two very similar drafts. I don't think it makes sense to
have both. Do we keep one only? Do we merge them?
MV: First need to re-charter and agree on the scope. Then future
meetings can discuss the different solutions.