From: James Prestwood <prestwoj@gmail.com>
To: Denis Kenzior <denkenz@gmail.com>, iwd@lists.linux.dev
Subject: Re: [PATCH 11/21] doc: PKEX support for DPP
Date: Thu, 19 Oct 2023 13:00:58 -0700 [thread overview]
Message-ID: <ae7b807f-fb7b-4437-9e00-bc4f64ad6047@gmail.com> (raw)
In-Reply-To: <c8617f8d-0c7c-4e1c-ab0f-f356a121afe6@gmail.com>
Hi Denis,
On 10/19/23 11:56 AM, Denis Kenzior wrote:
> Hi James,
>
>>
>> I guess my question is really how you communicate this to the enrollee.
>>
>> The use case for a human user really comes down to not wanting to type
>> in a 64 character hex string :) So auto-generating a complex code
>> doesn't make much sense in this regard.
>
> Who said anything about a 64 character hex? I'm thinking more about a
> 10-12 character complex password like you see the web browser generate.
> However, I'm pretty sure we need the ability to generate the code every
> time:
>
> "If both sides have a user interface, this technique can be used to
> bootstrap trust by exchanging bootstrapping information including the
> bootstrapping keys that are to be used for a DPP exchange requiring
> mutual authentication. This bootstrapping technique shall use a fresh
> code each time and the same code shall not be used with different Peers."
>
> Correct me if I'm wrong, but PKEX is no different than regular DPP. It
> simply uses a code instead of a QR code for establishing the initial
> trust channel (giving high degree of confidence to both parties that the
> exchanged public keys are trusted). The more complex the code, the
> better the chance that the code can be trusted (i.e. it wasn't
> guessed). It still inherits the same basic attributes, roles, etc.
Yep, its purely a way to securely exchange bootstrapping keys.
>
>
>>
>> For a headless device auto-generation just won't work since the
>> password is baked into the image. I considered generating a single
>> bootstrapping key and
>
> Doesn't this run counter to what PKEX is about?
I don't think it runs counter, it just may not be _exactly_ what the
spec intended it to be used for. Using the same code isn't any different
than using the same PSK.
No matter what if your PSK or PKEX code gets compromised your stuck
re-configuring all your devices. I don't see an issue using a secure but
static PKEX code. Either way, this isn't really IWD's problem :)
>
>> bake that into the image (no PKEX) but I question the possibility of
>> offline
>
> With a strong password, probably eons, unless quantum computing is
> involved.
>
>> attacks. With PKEX the bootstrapping keys are changed upon each
>> protocol run so
>
> But you're still sharing a PSK in the end? Why go through all this
> trouble?
This is a more dynamic way of configuration and allows devices to show
up in a 'default' state and require zero manual configuration (for
specific wifi networks). When your talking about 10, 20, 100 devices,
manually configuring each one takes a lot of time. PKEX provided a
"hands-off" way of doing it assuming you have other devices in the area
with credentials.
>
>> I think there is forward secrecy there. Plus PKEX uses mutual
>> authentication to
>
> WPA3 has forward secrecy as well. So what are you trying to achieve?
I was just comparing PKEX to using a static pre-shared bootstrapping key
and fudging it to look like a QR code was scanned. This isn't a good
idea, hence why I pursued PKEX.
>
>> prevent someone from coming in and configuring the new devices who
>> shouldn't be.
>>
>
> The gold standard is still WPA-Enterprise with EAP-TLS.
>
> Regards,
> -Denis
>
next prev parent reply other threads:[~2023-10-19 20:01 UTC|newest]
Thread overview: 57+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-10-12 20:01 [PATCH 00/21] DPP PKEX Changes James Prestwood
2023-10-12 20:01 ` [PATCH 01/21] crypto: remove label from prf_plus, instead use va_args James Prestwood
2023-10-17 15:18 ` Denis Kenzior
2023-10-12 20:01 ` [PATCH 02/21] dpp-util: fix typo "COMMIT_REVEAP_RESPONSE" James Prestwood
2023-10-17 15:19 ` Denis Kenzior
2023-10-12 20:01 ` [PATCH 03/21] dpp: rename auth_addr to peer_addr James Prestwood
2023-10-17 15:21 ` Denis Kenzior
2023-10-12 20:01 ` [PATCH 04/21] dpp: rename dpp_presence_timeout to be generic James Prestwood
2023-10-17 15:31 ` Denis Kenzior
2023-10-12 20:01 ` [PATCH 05/21] dpp: move/store max_roc setting into dpp_create James Prestwood
2023-10-17 15:32 ` Denis Kenzior
2023-10-12 20:01 ` [PATCH 06/21] dpp: fix retransmits if on operating channel James Prestwood
2023-10-17 15:36 ` Denis Kenzior
2023-10-12 20:01 ` [PATCH 07/21] dpp-util: allow for mutual authentication in i/r_auth James Prestwood
2023-10-19 14:34 ` Denis Kenzior
2023-10-12 20:01 ` [PATCH 08/21] dpp-util: allow mutual auth in dpp_derive_ke James Prestwood
2023-10-12 20:01 ` [PATCH 09/21] unit: update test-dpp with API changes James Prestwood
2023-10-12 20:01 ` [PATCH 10/21] offchannel: add support to issue multiple offchannel requests James Prestwood
2023-10-19 14:51 ` Denis Kenzior
2023-10-19 19:35 ` James Prestwood
2023-10-19 19:55 ` Denis Kenzior
2023-10-19 20:05 ` James Prestwood
2023-10-19 21:42 ` Denis Kenzior
2023-10-19 21:47 ` James Prestwood
2023-10-20 19:10 ` James Prestwood
2023-10-12 20:01 ` [PATCH 11/21] doc: PKEX support for DPP James Prestwood
2023-10-19 14:59 ` Denis Kenzior
2023-10-19 15:23 ` James Prestwood
2023-10-19 15:36 ` Denis Kenzior
2023-10-19 15:45 ` James Prestwood
2023-10-19 16:17 ` Denis Kenzior
2023-10-19 16:42 ` James Prestwood
2023-10-19 18:56 ` Denis Kenzior
2023-10-19 20:00 ` James Prestwood [this message]
2023-10-19 21:47 ` Denis Kenzior
2023-10-19 22:22 ` James Prestwood
2023-10-19 23:12 ` Denis Kenzior
2023-10-23 13:49 ` James Prestwood
2023-10-24 14:40 ` Denis Kenzior
2023-10-24 12:05 ` James Prestwood
2023-10-24 15:03 ` Denis Kenzior
2023-10-24 15:19 ` James Prestwood
2023-10-25 2:46 ` Denis Kenzior
2023-10-12 20:01 ` [PATCH 12/21] dpp-util: add crypto for PKEX James Prestwood
2023-10-19 15:13 ` Denis Kenzior
2023-10-19 15:27 ` James Prestwood
2023-10-12 20:01 ` [PATCH 13/21] dpp-util: add __DPP_STATUS_MAX James Prestwood
2023-10-19 15:16 ` Denis Kenzior
2023-10-23 12:35 ` James Prestwood
2023-10-12 20:01 ` [PATCH 14/21] dpp: support mutual authentication James Prestwood
2023-10-12 20:01 ` [PATCH 15/21] dpp: allow enrollee to be authentication initiator James Prestwood
2023-10-12 20:01 ` [PATCH 16/21] dbus: add SharedCodeDeviceProvisioning interface definition James Prestwood
2023-10-12 20:01 ` [PATCH 17/21] dpp: initial version of PKEX enrollee support James Prestwood
2023-10-12 20:01 ` [PATCH 18/21] dpp: initial version of PKEX configurator support James Prestwood
2023-10-12 20:01 ` [PATCH 19/21] auto-t: add utils for wpa_supplicant PKEX James Prestwood
2023-10-12 20:01 ` [PATCH 20/21] auto-t: add APIs for PKEX James Prestwood
2023-10-12 20:01 ` [PATCH 21/21] auto-t: add DPP PKEX tests James Prestwood
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ae7b807f-fb7b-4437-9e00-bc4f64ad6047@gmail.com \
--to=prestwoj@gmail.com \
--cc=denkenz@gmail.com \
--cc=iwd@lists.linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox