Network Working Group | L. Levison |
Internet-Draft | Lavabit LLC |
Intended status: Experimental | May 17, 2018 |
Expires: November 18, 2018 |
Safely Turn Authentication Credentials Into Entropy (STACIE)
draft-ladar-stacie-03
This document specifies a method for Safely Turning Authentication Credentials Into Entropy (STACIE) using an efficient Zero Knowledge Password Proof (ZKPP), and is provided as a standalone component suitable for use as a building block in other protocol development efforts. The scheme was created to fill the emerging need for a standard which allows a single low entropy password to be used for user authentication and the derivation of strong encryption keys. The design is modular, and is conservative in its use of an arbitrary one-way cryptographic hash function. The security of the scheme depends on the difficulty associated with reversing the hash function output back into the plain text input. STACIE attempts to make discovering the plain text input through the use of brute force more difficult by correlating the amount of processing to the length of a user’s plain text password. The shorter the plain text password, the more processing is required, with the amount of additional, artificially required, work scaling exponentially for each character.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 18, 2018.
Copyright (c) 2018 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
A number of emerging client/server protocols are currently being developed which rely on endpoint encryption schemes for protection against server compromises and pervasive surveillance efforts. All of these protocols share a common need for the ability to authenticate users based on their account password, without having to share a plain text password with the server. While several proposals have emerged which rely on a Zero Knowledge Password Proof (ZKPP), none of them provide a standardized method for deriving a symmetric encryption key suitable for use with Authenticated Encryption with Associated Data (AEAD) ciphers using the same user password.
This specification describes a standalone scheme which solves these problems by Safely Turning Authentication Credentials Into Entropy (STACIE). Unlike previous efforts, STACIE can uniquely provide a configurable level of resistance against off-line brute force attacks aimed at recovering the original plain text password, or the derived encryption keys. Client side key stretching ensures attackers capable of eavesdropping on connections protected by Transport Layer Security (TLS), or with access to the authentication database on the server, will be unable to derive a user’s password or their symmetric encryption keys.
STACIE is intended for use as a standalone component in other client/server protocol and application development efforts. While the protocol examples provided below are simplified, the abstract mechanism should easily translate into other encapsulation and encoding formats. Likewise, STACIE has been designed in a modular fashion, making it capable of using any arbitrary, but suitably strong, one-way cryptographic hash function. To ensure interoperability among different implementations, the Secure Hash Algorithm (SHA2-512) [SHS] MUST be implemented, while support for the newer Secure Hash Algorithm (SHA3-512) [PBH] and the Skein hash function (Skein-512) [SKEIN], are OPTIONAL.
For improved security, STACIE has been designed to provide extension points making it possible for specifications to extend the scheme with support for alternate authentication factors. The goal of this specification is to accommodate a large variety of security requirements, while remaining conservative in its assumptions and its use of any particular cryptographic primitives.
To accommodate the unpredictable pace of improvements in computer hardware and processing power, STACIE includes a mechanism which allows system operators to increase the difficulty level and processing required by clients for key derivation beyond what is mandated by this specification.
The purpose of this document is to discourage the proliferation of multiple schemes for use by the variety of protocols currently in development which need to safely derive a symmetric encryption key, and authenticate a user with the server using a single low entropy password. While STACIE introduces strategies designed to strengthen key material against a variety of recently revealed threats, and provides a measure of protection associated with deficiencies in the randomness of human input, it is not intended as a call to change or update existing protocols and specifications.
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in RFC 2119 [KEYWORDS] when, and only when, they appear in all capitals, as described by RFC 8174 [CAPITALIZATION].
This document represents all of the request and responses using standard JavaScript Object Notation [JSON]. When an object value is text, the native UTF-8 representation is supplied. Otherwise the value is armored using the base64 encoding scheme defined in RFC 4648 [BASE], with the URL and filename safe character set defined in Section 5, and assigned the identifier “base64url.” In addition to the standard base64url conversion, all trailing pad characters, line breaks, white space, and other non-printable control characters MUST be removed, as permitted by Section 3.2. [BASE] For the examples in this document, line breaks only appear when the sample value exceeds the available space.
STACIE employs a multistage process which includes an extraction stage, two key derivation stages, and two token derivation stages. The stages MUST progress in a linear order because the output for each stage is used as an input for the subsequent stage. The extraction and key derivation stages require a user’s plain text password, while the token derivation stages do not. This allows the derived tokens to be used for authentication, because they can be generated and verified by a server without access to the plain text password.
Implementations MUST never store a user’s plain text password. Client implementations which need the ability to authenticate and access encrypted user data without user input MUST store the verification token, and the individual realm hash. These values provide the ability to authenticate with a server, and access the realm specific encryption keys without additional user input. By storing just these values, an implementation ensures a user’s plain text password is still REQUIRED to alter account credentials. This allows a user to recover from an endpoint compromise by updating their password, allowing for a point in time recovery.
Client implementations with support for automatic login capabilities on platforms which provide a secure storage facility SHOULD make use of this capability to protect the verification token, and realm hashes.
Required Inputs
The derivation process requires the following inputs:
Optional Inputs
Outputs
Example
The following code, written in Python, demonstrates how to derive the various outputs by calling the example functions provided in subsequent sections:
# Derive the Rounds rounds = RoundsDerivation(password, bonus) # Extract the Seed seed = SeedDerivation(rounds, username, password, salt) # Keys master_key = KeyDerivation(seed, rounds, username, password, \ salt) password_key = KeyDerivation(master_key, rounds, username, \ password, salt) # Tokens verification_token = TokenDerivation(password_key, username, \ salt) ephemeral_login_token = TokenDerivation(verification_token, \ username, salt, nonce) # Derive the Realm Key realm_key = RealmKeyDerivation(master_key, label, shard, salt) # Extract the Cipher and Vector Keys vector_key = RealmVectorKeyExtraction(realm_key) tag_key = RealmTagKeyExtraction(realm_key) cipher_key = RealmCipherKeyExtraction(realm_key) # Encryption and Decryption encrypted_data = RealmEncrypt(vector_key, tag_key, cipher_key, \ secret_message) decrypted_data = RealmDecrypt(vector_key, tag_key, cipher_key, \ encrypted_data)
To improve the security of short passwords, STACIE requires client implementations to calculate the appropriate number of iterations, or “rounds” used for string concatenation during the seed stage and the number hash rounds REQUIRED during the key derivation stages. The rounds variable is based on the number of characters, with short passwords requiring more rounds than long passwords. The variable number of rounds was designed to make systematically checking all of the possible plain text inputs more expensive in the event any of the derived tokens are compromised. It does not inherently provide security for predictable passwords which might be easily guessed.
To ensure the formula used to calculate the number of rounds, and the required processing remains effective against brute force attacks in the future, a fixed number of “bonus” rounds MAY be added beyond what is required. The number of bonus rounds is dictated by the server configuration and MUST be added to the number calculated based on length. The bonus variable is primarily intended to offset improvements in computer performance in the future, for implementations which rely on hash algorithm after they’ve been deprecated.
When calculating the number of dynamic hash rounds clients MUST first determine the number of Unicode “characters” in a password, which is distinct from the number of octets. Many character encodings, such as UTF-8 use a variable number of octets per character, and the number of octets MAY change based on the input method editor. For consistency, the password MUST be converted into the UTF-8 encoding, and the number of Unicode characters determined. Because UTF-8 is capable of representing the same hashed characters using multiple octets, and using different binary values based on the normalization form, it is critical that the length used for this calculation is always based on the number of Unicode characters. This will ensure the number of rounds remains deterministic.
To determine the number of rounds, a client MUST subtract the number of Unicode characters from the constant value 24. If the result is negative, the value 1 MUST be used. The result of this calculation is used as a “dynamic” exponent, which is raised using the base 2, and the result is the “variable” number of rounds. The “bonus” rounds MUST be added to the “variable” number to derive the total number of rounds.
If the combined value of the dynamic and bonus values is less than 8, the value 8 MUST be used. Alternatively, if the value exceeds 16,777,216 the value MUST be reduced to this maximum value. The maximum value corresponds to the limit imposed by the use of the 3 octet counter employed during the entropy extraction and key derivation stages.
Token derivation employs a fixed, 8 rounds, to avoid leaking information about the password length.
Example
The following Python code demonstrates the proper method for deriving the number of rounds:
def RoundsDerivation(password, bonus): # Accepts a user password and bonus value, and calculates # the number of iterative rounds required. This function will # always return a value between 8 and 16,777,216. # Identify the number of Unicode characters. characters = len(password.decode("utf-8")) # Calculate the difficulty exponent by subtracting 1 # for each Unicode character in a password. dynamic = operator.sub(24, characters) # Use a minimum exponent value of 1 for passwords # equal to, or greater than, 24 characters. dynamic = max(1, dynamic) # Derive the variable number of rounds based on the length. # Raise 2 using the dynamic exponent determined above. variable = pow(2, dynamic) # If applicable, add the fixed number of bonus rounds. total = operator.add(variable, bonus) # If the value of rounds is smaller than 8, reset # the value to 8. total = max(8, total) # If the value of rounds is larger than 16,777,216, reset # the value to 16,777,216. total = min(pow(2, 24), total) return total
STACIE starts by deriving a fixed-length pseudorandom seed value which is “extracted” by “concentrating” the low-entropy user password into a short, but cryptographically strong pseudorandom value. Future extensions which incorporate a second authentication source that results in a quality pseudorandom value for the seed value may find this stage unnecessary.
Unlike the key and token derivation stages, the entropy extraction stage uses the Hashed Message Authentication Code [HMAC] algorithm, which is also defined by National Institute of Standards and Technology (NIST) as a Federal Information Processing Standard (FIPS) [HMAC-FIPS]. Test vectors based on SHA2-512 are available [HMAC-SHA].
Implementations supporting the OPTIONAL SHA3-512 or Skein-512 hash functions MUST use an HMAC implementation bsaed on the appropriate SHA3-512 or Skein-512. Implementations SHOULD NOT use the Skein-MAC alternative described by the Skein paper [SKEIN]. Future STACIE extensions MAY provide alternative methods for seed extraction.
Unlike a simple hash, HMAC requires a 128 octet key value. The key value for the entropy extraction stage is derived from the salt value. If no salt value is available the username MUST be hashed and used as a substitute for the salt value. If the provided salt value is precisely 128 octets, then it MUST be used as the HMAC key.
When the provided salt is not 128 octets, then a key MUST be derived using an appropriate hash function, which provides a 128 octet value by digesting the salt value concatenated together with a counter variable. The process is performed twice, with the counter variable set to the values 0 and 1, respectively. The counter is digested as a 3 octet big endian integer value. The two hash digest output values MUST be concatenated to form the 128 octet HMAC key value.
The HMAC primitive also requires a “message” which is created using the plain text password, which MUST be provided to the HMAC primitive repeatedly, with the precise number of repetitions dictated by the “rounds” variable. The digest produced by the HMAC function becomes the 64 octet seed value used for the master key derivation stage.
Example
The following Python code demonstrates the proper method for extracting the entropy seed value:
def SeedDerivation(rounds, username, password, salt=None): # Concentrates and then extracts the random entropy provided # by the password into a seed value for the first hash stage. # If if an explicit salt value is missing, use a hash of # the username as if it were the salt. if salt is None: salt = SHA512.new(username).digest() # Confirm the supplied salt meets the minimum length of 64 # octets required, is aligned to a 32 octet boundary and does not # exceed 1,024 octets. Some implementations may not handle salt # values longer than 1,024 octets properly. elif len(salt) < 64: raise ValueError("The salt, if supplied, must be at least " \ "64 octets in length.") elif operator.mod(len(salt), 32) != 0: warnings.warn("The salt, if longer than 64 octets, should " \ "be aligned to a 32 octet boundary.") elif len(salt) > 1024: warnings.warn("The salt should not exceed 1,024 octets.") # For salt values which don't match the 128 octets required for # an HMAC key value, the salt is hashed twice using a 3 octet # counter value of 0 and 1, and the outputs are concatenated. if len(salt) != 128: key = \ SHA512.new(salt + struct.pack('>I', 0)[1:4]).digest() + \ SHA512.new(salt + struct.pack('>I', 1)[1:4]).digest() # If the supplied salt is 128 octets use it directly as the # key value. else: key = salt # Initialize the HMAC instance using the key created above. hmac = HMAC(key, None, SHA512) # Repeat the plain text password successively based on # the number of instances specified by the rounds variable. for unused in range(0, rounds): hmac.update(password) # Create the 64 octet seed value. seed = hmac.digest() return seed
There are two successive key derivation stages. The master key is first, and requires the extracted seed value derived in the previous stage, along with the calculated number of rounds, the username, password, and if available, the salt value. The master key MUST be kept private. It provides the secret material needed to derive the realm specific subkeys used to encrypt data on the client.
The second key derivation stage provides the password key. It uses an identical process as the master key stage, with the exception of the seed value being replaced by the master key value derived in the first stage. The password key MUST be kept private until it comes time for a user to update their password. Password updates require sharing the password key with a server, which can then confirm the value translates into the current verification token, before updating the values stored in the authentication database. This ensures a that a compromised authentication database can’t be used by an attacker to alter user passwords.
Each key derivation stage repeats the hash process by the variable number of iterations dictated by the rounds variable. Assuming the hash function remains securely one-way, this strategy ensures key derivation requires a linear computational process. The amount of processing time is a product of the difficulty imposed by the rounds variable and a client’s computational performance. The linear nature of the process means the time required for individual rounds MAY be shortened but the rounds MUST NOT be processed in parallel.
Hash values are generated by concatenating the input seed (or master key value) together with the with the username, salt, password and counter value. Successive rounds repeat the process, using an incremented counter value, and include the output of the previous round prepended to the input. The counter value MUST be digested as a 3 octet big endian integer value, and represents a 0 based value corresponding to the current round.
Example
The following Python code demonstrates the proper method for key derivation, with the seed value either the extracted seed, or the master key, depending on the stage:
def KeyDerivation(seed, rounds, username, password, salt=""): # Hash the input values together using the input values, and # repeat the process, with the number of iterations dictated by # the rounds variable. count = 0 hashed = "" while count < rounds: hashed = SHA512.new(hashed + seed + username + salt + \ password + struct.pack('>I', count)[1:4]).digest() count = operator.add(count, 1) # The last digest output is returned as the key value. return hashed
The token derivation process is distinct from the key derivation process because it is repeatable without knowing a user’s password. The password key is combined with other inputs to derive the verification token, and the verification token is then shared with the server, which can use it to authenticate future login attempts. To prevent replay attacks, the verification token is combined with a nonce value, and using the same token derivation process, a unique ephemeral login token is generated for each session or connection.
Like the key derivation stages defined above, the seed value in the sample code below represents the output from the previous stage, which is either the password key or the verification token. This value is concatenated together with the salt value, if applicable, and a nonce value (when deriving the ephemeral token). A counter value is also appended, with the value representing a 3 octet big endian integer value, and corresponding to a 0 based count of the current round. The output for each round is prepended to the input of successive rounds, with a fixed 8 rounds performed during each token derivation stage.
__Example__hashed
The following Python code demonstrates the proper method for token derivation, with the seed value either the password key, or the verificiation token, depending on the stage:
def TokenDerivation(seed, username, salt="", nonce=""): # Hash the input values together using the input values, and # repeat the process eight times. count = 0 rounds = 8 hashed = "" # Confirm the nonce, if it was provided, meets the minimum # length of 64 octets, does not exceed 1,024 octets, and is # aligned along a 32 octet boundary. Implementations may not # handle nonce values larger than 1,024 octets properly. if len(nonce) > 0 and len(nonce) < 64: raise ValueError("Nonce values must be at least " \ "64 octets in length.") elif operator.mod(len(nonce), 32) != 0: warnings.warn("The nonce value, if longer than 64 octets, " \ "should be aligned to a 32 octet boundary.") elif len(nonce) > 1024: warnings.warn("The nonce should not exceed 1,024 octets.") while count < rounds: hashed = SHA512.new(hashed + seed + username + salt + \ nonce + struct.pack('>I', count)[1:4]).digest() count = operator.add(count, 1) return hashed
Realm specific keys are used to access and authenticate symmetrically encrypted user data. The realm label specifies the category and/or type of data protected by a given realm key. Protocols which incorporate STACIE MAY use a single realm, or separate data into different realms based on the data type. Every realm is protected by a unique encryption key. The realms are isolated to allow separable handling, and isolation, such that if one realm key is compromised, it is possible for the remaining realms to remain secure, provided the master key was not compromised, or the attacker is unable to gain access to the shard values for other realms.
The shard value is a randomly generated string of 64 octets, provided after successful authentication, which allows a client to derive a realm key. Because the shard is stored on the server, an endpoint compromise won’t yield the necessary information to decrypt any locally stored data, after the user updates their credentials. This will mitigate the damage that would occur when a device with cached data is lost or stolen.
The unique key for a realm is derived by concatenating, then hashing the master key, realm label, and salt. The resulting digest is then combined with a realm shard value using the bitwise exclusive “or” operation. The result is a “realm key” which contains the concatenated vector key, tag key, and cipher key values. The vector key is comprised of the first 16 octets, the tag key is protected by the subsequent 16 octets, and the cipher key is comprised of the final 32 octets.
Required Inputs
The master key, as previously described, is combined with the following required inputs:
The salt is only required if a salt value was used to derive the master key:
Outputs
Example
The following Python code demonstrates how to derive and then separate the keys for a given realm:
def RealmKeyDerivation(master_key, label="", shard="", salt=""): if len(label) < 1: raise ValueError("The realm label is missing or invalid.") elif len(shard) != 64: raise ValueError("The shard length is not 64 octets.") elif len(master_key) != 64: raise ValueError("The master key length is not 64 octets.") # The salt value is optional, but if supplied, must be a minimum # of 64 octets in length, and no more than 1,024 octets in # length. It should be aligned to a 32 octet boundary. Some # implementations may not handle salt values longer than 1,024 # octets properly. elif len(salt) != 0 and len(salt) < 64: raise ValueError("The salt, if supplied, must be at least " \ "64 octets in length.") elif len(salt) != 0 and operator.mod(len(salt), 32) != 0: warnings.warn("The salt, if longer than 64 octets, should " \ "be aligned to a 32 octet boundary.") elif len(salt) > 1024: warnings.warn("The salt should not exceed 1,024 octets." realm_hash = SHA512.new(master_key + label + salt).digest() realm_key = str().join(chr(operator.xor(ord(a), ord(b))) \ for a,b in zip(realm_hash, shard)) return realm_key def RealmVectorKeyExtraction(realm_key): vector_key = realm_key[0:16] return vector_key def RealmTagKeyExtraction(realm_key): tag_key = realm_key[16:32] return tag_key def RealmCipherKeyExtraction(realm_key): cipher_key = realm_key[32:64] return cipher_key
STACIE requires client implementations to support the Advanced Encryption Standard [AES] using 256 bit key values. To ensure data integrity, and protect against manipulation by a malicious server, AES MUST be employed using the Galois Counter Mode [GCM]. The binary format specifies a 34 octet envelope, followed by a payload aligned to a 16 octet boundary. The payload includes a 4 octet prefix, and a variable amount of padding appended as a suffix for alignment purposes.
Symmetrically encrypted buffers are preceeded by an envelope, consisting of the realm serial number, the initialization vector shard, and the authentication tag shard. The serial number is a 2 octet big endian integer corresponding to the realm key used to derive the key values associated with a given buffer. It is possible for a realm to have buffers encrypted using different serial numbers. The number MAY be increased when users update their password. The serial number is followed by a 16 octet initialization vector shard, which MUST be randomly generated whenever data is encrypted. The vector shard is combined with the vector key using a bitwise exclusive “or” operation to produce the initialization vector used for a given cipher text. The final envelope value is a 16 octet tag shard, which like the vector shard, MUST be combined with the tag key using a bitwise exclusive “or” operation to produce the authentication tag for a given cipher text.
Envelope Parameters
The envelope data is immediately followed by the encrypted payload, which consists of the encrypted plain text value, a 4 octet prefix, and up to 255 octets of padding appended after the plain text. The entire encrypted/decrypted payload, including the prefix and suffix, MUST align to a 16 octet boundary. The prefix begins with a 3 octet big endian integer which denotes the length of the plain text value, and is is followed by a single octet pad value. The pad value indicates how many additional octets have been appended to the plain text value t0 align the payload to the 16 octet boundary. The amount of padding MUST include the requisite 0 to 15 octets required to align the payload, but MAY also include a random amount of OPTIONAL padding in 16 octet increments. Specifically, the pad value MAY include an additional 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 178, 192, 208, 224, or 240 octets beyond those required for alignment. The padding octets appended after the plain text value, or suffix, MUST match the value of the padding octet in the prefix.
Example
The following Python code demonstrates how to encrypt a plain text value:
def RealmEncrypt(vector_key, tag_key, cipher_key, buffer, serial=0): count = 0 if serial < 0 or serial >= pow(2, 16): raise ValueError("Serial numbers must be greater than 0 " \ "and less than 65,536.") elif len(cipher_key) != 32: raise ValueError("The encryption key must be 32 octets " \ "in length.") elif len(vector_key) != 16: raise ValueError("The vector key must be 16 octets in " \ "length.") elif len(buffer) == 0: raise ValueError("The secret being encrypted must be at " \ "least 1 octet in length.") elif len(buffer) >= pow(2, 24): raise ValueError("The secret being encrypted must be at " \ "less than 16,777,216 in length.") vector_shard = get_random_bytes(16) iv = str().join(chr(operator.xor(ord(a), ord(b))) \ for a,b in zip(vector_key, vector_shard)) size = len(buffer) pad = (16 - operator.mod(size + 4, 16)) while count < pad: buffer += struct.pack(">I", pad)[3:4] count = operator.add(count, 1) encryptor = Cipher(algorithms.AES(cipher_key), modes.GCM(iv), \ backend=default_backend()).encryptor() ciphertext = encryptor.update(struct.pack(">I", size)[1:4] \ + struct.pack(">I", pad)[3:4] + buffer) \ + encryptor.finalize() tag_shard = str().join(chr(operator.xor(ord(a), ord(b))) \ for a,b in zip(tag_key, encryptor.tag)) return struct.pack(">H", serial) + vector_shard + tag_shard \ + ciphertext
The following Python code demonstrates how to decrypt and validate the cipher text created by the encryption function above:
def RealmDecrypt(vector_key, tag_key, cipher_key, buffer): count = 0 # Sanity check the input values. if len(cipher_key) != 32: raise ValueError("The encryption key must be 32 octets in "\ " length.") elif len(tag_key) != 16: raise ValueError("The tag key must be 16 octets in length.") elif len(vector_key) != 16: raise ValueError("The vector key must be 16 octets in " \ "length.") elif len(buffer) < 54: raise ValueError("The minimum length of a correctly " \ "formatted cipher text is 54 octets.") elif operator.mod(len(buffer) - 34, 16) != 0: raise ValueError("The cipher text was not aligned to " \ "a 16 octet boundary or some of the data is missing.") # Parse the envelope. vector_shard = buffer[2:18] tag_shard = buffer[18:34] ciphertext = buffer[34:] # Combine the shard and key values to get the iv and tag. iv = str().join(chr(operator.xor(ord(a), ord(b))) \ for a,b in zip(vector_key, vector_shard)) tag = str().join(chr(operator.xor(ord(a), ord(b))) \ for a,b in zip(tag_key, tag_shard)) # Decrypt the payload. decryptor = Cipher(algorithms.AES(cipher_key), \ modes.GCM(iv, tag), backend=default_backend()).decryptor() plaintext = decryptor.update(ciphertext) + decryptor.finalize() # Parse the prefix. size = struct.unpack(">I", '\x00' + plaintext[0:3])[0] pad = struct.unpack(">I", '\x00' + '\x00' + '\x00' + \ plaintext[3:4])[0] # Validate the prefix values. if operator.mod(size + pad + 4, 16) != 0 or \ len(plaintext) != size + pad + 4: raise ValueError("The encrypted buffer is invalid.") # Confirm the suffix values. for offset in xrange(size + 4, size + pad + 4, 1): if struct.unpack(">I", '\x00' + '\x00' + '\x00' + \ plaintext[offset: offset + 1])[0] != pad: raise ValueError("The encrypted buffer contained " \ an invalid padding value.") # Return just the plain text value. return plaintext[4:size + 4]
Required Inputs
The derivation process requires the following inputs:
Outputs
Example
The following code, written in Python, demonstrates how to derive a new realm shard value during password changes:
def RealmShardRotation(new_master_key, new_salt, realm_key, label): if len(new_master_key) != 64: raise ValueError("The master key is not 64 octets.") elif len(new_salt) < 1: raise ValueError("The salt is missing or invalid.") elif len(realm_key) != 64: raise ValueError("The previous realm key is not 64 octets.") elif len(label) < 1: raise ValueError("The realm label is missing or invalid.") realm_hash = SHA512.new(new_master_key + label + new_salt).digest() realm_shard = str().join(chr(operator.xor(ord(a), ord(b))) \ for a,b in zip(realm_hash, realm_shard)) return realm_shard
When the birds mate with the bees a new account is born.
{ register: { username: "user-alias@example.tld" } } { recruit: { username: "user-alias@example.tld", salt: "Wb4vfzSpBpDRKafDlhhba3KhjIh09_4-IAl22XOcaI2z9O0QNdvNxFiRBM qsyr4yD90OmDxBckHJzijGF7d1PEsrGwlGEb9YCVpNvKiIgLeAPxz1OB7mn03wL RCfzYA8Ab8kvkinoZjHVnr6Fd34RS6bYB-mBB5WX2iQ-TBKZlE", bonus: "131072", hash: "sha2" } } { error: "Registration is currently disabled." } { error: "The requested username is unavailable." } { error: "A dramatic increase in cosmic radiation means registration is temporarily unavailable." } { enroll: { username: "user-alias@example.tld", salt: "Wb4vfzSpBpDRKafDlhhba3KhjIh09_4-IAl22XOcaI2z9O0QNdvNxFiRBM qsyr4yD90OmDxBckHJzijGF7d1PEsrGwlGEb9YCVpNvKiIgLeAPxz1OB7mn03wL RCfzYA8Ab8kvkinoZjHVnr6Fd34RS6bYB-mBB5WX2iQ-TBKZlE", verification-token: "egf9dS64Z5b5qmrW4JYT86iNxDwHM5PvLF7DkyufIUwX 2bAZ8p7iDcHNLVbT53_zZUMWgxWIxAxmWw6d8nAv9Q" } }
The login process begins by submitting a “login” request with the response providing an array of method objects each with the parameters REQUIRED to compute the secret values needed for key derivation and the tokens used for authentication. This includes the password object which provides the nonce value REQUIRED to generate the ephemeral login token used to validate the session or connection.
A login request supplies a single username parameter, which is REQUIRED, and ensures equivalent inputs always provide a common, deterministic outcome.
Required Parameters
Example
{ login: { username: "user-alias@example.tld" } }
The response provides an array of method objects corresponding to different authentication mechanisms along with any requisite parameters. A disposition attribute indicates whether a particular method is OPTIONAL or REQUIRED. Currently, STACIE only provides details for key derivation using passwords. Future specifications MAY extend this scheme to support common alternate, or additional methods, including second factor mechanisms, which is indicated by the presence of multiple method objects marked as REQUIRED.
If a user or site specific salt value is available, it MUST be returned in the password object. The salt provides a non-secret random value which ensures independence between different uses of the same password at different points in time. The salt value is particularly important for sites with a policy of stripping the domain portion off usernames, as a unique salt will ensure independence between accounts with an identical username and password, but residing on different systems.
The singular method defined by this specification is the password mechanism, which provides an object containing the following parameters specified below.
Required Parameters
Optional Parameters
Example
{ methods: [ password: { username: "user@example.tld", salt: "lyrtpzN8cBRZvsiHX6y4j-pJOjIyJeuw5aVXzrItw1G4EOa-6CA4R9Bh VpinkeH0UeXyOeTisHR3Ik3yuOhxbWPyesMJvfp0IBtx0f0uorb8wPnhw5BxD JVCb1TOSE50PFKGBFMkc63Koa7vMDj-WEoDj2X0kkTtlW6cUvF8i-M", nonce: "oDdYAHOsiX7Nl2qTwT18onW0hZdeTO3ebxzZp6nXMTo__0_vr_AsmAm 3vYRwWtSCPJz0sA2o66uhNm6YenOGz0NkHcSAVgQhKdEBf_BTYkyULDuw2fSk bO7mlnxEhxqrJEc27ZVam6ogYABfHZjgVUTAi_SICyKAN7KOMuImL2g", bonus: "131072", hash: "sha2", cipher: "aes", disposition: "required" } ] }
The process for a password based authentication concludes by submitting an “authenticate” request with an ephemeral login token. The response provides a keys array, with objects corresponding to the various realm specific keys specific to the protocol. These values are combined with the master key to derive the symmetric keys for the various realms used to encrypt data on a client.
The authenticate object is submitted to a server for validation.
Required Parameters
Example
{ authenticate: { username: "user@example.tld", nonce: "oDdYAHOsiX7Nl2qTwT18onW0hZdeTO3ebxzZp6nXMTo__0_vr_AsmAm 3vYRwWtSCPJz0sA2o66uhNm6YenOGz0NkHcSAVgQhKdEBf_BTYkyULDuw2fSk bO7mlnxEhxqrJEc27ZVam6ogYABfHZjgVUTAi_SICyKAN7KOMuImL2g", token: "-Eu5mUcA7ko2BysV965hrf9bvMlh_S_iiI3tfMr0Qc7hf4oPmBCdGOU 9VCeQ1qBrga-WyR-rko5l0-feoWuuuA" } }
If the authentication attempt was successful the server will return an array of realm shards.
Required Parameters
Example
{ realms: [ { index: "1", label: "mail", shard: "gD65Kdeda1hB2Q6gdZl0fetGg2viLXWG0vmKN4HxE3Jp3Z0Gkt5prqS mcuY2o8t24iGSCOnFDpP71c3xl9SX9Q", } ] }
However, if the authentication request is unsuccessful and the server is willing to allow the client another attempt, it will return a login response with a unique nonce value. A nonce value MUST only be used once regardless of whether the attempt is successful. The following example only contains the required parameters.
Example
{ methods: [ password: { username: "user@example.tld", salt: "lyrtpzN8cBRZvsiHX6y4j-pJOjIyJeuw5aVXzrItw1G4EOa-6CA4R9Bh VpinkeH0UeXyOeTisHR3Ik3yuOhxbWPyesMJvfp0IBtx0f0uorb8wPnhw5BxD JVCb1TOSE50PFKGBFMkc63Koa7vMDj-WEoDj2X0kkTtlW6cUvF8i-M", nonce: "vQmxYp9sznZJ1M62AxSGe3cQgMqTmVw92E1qfNR_Fl_u2zVFEiyV5dV 2abGEhsWPDkHsxtJGj-NTEF1vet1mlgfD67mQO1IPG7RfxPmEAJwAWGWkbgPG kQI2tpfAs5LqQai-Any3I95Kq-eTPIP8ykQYXKW8qO-DJCw5SmmCrJs" } ] }
Or if the server does not want to allow any further attempts to access the account, it MAY also return an error message.
{ error: "The authentication attempt failed." }
Update the verification token, and salt values on the server. Note the salt value is only updated if user specific salt values are being used. Alter any existing realm specific shard values, and if required add new randomly generated realm specific shard values.
Fetch the realm shard values. The result MAY be request a specific realm, and serial number.
Add a shard, for a given realm, to the account using the next available serial number.
Client and server implementations SHOULD follow the recommendations provided here to avoid leakage, and improve difficulty.
Username Enumeration
To avoid enumeration and avoid leaking the list of valid user accounts, servers SHOULD respond to authenticate requests with valid and invalid usernames in the same fashion. Because salt values are typically unavailable in this situation, servers SHOULD normalize and return the username along with a dynamically derived salt value generated by combining the username with a site specific value. This will ensure a consistent salt value is returned on subsequent requests for the same invalid username. Servers MAY choose to return an error if the username contains invalid characters, or was provided with an unrecognized domain name.
Salt Values
To ensure STACIE provides the maximum amount of protection, implementations SHOULD generate unique, random salt values for every user, and then rotate the salt value every time the password is updated. This will ensure independence between common inputs, and strengthen the security analysis underpinning the design [HKDF].
Side Channels
A properly implemented client SHOULD ensure it’s impossible for an attacker to correlate the duration between client request/responses with the plain text password length. Several mitigation strategies are possible, including submitting authentication requests independently of when users input their password. Adding random delays between hash rounds, which are independent of system load and processor speed, or using a constant duration for password processing independent length, are also possible. Clients MAY round any artificial processing delays to aligned boundaries, which would also make correlation more difficult.
Transport Security
STACIE implementations MUST support TLS using a ciphersuite capable of protecting against network eavesdroppers, data tampering and ensure the confidentiality of messages. Protocols incorporating STACIE as a component MUST provide recommendations sensitive to their intended context, but SHOULD encourage the use of TLS version 1.2, or later, and limit implementations to ciphersuites capable of providing perfect forward secrecy. Server deployments SHOULD ensure they provide valid TLS certificates, and client implementations SHOULD ensure they properly validate server certificates using the procedures described in RFC 6125 [TLS-PKIX] or optionally, using the procedures described in RFC 6698 [TLS-DANE].
As of this writing, the RECOMMENDED ciphersuite is TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, identified by the octet values {0xC0, 0x30}, or the equivalent ECDSA variant, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, which is identified by the octet values {0xC0,0x2C}. [TLS-GCM]
Specific requirements and recommendations will need to be updated over time, based on what is widely deployed, and MAY need altering based on future vulnerability discoveries. To obtain contemporary guidance, or find additional recommendations, implementers and system operators SHOULD consult the Recommendations for Secure Use of TLS and DTLS [TLS-UTA].
This document has no actions for IANA.
The preceding document was excreted with the assistance of a diarrhoetic. As such, feedback is both welcome, and encouraged.
The genesis for STACIE was the authentication and key derivation method used by Lavabit LLC to authenticate client connections and protect the user specific private keys. Improvements were made while adapting the original server based scheme to operate on clients being developed for the Privacy Respecting Internet Mail Environment (PRIME). The author would also like to acknowledge and thank the One Password Protocol [ONEPW] developed for Firefox Sync and the HKDF [HKDF] specification for inspiring some of the improvements incorporated into STACIE.
The improvements were all focused on providing operational flexibility, extensibility, while improving the security characteristics of short, relatively simple passwords commonly chosen by bipedal hominids. Acknowledgment must also be given to the large online services which allowed their password databases to be publicly scrutinized. Analysis of these databases proved invaluable while selecting the constants used by STACIE, and allowed the author to see how variations effected the dynamic difficulty level for a random sampling of real passwords.
The goal for STACIE was to ensure it provided sufficient resistance against brute force attacks for the vast majority of passwords which will inevitably be used. Admittedly the term “sufficient resistance” is very subjective, and is constantly being shifted by advances in technology. Thanks should be given to the critics. Their complaints led to a modular hash algorithm, and the strategy of combining a dynamically calculated difficulty with a policy based bonus. Hopefully these decisions will ensure the survival of users with short password who inevitably get stuck on the long tail. STACIE is not a substitute for long, truly random, and incredibly complex passwords used by any evolved hominids capable of remembering them.
The author would also like to thank Stacie for inspiring the name. Her resistance to having a computer bear her name, inevitably, led to something far better.
This appendix provides test vectors. Binary values are provided using the base64url encoding, with line breaks added as necessary.
# User Inputs password = "password" username = "user@example.tld" # Server Inputs bonus = 131072 salt = "lyrtpzN8cBRZvsiHX6y4j-pJOjIyJeuw5aVXzrItw1G4EOa-6CA4R" \ "9BhVpinkeH0UeXyOeTisHR3Ik3yuOhxbWPyesMJvfp0IBtx0f0uorb8w" \ "Pnhw5BxDJVCb1TOSE50PFKGBFMkc63Koa7vMDj-WEoDj2X0kkTtlW6cU" \ "vF8i-M" nonce = "oDdYAHOsiX7Nl2qTwT18onW0hZdeTO3ebxzZp6nXMTo__0_vr_" \ "AsmAm3vYRwWtSCPJz0sA2o66uhNm6YenOGz0NkHcSAVgQhKdEBf_BT" \ "YkyULDuw2fSkbO7mlnxEhxqrJEc27ZVam6ogYABfHZjgVUTAi_SICy" \ "KAN7KOMuImL2g" # Realm Inputs realm = "mail" shard = "gD65Kdeda1hB2Q6gdZl0fetGg2viLXWG0vmKN4HxE3Jp3Z" \ "0Gkt5prqSmcuY2o8t24iGSCOnFDpP71c3xl9SX9Q" # Encrypted Data encrypted_data = "AACS5PQoBg4ON1Xt6aUSddMxTTIKGdbGSelUkIbUkUj" \ "prZv9ekAwPRrJOUqJqWGhdgEvCzSkZwr-kvNZo6f2IW1a
rounds = 196608 seed = "5f-3mTGTSf-sFPfMkGqHTyydDjJU-cqahwDmHWyh6DLQ2oLBlz3ht" \ "PTZS6V-TYVBiwJxuTYmQv3fCZN3Fb8brg" master_key = "SDt67ZfTr8c1KO1Ym6BI69i7TQNNq5J2irym6gPQlEo0MGc" \ "5x-b43bi1uXJDF4rhJJvfl9NFBQkDQ_X_2n66RA" password_key = "lYmvC3qutKIb6QrnxnTi_WuJR_PSiyMZ0CdH18DAxHIgw" \ "jj0_e4W6X8bKckKNGugWMMXmNgXDYb_7LlvtfN3HQ" verification_token = "-Eu5mUcA7ko2BysV965hrf9bvMlh_S_iiI3tfMr" \ "0Qc7hf4oPmBCdGOU9VCeQ1qBrga-WyR-rko5l0-feoWuuuA" ephemeral_login_token = "8YEH_6kBdAdR5vlBaxs3KR3pZ429bEzF3AVF" \ "hkA0P2WPt2h94omJq-d8NhX0rNLBESn2yTu_z0ugJcSVLyz5iQ" realm_key = "v53LS2JFjE-ErqJ2UWTe0O-dYxtYMUQzevxXczVVkQzcRPSS" \ "4sdBHPaKBniqxxr7SWaQR3moXN2tzJJhJ_p5Dw" tag_key = "751jG1gxRDN6_FdzNVWRDA" vector_key = "v53LS2JFjE-ErqJ2UWTe0A" cipher_key = "3ET0kuLHQRz2igZ4qsca-0lmkEd5qFzdrcySYSf6eQ8" decrypted_data = "Attack at dawn!"