Re: Secdir Review of draft-stjohns-sipso-05

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>>>>> "Steven" == Steven M Bellovin <smb@xxxxxxxxxxxxxxx> writes:

    Steven> On Mon, 29 Sep 2008 15:20:23 -0400
    Steven> Sam Hartman <hartmans-ietf@xxxxxxx> wrote:

 
    >> Section 8 proposes that AH is the mandatory-to-implement
    >> security mechanism for this option.  Do we still believe that
    >> is appropriate given RFC 4301's move away from AH as a
    >> mandatory-to-implement service?

    Steven> As discussed way back when, when we'd agreed on what
    Steven> became 2401 et seq., the IETF preferred that security
    Steven> labels be part of the credential, and hence implicit in
    Steven> the security association, rather than being part of the
    Steven> IPsec header.  Now -- here, the use of IPsec is to protect
    Steven> the security label, rather than the data -- but does it
    Steven> actually do that in any useful way?  If the security
    Steven> option is really end-to-end, we don't need it, per the
    Steven> above.  If it's hop-by-hop -- and it's using a v6
    Steven> hop-by-hop option -- AH doesn't provide useful protection
    Steven> unless packets are digitally signed rather than MACed.

Doesn't that sort of depend on 
1) who the attackers are
2) who the endpoints of the SA are?

As far as I can tell AH would be fine for hop-by-hop SAs to protect
packets flowing over a link that cannot be trusted to preserve
integrity between two intermediate systems.

You could potentially have both an end-to-end SA and a hop-by-hop SA.
That says that you trust intermediate systems less than you do the endpoints, but somehow you're still trusting them not to disclose traffic.
I'd like to understand the threat model that leads to this better.

However, I agree with you that the draft is broken.  It seems clearly
like it is talking about end-to-end AH, and I agree that doesn't fit
the model well at all without digital signatures.



    >>  As we know, BCP 61 requires a strong mandatory-to-implement
    >> security mechanism for Internet protocols.  That mechanism
    >> needs to be sufficient for use over the open Internet.  We have
    >> been very reluctant to accept weaker security mechanisms
    >> because some standards-track protocol is not intended for use
    >> on the open Internet; BCP 61 says we have consensus that is not
    >> how we do things.  I question whether AH is sufficient as a BCP
    >> 61 mandatory-to-implement mechanism.  The entire point of this
    >> IPV6 option is to limit disclosure of confidential and
    >> classified information.  In order to meet that security
    >> objective on the open Internet, some confidentiality mechanism
    >> is required.  I strongly recommend that if this TS is published
    >> on the standards track,ESP with confidentially be required.

    Steven> I don't agree.  The purpose of AH in this spec is to
    Steven> protect certain information that's in the clear.  (As
    Steven> noted, though, I don't think it does it properly.)
    Steven> Protection of the underlying data is the business of a
    Steven> separate layer or sublayer.

I made a number of statements and I'd like to explore our
disagreement.  I'm assuming that we agree about what BCP 61 is trying
to do: it's trying to require that IETF protocols have adequate
security for the open Internet, because networks will get connected.
I seem to recall you buy into that argument:-)

Do you disagree with my assertion that from a overall architecture
view, anyone who implements this mechanism needs confidentiality to
run their packets over the open Internet?

If you agree confidentiality is needed somewhere, how do we get
interoperability if we don't mandate a confidentiality mechanism here?
    >>  The document requires that if there is a label inside and
    >> outside an AH header, that these labels must be the same.  Why
    >> is this a valid use of a 2119 MUST?  What security or
    >> interoperability problem results if for example the outer label
    >> dominates the inner label?  As far as I can tell this
    >> requirement gets in the way of tunneling arbitrary IP traffic.

    Steven> It guards against someone tampering with the outer label,
    Steven> causing the packet to be misrouted perhaps.  
I guess I'm having a hard time seeing why you would have both labels
if they serve the same purpose.  However I think I was misreading the
text.  I thought the text was intended to apply to IP within IP--for
example an inner label in a ip-in-ip tunnel.  If the text is only
intended to apply to two copies of the option at the same IP layer,
then I agree they need to be the same, although I'd also like an
explanation of why you ever do that.


    Steven> Note 7.3.1 on
    Steven> TCP considerations.  (Also note that 7.3.1 disagrees with
    Steven> 793 on the treatment of security labels in section 3.6 of
    Steven> 793.  At the least, this shoudl be noted.

I had completely missed this.  I'll call out the section to the transport ADs

    Steven> 		--Steve Bellovin,
    Steven> http://www.cs.columbia.edu/~smb

_______________________________________________

Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]