RE: Secdir last call review of draft-ietf-dots-signal-channel-30

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please see inline 

> -----Original Message-----
> From: Dots <dots-bounces@xxxxxxxx> On Behalf Of
> mohamed.boucadair@xxxxxxxxxx
> Sent: Thursday, March 14, 2019 9:47 PM
> To: Stephen Farrell <stephen.farrell@xxxxxxxxx>; secdir@xxxxxxxx
> Cc: draft-ietf-dots-signal-channel.all@xxxxxxxx; ietf@xxxxxxxx; dots@xxxxxxxx
> Subject: Re: [Dots] Secdir last call review of draft-ietf-dots-signal-channel-30
> 
> This email originated from outside of the organization. Do not click links or
> open attachments unless you recognize the sender and know the content is
> safe.
> 
> Hi Stephen,
> 
> Thank you for the review.
> 
> Please see inline.
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : Stephen Farrell via Datatracker [mailto:noreply@xxxxxxxx] Envoyé
> > : jeudi 14 mars 2019 16:34 À : secdir@xxxxxxxx Cc :
> > draft-ietf-dots-signal-channel.all@xxxxxxxx; ietf@xxxxxxxx;
> > dots@xxxxxxxx Objet : Secdir last call review of
> > draft-ietf-dots-signal-channel-30
> >
> > Reviewer: Stephen Farrell
> > Review result: Has Issues
> >
> >
> > I think there's one issue with this draft that'd be well worth
> > discussion and/or fixing:
> >
> > - p12: Why does the cuid need to be so static? I would have thought
> > that an identifier that can change more often than a key pair would
> > have been better, esp if this could be used in a CPE. (Creating a new
> > long-lived identifier for a CPE seems like a bad plan if it's not
> > really needed.) For example, one could use both the SPKI and a
> > timestamp as input for a recommended way to generate a cuid and that
> > should be as unique, but much more easily changed.  That could also
> > mitigate the possible TLS1.2 client-cert snooping issue mentioned on
> > p90.
> 
> [Med] cuid is used for avoidance detection but also as a stable key to
> identify resources at the server side. Any change of the cuid will lead to a
> failure in accessing the resources.
> Furthermore, this identifier is used to "glue" the signal and data channels.
> 
> The spec does not forbid the clients to change its cuid, but to do so, the
> client will need to manage state migration.
> 
> >
> > nits:
> >
> > - (Not really a nit, but probably too much to ask, so...) The protocol
> > here seems very complex. Has anyone tried to prove anything about the
> > state machine, e.g.
> > that's it's safe in some senses? It'd be fair to say that that is a
> > good task to do after the initial RFC is published in this case, I
> > guess.  OTOH, could be some of the theorem-proving tools used in the
> > development of
> > TLS1.3 could be useful here. (And those tools usually do turn up some
> > issues worth fixing - I'd bet a beer they would in this case:-)
> 
> [Med] The specification was edited following an incremental approach in
> which new pieces are validated through at least two interoperable
> implementations. We hope that more feedback will be received after the
> initial RFC.
> 
> >
> > - p18: "Only single-valued 'cdid' are defined in this document." That
> > confused me given the text 3 paras before about multiple cdid values.
> > Maybe clarifying that some could be useful?
> 
> [Med] What is meant here is the case where multiple GWs are involved in
> the path; each inserts a cdid value.

'cdid' is only inserted by the server-domain DOTS gateway. Figure 8 needs to be corrected, 'cuid' is missing in the Figure.

Cheers,
-Tiru

> 
> Will clarify the text.
> 
> >
> > - p77 has a few lowercase "should" and "must" statements.
> > Not sure if that's on purpose or by accident.
> 
> [Med] I confirm it was on purpose. These are not new requirements (see
> Section 7.2).
> 
> >
> > - p90: Is the mention of TCP-AO there for real? I'd be happy it it
> > were but if it's merely aspirational and you don't think it'll be
> > used, it'd be better to not pretend it might get used.
> >
> 
> [Med] We are providing an example of how the issue can be solved. That is
> fine, IMO.
> 
> > - Couldn't a bad actor in control of an authorised DOTS client
> > colluding with the controller of a DDoS attack use this to probe the
> > system to see how their attack is going and change the attack to be
> > more effective?
> 
> [Med] The client will only see the reports for attacks it detected and signaled.
> That bad actor won't signal the attack in the first place!
> 
>   I don't
> > think any protocol change could help there, but perhaps you could give
> > some guidance to implementers to try catch such cases (e.g., if the
> > probing DOTS client's local n/w doesn't actually appear to be under
> > attack).
> >
> 
> _______________________________________________
> Dots mailing list
> Dots@xxxxxxxx
> https://www.ietf.org/mailman/listinfo/dots




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux