RE: Secdir last call review of draft-ietf-dots-signal-channel-30

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Stephen, 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Stephen Farrell [mailto:stephen.farrell@xxxxxxxxx]
> Envoyé : jeudi 14 mars 2019 17:40
> À : BOUCADAIR Mohamed TGI/OLN; secdir@xxxxxxxx
> Cc : draft-ietf-dots-signal-channel.all@xxxxxxxx; ietf@xxxxxxxx;
> dots@xxxxxxxx
> Objet : Re: Secdir last call review of draft-ietf-dots-signal-channel-30
> 
> 
> Hiya,
> 
> Just on two bits below...
> 
> I'm happy to chat more but also fine that you and the ADs can
> sort this out according to however the ADs see this.
> 
> On 14/03/2019 16:17, mohamed.boucadair@xxxxxxxxxx wrote:
> 
> >> I think there's one issue with this draft that'd be well worth
> >> discussion and/or fixing:
> >>
> >> - p12: Why does the cuid need to be so static? I would have thought
> >> that an identifier that can change more often than a key pair would
> >> have been better, esp if this could be used in a CPE. (Creating a
> >> new long-lived identifier for a CPE seems like a bad plan if it's
> >> not really needed.) For example, one could use both the SPKI and a
> >> timestamp as input for a recommended way to generate a cuid and
> >> that should be as unique, but much more easily changed.  That could
> >> also mitigate the possible TLS1.2 client-cert snooping issue
> >> mentioned on p90.
> >
> > [Med] cuid is used for avoidance detection but also as a stable key
> > to identify resources at the server side. Any change of the cuid will
> > lead to a failure in accessing the resources. Furthermore, this
> > identifier is used to "glue" the signal and data channels.
> >
> > The spec does not forbid the clients to change its cuid, but to do
> > so, the client will need to manage state migration.
> 
> Yep, I get that. But the current alg that's described for
> cuid calculation has the effect of creating an identifier
> with the same lifetime as a key pair. Assuming keys are
> harder to change than cuids it seems better to encourage
> clients to not make such a tight linkage between cuid and
> keys, esp. if the client is on a CPE. (And it avoids the
> TLS1.2 snooping issue as noted.)
> 
> I'd encourage you to consider maybe saying some more about
> how clients can change cuid, but even if not, to provide
> a cuid calculation example that doesn't link only to the
> key pair.

[Med] The text already cites RFC 4122 as an alternate scheme. 

Will consider how to enhance the text. Thanks.

> 
> >> - Couldn't a bad actor in control of an authorised DOTS client
> >> colluding with the controller of a DDoS attack use this to probe
> >> the system to see how their attack is going and change the attack
> >> to be more effective?
> >
> > [Med] The client will only see the reports for attacks it detected
> > and signaled. That bad actor won't signal the attack in the first
> > place!
> 
> Perhaps I wasn't clear. ISTM that all clients can get information
> about how an attack is being seen at other clients, isn't that
> right? 

[Med] No. A client can only get information that is bound to it. 

(The spec does talk about that IIRC.) The colluding client
> might or might not be under attack but non-compromised clients will
> presumably ask for the attack to be mitigated. So the colluding
> client could use this protocol to probe and see how well or badly
> the DDoS-mitigation infrastructure is handling an ongoing attack.
> I'm basically saying that that may be noteworthy as a security
> consideration.
> 
> Cheers,
> S.
> 
> 
> >
> > I don't
> >> think any protocol change could help there, but perhaps you could
> >> give some guidance to implementers to try catch such cases (e.g.,
> >> if the probing DOTS client's local n/w doesn't actually appear to
> >> be under attack).
> >>
> >




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux