Daniel Migault wrote:
Hi,
I believe draft-ietf-homenet-front-end-naming-delegation [1] ,
draft-ietf-homenet-naming-architecture-dhc-options [2] have addressed all
comments we received so far. I believe these document are ready.
draft-ietf-homenet-front-end-naming-delegation-02 addresses the renumbering
issue and added significant text in the security considerations section. So,
please have a look these sections.
draft-ietf-homenet-naming-architecture-dhc-options-02.txt. The only changes
from the previous version is the replacement of master/slave by
primary/secondary.
Feel free to provide feed backs!
BR,
Daniel
[1]
https://tools.ietf.org/html/draft-ietf-homenet-front-end-naming-delegation-02
[2]
https://tools.ietf.org/html/draft-ietf-homenet-naming-architecture-dhc-options-02
-----Original Message-----
From: homenet [mailto:[email protected]] On Behalf Of
[email protected]
Sent: Tuesday, May 19, 2015 11:59 AM
To: [email protected]
Cc: [email protected]
Subject: [homenet] I-D Action:
draft-ietf-homenet-naming-architecture-dhc-options-02.txt
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Home Networking Working Group of the IETF.
Title : DHCP Options for Homenet Naming Architecture
Authors : Daniel Migault
Wouter Cloetens
Chris Griffiths
Ralf Weber
Filename :
draft-ietf-homenet-naming-architecture-dhc-options-02.txt
Pages : 28
Date : 2015-05-19
Abstract:
CPEs are usually constraint devices with reduced network and CPU
capacities. As such, a CPE hosting on the Internet the authoritative
naming service for its home network may become vulnerable to resource
exhaustion attacks. One way to avoid exposing CPE is to outsource
the authoritative service to a third party. This third party can be
the ISP or any other independent third party.
Outsourcing the authoritative naming service to a third party
requires setting up an architecture which may be unappropriated for
most end users. To leverage this issue, this document proposes DHCP
Options so any agnostic CPE can automatically proceed to the
appropriated configuration and outsource the authoritative naming
service for the home network. This document shows that in most
cases, these DHCP Options make outsourcing to a third party (be it
the ISP or any ISP independent service provider) transparent for the
end user.
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-homenet-naming-architecture-dhc-options/
There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-homenet-naming-architecture-dhc-options-02
A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=aft-ietf-homenet-naming-architecture-dhc-options-02
Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.
Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet
I have just read through
https://tools.ietf.org/html/draft-ietf-homenet-naming-architecture-dhc-options-02
again
Generally, it is looking pretty good.
A couple of comments:
1. The use of the name "Security Field" in section 6.1 this draft is
rather unfortunate IMHO.
Humbly suggest "Supported Authentication Methods"? [to match terminology
in
https://tools.ietf.org/html/draft-ietf-homenet-front-end-naming-delegation-02
]
Plus s/Security/Supported Authentication Methods/g in other sections.
2. I miss more detailed discussion in Section 7.1 about when/if a server
should accept an update of the public key record from a CPE.
Section 9.2 notes this problem but doesn't address the problem further.
Section 9.2 should also probably note:
"The initial update of the public key between the CPE to the ISP
infrastructure is fundamental to the security of the entire name
delegation process. If an attacker can subvert the initial public key
update, then all further security and encryption mechanisms may also be
subverted."
Shouldn't section 9.2 of the draft " It is therefore RECOMMENDED to use
the Authentication Option as specified in Section 22.11 of RFC3315"
I realise that there are conflicting requirements between zeroconf and
knowing precisely which CPE is related to which customer.
3. Is there a need here for potentially further
authentication/validation of the public key update option itself?
A number of mechanisms come to mind for consideration:
- no additional security
- server enforces a strong coupling between DHCP DUID <-> CPE
authentication and customer related data (domain names, CPE public key)
- identifying a CPE by physical port of the inbound DHCP message and
rejecting messages received on other physical ports
- locking updates on the server for public key records whilst an
existing key is valid for this DUID/ DHCP Authentication pairing
- magic trust bootstrap via an out of band exchange leading to a nonce
to be included with the OPTION_PUBLIC_KEY option
The first four items on the list would be server specific implementation
choices, whereas the last would require an additional DHCP option to
transport any nonce.
regards,
RayH
_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet