On Oct 6, 2016, at 1:34 PM, Douglas Gash (dcmgash) <dcmg...@cisco.com> wrote:
> Regarding the security concern, the approach we have with the current
> document is:
> 
> 1) A statement that the protocol does not provide security in a modern
> environment. 

  I'm happy with that.

> 2) The two common approaches to support T+ so that it may be used.

  OK...

> 3) An indication that a version with built-in security is to follow, which
> will not require the mitigations in 2) (actually I suspect it may precede
> the info document ;-))

  Except that the current document doesn't even document CHAP securely.

  RFC 1994 (published in 1996) says:
 
   Each challenge value SHOULD be unique, since repetition of a
   challenge value in conjunction with the same secret would permit an
   attacker to reply with a previously intercepted response.  Since it
   is expected that the same secret MAY be used to authenticate with
   servers in disparate geographic regions, the challenge SHOULD exhibit
   global and temporal uniqueness.

  Tho I'll also note that RFC 1994 also doesn't specify a minimum length for 
the challenge.

  That is, the document doesn't even meet the security requirements in place in 
1994.

> We need to make sure there is no ambiguity for 1) for any security review.
> No soft-peddalling. T+ provides the function, not the security.

  I'm fine with that.

  I want to document historical TACACS+.  This means the document needs to 
answer the following questions:

a) can people implement it?

b) can people gain the maximum amount of security available in the historical 
protocol?

c) can people be aware of the security concerns and trade-offs with using the 
historical protocol?

  The push-back so far shows that the answers are:

a) no

b) no

c) no

  I suggest these are the wrong answers.  *All* of them are the wrong answers.

> My question would be: would this dissection of vulnerabilities and
> exploration of the attack vectors would help anyone from a security
> perspective, when we have established that the approaches 2) are required?

  Yes.  See any of the RADIUS RFCs in the last 5 years.  The SAAG reviews 
require discussion not only of the issues with the new standards, but also of 
the problems with the historical protocol.

> I suspect that we¹d probably miss some, and that may give implementors
> more comfort than is afforded by the clear and simple statement.

  The argument that we can't be perfect isn't a reason to give up entirely.

  If the statement is anything other than "no one should use this protocol for 
anything", we might as well *try* to document security issues.

> Therefore, for security review, I¹d suggest we keep the statement simple,
> as defined above. However, if this statement is not clear enough/correct
> in the document, then certainly, it should be clarified.

  Then the introduction and/or abstract should say:

 "This document attempts to specify the historical TACACS+ protocol.  However, 
there are many portions of the protocol which are under-specified or 
unspecified.  We cannot second-guess twenty years of practice here.  As a 
result, this specification is incomplete, under-specified, insecure, and should 
not be used by anyone to implement anything.  Please wait for the Standards 
track document to get the actual TACACS+ specification that people can 
implement".

  It shouldn't be a contentious issue.  Either document the protocol, or admit 
we're not going to document the protocol.

  Alan DeKok.

_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to