Re: [homenet] hncp-security-trust

2014-11-15 Thread Steven Barth



I assume that the trust verdicts would be distributed by hncp, but the
documenet doesn't seem to say so.
Yes, they are. The idea was too limit them in some way since neutral 
verdicts can be created by (unusuccessful) external connection attempts 
and thus it must be avoided that established node's node data is 
cluttered with too many neutral verdicts over time.


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


[homenet] hncp-security-trust

2014-11-15 Thread Michael Richardson


section 6.3.3 contemplates sending out verdicts for a period of time
until a decision can be rendered, giving up after 10 minutes.

I think, that since hncp is using trickle, it can just rely on trickle saying
that we haven't got any new information, so just don't say anything.

I assume that the trust verdicts would be distributed by hncp, but the
documenet doesn't seem to say so.


-- 
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgpqEJ_mDG37I.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-22 Thread Michael Thomas


On 10/22/14, 12:46 PM, Brian E Carpenter wrote:

On 22/10/2014 23:54, Ray Bellis wrote:

On 22 Oct 2014, at 02:02, Brian E Carpenter  wrote:


Up one more level: the charter looks pretty out of date in general.

Hi Brian,

The charter itself still reflects our primary focus.  I believe it still 
accurately reflects the constraints on our scope.

The milestones are admittedly completely out of date!  I hope that Mark and I 
will be able to get some time with our AD in Honolulu to get those updated.

Been there, done that, you have my sympathy and understanding ;-).

However, I suggest that a security threat analysis would be worth
considering as a new charter goal.



+1

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-22 Thread Brian E Carpenter
On 22/10/2014 23:54, Ray Bellis wrote:
> On 22 Oct 2014, at 02:02, Brian E Carpenter  
> wrote:
> 
>> Up one more level: the charter looks pretty out of date in general.
> 
> Hi Brian,
> 
> The charter itself still reflects our primary focus.  I believe it still 
> accurately reflects the constraints on our scope.
> 
> The milestones are admittedly completely out of date!  I hope that Mark and I 
> will be able to get some time with our AD in Honolulu to get those updated.

Been there, done that, you have my sympathy and understanding ;-).

However, I suggest that a security threat analysis would be worth
considering as a new charter goal.

   Brian

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-22 Thread Ray Bellis
On 22 Oct 2014, at 02:02, Brian E Carpenter  wrote:

> Up one more level: the charter looks pretty out of date in general.

Hi Brian,

The charter itself still reflects our primary focus.  I believe it still 
accurately reflects the constraints on our scope.

The milestones are admittedly completely out of date!  I hope that Mark and I 
will be able to get some time with our AD in Honolulu to get those updated.

Ray

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-21 Thread Steven Barth
> I agree with whoever it was that said there is not enough explanation
> of the threat model in this draft. The result is that I really can't
> evaluate whether the proposed solution is complete or adequate.
>From my point of view there are two vectors through which you can attack
HNCP - as mentioned. First is auto-border-discovery (if you happen to
use it) and second is attacking the protocol itself.

For #2 the effects of most of the attacks one can probably think of i.e.
spoofing, replay, ... as well as simply pretending to be an HNCP/IGP
pariticipating router (i.e. speak the protocols regularly) can both lead
to various forms of manipulation of the HNCP state. Since the algorithms
on top (at least the ones currently defined) are mostly distributed /
consensus-based in nature you can pretty much mess with the state
without attacking a specific router's HNCP traffic and by just
pretending to be a homenet router yourself.


Besides most standard end-to-end security solutions cover
authentication, encryption, replay protection etc. so should cover most
of the attack vectors on the unicast channel which leaves us with the
multicast channel which is explained in the draft. TBH replies like
"it's not what I expected" or "not enough explanation" doesn't really
help if you don't give an explanation or any other form of pointer on
how the draft can be improved or what is missing in your mind.



As for security of the homenet:

The draft briefly mentions securing other protocols like IGPs and the
issues with that and proposes that HNCP manages a PSK for them (since
thats what IGPs tend to support in terms of authentication).

Besides that I don't really want to cover the whole homenet in this
draft since this draft should probably be merged with the HNCP main
draft at some point. That doesn't me I'm against a separate generic
homenet threats draft if anyone volunteers to write one.


Cheers,

Steven



___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] I-D Action: draft-barth-homenet-hncp-security-trust-01.txt

2014-10-21 Thread Brian E Carpenter
Hi,

I agree with whoever it was that said there is not enough explanation
of the threat model in this draft. The result is that I really can't
evaluate whether the proposed solution is complete or adequate.

The other thing that bothers me is that we need a secure homenet, not
just a secure HNCP. Protecting HNCP will be pointless if the network
is insecure for other reasons. So, what we *really* needs is a full homenet
threat analysis. That is not to be found in the architecture RFC-to-be
and is not in the WG charter, but I think it should be.

Up one more level: the charter looks pretty out of date in general.

Regards
   Brian

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP Security & Trust Draft

2014-10-14 Thread Michael Thomas
1) i was hopeful that this might be a threats kind of draft which is 
sorely needed. i was disappointed.
2) there is a huge set of possibilities in between PSK and PKI in 
section 6.1 and 6.2. see #1.


Mike


On 10/14/2014 12:37 AM, Steven Barth wrote:

I just pushed a new revision of the draft.
http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-01


Most notable changes:

* Some clarifications to the consensus based trust scheme
* PSK-management now supports key-derivation for different protocols
(IGPs, ...)
* Underlying crypto scheme changed to DTLS for now
* Some spellchecking, idnits etc.



Am Freitag, den 03.10.2014, 20:38 +0200 schrieb Steven Barth:

Hi everyone,

I took the last few days to gather some thoughts about threats, security
and trust management
in the context of HNCP and wrote it up under
http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-00

Quick overview over the topics:
* Homenet Border
* HNCP Payload Security
* Trust Management
* IGP-Considerations

Please note that this draft is in a very early stage so please help to
make additions, provide feedback
and point out mistakes.


Regards,

Steven


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP Security & Trust Draft

2014-10-14 Thread Steven Barth
I just pushed a new revision of the draft.
http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-01


Most notable changes:

* Some clarifications to the consensus based trust scheme
* PSK-management now supports key-derivation for different protocols
(IGPs, ...)
* Underlying crypto scheme changed to DTLS for now
* Some spellchecking, idnits etc.



Am Freitag, den 03.10.2014, 20:38 +0200 schrieb Steven Barth:
> Hi everyone,
> 
> I took the last few days to gather some thoughts about threats, security 
> and trust management
> in the context of HNCP and wrote it up under 
> http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-00
> 
> Quick overview over the topics:
> * Homenet Border
> * HNCP Payload Security
> * Trust Management
> * IGP-Considerations
> 
> Please note that this draft is in a very early stage so please help to 
> make additions, provide feedback
> and point out mistakes.
> 
> 
> Regards,
> 
> Steven
> 
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP Security & Trust Draft

2014-10-06 Thread Steven Barth

Hi Mikael,

thanks for your feedback.


Being a crypto novice, let me write some text and please tell me if it 
makes sense in the context of your draft (thanks for writing it, it 
looks like a good summary).
I do not consider myself to be a crypto expert either which is one of 
the reasons I'd try to offload the actual crypto to something 
well-known. Also this probably means that what I drafted might not be  
100% accurate but I hope some of the actual expert will review it.





I like SSH. SSH generates its own public/private key, there are 
fingerprints I can put in SSHFP DNSSEC secured posts, etc. Are the 
public/private keys considered to be similar to self-signed 
"certificates"?
I'll answer this in the context of the consensus based trust-scheme I 
added in addition to the PSK and PKI-based trust scheme. Yes, using 
self-signed certs here is possible since it's simply X.509.





Anyhow, let me propose a scenario:

I get my first homenet router and power it up. It comes with a QR code 
on it, and it has a button (or NFC, similar principle). I scan the QR 
code on my smartphone (with a special homenet-control-app) which gives 
it enough information to connect to the wifi of the router, then I am 
asked to press a button on the router to allow my phone to become the 
administration device. The QR code contains wifi information and key 
fingerprint ID so my phone can decide that it's speaking to the 
correct device.
Right that would be possible and the QR-code would be an additional 
"trust bootstrap ceremony" in that context. I actually had a phone / 
homenet-app scenario in mind when drafting this. So I was thinking about 
two possible cases.


Case #1: The app is bound to the router itself via some kind of 
vendor-specific RPC so it can control its configuration directly. That 
RPC allows the app to read / receive fingerprints and names when a new 
device attempts to join the homenet and allows the user to give a 
verdict (trusted / untrusted) which is then announced by the router 
itself and not the phone.


Case #1 is pretty obvious because it isn't really problematic and not 
bound to the phone itself and you could probably do the using some kind 
of webinterface on such a router.


Case #2: The app itself speaks HNCP, i.e. the base state synchronization 
part (not the routing, addressing, SD whatever). It is standalone (i.e. 
doesn't depend on a specific router, just has to peered with any HNCP 
router once so it is trusted) from then on it can itself announce trust 
verdicts about other routers.




Now, after this, my phone app can speak to the router, and when I hook 
up another device to that router, it detects the new device, 
fingerprint ID etc, and asks me before it's allowed. After I ACK that 
it's allowed to talk to my homenet (which previously only consisted of 
a single router), they exchange session keys (or something) for 
management, so they can continue to talk.
In Case #1 above it could tell the router to announce a trust verdict 
(trusted / untrusted) or in Case #2 it would do so by itself.


The session key exchange would then be done by the underlying protocol 
i.e. DTLS, IPsec/IKE, ...
The only real addition here should be that this underlying protocol (or 
its implementation) needs to allow a custom verification hook (i.e. 
notifies the HNCP daemon that there is a an unknown certificate and 
allows it to be accepted or not). For DTLS e.g. this shouldn't be 
problematic since most libraries seem to support such a callback.



Just like with SSH allowing key based login, the management of homenet 
devices would rely on the public key for each accepted device being 
known to all the other devices, and this is how things authenticate. 
This would be the "anchor" that everything else relies on when it 
comes to security.
Yes, each device would announce the fingerprints of the certificates or 
public keys (details TBD) that it trusts in its HNCP-state.




Now, the problem is what to do when I lose my phone and don't have any 
backup, so perhaps I need a user/password based login to add new 
administration devices, it seems hard to work around.
Each device may announce verdicts about public keys / certificates and 
verdicts of device which are absent are cached by other HNCP routers so 
your case and Case #2 above would work without the app/phone always 
being there.




If someone gets the private key of any of the accepted homenet 
devices, of course everything falls down, but I don't see any way 
around it apart from having TPM etc.
Yeah that's also the downside here. It's even more apparent if anyone 
can say someone else is trusted or not. But I guess ultimately its the 
same issue and once you are actually a trusted homenet router you can do 
more nasty things like messing with routing etc. than actually attacking 
the trust system itself, especially since most of the algorithms / 
applications run over HNCP are distributed / consensus based anyway.



Cheers,

Steven

__

Re: [homenet] HNCP Security & Trust Draft

2014-10-06 Thread Mikael Abrahamsson

On Fri, 3 Oct 2014, Steven Barth wrote:

Please note that this draft is in a very early stage so please help to 
make additions, provide feedback and point out mistakes.


Being a crypto novice, let me write some text and please tell me if it 
makes sense in the context of your draft (thanks for writing it, it looks 
like a good summary).


I like SSH. SSH generates its own public/private key, there are 
fingerprints I can put in SSHFP DNSSEC secured posts, etc. Are the 
public/private keys considered to be similar to self-signed 
"certificates"?


Anyhow, let me propose a scenario:

I get my first homenet router and power it up. It comes with a QR code on 
it, and it has a button (or NFC, similar principle). I scan the QR code on 
my smartphone (with a special homenet-control-app) which gives it enough 
information to connect to the wifi of the router, then I am asked to press 
a button on the router to allow my phone to become the administration 
device. The QR code contains wifi information and key fingerprint ID so my 
phone can decide that it's speaking to the correct device.


Now, after this, my phone app can speak to the router, and when I hook up 
another device to that router, it detects the new device, fingerprint ID 
etc, and asks me before it's allowed. After I ACK that it's allowed to 
talk to my homenet (which previously only consisted of a single router), 
they exchange session keys (or something) for management, so they can 
continue to talk. Just like with SSH allowing key based login, the 
management of homenet devices would rely on the public key for each 
accepted device being known to all the other devices, and this is how 
things authenticate. This would be the "anchor" that everything else 
relies on when it comes to security.


Now, the problem is what to do when I lose my phone and don't have any 
backup, so perhaps I need a user/password based login to add new 
administration devices, it seems hard to work around.


If someone gets the private key of any of the accepted homenet devices, of 
course everything falls down, but I don't see any way around it apart from 
having TPM etc.


--
Mikael Abrahamssonemail: swm...@swm.pp.se

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


[homenet] HNCP Security & Trust Draft

2014-10-03 Thread Steven Barth

Hi everyone,

I took the last few days to gather some thoughts about threats, security 
and trust management
in the context of HNCP and wrote it up under 
http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-00


Quick overview over the topics:
* Homenet Border
* HNCP Payload Security
* Trust Management
* IGP-Considerations

Please note that this draft is in a very early stage so please help to 
make additions, provide feedback

and point out mistakes.


Regards,

Steven


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-30 Thread Tero Kivinen
Markus Stenberg writes:
> > I have no idea what littleconf-TOFU setup looks like, so cannot
> > comment.. 
> 
> Guess I’ll come over and discuss this at some point (not sure how
> much you have followed the 100+ message thread here). 

I have skimmed through some of the emails, but not that well, so the
security model of the bootstrap process is still unclear for me (I am
not sure if it clear for anybody). 

> > The anycast support for redirect was meant to be used for
> > bootstrapping cases, i.e. where the client does not know yet who to
> > talk to. 
> 
> Hmmh. In G-IKEv2 case, I am not sure if it is this simple. Because
> ultimately you want there to be only one GCKS (per link), but at
> boot time, there is lots of raciness about who comes up first, and
> decides they are one.  
> 
> i.e.
> 
> router 1 boots up
> -> anycast 
> (no reply)
> 
> ~at same time router 2 boots up
> -> anycast
> (no reply)
> 
> both think they can be the GCKS. I suppose one could define some
> robust mechanics to make sure that ultimately you have only one
> and/or share state between them so that it does not matter? 

I think there needs to be some kind of voting process to select the
master for each network. This is something that is not really part of
the multicast security or security in general, it needs to be defined
by the homenet. Also the problem is not just simultaneous boot, but
also partitions and reconnects, i.e. when someone unplugs ethernets
and partitions the home network in two parts, both of the parts still
need to function, i.e. both of parts need to make sure each of them
have one master. When user then plugs them back together there is need
to select new one.

I do not know if that can be combined to the routing information, i.e.
routers will know when the links go down and start the process of
making sure connected parts of the network is served by master, and
starting corrective actions when new links are connected. The
corrective operations would most likely be run over unicast, i.e. when
new network is connected the two parts have different multicast keys,
so those cannot be used, so the master of network 1 could simply
connect master of network 2 and they could agree who continues to be
master, redistribute new keys, and rekey peers multicast keys so the
whole new network has common keys.

G-IKEv2 and IKEv2 or whether security protocol is used there, are just
tools for such protocol, I do not think that protocol should be part
of the the security protocol.
-- 
kivi...@iki.fi

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Markus Stenberg
On 29.9.2014, at 14.57, Tero Kivinen  wrote:
> Markus Stenberg writes:
>> 
>>> If homenet needs multicast support then it might be good idea to push
>>> that document forward. 
>> How does this solution work with e.g. link-local-only
>> littleconf-TOFU setup?
> 
> I have no idea what littleconf-TOFU setup looks like, so cannot
> comment.. 

Guess I’ll come over and discuss this at some point (not sure how much you have 
followed the 100+ message thread here).

>> To be more precise, I am not sure which node would be GCKS, and how
>> other nodes would find that node. Based on cursory read of the
>> draft, it seems to assume that non-GCKS nodes know GCKS address in
>> advance. 
> As the G-IKEv2 uses IKE_SA_INIT from the IKEv2 for the first exchange,
> the RFC5685 IKEv2 redirect with anycast address (see section 4 of
> RFC5685) would work with it just fine.
> 
> I.e. the new device wanting to know the GCKS to talk to would send
> anycast IKEv2 packet to the network:
> 
> 
>   InitiatorResponder (any VPN GW)
>   --
> 
>(IP_I:500 -> ANYCAST:500)
>HDR(A,0), SAi1, KEi, Ni)   -->
>N(REDIRECT_SUPPORTED)
> 
>  (ANYCAST:500 -> IP_I:500)
>  <-- HDR(A,0), N(REDIRECT, New_GW_ID, Ni_data)
> 
> (with G-IKEv2 the port number would be the normal G-IKEv2 port, i.e.
> 848, not 500).
> 
> I.e. now the router listening this link can reply to the anycast
> request, with the proper gateway address (which might be his own, if
> he is the one acting as GCKS).
> 
> The anycast support for redirect was meant to be used for
> bootstrapping cases, i.e. where the client does not know yet who to
> talk to. 

Hmmh. In G-IKEv2 case, I am not sure if it is this simple. Because ultimately 
you want there to be only one GCKS (per link), but at boot time, there is lots 
of raciness about who comes up first, and decides they are one. 

i.e.

router 1 boots up
-> anycast 
(no reply)

~at same time router 2 boots up
-> anycast
(no reply)

both think they can be the GCKS. I suppose one could define some robust 
mechanics to make sure that ultimately you have only one and/or share state 
between them so that it does not matter?

Cheers,

-Markus
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Michael Richardson

Ted Lemon  wrote:
>> If, OTOH, you can say that you would in fact also require origin
>> authentication, then that is also of interest. (It'd mean that your
>> use case could not be met by the initially chartered work for DICE,
>> and that factoid could be helpful in figuring out how to handle the
>> DICE work.)

> I think we definitely need origin authentication, but I am skeptical
> that we need multicast TLS.  I guess if we had it it might work,
> though.  But I'm not convinced it's the right model.  So I'd hate to
> have you guys go off and invent something cool that winds up not
> matching the eventual design.

I think that it useful if we have a simple way to authenticate the
multicast'ed communication, but I think it is acceptable to form point to
point (unicast) security associations to get the origin authentication.

The communication might go like:
MULTICAST DrNick: HEY EVERYBODY, I got a new PREFIX to share!
UNICAST   Homer to DrNick: ... PREFIXES.. can I have some?
UNICAST   DrNick to Homer: sure, not a problem!

[If that sounds like DHCPv6]

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgpUR0d2GQ6wI.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Michael Thomas

On 09/29/2014 06:24 AM, Ted Lemon wrote:

On Sep 29, 2014, at 9:16 AM, Stephen Farrell  wrote:

If, OTOH, you can say that you would in fact also require
origin authentication, then that is also of interest. (It'd
mean that your use case could not be met by the initially
chartered work for DICE, and that factoid could be helpful
in figuring out how to handle the DICE work.)

I think we definitely need origin authentication, but I am skeptical that we 
need multicast TLS.   I guess if we had it it might work, though.   But I'm not 
convinced it's the right model.   So I'd hate to have you guys go off and 
invent something cool that winds up not matching the eventual design.




Why might we need *in-session* origin authentication? I'm not 
questioning it, just trying to

understand the threats/requirements.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Ted Lemon
On Sep 29, 2014, at 9:16 AM, Stephen Farrell  wrote:
> If, OTOH, you can say that you would in fact also require
> origin authentication, then that is also of interest. (It'd
> mean that your use case could not be met by the initially
> chartered work for DICE, and that factoid could be helpful
> in figuring out how to handle the DICE work.)

I think we definitely need origin authentication, but I am skeptical that we 
need multicast TLS.   I guess if we had it it might work, though.   But I'm not 
convinced it's the right model.   So I'd hate to have you guys go off and 
invent something cool that winds up not matching the eventual design.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Stephen Farrell


On 29/09/14 13:58, Ted Lemon wrote:
> On Sep 29, 2014, at 3:50 AM, Stephen Farrell
>  wrote:
>> Sooner would be much better than later for that as the DICE WG are
>> right now in the process of (re-)considering whether they can in
>> fact meet their chartered goals on this topic.
> 
> Unfortunately I think at this point we are distracted by a discussion
> about whether to use nails or screws when we haven't settled on what
> kind of house we're building.

Understood. And I don't want to side-track you here.

However, if your house is such that it only requires
confidentiality and data integrity of messages between
group members, but does not require origin authentication
that that'd be useful to know. What I mean by origin
authentication here is the ability for the receiver of a
multicast message to cryptographically verify exactly which
member of the group has sent a message.

If, OTOH, you can say that you would in fact also require
origin authentication, then that is also of interest. (It'd
mean that your use case could not be met by the initially
chartered work for DICE, and that factoid could be helpful
in figuring out how to handle the DICE work.)

Cheers,
S.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Ted Lemon
On Sep 29, 2014, at 3:50 AM, Stephen Farrell  wrote:
> Sooner would be much better than later for that as the DICE
> WG are right now in the process of (re-)considering whether
> they can in fact meet their chartered goals on this topic.

Unfortunately I think at this point we are distracted by a discussion about 
whether to use nails or screws when we haven't settled on what kind of house 
we're building.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Tero Kivinen
Markus Stenberg writes:
> > There is also ikev2 version of group key management
> > (draft-yeung-g-ikev2), but the draft seems to have expired some time
> > ago. I still think it was supposed to be published.
> 
> Ah, interesting, did not know about that. Thanks ;)
> 
> > If homenet needs multicast support then it might be good idea to push
> > that document forward. 
> 
> How does this solution work with e.g. link-local-only
> littleconf-TOFU setup?

I have no idea what littleconf-TOFU setup looks like, so cannot
comment.. 

> To be more precise, I am not sure which node would be GCKS, and how
> other nodes would find that node. Based on cursory read of the
> draft, it seems to assume that non-GCKS nodes know GCKS address in
> advance. 

As the G-IKEv2 uses IKE_SA_INIT from the IKEv2 for the first exchange,
the RFC5685 IKEv2 redirect with anycast address (see section 4 of
RFC5685) would work with it just fine.

I.e. the new device wanting to know the GCKS to talk to would send
anycast IKEv2 packet to the network:


   InitiatorResponder (any VPN GW)
   --

(IP_I:500 -> ANYCAST:500)
HDR(A,0), SAi1, KEi, Ni)   -->
N(REDIRECT_SUPPORTED)

  (ANYCAST:500 -> IP_I:500)
  <-- HDR(A,0), N(REDIRECT, New_GW_ID, Ni_data)

(with G-IKEv2 the port number would be the normal G-IKEv2 port, i.e.
848, not 500).

I.e. now the router listening this link can reply to the anycast
request, with the proper gateway address (which might be his own, if
he is the one acting as GCKS).

The anycast support for redirect was meant to be used for
bootstrapping cases, i.e. where the client does not know yet who to
talk to. 

> > I do not think replacing the IKEv2 with TLS would help at all. If you
> > go for application level protection then using DTLS or similar is
> > better than getting ESP involved at all. 
> 
> DTLS has rather sad multicast story too (=manually keyed IPsec
> without IPsec and draft-only at the moment). Of course, whether or
> not we really have to secure multicast at all in case of HNCP is
> debatable. However, as a general solution, it is somewhat lacking,
> as leveraging same thing for e.g. bit more multicast-heavy routing
> protocols would not work in case of DTLS (then again, I am not sure
> if GDOI / G-IKEv2 are much better due to them being mostly
> draft-only vaporware at this point). 

At least the G-IKEv2 stuff is there, and the actual ESP use of
multicast has been defined for manual keys for quite long time (and is
in the RFCs already, not only drafts).

I have no idea if there is any implementations about the G-IKEv2, but
I doubt that there is anything to protect multicast ready now... 
-- 
kivi...@iki.fi

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Stephen Farrell

Hiya,

I've not really been following this discussion sufficient
to comment in general, but just on this part...

On 29/09/14 08:39, Markus Stenberg wrote:
> DTLS has rather sad multicast story too 

The DICE WG [1] have also been discussing potential issues
with DTLS and multicast. That discussion has turned out
harder than envisaged in that the WG originally figured
a simple extension to the DTLS reccord layer might suffice
to get useful security when DTLS packets are sent via IP
multicast. Turns out to be less easy than that.

Anyway, if this WG do end up needing some multicast security
and are looking at DTLS it would be very good to co-ordinate
with the DICE WG.

Sooner would be much better than later for that as the DICE
WG are right now in the process of (re-)considering whether
they can in fact meet their chartered goals on this topic.

Thanks,
S.

[1] https://tools.ietf.org/wg/dice/

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-29 Thread Markus Stenberg
On 25.9.2014, at 14.19, Tero Kivinen  wrote:
> Markus Stenberg writes:
>>> Is there something else that’ll work as transport layer security
>>> for multicast, or should we send a request for the IETF leadership
>>> to investigate if this is something that needs to be developed? 
>> 
>> There is not that I know of. 
>> 
>> I believe msec work is somewhat outdated (based on IKEv1, and not
>> widely deployed), but security isn’t popular, and multicast isn’t
>> popular, so combining them is not usually win in IETF. (And
>> especially in seeing them implemented - still not sure how many msec
>> implementations there has been.)
> 
> There is also ikev2 version of group key management
> (draft-yeung-g-ikev2), but the draft seems to have expired some time
> ago. I still think it was supposed to be published.

Ah, interesting, did not know about that. Thanks ;)

> If homenet needs multicast support then it might be good idea to push
> that document forward. 

How does this solution work with e.g. link-local-only littleconf-TOFU setup?

To be more precise, I am not sure which node would be GCKS, and how other nodes 
would find that node. Based on cursory read of the draft, it seems to assume 
that non-GCKS nodes know GCKS address in advance.

> I do not think replacing the IKEv2 with TLS would help at all. If you
> go for application level protection then using DTLS or similar is
> better than getting ESP involved at all. 

DTLS has rather sad multicast story too (=manually keyed IPsec without IPsec 
and draft-only at the moment). Of course, whether or not we really have to 
secure multicast at all in case of HNCP is debatable. However, as a general 
solution, it is somewhat lacking, as leveraging same thing for e.g. bit more 
multicast-heavy routing protocols would not work in case of DTLS (then again, I 
am not sure if GDOI / G-IKEv2 are much better due to them being mostly 
draft-only vaporware at this point).

Cheers,

-Markus
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-25 Thread Michael Richardson

Michael Thomas  wrote:
>> So what about the other way around? To what degrees should my
>> homenet trust ISP-maintained CPE?

> Sorry, I was talking about the upstream aggregation router, not the
> in-home router.  That is, if I treat the ISP CPE the same way that I
> treat my ISP's aggregation router, I can define it as being
> "outside". That, of course, as you note above means that you can't use
> their wireless etc lest you open yourself to be p0wned by them.

If you are asking if I have to trust the ISP upstream aggregation router
(so s/CPE/router/ in >> above), then answer is that router is not involved
at all in the homenet's security perimeter.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgp1tHk8ZpbvN.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-25 Thread Tero Kivinen
Markus Stenberg writes:
> > Is there something else that’ll work as transport layer security
> > for multicast, or should we send a request for the IETF leadership
> > to investigate if this is something that needs to be developed? 
>
> There is not that I know of. 
> 
> I believe msec work is somewhat outdated (based on IKEv1, and not
> widely deployed), but security isn’t popular, and multicast isn’t
> popular, so combining them is not usually win in IETF. (And
> especially in seeing them implemented - still not sure how many msec
> implementations there has been.)

There is also ikev2 version of group key management
(draft-yeung-g-ikev2), but the draft seems to have expired some time
ago. I still think it was supposed to be published.

If homenet needs multicast support then it might be good idea to push
that document forward. 


> > I just can't help seeing this problem popping up all over the
> > place and everybody solving it by writing their own code and doing
> > their own implementation. IPSEC isn't widely used because it
> > doesn't have ports so it can't be NATed (so its now run over UDP
> > to workaround that problem) and also because key management is
> > hard because keys are managed by the operating system and not by
> > the application?

NATs should not be problem here in the homenet, I would assume all
this runs inside the home, and the boxes in homenet are not going to
do nat for ipv6 addresses... 

> > So, do we need a mix between IPSEC and TLS that can be done on a
> > per-application level, but it’s still a generic framework so that
> > someone can develop generic code that projects like HNCP can use,
> > for instance by linking to libraries?

I do not think replacing the IKEv2 with TLS would help at all. If you
go for application level protection then using DTLS or similar is
better than getting ESP involved at all. 

> TLS + (pure) multicast is more or less impossible. You could
> probably define pure-multicast key negotiation scheme too using
> multi-party D-H (for example), but I am not sure if there is any
> standard protocols for that. Still, it would not look like TLS so
> calling it e.g. MTLS would be somewhat misleading. You could use
> some packet encoding features, but that would be that.

If secure multicast is needed, I think going for the g-ikev2 and ESP
would most likely be best way. The g-ikev2 specification is as far as
I can see ready, so it should be something that can be published quite
soon. It will run over separate port from normal IKEv2, so it can be
deployed quite easily (meaning it does not mess up existing IPsec in
the box), and as msec was not really very widely deployed the changes
that the box already has exsiting msec implementation running on that
port, is small.

> I guess you could do some sort of msec GDOI-like solution for it too
> - perform unicast exchanges using something like DTLS encoding of
> TLS handshakes to agree on multicast encryption key to be used on
> DTLS-ish ESP-ish UDP multicast traffic with per-source replay
> windows.  

If I remember right g-ikev2 supports multiple group key management
protocols and allows download keys from the group controller / key
server (GCKS) using IKEv2 to the devices. 
-- 
kivi...@iki.fi

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Michael Thomas


On 9/24/14, 7:46 AM, Michael Richardson wrote:

Michael Thomas  wrote:
 >> Michael Thomas  wrote:
 >> >> 2) ISP-provided router has to be willing to trust retail purchased 
router,
 >> >> or nothing works.
 >>
 >> > So what about the other way around? To what degrees should my homenet 
trust
 >> > ISP-maintained CPE?
 >>
 >> That's up to you.  Seriously.
 >> Your ISP-maintained CPE totally p0wns your network.  If you don't trust 
them,
 >> even just a little bit, then you can't use their equipment.

 > And there's nothing we can do about that, even if we define a boundary
 > such that they are outside it?

You can run another router inside, and if the ISP router supports being a
DHCPv6-PD (such as proposed by HIP), you might win.  Otherwise, you might as
well stick with IPv4+NAT, I think (maybe with v6 in a tunnel).

Me, I just buy by own router + modem, and I can't get a modem, many ISPs
understand when you want to turn their router into a modem only.

 > I'm no expert here, but it seems to me that the normal first hop ISP 
router
 > doesn't
 > have these characteristics of p0nwage for in-home traffic?

Right now, with IPv4 only, the ISP provided router (which usually includes
wifi) completely p0wns the house.  I believe that when you get DSL from
free.fr, that they actually put up another ESSID which accepts VoIP traffic
 From their mobile phone subscribers.  That's why free.fr is so inexpensive;
the DSL subscribers provide the mobile phone infrastructure.



Sorry, I was talking about the upstream aggregation router, not the 
in-home router.
That is, if I treat the ISP CPE the same way that I treat my ISP's 
aggregation router,
I can define it as being "outside". That, of course, as you note above 
means that you

can't use their wireless etc lest you open yourself to be p0wned by them.

As far as DHCPv6 PD, can you just convince their CPE to bridge and let 
the aggregation
router do it, or perhaps just set up their CPE as a DHCP relay, or maybe 
something else?

As I say I'm not an expert here so sorry if these are dumb questions.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Michael Richardson

Michael Thomas  wrote:
>> Michael Thomas  wrote:
>> >> 2) ISP-provided router has to be willing to trust retail purchased 
router,
>> >> or nothing works.
>>
>> > So what about the other way around? To what degrees should my homenet 
trust
>> > ISP-maintained CPE?
>>
>> That's up to you.  Seriously.
>> Your ISP-maintained CPE totally p0wns your network.  If you don't trust 
them,
>> even just a little bit, then you can't use their equipment.

> And there's nothing we can do about that, even if we define a boundary
> such that they are outside it?

You can run another router inside, and if the ISP router supports being a
DHCPv6-PD (such as proposed by HIP), you might win.  Otherwise, you might as
well stick with IPv4+NAT, I think (maybe with v6 in a tunnel).

Me, I just buy by own router + modem, and I can't get a modem, many ISPs
understand when you want to turn their router into a modem only.

> I'm no expert here, but it seems to me that the normal first hop ISP 
router
> doesn't
> have these characteristics of p0nwage for in-home traffic?

Right now, with IPv4 only, the ISP provided router (which usually includes
wifi) completely p0wns the house.  I believe that when you get DSL from
free.fr, that they actually put up another ESSID which accepts VoIP traffic
From their mobile phone subscribers.  That's why free.fr is so inexpensive;
the DSL subscribers provide the mobile phone infrastructure.

(free.fr is open about this.  I've long suspected Bell Canada wants to do the
same thing, and I observe them essentially squatting on wifi channels all
over the place)

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgpcwZctKZ02C.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Ted Lemon
On Sep 24, 2014, at 10:00 AM, Steven Barth  wrote:
> Maybe adding that we should try to use an existing and well-tested mechanism 
> unless there is a very good reason not to.

I don't think there is one, but if you think there is you should tell us!   :)

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Steven Barth


Thank you for all of the discussion on this important topic.

Without declaring consensus on how far we should go scope-wise in 
terms of overall homenet security just yet, I'd like to know if, in 
terms of HNCP itself from a bits-on-the-wire protocol perspective, can 
we adopt this proposal proposal from Mikael? If yes, please say so. If 
no, please say why not (and even better if you can propose text that 
would alleviate your concern).


ACK. It's similar to my own proposal regarding bits-on-the-wire anyway.

Maybe adding that we should try to use an existing and well-tested 
mechanism unless there is a very good reason not to.


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Michael Richardson

Mark Townsley  wrote:
> Without declaring consensus on how far we should go scope-wise in terms
> of overall homenet security just yet, I'd like to know if, in terms of
> HNCP itself from a bits-on-the-wire protocol perspective, can we adopt
> this proposal proposal from Mikael? If yes, please say so. If no,
> please say why not (and even better if you can propose text that would
> alleviate your concern).

It is essentially identical to what I am proposing.

I would motify slightly:
   1) the I in "PKI" is inappropriate.
   2) not-yet-secure nodes should be able to listen to secured traffic.


> Mikael Abrahamsson wrote:

>> So my proposal is that we make HNCP capable of using several methods,
>>one is unsecure, one is secure by means of a shared secret, and then add
>>other optional methods using PKI that would enable the above mentioned
>>"accept each device manually" more secure way.



--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgpq4E2ll1EUv.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Michael Thomas

On 09/24/2014 05:01 AM, Mark Townsley wrote:


Thank you for all of the discussion on this important topic.

Without declaring consensus on how far we should go scope-wise in 
terms of overall homenet security just yet, I'd like to know if, in 
terms of HNCP itself from a bits-on-the-wire protocol perspective, can 
we adopt this proposal proposal from Mikael? If yes, please say so. If 
no, please say why not (and even better if you can propose text that 
would alleviate your concern).


No. 1) Unsecured is unacceptable. 2) Pre-shared keys suck, and don't 
addresses the authz problem. 3) PKI in the traditional

sense (eg certs) is an anti-goal.

The approach should be a more modern "start by using (naked) public keys 
as a tool to facilitate the enrollment problem that
homenet MUST solve for, and produce solutions that address the security 
threats, littleconf needs, and low-clue nature of homenets."


Mike, uncaffeinated



Mikael Abrahamsson wrote:


So my proposal is that we make HNCP capable of using several methods, 
one is unsecure, one is secure by means of a shared secret, and then 
add other optional methods using PKI that would enable the above 
mentioned "accept each device manually" more secure way.





___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Mark Townsley

Thank you for all of the discussion on this important topic. 

Without declaring consensus on how far we should go scope-wise in terms of 
overall homenet security just yet, I'd like to know if, in terms of HNCP itself 
from a bits-on-the-wire protocol perspective, can we adopt this proposal 
proposal from Mikael? If yes, please say so. If no, please say why not (and 
even better if you can propose text that would alleviate your concern). 

Mikael Abrahamsson wrote:

> So my proposal is that we make HNCP capable of using several methods, one is 
> unsecure, one is secure by means of a shared secret, and then add other 
> optional methods using PKI that would enable the above mentioned "accept each 
> device manually" more secure way.


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Mark Townsley

> On Sep 23, 2014, at 7:22 PM, Michael Richardson  wrote:
> 
> 
> Mark Townsley  wrote:
>> My own experience attempting to use IPsec as an add-on security
>> solution (a.k.a. "pixie dust) for a protocol isn't all that
>> positive. We tried that with L2TP, and in the process failed to kill
>> off PPTP on windows clients. I can't tell you how many times over the
>> years I've had to point people to the Windows Registry setting to
>> disable IPsec with L2TP. OSPFv3 is another one where I get complaints
>> about requiring IPsec. So, I agree with Ted; We should be wary of
>> falling into the trap of using IPsec just because it is there.
> 
> That's a poor example for several reasons that have nothing to do with HNCP,
> and so I won't go into them here.  (and I do have tons of L2TP code in the
> field, sadly)

Michael,

Back in '97 or so, the IETF weighed draft-ietf-pppext-l2tp-sec vs. L2TP+IPsec, 
and chose the latter (now RFC 3193). Some of this thread reminds me of 
discussions we had at that time, not just HNCP+IPsec vs. "HNCPsec" on the wire, 
but also whether we consider key config and such within HNCP alone or more 
holistically. 

Everyone has their own reference historical points to draw from, that was just 
my own. Sorry it didn't work for you!

Cheers,

- Mark

> 
> --
> Michael Richardson , Sandelman Software Works
> -= IPv6 IoT consulting =-
> 
> 
> 
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Markus Stenberg
On 24.9.2014, at 12.07, Mikael Abrahamsson  wrote:
> On Wed, 24 Sep 2014, Markus Stenberg wrote:
>> Big problem with IPsec + ‘any protocol’ is that it does not work _that_ well 
>> with multicast. Certainly, you can use manually keyed (static) IPsec SAs 
>> (although in case of Linux, out of the box, it does not work either but is 
>> easy to patch), but they have somewhat worse security properties, main 
>> things being lack of replay protection and fixed key used for crypto.
> How does multicast work at all with replay-protection? I am not a crypto guy, 
> but is there any way of doing multicast and not have this problem?

Well, effectively per-source replay window _and_ rekeying to make e.g. system 
restarts not be vulnerable to this. I don’t remember how GSA in msec was 
specified anymore, but it is not intractable problem (at least in theory). It 
has been many years since I read msec work though.

> Is there something else that’ll work as transport layer security for 
> multicast, or should we send a request for the IETF leadership to investigate 
> if this is something that needs to be developed?

There is not that I know of. 

I believe msec work is somewhat outdated (based on IKEv1, and not widely 
deployed), but security isn’t popular, and multicast isn’t popular, so 
combining them is not usually win in IETF. (And especially in seeing them 
implemented - still not sure how many msec implementations there has been.)

> I just can't help seeing this problem popping up all over the place and 
> everybody solving it by writing their own code and doing their own 
> implementation. IPSEC isn't widely used because it doesn't have ports so it 
> can't be NATed (so its now run over UDP to workaround that problem) and also 
> because key management is hard because keys are managed by the operating 
> system and not by the application?
> 
> So, do we need a mix between IPSEC and TLS that can be done on a 
> per-application level, but it’s still a generic framework so that someone can 
> develop generic code that projects like HNCP can use, for instance by linking 
> to libraries?

TLS + (pure) multicast is more or less impossible. You could probably define 
pure-multicast key negotiation scheme too using multi-party D-H (for example), 
but I am not sure if there is any standard protocols for that. Still, it would 
not look like TLS so calling it e.g. MTLS would be somewhat misleading. You 
could use some packet encoding features, but that would be that.

I guess you could do some sort of msec GDOI-like solution for it too - perform 
unicast exchanges using something like DTLS encoding of TLS handshakes to agree 
on multicast encryption key to be used on DTLS-ish ESP-ish UDP multicast 
traffic with per-source replay windows. 

Cheers,

-Markus

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Mikael Abrahamsson

On Wed, 24 Sep 2014, Markus Stenberg wrote:

Big problem with IPsec + ‘any protocol’ is that it does not work _that_ 
well with multicast. Certainly, you can use manually keyed (static) 
IPsec SAs (although in case of Linux, out of the box, it does not work 
either but is easy to patch), but they have somewhat worse security 
properties, main things being lack of replay protection and fixed key 
used for crypto.


How does multicast work at all with replay-protection? I am not a crypto 
guy, but is there any way of doing multicast and not have this problem?


Is there something else that'll work as transport layer security for 
multicast, or should we send a request for the IETF leadership to 
investigate if this is something that needs to be developed?


I just can't help seeing this problem popping up all over the place and 
everybody solving it by writing their own code and doing their own 
implementation. IPSEC isn't widely used because it doesn't have ports so 
it can't be NATed (so its now run over UDP to workaround that problem) and 
also because key management is hard because keys are managed by the 
operating system and not by the application?


So, do we need a mix between IPSEC and TLS that can be done on a 
per-application level, but it's still a generic framework so that someone 
can develop generic code that projects like HNCP can use, for instance by 
linking to libraries?


--
Mikael Abrahamssonemail: swm...@swm.pp.se___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-24 Thread Markus Stenberg
On 24.9.2014, at 8.56, Mikael Abrahamsson  wrote:
> On paper it still seems IPSEC should be able to do this (I mean, isn't this 
> what Microsoft does with Direct Access, ie run IPSEC and have keys handled by 
> AD? From a theoretical level, it seems bad that we can't implement generic 
> security and then let other protocols run on top of that. What is it that 
> IPSEC is lacking? Is it the key/auth exchange that is lacking?

Big problem with IPsec + ‘any protocol’ is that it does not work _that_ well 
with multicast. Certainly, you can use manually keyed (static) IPsec SAs 
(although in case of Linux, out of the box, it does not work either but is easy 
to patch), but they have somewhat worse security properties, main things being 
lack of replay protection and fixed key used for crypto. 

You cannot really bootstrap them from anything else than that, though, which is 
a problem.http://tools.ietf.org/wg/msec/ attempted to address this, but I have 
not really seen it in the wild as open source (for example, no support in 
StrongSwan[1]). (Cisco did GDOI in e.g. DMVPN at least.)

-Markus

P.S. I’d like to be proven wrong on this front - ‘just use IKE+IPsec’ is a good 
story, but without equivalently good (in terms of what is used for auth*, and 
how secure it is) support for both unicast and multicast, I do not really think 
it applies as-is to anything that makes decisions that matter also based on 
multicast packets.

[1] https://wiki.strongswan.org/projects/strongswan/wiki/IpsecStandards
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Mikael Abrahamsson

On Fri, 19 Sep 2014, Mark Townsley wrote:

My own experience attempting to use IPsec as an add-on security solution 
(a.k.a. "pixie dust) for a protocol isn't all that positive. We tried 
that with L2TP, and in the process failed to kill off PPTP on windows 
clients. I can't tell you how many times over the years I've had to 
point people to the Windows Registry setting to disable IPsec with L2TP. 
OSPFv3 is another one where I get complaints about requiring IPsec. So, 
I agree with Ted; We should be wary of falling into the trap of using 
IPsec just because it is there.


As far as I can see, there are 2 ways of doing security. Either each 
protocol does its own security completely (both auth and encryption), or 
we have generic ways of doing these. The generic ways can be either a new 
protocol and method, or a method that any protocol can use, so at least 
the method is standard.


What I have seen so far, it seems most implementations are doing things 
from scratch, but with known methods, but with little code re-use?


What I would like to see is an implementation that is generic, but perhaps 
where the information is carried over a lot of different protocols, for 
instance HNCP, ND and others.


There is no security and zero configuration at the same time. It just 
doesn't work. I still think we need user intervention to set policy for 
each device. "What trust do I put in this device and what role should it 
have" is something the user has to answer. The result of this answer sets 
policy for the devices in relation to this new device. This has to be 
really simple and easy to use. Since a lot of people have smartphones 
nowadays, I still think that the device popping up in an App they have, 
and then configuring it there, is the best way. Perhaps in combination 
with some kind of device key fingerprint using QR codes or alike to really 
make sure this is the device you're trying to configure policy for.


So my proposal is that we make HNCP capable of using several methods, one 
is unsecure, one is secure by means of a shared secret, and then add other 
optional methods using PKI that would enable the above mentioned "accept 
each device manually" more secure way.


On paper it still seems IPSEC should be able to do this (I mean, isn't 
this what Microsoft does with Direct Access, ie run IPSEC and have keys 
handled by AD? From a theoretical level, it seems bad that we can't 
implement generic security and then let other protocols run on top of 
that. What is it that IPSEC is lacking? Is it the key/auth exchange that 
is lacking?


--
Mikael Abrahamssonemail: swm...@swm.pp.se

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Ted Lemon
On Sep 23, 2014, at 7:57 PM, Douglas Otis  wrote:
> Actually, it is better to assume there is a long list of vulnerable home 
> routers being p0wned by entities beyond their ISP.

This is to some extent true, but not something we can really address in homenet.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Douglas Otis

On Sep 23, 2014, at 3:39 PM, Michael Thomas  wrote:

> 
> On 9/23/14, 1:07 PM, Michael Richardson wrote:
>> Michael Thomas  wrote:
>> >> 2) ISP-provided router has to be willing to trust retail purchased 
>> router,
>> >> or nothing works.
>> 
>> > So what about the other way around? To what degrees should my homenet 
>> trust
>> > ISP-maintained CPE?
>> 
>> That's up to you.  Seriously.
>> Your ISP-maintained CPE totally p0wns your network.  If you don't trust them,
>> even just a little bit, then you can't use their equipment.
>> 
>> 
> 
> And there's nothing we can do about that, even if we define a boundary
> such that they are outside it?
> 
> Do they *have* to participate in the IGP in order for homenet routing to work?
> 
> I'm no expert here, but it seems to me that the normal first hop ISP router 
> doesn't
> have these characteristics of p0nwage for in-home traffic?

Dear Michael,

Actually, it is better to assume there is a long list of vulnerable home 
routers being p0wned by entities beyond their ISP.   Leaving that problem aside 
and assuming this can be handled using a KISS approach, even setting up 
firewalls when their are multiple routers involved becomes somewhat problematic 
whenever overlaid networking is not being used.  After all, how can each 
router's assigned prefixes be exchanged.  How can mDNS proxy information be 
communicated?  It is important to consider many of the contained devices might 
be vulnerable to Internet access.  Not all devices are updated beyond their 
warranty period.  In some cases, this period might be a 20/20 guarantee, 20 
feet or 20 seconds, whichever comes first.  While some printers might be able 
to handle direct Internet access, most can't.  Many of these devices announce 
their routable address via mDNS, hence the need for a network overlay.  By 
using a network overlay, Trust on First Use (TOFU) is less essential although 
nice
  to have as an additional layer of protection.

Regards,
Douglas Otis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Michael Thomas


On 9/23/14, 1:07 PM, Michael Richardson wrote:

Michael Thomas  wrote:
 >> 2) ISP-provided router has to be willing to trust retail purchased 
router,
 >> or nothing works.

 > So what about the other way around? To what degrees should my homenet 
trust
 > ISP-maintained CPE?

That's up to you.  Seriously.
Your ISP-maintained CPE totally p0wns your network.  If you don't trust them,
even just a little bit, then you can't use their equipment.




And there's nothing we can do about that, even if we define a boundary
such that they are outside it?

Do they *have* to participate in the IGP in order for homenet routing to 
work?


I'm no expert here, but it seems to me that the normal first hop ISP 
router doesn't

have these characteristics of p0nwage for in-home traffic?

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Michael Richardson

Michael Thomas  wrote:
>> 2) ISP-provided router has to be willing to trust retail purchased 
router,
>> or nothing works.

> So what about the other way around? To what degrees should my homenet 
trust
> ISP-maintained CPE?

That's up to you.  Seriously.
Your ISP-maintained CPE totally p0wns your network.  If you don't trust them,
even just a little bit, then you can't use their equipment.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgpH9HSCmZ7vR.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Michael Richardson

STARK, BARBARA H  wrote:
> If the concern is with a man-in-the-middle attack on HNCP messages,
> then point-to-point security, using encryption with any key that the 2

The concern is man-in-the-middle "attacks" on HNCP messages by an outsider,
not another member of the household.  Or, more specifically, the outsider
being a misconfigured (physical) neighbour.

Possession of the WPA2 passphrase means that the router is part of my home.

> If the goal is to know whether an endpoint is authorized to
> send/receive a HNCP message WPA2-PSK is also useless. It authorizes no
> such thing. Users should be free to run HNCP in a manner that requires
> no explicit authorization. If explicit authorization to run HNCP is
> desired by the user, then such authorization must come from a person
> with physical access to the home network and its devices, and such
> authorization must be specific to the running of HNCP and/or a role in
> home network configuration.

What do you mean by "user" here.  Last I checked, my wife is a user, and I'm
sure that neither her person, nor her mobile phone, nor her chrome book need
to run HNCP.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgp6xKto475UX.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Michael Thomas


On 9/23/14, 10:59 AM, Michael Richardson wrote:

2) ISP-provided router has to be willing to trust retail purchased router,
or nothing works.



So what about the other way around? To what degrees should my homenet trust
ISP-maintained CPE?

Or more succinctly, what are the things the ISP and Retail CPE need to 
collaborate on
and what are the things they need to take an adversarial stance on? 
Neither me, nor

my ISP are similarly motivated, after all.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Michael Richardson

Randy Turner  wrote:
> Are we assuming that the home router is purchased retail, and not
> "fulfilled" or provided by an ISP? The method to establish trust
> relationships would hinge on the answer

1) if there only one home router from the ISP, then there is no problem.
2) ISP-provided router has to be willing to trust retail purchased router,
   or nothing works.
3) ISP-A-provided router has to be willing to trust ISP-fullfilled router
   from ISP-B-provided router.

If you have secrets (including WPA-PSK keys) that are on your ISP-fullfilled
router, that you want to keep secret from your ISP, then you lost.
If you don't trust your ISP, then you can't use your ISP provided router.

So the answer does *not* hinge on the answer.
It has to work, and I think we can make it work.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgpxs_cjQQrXo.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread STARK, BARBARA H
> >> I  further suggest that if two routers have wireless that they might 
> well
> >> have a WPA2/PSK available to them, and that they can and SHOULD use
> something
> >> derived from that key to authenticate each other.  Could be over IKEv2,
> yes.
> 
> > I _think_ we have to assume some passwords somewhere.
> 
> > - WPA2 PSK on almost all home routers by default (most home network
> > access these days is wireless)
> 
> yes, agree.  And if they have multiple routers, they likely have the same
> WPA2-PSK.

Possession of the WPA2 passphrases authorizes access to that particular Wi-Fi 
network -- nothing more and nothing less. And they authenticate nothing 
(because they are shared). 

If the concern is with a man-in-the-middle attack on HNCP messages, then 
point-to-point security, using encryption with any key that the 2 endpoints can 
agree on (such as simple TLS with HTTP digest authentication) makes sense. This 
is just about making sure the endpoints remain the same over the course of 
messaging and that nothing inserts itself into the conversation (or overhears 
the conversation). If the desire is to ensure endpoints can be identified over 
the course of many conversations, then consistently-used self-generated keys 
are sufficient. Because WPA2 passphrases are shared, they are useless here.

If the goal is to know whether an endpoint is authorized to send/receive a HNCP 
message WPA2-PSK is also useless. It authorizes no such thing. Users should be 
free to run HNCP in a manner that requires no explicit authorization. If 
explicit authorization to run HNCP is desired by the user, then such 
authorization must come from a person with physical access to the home network 
and its devices, and such authorization must be specific to the running of HNCP 
and/or a role in home network configuration.

But to be honest, I have no clue what the potential HNCP attacks and 
vulnerabilities (and security goals) are. What does HNCP security need to 
protect against? I agree that documentation of overall homenet threats and 
vulnerabilities isn't what's needed to understand specific HNCP threats and 
vulnerabilities. But is there a plan to document these for HNCP?
Barbara
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Ted Lemon
On Sep 23, 2014, at 1:23 PM, Michael Richardson  wrote:
> With respect,  if you leave the trust scheme out of scope, what you are
> really doing is leaving all of the security out of scope, because it won't be
> deployable.

+1

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Michael Richardson

Steven Barth  wrote:
>> And it's extremely unlikely that
>> DTLS will be a one-sentence "solution" even if it gets adopted because
>> DTLS, IPsec, etc say nothing
>> about enrollment and authorization. Those are by far the hard problems 
with
>> homenent security.

> I wouldn't really want to lock HNCP to any trust scheme at this point 
where
> we are not even sure what we want. I'd rather choose the underlying
> mechanism, either DTLS or IPsec/IKE and leave the rest out-of-scope. Maybe
> mention PSK-usage as baseline option and say various other 
certificate-based
> approached are possible but out-of-scope of the HNCP draft itself.

With respect,  if you leave the trust scheme out of scope, what you are
really doing is leaving all of the security out of scope, because it won't be
deployable.

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgpf_Imlo3UTo.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Michael Richardson

Mark Townsley  wrote:
> My own experience attempting to use IPsec as an add-on security
> solution (a.k.a. "pixie dust) for a protocol isn't all that
> positive. We tried that with L2TP, and in the process failed to kill
> off PPTP on windows clients. I can't tell you how many times over the
> years I've had to point people to the Windows Registry setting to
> disable IPsec with L2TP. OSPFv3 is another one where I get complaints
> about requiring IPsec. So, I agree with Ted; We should be wary of
> falling into the trap of using IPsec just because it is there.

That's a poor example for several reasons that have nothing to do with HNCP,
and so I won't go into them here.  (and I do have tons of L2TP code in the
field, sadly)

--
Michael Richardson , Sandelman Software Works
 -= IPv6 IoT consulting =-





pgpgaOXNHBHEk.pgp
Description: PGP signature
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-23 Thread Michael Richardson

Markus Stenberg  wrote:
markus> 1) Can we assume secure L2 and/or appropriate device
markus> configuration by the manufacturer/ISP(/user)? (This is what I can
markus> assume in my own home.)

>> I think that we can assume that wired links are secure.
>> The only time we care if wireless is secured is when we want to form an
>> adjacency over the wireless link.   I think it is acceptable to refuse
>> to form an adjancency over an insecured wireless link.

> This can also be automated (for first-hop wireless). However, in the
> ‘what-if’ land, wired -> wireless bridges, and wireless -> wireless
> extenders that do things insecurely cannot be detected.

Yes, I agree.
Let me restate that I think we can "securely" to do TOFU across the wired
link.  If that link turns into something less secure, then that's okay.

>> I think it is acceptable to do some kind of TOFU (using IPsec with IKEv2
>> even)  point to point across wired links, and having done that, if there
>> is an adjancy later possible between those two devices over what would
>> otherwise be an insecure link,  that the previously exchanged keys work.
>> That means one can plug two routers together with a cable, and then
>> separate them, knowning that the two routers will remain "entangled"
>> (I’m making allusions to 
http://en.m.wikipedia.org/wiki/Quantum_entanglement)

> I assume you mean:

> - On wired links: opportunistic IKEv2 attempt, fallback to non-IPsec
> (if no IPsec available? if no key?), and update the SPD dynamically
> based on successful IKEv2 attempts.

> - On the wireless (all? only insecure?): force IPsec using the known
> good SPD entries.

> That is interesting scheme. Implementation-wise, it sounds somewhat 
painful though.

yes, I agree that it's probably difficult with the available implementation of 
openwrt
IKEv2 daemons...  I don't think it's architecturally that hard.

>> I  further suggest that if two routers have wireless that they might well
>> have a WPA2/PSK available to them, and that they can and SHOULD use 
something
>> derived from that key to authenticate each other.  Could be over IKEv2, 
yes.

> I _think_ we have to assume some passwords somewhere.

> - WPA2 PSK on almost all home routers by default (most home network
> access these days is wireless)

yes, agree.  And if they have multiple routers, they likely have the same 
WPA2-PSK.

> - admin password (for those user actually has access to, and are not
> part of some super-fancy PKI scheme for authenticating administrator)

I'm less thrilled about using the admin password.  They have less likely hood
of being changed, and ideally, they are encrypted/hashed in a way that the
raw password can't be seen.

markus> 2) If not, should the solution be some sort of pre-shared key
markus> scheme? (If not, please explain your alternative solution.)
>>
>> If we assume the abovekey, we could use it to derive a pre-shared key 
for a
>> multicast IPsec SA using AH.  Can we assume, declare, that if you don't 
know
>> the key, that you skip the AH header, and process the HNCP that is 
inside as
>> if it wasn't secured at all?  We wanted to do that for SEND, but there 
were
>> IPsec implementations that could do that, because we overspecified AH 
back in
>> 2401.  Given that home routers are purpose built boxes, and not generic
>> random hosts, perhaps we can specify this behaviour.

> Hmm. I wonder if that assumption would work bidirectionally,
> though. That is, the not-key-knowing router sending plaintext traffic,
> and the others using the information? If so, what is the value of
> having the (optional) authentication at all?

> If assumption is not bidirectional, then the distributed algorithms
> would not work very well over such protocol - unless the
> unauthenticated messages were just used for bootstrapping the trust
> somehow, but it is not clear to me how that would happen either. Of
> course, they could be used to show user some error (if the router
> actually had UI of some kind) but not much else that I can see.

That's what I would suggest: unauthenticated messages are to bootstrap trust.
Possibly that involves an item on a web page saying, "Router XYZ wants to
join Stenberg House, permit Y/N", perhaps can flash "attention" LED on front.

That would only be used if the network had been set to paranoid secure,
and/or if the wired-TOFU didn't work.

markus> 2.1) And if so, should it be manually keyed IPsec (multicast
markus> prevents e.g. IKE)? (This is what is in the draft currently.)

>> Yes, if we can make this AH assumption of skipping, so that we can get 
TOFU
>> to work.

> If we assume some psk on all routers, we can probably bootstrap
> ’something’ without TOFU too?

I agree; but I think that TOFU would be useful here, particula

Re: [homenet] HNCP security?

2014-09-22 Thread Acee Lindem (acee)
I agree with this direction. This will also let the work HCNP and Security
Threats/Requirements to go on in parallel. Of course, HCNP security may
need to be revisited once the latter is agreed upon.
Thanks,
Acee

On 9/21/14, 3:22 PM, "Mark Baugher"  wrote:

>
>On Sep 20, 2014, at 12:57 AM, Steven Barth  wrote:
>
>> 
>> Am 20.09.2014 um 09:17 schrieb Tim Chown:
>>> I think it would be useful to do, and needn't hold up progress. It
>>>would give us a common understanding - hopefully - of which threats are
>>>being covered and which are not. And which are handled by
>>>layers/protocols outside the scope of homenet's charter.
>> We started a similar thread about 3 months ago here:
>>http://www.ietf.org/mail-archive/web/homenet/current/msg03694.html maybe
>>this can be used as a starting point.
>
>It would be good to limit the scope of HNCP security (the subject of this
>thread) and consider IETF homenet security in a companion specification
>that addresses the two differentiators of homenets:  Multiple authorities
>and absence of active management complicate authorization.  These
>differentiators mean there's a different set of problems for
>authorization than what we ordinarily have in IETF protocols.  So HNCP
>might punt the authorization issue like IETF protocols typically do, e.g.
>assume in the worst case that an authorized person installs a shared key.
> But this is not a reasonable assumption in homenets, however, owing to
>the differences of homenets from enterprise, government, military and
>other environments where there typically is a single authority and active
>management of the network.  Thus, authorization is an unavoidable topic
>for Homenet, but the HNCP draft is probably not the place for that.
>
>What I'm suggesting is more than a threats or requirements document.
>
>Mark
>
>> 
>> 
>> Cheers,
>> 
>> Steven
>> 
>> ___
>> homenet mailing list
>> homenet@ietf.org
>> https://www.ietf.org/mailman/listinfo/homenet
>> 
>
>___
>homenet mailing list
>homenet@ietf.org
>https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-21 Thread Mark Baugher

On Sep 20, 2014, at 12:57 AM, Steven Barth  wrote:

> 
> Am 20.09.2014 um 09:17 schrieb Tim Chown:
>> I think it would be useful to do, and needn't hold up progress. It would 
>> give us a common understanding - hopefully - of which threats are being 
>> covered and which are not. And which are handled by layers/protocols outside 
>> the scope of homenet's charter.
> We started a similar thread about 3 months ago here: 
> http://www.ietf.org/mail-archive/web/homenet/current/msg03694.html maybe this 
> can be used as a starting point.

It would be good to limit the scope of HNCP security (the subject of this 
thread) and consider IETF homenet security in a companion specification that 
addresses the two differentiators of homenets:  Multiple authorities and 
absence of active management complicate authorization.  These differentiators 
mean there's a different set of problems for authorization than what we 
ordinarily have in IETF protocols.  So HNCP might punt the authorization issue 
like IETF protocols typically do, e.g. assume in the worst case that an 
authorized person installs a shared key.  But this is not a reasonable 
assumption in homenets, however, owing to the differences of homenets from 
enterprise, government, military and other environments where there typically 
is a single authority and active management of the network.  Thus, 
authorization is an unavoidable topic for Homenet, but the HNCP draft is 
probably not the place for that.

What I'm suggesting is more than a threats or requirements document.

Mark

> 
> 
> Cheers,
> 
> Steven
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet
> 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-20 Thread Steven Barth


Am 20.09.2014 um 09:17 schrieb Tim Chown:

I think it would be useful to do, and needn't hold up progress. It would give 
us a common understanding - hopefully - of which threats are being covered and 
which are not. And which are handled by layers/protocols outside the scope of 
homenet's charter.
We started a similar thread about 3 months ago here: 
http://www.ietf.org/mail-archive/web/homenet/current/msg03694.html maybe 
this can be used as a starting point.



Cheers,

Steven

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-20 Thread Tim Chown
> On 19 Sep 2014, at 21:59, Ted Lemon  wrote:
> 
>> On Sep 19, 2014, at 4:54 PM, Michael Thomas  wrote:
>> I guess that's kind of what I've been getting at: should we capture all of 
>> this in a threats document?
>> I'm a little uncomfortable with the formality, but I'm even more 
>> uncomfortable with the seeming desire
>> by some to sweep this all under the rug.
> 
> I think it would be worth gathering the information in a document if someone 
> wants to write one, sure.   Just talking and not gathering the results is a 
> waste of time.   I think there are a fair number of people who have ideas 
> about how this should work.   I don't know if a threats document per se is 
> the right thing to do, but a document where this discussion is tracked and 
> recorded would definitely be helpful.   It would be a shame though if that 
> effort derailed forward progress, as such things sometimes do.

I think it would be useful to do, and needn't hold up progress. It would give 
us a common understanding - hopefully - of which threats are being covered and 
which are not. And which are handled by layers/protocols outside the scope of 
homenet's charter.

Tim
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 19, 2014, at 4:54 PM, Michael Thomas  wrote:
> I guess that's kind of what I've been getting at: should we capture all of 
> this in a threats document?
> I'm a little uncomfortable with the formality, but I'm even more 
> uncomfortable with the seeming desire
> by some to sweep this all under the rug.

I think it would be worth gathering the information in a document if someone 
wants to write one, sure.   Just talking and not gathering the results is a 
waste of time.   I think there are a fair number of people who have ideas about 
how this should work.   I don't know if a threats document per se is the right 
thing to do, but a document where this discussion is tracked and recorded would 
definitely be helpful.   It would be a shame though if that effort derailed 
forward progress, as such things sometimes do.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas

On 9/19/14, 3:28 AM, Ted Lemon wrote:

On Sep 18, 2014, at 6:04 PM, Mark Baugher  wrote:

As someone on this thread has asked:  Has any of this been written down?  
Requirements, use cases, threat analysis should all help to inform our decision 
about what format to use.

This discussion to some extent made it into the homenet architecture document, 
but I don't think the whole discussion was captured in any document, and that's 
why we're having the discussion again.

I guess that's kind of what I've been getting at: should we capture all 
of this in a threats document?
I'm a little uncomfortable with the formality, but I'm even more 
uncomfortable with the seeming desire

by some to sweep this all under the rug.

If we did, my preference would that it not be HNCP specific.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Brian E Carpenter
On 20/09/2014 08:05, Michael Thomas wrote:
> 
> On 9/19/14, 12:38 PM, Ted Lemon wrote:
>> On Sep 19, 2014, at 1:22 PM, Mark Baugher  wrote:
>>> AFAICT, we've been discussing key format or DLTS vs IPsec.  That
>>> discussion presumes that you have some way for a CPE from ISP-a to
>>> securely accept HNCP from ISP-b, or the user's new AP/router, and so
>>> forth.  How does that happen?
>> Michael Richardson had some suggestions back on the 17th.   There's
>> definitely been more talk of keys than mechanisms since then, but that
>> is precisely why I said what I did about the HNCP key discussion.
>>
> 
> I think the larger implication is that if HNCP has implications of
> needing to deal with
> multiple different trust boundaries and how they interact, asking
> whether we need "IPsec
> or DTLS and then are we done?" is profoundly premature. A home network
> is a vulnerable
> and very complicated environment even today, and adding a lot more
> functionality without
> plumbing the depths of the security implications will only make a bad
> situation much worse.

I agree. I think there are a number of steps to consider, and how
to secure an individual point-to-point communication is late in the
list. Even without a threat analysis, I can see:

1. Establish the boundary (and Tim's recent power-line story
   underlines that this isn't trivial).
2. Establish the trust anchor (you're bound to need one).
3. Establish (trusted identity + public key) for every device.
4. Authorise each device for selected roles.
5. Distribute public keys accordingly.

Do that, and it becomes a relatively minor point which crypto
protocol you choose.

   Brian

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas


On 9/19/14, 12:38 PM, Ted Lemon wrote:

On Sep 19, 2014, at 1:22 PM, Mark Baugher  wrote:

AFAICT, we've been discussing key format or DLTS vs IPsec.  That discussion 
presumes that you have some way for a CPE from ISP-a to securely accept HNCP 
from ISP-b, or the user's new AP/router, and so forth.  How does that happen?

Michael Richardson had some suggestions back on the 17th.   There's definitely 
been more talk of keys than mechanisms since then, but that is precisely why I 
said what I did about the HNCP key discussion.



I think the larger implication is that if HNCP has implications of 
needing to deal with
multiple different trust boundaries and how they interact, asking 
whether we need "IPsec
or DTLS and then are we done?" is profoundly premature. A home network 
is a vulnerable
and very complicated environment even today, and adding a lot more 
functionality without
plumbing the depths of the security implications will only make a bad 
situation much worse.


Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 19, 2014, at 1:22 PM, Mark Baugher  wrote:
> AFAICT, we've been discussing key format or DLTS vs IPsec.  That discussion 
> presumes that you have some way for a CPE from ISP-a to securely accept HNCP 
> from ISP-b, or the user's new AP/router, and so forth.  How does that happen?

Michael Richardson had some suggestions back on the 17th.   There's definitely 
been more talk of keys than mechanisms since then, but that is precisely why I 
said what I did about the HNCP key discussion.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Mark Baugher

On Sep 19, 2014, at 9:37 AM, Ted Lemon  wrote:

> On Sep 19, 2014, at 11:59 AM, Mark Baugher  wrote:
>> How could it happen?
> 
> Isn't that what we've been discussing?

AFAICT, we've been discussing key format or DLTS vs IPsec.  That discussion 
presumes that you have some way for a CPE from ISP-a to securely accept HNCP 
from ISP-b, or the user's new AP/router, and so forth.  How does that happen?

Mark
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet
> 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Randy Turner

A cert by itself is more or less a wrapper ­ but that¹s not the way PKI
works (certs by themselves) - you have certs and trust anchors ­ the anchors
being the method by verifying the identity of the person presenting the cert
­ you can do proof of possession as well to very the identity supplicant
knows the private key.

Randy

From:  Michael Thomas 
Date:  Thursday, September 18, 2014 at 3:06 PM
To:  David R Oran , Rene Struik

Cc:  , Markus Stenberg 
Subject:  Re: [homenet] HNCP security?


 
 
On 9/18/14, 8:57 AM, David R Oran wrote:
 
 
>  
> On Sep 18, 2014, at 11:46 AM, Rene Struik 
> <mailto:rstruik@gmail.com>  wrote:
> 
>  
>>  
>> It seems that the cryptographic literature needs to be rewritten now ...
>> 
>> ==
>> Anything you can do with a cert, you can do with raw public keys, and you
>> don't need CA's. See RFC4871 for an example.
>>  
>  
> I would have thought it was the opposite:
> anything you can do with raw keys you can do with certificates.
>  
 
 FWIW, this is also true even though the rest wasn't. You can always strip
the x509 coating
 and use the raw keys, yes. Which begs the question of why use the coating
if it's not
 doing anything useful, which is pretty much the situation with self-signed
certs.
 
 To paraphrase: 
 
 'Some people, when confronted with a security problem, think "I know, I'll
use certificates." Now they have two problems.'
 
 Mike
 
___ homenet mailing list
homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Douglas Otis

On Sep 19, 2014, at 7:17 AM, Steven Barth  wrote:

> Am 19.09.2014 um 16:00 schrieb Michael Thomas:
>> And it's extremely unlikely that
>> DTLS will be a one-sentence "solution" even if it gets adopted because DTLS, 
>> IPsec, etc say nothing
>> about enrollment and authorization. Those are by far the hard problems with 
>> homenent security.
> I wouldn't really want to lock HNCP to any trust scheme at this point where 
> we are not even sure what we want. I'd rather choose the underlying 
> mechanism, either DTLS or IPsec/IKE and leave the rest out-of-scope. Maybe 
> mention PSK-usage as baseline option and say various other certificate-based 
> approached are possible but out-of-scope of the HNCP draft itself.
> 
> In practice users could probably run either their own in-home CA (e.g. like 
> draft-behringer-homenet-trust-bootstrap) or we could add a web-of-trust-like 
> extension to HNCP using transitive trust as proposed in 
> draft-bonnetain-hncp-security or some weird combination. Either way it all 
> stands and falls with the final user experience, e.g. the APP and the 
> router's interaction with it for trust-bootstrap or the 
> Web-UI/APP/Push-Button which let's you actively "trust" your peer in the 
> web-of-trust approach. But user-experience isn't something we can really 
> specify here.

Dear Steven,

As HNCP is deployed, there should be a sure way to ascertain a "home" network 
from that of outside traffic.  Wi-Fi Protected Setup (WPS) tried to allow home 
users an easy way to add new devices to an existing Wi-Fi network without 
entering long pass-phrases.  Making this easy for users, also made compromising 
the strategy easy for attackers.  Will NFC replace that of the vulnerable PIN?

Nor can ISP assigned prefixes be shared within a home environment without a 
sure way to exclude non-local traffic.  This should not depend on establishing 
cryptographic trust methods because this will not prevent users from being 
deceived; it simply changes what is being unreliably shared.  These methods 
must be bog standard to ensure plumbing works as expected.  One such method 
might attempt to establish an overlay network using the private address space 
defined for IPv6 and IPv4.

Regards,
Douglas Otis




___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 19, 2014, at 11:59 AM, Mark Baugher  wrote:
> How could it happen?

Isn't that what we've been discussing?

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Mark Baugher

On Sep 19, 2014, at 8:54 AM, Ted Lemon  wrote:

> On Sep 19, 2014, at 10:52 AM, Steven Barth  wrote:
>> That was not my point. I'm totally happy with having a standardized way of 
>> doing this but I don't think that HNCP is the place where it should be 
>> defined since we will probably not be the only user.
> 
> HNCP won't be the only user, but given that it's how the network figures 
> itself out, it's really hard to imagine any other place where the process of 
> arriving at mutual trust could happen.  

How could it happen?

Mark

> If it's not in HNCP, it's going to be in a different protocol that looks a 
> lot like HNCP, and runs alongside it, sharing a lot of the same per-device 
> state.
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet
> 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 19, 2014, at 10:52 AM, Steven Barth  wrote:
> That was not my point. I'm totally happy with having a standardized way of 
> doing this but I don't think that HNCP is the place where it should be 
> defined since we will probably not be the only user.

HNCP won't be the only user, but given that it's how the network figures itself 
out, it's really hard to imagine any other place where the process of arriving 
at mutual trust could happen.   If it's not in HNCP, it's going to be in a 
different protocol that looks a lot like HNCP, and runs alongside it, sharing a 
lot of the same per-device state.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas

On 09/19/2014 07:52 AM, Steven Barth wrote:

Am 19.09.2014 um 16:29 schrieb Michael Thomas:
Punting on one of the hardest problems would be a travesty. There are 
plenty of people in IETF that are
plenty smart about this subject; we will never get an opportunity to 
do the right thing again if we loose
this into the wild and say "figure it out yourself." We know what 
happens then.
That was not my point. I'm totally happy with having a standardized 
way of doing this but I don't think that HNCP is the place where it 
should be defined since we will probably not be the only user. Don't 
get me wrong if we or anyone else comes up with a brilliant solution 
I'm all up for referencing it and using it. For HNCP itself what is 
more important to define in my mind is choosing the crypto-mechanism 
or at least I would separate those two discussions.


HNCP or Homenet in general? Given the possibility of leveraging key 
distribution and/or auth/authz information from
HNCP itself, it might not be bad to consider the homenet security issues 
organically. However, if this is a plea for
kicking this down the road to some non-existent working group, I don't 
agree at all, and nor do I think that the

architecture would permit that.



The other point is, it doesn't matter how technically brilliant the 
solution is in the end if the user experience isn't good enough and 
that is outside our control really. Adding to that judging from 
experience with consumer-oriented hardware, if we get HNCP adopted 
then the baseline of products will probably support no-auth or maybe 
PSK if we are lucky unless we actually forbid unencrypted HNCP and / 
or PSK-secured HNCP and I'm not sure I personally would want to go 
there really.


This is the danger of saying later, or even a "YOU MUST IMPLEMENT RFC 
XXX TOO" requirement. We've seen this
way too many times in the past and it will  be a complete mess if don't 
take a hard line, IMO.


Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Steven Barth

Am 19.09.2014 um 16:29 schrieb Michael Thomas:
Punting on one of the hardest problems would be a travesty. There are 
plenty of people in IETF that are
plenty smart about this subject; we will never get an opportunity to 
do the right thing again if we loose
this into the wild and say "figure it out yourself." We know what 
happens then.
That was not my point. I'm totally happy with having a standardized way 
of doing this but I don't think that HNCP is the place where it should 
be defined since we will probably not be the only user. Don't get me 
wrong if we or anyone else comes up with a brilliant solution I'm all up 
for referencing it and using it. For HNCP itself what is more important 
to define in my mind is choosing the crypto-mechanism or at least I 
would separate those two discussions.


The other point is, it doesn't matter how technically brilliant the 
solution is in the end if the user experience isn't good enough and that 
is outside our control really. Adding to that judging from experience 
with consumer-oriented hardware, if we get HNCP adopted then the 
baseline of products will probably support no-auth or maybe PSK if we 
are lucky unless we actually forbid unencrypted HNCP and / or 
PSK-secured HNCP and I'm not sure I personally would want to go there 
really.



Cheers,

Steven

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas

On 09/19/2014 07:17 AM, Steven Barth wrote:

Am 19.09.2014 um 16:00 schrieb Michael Thomas:

And it's extremely unlikely that
DTLS will be a one-sentence "solution" even if it gets adopted 
because DTLS, IPsec, etc say nothing
about enrollment and authorization. Those are by far the hard 
problems with homenent security.
I wouldn't really want to lock HNCP to any trust scheme at this point 
where we are not even sure what we want. I'd rather choose the 
underlying mechanism, either DTLS or IPsec/IKE and leave the rest 
out-of-scope. Maybe mention PSK-usage as baseline option and say 
various other certificate-based approached are possible but 
out-of-scope of the HNCP draft itself.


In practice users could probably run either their own in-home CA (e.g. 
like draft-behringer-homenet-trust-bootstrap) or we could add a 
web-of-trust-like extension to HNCP using transitive trust as proposed 
in draft-bonnetain-hncp-security or some weird combination. Either way 
it all stands and falls with the final user experience, e.g. the APP 
and the router's interaction with it for trust-bootstrap or the 
Web-UI/APP/Push-Button which let's you actively "trust" your peer in 
the web-of-trust approach. But user-experience isn't something we can 
really specify here.




Let's be clear: the enrollment and authorization problems are The hard 
problems. How the bits one the
wire are encrypted/authenticated is straightforward in comparison. Not 
having a standardized way of
setting this up will lead to chaos and the high likelihood that homenet 
devices will not interoperate. Doubly
so because the homenet architecture requires as little operator 
intervention as possible.


Punting on one of the hardest problems would be a travesty. There are 
plenty of people in IETF that are
plenty smart about this subject; we will never get an opportunity to do 
the right thing again if we loose
this into the wild and say "figure it out yourself." We know what 
happens then.


Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Steven Barth

Am 19.09.2014 um 16:00 schrieb Michael Thomas:

And it's extremely unlikely that
DTLS will be a one-sentence "solution" even if it gets adopted because 
DTLS, IPsec, etc say nothing
about enrollment and authorization. Those are by far the hard problems 
with homenent security.
I wouldn't really want to lock HNCP to any trust scheme at this point 
where we are not even sure what we want. I'd rather choose the 
underlying mechanism, either DTLS or IPsec/IKE and leave the rest 
out-of-scope. Maybe mention PSK-usage as baseline option and say various 
other certificate-based approached are possible but out-of-scope of the 
HNCP draft itself.


In practice users could probably run either their own in-home CA (e.g. 
like draft-behringer-homenet-trust-bootstrap) or we could add a 
web-of-trust-like extension to HNCP using transitive trust as proposed 
in draft-bonnetain-hncp-security or some weird combination. Either way 
it all stands and falls with the final user experience, e.g. the APP and 
the router's interaction with it for trust-bootstrap or the 
Web-UI/APP/Push-Button which let's you actively "trust" your peer in the 
web-of-trust approach. But user-experience isn't something we can really 
specify here.


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas

On 09/19/2014 02:06 AM, Markus Stenberg wrote:

On 19.9.2014, at 11.18, Mark Townsley  wrote:

My own experience attempting to use IPsec as an add-on security solution (a.k.a. 
"pixie dust) for a protocol isn't all that positive. We tried that with L2TP, 
and in the process failed to kill off PPTP on windows clients. I can't tell you how 
many times over the years I've had to point people to the Windows Registry setting 
to disable IPsec with L2TP. OSPFv3 is another one where I get complaints about 
requiring IPsec. So, I agree with Ted; We should be wary of falling into the trap of 
using IPsec just because it is there.

So DTLS it is? Because I do not want to reinvent any crypto wheels I do not 
have to.


Without a list of threats, it's impossible to know if "DTLS is it". And 
it's extremely unlikely that
DTLS will be a one-sentence "solution" even if it gets adopted because 
DTLS, IPsec, etc say nothing
about enrollment and authorization. Those are by far the hard problems 
with homenent security.


The thing that I'm curious about is whether we can use HNCP itself as a 
way to distribute authz
for itself, and potentially for other homenet related protocols, cf 
Brian's MUST a few messages ago.


Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Michael Thomas

On 09/19/2014 01:18 AM, Mark Townsley wrote:



Another lesson learned was exposing two passwords to the user vs. one. 
In a retail/wholesale LAC/LNS deployment model, it made perfect sense 
for the L2TP tunnel to have a password separate from the PPP user 
password (and L2TP fully supplanted L2F in these types of 
deployments). But when the L2TP tunnel and the PPP session are are at 
the same point it just looks redundant to the end user to have 
separate security config for each (let alone IPsec on top). Knowing 
the difference between a tail and a dog is important[1], and it was a 
very bad idea to let the protocol design influence the UI. In 
retrospect, allowing one protocol to bootstrap the security in another 
would have been a good thing for us to have considered more.




If we are going to be using a password as the root means of providing 
authorization to participate in routing or
not, we can't use the same password that is used for access control to 
my network (wpa2), or to another network in
your example (ppp, l2tp) or any derived value of it. I don't want my 
local users or much worse -- my ISP's -- to be able
derive a key they already possess for one reason, and be able have at my 
infrastructure's control plane.


Best of all would not to use passwords altogether, cf the zillions of 
hacks on trivially guessable passwords ("MyDoGsPoT").


Mike
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Mark Baugher

On Sep 19, 2014, at 3:25 AM, Ted Lemon  wrote:

> On Sep 18, 2014, at 6:46 PM, Mark Baugher  wrote:
>> The retail model works here.  I can imagine a compliant CPE might allow the 
>> use to "take ownership" of an interior HNCP interface. That's only if the 
>> provider of that CPE wanted to be compliant to a future HNCP security 
>> standard.
> 
> So to be clear, we are now talking about setting up a system where, with 
> HNCP, routers can be anointed by the manufacturer in a registry that ordinary 
> folks wouldn't have access to.  

No, that's the exact opposite of what I think.  It's what I meant to write as 
"...allow the use[r] to take ownership of the interior HNCP interface.

> To put it as mildly as possible, I do not support this suggestion: I want 
> home routers to be under the control of the user, not the manufacturer.

How could it be otherwise?  If you have two service providers in a household, 
how would one take authority over the other?  And what does the manufacturer 
have to do with it?  There might be a device from a third or a other 
provider/authority in the household.  For that reason, it is not realistic to 
define layer 4 or layer 3 security bindings and then "punt" on authorization.  
Unlike enterprise or public networks, there is no single authority with an IT 
department to insert pre-shared keys in the devices or set up a CA. 

My suggestion is to start with authorization, because there are potentially 
multiple owners of the routers, and there needs to be some means for the 
owner/user of the network to "Take Ownership," which is a term used by Walker 
and Ellison in their home network security work.  This has all be designed and 
implemented before.

Mark
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 18, 2014, at 6:04 PM, Mark Baugher  wrote:
> As someone on this thread has asked:  Has any of this been written down?  
> Requirements, use cases, threat analysis should all help to inform our 
> decision about what format to use.

This discussion to some extent made it into the homenet architecture document, 
but I don't think the whole discussion was captured in any document, and that's 
why we're having the discussion again.   I agree that we discussed this before, 
but we are getting a little bit more into the details now, so I don't think 
that's a bad thing.   This discussion doesn't seem to have degenerated into a 
bunch of people talking past each other, so let's be thankful for small favors. 
  :)

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Ted Lemon
On Sep 18, 2014, at 6:46 PM, Mark Baugher  wrote:
> The retail model works here.  I can imagine a compliant CPE might allow the 
> use to "take ownership" of an interior HNCP interface. That's only if the 
> provider of that CPE wanted to be compliant to a future HNCP security 
> standard.

So to be clear, we are now talking about setting up a system where, with HNCP, 
routers can be anointed by the manufacturer in a registry that ordinary folks 
wouldn't have access to.   To put it as mildly as possible, I do not support 
this suggestion: I want home routers to be under the control of the user, not 
the manufacturer.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Markus Stenberg
On 19.9.2014, at 11.18, Mark Townsley  wrote:
> My own experience attempting to use IPsec as an add-on security solution 
> (a.k.a. "pixie dust) for a protocol isn't all that positive. We tried that 
> with L2TP, and in the process failed to kill off PPTP on windows clients. I 
> can't tell you how many times over the years I've had to point people to the 
> Windows Registry setting to disable IPsec with L2TP. OSPFv3 is another one 
> where I get complaints about requiring IPsec. So, I agree with Ted; We should 
> be wary of falling into the trap of using IPsec just because it is there.

So DTLS it is? Because I do not want to reinvent any crypto wheels I do not 
have to.

>From solution point of view, the only real difference is that DTLS solution 
>cannot be used to secure other protocols between the routers (just with 
>configuration), but I am sure we can stick in some pixie dust PSK TLVs to keep 
>the other protocols’ (bad) security solutions (mostly) functioning.

Cheers,

-Markus
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-19 Thread Mark Townsley

On Sep 18, 2014, at 12:34 PM, Ted Lemon  wrote:

> On Sep 18, 2014, at 4:27 AM, STARK, BARBARA H  wrote:
>> UPnP Device Protection uses X.509 certificates (which can be self-signed, 
>> and in order not to assume a WAN connection, really should be self-signed) 
>> and TLS.
> 
> I think that something like this, in combination with the promiscuous 
> registration mechanism that I think Michael described earlier, would do the 
> trick.   It's not clear that we need X.509 certs, since I have trouble 
> imagining that the keys these devices have would ever be signed by a CA.   A 
> bare key might be plenty.   But I think this is a better option than trying 
> to shoehorn this functionality into IPsec, which was designed for a _very_ 
> different security context.

My own experience attempting to use IPsec as an add-on security solution 
(a.k.a. "pixie dust) for a protocol isn't all that positive. We tried that with 
L2TP, and in the process failed to kill off PPTP on windows clients. I can't 
tell you how many times over the years I've had to point people to the Windows 
Registry setting to disable IPsec with L2TP. OSPFv3 is another one where I get 
complaints about requiring IPsec. So, I agree with Ted; We should be wary of 
falling into the trap of using IPsec just because it is there.

Another lesson learned was exposing two passwords to the user vs. one. In a 
retail/wholesale LAC/LNS deployment model, it made perfect sense for the L2TP 
tunnel to have a password separate from the PPP user password (and L2TP fully 
supplanted L2F in these types of deployments). But when the L2TP tunnel and the 
PPP session are are at the same point it just looks redundant to the end user 
to have separate security config for each (let alone IPsec on top). Knowing the 
difference between a tail and a dog is important[1], and it was a very bad idea 
to let the protocol design influence the UI. In retrospect, allowing one 
protocol to bootstrap the security in another would have been a good thing for 
us to have considered more. 

- Mark

[1] http://www.urbandictionary.com/define.php?term=the+tail+wagging+the+dog

> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Randy Turner
Yes I was only stating that establishing a root of trust for device 
authentication seems to work - as Brian said, authorization is a different 
thing. However, authorization might be assisted by an existing trust 
relationship for identity.

Randy




Sent from my Verizon Wireless 4G LTE smartphone


 Original message 
From: "STARK, BARBARA H"  
Date:09/18/2014  5:02 PM  (GMT-06:00) 
To: Randy Turner , Michael Thomas , 
homenet@ietf.org 
Cc:  
Subject: RE: [homenet] HNCP security? 

> How do you bootstrap trust relationships without an initial certificate 
> (whether installed at manufacturing or during a customer fulfillment stage) ?

There's a difference between trusting (authenticating) a device when it says 
"this is my key; whenever you see this key you can trust that it's me and 
no-one else" and trusting (authorizing) a device to perform a particular role 
of, e.g.,  "a user-approved router in the user's home network".

If the device signs its own key, you can usually trust that it is itself. But I 
do believe that providing authorization requires user configuration. If the 
user is unwilling to participate in providing authorization, then the user is 
choosing to run HNCP unsecured. It should be possible to run HNCP unsecured 
with zero configuration (just as with the powerline adaptors it was possible to 
set up the network without pushing the buttons). But if the user wants 
security, then the user has to be involved. Even if it's just to push a button 
on 2 devices within a 2 minute window (which on most "no new wires" PHY layer 
devices effectively authorizes the device to participate in the network). I 
really see no way to enable security without some user involvement. And as long 
as the user has the choice to run without security, I see no problem in 
requiring it.
Barbara

 Original message 
From: Michael Thomas  
Date:09/18/2014 4:17 PM (GMT-06:00) 
To: homenet@ietf.org 
Cc: 
Subject: Re: [homenet] HNCP security? 


On 9/18/14, 2:10 PM, STARK, BARBARA H wrote:
>> Self-signed certs bring only confusion, IMO: they are nothing more than a
>> raw key with an unsubstantiated claim to another name, along with a whole
>> lot more ASN.1 baggage beyond what is needed to parse the modulo and
>> exponent.
>>
>> And you don't get usage or policy restrictions without a CA that the
>> *HOMENET* trusts to assert them, nor can that sort of policy assertion be
>> done with device certs since I don't have any reason to believe 
>> fly-by-night's
>> routers should be allowed to do whatever it is they claim they want to do.
> No, this would only be true if there were an implied authorization to go 
> along with the authentication.

Yes, I agree and that's why self-signed and/or manufacturer certs are of 
no help.
There is no believable authz in them. A homenet would need to run its 
own CA, or
use a CA that it delegates authz to. Or does something that avoids certs 
altogether
and provides its own enrollment/authz solution.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas


On 9/18/14, 3:43 PM, Randy Turner wrote:
Are we assuming that the home router is purchased retail, and not 
"fulfilled" or provided by an ISP? The method to establish trust 
relationships would hinge on the answer




I should be able prepurpose an old PC with linux running homenet 
software. We can

make no assumptions about where my PC came from initially.

Mike
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Mark Baugher
The retail model works here.  I can imagine a compliant CPE might allow the use 
to "take ownership" of an interior HNCP interface.  That's only if the provider 
of that CPE wanted to be compliant to a future HNCP security standard.

Mark

On Sep 18, 2014, at 3:43 PM, Randy Turner  wrote:

> Are we assuming that the home router is purchased retail, and not "fulfilled" 
> or provided by an ISP? The method to establish trust relationships would 
> hinge on the answer
> 
> Randy
> 
> 
> 
>  Original message 
> From: Mark Baugher  
> Date:09/18/2014 5:12 PM (GMT-06:00) 
> To: Randy Turner  
> Cc: "homenet@ietf.org Group"  
> Subject: Re: [homenet] HNCP security? 
> 
> 
> On Sep 18, 2014, at 2:37 PM, Randy Turner  wrote:
> 
> > How do you bootstrap trust relationships without an initial certificate 
> > (whether installed at manufacturing or during a customer fulfillment stage) 
> > ?
> 
> One way is through a user "security ceremony" (viz. Walker and Ellison) in 
> the Wi-Fi and UPnP standards: The user pushes a recites a password, pushes 
> buttons, waves an NFC device, etc. to authorize, e.g. sign the router's 
> self-signed cert so other routers will accept its HNCP.  That's a root of 
> trust model.  I'm sure there are other such models.  There's been some talk 
> about using web of trust, but I don't understand how that would work.
> 
> Mark
> 
> > 
> > 
> > 
> >  Original message 
> > From: Michael Thomas  
> > Date:09/18/2014 4:17 PM (GMT-06:00) 
> > To: homenet@ietf.org 
> > Cc: 
> > Subject: Re: [homenet] HNCP security? 
> > 
> > 
> > On 9/18/14, 2:10 PM, STARK, BARBARA H wrote:
> > >> Self-signed certs bring only confusion, IMO: they are nothing more than a
> > >> raw key with an unsubstantiated claim to another name, along with a whole
> > >> lot more ASN.1 baggage beyond what is needed to parse the modulo and
> > >> exponent.
> > >>
> > >> And you don't get usage or policy restrictions without a CA that the
> > >> *HOMENET* trusts to assert them, nor can that sort of policy assertion be
> > >> done with device certs since I don't have any reason to believe 
> > >> fly-by-night's
> > >> routers should be allowed to do whatever it is they claim they want to 
> > >> do.
> > > No, this would only be true if there were an implied authorization to go 
> > > along with the authentication.
> > 
> > Yes, I agree and that's why self-signed and/or manufacturer certs are of 
> > no help.
> > There is no believable authz in them. A homenet would need to run its 
> > own CA, or
> > use a CA that it delegates authz to. Or does something that avoids certs 
> > altogether
> > and provides its own enrollment/authz solution.
> > 
> > Mike
> > 
> > ___
> > homenet mailing list
> > homenet@ietf.org
> > https://www.ietf.org/mailman/listinfo/homenet
> > 
> > ___
> > homenet mailing list
> > homenet@ietf.org
> > https://www.ietf.org/mailman/listinfo/homenet
> 
> 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas


On 9/18/14, 3:39 PM, Brian E Carpenter wrote:



Yes, I agree and that's why self-signed and/or manufacturer certs are of
no help.

Surely they are of help for secure *identification* of devices?


No more so than the naked public key.


Authorisation is a separate step.


Yes.


There is no believable authz in them. A homenet would need to run its
own CA, or
use a CA that it delegates authz to. Or does something that avoids certs
altogether
and provides its own enrollment/authz solution.

Yes, but with the identity of the devices verified by cert.


A cert, at its heart, is used to bind a name (CN, DN, etc) to a key. You 
don't need a
human friendly name binding to identify something that possesses the 
corresponding

private key though. The public key itself is a unique identifier.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Randy Turner
Are we assuming that the home router is purchased retail, and not "fulfilled" 
or provided by an ISP? The method to establish trust relationships would hinge 
on the answer

Randy



 Original message 
From: Mark Baugher  
Date:09/18/2014  5:12 PM  (GMT-06:00) 
To: Randy Turner  
Cc: "homenet@ietf.org Group"  
Subject: Re: [homenet] HNCP security? 


On Sep 18, 2014, at 2:37 PM, Randy Turner  wrote:

> How do you bootstrap trust relationships without an initial certificate 
> (whether installed at manufacturing or during a customer fulfillment stage) ?

One way is through a user "security ceremony" (viz. Walker and Ellison) in the 
Wi-Fi and UPnP standards: The user pushes a recites a password, pushes buttons, 
waves an NFC device, etc. to authorize, e.g. sign the router's self-signed cert 
so other routers will accept its HNCP.  That's a root of trust model.  I'm sure 
there are other such models.  There's been some talk about using web of trust, 
but I don't understand how that would work.

Mark

> 
> 
> 
>  Original message 
> From: Michael Thomas  
> Date:09/18/2014 4:17 PM (GMT-06:00) 
> To: homenet@ietf.org 
> Cc: 
> Subject: Re: [homenet] HNCP security? 
> 
> 
> On 9/18/14, 2:10 PM, STARK, BARBARA H wrote:
> >> Self-signed certs bring only confusion, IMO: they are nothing more than a
> >> raw key with an unsubstantiated claim to another name, along with a whole
> >> lot more ASN.1 baggage beyond what is needed to parse the modulo and
> >> exponent.
> >>
> >> And you don't get usage or policy restrictions without a CA that the
> >> *HOMENET* trusts to assert them, nor can that sort of policy assertion be
> >> done with device certs since I don't have any reason to believe 
> >> fly-by-night's
> >> routers should be allowed to do whatever it is they claim they want to do.
> > No, this would only be true if there were an implied authorization to go 
> > along with the authentication.
> 
> Yes, I agree and that's why self-signed and/or manufacturer certs are of 
> no help.
> There is no believable authz in them. A homenet would need to run its 
> own CA, or
> use a CA that it delegates authz to. Or does something that avoids certs 
> altogether
> and provides its own enrollment/authz solution.
> 
> Mike
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Brian E Carpenter
On 19/09/2014 09:17, Michael Thomas wrote:
> 
> On 9/18/14, 2:10 PM, STARK, BARBARA H wrote:
>>> Self-signed certs bring only confusion, IMO: they are nothing more
>>> than a
>>> raw key with an unsubstantiated claim to another name, along with a
>>> whole
>>> lot more ASN.1 baggage beyond what is needed to parse the modulo and
>>> exponent.
>>>
>>> And you don't get usage or policy restrictions without a CA that the
>>> *HOMENET* trusts to assert them, nor can that sort of policy
>>> assertion be
>>> done with device certs since I don't have any reason to believe
>>> fly-by-night's
>>> routers should be allowed to do whatever it is they claim they want
>>> to do.
>> No, this would only be true if there were an implied authorization to
>> go along with the authentication.
> 
> Yes, I agree and that's why self-signed and/or manufacturer certs are of
> no help.

Surely they are of help for secure *identification* of devices?
Authorisation is a separate step.

> There is no believable authz in them. A homenet would need to run its
> own CA, or
> use a CA that it delegates authz to. Or does something that avoids certs
> altogether
> and provides its own enrollment/authz solution.

Yes, but with the identity of the devices verified by cert.

   Brian

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Mark Baugher

On Sep 18, 2014, at 2:37 PM, Randy Turner  wrote:

> How do you bootstrap trust relationships without an initial certificate 
> (whether installed at manufacturing or during a customer fulfillment stage) ?

One way is through a user "security ceremony" (viz. Walker and Ellison) in the 
Wi-Fi and UPnP standards: The user pushes a recites a password, pushes buttons, 
waves an NFC device, etc. to authorize, e.g. sign the router's self-signed cert 
so other routers will accept its HNCP.  That's a root of trust model.  I'm sure 
there are other such models.  There's been some talk about using web of trust, 
but I don't understand how that would work.

Mark

> 
> 
> 
>  Original message 
> From: Michael Thomas  
> Date:09/18/2014 4:17 PM (GMT-06:00) 
> To: homenet@ietf.org 
> Cc: 
> Subject: Re: [homenet] HNCP security? 
> 
> 
> On 9/18/14, 2:10 PM, STARK, BARBARA H wrote:
> >> Self-signed certs bring only confusion, IMO: they are nothing more than a
> >> raw key with an unsubstantiated claim to another name, along with a whole
> >> lot more ASN.1 baggage beyond what is needed to parse the modulo and
> >> exponent.
> >>
> >> And you don't get usage or policy restrictions without a CA that the
> >> *HOMENET* trusts to assert them, nor can that sort of policy assertion be
> >> done with device certs since I don't have any reason to believe 
> >> fly-by-night's
> >> routers should be allowed to do whatever it is they claim they want to do.
> > No, this would only be true if there were an implied authorization to go 
> > along with the authentication.
> 
> Yes, I agree and that's why self-signed and/or manufacturer certs are of 
> no help.
> There is no believable authz in them. A homenet would need to run its 
> own CA, or
> use a CA that it delegates authz to. Or does something that avoids certs 
> altogether
> and provides its own enrollment/authz solution.
> 
> Mike
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Mark Baugher
And all of this was covered in the design for UPnP Device Protection that you 
referred to earlier and its progenitor UPnP Device Security.  I consider HNCP 
security to be a small subset of the UPnP device requirements.

Mark
On Sep 18, 2014, at 2:10 PM, STARK, BARBARA H  wrote:

>> Self-signed certs bring only confusion, IMO: they are nothing more than a
>> raw key with an unsubstantiated claim to another name, along with a whole
>> lot more ASN.1 baggage beyond what is needed to parse the modulo and
>> exponent.
>> 
>> And you don't get usage or policy restrictions without a CA that the
>> *HOMENET* trusts to assert them, nor can that sort of policy assertion be
>> done with device certs since I don't have any reason to believe 
>> fly-by-night's
>> routers should be allowed to do whatever it is they claim they want to do.
> 
> No, this would only be true if there were an implied authorization to go 
> along with the authentication. That's why it's so important for the user to 
> have to take an initial step of providing authorization (in the event where 
> the user has chosen to secure homenet -- of course the use should have the 
> option not to force homenet to run securely, just like the user can choose to 
> run Wi-Fi without security or not to push the buttons on powerline networking 
> devices [distinct from the buttons on Wi-Fi devices] in order to create a 
> secure powerline network).
> 
> Since the user should be responsible for providing authorization, and 
> authentication should be completely separated from authorization, the key is 
> *only* for authentication. The key would only need to be revoked if it were 
> believed that some other device were using the key (the key to device 
> association could no longer be trusted). Revoking authorization is done by 
> changing the role that a device using the key is allowed to perform. The user 
> should be able to do this. And then the same mechanism used to provide new 
> devices with the key/role list can be used to supply all devices with the 
> updated key/role list.
> 
> If a key is associated with a "guest" role, it shouldn't be necessary to 
> delete that entry in the key/role list unless the user really wants to make 
> sure that the device is not allowed to come back again as a guest. A user who 
> cares to should be able to edit the key/role list whenever they like 
> (including deleting entries). But a user who does not choose to ever edit the 
> list when there is no evidence of a problem would be fine. A "friendly name" 
> is important. But that's becoming important to so many things in the home 
> network.
> Barbara
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet
> 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Mark Baugher

On Sep 18, 2014, at 8:57 AM, David R Oran  wrote:

> 
> On Sep 18, 2014, at 11:46 AM, Rene Struik  wrote:
> 
>> It seems that the cryptographic literature needs to be rewritten now ...
>> 
>> ==
>> Anything you can do with a cert, you can do with raw public keys, and you 
>> don't need CA's. See RFC4871 for an example.
> I would have thought it was the opposite:
> anything you can do with raw keys you can do with certificates.
> 
> Raw keys cannot prove an assertion that a certain claimed name is bound to a 
> certain key. In the case of self-signed certs you only get the advantages of 
> having a data structure and code that is understood and well vetted, but with 
> either a PKI or a web of trust you do get benefits from using Certs. You also 
> get usage policy restrictions, which cannot be expressed with raw keys.

Agreed and this whole discussion is deju vu all over again for me, and no 
longer very interesting.  What's more important than the container is how keys 
come to get authorized or rejected, what authorization "means" and how to 
revoke it, do an on-line test, etc.  

As someone on this thread has asked:  Has any of this been written down?  
Requirements, use cases, threat analysis should all help to inform our decision 
about what format to use.

Mark

> 
>> 
>> On 9/18/2014 11:36 AM, Michael Thomas wrote:
>>> On 09/18/2014 08:31 AM, Markus Stenberg wrote:
 whether your authorization policy is leap of faithy, or strict ’these are 
 the authorized CAs/individual certs’, there is no way to express same 
 things with raw public keys (or you wind up with new X509, which is in 
 nobody’s best interest).
 
>>> 
>>> 
>>> 
>>> Mike
>>> 
>>> ___
>>> homenet mailing list
>>> homenet@ietf.org
>>> https://www.ietf.org/mailman/listinfo/homenet
>> 
>> 
>> -- 
>> email: rstruik@gmail.com | Skype: rstruik
>> cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
>> 
>> ___
>> homenet mailing list
>> homenet@ietf.org
>> https://www.ietf.org/mailman/listinfo/homenet
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet
> 
> 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread STARK, BARBARA H
> How do you bootstrap trust relationships without an initial certificate 
> (whether installed at manufacturing or during a customer fulfillment stage) ?

There's a difference between trusting (authenticating) a device when it says 
"this is my key; whenever you see this key you can trust that it's me and 
no-one else" and trusting (authorizing) a device to perform a particular role 
of, e.g.,  "a user-approved router in the user's home network".

If the device signs its own key, you can usually trust that it is itself. But I 
do believe that providing authorization requires user configuration. If the 
user is unwilling to participate in providing authorization, then the user is 
choosing to run HNCP unsecured. It should be possible to run HNCP unsecured 
with zero configuration (just as with the powerline adaptors it was possible to 
set up the network without pushing the buttons). But if the user wants 
security, then the user has to be involved. Even if it's just to push a button 
on 2 devices within a 2 minute window (which on most "no new wires" PHY layer 
devices effectively authorizes the device to participate in the network). I 
really see no way to enable security without some user involvement. And as long 
as the user has the choice to run without security, I see no problem in 
requiring it.
Barbara

 Original message 
From: Michael Thomas  
Date:09/18/2014 4:17 PM (GMT-06:00) 
To: homenet@ietf.org 
Cc: 
Subject: Re: [homenet] HNCP security? 


On 9/18/14, 2:10 PM, STARK, BARBARA H wrote:
>> Self-signed certs bring only confusion, IMO: they are nothing more than a
>> raw key with an unsubstantiated claim to another name, along with a whole
>> lot more ASN.1 baggage beyond what is needed to parse the modulo and
>> exponent.
>>
>> And you don't get usage or policy restrictions without a CA that the
>> *HOMENET* trusts to assert them, nor can that sort of policy assertion be
>> done with device certs since I don't have any reason to believe 
>> fly-by-night's
>> routers should be allowed to do whatever it is they claim they want to do.
> No, this would only be true if there were an implied authorization to go 
> along with the authentication.

Yes, I agree and that's why self-signed and/or manufacturer certs are of 
no help.
There is no believable authz in them. A homenet would need to run its 
own CA, or
use a CA that it delegates authz to. Or does something that avoids certs 
altogether
and provides its own enrollment/authz solution.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Randy Turner
How do you bootstrap trust relationships without an initial certificate 
(whether installed at manufacturing or during a customer fulfillment stage) ?



 Original message 
From: Michael Thomas  
Date:09/18/2014  4:17 PM  (GMT-06:00) 
To: homenet@ietf.org 
Cc:  
Subject: Re: [homenet] HNCP security? 


On 9/18/14, 2:10 PM, STARK, BARBARA H wrote:
>> Self-signed certs bring only confusion, IMO: they are nothing more than a
>> raw key with an unsubstantiated claim to another name, along with a whole
>> lot more ASN.1 baggage beyond what is needed to parse the modulo and
>> exponent.
>>
>> And you don't get usage or policy restrictions without a CA that the
>> *HOMENET* trusts to assert them, nor can that sort of policy assertion be
>> done with device certs since I don't have any reason to believe 
>> fly-by-night's
>> routers should be allowed to do whatever it is they claim they want to do.
> No, this would only be true if there were an implied authorization to go 
> along with the authentication.

Yes, I agree and that's why self-signed and/or manufacturer certs are of 
no help.
There is no believable authz in them. A homenet would need to run its 
own CA, or
use a CA that it delegates authz to. Or does something that avoids certs 
altogether
and provides its own enrollment/authz solution.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas


On 9/18/14, 2:10 PM, STARK, BARBARA H wrote:

Self-signed certs bring only confusion, IMO: they are nothing more than a
raw key with an unsubstantiated claim to another name, along with a whole
lot more ASN.1 baggage beyond what is needed to parse the modulo and
exponent.

And you don't get usage or policy restrictions without a CA that the
*HOMENET* trusts to assert them, nor can that sort of policy assertion be
done with device certs since I don't have any reason to believe fly-by-night's
routers should be allowed to do whatever it is they claim they want to do.

No, this would only be true if there were an implied authorization to go along 
with the authentication.


Yes, I agree and that's why self-signed and/or manufacturer certs are of 
no help.
There is no believable authz in them. A homenet would need to run its 
own CA, or
use a CA that it delegates authz to. Or does something that avoids certs 
altogether

and provides its own enrollment/authz solution.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread STARK, BARBARA H
> Self-signed certs bring only confusion, IMO: they are nothing more than a
> raw key with an unsubstantiated claim to another name, along with a whole
> lot more ASN.1 baggage beyond what is needed to parse the modulo and
> exponent.
> 
> And you don't get usage or policy restrictions without a CA that the
> *HOMENET* trusts to assert them, nor can that sort of policy assertion be
> done with device certs since I don't have any reason to believe fly-by-night's
> routers should be allowed to do whatever it is they claim they want to do.

No, this would only be true if there were an implied authorization to go along 
with the authentication. That's why it's so important for the user to have to 
take an initial step of providing authorization (in the event where the user 
has chosen to secure homenet -- of course the use should have the option not to 
force homenet to run securely, just like the user can choose to run Wi-Fi 
without security or not to push the buttons on powerline networking devices 
[distinct from the buttons on Wi-Fi devices] in order to create a secure 
powerline network).

Since the user should be responsible for providing authorization, and 
authentication should be completely separated from authorization, the key is 
*only* for authentication. The key would only need to be revoked if it were 
believed that some other device were using the key (the key to device 
association could no longer be trusted). Revoking authorization is done by 
changing the role that a device using the key is allowed to perform. The user 
should be able to do this. And then the same mechanism used to provide new 
devices with the key/role list can be used to supply all devices with the 
updated key/role list.

If a key is associated with a "guest" role, it shouldn't be necessary to delete 
that entry in the key/role list unless the user really wants to make sure that 
the device is not allowed to come back again as a guest. A user who cares to 
should be able to edit the key/role list whenever they like (including deleting 
entries). But a user who does not choose to ever edit the list when there is no 
evidence of a problem would be fine. A "friendly name" is important. But that's 
becoming important to so many things in the home network.
Barbara

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas


On 9/18/14, 8:57 AM, David R Oran wrote:

On Sep 18, 2014, at 11:46 AM, Rene Struik  wrote:


It seems that the cryptographic literature needs to be rewritten now ...

==
Anything you can do with a cert, you can do with raw public keys, and you don't 
need CA's. See RFC4871 for an example.

I would have thought it was the opposite:
anything you can do with raw keys you can do with certificates.


FWIW, this is also true even though the rest wasn't. You can always 
strip the x509 coating
and use the raw keys, yes. Which begs the question of why use the 
coating if it's not
doing anything useful, which is pretty much the situation with 
self-signed certs.


To paraphrase:

'Some people, when confronted with a security problem, think "I know, 
I'll use certificates." Now they have two problems.'


Mike
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas

On 09/18/2014 08:57 AM, David R Oran wrote:

On Sep 18, 2014, at 11:46 AM, Rene Struik  wrote:


It seems that the cryptographic literature needs to be rewritten now ...

==
Anything you can do with a cert, you can do with raw public keys, and you don't 
need CA's. See RFC4871 for an example.

I would have thought it was the opposite:
anything you can do with raw keys you can do with certificates.

Raw keys cannot prove an assertion that a certain claimed name is bound to a 
certain key. In the case of self-signed certs you only get the advantages of 
having a data structure and code that is understood and well vetted, but with 
either a PKI or a web of trust you do get benefits from using Certs. You also 
get usage policy restrictions, which cannot be expressed with raw keys.


Raw keys in and of themselves provide provable identifiers of the public 
key: the fingerprint itself. It remains
to be seen whether some other identity needs to be bound to it, and, of 
course, certs are hardly the only way

to do that.

Self-signed certs bring only confusion, IMO: they are nothing more than 
a raw key with an unsubstantiated claim to
another name, along with a whole lot more ASN.1 baggage beyond what is 
needed to parse the modulo

and exponent.

And you don't get usage or policy restrictions without a CA that the 
*HOMENET* trusts to assert them, nor can
that sort of policy assertion be done with device certs since I don't 
have any reason to believe fly-by-night's

routers should be allowed to do whatever it is they claim they want to do.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread David R Oran

On Sep 18, 2014, at 11:46 AM, Rene Struik  wrote:

> It seems that the cryptographic literature needs to be rewritten now ...
> 
> ==
> Anything you can do with a cert, you can do with raw public keys, and you 
> don't need CA's. See RFC4871 for an example.
I would have thought it was the opposite:
anything you can do with raw keys you can do with certificates.

Raw keys cannot prove an assertion that a certain claimed name is bound to a 
certain key. In the case of self-signed certs you only get the advantages of 
having a data structure and code that is understood and well vetted, but with 
either a PKI or a web of trust you do get benefits from using Certs. You also 
get usage policy restrictions, which cannot be expressed with raw keys.

> 
> On 9/18/2014 11:36 AM, Michael Thomas wrote:
>> On 09/18/2014 08:31 AM, Markus Stenberg wrote:
>>> whether your authorization policy is leap of faithy, or strict ’these are 
>>> the authorized CAs/individual certs’, there is no way to express same 
>>> things with raw public keys (or you wind up with new X509, which is in 
>>> nobody’s best interest).
>>> 
>> 
>> 
>> 
>> Mike
>> 
>> ___
>> homenet mailing list
>> homenet@ietf.org
>> https://www.ietf.org/mailman/listinfo/homenet
> 
> 
> -- 
> email: rstruik@gmail.com | Skype: rstruik
> cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Rene Struik

It seems that the cryptographic literature needs to be rewritten now ...

==
Anything you can do with a cert, you can do with raw public keys, and 
you don't need CA's. See RFC4871 for an example.


On 9/18/2014 11:36 AM, Michael Thomas wrote:

On 09/18/2014 08:31 AM, Markus Stenberg wrote:
whether your authorization policy is leap of faithy, or strict ’these 
are the authorized CAs/individual certs’, there is no way to express 
same things with raw public keys (or you wind up with new X509, which 
is in nobody’s best interest).






Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet



--
email: rstruik@gmail.com | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas

On 09/18/2014 08:31 AM, Markus Stenberg wrote:

whether your authorization policy is leap of faithy, or strict ’these are the 
authorized CAs/individual certs’, there is no way to express same things with 
raw public keys (or you wind up with new X509, which is in nobody’s best 
interest).



Anything you can do with a cert, you can do with raw public keys, and 
you don't need CA's. See RFC4871 for an example.


Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas

On 09/18/2014 08:24 AM, Markus Stenberg wrote:


With device certificates, you still have the original authz problem. That is, 
just because I can identify you
reliably tells me nothing about whether I want to participate with routing 
updates with you.  So in that
way, they not any more useful than naked keys.
If the device certificate is on hardware, you cannot generate them at will, and 
therefore they _are_ more useful as you can e.g. blacklist device and be sure 
that even with leap of faith code active, it will not come out of woodwork with 
new certificate.



Revocations again gets back to the threat model: what attacks are we 
trying to prevent (or not).
Without knowing that, it's hard to say whether device certs help any, 
especially considering
that there are perfectly acceptable homenet routers that will never be 
born with a device cert.


Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Markus Stenberg
Whether or not you do leap of faith, certificates _do_ provide extra value.

- you can produce them/validate via (local / cloudy) CA (which may also imply 
authorization in addition to authentication, or not)

- you can have them from hardware (which makes producing spurious ones much 
harder, assuming the hardware certificates in and of themselves are 
authenticable)

whether your authorization policy is leap of faithy, or strict ’these are the 
authorized CAs/individual certs’, there is no way to express same things with 
raw public keys (or you wind up with new X509, which is in nobody’s best 
interest).

That said, I think there is probably room for both PSK-based and some PKI-based 
solution here, but I do not believe that much in raw public keys any more.

Cheers,

-Markus
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Markus Stenberg
On 18.9.2014, at 18.17, Michael Thomas  wrote:
> On 09/18/2014 06:49 AM, Markus Stenberg wrote:
>> On 18.9.2014, at 16.05, Ted Lemon  wrote:
>>> On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H  wrote:
 X.509 certificates can be self-signed. That is, the device acts as its own 
 CA. In fact, this is the recommended approach.
>>> Of course.   But if there is never going to be a CA-signed key, there is no 
>>> reason to have a cert at all.   Self-signed certs are essentially a way of 
>>> carrying a bare key in a cert, unless you install your signer key as a CA 
>>> key, in which case you have an administratively configured CA key that is 
>>> signing the cert, and it’s no longer really a self-signed cert.
>> On the other hand, use of certificates facilitates also use of something 
>> like (hardware bound) device certificates, that would be much harder to 
>> generate on demand (and therefore blacklisting them might actually make 
>> sense in opportunistic scheme).
> With device certificates, you still have the original authz problem. That is, 
> just because I can identify you
> reliably tells me nothing about whether I want to participate with routing 
> updates with you.  So in that
> way, they not any more useful than naked keys.

If the device certificate is on hardware, you cannot generate them at will, and 
therefore they _are_ more useful as you can e.g. blacklist device and be sure 
that even with leap of faith code active, it will not come out of woodwork with 
new certificate.

(See above.)

Cheers,

-Markus
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas

On 09/18/2014 06:49 AM, Markus Stenberg wrote:

On 18.9.2014, at 16.05, Ted Lemon  wrote:

On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H  wrote:

X.509 certificates can be self-signed. That is, the device acts as its own CA. 
In fact, this is the recommended approach.

Of course.   But if there is never going to be a CA-signed key, there is no 
reason to have a cert at all.   Self-signed certs are essentially a way of 
carrying a bare key in a cert, unless you install your signer key as a CA key, 
in which case you have an administratively configured CA key that is signing 
the cert, and it’s no longer really a self-signed cert.

On the other hand, use of certificates facilitates also use of something like 
(hardware bound) device certificates, that would be much harder to generate on 
demand (and therefore blacklisting them might actually make sense in 
opportunistic scheme).




With device certificates, you still have the original authz problem. 
That is, just because I can identify you
reliably tells me nothing about whether I want to participate with 
routing updates with you.  So in that

way, they not any more useful than naked keys.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Steven Barth



One advantage of using X.509 certs is that the code to support them is widely 
available with multiple implementations.
I guess then you could go all the way and use the whole DTLS for HNCP 
unicast traffic (and keep MC unencrypted since its more or less a 
signaling channel for UC and doesn't contain sensitive data). This would 
then avoid the need to redefine and reimplement most of the DTLS 
features in HNCP anyway.


Cheers,

Steven



Another is that the same cert can be used for TLS negotiation in embedded web 
services, etc. to each device.

And of course if the registration mechanism is integrated into client OS's then 
those X.509 certs can easily participate in the usual trust policy stuff 
supported by those OS's.


On Sep 18, 2014, at 6:34 AM, Ted Lemon  wrote:


On Sep 18, 2014, at 4:27 AM, STARK, BARBARA H  wrote:

UPnP Device Protection uses X.509 certificates (which can be self-signed, and 
in order not to assume a WAN connection, really should be self-signed) and TLS.

I think that something like this, in combination with the promiscuous 
registration mechanism that I think Michael described earlier, would do the 
trick.   It's not clear that we need X.509 certs, since I have trouble 
imagining that the keys these devices have would ever be signed by a CA.   A 
bare key might be plenty.   But I think this is a better option than trying to 
shoehorn this functionality into IPsec, which was designed for a _very_ 
different security context.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

_
Michael Sweet, Senior Printing System Engineer, PWG Chair

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Markus Stenberg
On 18.9.2014, at 16.05, Ted Lemon  wrote:
> On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H  wrote:
>> X.509 certificates can be self-signed. That is, the device acts as its own 
>> CA. In fact, this is the recommended approach.
> Of course.   But if there is never going to be a CA-signed key, there is no 
> reason to have a cert at all.   Self-signed certs are essentially a way of 
> carrying a bare key in a cert, unless you install your signer key as a CA 
> key, in which case you have an administratively configured CA key that is 
> signing the cert, and it’s no longer really a self-signed cert.

On the other hand, use of certificates facilitates also use of something like 
(hardware bound) device certificates, that would be much harder to generate on 
demand (and therefore blacklisting them might actually make sense in 
opportunistic scheme).

Cheers,

-Markus
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Ted Lemon
On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H  wrote:
> X.509 certificates can be self-signed. That is, the device acts as its own 
> CA. In fact, this is the recommended approach.

Of course.   But if there is never going to be a CA-signed key, there is no 
reason to have a cert at all.   Self-signed certs are essentially a way of 
carrying a bare key in a cert, unless you install your signer key as a CA key, 
in which case you have an administratively configured CA key that is signing 
the cert, and it's no longer really a self-signed cert.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas

On 09/18/2014 04:50 AM, Michael Sweet wrote:

One advantage of using X.509 certs is that the code to support them is widely 
available with multiple implementations.

Another is that the same cert can be used for TLS negotiation in embedded web 
services, etc. to each device.

And of course if the registration mechanism is integrated into client OS's then 
those X.509 certs can easily participate in the usual trust policy stuff 
supported by those OS's.




IMHO, if you're not going to use a CA, then putting x509 bits around the 
public key only serves to confuse
the issue in my experience, and makes for a much more complicated 
solution. Using raw public keys is
really quite simple codewise. And, of course, nothing prevents you from 
manufacturing those fake
x509 certs for protocols that require them, and just using the bare key 
for those that don't.


That said, it is possible to envision using local CA functionality such 
that any currently enrolled homenet
router is able to sign a new enrollee's key which allows it to present 
that cert to any other homenet
device without prior knowledge of that key and be accepted. It's just 
another way of distributing the database.


Not sure how any of this would work with revocations though.

Mike

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


  1   2   >