Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-19 Thread Joe Touch



On 10/19/2011 12:30 PM, Curtis Villamizar wrote:


In message28269.1318994...@marajade.sandelman.ca
Michael Richardson writes:




Curtis == Curtis Villamizarcur...@occnc.com  writes:

 Curtis  A WiFi AP will not connect to another AP and wireless
 Curtis  routers are typically AP by default.  So if two wireless
 Curtis  routers autoconfig to being AP and using open routing, then

OUT OF THE BOX:  not every device plugged into a home network have
 no prior configuration.  For instance, someone bringing a newsed
 device to grandma's house.


He who configures it needs to fix it.  Or press the factory default
button (if there is one).  The example is two AP.  Most AP can be
restored to factory default with a button press.


What happens if you have two of them and they're BOTH configured to boot 
as the master home access point?


...

 Curtis  there is only a risk if something that is an WiFi client is
 Curtis  also a configured to be a router.


Yes, but we want to assume that at least one of these will be configured 
as a router as a default, which means we KNOW someone will turn on two 
of them



On BSD and I suspect Linux as well, the default for:

   net.inet.ip.forwarding
   net.inet6.ip6.forwarding

are both zero.


Right, but that cannot be the default for a homenet box.

Joe
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-19 Thread Curtis Villamizar

In message 4e9f3e69.90...@isi.edu
Joe Touch writes:
 
 On 10/19/2011 12:30 PM, Curtis Villamizar wrote:
 
  In message28269.1318994...@marajade.sandelman.ca
  Michael Richardson writes:
 
 
  Curtis == Curtis Villamizarcur...@occnc.com  writes:
   Curtis  A WiFi AP will not connect to another AP and wireless
   Curtis  routers are typically AP by default.  So if two wireless
   Curtis  routers autoconfig to being AP and using open routing, then
 
  OUT OF THE BOX:  not every device plugged into a home network have
   no prior configuration.  For instance, someone bringing a newsed
   device to grandma's house.
 
  He who configures it needs to fix it.  Or press the factory default
  button (if there is one).  The example is two AP.  Most AP can be
  restored to factory default with a button press.
  
 What happens if you have two of them and they're BOTH configured to boot 
 as the master home access point?


Master home access point?  What is that?  We are not talking about
today's primitive NAT boxes that pretend to be routers.

They either have a default route to the Internet or they don't.  If
they have a defailt route and they are at equal distance to that
default route, then there are some arbitrary tie breakers.

Worst case for AP might be if they are hard configed to the same
channel and are very close to each other so they have about the same
S/N and hosts can't decide which one to associate with, plus the
interference with each other.

In any case a press of the factory settings button should fix it.

 ...
   Curtis  there is only a risk if something that is an WiFi client is
   Curtis  also a configured to be a router.
  
 Yes, but we want to assume that at least one of these will be configured 
 as a router as a default, which means we KNOW someone will turn on two 
 of them

We want to assume that *all* AP are configured as routers except the
legacy ones that want to be a dumb bridge with NAT to one port.

  On BSD and I suspect Linux as well, the default for:
 
 net.inet.ip.forwarding
 net.inet6.ip6.forwarding
 
  are both zero.
  
 Right, but that cannot be the default for a homenet box.

You are mixing the discussion of what we want in routers with what we
don't want enabled by default in every *legacy* PC, toaster and coffee
maker.  If the coffee maker is a competent IPv6 router with extensions
to let it autoconfig, then let it be a router.

I really don't want my dumb old kitchen appliances trying to NAT for
each other.  But that new IPv6 espresso maker that knows how to act as
a router - that would be OK.  :-)

You lost the context.  You snipped out the statement I was replying
to.  A little too much trimming on the response.  It happens.

 Joe

Curtis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-18 Thread Michael Richardson

 Curtis == Curtis Villamizar cur...@occnc.com writes:
Curtis A WiFi AP will not connect to another AP and wireless
Curtis routers are typically AP by default.  So if two wireless
Curtis routers autoconfig to being AP and using open routing, then

OUT OF THE BOX:  not every device plugged into a home network have
no prior configuration.  For instance, someone bringing a newsed
device to grandma's house.

Curtis there is only a risk if something that is an WiFi client is
Curtis also a configured to be a router.

laptop, smartphone, wii, stereo mp3 player, ...

-- 
]   He who is tired of Weird Al is tired of life!   |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video http://www.youtube.com/watch?v=kzx1ycLXQSE
   then sign the petition. 
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-13 Thread Russ White

 Should the applications be insecure and rely on a firewall?
 (Microsoft advocated this in the 1990s and it has stuck to a large
 extent).  Or should the network be open and the applications secure?
 
 I'm strongly with you on this.  The applications should take care of
 any security that is necessary *for that application*.

In other words, we should abandon door locks and make certain that
anything you don't want stolen is individually secured --because only
the device manufacturer could ever know how valuable it is, and how best
to prevent it being stolen?

In your own words:

 No. No. No.

Security is layered in the physical world, and it should be layered in
the network, as well. That I argue for a default domain based posture,
where all machines within a given domain are all fully reachable, but
those outside the domain are not reachable unless specific actions are
taken to make them reachable, doesn't mean I don't think individual
computers need security at all, or that all security should rely on the
firewall.

All security must be on the firewall or in the applications is a false
dichotomy.

 Security is not a layer-2 function.  Security is an application
 function.  You had it right the first time.  Key exchanges and
 certificates are not layer-2 functions.

Security is an application function, yes. Security is also a network
function, and security is a machine level function. All of these have a
role to play in security.

:-)

Russ

 
 It is entirely possible that the same computer has pictures of Grandma
 that I'm OK with you seeing and has a printer hanging off it that I
 don't want anyone in the world to be able to print on.  Same MAC
 address.  So that can't be a layer-2 function.
 
 And port filtering at a firewall is a lame excuse for security.  The
 bug in relying on a firewall in an enterprise (a little less so for a
 home) is that once any one user downloads malware, that malware has
 access to everthing behind the firewall largely because of the
 assumption that security is not needed because there is a firewall.
 
 Lets not enshine the dumbest practices of the IT world.
 
 I think homenet should focus on L3. (and be clear on what it expects
 from the other layers with regards to security).
  
 cheers,
 Ole
 
 Curtis
 ___
 homenet mailing list
 homenet@ietf.org
 https://www.ietf.org/mailman/listinfo/homenet
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-13 Thread Curtis Villamizar

In message 8031f94c-66bf-4748-aa97-5efa12bb8...@fugue.com
Ted Lemon writes:
 
 If you autoconfigure a routing topology, you have to make sure that
 you don't accidentally autoconfigure it to include routers that
 weren't intended to have been included.
  
 The concern is not for grandma running Windows 98, and the whole hard
 shell/gooey center debate is completely beside the point.


You've said what the problem *isn't*, so what *is* the problem on a
homenet?

Surely the provider is not going to accept a unauthenticated
auto-config hello request and start peering, nor will it accept a
hello from a legacy router configured with router-id and a be
adjacent to anything policy.

If the electric meter wants to be a router with a slow link on the
power line, then it needs to act like a provider router, but perhaps
only advertising reachability to the electric utility, not the whole
Internet.  The more specific prefix (than default) should get the
attention of the water heater if it has to try to reach the electric
utility.

Curtis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-13 Thread Ted Lemon
On Oct 13, 2011, at 2:35 PM, Curtis Villamizar wrote:
 You've said what the problem *isn't*, so what *is* the problem on a
 homenet?

I did say what the problem is:

 If you autoconfigure a routing topology, you have to make sure that
 you don't accidentally autoconfigure it to include routers that
 weren't intended to have been included.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-13 Thread Curtis Villamizar

In message 4e96ce51.7020...@riw.us
Russ White writes:
 
  
  Should the applications be insecure and rely on a firewall?
  (Microsoft advocated this in the 1990s and it has stuck to a large
  extent).  Or should the network be open and the applications secure?
  
  I'm strongly with you on this.  The applications should take care of
  any security that is necessary *for that application*.
  
 In other words, we should abandon door locks and make certain that
 anything you don't want stolen is individually secured --because only
 the device manufacturer could ever know how valuable it is, and how best
 to prevent it being stolen?

Following that analogy, the door locks built my certain OS vendors are
both flimsy and easily picked.

And we should not enable tftp and point it at the root directory and
hope that some smart network appliance will somehow firewall us.

 In your own words:
  
  No. No. No.
  
 Security is layered in the physical world, and it should be layered in
 the network, as well. That I argue for a default domain based posture,
 where all machines within a given domain are all fully reachable, but
 those outside the domain are not reachable unless specific actions are
 taken to make them reachable, doesn't mean I don't think individual
 computers need security at all, or that all security should rely on the
 firewall.
  
 All security must be on the firewall or in the applications is a false
 dichotomy.

Ideally the firewall should be unnecessary.  In some cases a firewall
is out of the question.  For example, a router cannot rely on sitting
behind a firewall.  That is not to say that packet filters at the
border don't serve as a valuable denial of service protection against
pure traffic based attacks.

Firewalls more often get in the way than do any good.  They also give
a false sense of security which results in the occasional our LAN is
currently swamped as a result of the latest virus run amuck on our
LAN coming from IT.

  Security is not a layer-2 function.  Security is an application
  function.  You had it right the first time.  Key exchanges and
  certificates are not layer-2 functions.
  
 Security is an application function, yes. Security is also a network
 function, and security is a machine level function. All of these have a
 role to play in security.
  
 :-)
  
 Russ

The operations staff for the T3-NSFNET had no firewall and was
security audited by some of the best in the field.  Of course we did
not allow the use of a PC with Windows in operations.  No such thing
could sit on the same subnet.

Another division in ANS that relied on a firewall was the only part of
the company that even had to have all computers taken down and
scrubbed before they could be used again.  [Requirement at that time
of having certain government customers].  Every computer had to be
physically removed, rebooted from other media, backed up, reinstalled,
user files restored from a backup prior to the breach, and returned to
the rack or the user's desk.  Users had to fetch any lost work from
the backups and were supposed to insure that no changes where made to
recovered source code.  Sound painful and costly?  It was!

Network protection of insecure host applications is false security.
It takes just one host breach to compromise the whole internal
network.  I've seen it first hand many times.  [not quite first hand
since my computers never relied on a firewall for security but a few
times on the corporate LAN they were sitting on.]

IPSEC also got it wrong.  The application really is the right place
for security.

:-)

btw- Anti-virus software is a cruel hoax.  [that someone makes money on]

:-)

  It is entirely possible that the same computer has pictures of Grandma
  that I'm OK with you seeing and has a printer hanging off it that I
  don't want anyone in the world to be able to print on.  Same MAC
  address.  So that can't be a layer-2 function.
  
  And port filtering at a firewall is a lame excuse for security.  The
  bug in relying on a firewall in an enterprise (a little less so for a
  home) is that once any one user downloads malware, that malware has
  access to everthing behind the firewall largely because of the
  assumption that security is not needed because there is a firewall.
  
  Lets not enshine the dumbest practices of the IT world.
  
  I think homenet should focus on L3. (and be clear on what it expects
  from the other layers with regards to security).
   
  cheers,
  Ole
  
  Curtis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-13 Thread Curtis Villamizar

In message 7d42549b-0ec1-463e-8e62-765c295a2...@fugue.com
Ted Lemon writes:
 
 On Oct 13, 2011, at 5:23 PM, Curtis Villamizar wrote:
  And I responded to that in the same email and you trimmed that part of
  the response in this email.
  
 The problem has to do with customer-owned devices and
 customer-neighbor-owned devices forming networks together.  It's got
 nothing to do with the ISP.  Chances are, the ISP link is the one
 thing that won't be gotten wrong here, because only one device you own
 will be connected to it (at least in typical networks today).

And therefore risk there is mostly theft of service as I have already
pointed out.

A WiFi AP will not connect to another AP and wireless routers are
typically AP by default.  So if two wireless routers autoconfig to
being AP and using open routing, then there is only a risk if
something that is an WiFi client is also a configured to be a router.

 Of course, if your devices unintentionally include your neighbor in
 the home network topology, your network will suddenly be multihomed,
 but this is an artifact of the failure mode I'm talking about.
 Eliminating that failure mode would solve the multihoming problem as
 well.

Some would call that a feature, not a failure mode.  :-)

But it usually does violate the service provider agreement and
therefore open routing (or bridging) over wireless creates a potential
theft of service.  Ignoring that AP don't talk to AP.

This is really an issue for wireless not for wired and is nothing new.
AFAIK all wireless products today ship open and configured as an
AP and have to be changed to enable some form of authentication.
And many users never bother to change this.

So what is new about a wireless router vs existing wireless bridges
that do this?

Curtis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-13 Thread Ted Lemon
On Oct 13, 2011, at 7:02 PM, Curtis Villamizar wrote:
 And therefore risk there is mostly theft of service as I have already
 pointed out.

No, that is a side issue.   The risk is that two networks will self-configure 
into a single topology without being told to do so. 

 Some would call that a feature, not a failure mode.  :-)

Your optimism is charming.   However, the more likely case is that the network 
topology that automatically forms will not work, or will direct all traffic out 
a single internet link and go over someone's service limits.   And there will 
be nobody within shouting distance of this fiasco who will be qualified to even 
guess what might be happening, much less fix it.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-13 Thread Ted Lemon
On Oct 13, 2011, at 9:13 PM, Lorenzo Colitti wrote:
 I'd say that electrical systems are as susceptible to rogue devices just as 
 much as zeroconf routing systems are. If you plug a short into a socket, you 
 trip a circuit breaker and you deny service to other appliances (i.e., your 
 house goes dark).

This is true, but I think I hear the sound of shrieking as you torture this 
poor analogy...   :)

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-12 Thread Riccardo Bernardini
2011/10/12 Joel jaeggli joe...@bogus.com

 On 10/11/11 18:38 , Ted Lemon wrote:
  On Oct 11, 2011, at 9:03 PM, Michael Richardson wrote:
  However, I am thinking that we can perhaps bootstrap equipment that has
  never been configured (or has been factory reset) in some fashion such
  that if the equipment is virginal that it can essentially always try
  some default keys, and bring up enough networking to let all equipment
  be discovered and identified.  There would be strong nag screens to get
  the user to up a network password.
 
  A pre-shared key that is pre-shared to every device is the same as no
  key.

 Not really, it could serve an important hygenic function, notionaly, it
 could be filtered by default on all non-home-network gear. that is
 serves the purpose of identifying a well-known-service. there are of
 course other perhaps better ways to implment that.

   So you might as well not bother with that complexity.
  Conceivably CGA could be used to publish public/private key pairs
  allowing devices to automatically recognize each other and present their
  relationships in a UI for the end user to approve, but that's not
  precisely plug and play.
 
  I think the simplest thing would be to require that each device be able
  to talk to a USB drive.   Each device collects all the public keys on
  the USB drive, and stores their own there.   Devices then share their
  public key with other devices identified on the USB drive, so that as
  each device joins the network, the other devices learn about it.   This
  isn't bulletproof—an infected PC that's configured with these keys could
  be used to gain access to the keys, for example.   But it's a lot better
  than a well-known key.


What about ID-based signature?

Just improvising (so forgive me for any naivety): the ID of the device could
be a triplet (producer-ID, product-ID, serial-number); the key generator
could be the producer itself (avoiding in this way the key escrow problem
related to ID-based cryptography) and a certificate with the public key of
the producer could be downloadable from some well-known host (alternatively,
the key of most known producers could be built in the device).

The authentication procedure would follow  the usual challenge scheme: the
device receives a challenge string, it appends to it a nonce and signs the
result with its private key (hardwired at production time).  If the
authentication is positive, then you know that you are talking to that type
of device, produced by that producer (if you trust the producer is another
matter).  Of course, this simple scheme would fall to a device-in-the-middle
attack, but maybe in this  context it is not a likely attack.


  Of course, this isn't quite as plug and play as you seem to want, and it
  requires that each device have a USB port, which might not be
  acceptable.   Plus, it would mean that the IETF would have to talk about
  hardware, which seems like a bit of a non-starter.   But I think it's
  the right way to solve the problem.
 
 
 
  ___
  homenet mailing list
  homenet@ietf.org
  https://www.ietf.org/mailman/listinfo/homenet

 ___
 homenet mailing list
 homenet@ietf.org
 https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-12 Thread Ole Troan
Ted,

 using the electricity network as an analogy, can we make a distinction 
 between safety and security?
 the electricity network in the home is somewhat self protecting with 
 breakers and earthing.
 a home network must protect 'itself', i.e. handle any device plugged into 
 it, in any topology, external and internal attacks
 and so on.
 
 I am highly sympathetic to the desire not to try to solve this problem.   
 However, unfortunately network topology isn't the same as electrical 
 topology, for a couple of reasons.
 
 The first reason is that electrical systems are generally set up by 
 professionals.   Yes, you plug devices into the electrical wiring of your 
 house, but someone skilled set it up (or if not, I hope you sleep in asbestos 
 pajamas).   The devices we are talking about are more analogous to circuit 
 distribution panels than to toasters.
 
 The second reason is that electrical systems are essentially topology-free.   
 Any point on the system is essentially equivalent to any other.   This is not 
 true of a home network with routing.   What we are talking about is 
 essentially the possibility of rogue distribution panels intentionally or 
 accidentally being connected to your distribution system.   
 
 Which is a result of the third reason: home networks are typically wireless, 
 or partially wireless, and so there is no physical security, unlike an 
 electrical network in a house, which is secure by virtue of being entirely 
 enclosed by the house.
 
 I think what you are getting at is that we cannot be responsible for securing 
 the network.   And that is probably true.   But if the system doesn't have a 
 built-in mechanism for distinguishing between friend and stranger, the 
 autoconfiguration mechanism will create topologies that aren't desired, 
 either by accident or because a stranger wants access to the network.

I do agree with that.
I think we can figure out a way of pairing devices. whatever layer that ends 
up being done at.
it will be much more difficult to protect against hostiles injecting default 
routes, or pretending to be DHCP servers and so on.

cheers,
Ole
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-12 Thread Ted Lemon
On Oct 12, 2011, at 8:46 AM, Ole Troan wrote:
 I think we can figure out a way of pairing devices. whatever layer that 
 ends up being done at.
 it will be much more difficult to protect against hostiles injecting default 
 routes, or pretending to be DHCP servers and so on.

I think pairing and general network security are largely the same problem.   Of 
course if someone is granted access to the network, they can then inject routes 
or pretend to be a DHCP server, but that's not the issue I'm concerned with.   
I'm more concerned with the scenario Jim Gettys talked about in a subsequent 
message, where a bunch of things clump together and start talking to each other 
essentially accidentally.   And of course I'm also somewhat concerned about 
attackers, although I think that's probably going to happen less often than 
accidental clumping.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-12 Thread Curtis Villamizar

In message 4e94bf91.4060...@cs.tcd.ie
Stephen Farrell writes:
 
  
 Hi,
  
 I've been reading the list with interest and have a question.
  
 When various devices in the home figure out which does what,
 and do that periodically to handle changes, there's clearly
 the potential that a zombied host tries to try take over
 stuff with undesirable consequences.
  
 My question is whether this group are planning to think
 about that now, or later, or never? (Or don't even think
 there's a problem worth attempting to address.)
  
 Note - I'm not trying to argue for any particular level of
 security and certainly not for some unachievable fort knox
 everywhere, I'm just asking what's the plan?
  
 S.


Watch out for autoconfig of microphones and cameras.  :-)

I call it bonding.  Some ritual has to be performed before specific
types of devices trust each other.  Like the garage door opener and
the clicker thingie.  Same should be true of the audio system and the
wireless speakers.  The TV and remote use IR.  The routers just route,
but they need to be a bit more picky about who can configure them.

Curtis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-12 Thread Curtis Villamizar

In message 159dbf45-107c-4c12-ae01-9bb494e8e...@fugue.com
Ted Lemon writes:
 
 On Oct 11, 2011, at 9:03 PM, Michael Richardson wrote:
  However, I am thinking that we can perhaps bootstrap equipment that has
  never been configured (or has been factory reset) in some fashion such
  that if the equipment is virginal that it can essentially always try
  some default keys, and bring up enough networking to let all equipment
  be discovered and identified.  There would be strong nag screens to get
  the user to up a network password.
  
 A pre-shared key that is pre-shared to every device is the same as no
 key.  So you might as well not bother with that complexity.
 Conceivably CGA could be used to publish public/private key pairs
 allowing devices to automatically recognize each other and present
 their relationships in a UI for the end user to approve, but that's
 not precisely plug and play.


Agree completely on this.

For example, having bumping the factory default button on a wireless
camera open access to everyone would really be a bad idea.


 I think the simplest thing would be to require that each device be
 able to talk to a USB drive.  Each device collects all the public keys
 on the USB drive, and stores their own there.  Devices then share
 their public key with other devices identified on the USB drive, so
 that as each device joins the network, the other devices learn about
 it.  This isn't bulletproof=97an infected PC that's configured with
 these keys could be used to gain access to the keys, for example.  But
 it's a lot better than a well-known key.
  
 Of course, this isn't quite as plug and play as you seem to want, and
 it requires that each device have a USB port, which might not be
 acceptable.  Plus, it would mean that the IETF would have to talk
 about hardware, which seems like a bit of a non-starter.  But I think
 it's the right way to solve the problem.


Mandating USB is not practical.

For example I have a set of DECT phones with a single SIP base
station.  You can bond the phone to the base station but you have to
enter a menu on the phone and do something on the base station
(through the web interface or otherwise) within 10 seconds.  Not
perfect, but it works.

There are too many cases like bonding the garage door opener to the
clicker, or bonding the speakers to the audio system, etc, don't need
to store keys on a USB as a boot strap.  For some things USB would be
fine.

And my water heater, as facinating as it might be to the electrical
utility, need not have the key to my garage door opener or my audio
speakers, even though I might want to turn the hot water up or down a
few degrees through a remote device some day.

I would say that reinventing the kerberos KDC with ticket granting
tickets and service tickets is probably overkill and should be out of
scope.  But it would be a truly wonderful thing if the interface could
be made simple enough for a consumer to set up.

Curtis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-12 Thread Curtis Villamizar

In message 78ce7d95-48c9-4de4-9707-f11ac2a05...@cisco.com
Ole Troan writes:
 
  I've been reading the list with interest and have a question.
  
  When various devices in the home figure out which does what,
  and do that periodically to handle changes, there's clearly
  the potential that a zombied host tries to try take over
  stuff with undesirable consequences.
  
  My question is whether this group are planning to think
  about that now, or later, or never? (Or don't even think
  there's a problem worth attempting to address.)
  
  Note - I'm not trying to argue for any particular level of
  security and certainly not for some unachievable fort knox
  everywhere, I'm just asking what's the plan?
  
 can we explore some fundamental principles of how and what we need to
 secure?

Yes.  Please do.

 using the electricity network as an analogy, can we make a distinction
 between safety and security?  the electricity network in the home
 is somewhat self protecting with breakers and earthing.  a home
 network must protect 'itself', i.e. handle any device plugged into it,
 in any topology, external and internal attacks and so on.
  
 I don't think it is the networks job to control who has access to the
 pictures of my grandmother or who can print to my printer. that's
 application policy.

Exactly.  This is a multi-decade old debate.

Should the applications be insecure and rely on a firewall?
(Microsoft advocated this in the 1990s and it has stuck to a large
extent).  Or should the network be open and the applications secure?

I'm strongly with you on this.  The applications should take care of
any security that is necessary *for that application*.

 is it the networks job to control who has access to the network? no, I
 think that is a layer 2 function.

No. No. No.

Security is not a layer-2 function.  Security is an application
function.  You had it right the first time.  Key exchanges and
certificates are not layer-2 functions.

It is entirely possible that the same computer has pictures of Grandma
that I'm OK with you seeing and has a printer hanging off it that I
don't want anyone in the world to be able to print on.  Same MAC
address.  So that can't be a layer-2 function.

And port filtering at a firewall is a lame excuse for security.  The
bug in relying on a firewall in an enterprise (a little less so for a
home) is that once any one user downloads malware, that malware has
access to everthing behind the firewall largely because of the
assumption that security is not needed because there is a firewall.

Lets not enshine the dumbest practices of the IT world.

 I think homenet should focus on L3. (and be clear on what it expects
 from the other layers with regards to security).
  
 cheers,
 Ole

Curtis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-12 Thread Curtis Villamizar

In message ede9b41f-4de6-4e01-a4fc-ac03aff5f...@fugue.com
Ted Lemon writes:
 
 On Oct 12, 2011, at 4:48 AM, Ole Troan wrote:
  using the electricity network as an analogy, can we make a
  distinction between safety and security?
  the electricity network in the home is somewhat self protecting with
  breakers and earthing.
  a home network must protect 'itself', i.e. handle any device plugged
 into it, in any topology, external and internal attacks
  and so on.
  
 I am highly sympathetic to the desire not to try to solve this
 problem.  However, unfortunately network topology isn't the same as
 electrical topology, for a couple of reasons.
  
 The first reason is that electrical systems are generally set up by
 professionals.  Yes, you plug devices into the electrical wiring of
 your house, but someone skilled set it up (or if not, I hope you sleep
 in asbestos pajamas).  The devices we are talking about are more
 analogous to circuit distribution panels than to toasters.
  
 The second reason is that electrical systems are essentially
 topology-free.  Any point on the system is essentially equivalent to
 any other.  This is not true of a home network with routing.  What we
 are talking about is essentially the possibility of rogue distribution
 panels intentionally or accidentally being connected to your
 distribution system.  =20

The electricity analogy is not very useful.  Maybe best to drop it.

 Which is a result of the third reason: home networks are typically
 wireless, or partially wireless, and so there is no physical security,
 unlike an electrical network in a house, which is secure by virtue of
 being entirely enclosed by the house.
  
 I think what you are getting at is that we cannot be responsible for
 securing the network.  And that is probably true.  But if the system
 doesn't have a built-in mechanism for distinguishing between friend
 and stranger, the autoconfiguration mechanism will create topologies
 that aren't desired, either by accident or because a stranger wants
 access to the network.

If applications are secure, the only threat to a wide open network is
theft of service.

WPA provides a knob to stop that.  The only question is whether WPA or
any WiFi security should be enabled by default.

Is it better to leave the possibility of theft of service or is it
better to have the device unusable by default (until configured)?  For
provider equipment that is always configured, the latter (unusable
until configured).  For home equipment where the customer wants to
unpack the box, plug it in and use it, the former is better (make it
usabled but allow possible theft of service).

Every WiFi product I ever bought was open WiFi as shipped.

Curtis
___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


[homenet] security question for zeroconf stuff inside the homenet...

2011-10-11 Thread Stephen Farrell


Hi,

I've been reading the list with interest and have a question.

When various devices in the home figure out which does what,
and do that periodically to handle changes, there's clearly
the potential that a zombied host tries to try take over
stuff with undesirable consequences.

My question is whether this group are planning to think
about that now, or later, or never? (Or don't even think
there's a problem worth attempting to address.)

Note - I'm not trying to argue for any particular level of
security and certainly not for some unachievable fort knox
everywhere, I'm just asking what's the plan?

S.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-11 Thread Ted Lemon
On Oct 11, 2011, at 9:03 PM, Michael Richardson wrote:
 However, I am thinking that we can perhaps bootstrap equipment that has
 never been configured (or has been factory reset) in some fashion such
 that if the equipment is virginal that it can essentially always try
 some default keys, and bring up enough networking to let all equipment
 be discovered and identified.  There would be strong nag screens to get
 the user to up a network password.

A pre-shared key that is pre-shared to every device is the same as no key.   So 
you might as well not bother with that complexity.   Conceivably CGA could be 
used to publish public/private key pairs allowing devices to automatically 
recognize each other and present their relationships in a UI for the end user 
to approve, but that's not precisely plug and play.

I think the simplest thing would be to require that each device be able to talk 
to a USB drive.   Each device collects all the public keys on the USB drive, 
and stores their own there.   Devices then share their public key with other 
devices identified on the USB drive, so that as each device joins the network, 
the other devices learn about it.   This isn't bulletproof—an infected PC 
that's configured with these keys could be used to gain access to the keys, for 
example.   But it's a lot better than a well-known key.

Of course, this isn't quite as plug and play as you seem to want, and it 
requires that each device have a USB port, which might not be acceptable.   
Plus, it would mean that the IETF would have to talk about hardware, which 
seems like a bit of a non-starter.   But I think it's the right way to solve 
the problem.

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] security question for zeroconf stuff inside the homenet...

2011-10-11 Thread Joel jaeggli
On 10/11/11 18:38 , Ted Lemon wrote:
 On Oct 11, 2011, at 9:03 PM, Michael Richardson wrote:
 However, I am thinking that we can perhaps bootstrap equipment that has
 never been configured (or has been factory reset) in some fashion such
 that if the equipment is virginal that it can essentially always try
 some default keys, and bring up enough networking to let all equipment
 be discovered and identified.  There would be strong nag screens to get
 the user to up a network password.
 
 A pre-shared key that is pre-shared to every device is the same as no
 key. 

Not really, it could serve an important hygenic function, notionaly, it
could be filtered by default on all non-home-network gear. that is
serves the purpose of identifying a well-known-service. there are of
course other perhaps better ways to implment that.

  So you might as well not bother with that complexity.  
 Conceivably CGA could be used to publish public/private key pairs
 allowing devices to automatically recognize each other and present their
 relationships in a UI for the end user to approve, but that's not
 precisely plug and play.
 
 I think the simplest thing would be to require that each device be able
 to talk to a USB drive.   Each device collects all the public keys on
 the USB drive, and stores their own there.   Devices then share their
 public key with other devices identified on the USB drive, so that as
 each device joins the network, the other devices learn about it.   This
 isn't bulletproof—an infected PC that's configured with these keys could
 be used to gain access to the keys, for example.   But it's a lot better
 than a well-known key.
 
 Of course, this isn't quite as plug and play as you seem to want, and it
 requires that each device have a USB port, which might not be
 acceptable.   Plus, it would mean that the IETF would have to talk about
 hardware, which seems like a bit of a non-starter.   But I think it's
 the right way to solve the problem.
 
 
 
 ___
 homenet mailing list
 homenet@ietf.org
 https://www.ietf.org/mailman/listinfo/homenet

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet