RE: Last Call: draft-ietf-nea-pt-eap-06.txt (PT-EAP: Posture Transport (PT) Protocol For EAP Tunnel Methods) to Proposed Standard

2013-01-14 Thread Stephen Hanna
Changing our reference to RFC 5209 to be normative may cause
more problems than it solves. As RFC 3967 (BCP 97) says,

 IETF procedures generally require that a standards track RFC
 may not have a normative reference to another standards track
 document at a lower maturity level or to a non standards track
 specification (other than specifications from other standards
 bodies). For example, a standards track document may not have
 a normative reference to an informational RFC.

Generally, documents that contain use cases or architectures are
Informational. References to such documents in a standards track
document are informative because referring to the use cases is
not required in order to implement the standard.

RFC 5209 lists use cases for NEA, describes a reference model
for NEA, and includes requirements that the NEA protocols must
meet. None of the requirements in RFC 5209 are requirements on
implementations of the NEA protocols. Therefore, the PT-EAP spec
should not include a normative reference to RFC 5209. And that's
good, because RFC 5209 is an Informational RFC.

If I've missed something (e.g. a reason why the reference should
be normative), please explain it more clearly.

Thanks,

Steve

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 SM
 Sent: Monday, January 14, 2013 4:34 PM
 To: Nancy Cam-Winget (ncamwing)
 Cc: ietf-priv...@ietf.org; n...@ietf.org; ietf@ietf.org
 Subject: Re: Last Call: draft-ietf-nea-pt-eap-06.txt (PT-EAP: Posture
 Transport (PT) Protocol For EAP Tunnel Methods) to Proposed Standard
 
 Hi Nancy,
 At 12:29 14-01-2013, Nancy Cam-Winget (ncamwing) wrote:
 [NCW] I can change it to a lower case must, ok?
 
 That's ok.
 
 [NCW] We can move the reference to be normative.
 
 Ok.
 
 [NCW] I don't think there are specifically for PT-EAP.  The sections
 you
 reference
 Were to (in section 6) addressing the general EAP identity as PT-EAP
 is
 really not
 An authentication method.
 
 If I understood the above correctly PT-EAP does not transport any
 information which could be used to identify an individual.  That's
 different from PT-EAP not being an authenticated method. Therefore,
 there isn't much to say in terms of privacy considerations.
 
 I suggest not including the following then:
 
As a transport protocol, PT-EAP does not directly utilize or
 require direct knowledge of any personally identifiable
 information (PII).
 
 The draft can leverage the second paragraph of Section 6 as privacy
 considerations instead of making a statement about PII.  I'll copy
 this message to ietf-privacy@ to get a better opinion.
 
 In Section 6:
 
Therefore, it is important for deployers to leverage these
 protections in order to prevent disclosure of PII potentially
 contained within PA-TNC or PB-TNC within the PT-EAP payload.
 
 I suggest information about an individual instead of PII [1].
 
 Regards,
 -sm
 
 1. I used the wording from draft-iab-privacy-considerations-06
 




RE: travel guide for the next IETF...

2013-01-08 Thread Stephen Hanna
Dean Willis wrote:
 Having a car won't do any good. There is, as far as I can tell, no
 place to park it but the hotel valet.

According to this web page, complimentary self-parking is available
at the Caribe Royale.

http://www.cariberoyale.com/accommodations/services/

Thanks,

Steve

 




RE: Recall petition for Mr. Marshall Eubanks

2012-11-02 Thread Stephen Hanna
I also, with regret, would like to add my name to the recall
petition. I am NomCom eligible.

Thanks,

Steve



secdir review of draft-ietf-6lowpan-btle-08

2012-07-11 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the 
IESG.  These comments were written primarily for the benefit of the 
security area directors.  Document editors and WG chairs should treat 
these comments just like any other last call comments.

This document describes how IPv6 is transported over Bluetooth
Low Energy (BT-LE).

As a proviso, I am not an expert in IPv6, 6LoWPAN, or Bluetooth.
Still, this document seemed to be a clear specification of the
intended subject matter. The Security Considerations section
says that the security concerns are similar to those for IPv6
over 802.15.4. That makes sense, I suppose.

I was happy to see that this document says IPv6 over BT-LE
SHOULD be protected by using BT-LE Link Layer security, whereas
RFC 4944 (IPv6 over 802.15.4) does not include any normative
language on using link layer security. Also, this document says
that Key management in BT-LE is provided by the Security Manager
Protocol (SMP), whereas RFC 4944 says that no key management
is provided by 802.15.4. So this specification is apparently
more secure that RFC 4944. That's good.

So based on my review (admitting little knowledge of BT-LE),
this document seems to be an improvement over the current
state of the art for 6LoWPAN from a security perspective.
And the overall level of security seems reasonable.
I have no objection to the publication of this document.

I did notice two typos:

gateway^1s = gateway's
respectively = respectively

Thanks,

Steve



Updated secdir review of draft-ietf-emu-chbind-16.txt

2012-05-24 Thread Stephen Hanna
Sam,

Thanks for addressing my comments in draft-ietf-emu-chbind-16.txt.
I'm happy with this version. All my substantive concerns are addressed.

I do see two non-substantive issues. These can be addressed in some
future version or not at all.

1) The word subvert is misspelled as subvirt in the new text.

2) Editing Charles Clancy's address in the Authors' Addresses section
   has apparently caused the list of authors in the top right corner of
   the first page to revert to this suboptimal form:

EMU Working GroupS. Hartman, Ed.
Internet-Draft Painless Security
Intended status: Standards Track   T. Clancy
Expires: November 25, 2012  Department of Electrical
Engineering and Computer Science
   K. Hoeper
Motorola Solutions, Inc.

   As you can see, Dr. Clancy's affiliation has now changed back to
   Department of Electrical Engineering and Computer Science. I guess
   that whatever tool you're using to create the draft must insist on
   placing the second line of each author's address on the first page.
   If that's the case, you might want to change Dr. Clancy's address to

   T. Charles Clancy
   Virginia Tech
   Department of Electrical Engineering and Computer Science
   Arlington, VA  22203
   USA

   Or perhaps you'll just have to surrender to the flawed tool and
   leave the credit for Dr. Clancy on the first page as nonsensical.

Thanks for your patience in addressing the issues that I raised.
I think the document is much better for this attention.

Take care,

Steve

 -Original Message-
 From: Stephen Hanna
 Sent: Tuesday, May 22, 2012 4:00 PM
 To: 'Sam Hartman'
 Cc: e...@ietf.org; sec...@ietf.org; ietf@ietf.org
 Subject: RE: Updated secdir review of draft-ietf-emu-chbind-15.txt
 
 Sam,
 
 I see now that you are concerned not with circumstances where
 the NAS terminates the tunnel by design but rather with times
 when the NAS is maliciously terminating the tunnel. I'm glad
 that we both agree that having the NAS terminate the tunnel
 is highly undesirable. That did not come through in the draft.
 I'm much relieved to learn that nobody is suggesting this
 as a desirable outcome. I agree that it's an attack scenario
 that must be considered and carefully addressed.
 
 Maybe we can resolve this issue by clarifying the text to
 say more clearly that we're dealing with an attack scenario
 here. For example, we could add a sentence before the words
 Tunnel methods sometimes use saying something like However,
 this is not secure if the NAS can terminate the tunnel (a
 highly undesirable situation). Then you can mention several
 countermeasures against such an attack: mutual cryptographic
 bindings (still just a -00 individual draft), carefully
 checking the EAP server's identity, etc. We might also take
 this opportunity to split this long paragraph into two:
 one that includes the first three sentences (describing how
 EAP tunnel methods can support channel binding) and another
 describing the attack scenario and countermeasures.
 
 Thanks,
 
 Steve
 
  -Original Message-
  From: Sam Hartman [mailto:hartmans-i...@mit.edu]
  Sent: Monday, May 21, 2012 5:51 PM
  To: Stephen Hanna
  Cc: Sam Hartman; e...@ietf.org; sec...@ietf.org; ietf@ietf.org
  Subject: Re: Updated secdir review of draft-ietf-emu-chbind-15.txt
  Importance: High
 
   Stephen == Stephen Hanna sha...@juniper.net writes:
 
  Stephen The changes in draft-ietf-emu-chbind-15.txt
 satisfactorily
  Stephen address almost all of the comments in my April 13, 2012
  Stephen secdir review. I do have one remaining substantive
 comment
  Stephen on this latest draft and two non-substantive ones.
 
  Stephen Substantive Comment ---
 
  Stephen The last paragraph of section 9.1 points out a security
  Stephen problem with implementing channel bindings using EAP
  tunnel
  Stephen methods. If the EAP tunnel method terminates on the
  Stephen authenticator, the channel bindings can easily be
 defeated
  Stephen by the authenticator. While that's true, nobody
 terminates
  Stephen the EAP tunnel method on the authenticator today. In the
  Stephen EAP model, the authenticator is not trusted so
 terminating
  Stephen the EAP tunnel method on the authenticator is a bad idea
  Stephen for many reasons. For example, the authenticator would
  then
  Stephen have the ability to bypass protected result indications
  and
  Stephen to bypass all the cryptographic protections provided by
  the
  Stephen tunnel.  Sometimes there is value in having the inner
 and
  Stephen outer methods terminate on different servers but both
  Stephen servers must be trusted.  The authenticator is not. So

RE: Updated secdir review of draft-ietf-emu-chbind-15.txt

2012-05-22 Thread Stephen Hanna
Sam,

I see now that you are concerned not with circumstances where
the NAS terminates the tunnel by design but rather with times
when the NAS is maliciously terminating the tunnel. I'm glad
that we both agree that having the NAS terminate the tunnel
is highly undesirable. That did not come through in the draft.
I'm much relieved to learn that nobody is suggesting this
as a desirable outcome. I agree that it's an attack scenario
that must be considered and carefully addressed.

Maybe we can resolve this issue by clarifying the text to
say more clearly that we're dealing with an attack scenario
here. For example, we could add a sentence before the words
Tunnel methods sometimes use saying something like However,
this is not secure if the NAS can terminate the tunnel (a
highly undesirable situation). Then you can mention several
countermeasures against such an attack: mutual cryptographic
bindings (still just a -00 individual draft), carefully
checking the EAP server's identity, etc. We might also take
this opportunity to split this long paragraph into two:
one that includes the first three sentences (describing how
EAP tunnel methods can support channel binding) and another
describing the attack scenario and countermeasures.

Thanks,

Steve

 -Original Message-
 From: Sam Hartman [mailto:hartmans-i...@mit.edu]
 Sent: Monday, May 21, 2012 5:51 PM
 To: Stephen Hanna
 Cc: Sam Hartman; e...@ietf.org; sec...@ietf.org; ietf@ietf.org
 Subject: Re: Updated secdir review of draft-ietf-emu-chbind-15.txt
 Importance: High
 
  Stephen == Stephen Hanna sha...@juniper.net writes:
 
 Stephen The changes in draft-ietf-emu-chbind-15.txt satisfactorily
 Stephen address almost all of the comments in my April 13, 2012
 Stephen secdir review. I do have one remaining substantive comment
 Stephen on this latest draft and two non-substantive ones.
 
 Stephen Substantive Comment ---
 
 Stephen The last paragraph of section 9.1 points out a security
 Stephen problem with implementing channel bindings using EAP
 tunnel
 Stephen methods. If the EAP tunnel method terminates on the
 Stephen authenticator, the channel bindings can easily be defeated
 Stephen by the authenticator. While that's true, nobody terminates
 Stephen the EAP tunnel method on the authenticator today. In the
 Stephen EAP model, the authenticator is not trusted so terminating
 Stephen the EAP tunnel method on the authenticator is a bad idea
 Stephen for many reasons. For example, the authenticator would
 then
 Stephen have the ability to bypass protected result indications
 and
 Stephen to bypass all the cryptographic protections provided by
 the
 Stephen tunnel.  Sometimes there is value in having the inner and
 Stephen outer methods terminate on different servers but both
 Stephen servers must be trusted.  The authenticator is not. So
 Stephen there is no big security hole here, unless you have
 already
 Stephen opened an enormous security hole. It's ironic that this
 Stephen document which attempts to close vulnerabilities caused by
 Stephen malicious authenticators ends up subtly suggesting that
 Stephen people open a much larger vulnerability!
 
 Stephen I would recommend deleting the end of this paragraph,
 Stephen starting with the sentence that starts Even when
 Stephen cryptographic binding.
 
 I disagree very strongly with this proposed change.  It's possible that
 the text is not clear and I'd be happy to work for a round or two to
 see
 if we can clarify the text, but ending the paragraph as you propose
 would defeate the point of text we added after a WG consensus call.
 
 I agree with you that authenticators are not trusted.
 The issue is that you cannot trust attackers to act within a
 specification.
 If an attacker can gain benefit from doing something, they may do so.
 
 So, if an attacker can create a tunnel terminating at an authenticator
 and gain advantage from doing so, then they will do so.
 
 Remember that we're talking about crypto binding. If crypto binding is
 relevant for confirming there are no extra servers, then we're in a
 threat model space where we're trusting the inner method to
 authenticate
 the server, not the outer method.  You can't say you should only
 establish trusted tunnels, because we're hoping that crypto binding
 will give us that trust.  So, the issue here is that once you add
 channel bindings and the associated changes to the threat model to EAP,
 an authenticator can gain advantage through convincing a client to
 trust
 a tunnel that terminates at an authenticator.  That is, an
 authenticator
 can mount an attack.  Yes, the authenticator needs to convince the peer
 to trust the extra tunnel. However, as I discuss in
 draft-hartman-emu-mutual-crypto-binding and in my presentation at last
 IETF, that's often fairly easy.
 
 So, how can we make the text more clear?


Updated secdir review of draft-ietf-emu-chbind-15.txt

2012-05-18 Thread Stephen Hanna
The changes in draft-ietf-emu-chbind-15.txt satisfactorily address
almost all of the comments in my April 13, 2012 secdir review. I do
have one remaining substantive comment on this latest draft and two
non-substantive ones.

Substantive Comment
---

The last paragraph of section 9.1 points out a security problem
with implementing channel bindings using EAP tunnel methods. If
the EAP tunnel method terminates on the authenticator, the channel
bindings can easily be defeated by the authenticator. While that's
true, nobody terminates the EAP tunnel method on the authenticator
today. In the EAP model, the authenticator is not trusted so
terminating the EAP tunnel method on the authenticator is a bad
idea for many reasons. For example, the authenticator would then
have the ability to bypass protected result indications and to
bypass all the cryptographic protections provided by the tunnel.
Sometimes there is value in having the inner and outer methods
terminate on different servers but both servers must be trusted.
The authenticator is not. So there is no big security hole here,
unless you have already opened an enormous security hole. It's
ironic that this document which attempts to close vulnerabilities
caused by malicious authenticators ends up subtly suggesting that
people open a much larger vulnerability!

I would recommend deleting the end of this paragraph, starting
with the sentence that starts Even when cryptographic binding.
If you choose to keep this strange text, I suggest that you at
least note that terminating an EAP tunnel method on the
authenticator is unusual. For example, you could add a
parenthetical comment like (rare) after the clause if the
outer method tunnel terminates on the authenticator.

Non-Substantive Comments


In the first paragraph of section 3, an extraneous numeral 3 was
somehow added to the end of the second sentence.

T. Charles Clancy's address in the Authors' Addresses section
now reads:

   T. Charles Clancy
   Virginia Tech
   Virginia Tech
   Arlington, VA  22203
   USA

The duplication of Virginia Tech should be removed from
this address.

I appreciate the hard work of the document editors to address
my many earlier comments. I hope that these new comments will
also be useful.

Thanks,

Steve



RE: [secdir] secdir review of draft-ietf-emu-chbind-14

2012-04-25 Thread Stephen Hanna
Thanks, Joe. Looks like we've reached agreement on most things.
There are a few items left where Sam's input is needed.
I'll wait to see what he has to say.

Thanks,

Steve

 -Original Message-
 From: Joe Salowey [mailto:jsalo...@cisco.com]
 Sent: Wednesday, April 25, 2012 1:34 AM
 To: Stephen Hanna
 Cc: draft-ietf-emu-chb...@tools.ietf.org; sec...@ietf.org; IETF-
 Discussion list; Sam Hartman
 Subject: Re: [secdir] secdir review of draft-ietf-emu-chbind-14
 Importance: High


 On Apr 24, 2012, at 2:05 PM, Stephen Hanna wrote:

  Joe,
 
  I'm glad that my comments were useful to you and to the editors
  of this draft. I will respond to your comments below inline.
  I'm going to clip out as much as I can, including anything
  that has already been agreed on.
 
  Thanks,
 
  Steve
 
  --
 
  Joe Salowey wrote:
 
  On Apr 13, 2012, at 11:26 AM, Stephen Hanna wrote:
 
  In the Introduction, the second paragraph says that the
  problem results when the same credentials are used to
  access multiple services that differ in some interesting
  property. Do you mean client or server credentials?
  I think you mean EAP server credentials. Please be more
  explicit to make this clearer, since many people will
  assume that you mean client (EAP peer) credentials. If
  I'm correct and you do mean EAP server credentials,
  I suggest that you say so in the first sentence of
  this paragraph and also in the last sentence.
 
  [Joe]   The case here is both client and server credentials.  If
  different credentials are required for each type of service then the
  authenticator will not be able to lie about the type of service it
 is
  representing to the client because the client credentials are bound
 to
  the service.
 
  SH I don't see what the problem is with using the same
  client credentials with two different services if the
  server credentials are different. The client will be able
  to detect a lying NAS easily since the server credentials
  won't match what it expects for that service. Could you
  please explain this more?
 

 [Joe] In many cases the server credentials will be the same.  They will
 be the credentials of the AAA server.

  In the first paragraph of the Problem Statement, the second
  sentence says However, when operating in pass-through mode,
  the EAP server can be far removed from the authenticator.
  While this is true, I think the more relevant statement here
  is that the EAP server can be far removed from the EAP peer.
  This paragraph is all about problems that can arise when
  parties between the EAP peer and the EAP server (including
  the authenticator) are malicious or compromised. So the
  important thing to point out at the start of the paragraph
  is the large number of parties that may come between the
  EAP server and the EAP peer.
 
 
  [Joe]  I think I see your point, but I'm not sure.  Traditionally,
 we
  have often thought of the path between EAP peer and EAP
 authenticator
  as being vulnerable to having multiple parties able to insert
  themselves into the conversation.  However it may be the case that
 the
  authenticator the peer is talking to isn't the one it thinks it is
 and
  the real authenticator may be somewhere in the path as well.  The
  conversation between the EAP peer and EAP server will not be
  compromised, however the result of the conversation may not have its
  intended effect.
 
  My point is that having a long distance between the EAP server
  and the authenticator has little to do with the lying NAS
  problem. The problem is that there are potentially untrustworthy
  parties (the NAS and any proxies) between the EAP peer and the
  EAP server and the EAP peer is trusting what it's told by them.
  If the EAP server and the authenticator were two inches apart
  with no intermediaries, that wouldn't help. The problem is the
  potentially untrustworthy folks between the EAP server and
  the EAP peer. You're trying to verify some of what they're
  telling the EAP peer. So I'm not sure that sentence helps but
  if it does, the problem is between the EAP peer and the EAP server.
 

 [Joe] I don't have an issue with stating that the problem is between
 the peer and the server, but I'd like to hear the author's view on
 this.

 
  [Joe] THis is historical and reflects the discussion we had in the
  working as the document was being developed.
 
  I see
  several downsides to including that text in this document.
  First, you're making it harder for the reader to understand
  what they actually need to do to implement this protocol.
  You've probably decreased by half the number of people who
  will actually read all of this document. Second, some people
  will use that digression to support arguments like (My
  incompatible implementation is compliant with RFC 
  because I encoded the network information into a blob
  and used that to generate EAP session keys). IETF is an
  engineering organization. We should make our specs as clear

RE: secdir review of draft-nottingham-http-new-status-03

2012-01-30 Thread Stephen Hanna
Mark,

I don't want to rehash the discussion that we've already had.
Clearly, you prefer brevity while I would prefer education in
this instance.

I can live with your text for status codes 428, 429, and 431. For
511, I don't think it's adequate to just say that big security
issues already exist. You should at least give some suggestions
for how to deal with them. For example, you could point out that
most user agents include some indication of whether the server
has been authenticated. For captive portals, this indication will
generally not be displayed so the user receives some warning
that the response did not come from the requested URL.

Thanks,

Steve

 -Original Message-
 From: Mark Nottingham [mailto:m...@mnot.net]
 Sent: Sunday, January 29, 2012 6:50 PM
 To: Stephen Hanna
 Cc: Julian Reschke; draft-nottingham-http-new-sta...@tools.ietf.org;
 sec...@ietf.org; ietf@ietf.org
 Subject: Re: secdir review of draft-nottingham-http-new-status-03
 
 I haven't heard any further response. After a reminder from a Security
 AD, I took another look at the spec.
 
 E.g., the current Security Considerations for 428:
 
  The 428 status code is optional; clients cannot rely upon its use to
 prevent lost update conflicts.
 
 Like many of the status codes, that's already a risk inherent in using
 HTTP today; we're effectively just noting that we can't force
 implementations to use the new status code retroactively, so they can't
 use the publication of this document as a magical flag day.
 
 As such, not much more can be said; the only way that people can
 further mitigate the risks of lost updates is to have a private, out-
 of-band agreement to use 429, and I *don't* think that's something we
 should be encouraging.
 
 For 429, I've changed to:
 
  When a server is under attack or just receiving a very large number
 of requests from a single party, responding to each with a 429 status
 code will consume resources.
 
  Therefore, servers are not required to use the 429 status code; when
 limiting resource usage, it may be more appropriate to just drop
 connections, or take other steps.
 
 
 431 says:
 
  Servers are not required to use the 431 status code; when under
 attack, it may be more appropriate to just drop connections, or take
 other steps.
 
 
 What else should be said here? This specification is not a treatise on
 dealing with denial-of-service attacks; all that it notes is that
 servers aren't required to use the status code.
 
 Finally, 511 says:
 
  In common use, a response carrying the 511 status code will not come
 from the origin server indicated in the request's URL. This presents
 many security issues; e.g., an attacking intermediary may be inserting
 cookies into the original domain's name space, may be observing cookies
 or HTTP authentication credentials sent from the user agent, and so on.
 However, these risks are not unique to the 511 status code; in other
 words, a captive portal that is not using this status code introduces
 the same issues.
 
 Are there other specific threats you're aware of here?
 
 Regards,
 
 
 
 On 25/01/2012, at 10:36 AM, Mark Nottingham wrote:
 
  Sorry for the delay in responding; just back from holiday.
 
 
  On 14/01/2012, at 8:26 AM, Stephen Hanna wrote:
 
  Julian,
 
  I'm sure that in your view one sentence is adequate to explain
  all the security implications of each status code. However,
  you may want to consider that some readers may not have quite
  the same deep grasp of the matter that you do. Therefore,
  I think it would be wise to provide more explanation. Here's an
  example for section 7.2 on status code 429 (Too Many Requests):
 
  Section 7.2  429 Too Many Requests
 
   While status code 429 can be helpful in figuring out why a
   server is not responding to requests, it can also be harmful.
   When a server is under attack or simply receiving a very
   large number of requests from a single party, responding
   to each of these requests with a 429 status code will consume
   resources that could be better used in other ways. Therefore,
   a server in such circumstances may choose to send a 429 status
   code only the first time a client exceeds its limit and
   ignore subsequent requests from this client until its limit
   is no longer exceeded. Other approaches may also be employed.
 
  As you can see, I described security problems that could occur
  with this status code and explained how those problems can be
  avoided or mitigated. While it's true that these problems
  could occur when a more generic status code is used to handle
  the case of too many requests, that does not mean that they
  are not relevant to this document. On the contrary, the fact
  that this document is providing more detailed status codes
  gives us the opportunity and one can argue the obligation to
  provide more detailed security analysis relevant to these more
  detailed status codes.
 
  I'm really not sure I agree; the original text is:
 
Servers

RE: secdir review of draft-nottingham-http-new-status-03

2012-01-30 Thread Stephen Hanna
Yes

-Steve

 -Original Message-
 From: Julian Reschke [mailto:julian.resc...@gmx.de]
 Sent: Monday, January 30, 2012 10:10 AM
 To: Stephen Hanna
 Cc: Mark Nottingham; draft-nottingham-http-new-sta...@tools.ietf.org;
 sec...@ietf.org; ietf@ietf.org
 Subject: Re: secdir review of draft-nottingham-http-new-status-03
 
 On 2012-01-30 16:05, Stephen Hanna wrote:
  Mark,
 
  I don't want to rehash the discussion that we've already had.
  Clearly, you prefer brevity while I would prefer education in
  this instance.
 
  I can live with your text for status codes 428, 429, and 431. For
  511, I don't think it's adequate to just say that big security
  issues already exist. You should at least give some suggestions
  for how to deal with them. For example, you could point out that
  most user agents include some indication of whether the server
  has been authenticated. For captive portals, this indication will
  generally not be displayed so the user receives some warning
  that the response did not come from the requested URL.
 
 Are you referring to HTTPS?
 
 Best regards, Julian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


secdir review of draft-nottingham-http-new-status-03

2012-01-13 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the 
IESG. These comments were written primarily for the benefit of the 
security area directors. Document editors and WG chairs should treat 
these comments just like any other last call comments.

This document specifies new HTTP status codes for a variety of
common situations. Although I am not an HTTP expert, it seems
to me that this document is clear, well-written, and reasonable.

From a security perspective, this document seems to have little
impact either positive or negative. However, the Security
Considerations section does not meet our usual standards.
While the authors include a subsection on each new status code,
they do not explain clearly what the security implications are
for each status code and how any possible negative impacts
could be reduced.

Riccardo Bernardini already commented on this issue during
IETF LC. However, I do not agree with Mr. Bernardini that
sections 7.1 and 7.2 are not security related. Rather, the
security implications are just not clearly stated. For example,
section 7.2 points out that servers may not want to always
use the 429 status code when receiving too many requests
from one client. This has security implications in that
a server under attack with excessive requests from one
client may compound the problem by queuing 429 status codes
for every request from that client. However, this is not
stated explicitly in section 7.2. Fleshing out the subsections
of section 7 (Security Considerations) should help solve the
problem by providing a clear description of security problems
related to these result codes and recommended mitigations.
Section 7.4 does a decent job of describing the problems
but fails to describe mitigations. I think that having the
client use HTTPS instead of HTTP for important requests
and limiting the effects of HTTP (not HTTPS) responses
is an obvious mitigation.

I do have a question about the issues raised in Appendix B.
These are all legitimate issues. However, it seems to me
that having status code 511 should help with these. A
browser or non-browser application could recognize status
code 511 as an indication that a captive portal is in use
and avoid capturing favicons, looking for P3P files, and
doing other things that should wait until after the captive
portal is blocking access. When the original website stops
returning 511, such activities could resume. I may be wrong
in suggesting these ideas but if not it would be good to
note them here.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: secdir review of draft-nottingham-http-new-status-03

2012-01-13 Thread Stephen Hanna
Julian,

I'm sure that in your view one sentence is adequate to explain
all the security implications of each status code. However,
you may want to consider that some readers may not have quite
the same deep grasp of the matter that you do. Therefore,
I think it would be wise to provide more explanation. Here's an
example for section 7.2 on status code 429 (Too Many Requests):

Section 7.2  429 Too Many Requests

   While status code 429 can be helpful in figuring out why a
   server is not responding to requests, it can also be harmful.
   When a server is under attack or simply receiving a very
   large number of requests from a single party, responding
   to each of these requests with a 429 status code will consume
   resources that could be better used in other ways. Therefore,
   a server in such circumstances may choose to send a 429 status
   code only the first time a client exceeds its limit and
   ignore subsequent requests from this client until its limit
   is no longer exceeded. Other approaches may also be employed.

As you can see, I described security problems that could occur
with this status code and explained how those problems can be
avoided or mitigated. While it's true that these problems
could occur when a more generic status code is used to handle
the case of too many requests, that does not mean that they
are not relevant to this document. On the contrary, the fact
that this document is providing more detailed status codes
gives us the opportunity and one can argue the obligation to
provide more detailed security analysis relevant to these more
detailed status codes.

And I'm glad that you saw the value in my comment about
Appendix B!

Thanks,

Steve

 -Original Message-
 From: Julian Reschke [mailto:julian.resc...@gmx.de]
 Sent: Friday, January 13, 2012 3:27 PM
 To: Stephen Hanna
 Cc: draft-nottingham-http-new-sta...@tools.ietf.org; sec...@ietf.org;
 ietf@ietf.org
 Subject: Re: secdir review of draft-nottingham-http-new-status-03
 
 On 2012-01-13 20:59, Stephen Hanna wrote:
  I have reviewed this document as part of the security directorate's
  ongoing effort to review all IETF documents being processed by the
  IESG. These comments were written primarily for the benefit of the
  security area directors. Document editors and WG chairs should treat
  these comments just like any other last call comments.
 
  This document specifies new HTTP status codes for a variety of
  common situations. Although I am not an HTTP expert, it seems
  to me that this document is clear, well-written, and reasonable.
 
 +1
 
  From a security perspective, this document seems to have little
  impact either positive or negative. However, the Security
  Considerations section does not meet our usual standards.
  While the authors include a subsection on each new status code,
  they do not explain clearly what the security implications are
  for each status code and how any possible negative impacts
  could be reduced.
 
 In general, the proposed new codes just allow to describe a problem
 more
 clearly; previously, a more generic status code would have to be used.
 
 As such, they do not change security at all.
 
  Riccardo Bernardini already commented on this issue during
  IETF LC. However, I do not agree with Mr. Bernardini that
  sections 7.1 and 7.2 are not security related. Rather, the
  security implications are just not clearly stated. For example,
  section 7.2 points out that servers may not want to always
  use the 429 status code when receiving too many requests
  from one client. This has security implications in that
  a server under attack with excessive requests from one
  client may compound the problem by queuing 429 status codes
  for every request from that client. However, this is not
  stated explicitly in section 7.2. Fleshing out the subsections
 
 Servers are not required to use the 429 status code; when limiting
 resource usage, it may be more appropriate to just drop connections, or
 take other steps.
 
  of section 7 (Security Considerations) should help solve the
  problem by providing a clear description of security problems
  related to these result codes and recommended mitigations.
  Section 7.4 does a decent job of describing the problems
  but fails to describe mitigations. I think that having the
  client use HTTPS instead of HTTP for important requests
  and limiting the effects of HTTP (not HTTPS) responses
  is an obvious mitigation.
 
 It's not the job of this spec to completely describe security
 considerations with respect to captive portals.
 
 All the spec does is defining a new status code that, when used, makes
 captive portals a bit better to work with.
 
  I do have a question about the issues raised in Appendix B.
  These are all legitimate issues. However, it seems to me
  that having status code 511 should help with these. A
 
 Indeed; that's why 511 is there in the first place. The introduction to
 Appendix B should state

Secdir review of draft-ietf-dime-priority-avps-05

2011-11-30 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the 
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This standards track document defines Diameter AVPs that can be
used to convey a variety of priority parameters.

In July 2011, I conducted a secdir review of a previous revision
of this document (-04) and found that the Security Considerations
section was inadequate because it did not include any analysis of
the specific security issues related to priority systems.

I'm pleased to say that the authors have attempted to address this
issue in their new draft. They added a reference to the Security
Considerations section of RFC 5866, which is thorough and sound.
In addition, they explicitly identify one threat: unauthorized
changes to QoS parameters in transit. However, the countermeasure
proposed is confusing. The document now says integrity protected
values SHOULD be ignored. I would expect the reverse. Values
that are not integrity protected SHOULD be ignored. Am I wrong?

I'm concerned that the other threats described in RFC 5866 are
not addressed in this document. Lack of authentication and
confidentiality protection for QoS parameters can have serious
negative impacts, as described in RFC 5866.

In the IETF spirit of send text, I suggest the following
paragraph be added to the Security Considerations section
of this draft:

   As described in [RFC5866], failure to provide adequate
   authentication and confidentiality protection for QoS
   parameters may result in serious failures that undermine
   the very purpose of QoS. Countermeasures such as Diameter
   communication security should be employed as appropriate.

I will supply a further optional suggestion to clarify the
text recently added regarding integrity. I recommend that
the first paragraph of the Security Considerations section
be stripped to just its first sentence and that the following
paragraph be used in place of the new text that was added at
the end of that paragraph:

   The values in the AVPs defined in this draft are not supposed
   to be changed by any of the Diameter servers or any other
   intermediaries. In fact, changes to these AVPs in transit
   could result in serious problems such as inability to
   complete high-priority emergency phone calls. Therefore,
   source integrity protection SHOULD be employed for those
   AVPs (e.g., the use of S/MIME with the SIP RPH, or an INTEGRITY
   object within a POLICY_DATA object).

The text that I wrote may well be incorrect or misguided.
I'm just trying to provide helpful suggestions from a
security perspective. If the authors would like to have
a further chat about this topic, I'd be glad to do so.
And if they want to keep the text that they added on
integrity protection, that's OK. I just found it a bit
lacking in describing the threat and its consequences
and in providing an effective countermeasure.

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: secdir review of draft-ietf-dime-priority-avps-04

2011-07-26 Thread Stephen Hanna
Thanks for your response, Ken.

Removing the last sentence that you quoted would make things worse.
Readers of this draft should definitely familiarize themselves with
the security considerations related to priority. We should make that
easier, not harder. The fact that those considerations also apply to
other RFCs does not remove the fact that they apply to this one also.

You cannot publish a document whose security considerations section
says (as this one effectively does today), There are lots of security
considerations related to this document. To understand them, please
dig through all the referenced documents and figure it out yourself.
Doing that digging and analysis is the job of the document editors.

In order to ease the burden on you, I think a reasonable compromise
would be for YOU to review the documents referenced and decide which
have the most relevant security considerations. Then you could list
those explicitly in the last paragraph of the Security Considerations.

Thanks,

steve

 -Original Message-
 From: carlb...@g11.org.uk [mailto:carlb...@g11.org.uk]
 Sent: Tuesday, July 26, 2011 6:42 AM
 To: Stephen Hanna
 Cc: ietf@ietf.org; sec...@ietf.org; draft-ietf-dime-priority-
 avps@tools.ietf.org; lionel.mor...@orange-ftgroup.com
 Subject: re: secdir review of draft-ietf-dime-priority-avps-04
 
 Hi Steve,
 
 Thanks for the review.
 
 snip
 
  This standards track document defines Diameter AVPs that can be
  used to convey a variety of priority parameters. While the Security
  Considerations section of this document properly requires that
  implementers review the Security Considerations section in the
  Diameter protocol specification and consider the issues described
  there, it does not include any analysis of the specific security
  issues related to priority systems. The authors should review other
  Security Considerations sections relating to priority systems
  (e.g. the one in RFC 4412) and add text that describes the
  special security issues that arise with priority systems and
  the countermeasures that may be employed.
 
 You raise an interesting issue and we actually had a discussion about
 this on the DIME list
 http://www.ietf.org/mail-archive/web/dime/current/msg04773.html
 
 And just for the sake of completeness, here is the security
 considerations text of the dime-priority-avps draft in question:
 
 This document describes the extension of Diameter for conveying
 Quality
 of Service information.  The security considerations of the
 Diameter
 protocol itself have been discussed in [I-D.ietf-dime-rfc3588bis].
 Use
 of the AVPs defined in this document MUST take into consideration
 the
 security issues and requirements of the Diameter base protocol.
 
 The authors also recommend that readers should familiarize
 themselves
 with the security considerations of the various protocols listed in
 the Normative References listed below.
 
 In a nutshell, the authors and the chair disagreed with the need for
 extending the security considerations to include an analysis with
 other protocols (eg, rfc-4412) because these protocols operate outside
 of the DIAMETER protocol.  The dime-priority-avps draft is an
 extension of I-D.ietf-dime-rfc3588bis, and thus is subject to the same
 security considerations to the bis draft.  And its also important to
 keep in mind that the dime-priority-avps draft does not inject
 prioritization into the exchange of DIAMETER messages.  It simply
 defines AVPs that correlate to some priority fields of other protocols.
 
 If it was the last sentence (above) in the dime-priority-avps security
 considerations that has triggered your comment about further analysis,
 then I'd prefer just removing that text.
 
 cheers,
 
 -ken
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: secdir review of draft-ietf-dime-priority-avps-04

2011-07-26 Thread Stephen Hanna
Every RFC author has an obligation to explain in the Security Considerations
section what security issues are likely to arise when this specification is
used and how those issues may be addressed. You can refer to other RFCs if
you like but you cannot ignore the issues or just give a hand wave.

Let me give a specific example. If a user is able to ensure that their phone
calls always get the highest SIP-Resource-Priority, their calls will always
go through, even during a disaster. This will benefit the user so they have
an incentive to do it. However, it may damage the collective if calls from
emergency responders are overridden. For this reason, protection against
active MITM attacks SHOULD be employed when using Priority AVPs.

If you can find an extant RFC that covers the relevant Security Considerations
for your document, you can point to it and say that readers should review it
because the security considerations for this draft are contained there. But
you must perform a serious security analysis for your document if you want
it to be accepted as an RFC. If the answer is that there are no security
considerations, that's fine. You can say that. But in this case, that's
clearly not the case.

You raised the concern that documents may need to highlight security issues
with underlying protocols upon which they depend. That is true. If you're
depending on a protocol that has a serious security problem that's relevant
to your document, you should explain that problem or point to a document
that does so. If the problem is not relevant to your document, no problem.
One need not consider every possible security issue, just the ones that
are most relevant to your document. In your case, there are real security
issues particular to conveying priority AVPs over Diameter. You should
explain what those considerations are or point to documents that do so.
As for MIBs, take a look at some recent ones and you will see that they
do contain good Security Considerations sections. For example, see
RFC 5834 and RFC 6240.

If you'd like to learn more about how to write a good Security
Considerations section, read RFC 3552. Or ask a security expert
to help you. If you can't be bothered to think about security,
you might as well withdraw your draft from consideration.

Thanks,

Steve

 -Original Message-
 From: carlb...@g11.org.uk [mailto:carlb...@g11.org.uk]
 Sent: Tuesday, July 26, 2011 7:24 AM
 To: Stephen Hanna
 Cc: ietf@ietf.org; sec...@ietf.org; draft-ietf-dime-priority-
 avps@tools.ietf.org; lionel.mor...@orange-ftgroup.com
 Subject: RE: secdir review of draft-ietf-dime-priority-avps-04
 
 Steve,
 
 
 Quoting Stephen Hanna sha...@juniper.net:
 
  Thanks for your response, Ken.
 
  Removing the last sentence that you quoted would make things worse.
  Readers of this draft should definitely familiarize themselves with
  the security considerations related to priority. We should make that
  easier, not harder. The fact that those considerations also apply to
  other RFCs does not remove the fact that they apply to this one also.
 
 but those considerations do not directly apply to DIAMETER.
 
  You cannot publish a document whose security considerations section
  says (as this one effectively does today), There are lots of
 security
  considerations related to this document. To understand them, please
  dig through all the referenced documents and figure it out yourself.
  Doing that digging and analysis is the job of the document editors.
 
 agreed, speaking in the general sense.  But again, the security
 considerations of these other protocols do not apply to the operation
 of Diameter.
 
  In order to ease the burden on you, I think a reasonable compromise
  would be for YOU to review the documents referenced and decide which
  have the most relevant security considerations. Then you could list
  those explicitly in the last paragraph of the Security
 Considerations.
 
 I'm concerned about the implications of your recommendation.  If we
 extend this position to other work in the IETF, then efforts like
 defining MIBs would mean that each MIB draft would need to perform a
 security considerations analysis of each protocol that an objects
 refers to in the context of SNMP.  And one can extend the argument
 that each protocol operating on top of TCP (and/or UDP) and IP would
 need to perform an analysis on how TCP/UDP and IP may affect the upper
 layer protocol.  We don't do that today.
 
 cheers,
 
 -ken
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Secdir review of draft-ietf-dime-priority-avps-04

2011-07-20 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the 
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This standards track document defines Diameter AVPs that can be
used to convey a variety of priority parameters. While the Security
Considerations section of this document properly requires that
implementers review the Security Considerations section in the
Diameter protocol specification and consider the issues described
there, it does not include any analysis of the specific security
issues related to priority systems. The authors should review other
Security Considerations sections relating to priority systems
(e.g. the one in RFC 4412) and add text that describes the
special security issues that arise with priority systems and
the countermeasures that may be employed.

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


secdir review of draft-ietf-dnsext-rfc2672bis-dname-22.txt

2011-06-01 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments.

This document intends to replace RFC 2672, the definition of DNAME
redirection in the DNS. DNAME is a DNS resource record type that
(in layman's terms) indicates that all domain names ending in a
specified suffix should be redirected to domain names where the
suffix is replaced by a specified value. For example, all names
that end with example.com should be remapped to example.net.

The document is quite thorough, apparently because the DNAME RR
has been used for many years and a great deal of real-world
experience has been gained. That's definitely a good thing!

From a security perspective, this document includes a more
thorough analysis of security considerations than the original
RFC 2672. It also includes a more thorough discussion of DNSSEC
interactions than the earlier document.

I do not see any security issues that are not well covered in
this document. While I don't think this document will close any
major security issues, it includes some helpful guidance. So
I recommend that this document advance to RFC status.

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


secdir review of draft-ietf-ipfix-mediators-framework-09.txt

2010-12-08 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's  
ongoing effort to review all IETF documents being processed by the  
IESG. These comments were written primarily for the benefit of the  
security area directors. Document editors and WG chairs should treat  
these comments just like any other last call comments.

This document adds a new concept to the IPFIX architecture (RFC 5470):
IPFIX Mediation. This concept allows conversion, correlation, selection,
and other transformations on IPFIX records.

The document is clear and the Security Considerations section
seems to adequately cover the issues raised. I don't see any
problems from a security perspective.

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


secdir review of draft-ietf-csi-dhcpv6-cga-ps-04.txt

2010-10-01 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's  
ongoing effort to review all IETF documents being processed by the  
IESG. These comments were written primarily for the benefit of the  
security area directors. Document editors and WG chairs should treat  
these comments just like any other last call comments.

This document discusses several ways that DHCPv6 can be used with
Cryptographically Generated Addresses (CGA), pointing out benefits
and concerns. While the document does discuss security issues in
several places, it often lapses into vague terminology like one
should carefully consider the impact on security. Given that the
primary benefit of using CGAs is to improve security by providing
address validation without complex key distribution, carefully
analyzing security issues seems necessary for this document.

On the other hand, the Document Shepherd Write-up for this document
says The WG was not very energetic on this document. The document
describes possible applications of CGAs and DHCP interaction and
when the WG was asked whether there was enough interest to work on
solutions, the reply was silence. As such, the consensus is based
on most of the WG being indifferent. So maybe this document is
only intended as a sketch of possible issues that can be explored
later in a more in-depth document if someone is interested in
doing so. If that's the case, maybe it's OK to not fully analyze
all the security implications. However, in that case, I think the
Security Considerations section should state clearly that this
document does not contain a complete security analysis and any
further work in this area should include such an analysis. Nobody
should implement the techniques described in this document without
conducting that more thorough analysis.

I noticed a few typos. On page 6, the word certificated should be
certified. Three sentences later, depend on policies should be
depending on policies. And the draft names in the Change Log say
dhacpv6 instead of dhcpv6.

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


secdir review of draft-ietf-ippm-spatial-composition-15.txt

2010-07-19 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's  
ongoing effort to review all IETF documents being processed by the  
IESG.  These comments were written primarily for the benefit of the  
security area directors.  Document editors and WG chairs should treat  
these comments just like any other last call comments.

This document gives guidance on composing path metrics from sub-path
metrics within the IP Performance Metrics framework. I am not an
expert on IPPM but after some analysis I have concluded that the
security considerations in this draft are adequate. They raise all
the relevant security issues that I could come up with and provide
guidance for how those issues can be addressed.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: secdir review of draft-ietf-netconf-partial-lock-09.txt

2009-08-13 Thread Stephen Hanna
Tom,

Thanks for responding to my comments. Allow me to respond.

You wrote:
 As a participant in netconf, I see authorization as one of those topics
 which the Working Group sees as necessary but cannot be tackled just
 yet.  As RFC4741 says,
   This document does not specify an authorization scheme, as such a
scheme should be tied to a meta-data model or a data model.
 and as yet, there is no data model; hence, no authorization, not yet,
 nor, IMHO, for some time to come.

This is just the sort of background information that a WG participant
would know but that a secdir reviewer would not. Please allow me to
ask a clarifying question. You say that there is no authorization yet.
I think that could mean several things:

1) Existing NETCONF implementations implement authorization, ensuring
   that each user gets an appropriate and perhaps different level of
   access to the database. However, there are no standards for the
   manner in which authorization is performed or configured.

2) Existing NETCONF implementations require authentication but generally
   just give complete read-write access to the database to all authenticated
   users.

3) Existing NETCONF implementations do not require authentication.
   Anyone with network access has complete, unfettered access to
   the database and can modify it at will.

Could you tell me which of these meanings is most accurate?
Of course, it could be a mix of these but I'd like to get your
real-world assessment of the state of the NETCONF world.
If the answer is 3), we have a serious problem! If the answer
is 1) or 2), that's acceptable in my view.

Now on to the language in the draft. My comment was relating to
this quote from the Security Considerations:

 Only an authenticated and authorized user can request a partial
 lock.

I'm afraid that this statement is not justified if there is no
normative text requiring implementations to comply. I suggest
that normative text be added to at least require authentication.
With such text, the statement above could be justified. Requiring
that levels of authorization be implemented is less important
in this application. And standardizing the manner in which
authorization is performed or configured (which I think is
your concern with respect to the lack of a data model) is
really not important at all unless NETCONF customers or
vendors decide that it is. Standardizing an authorization
policy format is a tremendously challenging task for any
protocol and often not necessary.

I hope that this helps you address my comments in a reasonable
and achievable manner. The intent of secdir comments is not to
impose unreasonable requirements. It is to point out issues that
might not be evident to someone who is not a security expert.

Thanks,

Steve

 -Original Message-
 From: Tom.Petch [mailto:sisyp...@dial.pipex.com] 
 Sent: Thursday, August 13, 2009 4:00 AM
 To: Stephen Hanna; sec...@ietf.org; ietf@ietf.org; 
 draft-ietf-netconf-partial-l...@tools.ietf.org
 Subject: Re: secdir review of draft-ietf-netconf-partial-lock-09.txt
 
 - Original Message -
 From: Stephen Hanna sha...@juniper.net
 To: i...@ietf.org; sec...@ietf.org; ietf@ietf.org;
 draft-ietf-netconf-partial-l...@tools.ietf.org
 Sent: Monday, August 10, 2009 4:28 PM
 
  I have reviewed this document as part of the security directorate's
  ongoing effort to review all IETF documents being processed by the
  IESG.  These comments were written primarily for the benefit of the
  security area directors.  Document editors and WG chairs 
 should treat
  these comments just like any other last call comments.
 
  This document defines optional partial-lock and partial-unlock
  operations to be added to the NETCONF protocol. These operations
  are used to lock only part of a configuration datastore, allowing
  multiple management sessions to modify the configuration of a
  device at a single time.
 
  The Security Considerations section of the document highlights
  the risk that a malicious party might employ partial locks to
  impede access to a device's configuration. Therefore, it states
  Only an authenticated and authorized user can request a partial
  lock. Unfortunately, I cannot find any normative text (MUST)
  that supports this statement. The NETCONF spec (RFC 4741) says
  NETCONF connections must be authenticated but this is not
  clearly normative. Perhaps a NETCONF expert can point to some
  normative text requiring authentication and authorization for
  any party requesting a partial lock. If not, I suggest that
  such normative text be added to the partial-lock specification.
 
 As a participant in netconf, I see authorization as one of 
 those topics
 which the Working Group sees as necessary but cannot be tackled just
 yet.  As RFC4741 says,
   This document does not specify an authorization scheme, as such a
scheme should be tied to a meta-data model or a data model.
 and as yet, there is no data model; hence, no authorization, not yet

RE: secdir review of draft-ietf-netconf-partial-lock-09.txt

2009-08-13 Thread Stephen Hanna
Thanks to Dan and Bert for answering my question.
If most NETCONF implementations authenticate users
and implement some form of authorization scheme,
there should be no problem with including text
in draft-ietf-netconf-partial-lock-09.txt that
says NETCONF servers that implement partial
locks MUST ensure that only an authenticated
and authorized user can request a partial lock.
Even a server that implements authentication but
does not implement fine-grained authorization
would meet this requirement. It would just be
saying that all authenticated users are fully
authorized to perform any operation on the server.

Are there any concerns with this proposal?
If so, please explain.

Thanks,

Steve

 -Original Message-
 From: Bert (IETF) Wijnen [mailto:berti...@bwijnen.net] 
 Sent: Thursday, August 13, 2009 7:35 AM
 To: Stephen Hanna
 Cc: Tom.Petch; sec...@ietf.org; ietf@ietf.org; 
 draft-ietf-netconf-partial-l...@tools.ietf.org
 Subject: Re: secdir review of draft-ietf-netconf-partial-lock-09.txt
 
 Stephen,
 
 I think it is your first bullet point. We have not standardize it yet.
 And so it is implementation dependent as to what 
 authorization is used.
 
 Bert
 
 
 Stephen Hanna wrote:
  Tom,
 
  Thanks for responding to my comments. Allow me to respond.
 
  You wrote:

  As a participant in netconf, I see authorization as one of 
 those topics
  which the Working Group sees as necessary but cannot be 
 tackled just
  yet.  As RFC4741 says,
This document does not specify an authorization scheme, 
 as such a
 scheme should be tied to a meta-data model or a data model.
  and as yet, there is no data model; hence, no 
 authorization, not yet,
  nor, IMHO, for some time to come.
  
 
  This is just the sort of background information that a WG 
 participant
  would know but that a secdir reviewer would not. Please allow me to
  ask a clarifying question. You say that there is no 
 authorization yet.
  I think that could mean several things:
 
  1) Existing NETCONF implementations implement 
 authorization, ensuring
 that each user gets an appropriate and perhaps different level of
 access to the database. However, there are no standards for the
 manner in which authorization is performed or configured.
 
  2) Existing NETCONF implementations require authentication 
 but generally
 just give complete read-write access to the database to 
 all authenticated
 users.
 
  3) Existing NETCONF implementations do not require authentication.
 Anyone with network access has complete, unfettered access to
 the database and can modify it at will.
 
  Could you tell me which of these meanings is most accurate?
  Of course, it could be a mix of these but I'd like to get your
  real-world assessment of the state of the NETCONF world.
  If the answer is 3), we have a serious problem! If the answer
  is 1) or 2), that's acceptable in my view.
 
  Now on to the language in the draft. My comment was relating to
  this quote from the Security Considerations:
 

  Only an authenticated and authorized user can request a partial
  lock.
  
 
  I'm afraid that this statement is not justified if there is no
  normative text requiring implementations to comply. I suggest
  that normative text be added to at least require authentication.
  With such text, the statement above could be justified. Requiring
  that levels of authorization be implemented is less important
  in this application. And standardizing the manner in which
  authorization is performed or configured (which I think is
  your concern with respect to the lack of a data model) is
  really not important at all unless NETCONF customers or
  vendors decide that it is. Standardizing an authorization
  policy format is a tremendously challenging task for any
  protocol and often not necessary.
 
  I hope that this helps you address my comments in a reasonable
  and achievable manner. The intent of secdir comments is not to
  impose unreasonable requirements. It is to point out issues that
  might not be evident to someone who is not a security expert.
 
  Thanks,
 
  Steve
 

  -Original Message-
  From: Tom.Petch [mailto:sisyp...@dial.pipex.com] 
  Sent: Thursday, August 13, 2009 4:00 AM
  To: Stephen Hanna; sec...@ietf.org; ietf@ietf.org; 
  draft-ietf-netconf-partial-l...@tools.ietf.org
  Subject: Re: secdir review of 
 draft-ietf-netconf-partial-lock-09.txt
 
  - Original Message -
  From: Stephen Hanna sha...@juniper.net
  To: i...@ietf.org; sec...@ietf.org; ietf@ietf.org;
  draft-ietf-netconf-partial-l...@tools.ietf.org
  Sent: Monday, August 10, 2009 4:28 PM
 
  
  I have reviewed this document as part of the security 
 directorate's
  ongoing effort to review all IETF documents being processed by the
  IESG.  These comments were written primarily for the 
 benefit of the
  security area directors.  Document editors and WG chairs 

  should treat
  
  these comments just like

secdir review of draft-ietf-netconf-partial-lock-09.txt

2009-08-10 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This document defines optional partial-lock and partial-unlock
operations to be added to the NETCONF protocol. These operations
are used to lock only part of a configuration datastore, allowing
multiple management sessions to modify the configuration of a
device at a single time.

The Security Considerations section of the document highlights
the risk that a malicious party might employ partial locks to
impede access to a device's configuration. Therefore, it states
Only an authenticated and authorized user can request a partial
lock. Unfortunately, I cannot find any normative text (MUST)
that supports this statement. The NETCONF spec (RFC 4741) says
NETCONF connections must be authenticated but this is not
clearly normative. Perhaps a NETCONF expert can point to some
normative text requiring authentication and authorization for
any party requesting a partial lock. If not, I suggest that
such normative text be added to the partial-lock specification.

Another security concern that I have related to the partial-lock
operation is that the configuration might become inconsistent if
one manager changes one part of a datastore at the same time that
another manager changes another part. The resulting inconsistency
could have security implications. For example, an organization might
have a rule that either the firewall or the intrusion detection
features must be enabled on a device. If one manager might lock
intrusion detection configuration, check that the firewall is
enabled, and then disable intrusion detection. Another manager
might lock the firewall configuration, check that intrusion detection
is enabled, and then disable the firewall. If those operations
were interleaved, they could result in a violation of policy.
To address this concern, I suggest that the draft contain a
warning that parallel operations are tricky and should be
carefully considered. Sometimes, it may be necessary to lock
a portion of the datastore that will not be modified, just to
ensure the datastore remains consistent and compliant with policy.

Of course, a human administrator using a GUI could easily
run into this same problem if the human does not have the
ability to control configuration locks. The human might
look at the firewall configuration to make sure that it's
enabled and then switch to another section of the display
to disable the intrusion detection function. If the management
console only locks the datastore to execute the administrator's
request to disable intrusion detection, overlapping operations
from another administrator could result in a bad configuration.
This problem can arise even without the partial lock operation.
Probably the best that can be done here is to include language
warning of this sort of problem. Warning human administrators
that someone else is also editing the device should help and
giving these administrators the ability to easily communicate
with each other to coordinate their work would also probably help.

Here are a few minor issues:

* At the end of section 2.1.1.2, the comma in the last
  sentence is superfluous.

* In section 2.1.1.3 in the sentence Manager A terminates it's
  session, the apostrophe should be removed.

* In section 2.4.1, I think that the sentence that begins with
  If someone later creates a new interface would be clearer
  if the second comma was changed to so.

* Later in section 2.4.1, the sentence that begins with
  A NETCONF server MUST should instead start with A NETCONF
  server that supports partial locks MUST. I think that
  paragraph should end with all of the overlapping locks are
  released not all of the locks are released.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


secdir review of draft-peterson-rai-rfc3427bis-02.txt

2009-07-28 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This document replaces RFC 3427, refining the SIP change process.
Although I have some familiarity with SIP, my knowledge of this
area is minimal. I have not participated in any of the RAI WGs
or in the SIP change process. My comments should therefore mainly
be taken as those of an IETF common man and a security expert.

I have very few security concerns related to this document.
As with RFC 3427, this document continues to require all new
SIP headers and event packages (the only extensions that can
be registered without going through an IETF WG) to be reviewed
by a Designated Expert using guidelines that include strict
security requirements.

My only security concern with this process is that a Designated
Expert might not have much or any security expertise. A truly
dedicated reviewer without such expertise would seek specialized
review for security issues but many reviewers are overworked or
not able to obtain security help. This problem could be solved
by requiring all SIP extensions to become RFCs, therefore ensuring
that they get broad review, including secdir reviews. RFC 3427
required this. This draft proposes to remove the requirement
for RFC publication for SIP headers, allowing IANA registration
of SIP headers that receive Designated Expert review but are
not published as RFCs. I suggest that this change not be made
since it will reduce the security review of these extensions.

Another reason to not allow IANA registration of SIP headers
without RFC publication is that there may not be a permanent and
clear definition of these headers. If a header is only documented
on a vendor web site, that documentation can disappear at any time.

Other changes that were made to the SIP header registration
process include a large reduction in the number of guidelines
for expert reviewers. The requirements dropped include these:
applicability to SIP, lack of overlap with current or planned
SIP extensions, clear documents, and an applicability statement
when the extension is not suitable for use on the Internet.
Removing those guidelines seems unwise to me.

I have divided the rest of my comments into substantive and
non-substantive comments. First, the substantive ones.

* Does the term consensus in the first sentence of the
  third paragraph of section 3 refer to WG consensus or
  IETF consensus? I believe that it refers to WG consensus
  but this should be clarified.

* The last sentence of the fifth paragraph in section 3
  says that the DISPATCH working group may approve
  proposals for extensions if the requirements are judged
  to be appropriate to SIP, but are not sufficiently
  general for standards track activity. I think that
  these proposals would then proceed as individual
  submissions. If that's right, I suggest that this be
  mentioned in this sentence.

* The first paragraph of section 4.1 says that Normal
  event packages can be created and registered by the
  publication of any Working Group RFC (Informational,
  Standards Track, Experimental), provided that the RFC
  is a chartered working group item. However, the
  next paragraph describes how individual submissions
  for event packages may be published. This seems to
  be a contradiction. Maybe the sentence that I just
  quoted is not intended to exhaustively describe all
  the ways that event packages can be created. If that's
  the case, the sentence should be clarified.

* Paragraph four of section 4.1 says that the procedure
  for registering event packages developed outside the
  scope of an IETF working group is RFC Required.
  However, the process described in the following
  paragraphs would better be described as RFC Required
  with Designated Expert Review.

* As the first paragraph in the Security Considerations
  section says, feature interactions can have significant
  security implications. However, the text should go one
  step beyond to require that all RFCs that modify or
  extend SIP must consider the security implications of
  feature interactions.

* The fifth paragraph of section 7 says that For event
  template packages, registrations must follow the RFC5226
  processes for Standards Action. Actually, the earlier
  part of this document included an additional requirement
  that such specifications must be developed by an IETF
  Working Group. Probably that should be documented here.

* The fifth paragraph of section 7 also states that
  IETF Review is the process used for ordinary event
  packages. That is not consistent with section 4.1,
  which states that the process for these is RFC Required
  (with Designated Expert review). I think that
  section 4.1 is correct and the text in section 7
  

secdir review of draft-ietf-krb-wg-naming-04.txt

2008-03-06 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the 
IESG. Document editors should treat these comments just like any
other comments.

This document defines conventions for well-known Kerberos principal
names and well-known Kerberos realm names.

While the document seems to be pretty thorough, the Security
Considerations section is too brief. This is especially true
for a document whose main purpose is to modify a criticial
security protocol such as Kerberos. The Security Considerations
section could provide an example of how unintended access
could be granted if an authentication with an unsupported
well-known name is allowed to succeed. More important, it
should explain why it is permissible for the TGS to allow
an authentication to succeed even if the client and/or
server principal name is an unsupported well-known name.
The reasoning for allowing this is not clear to me but
perhaps it is that the TGS can assume that the AS must
have supported the client name or it would have failed the
authentication. I'm not sure how this helps to address the
case where the server name is an unsupported well-known
name. I would like to see that explained, preferably
in the document.

I also noticed a few typos:

At the end of section 1, remedy these should be remedy these
issues or something similar. Otherwise, it's not clear what is
to be remedied.

In the last paragraph of section 3.1, the first word is in the
phrase is a well-known principal name is used should be if.
Similarly, in the second paragraph of section 3.2, the first word
is should be if in the phrase is a well-known realm name is used.

Other than these issues, the document seems to be OK.

Thanks,

Steve
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


secdir review of draft-ietf-l2vpn-vpls-mcast-reqts-05.txt

2007-11-12 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other late last call comments.

This document describes requirements for multicast support in
Virtual Private LAN Services (VPLS). This is not an area of
particular expertise for me but I have considerable experience
with multicast and security so I think this analysis is at
least worthy of consideration.

*Overall Clarity and Quality*

The document is fairly clear in its description of requirements.
The reader must consult a large number of referenced documents
but this is not unusual in modern IETF specifications. I'm pleased
to see this relative clarity since vagueness can easily lead to
misunderstandings, interoperability problems, and security holes.

*Security Analysis*

Unfortunately, the document does not contain a systematic
security analysis of the problem. The Security Considerations
section consists of two brief paragraphs. These paragraphs refer
to other sections in the document where security requirements
are listed and to RFC 4665, which also lists security requirements.
However, I could not find any methodical threat analysis listing
the possible threats relevant to the system and stating which
ones are protected against and which are not.

Without a thorough threat analysis, I have little confidence
that the authors have thought carefully about the possible
threats to the system. I would expect this to lead to large
gaps in the security requirements and this seems to be borne
out in practice. For example, there is no discussion of
threats due to compromise of components within the service
provider network.

Even more troublesome, I think that a single node at a customer
site (presumably untrusted) can mount dangerous attacks.
For example, a node that joins many multicast groups can
cause a large amount of state to be maintained in the L2VPN.
While section 6.6 of the document says that a multicast VPLS
solution SHOULD have mechanisms to protect a SP network from
[...] high volumes of valid/invalid customer control packets,
it is not clear how this protection will be provided. If it
takes the form of limiting the number of control packets,
one node can exhaust the customer's quota and effectively
shut down the ability for other nodes at that site to join
multicast groups. In fact, later in that section it is stated
that policing [to limit unwanted data traffic] MAY be
configurable to the sum of unicast, multicast, broadcast
and unknown unicast traffic. If this was implemented,
one node at a customer site could bring down all incoming
multicast AND unicast traffic to the site by joining a few
high-traffic multicast groups. I expect that this is not
what the authors had in mind but it's permissible according
to the requirements contained in this document.

Section 6.6 of the document contains most of the security
requirements in the document. However, many of these are
SHOULDs or even MAYs. At least, the document should describe
the negative effects of not meeting these weak requirements.
What threats are not protected against? I suspect that when
this is done, the Working Group may reconsider the weakness
of these requirements.

Although I recognize that unicast traffic to unknown destinations
is out of scope for this document, it is mentioned. I am concerned
that security issues related to such traffic may be falling through
the cracks and not be covered by any specification. If this traffic
can cause flooding and then state maintenance in the L2VPN, there
may be threats where a malicious node sends such traffic to a
variety of unknown destinations to cause excess traffic and state
in the L2VPN.

*Conclusion*

I recommend that a thorough security analysis be conducted
for this document and included in the document. All threats
identified in this analysis should be addressed by adding
a requirement pertaining to them or by explicitly stating
that the threat will not be addressed and why and what the
ramifications are.

Until this is done, this document should not progress.
To do otherwise might cause substantial damage to the
security of customer networks that employ L2VPN services.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


secdir review of draft-ietf-dnsop-reflectors-are-evil-04.txt

2007-09-24 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

DNS is not my area of expertise but the document clearly explains
the nature of the problem to be solved (DOS attacks that employ
DNS servers as amplifiers) and the recommendations for solving the
problem (employing ingress filtering to prevent IP address spoofing
and changing nameservers to provide recursive name lookup service
only to the intended clients).

I have no issue with the main content of the document. It does seem
like a worthwhile recommendation. However, I have a few comments.

The Introduction seems a bit defensive in stating that the DOS attacks
are not due to any flaw in the design of DNS or its implementations.
While the blame for the attacks lies with the attackers, some aspects
of nameserver configuration, behavior, and even protocol design make
the systems vulnerable to these attacks. I suggest that the defensive
language be removed.

Although I agree that ingress filtering is a good solution to this
problem and provides many other benefits since it addresses many
different attacks that involve spoofed IP addresses, the document
states repeatedly that ingress filtering is the only solution to
the problem. Ingress filtering may be the best solution but it is
NOT the only solution, as evidenced by the other measures described
in the document. None of these measures (including increased use
of ingress filtering) will provide complete and absolute protection
against DOS attacks that use nameservers as attack amplifiers.
Employing all of the measures as appropriate while emphasizing
the huge benefits of ingress filtering seems like the best approach.
So I suggest that the wording in the document be toned down to take
a more balanced approach to the problem.

Finally, I wonder whether other more fundamental techniques for
addressing the problem have been explored. For instance, if DNS clients
were required to perform a simple handshake before a DNS server sent
a long response, fake requests would provide little amplification.
For example, requests that elicit long responses could prompt a
shift to TCP. Of course, this would have other unpleasant side effects
such as slowing down the processing of DNS requests with long responses
and troubles getting DNS requests through firewalls. I'm not suggesting
that this approach be discussed in this document, simply that it be
considered (which probably has already been done).

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


secdir review of draft-ietf-dhc-server-override-04.txt

2007-07-02 Thread Stephen Hanna
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

The analysis of threats and countermeasures in the Security
Considerations section of this document is OK. Overall, I do not
have any concerns about the approval of this document after
the few issues listed here are corrected. Making these corrections
should not be difficult.

The Security Considerations section of the document has a few
issues. First, the damage that a rogue DHCP relay could cause also
includes changing DHCP options in DHCPACK messages and extending
leases when they should not be extended. Second, the current text
implies that either DHCP authentication or DHCP Relay Agent option
authentication can be deployed to provide adequate protection
against the threats described. Actually, this is not accurate.
DHCP Relay Agent option authentication alone will not suffice
unless protection is in place against the introduction of rogue
DHCP relays. Without DHCP authentication, a rogue relay could simply
change the Server Identifier in the DHCPOFFER without detection.
Third, this draft does not add any new vulnerabilities
that were not already present, except in the case where
DHCP authentication is already in place and DHCP clients
require its use. This should be noted. Fourth, this draft
should recommend that either DHCP authentication SHOULD
be deployed or protection be provided against the insertion
of rogue DHCP relays and servers. Such protection continues
to be essential in protecting clients from misconfiguration.

A discussion of the security benefits provided by this option
(if any) would also be useful. Apparently, this option extends
the benefits of the DHCP Relay Agent Info option as described
in section 4.0 of 3046 to cases where the DHCP client sends
unicast packets (like the RENEWING state). I'm not sure that
any of these benefits actually apply in that circumstance but
it would be good to describe any security benefits provided.

Here are a few non-security comments:

On the last line of page 5, I think the phrase all DHCP packets
all servers should be all DHCP packets to all servers.

The document should reference essential docs earlier, no later
than section 3. For example, RFC 3046 is not actually referenced
at all, although clearly section 5 intends to do so.

This document should reference DHCPv6, since it is referred to.

The references should be divided into normative and informative.

The reference in section 5 should be to [6] not [3].

BTW, I am on vacation this week with limited Internet access
so I may be late in responding to email. Sorry about that.

Thanks,

Steve Hanna

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-19 Thread Stephen Hanna
Ted Hardie wrote:
 For the charter discussions, I want to know whether it will
 be an aim of the working group to standardize:

 * a way of carrying this information
 * the structure of this information (but not its content)
 * a standard representation of the content, so that access to the
vendor database
   is no longer required

I believe that we'll need to define all three of these.
There may be times when access to an external database
would be useful (if you want to know exactly which viruses
are covered by which AV defs version, for example) but
such access should not be required to use the standard
attributes.

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Stephen Hanna
Sam Hartman wrote:
 One of the things coming out of the most recent BOF was a 
 strong desire for PA-level interoperability.  That can be 
 accomplished through standardized attributes or 
 vendor-specific attributes that are sufficiently well 
 documented (and not subject to patents) that third parties 
 can implement collectors or analysis tools that interoperate 
 with the vendor tools for the vendor attributes.
 
 Will we be able to meet these interoperability goals?  Why or why not?

Yes, we can. If we define a small set of standardized attributes
(OS and app version, AV status, etc.) and make them mandatory to
implement, then we will have interoperability with respect to
those attributes. We should allow the definition of attributes
that go beyond this minimal standard mandatory to implement (MTI)
set but the MTI set will provide a baseline of information
available for all endpoints that implement NEA.

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Stephen Hanna
Vidya Narayanan wrote:
 I am very apprehensive of achieving any meaningful PA-level
 interoperability. I am not sure what minimum set of PA attributes will
 be standardized, but, whatever that set is, I doubt will be sufficient
 to provide any acceptable level of security, even for the endpoints.

This is not surprising, since you have said that you don't see
any security value to NEA.

 Even assuming ongoing standardization of vendor specific attributes,
it
 is not totally realistic to assume that all applications will support
 the appropriate attributes. The rate of standardization is also very
 likely to be much slower than the rate of the growth in the number of
 attributes needed for any continued meaningful protection.  

NEA is not based on applications supporting attributes.
Attributes are supported by Posture Collectors and
Posture Validators, specialized NEA components. An AV
Posture Collector will handle attributes pertaining
to AV, perhaps by interfacing with an existing AV
application. Still, I agree that a given endpoint
will typically only support a small subset of the
universe of possible attributes. Not a problem.
As long as the endpoint supports enough attributes
that the Posture Broker can evaluate its compliance
with the posture policy, that's enough.

Thanks,

Steve

-Original Message-
From: Narayanan, Vidya [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 16, 2006 5:06 PM
To: Sam Hartman; Frank Yeh Jr
Cc: Hardie, Ted; [EMAIL PROTECTED]; ietf@ietf.org
Subject: RE: [Nea] WG Review: Network Endpoint Assessment (nea)

Sam, 

 -Original Message-
 From: Sam Hartman [mailto:[EMAIL PROTECTED] 
 Sent: Friday, October 13, 2006 12:43 PM
 To: Frank Yeh Jr
 Cc: Hardie, Ted; [EMAIL PROTECTED]; ietf@ietf.org
 Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea)
 
  Frank == Frank Yeh [EMAIL PROTECTED] writes:
 
 Frank Standardized VS vendor-specific attributes is not 
 something that needs to be
 Frank solved today. Solutions can start with 
 vendor-specific and migrate toward a
 Frank standard, if one develops, without changing the 
 protocol. The specification
 Frank should not preclude the addition of standardized 
 attributes. IE the
 Frank specification is like an alphabet, attributes are 
 like vocabulary. You can add
 Frank new words without changing the letters.
 
 
 One of the things coming out of the most recent BOF was a 
 strong desire for PA-level interoperability.  That can be 
 accomplished through standardized attributes or 
 vendor-specific attributes that are sufficiently well 
 documented (and not subject to patents) that third parties 
 can implement collectors or analysis tools that interoperate 
 with the vendor tools for the vendor attributes.
 
 Will we be able to meet these interoperability goals?  Why or why not?
 

I am very apprehensive of achieving any meaningful PA-level
interoperability. I am not sure what minimum set of PA attributes will
be standardized, but, whatever that set is, I doubt will be sufficient
to provide any acceptable level of security, even for the endpoints.
Even assuming ongoing standardization of vendor specific attributes, it
is not totally realistic to assume that all applications will support
the appropriate attributes. The rate of standardization is also very
likely to be much slower than the rate of the growth in the number of
attributes needed for any continued meaningful protection. 

Regards,
Vidya

___
Nea mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/nea

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Network Endpoint Assessment (nea)

2006-10-17 Thread Stephen Hanna
Ted,

As I understand your concerns expressed below, you are concerned
that standardizing attributes for NEA would be redundant and
pointless: redundant because vendor-specific attributes will
cover the same information in more detail and pointless because
remediation will not be possible given the limited information
available through the standardized attributes. Is that right?

If so, maybe it would help to explain why we want to have
standardized attributes. The goal is to ensure that any NEA
endpoint and server can interoperate in a meaningful manner
without making the assumption that endpoint and server have
the same vendor plug-ins installed. For this to be true,
we must ensure that every NEA endpoint provides a basic set
of information to the NEA server. That basic set of information
will be the standardized attributes. If the endpoint and server
both understand vendor-specific attributes that provide more
information, that's great. But we want to ensure a base level
of interoperability.

Yes, remediation may be difficult using only the information
in the standardized attributes. But a captive portal technique
can be used to provide information to the endpoint user about
how to remediate.

Thanks,

Steve

Ted Hardie wrote:
 I have a very basic fear that this working group is getting chartered
 with a bunch of aims added by people who will not take on the
 task of doing the work.  After private discussion with folks
 involved, my sense is that the very core of this work is a perceived 
 need to be able to pass opaque strings between a host and the network 
 prior to the host attaching.  Those opaque strings are, essentially,
 the vendor-specific strings currently associated with posture
assessment.
 The standard protocol carrying these strings would connect on the
network
 side to a system that has plug-ins which understand the
vendor-specific
 strings.  
 
 With a charter that clarified that this was intended to assist the end
 systems with vulnerabilities prior to attachment because the
 network they are attaching to might be filled with danger, I 
 think this work would get done reasonably quickly. (As a control
 mechanism to protect the network, I agree with the point made
 clearly by others that this is not appropriate).
 
 I am less sure of the task of standardizing attributes.
 
 I am not sure that the number of attributes which can be standardized
 will ever be high enough to be truly useful, and I am pretty sure
 that all of these will be already covered by vendor-specific
attributes.
 Since there must be an assessor in place on the client for those few
 standardized attributes to be assessed and that assessor will likely
already
 have these covered by vendor-specific attributes, in other words,
 we seem to be standardizing redundancy.  On the network attachment
 side, it is possible, of course, that an offer of remediation could be
made
 based on just the standard attributes, but it seems far more likely
that
 it would be a two step process (assess standard attributes, then pass
 vendor-specific attributes to vendor plug-in).  Again, if the vendor's
 attributes cover the standard attributes, then this is largely
redundant
 and may add measurable latency; it seems far more likely that 
 step one would simply be skipped if there were a vendor-specific
string
 and an available plug-in. Since there has to be an assessor, the first
 seems very likely to me.  If you don't have a vendor's plug-in, then
 I suppose there is some chance that you will trust and act based on
the standard
 attributes, but the chance of getting the right remediation seems
 pretty slight in those circumstances.  Especially when many
vulnerabilities
 are a combination of conditions, (Browser version Foo on OS patch
level Bar) 
 that you could remediate by upgrading either one, checking for and
 acting on the attributes which could be standardized seems of very,
very 
 limited utility.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Stephen Hanna
Vidya,

Thanks for your response. I think we may be getting closer to
understanding each other's perspectives. That's a good thing.

Let me respond to your comments inline below. I hope you won't
mind if I clip a bit since this thread is starting to get long.

Vidya Narayanan wrote:
 A. Any network is exposed to threats from lying endpoints, compromised
 endpoints and unknown vulnerabilities even on NEA-compliant endpoints.


 B. A network needs to be protected against such generic threats (as
 listed in A).

Agreed. There are plenty of other threats but that's enough for now.

 I am rather confused by this attempt to make NEA fit into some kind of
a
 network protection mechanism. I keep hearing that NEA is *one* of a
 suite of protocols that may be used for protecting networks. Let's dig
a
 bit deeper into what a network may employ as protection mechanisms in
 order to protect against all kinds of general threats. 

 i) Access control mechanisms such as authentication and authorization
 (to ensure only valid endpoints are allowed on the network)
 ii) Ingress address filtering to prevent packets with topologically
 incorrect IP addresses from being injected into the network
 iii) VPNs to provide remote access to clients
 iv) Firewalls to provide advanced filtering mechanisms
 v) IDS/IPS to detect and prevent intrusions 
 vi) Application level filtering where applicable (e.g., detecting and
 discarding email spam)

 A combination of the above (or the like) needs to be used to address
the
 general threats mentioned above (in B, for e.g.). Given that, what
does
 NEA bring to the network that isn't already provided by such
mechanisms
 that need to be employed anyway? It is not like we can stop using some
 of these mechanisms if NEA is present, since the threats that NEA may
 protect against (from the network perspective) are a small subset of
the
 general threats that a network operator must consider. And, when the
 general threats are addressed, any subset of those threats are also
 addressed. 

NEA is another network security tool. Like the others, it has some
special advantages but does not remove the need for the others.

What does NEA provide that isn't provided by the others? NEA can

1) identify unhealthy endpoints (vulnerable or infected)
2) quarantine unhealthy endpoints before they can infect others
   or become infected (optionally)
3) repair unhealthy endpoints (optionally)

Yes, NEA cannot provide all these functions itself. NEA provides a
framework for passing messages about endpoint health. Other security
products use that framework to collect, send, and validate specific
posture attributes and then to send remediation instructions and/or
quarantine unhealthy endpoints.

 The effectiveness of NEA is tied to the type of endpoint (i.e.,
 truthful, compliant endpoints with known vulnerabilities). A network,
 OTOH, needs mechanisms that protect against all kinds of endpoints. I
 fail to understand why a particular category of endpoints that NEA
 addresses is not viewed as a subset of the general category of all
 endpoints. 

With the aid of technology for detecting lying endpoints, NEA can
also handle that class of endpoints. But I agree that NEA will
probably never apply to every endpoint on the network. For endpoints
that support NEA, the network operator can provide better security.
For endpoints that don't support NEA, it will be status quo.

 Steve Hanna wrote:
  In the context of an overall security program and when 
  combined with other security technologies, NEA can help 
  protect networks.
  Let me list the ways.
  
  First, NEA can help improve the security of cooperating, 
  truthful endpoints. 

 How is this network protection? As you state above, it is about
 improving the security of co-operating, truthful *endpoints*. 

Network security is improved because fewer cooperating,
truthful endpoints turn into uncooperative, infected
endpoints that then flood the network with attacks.

  Second, NEA can be used with technology for detecting lying 
  endpoints. This prevents compromised systems from lying to 
  gain access to the network, thus providing a huge improvement 
  in network security.

 Once again, given that a network operator must really protect against
 many generic threats, what kind of improvement is NEA bringing to the
 security of the network? 

See my comments above.

  Third, endpoints that don't initially participate in NEA 
  protocols can be quarantined for further examination with an 
  external vulnerability scanner or a dynamically downloaded 
  NEA client. Again, this is not part of the proposed NEA WG 
  charter but it is another example of ways that NEA can be 
  used with other security technologies to improve network security.

 I'm confused by the above - what is the role of NEA here? 

I'm pointing out that endpoints that don't initially participate
in NEA protocols can be quarantined and directed to a web page
where they can run a dynamically downloaded 

Re: WG Review: Network Endpoint Assessment (nea)

2006-10-10 Thread Stephen Hanna
I have seen a lot of discussion about whether NEA provides
network protection. In fact, it has been suggested that
the charter be revised to say NEA must not be considered
a protection mechanism for networks. I don't agree.

Let's start by examining this concept of network protection.
It's an awfully broad concept. No single security technology
can provide total protection for a network against all attacks.
Instead, a careful threat analysis must be done and layered
countermeasures put in place: firewalls, malware scanning,
intrusion detection and prevention, strong authentication and
authorization, strong encryption for data at rest and in transit,
user education, etc.

In the context of an overall security program and when combined
with other security technologies, NEA can help protect networks.
Let me list the ways.

First, NEA can help improve the security of cooperating, truthful
endpoints. When a cooperating, truthful endpoint connects to the
network, its health can be checked and any problems fixed before
it can come under attack. This helps protect networks by keeping
endpoints healthy so that fewer endpoints become infected and
potentially impact the network through port scanning and other
misbehavior.

The protection provided by NEA alone is not absolute. Healthy
endpoints can be vulnerable to a zero day attack. And NEA on its own
provides no protection against lying endpoints and no protection
against hosts that don't participate in NEA protocols. But it's
a lot better than today's situation where some endpoints are
completely unprotected with patches or anti-virus software.

Second, NEA can be used with technology for detecting lying
endpoints. This prevents compromised systems from lying to
gain access to the network, thus providing a huge improvement
in network security.

I recognize that technology for detecting lying endpoints is
out of scope for the NEA effort but we shouldn't pretend that
it doesn't exist. Without NEA or similar protocols, it will be
hard to integrate lying endpoint detection systems into network
access control. That's why the NEA BOF in Montreal agreed to
include language in the charter saying that the protocols developed
by the NEA WG must be designed to accommodate emerging technologies
for identifying and dealing with lying endpoints.

Third, endpoints that don't initially participate in NEA protocols
can be quarantined for further examination with an external
vulnerability
scanner or a dynamically downloaded NEA client. Again, this is not part
of the proposed NEA WG charter but it is another example of ways that
NEA
can be used with other security technologies to improve network
security.

To summarize, the NEA protocols will increase network security
on their own. When combined with other technologies, the increase
in network security is much greater. But either way it is not
accurate to say that NEA is not a protection mechanism for networks.

Thanks,

Steve

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf