Re: [Anima] Alissa Cooper's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS and COMMENT)

Toerless Eckert <tte@cs.fau.de> Thu, 11 July 2019 15:08 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04D8B12016D; Thu, 11 Jul 2019 08:08:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.95
X-Spam-Level:
X-Spam-Status: No, score=-3.95 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 29O-vN_fgthm; Thu, 11 Jul 2019 08:08:25 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A11F31202EA; Thu, 11 Jul 2019 08:08:24 -0700 (PDT)
Received: from faui48f.informatik.uni-erlangen.de (faui48f.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:52]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 0E49754807D; Thu, 11 Jul 2019 17:08:20 +0200 (CEST)
Received: by faui48f.informatik.uni-erlangen.de (Postfix, from userid 10463) id EF53F440041; Thu, 11 Jul 2019 17:08:19 +0200 (CEST)
Date: Thu, 11 Jul 2019 17:08:19 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: Alissa Cooper <alissa@cooperw.in>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, IESG <iesg@ietf.org>, draft-ietf-anima-bootstrapping-keyinfra@ietf.org, Toerless Eckert <tte+ietf@cs.fau.de>, anima-chairs@ietf.org, anima@ietf.org
Message-ID: <20190711150819.lafanrg3326f557l@faui48f.informatik.uni-erlangen.de>
References: <156279135063.15552.18154602951583265728.idtracker@ietfa.amsl.com> <406.1562813786@localhost> <5BC8F1BD-C039-4066-8323-6E82D3AC4F1D@cooperw.in>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <5BC8F1BD-C039-4066-8323-6E82D3AC4F1D@cooperw.in>
User-Agent: NeoMutt/20170113 (1.7.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/gJ8D4KxvwjplaUhYRGQWMIcVCVA>
Subject: Re: [Anima] Alissa Cooper's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS and COMMENT)
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jul 2019 15:08:28 -0000

On Thu, Jul 11, 2019 at 09:45:55AM -0400, Alissa Cooper wrote:
> > Alissa Cooper via Datatracker <noreply@ietf.org> wrote:
> >> I apologize if I'm misunderstanding how this works, but I didn't see much
> >> discussion in the document about the implications of the manufacturer going out
> >> of business. Specifically, it seems like if a device ships with BRSKI as its
> >> only available mechanism for bootstrapping and the manufacturer goes
> > 
> > Section 7 provides some detail on a number of mechanisms that a manufacturer
> > could chose to include that would permit a device to be onboarded with
> > reduces levels of trust.
> > Section 7.2 specifically mentions onboarding via serial-console.
> 
> Yes, but section 7 is non-normative (maybe? per Roman???s DISCUSS). So is the conclusion a reader is supposed to draw that it???s ok for manufacturers to ship devices with BRSKI as the exclusive onboarding mechanism? The fact that this may already happen today with other protocols doesn???t seem like a reason to perpetuate it.

There are many different answers to that question for many different use
cases. Thats not really a BRSKI question. Heck, i could have a device
with BRSKI and Netconf zero-touch and voucher-via-USB stick, but no open
console, so i have three "protocol" enrollment options, but they will all
have the voucher as a single point of failure and i can easily come up with
a use case where this is desired by the customer.

> > The thousands of CPE devices (cable modems, VDSL modems, ISP provided home
> > routers) can be taken apart by the home owner.  If such devices have IDevID
> > in a TPM module, then enrollment can be done securely.
> 
> So a consumer user???s home network, including the user???s CPE, is considered to be part of the ISP???s ???professionally managed??? network?

Pretty standard use case that CPE is provided/managed by the SP.
Traditionally you got a routing CPE that you couldn't touch as
the customer and the non-professional managed network started on the
LAN ethernet ports of that CPE. Nowadays CPEs for more bitchy home
customers have the SP boundary inside the software of the router,
locking down all the WAN-side config and anything else the SP wants
to lock down. Only some countries regulations force SPs to provide
more liberal access, but whenever the CPE is fully provisioned by the
customer alone, the support by the SP is often reduced.

Again, 1001 use cases. In countries where there is a strong retail
router market and end-users choose and deploy their router independent
of the SP, BRSKI is still equally valuable, but now it would be the
vendor of the retail router who would offer BRSKI/MASA and a customer
web-portal to automate secure, automated deployment.

> And if the consumer needs to fallback to some non-BRSKI mechanism he is expected to bootstrap the device via serial console himself? Trying to see if I understand the scope limitations explained in Section 9.

Non-BRSKI operators have to prequalify by showing their
knowledge of serial port console operations and morse code. 
(do i have to say *kidding* ?)

How about:

The zero-touch mechanism presented in this and the ACP document
represents a signficiant efficiency: it avoids the need to ship devices
to secure locations to provision them before deployment or to ship senior
experts to remote and often insecure deployment locations to provision
devices on-site with mechanisms as antiquated as craft serial consoles. 

Cheers
    Toerless

> 
> Thanks,
> Alissa
> 
> > 
> >> ----------------------------------------------------------------------
> >> COMMENT:
> >> ----------------------------------------------------------------------
> > 
> >> I think this document would benefit from two concise lists, with notes about
> >> which items in each list are defined in this document and which ones are not
> >> defined: (1) what is operationally required of a manufacturer to support BRSKI,
> >> and (2) what is operationally required of a domain owner to support
> >> BRSKI.
> > 
> > We did start this document describing the protocol from the point of view of
> > each party (Pledge, Proxy, Registrar and MASA).  This would be the way that
> > each instrument in an orchestra receives their music.
> > 
> > We found that readers found it very difficult to understand the big picture,
> > so we now describe the protocol in time-sequence, the way that the script for
> > a play would be described.
> > 
> > But, you are asking for Operational requirements, not protocol requirements.
> > I agree that this would be useful, and it's something that I'd like to write.
> > I would consider it more of a BCP, and I don't think we have the experience
> > to write this down yet.
> > 
> >> = Section 2.3.1 =
> > 
> >> What precisely is meant by "TPM identification"? Could a citation be provided?
> > 
> > I don't have a reference, I hope Max can provide one.
> > I imagine it would point to a TCG document.
> > 
> > It's a SubjectAltName extension that is in a TPM contained certificate that
> > tells relying parties what TPM device it is.
> > 
> >> = Section 10.1 =
> > 
> >> "The domain can maintain some privacy since it has not necessarily been
> >> authenticated and is not authoritatively bound to the supply chain."
> > 
> >> What does this mean? That the domain can expect the manufacturer not to trust
> >> the domainID because it hasn't been authenticated?
> > 
> > The MASA has a list of devices, and for each device, it has a list of current
> > and previous owners.  This is the audit log.  The MASA will disclose this to
> > current and previous owners, if they can present a voucher-request that was
> > From the device.   (section 5.8)
> > 
> > It's hard to understand what kind of attack there is, but imagine that xyz.example.net
> > goes under, sells a huge stack of example.com 48-port 100G BFRs to other
> > ISPs.  (The manufacturer, example.com is still alive and well, and is happy
> > to take 10% support contracts from 30 new customers as it authorizes the
> > resale)
> > 
> > Someone gets the Registrar database from xyz.  They can now discover who
> > ownes all these BFRs... and(?)...profit.
> > Perhaps this needs to be coordinated with resale of some other device.
> > That can be done as, although the audit log does not list the actual
> > customer, it lists them by SHA-1 hash of public key.
> > 
> > So the sentence above notes that it's not like the Registrar told the
> > manufacturer who it was, if it didn't authenticate.  As such, either
> > xyz.example.net or the new owners could generate a new domainID, and
> > register each device uniquely.
> > (They want to use some kind of ONION routing to obfuscate their IP address
> > too, but that's instantly defeated if they authenticate with TLS 1.2
> > using a ClientCertificate)
> > 
> > I'm sure that we could improve this examplanation, but I'm not exactly sure
> > how yet.
> > 
> >> = Section 10.2 =
> > 
> >> "The above situation is to be distinguished from a residential/
> >> individual person who registers a device from a manufacturer: that an
> >> enterprise/ISP purchases routing products is hardly worth mentioning.
> >> Deviations would, however, be notable."
> > 
> >> What does the last sentence mean?
> > 
> > A residential ISP that buys 10,000 Linksys CPE routers is unremarkable.
> > When the same ISP buys 10,000 Internet connectable sex toys as well, that
> > might represent some kind of change in business plans.
> > Would a PC vendor be interested if some Enterprise customer suddenly bought
> > only tablets?
> > 
> > The BRSKI-MASA connection does not reveal what is bought, but it does reveal
> > who is doing business with whom, and it may also reveal volume.  This is
> > just traffic analysis. Christian Hopps has a nice document on defeating that, btw.
> > 
> > --
> > Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
> > -= IPv6 IoT consulting =-

-- 
---
tte@cs.fau.de