Re: [core] comments on draft-hartke-core-e2e-security-reqs

Göran Selander <goran.selander@ericsson.com> Mon, 23 May 2016 04:58 UTC

Return-Path: <goran.selander@ericsson.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61D5012D1EB; Sun, 22 May 2016 21:58:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JGrl2hEajMcn; Sun, 22 May 2016 21:58:38 -0700 (PDT)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E7A912B054; Sun, 22 May 2016 21:58:38 -0700 (PDT)
X-AuditID: c1b4fb25-f79f26d00000327e-e6-57428dfc4af2
Received: from ESESSHC005.ericsson.se (Unknown_Domain [153.88.183.33]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id CD.DD.12926.CFD82475; Mon, 23 May 2016 06:58:36 +0200 (CEST)
Received: from ESESSMB303.ericsson.se ([169.254.3.153]) by ESESSHC005.ericsson.se ([153.88.183.33]) with mapi id 14.03.0294.000; Mon, 23 May 2016 06:58:36 +0200
From: Göran Selander <goran.selander@ericsson.com>
To: Jim Schaad <ietf@augustcellars.com>, "draft-hartke-core-e2e-security-reqs@ietf.org" <draft-hartke-core-e2e-security-reqs@ietf.org>
Thread-Topic: comments on draft-hartke-core-e2e-security-reqs
Thread-Index: AdGf4rAvCqw3akY7QXOaQ6AVk7FT8AUzRKOA
Date: Mon, 23 May 2016 04:58:35 +0000
Message-ID: <D368542B.56E2B%goran.selander@ericsson.com>
References: <069a01d19fe7$c5f1e080$51d5a180$@augustcellars.com>
In-Reply-To: <069a01d19fe7$c5f1e080$51d5a180$@augustcellars.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.6.3.160329
x-originating-ip: [153.88.183.150]
Content-Type: text/plain; charset="utf-8"
Content-ID: <6CF066C56D11014AB1C5B24FDF8C182F@ericsson.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrDIsWRmVeSWpSXmKPExsUyM2K7ou6fXqdwg2tLlS32vV3PbLH/9jkm i9XTv7M5MHtsnDOdzWPJkp9MAUxRXDYpqTmZZalF+nYJXBmNc2ayFqwzrnjXvpSxgbHFqIuR k0NCwETi15qNLBC2mMSFe+vZuhi5OIQEjjBKLF00gRXCWcIo8aK/nRGkik3AReJBwyMmEFtE oItR4svkWhCbWUBZ4vjsw6wgtrCArcTt29uYIWrsJJomLYCqN5LYsaEfLM4ioCrx/PFtsM28 AhYSM3r2gtUICdhLbDm1lx3E5hRwkDjV/xmsnhHouu+n1jBB7BKXuPVkPhPE1QISS/acZ4aw RSVePv4HdoOogJ7EvhfnGSHiShIrtl8CsjmAejUl1u/S72JkBzKtJfYnQwxUlJjS/ZAd4hhB iZMzn7BMYJSYhWTXLITeWXC9s5D0zkLSu4CRdRWjaHFqcVJuupGxXmpRZnJxcX6eXl5qySZG YBwe3PJbdQfj5TeOhxgFOBiVeHgfaDuFC7EmlhVX5h5ilOBgVhLhXVcNFOJNSaysSi3Kjy8q zUktPsQozcGiJM7r/1IxXEggPbEkNTs1tSC1CCbLxMEp1cCYfzQrI+Og5+dFMiKha6e9C2dQ FN3QHMQru3yDeNmyXYLJ3yfwXL3oNsnb4hFXRJJY84z3P5WrtddLua19fspBrGDuuZz8qKBu 5Q0TNyhlv+vo2ep37uS0Q7FRLit+XVi8P3XTIkOmY9MdT06MKTubOe3N2ecf5zB4fLy97/G+ FyJhG3k9VsrOVGIpzkg01GIuKk4EABB3sXC/AgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/core/zS_iKWWY1UD0a-1UzsngvJH1K80>
Cc: "core@ietf.org" <core@ietf.org>
Subject: Re: [core] comments on draft-hartke-core-e2e-security-reqs
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 May 2016 04:58:40 -0000

Jim

Thanks for spending the time (and the wine).

Sorry for the delay, we wanted to respond directly to your comments with
an updated version of the draft, but since it still is not quite ready I
just want to acknowledge your mail. We were already in the process of
making an update trying to fix the repetitiveness of the -00 version, and
instead build on generic issues, focus on the endpoints rather than the
middle entities etc. so those and related comments makes very much sense.

Then there are other parts that we may not be able to discuss within the
draft, like e.g. various combinations of different type of proxies (though
should be possible to infer from the draft), and some types of
“conversations” which are not yet defined for CoAP (like multicast with
multicast reply).

Stay tuned.


Göran


On 2016-04-26 20:16, "Jim Schaad" <ietf@augustcellars.com> wrote:

>After the meeting I tried to do a front to back reading of this document
>several times.  I regret to note that I only succeeded once (after about 4
>glasses of wine), but will note that I was reading this on a Kindle and
>therefore it suffered both from a smaller screen and some formatting
>errors.
>
>I would like to suggest some major document overhauls that I think would
>both improve the ability to read the document and might (but probably will
>not) address some of the concerns that Hannes raised at the F2F meeting.
>
>The document is very repetitive.  This makes the document harder to read
>as
>one get confused and bored by dealing with the same statements over and
>over
>again.  To deal with this, I would suggest that things be built on rather
>than repeated. This means that one can start with a generic proxy in the
>first section and deal with the issues of that case and then the rest of
>the
>time one can just say - those things plus the following without
>repetition. 
>
>I don't like the scenario based structure of the document.  One of the
>problems that I have is that the list of scenarios is going to be endless
>and difficult to think about in an exhaustive manner.  One starts with the
>questions of what happens when you have a situation of dealing with
>scenario
>#1 and then #2 and then what happens when you compose #1 and #2 (or #2 and
>#1).  I think that it would be better to focus on the different types of
>proxies that can be identified and then go on from there.  This makes it
>easier to think about what needs to be placed in a new document that
>defines
>a new proxy type as well.
>
>For each different proxy type I would look at covering the following:
>** Generic Description of what the proxy type does
>** What it means for the proxy to be 1) untrusted, 2) semi-trusted and 3)
>fully trusted.  Note that not all of these are applicable to any given
>proxy
>type.  (For example, if one looks at a NAT proxy then only untrusted makes
>sense.)
>** An example scenario for each of the different trust levels for the
>proxy.
>This is where there is the greatest problem in trying to come up with real
>world rather than academic examples might be the hardest thing to do.
>** Look at the threats and requirements for each trust level building on a
>base.  I.e. start the list with a single requirement of "Incorporate the
>following requirements by reference A1, A2, A3, A4".
>
>Start the document with some type of generic proxy.  I would suggest a NAT
>proxy as this is something that is simple and easy to talk about as it
>does
>not do any changes to the CoAP message and thus is trivial to understand.
>
>Include a description of the above security levels and what they imply in
>terms of key sharing and trust sharing.
>
>Include a description of how one should think about composing proxies
>together into a single unit.  Depending on how one does the analysis, I
>think that this can be treated as dealing with the capabilities of each
>proxy separately if they are combined into a single unit and can easily be
>treated as separate things when they are not treated as a single unit.
>Part
>of the question is what one wants to say about proxies that collude
>together
>as oppose to be the same proxy.
>
>(day #2)
>
>I can understand there might be a desire to talk about conversations
>between
>entities.  However, these should focus on the conversation and ignore the
>middle entities.  That is there are going to be generic issues that deal
>with the following situations:
>
>1) Send message from A to B.
>2) Multicast message from A to Group B
>3) Round trip from A to B.
>4) Multicast message from A to Group B w/ single cast reply
>5) Multicast message from A to Group B w/ multi-cast reply to group B
>(assuming that A is in Group B)
>
>Jim
>
>