Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18

Ted Lemon <ted.lemon@nominum.com> Fri, 09 May 2014 22:45 UTC

Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AD761A010C for <dhcwg@ietfa.amsl.com>; Fri, 9 May 2014 15:45:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.251
X-Spam-Level:
X-Spam-Status: No, score=-2.251 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dU3ySukHyAx6 for <dhcwg@ietfa.amsl.com>; Fri, 9 May 2014 15:45:22 -0700 (PDT)
Received: from shell-too.nominum.com (shell-too.nominum.com [64.89.228.229]) by ietfa.amsl.com (Postfix) with ESMTP id 7F5791A00F6 for <dhcwg@ietf.org>; Fri, 9 May 2014 15:45:22 -0700 (PDT)
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 727FB1B81C7 for <dhcwg@ietf.org>; Fri, 9 May 2014 15:45:09 -0700 (PDT)
Received: from webmail.nominum.com (cas-01.win.nominum.com [64.89.228.131]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTP id 4EBE6190043; Fri, 9 May 2014 15:45:09 -0700 (PDT)
Received: from [10.0.10.40] (192.168.1.10) by CAS-01.WIN.NOMINUM.COM (192.168.1.100) with Microsoft SMTP Server (TLS) id 14.3.158.1; Fri, 9 May 2014 15:45:02 -0700
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: Ted Lemon <ted.lemon@nominum.com>
In-Reply-To: <CAJE_bqeNNW1=dSnj4f=t7Fx9waG81cDeHdcikqk0ECUoLvgVzQ@mail.gmail.com>
Date: Fri, 09 May 2014 18:44:57 -0400
Content-Transfer-Encoding: quoted-printable
Message-ID: <86DAC0E6-BC1A-4247-9AD1-C13DA01F170D@nominum.com>
References: <535FEDAD.5010103@gmail.com> <CAJE_bqen37j5UCsKZj6syVyvk2Xed4V_xGp-t4xY8shjmS+H5g@mail.gmail.com> <5D36713D8A4E7348A7E10DF7437A4B923AE43272@nkgeml512-mbx.china.huawei.com> <CAJE_bqe75D7oRJq=XmjPR9Dfvu3-AcL8kF9Pkm3JEOVsyxhr5A@mail.gmail.com> <5D36713D8A4E7348A7E10DF7437A4B923AE442FD@nkgeml512-mbx.china.huawei.com> <CAJE_bqc+Z8awb5773OLs8QtXuCRxYCWFRAKuQ9YP8anFwEQqsQ@mail.gmail.com> <5D53E8BB-F692-4752-A1B2-9BB09747C58B@nominum.com> <CAJE_bqeNNW1=dSnj4f=t7Fx9waG81cDeHdcikqk0ECUoLvgVzQ@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
X-Mailer: Apple Mail (2.1874)
X-Originating-IP: [192.168.1.10]
Archived-At: http://mailarchive.ietf.org/arch/msg/dhcwg/4sqkSrhinnl-oskLv_kuVE9EXF4
Cc: dhcwg <dhcwg@ietf.org>
Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 May 2014 22:45:24 -0000

On May 9, 2014, at 2:39 PM, 神明達哉 <jinmei@wide.ad.jp> wrote:
> My main concern is the combination of authenticating clients with the
> leap of faith model.  This model isn't suitable for the "grant
> different access" usage, since anyone can pretend to be an
> authenticated client with that model.

You are right--I don't think there is a use case for leap-of-faith with clients.

> I'm okay with separating such discussions outside of this document.
> But then I'd personally like to see a "threat analysis" document
> first (covering these points), not the other way around.  As a
> believer of the YAGNI principle, I personally cannot be so
> enthusiastic about defining/implementing something that just *might*
> make sense somewhere.  Especially so, if we need to worry about a
> security impact as mentioned in the security considerations section of
> the draft.

We are in the awkward situation that lots of DHCP people already know what the threat models are, although I think you are correct that they have not been clearly articulated in a threat analysis document.   I think such a document would be a good idea.   However, I'm reluctant to delay this document on that basis.   It might make sense to do so, but I will leave that up to the working group to debate.

> I'm impressed with your imagination:-) Although I'm not sure if this
> example is persuasive enough, I see we can come up with some
> *possible* usage of client authentication with leap of faith.

This is a pretty common use model, actually.   But nowadays we do it without authentication, using just the client identifier, or by forcing a captive portal login every session, which is really inconvenient.   I wouldn't describe this as leap-of-faith, however, since it relies on some out-of-band authentication mechanism to validate the client key before choosing to trust it.

>>>>> - and, if it's more likely to rely on leap of faith, what kind of
>>>>> consideration is needed
>> 
>> You mean in terms of risk assessments?
> 
> Considerations like the possibility of resource exhaustion attacks as
> mentioned in Section 7 of the draft.

Leap-of-faith typically involves some kind of act of faith before trusting a key.   E.g., with ssh, that's the user saying "yes, go ahead."   I don't think you could do a resource exhaustion attack in this situation.