Re: [dhcwg] Stephen Farrell's Discuss on draft-ietf-dhc-access-network-identifier-10: (with DISCUSS)

"Sri Gundavelli (sgundave)" <sgundave@cisco.com> Mon, 11 January 2016 15:13 UTC

Return-Path: <sgundave@cisco.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37D111A0218; Mon, 11 Jan 2016 07:13:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level:
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7oO9eMuUP7Ro; Mon, 11 Jan 2016 07:13:11 -0800 (PST)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 432CB1A0233; Mon, 11 Jan 2016 07:13:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14004; q=dns/txt; s=iport; t=1452525191; x=1453734791; h=from:to:cc:subject:date:message-id:references:content-id: content-transfer-encoding:mime-version; bh=LOuMANURJSmhQZ9T4WbIExHW/s+OTDwVtEEJe9JAEJA=; b=REbd2/zZIutWxICVbaq1vQDF9L2zGiTOsQ3KcdgWyimEEqKhoWYaMglm sAfm64G7BmcnliWu83MTkKU2DbxAwQTi0CbHtCnIuJqutIOdSkNbc9XM+ rrkETCFaAGj64YlE2TikJI74TXcbSi8G49u9sRBwzzmtZyk5IMMpqRTMc I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AEAgBYxZNW/5pdJa1egzpSbQaIU7FOghMBDYFmIoVtHoEHOBQBAQEBAQEBgQqENAEBAQQ0MwQOEAIBCBEDAQIBBCMFAgIwFAkIAgQOBYguDpF8nS4GkAIBAQEBAQEBAQEBAQEBAQEBAQEXBHuFW4N7gQSEJgoGAgEFFxgWDAKCXIFPBY0/hVGEAwGNWIFehEODKoUyil6DcgEgAQFCggwFHB2BQHIBhFxDgQgBAQE
X-IronPort-AV: E=Sophos;i="5.20,553,1444694400"; d="scan'208";a="224729571"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 11 Jan 2016 15:13:10 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id u0BFDAH7027735 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 11 Jan 2016 15:13:10 GMT
Received: from xch-aln-007.cisco.com (173.36.7.17) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 11 Jan 2016 09:13:09 -0600
Received: from xch-aln-007.cisco.com ([173.36.7.17]) by XCH-ALN-007.cisco.com ([173.36.7.17]) with mapi id 15.00.1104.009; Mon, 11 Jan 2016 09:13:09 -0600
From: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Thread-Topic: Stephen Farrell's Discuss on draft-ietf-dhc-access-network-identifier-10: (with DISCUSS)
Thread-Index: AQHRTGmPaG22P+82zkStEz8DB3NxeZ72J3AA
Date: Mon, 11 Jan 2016 15:13:09 +0000
Message-ID: <D2B8DDD5.200692%sgundave@cisco.com>
References: <D294399B.1FB2EF%sgundave@cisco.com> <5692D2E0.3030607@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.5.9.151119
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.70.99]
Content-Type: text/plain; charset="euc-kr"
Content-ID: <085E63D43F01314D8B49CAA226643660@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/dhcwg/O4efToyO9T4BwTtUTPNuuzuR85o>
Cc: "Bernie Volz (volz)" <volz@cisco.com>, "dhc-chairs@ietf.org" <dhc-chairs@ietf.org>, "draft-ietf-dhc-access-network-identifier.shepherd@ietf.org" <draft-ietf-dhc-access-network-identifier.shepherd@ietf.org>, IESG <iesg@ietf.org>, "draft-ietf-dhc-access-network-identifier.ad@ietf.org" <draft-ietf-dhc-access-network-identifier.ad@ietf.org>, "<dhcwg@ietf.org>" <dhcwg@ietf.org>, "draft-ietf-dhc-access-network-identifier@ietf.org" <draft-ietf-dhc-access-network-identifier@ietf.org>
Subject: Re: [dhcwg] Stephen Farrell's Discuss on draft-ietf-dhc-access-network-identifier-10: (with DISCUSS)
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Jan 2016 15:13:14 -0000

Hi Stephen,

Thank you for your response.


On 1/10/16, 1:53 PM, "Stephen Farrell" <stephen.farrell@cs.tcd.ie> wrote:

>
>Hi Sri,
>
>Sorry for the slow response, I see you've posted -11 so this
>response is based on the diff from -10 to -11. Apologies if
>I've lost some context over the holidays, but I'm sure we can
>re-establish that quickly enough.


Not an issue. I understand, it was the holiday break. I had the same
issue, I need to close one thread.



>
>On 14/12/15 17:18, Sri Gundavelli (sgundave) wrote:
>> <Resending with the correct subject line>
>> 
>> 
>> From: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>
>> Date: Tuesday, December 8, 2015 at 3:06 PM To: Stephen Farrell
>> <stephen.farrell@cs.tcd.ie<mailto:stephen.farrell@cs.tcd.ie>> Cc:
>> "Bernie Volz (volz)" <volz@cisco.com<mailto:volz@cisco.com>>, IESG
>> <iesg@ietf.org<mailto:iesg@ietf.org>>,
>> "dhc-chairs@ietf.org<mailto:dhc-chairs@ietf.org>"
>> <dhc-chairs@ietf.org<mailto:dhc-chairs@ietf.org>>,
>> 
>>"draft-ietf-dhc-access-network-identifier.shepherd@ietf.org<mailto:draft-
>>ietf-dhc-access-network-identifier.shepherd@ietf.org>"
>> 
>><draft-ietf-dhc-access-network-identifier.shepherd@ietf.org<mailto:draft-
>>ietf-dhc-access-network-identifier.shepherd@ietf.org>>,
>> 
>>"draft-ietf-dhc-access-network-identifier.ad@ietf.org<mailto:draft-ietf-d
>>hc-access-network-identifier.ad@ietf.org>"
>> 
>><draft-ietf-dhc-access-network-identifier.ad@ietf.org<mailto:draft-ietf-d
>>hc-access-network-identifier.ad@ietf.org>>,
>> 
>>"draft-ietf-dhc-access-network-identifier@ietf.org<mailto:draft-ietf-dhc-
>>access-network-identifier@ietf.org>"
>> 
>><draft-ietf-dhc-access-network-identifier@ietf.org<mailto:draft-ietf-dhc-
>>access-network-identifier@ietf.org>>,
>> Brian Haberman
>> <brian@innovationslab.net<mailto:brian@innovationslab.net>>,
>> "<dhcwg@ietf.org<mailto:dhcwg@ietf.org>>"
>> <dhcwg@ietf.org<mailto:dhcwg@ietf.org>> Subject: Re: Ben Campbell's
>> Discuss on draft-ietf-dhc-access-network-identifier-10: (with
>> DISCUSS)
>> 
>> Hi Stephen,
>> 
>> Thank you for your review. We probably addressed most of these issues
>> as part of addressing Alissa's comments as there is overlap. Any
>> case, please let us know if you are not happy with the changes.
>
>I note that Alissa hasn't yet cleared her discuss and her mail
>from Dec 8th didn't seem to indicate that was about to happen.
>(Though the direction in which the discussion seems to be heading
>looks good.)


[Sri] We posted the updated version just couple of days back. My draft
editor did miss one email and missed some agreed text. But, my
understanding is that we have an agreement with Alissa on the text. I read
the thread again, at least that is my understanding.

https://www.ietf.org/mail-archive/web/dhcwg/current/msg17132.html



>
>> 
>> 
>> 
>> (1) Did the DHC working group consider how this information, when
>> sent without adequate protection between relay and dhcp server, could
>> help in pervasive monitoring? If so, what was the conclusion reached?
>> We have seen http header field information sent between
>> infrastructure nodes being intercepted for that purpose, so this has
>> to be similarly at risk.  If the answer is that this is only to be
>> used within a single network operator's setup (or a roaming
>> arrangement) then that needs to be justified (as practical) and, if
>> it can be justified (I'm not sure tbh), also made explicit.
>> 
>> [Sri] I believe this issue is now resolved after discussions with
>> Alissa Cooper and the newly agreed text that introduces the "same
>> operator" assumption.
>
>Sorry, it's not clear to me that it does. Can you explain how
>the addition of "collocated" in section 2 resolves this? (Or
>if I got the change wrong, can you say what change addresses
>the issue?)

The information at risk is on the interface between the DHCP Relay and the
DHCP Server. The functions involved in this transaction and in the current
context are in the access network. In all SP Wi-Fi deployments the DHCP
server is in the access network and which is the MAG/TWAG and the DHCP
Relay is on the Wireless Termination point/AP. I'm not aware of any
deployment where the access network is operated by two operators. Per
Alissa's comment, if we have an applicability note that states this
assumption, I assumed IESG is OK to clear the DISCUSS.


Per Alissa¹s comment:
"
my thinking is that what would help here is an applicability statement
that explains that these options are being specified only for the purpose
of communicating access network identification between a DHCP relay agent
and a Mobile Access Gateway where the same operator typically operates
both.²

"The scope of applicability for this option is between a DHCP relay agent
and a Mobile Access Gateway where the same operator typically operates
both. Do you have difficulty to put a note about this limitation in scope
into the draft?"


NEW:
"This document specifies Dynamic Host Configuration Protocol for IPv4
   (DHCPv4) [RFC2131] and Dynamic Host Configuration Protocol for IPv6
   (DHCPv6) [RFC3315] options for access network identification that is
   added by Relay agent in the DHCPv4 or DHCPv6 messages towards the
   Server.  The scope of applicability for this option is between a DHCP
relay    agent and a mobile access gateway where the same operator
typically
operates both these functions"






>
>> 
>> 
>> (2) I had a DISCUSS on the draft that became rfc 6757 about
>> protection of this kind of data. In that context I think I was
>> assured that everything (in PMIPv6) was IPsec protected so it was
>> fine.  Why, in what we now know is a more threated environment, is it
>> ok to now have weaker protection when I was assured then that IPsec
>> was in fact quite usable in PMIPv6? I think you maybe need to put in
>> a MUST use IPsec requirement for this to be as safe.
>> 
>> 
>> [Sri] No, its not. We are still identifying the information that is
>> at risk in certain operating environments. We are also listing the
>> tools that operator has their disposal as per the below text. The
>> question is that determination on when the information is at risk, if
>> its an operator call, or IETF call. I'm OK, but I will let Bernie and
>> other DHCP experts comment on this MUST requirement.
>> 
>> 
>> "In deployments where this information is considered secure and when
>> such threat cannot be mitigated using IPsec [RFC4301] or other
>> security protocols, then the administrators have to consider
>> disabling the capability specified in this document on the DHCP
>> entities."
>
>Again, sorry for the loss of context, but I'm not getting how
>that addition resolves the issue, can you explain?


Both in RFC 6757 and in the below document, we have identified the
information which is at risk and the tools that can be used to protect it.
I though we are consist with respect to IPsec use.


Here is the text from RFC 6757:

"The Geo-Location sub-option carried in the Access Network Information
   option exposes the geo-location of the network to which the mobile
   node is attached.  This information is considered to be very
   sensitive, so care must be taken to secure the Proxy Mobile IPv6
   signaling messages when carrying this sub-option.  The base Proxy
   Mobile IPv6 specification [RFC5213] specifies the use of IPsec for
   securing the signaling messages, and those mechanisms can be enabled
   for protecting this information.  Operators can potentially apply
   IPsec Encapsulating Security Payload (ESP) with confidentiality and
   integrity protection for protecting the location information."



Here is the text from the current draft:

"In deployments where this information is considered secure and when
such threat cannot be mitigated using IPsec [RFC4301] or other
security protocols, then the administrators have to consider
disabling the capability specified in this document on the DHCP
entities."



RFC 5213:

IPsec is a mandatory-to-implement security
mechanism. However, additional documents may specify alternative
mechanisms and the mobility entities can enable a specific mechanism
for securing Proxy Mobile IPv6 signaling messages, based on either a
static configuration or after a dynamic negotiation using any
standard security negotiation protocols.













>
>> 
>> (3) section 7: MAY store - this is possibly sensitive information so
>> you ought say that it SHOULD NOT be stored unless needed, and if
>> stored, SHOULD be deleted as soon as possible. Storing sensitive
>> information when not needed just shouldn't be considered acceptable
>> anymore I think - is that reasonable?
>> 
>> 
>> [Sri] Ok.
>> 
>> Looking at RFC 7268, SSID (Network-Id-Name attribute) can be present
>> in accounting records. So, this information is stored by network
>> functions.
>
>I don't see a change in section 7 - are you saying that none
>is needed?


Yes. This needs to go in. Sorry about that.


Regards
Sri





>
>Thanks and sorry again for the loss of context,
>Cheers,
>S.
>
>
>> 
>> 
>> 
>> *
>> 
>> I (strongly) support Alissa's DISCUSS and will be interested in
>> watching how that is resolved. Some of my DISCUSS points do overlap
>> though so from my POV feel free to mix'n'match the discussions. Or to
>> process first one then the other, whatever you think is best.
>> 
>> 
>> 
>> [Sri] We resolved it; hope you are OK with the conclusion.
>> 
>> - RFC6757 defines exactly this for PMIPv6. That implies that PMIPv6
>> should not be used to illustrate or motivate this, as that problem is
>> solved. Perhaps you would be better off if you limited the scope of
>> this to be used for networks that are some kind of extension to
>> PMIPv6 only? (You'd need to define what kind I think.)
>> 
>> [Sri] I believe with all the text around "single operator", "IPsec"
>> and other assumptions, I think we have resolved this issue.
>> 
>> Thanks for the reviews.
>> 
>> Regards Sri
>> 
>>