Re: [dhcwg] missing pieces for the Secure DHCPv6 draft

Francis Dupont <Francis.Dupont@fdupont.fr> Sat, 31 October 2015 01:05 UTC

Return-Path: <Francis.Dupont@fdupont.fr>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23AB11ACDCB for <dhcwg@ietfa.amsl.com>; Fri, 30 Oct 2015 18:05:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.262
X-Spam-Level:
X-Spam-Status: No, score=-1.262 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_FR=0.35, MIME_8BIT_HEADER=0.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qDxFCe4LXYAR for <dhcwg@ietfa.amsl.com>; Fri, 30 Oct 2015 18:05:29 -0700 (PDT)
Received: from givry.fdupont.fr (givry.fdupont.fr [IPv6:2001:41d0:1:6d55:211:5bff:fe98:d51e]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3ABD1ACDF3 for <dhcwg@ietf.org>; Fri, 30 Oct 2015 18:05:26 -0700 (PDT)
Received: from givry.fdupont.fr (localhost [IPv6:::1]) by givry.fdupont.fr (8.14.7/8.14.7) with ESMTP id t9V12gEL036127; Sat, 31 Oct 2015 02:02:43 +0100 (CET) (envelope-from dupont@givry.fdupont.fr)
Message-Id: <201510310102.t9V12gEL036127@givry.fdupont.fr>
From: Francis Dupont <Francis.Dupont@fdupont.fr>
To: 神明達哉 <jinmei@wide.ad.jp>
In-reply-to: Your message of Wed, 28 Oct 2015 16:57:08 -0700. <CAJE_bqfU__kQMXWq8cdc8ppQg3qzTkKbywnQdHDTrqhZhp_Geg@mail.gmail.com>
Date: Sat, 31 Oct 2015 02:02:42 +0100
Archived-At: <http://mailarchive.ietf.org/arch/msg/dhcwg/ShUqO--l9FmaVM61SxvY655RuIk>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>, charliekaufman@outlook.com
Subject: Re: [dhcwg] missing pieces for the Secure DHCPv6 draft
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 31 Oct 2015 01:05:30 -0000

 In your previous mail you wrote:

>  Key distribution: whether it's shared secret based or public key
>  based, key distribution is a big issue.  dhc-v4-threat-analysis shows
>  some possibilities in its Section 6.3, such as using a security token
>  device or with help of other protocols like EAP or RADIUS (Francis's
>  hint of using SEND would also be one such approach).

=> note that SEND is used (please don't confuse visible with ostensible :-)
and it solves all the gory PKI details (same than for "everything pre
configured" but with an already deployed base. Unfortunately I don't
know public documents about SEND deployments/recommendations (I am
afraid they are "restricted not Internet" :-).

>  For the purpose of the sedhcpv6 draft, if usability issues of TOFU
>  still continues to be blocking, I think we can simply remove it from
>  the draft as an alternative.

=> perhaps the solution is to move all deployment/applicability stuff
from the secure DHCPv6 "mechanisms" I-D so it can be published as soon
as the threat model is complete?

Thanks

Francis.Dupont@fdupont.fr