Re: [dhcwg] seDHCPv6 update and next steps ...

"Templin, Fred L" <Fred.L.Templin@boeing.com> Wed, 12 July 2017 21:36 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F4A21319B7 for <dhcwg@ietfa.amsl.com>; Wed, 12 Jul 2017 14:36:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level:
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2IZSSI_E1ENk for <dhcwg@ietfa.amsl.com>; Wed, 12 Jul 2017 14:36:41 -0700 (PDT)
Received: from phx-mbsout-02.mbs.boeing.net (phx-mbsout-02.mbs.boeing.net [130.76.184.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A35E4131946 for <dhcwg@ietf.org>; Wed, 12 Jul 2017 14:36:41 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by phx-mbsout-02.mbs.boeing.net (8.14.4/8.14.4/DOWNSTREAM_MBSOUT) with SMTP id v6CLaeeI046707; Wed, 12 Jul 2017 14:36:41 -0700
Received: from XCH15-06-09.nw.nos.boeing.com (xch15-06-09.nw.nos.boeing.com [137.136.239.172]) by phx-mbsout-02.mbs.boeing.net (8.14.4/8.14.4/UPSTREAM_MBSOUT) with ESMTP id v6CLaV2g046268 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Wed, 12 Jul 2017 14:36:31 -0700
Received: from XCH15-06-08.nw.nos.boeing.com (2002:8988:eede::8988:eede) by XCH15-06-09.nw.nos.boeing.com (2002:8988:efac::8988:efac) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Wed, 12 Jul 2017 14:36:30 -0700
Received: from XCH15-06-08.nw.nos.boeing.com ([137.136.238.222]) by XCH15-06-08.nw.nos.boeing.com ([137.136.238.222]) with mapi id 15.00.1263.000; Wed, 12 Jul 2017 14:36:30 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: "Bernie Volz (volz)" <volz@cisco.com>, "draft-ietf-dhc-sedhcpv6@tools.ietf.org" <draft-ietf-dhc-sedhcpv6@tools.ietf.org>, "dhcwg@ietf.org" <dhcwg@ietf.org>
Thread-Topic: seDHCPv6 update and next steps ...
Thread-Index: AdL7TPjzgLDuRsMjTzK32MYQ2IpqqAAAv6lwAABm4DAAAOIiwA==
Date: Wed, 12 Jul 2017 21:36:30 +0000
Message-ID: <cb431acefa5149a4a024538352e02357@XCH15-06-08.nw.nos.boeing.com>
References: <4775705423554cc39360724881251abe@XCH-ALN-003.cisco.com> <a3d7522c763947a2916edfc461bf92af@XCH15-06-08.nw.nos.boeing.com> <e9cbb73ac7164448aa215c5ab3081e18@XCH-ALN-003.cisco.com>
In-Reply-To: <e9cbb73ac7164448aa215c5ab3081e18@XCH-ALN-003.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [137.136.248.6]
Content-Type: multipart/alternative; boundary="_000_cb431acefa5149a4a024538352e02357XCH150608nwnosboeingcom_"
MIME-Version: 1.0
X-TM-AS-MML: disable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/dDhm2zancq_g6sOAApLpWk9lt3g>
Subject: Re: [dhcwg] seDHCPv6 update and next steps ...
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jul 2017 21:36:44 -0000

Hi Bernie,

My scenario is very simple. The client and server are connected to the same
link, and the link already supports link-layer security (e.g., IEEE 802.1X).

The client knows that it can trust the server because the server's address
is in a list of known server addresses for the link that cannot be subverted
by an adversary and there is no opportunity for source address spoofing.

The server knows that the client is authorized to connect to the link
(e.g., due to 802.1X) but the server does not know whether the client
is authorized to use the DUID it is claiming in its DHCPv6 messages.
For example, trusted client 'A' could use trusted client 'B's DUID to
steal client 'B's service - an "insider attack".

So, what is needed from seDHCPv6 is for the client to authenticate itself
to the server so that it cannot steal the services of another client. And,
since there may be a LDRA, the DHCPv6 parameters must be available
in-the-clear so that the LDRA can snoop any IA_NA/IA_PD assignments.

Thanks - Fred

From: Bernie Volz (volz) [mailto:volz@cisco.com]
Sent: Wednesday, July 12, 2017 2:06 PM
To: Templin, Fred L <Fred.L.Templin@boeing.com>;; draft-ietf-dhc-sedhcpv6@tools.ietf.org; dhcwg@ietf.org
Subject: RE: seDHCPv6 update and next steps ...

Hi Fred:

Thanks for your interest.

Could you clarify what you mean by authentication-only? As I see if in terms of authentication there is:

1.       Authenticate the server to the client

2.       Authenticate the client to the server

3.       Or both

There are also various degrees of authentication - for example, TOFU (Trust on First Use) to trusted third party (and what that might impose on certificate distribution / validation).

And, if you have a specific use model in mind (for example, if this is for AERO), having a brief summary of this and the authentication requirements would be useful.

I'd also suggest that understanding why other techniques, such as 802.1X, would not be appropriate could provide added value in understanding the requirements.


-          Bernie

From: Templin, Fred L [mailto:Fred.L.Templin@boeing.com]
Sent: Wednesday, July 12, 2017 4:49 PM
To: Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>>; draft-ietf-dhc-sedhcpv6@tools.ietf.org<mailto:draft-ietf-dhc-sedhcpv6@tools.ietf.org>; dhcwg@ietf.org<mailto:dhcwg@ietf.org>
Subject: RE: seDHCPv6 update and next steps ...

Hi Bernie,

Unfortunately, my plane does not arrive until ~16:00 CEST on Sunday. But, if
this work is going back to first principles I would like to express an interest in
an authentication-only mode of operation (i.e., no encryption). It would
avoid a "double-encryption" when encryption is already provided by the
link layer between the client and server (or first-hop relay) and there are
already other securing mechanisms in place between relays and servers.

Thanks - Fred


From: dhcwg [mailto:dhcwg-bounces@ietf.org] On Behalf Of Bernie Volz (volz)
Sent: Wednesday, July 12, 2017 1:30 PM
To: draft-ietf-dhc-sedhcpv6@tools.ietf.org<mailto:draft-ietf-dhc-sedhcpv6@tools.ietf.org>; dhcwg@ietf.org<mailto:dhcwg@ietf.org>
Subject: [dhcwg] seDHCPv6 update and next steps ...

Hi:

There has been some discussion (most recently off the dhcwg mailing list) about the sedhcpv6 draft.

Previously, as discussed on the dhcwg mailing list a while back, there are some issues with the current draft (including the encryption issue; the key can't be used to encrypt more data than the size of the key). And, while some of the co-authors have communicated recently, others have been quiet and it is not clear what the level of interest for each is in continuing. This work has sadly had a long road with several turns already.

The discussion raised the question as to what the goals of this work should be. Some feel that we need to step back and first develop a "requirements document" to clearly detail what the goals of a securing DHCPv6 should be (for example, was the fairly recent push to add encryption appropriate?).

Thus, Tomek and I feel that it would be worth having an interested group meet before the IETF-99 DHC WG session (which is on Wednesday, 7/19 afternoon) to discuss this so that we could formulate a strategy. If you have interest, let us know. We propose to meet on Sunday at 14:00 (CEST) in Chez Louis (Hackathon) room - we can find a table there, or look for another place. (If there is remote participation interest, let us know and we'll see what we might be able to accommodate.)

We may also have extra time in the DHC WG session to discuss in detail there, but it could be helpful to have one or more proposals and, if we get the slides out quickly, give people some time to think about it before the WG session.


-          Bernie and Tomek