Re: [dhcwg] comments on draft-ietf-dhc-sedhcpv6-10.txt

Lishan Li <lilishan48@gmail.com> Thu, 25 February 2016 12:45 UTC

Return-Path: <lilishan48@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5B7D1A90A0; Thu, 25 Feb 2016 04:45:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.106
X-Spam-Level: *
X-Spam-Status: No, score=1.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, FRT_BIGGERMEM1=2.555, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qpUwZ8Ki-XNR; Thu, 25 Feb 2016 04:45:19 -0800 (PST)
Received: from mail-lb0-x22d.google.com (mail-lb0-x22d.google.com [IPv6:2a00:1450:4010:c04::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30BC81A9061; Thu, 25 Feb 2016 04:45:18 -0800 (PST)
Received: by mail-lb0-x22d.google.com with SMTP id x1so28142377lbj.3; Thu, 25 Feb 2016 04:45:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=ALnChSeyOWhy5J7Mr4rQItGPcl88/7x1BBlZM403Kd0=; b=B7C0vEhJalB/O8L09byzCi13aQdWgkfMXEgd7q9ll+ocbfvHcLthXptv+p1nEU/oPl yuEsYFjMMkvzcqBk+SP+Uct+qTegcUD24r6rYk8Rj1fGb/RnLd/JeQRtbpSiT3DHhaLY F2qyaQoLkiscO4E30nRu1QAMpJmTR/5mt4BJBlYbhb3CrnoGP4EmUqBeqJK755CVUihj go/7gL8cignhjMqz3GDd5IjrKYhCJ8kFThfarqmeSfWYGsOdvBxR9BptveReWA/9h5Qj jiw4DthSNFstX1ZJni2NrEY6hdpGKA9A3mGKKVbTVTtTIj//qdK2+4D43E1s2qAlcBvQ D2jA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=ALnChSeyOWhy5J7Mr4rQItGPcl88/7x1BBlZM403Kd0=; b=dvkePpFIqLeZ8vXQF7+7MQW0m/Q49s7c8ZxBQ+HhnPiD+ffYBABj+IQ1YiqQwGUrfx RhiPEo5khuKEKEG7Nexa7xO/moplpu5ULqSx4AZwp3VpXF0kidc+HImr659/3JELMoYk O86VdWj+2N3qCB0iB2OjkzydMYbM8RLBVFsO7fMf0A0DBRy/X2usXHSuyaawyJOrvc24 6DhTNKlVMYbzs9wDewAutB9fkGdv8osyLVWhTTwc0l+A0lvoIgWhy36JsZRzvJwXMqBo wm6nUQZeaO2XpIKPEPnguT6AQ9Ib/oUebOs3MwKkUWphfMQzvjVsbrrrckuXAq0VY8ft 0IhA==
X-Gm-Message-State: AG10YOROF/KvVCTLcEtJ4HU7KfxBMK6nk6+gb0eVxMeDKIaFr6KFeifD32J/cdUE0h+LJna+5+keCYamagWq9w==
MIME-Version: 1.0
X-Received: by 10.112.12.98 with SMTP id x2mr16621877lbb.76.1456404316382; Thu, 25 Feb 2016 04:45:16 -0800 (PST)
Received: by 10.114.79.194 with HTTP; Thu, 25 Feb 2016 04:45:16 -0800 (PST)
In-Reply-To: <CAJE_bqc9JHcUGCGW9VSPrHTBUe4tKowh9OHVbUA1qWwanWyYBg@mail.gmail.com>
References: <CAJE_bqdZTc57BGzVq8-EaOa7kT2ME9_3bXNKFr0WGk_MzLNOBQ@mail.gmail.com> <CAJ3w4NermaJtDzf3V4+WQcpJ5kEdWX6RQ9CyWiFmOmKw8+QZSQ@mail.gmail.com> <CAJE_bqc+1=CT66f88tB_DbavBmvnnYcK3a+LR_OwUWu_O-WnVw@mail.gmail.com> <CAJ3w4Ne8rU-cnvNqeM0x0PFw+mAD-TEmyegOJDgQuCiccFY2hg@mail.gmail.com> <CAJE_bqdBqjSG0UnGuKfjtQMB-Rp81pU7n_+Eq_Fb=yar+673hA@mail.gmail.com> <CAJ3w4NcmG18puJpzPFFvn4U8P7eQwh2WeMvcvH+UJHNPQd_BRw@mail.gmail.com> <CAJE_bqc9JHcUGCGW9VSPrHTBUe4tKowh9OHVbUA1qWwanWyYBg@mail.gmail.com>
Date: Thu, 25 Feb 2016 20:45:16 +0800
Message-ID: <CAJ3w4Nd+PbmQ3+fXGgMZHrh3NNejZmBaV0ytECjRc5KJ57HzPw@mail.gmail.com>
From: Lishan Li <lilishan48@gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Content-Type: multipart/alternative; boundary="001a11c39ea8ed6ef7052c978d02"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dhcwg/rsiQ4o8H9v968cF2ezB7esxwF1s>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>, draft-ietf-dhc-sedhcpv6@ietf.org
Subject: Re: [dhcwg] comments on draft-ietf-dhc-sedhcpv6-10.txt
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Feb 2016 12:45:21 -0000

2016-02-25 1:56 GMT+08:00 神明達哉 <jinmei@wide.ad.jp>:

> (I've removed draft-ietf-dhc-sedhcpv6@ietf.org)
>
> At Tue, 23 Feb 2016 10:45:40 +0800,
> Lishan Li <lilishan48@gmail.com> wrote:
>
> > > I'm still not sure if my point was made clear...so let me be more
> > > specific: in the following message exchanges:
> > >
> > > 1. Information-request from client to server(s)
> > > 2. Reply to the Information-request from server(s) to client
> > > 3. Encryption-Query from client to server
> > > 4. Encryption-Response from server to client
> > >
> > > did you mean the Reply message of exchange #2?
> > >
> > > If so, do you at least agree that it makes almost no sense to include
> > > the explicit separate signature in messages 3 and 4?
> > >
> > > [LS]: Yes, I mean the Reply message of exchange #2. The reply message
> > contains the signature option and timestamp option for message integrity
> > check. In the #3 and #4 messages, the DHCPv6 messages are encrypted, so
> the
> > signature and timestamp option are not contained.
> > What do you think of it?
>
> Okay.  So focusing on the Reply message (#2): my point was:
>
> - in effect, its only content is the certificate (or public key).
> - the recipient is already expected to validate this only content
>   directly (by comparing it with locally pre-configured info, by using
>   a PKI, etc), so we do not necessarily need to provide additional
>   integrity protection for it by signing the message.
> - on the other hand, if we eliminate the signing and the signature
>   option from this, we'll completely eliminate this option from the
>   protocol.  This will help make the protocol simpler and reduce
>   development costs.
>
> If you still disagree, perhaps it helps if you can show a specific
> attack vector because of the lack of the signature.
>
> [LS]: Agree. But if we don't need the signature option, then the timestamp
option makes no sense, which is used to defend against anti-replay
attack before.

> > Right, but this argument also holds even if we have TOFU...
> > >
> > > > So, I think that
> > > > the certificate option is enough for authentication.
> > > > Looking forward to your further guidance.
> > >
> > > ...so these don't explain why we should now remove the public key
> > > option.  One obvious, though possibly relatively minor, drawback of
> > > only having a certificate is that it will make the message size even
> > > bigger when we actually only need the public key.
> > >
> > > I'm not necessarily opposed to removing the public key option if we
> > > cover all such discussions and reach consensus, but I don't think I've
> > > seen it yet.
> > >
> > > [LS]: In consideration of the support of TOFU and the add of all such
> > discussions and consensus, the better way for us is to add the public key
> > option as the before secure DHCPv6 version.
> > Am I correct?
>
> No, I just didn't see why the public key option was removed (the
> explanation regarding TOFU didn't make sense to me).  As I already
> said, I'm not necessarily opposed to removing it if there's a
> convincing reason that can outweigh its cons.
>
> [LS]: The self-signed certificate is the argument of the remove of the
public
key option. And we also need to supply some text to illustrate that it can
outweigh its cons. For the drawback of the method, the size of the DHCPv6
message is increased when we actually only need the public key, not the
certificate. However, the size of the X.509 certificate is not very large,
such as 1KB, which will not cause IPv6 fragment and other problem.


> > > > > >- Section 6
>
> > > Introducing a new error code is related but a minor point.  My
> > > question was about what the client should do if it sees that code (or
> > > whatever signal that indicates this kind of failure).
> > >
> > [LS]: As you said before, the DecryptionFail failure is equivalent to
> > SignatureFail. So if the client sees that code, the client MAY resend the
> > message following normal retransmission routines defined in [RFC3315].
> > Am I correct?
>
> Not sure if you are correct:-), but, yes, that answers my question.
> Whether this behavior makes most sense is a different question, on
> which I don't yet have a particular idea.  Maybe I should first see a
> revised draft in full text.
>
> > > p.s. there's another bigger open issue I separated from the rest of
> > > the discussions:
> > >
> https://mailarchive.ietf.org/arch/msg/dhcwg/-tZBpeMs-EiVyMm0MLBpj3dFYNI
>
> Reminder: this is still open.
>
> [LS]: Will participate in the discussion.


> > > [LS]: Another open isssue is that:
> > If the server receives the Information-request message but it does not
> > support this work, what should the server do?
> > In my opinion, if the server don't support this work, it has two choices:
> > 1. drop the received Information-request message;
> > In this way, the client will not receive any message which illustrate the
> > server don't support secure DHCPv6. If there is no authenticated DHCPv6
> > server, the client may resend the Information-request message;
> > 2. send the Reply message with the corresponding error status code to the
> > client;
> > This way will introduce the downgrade attack, a third party may send the
> > Reply message with the corresponding error status code. And then the
> DHCPv6
> > configuration process may be unsecured.
> > I prefer the first one solution. Which one would you prefer? Looking
> > forward to your guidance.
>
> I'd simply expect the usual behavior: the server will return a Reply
> (obviously) without the requested information (which, in this case,
> the certificate or public key option).  I don't think we can eliminate
> the possibility of downgrade attack by an on-path attacker, however we
> specify the behavior in this case.
>
> [LS]: Thanks a lot for your guidance. I think that Bernie's reply has
solved this problem.


Best Regards,
Lishan