Re: [dhcwg] Stephen Farrell's Discuss on draft-ietf-dhc-dhcpv6-active-leasequery-03: (with DISCUSS and COMMENT)

Kim Kinnear <kkinnear@cisco.com> Fri, 10 July 2015 14:48 UTC

Return-Path: <kkinnear@cisco.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ABC2D1A913E; Fri, 10 Jul 2015 07:48:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iCYJff5_Abmz; Fri, 10 Jul 2015 07:48:22 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DB971B2C97; Fri, 10 Jul 2015 07:48:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1799; q=dns/txt; s=iport; t=1436539701; x=1437749301; h=mime-version:subject:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=mepvM17m+kHVIiY8Vyp9u1ydVtxlAxg2vpvQDkx2sW4=; b=CTDgJxd9U1okCAiVHy+3bDPTrR+pexUnKY+Gv0Gxjc6cSuP4kJ2vh3E/ W3yh2E+yf47Ei/ntMqIEwES7qERJojqCUhoAAO/lejH1km8ALM54Grf/l fCDKQnkhtemj4cd7ejOUFryzLE0tGVGOj9rJNprDUWQahZzHtEBLrIdij M=;
X-IronPort-AV: E=Sophos;i="5.15,447,1432598400"; d="scan'208";a="10611775"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-6.cisco.com with ESMTP; 10 Jul 2015 14:48:20 +0000
Received: from bxb-kkinnear-8815.cisco.com (bxb-kkinnear-8815.cisco.com [10.98.10.246]) (authenticated bits=0) by rcdn-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id t6AEmIYB005001 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 10 Jul 2015 14:48:19 GMT
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Kim Kinnear <kkinnear@cisco.com>
In-Reply-To: <20150708114206.28697.67541.idtracker@ietfa.amsl.com>
Date: Fri, 10 Jul 2015 10:48:20 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <5224B44F-7286-45CF-9509-06EDFDC2A704@cisco.com>
References: <20150708114206.28697.67541.idtracker@ietfa.amsl.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Mailer: Apple Mail (2.1878.6)
X-Authenticated-User: kkinnear
Archived-At: <http://mailarchive.ietf.org/arch/msg/dhcwg/uAWAuohT3kpZwDHI439MxNBtz60>
Cc: dhc-chairs@ietf.org, draft-ietf-dhc-dhcpv6-active-leasequery@ietf.org, The IESG <iesg@ietf.org>, dhcwg@ietf.org, Kim Kinnear <kkinnear@cisco.com>
Subject: Re: [dhcwg] Stephen Farrell's Discuss on draft-ietf-dhc-dhcpv6-active-leasequery-03: (with DISCUSS and COMMENT)
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2015 14:48:23 -0000

On Jul 8, 2015, at 7:42 AM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:

> - section 10: why is (the usually mythical:-) 3315 a MUST NOT
> here? I don't get that. I could see it being an EDONTCAR but I
> don't see the harm if one did go mad and try use 3315. And I
> could maybe, possibly, with a lot of a nose-holding, see a
> universe in which one might use TLS server auth for the DHCP
> server and 3315 to authenticate the requestor, so it seems odd
> to rule that out in this way.

Stephen,

This language was in the first draft submission of this protocol,
so it wasn't something added along the way.  I would say that
the arguments for this language are:

  1. If you want authentication, use TLS which is a documented part of
  this protocol.

  2. The RFC 3315 authentication explicitly does not deal with data
  security, and so again, TLS gives you that.

  3. RFC 3315 authentication has not been specified over a TCP
  connection to the DHCP server.  Are there things you would need to
  think about here?  I can't think of any right off, but it still
  makes a nice argument.

  4. Why allow *two* security/authentication mechanisms for one
  protocol.  Yes, we could imagine someone using it, but if some
  people use it and some people use TLS, then where does that leave
  us?  Not communicating securely, seems to me. 

Bottom line:  Just because we can imagine someone doing this doesn't
make it a good thing to do.  So, I would say:  If you want
authentication or security, use TLS.  If not, not.  I see zero value
in allowing an intermediate solution which just makes the likelihood
of actually communicating significantly less.

I think this statement -- MUST NOT use 3315 authentication -- should
stand.

Regards -- Kim