Re: [dhcwg] Alissa Cooper's Discuss on draft-ietf-dhc-access-network-identifier-10: (with DISCUSS)

"Sri Gundavelli (sgundave)" <sgundave@cisco.com> Tue, 08 December 2015 21:51 UTC

Return-Path: <sgundave@cisco.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DAE511A8A92; Tue, 8 Dec 2015 13:51:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level:
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QN3Lq5Rx8kG9; Tue, 8 Dec 2015 13:51:06 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2044D1A89C6; Tue, 8 Dec 2015 13:51:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=58292; q=dns/txt; s=iport; t=1449611466; x=1450821066; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=aGC3aVdoeUwZ/d/F+FNUxUX2nIseWEX71KMSoc2ILcs=; b=laTYU400MM6qFG0rxpu20RuiLpjiystQHDgOrnm5EEspTvHaji2S7QsB mzBnWlE6VNhOAyJskHvSlVon5kZwKGsFOzVc6r1Ni4jET2ebQ4ltnIVuh lwvabvyFZr8S671b6NRuX9YNjARrh9SsPZhRVjtKRNRI/HsvKzZAIhf2d U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D/AQCfT2dW/4kNJK1VCYJuTFNuBr05AQ2BbiOFawKBPzgUAQEBAQEBAYEKhDQBAQEEGgECSgsHEAIBCBEBAgECIQEGBzIUAwYIAgQOBYgvDb8KAQEBAQEBAQEBAQEBAQEBAQEBAQEBFASGVIR9hCkBBwMHAQY5DQmEKgWHT4VahU6DagGFLIJyhR2BW4RDkl2DcQEfAQFCggwFHRaBQHIBhCQJFyOBBwEBAQ
X-IronPort-AV: E=Sophos; i="5.20,400,1444694400"; d="scan'208,217"; a="57227237"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 08 Dec 2015 21:51:04 +0000
Received: from XCH-ALN-005.cisco.com (xch-aln-005.cisco.com [173.36.7.15]) by alln-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id tB8Lp3W1004701 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 8 Dec 2015 21:51:04 GMT
Received: from xch-aln-007.cisco.com (173.36.7.17) by XCH-ALN-005.cisco.com (173.36.7.15) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 8 Dec 2015 15:51:03 -0600
Received: from xch-aln-007.cisco.com ([173.36.7.17]) by XCH-ALN-007.cisco.com ([173.36.7.17]) with mapi id 15.00.1104.009; Tue, 8 Dec 2015 15:51:03 -0600
From: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
To: Alissa Cooper <alissa@cooperw.in>
Thread-Topic: Alissa Cooper's Discuss on draft-ietf-dhc-access-network-identifier-10: (with DISCUSS)
Thread-Index: AQHRMgKIcKTF7o0D70uGEUbwGrHA7A==
Date: Tue, 08 Dec 2015 21:51:02 +0000
Message-ID: <D28C8C70.1FA5AC%sgundave@cisco.com>
References: <20150914211018.30653.52466.idtracker@ietfa.amsl.com> <34FDFAC6-9DE1-44FB-B4D0-EE501DC6B557@cisco.com> <4D710102-913D-4FEF-9B74-4F3674979212@cooperw.in> <D2203E8E.1D837C%sgundave@cisco.com> <7384526D-59AF-4F48-9F5B-D9D8B6A39679@cooperw.in> <D28226D3.1F7900%sgundave@cisco.com> <602FD3C4-9F15-44F5-AC4F-6E0F15B88637@cooperw.in>
In-Reply-To: <602FD3C4-9F15-44F5-AC4F-6E0F15B88637@cooperw.in>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.5.8.151023
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.32.246.210]
Content-Type: multipart/alternative; boundary="_000_D28C8C701FA5ACsgundaveciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/dhcwg/vJHoXIjw2Zu1h7bOBGbnjVD7swk>
Cc: "Bernie Volz (volz)" <volz@cisco.com>, "dhc-chairs@ietf.org" <dhc-chairs@ietf.org>, "draft-ietf-dhc-access-network-identifier.shepherd@ietf.org" <draft-ietf-dhc-access-network-identifier.shepherd@ietf.org>, IESG <iesg@ietf.org>, "draft-ietf-dhc-access-network-identifier.ad@ietf.org" <draft-ietf-dhc-access-network-identifier.ad@ietf.org>, "dhcwg@ietf.org" <dhcwg@ietf.org>, "draft-ietf-dhc-access-network-identifier@ietf.org" <draft-ietf-dhc-access-network-identifier@ietf.org>
Subject: Re: [dhcwg] Alissa Cooper's Discuss on draft-ietf-dhc-access-network-identifier-10: (with DISCUSS)
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Dec 2015 21:51:13 -0000

Hi Alissa,


> "The scope of applicability for this option is between a DHCP relay agent and a Mobile Access Gateway where the same operator typically operates both”.

My comment was about not making any assumptions in protocol documents on who operates what network function.  At the end of the day its about how these paths are secured and less about who operates them. But, its OK, we can add this note.


OLD:

   This document specifies Dynamic Host Configuration Protocol for IPv4
   (DHCPv4) [RFC2131] and Dynamic Host Configuration Protocol for IPv6
   (DHCPv6) [RFC3315] options for access network identification that is
   added by Relay agent in the DHCPv4 or DHCPv6 messages towards the
   Server.


NEW:

   This document specifies Dynamic Host Configuration Protocol for IPv4
   (DHCPv4) [RFC2131] and Dynamic Host Configuration Protocol for IPv6
   (DHCPv6) [RFC3315] options for access network identification that is
   added by Relay agent in the DHCPv4 or DHCPv6 messages towards the
   Server.  The scope of applicability for this option is between a DHCP relay

   agent and a mobile access gateway where the same operator typically operates both these functions



Regards
Sri


From: Alissa Cooper <alissa@cooperw.in<mailto:alissa@cooperw.in>>
Date: Monday, December 7, 2015 at 2:36 PM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>
Cc: "Bernie Volz (volz)" <volz@cisco.com<mailto:volz@cisco.com>>, IESG <iesg@ietf.org<mailto:iesg@ietf.org>>, "dhc-chairs@ietf.org<mailto:dhc-chairs@ietf.org>" <dhc-chairs@ietf.org<mailto:dhc-chairs@ietf.org>>, "draft-ietf-dhc-access-network-identifier.shepherd@ietf.org<mailto:draft-ietf-dhc-access-network-identifier.shepherd@ietf.org>" <draft-ietf-dhc-access-network-identifier.shepherd@ietf.org<mailto:draft-ietf-dhc-access-network-identifier.shepherd@ietf.org>>, "draft-ietf-dhc-access-network-identifier.ad@ietf.org<mailto:draft-ietf-dhc-access-network-identifier.ad@ietf.org>" <draft-ietf-dhc-access-network-identifier.ad@ietf.org<mailto:draft-ietf-dhc-access-network-identifier.ad@ietf.org>>, "draft-ietf-dhc-access-network-identifier@ietf.org<mailto:draft-ietf-dhc-access-network-identifier@ietf.org>" <draft-ietf-dhc-access-network-identifier@ietf.org<mailto:draft-ietf-dhc-access-network-identifier@ietf.org>>, "jiangsheng@huawei.com<mailto:jiangsheng@huawei.com>" <jiangsheng@huawei.com<mailto:jiangsheng@huawei.com>>, "dhcwg@ietf.org<mailto:dhcwg@ietf.org>" <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>
Subject: Re: Alissa Cooper's Discuss on draft-ietf-dhc-access-network-identifier-10: (with DISCUSS)

Hi Sri,

On Nov 30, 2015, at 4:35 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com<mailto:sgundave@cisco.com>> wrote:

Hi Alissa,

I some how missed this email. Please see inline.


From: Alissa Cooper <alissa@cooperw.in<mailto:alissa@cooperw.in>>
Date: Monday, November 2, 2015 at 10:53 PM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>
Cc: "Bernie Volz (volz)" <volz@cisco.com<mailto:volz@cisco.com>>, IESG <iesg@ietf.org<mailto:iesg@ietf.org>>, "dhc-chairs@ietf.org<mailto:dhc-chairs@ietf.org>" <dhc-chairs@ietf.org<mailto:dhc-chairs@ietf.org>>, "draft-ietf-dhc-access-network-identifier.shepherd@ietf.org<mailto:draft-ietf-dhc-access-network-identifier.shepherd@ietf.org>" <draft-ietf-dhc-access-network-identifier.shepherd@ietf.org<mailto:draft-ietf-dhc-access-network-identifier.shepherd@ietf.org>>, "draft-ietf-dhc-access-network-identifier.ad@ietf.org<mailto:draft-ietf-dhc-access-network-identifier.ad@ietf.org>" <draft-ietf-dhc-access-network-identifier.ad@ietf.org<mailto:draft-ietf-dhc-access-network-identifier.ad@ietf.org>>, "draft-ietf-dhc-access-network-identifier@ietf.org<mailto:draft-ietf-dhc-access-network-identifier@ietf.org>" <draft-ietf-dhc-access-network-identifier@ietf.org<mailto:draft-ietf-dhc-access-network-identifier@ietf.org>>, "jiangsheng@huawei.com<mailto:jiangsheng@huawei.com>" <jiangsheng@huawei.com<mailto:jiangsheng@huawei.com>>, "dhcwg@ietf.org<mailto:dhcwg@ietf.org>" <dhcwg@ietf.org<mailto:dhcwg@ietf.org>>
Subject: Re: Alissa Cooper's Discuss on draft-ietf-dhc-access-network-identifier-10: (with DISCUSS)

Hi Sri,

Thanks. I get the use case for AP MAC address now and the relationship between this draft and RFC 6757.

Your response on the scoping questions is quite different from Bernie’s. If the intention really is to use these options in a wide variety of system architectures, I don’t believe the security considerations as specified are sufficient to protect the information in the options.

On the other hand, if the scope is limited in the way Bernie alluded to, my thinking is that what would help here is an applicability statement that explains that these options are being specified only for the purpose of communicating access network identification between a DHCP relay agent and a Mobile Access Gateway where the same operator typically operates both. The lack of any strong normative security requirements can be justified in that realm of applicability I think.

[Sri] The operating environment is about an access network operated by a single operator. MAG is in the access network and the L2 termination devices are in the access network; that is the case in all currently known deployment models.  The current spec just focusses on this aspect and the example and the context is all about this scenario. You can ignore my previous explanation, if it appeared more that that. With the IESG proposed changes, we now have clearly identified the information elements at risk and the security requirement of needing IPsec with privacy protection for protecting that information elements.  I do not think explicit applicability-note is  needed, IMHO, as it is difficult to model protocols bringing roaming relations into the scope.

I don’t think the modeling you mention is necessary in order to write an applicability statement, if I understand you correctly. The scope of applicability for this option is between a DHCP relay agent and a Mobile Access Gateway where the same operator typically operates both. Do you have difficulty to put a note about this limitation in scope into the draft?

Thanks,
Alissa

>From the past IESG inputs and discussions, the general view was not to bring roaming relations into mobility protocols as that can muddle the waters. We always viewed roaming relation is more about sharing of security relation and so we avoided modeling of roaming relationships in mobility specs.  But, given that the MAG and DHCP Relay agent are in the access network, this should address your key concern.



Even if the applicability statement gets added, I still think the security considerations should make normative recommendations. Here are some suggestions for the problematic text I called out in my DISCUSS:

OLD

   DHCP itself is inherently insecure and thus link-
   layer confidentiality and integrity protection should be employed to
   reduce the risk of disclosure and tampering.

NEW

   DHCP itself is inherently insecure and thus link-
   layer confidentiality and integrity protection SHOULD be employed to
   reduce the risk of disclosure and tampering.


[Sri] Ok.



OLD
DHCP server administrators are
   strongly advised to configure DHCP servers that use this option to
   communicate with their relay agents using IPsec, as described in
   Section 21.1 of [RFC3315].

NEW
DHCP server administrators SHOULD configure DHCP servers that use this option to
   communicate with their relay agents using IPsec, as described in
   Section 21.1 of [RFC3315].


[Sri] OK


OLD
In deployments where this information is considered secure
   and when such threat cannot be mitigated using IPsec [RFC4301] or
   other security protocols, then the administrators have to consider
   disabling the capability specified in this document on the DHCP
   entities.

NEW
In deployments where this information cannot be secured using IPsec [RFC4301] or
   other security protocols, administrators SHOULD disable the capability specified in this document on the DHCP entities.

[Sri] OK.



If you are OK, we can close this with the below changes.

Regards
Sri



On Sep 18, 2015, at 3:40 AM, Sri Gundavelli (sgundave) <sgundave@cisco.com<mailto:sgundave@cisco.com>> wrote:

Hi Alissa,

Thanks for your review comments.

If I may summarize the issues raised in your DISCUSS, it is pointing to three key discussion points.

1.) Access Network Information elements
2.) Application and use-cases of the options
3.) Securing the information / aka DHCP security

#1 The options that we defined in DHCP for carrying these ANI elements are subset of the ANI options that we have defined in RFC6757. There we have defined Network Identifier, Geo-Location and Operator Identifier options and the options here are just the subset of the same, missing ones are already present in DHCP.  The structure, semantics and the options and security implications of exposing them to an intruder are identical to what was defined in RFC6757. What is different here is the change of protocol and the network elements carrying these IE’s. RFC 6757, carries them between MAG and LMA, with out any assumption on how the MAG can possibly obtain them and here we fix that by allowing the DHCP elements carry the same and have the network elements such as TWAG/MAG carry them to the PGW/LMA over PMIP/GTP interfaces. There are no new IE definitions, these are the same elements from RFC6757.

#2 This is a generic DHCP option and can be used in any system architecture. It is true, the use-case that is driving this requirement is WLAN-EPC integration/SP Wi-Fi architectures, but it has wider applicability. There is lot of value around exposing the information of the network to which a user is attached. This is fundamental to many location-based services.

- Portal Page customization based on the user-location. Lets say, Starbucks wants to present a portal page which is different for a user attached to an Access Point in Starbucks Seatlle, vs Starbucks in San Jose. If the AP identity is present, the backend infra can generate a portal page customized for that location, or redirect the user to a different URL.

- Taking the 3GPP SaMOG architecture for WLAN-EPC integration.We have extended 3GPP S2a PMIP/GTP interfaces for signaling the WLAN user’s location. The extensions proposed for DHCP here allows the MAG/TWAG to obtain the same over DHCP, so it can signal this to the PGW/LMA over S2a interface. The P-GW may signal this information to attached elements, (e.g., using Gx to signal the PCRF) when a user’s location has changed. The Wi-Fi location is similar to the User Location Information (ULI) field. ULI is specified to support CGI, SAI, RAI, TAI, ECGI and LAI (Cellar access identifiers).

- Taking Wi-Fi calling as an example and when deployed in a trusted Wi-Fi network where the operator own the Wi-Fi access network, there some operators want to restrict the use of Wi-Fi calling from certain locations/or use different charging tariff.  Knowing the AP identity offers such capability. This is also essential for E-911/emergency services. Some one makes a call for ambulance and says he is getting heart attack, the E911 responder should be reasonably sure where that call is coming from.


#3 DHCP Security, as I understand is a sensitive topic. From my point of view, there are tools and  IPSec is one such tool. IPSec can be used between the DHCP Relay and the Server and nothing stops me from realizing that. The enabled security policy can be  with integrity, privacy and non repudiation. There is also the option to disable this support on DHCP server. It can just ignore them. To the point, why DHCP is used. In many deployment models that is the only interface between a AP and the TWAG/MAG and leveraging the same helps.


   The information elements that this draft is exposing is the client's
   access-network information.  These pertain to the access network to
   which the client is attached, such as Access Technology Type (Ex:
   WLAN, Ethernet...etc), Access Point Identity (Name, BSSID), Operator
   Id/Realm.  In deployments where this information is considered secure
   and when such threat cannot be mitigated using IPsec [RFC4301] or
   other security protocols, then the administrators have to consider
   disabling the capability specified in this document on the DHCP
   entities.



Alissa CooperDiscuss
Discuss (2015-09-14)

I have some questions about this draft. They derive from the position that some of the values in the options specified can reveal sensitive information about the mobile user. I would put access network name (especially when it's SSID, since people put identifying information in SSIDs), access point name, and BSSID in that category at a minimum.

The draft specifies DHCP options for downstream use in PMIPv6 scenarios, but makes no mention about actually limiting the use of these options to those scenarios. It's not clear to me whether those limits could be achieved in any case, since an AP won't know a priori whether it is being deployed in a service-provider-WiFi or cellular context or not. So what is the authors' expectation about the breadth of deployment of these options? Every DHCP stack? Something less than that? Furthermore, are any of the individual fields required or optional? RFC 6757 indicates that within PMIPv6 only the ATT is required.

Given the drawbacks discussed in Section 9, why was DHCP the protocol chosen for this? Is there no other protocol that APs speak to MAGs that has confidentiality, integrity protection, and authentication support? If DHCP is the only choice, why are none of the security fixes normatively required ("confidentiality and integrity protection should be employed," "DHCP server administrators are strongly advised to configure DHCP servers ... using IPsec," "administrators have to consider disabling the capability specified")?

Why would an LMA need the MAC address of the AP? Are there examples of policies that mobile networks have in place that apply differently to two devices connected to the same SSID but different APs, for example? I looked for this in RFC 6757 too but did not see it. Given the potential sensitivity of this field it seems like a justification for sharing it in an eavesdroppable way needs to be provided.

St





On 9/16/15, 5:30 AM, "Alissa Cooper" <alissa@cooperw.in<mailto:alissa@cooperw.in>> wrote:

Hi Bernie,

On Sep 14, 2015, at 2:29 PM, Bernie Volz (volz) <volz@cisco.com<mailto:volz@cisco.com>> wrote:
Alissa:
These options are only added and processed between dhcp relay-agents and servers. No dhcp clients need changing.
As the operator typically runs both the relays and servers, they should know when to configure use of these options (sub-options) based on their network needs. Also, unless there is some reason the servers needs this information, there is no need to configure use.

Thanks. Could all of the above be made normative requirements in the draft? Still wouldn’t make me super comfortable, but at least the draft would have a clear discussion of the limitations in deployment and expectations placed on admins.

Also, this usage makes snooping harder - it is in the SPs network behind the relay agents.

Not sure what snooping you’re referring to.

Still wondering about the rest of my questions below.

Thanks,
Alissa

- Bernie (from iPad)
On Sep 14, 2015, at 5:10 PM, Alissa Cooper <alissa@cooperw.in<mailto:alissa@cooperw.in>> wrote:
Alissa Cooper has entered the following ballot position for
draft-ietf-dhc-access-network-identifier-10: Discuss
When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)
Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.
The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-dhc-access-network-identifier/
----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------
I have some questions about this draft. They derive from the position
that some of the values in the options specified can reveal sensitive
information about the mobile user. I would put access network name
(especially when it's SSID, since people put identifying information in
SSIDs), access point name, and BSSID in that category at a minimum.
The draft specifies DHCP options for downstream use in PMIPv6 scenarios,
but makes no mention about actually limiting the use of these options to
those scenarios. It's not clear to me whether those limits could be
achieved in any case, since an AP won't know a priori whether it is being
deployed in a service-provider-WiFi or cellular context or not. So what
is the authors' expectation about the breadth of deployment of these
options? Every DHCP stack? Something less than that? Furthermore, are any
of the individual fields required or optional? RFC 6757 indicates that
within PMIPv6 only the ATT is required.
Given the drawbacks discussed in Section 9, why was DHCP the protocol
chosen for this? Is there no other protocol that APs speak to MAGs that
has confidentiality, integrity protection, and authentication support? If
DHCP is the only choice, why are none of the security fixes normatively
required ("confidentiality and integrity protection should be employed,"
"DHCP server administrators are strongly advised to configure DHCP
servers ... using IPsec," "administrators have to consider disabling the
capability specified")?
Why would an LMA need the MAC address of the AP? Are there examples of
policies that mobile networks have in place that apply differently to two
devices connected to the same SSID but different APs, for example? I
looked for this in RFC 6757 too but did not see it. Given the potential
sensitivity of this field it seems like a justification for sharing it in
an eavesdroppable way needs to be provided.