Re: [Dots] Eric Rescorla's Discuss on draft-ietf-dots-requirements-18: (with DISCUSS and COMMENT)

Eric Rescorla <ekr@rtfm.com> Fri, 22 February 2019 16:45 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55D96130F18 for <dots@ietfa.amsl.com>; Fri, 22 Feb 2019 08:45:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h2uBHZQSmeMb for <dots@ietfa.amsl.com>; Fri, 22 Feb 2019 08:45:44 -0800 (PST)
Received: from mail-lf1-x135.google.com (mail-lf1-x135.google.com [IPv6:2a00:1450:4864:20::135]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2479130FA0 for <dots@ietf.org>; Fri, 22 Feb 2019 08:45:39 -0800 (PST)
Received: by mail-lf1-x135.google.com with SMTP id g12so2173300lfb.13 for <dots@ietf.org>; Fri, 22 Feb 2019 08:45:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=UedpWwMSZs8R3IBG98POE5b5cXLAwzCcDUN8JFncDEE=; b=hwAQUeVDK8sfOy3P+wRsZYNk00TnWaLmtol1Ynov8/4v8GTfpRn5u6paBpNuSnrN84 nyhZ9E8usAqJCLL14Zp0DOnAMEPkVz3LzLWcfQyk/LQZPtl0rHbde9gC2PXDEZW/i7ux x3exW8At4mynZDVoucRW97WLUeRs1Mc4Ew0GbNFsHdBWzDs02AHFIheg36OWkUryZSFB E6ZtiTg9Dbi4efOYC86i/QrcQabJi6qzwOJf2tYOc2Y3qm6Equ0R2csW4E8P+3ARtBkO c/Lc9KQL+SO+rXUGDucExt2PWF8XHLKLufnBkTEQ609TqXGmv2thbw2FJaw5gbPyA0Ic ZEsg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=UedpWwMSZs8R3IBG98POE5b5cXLAwzCcDUN8JFncDEE=; b=UGYWuq1ORE4nB4qgt2JA/+wseliOX9o7sYXFg6UMNnJPpNdKEUE5Gbr6elmkugHgso Ek5m/xc3u/e5nVjcYT4L6Ix7J71u683gjFf8IQCUkjdV/CBsBWQ6cBbF3GHyHGNd3NnM fJ2b/nzGi/FcYIig9lqNzh2dcXSgZiYyqB4IMToL8Q2d79JOyMfVm/+roZwm73h7Z5vn rqQkmLLnMyQgSGPBNsjc84xRTFM7rM+pquAsKQ2uZApIkMcjB3l6KzkP2lMZ60rVnw4b dCy+iGA79RiPlG1NqLq7NQymkz1aDmb0rjwxpY3xF0qSGlG65eNty4eHdGhOnTLER80g PH6Q==
X-Gm-Message-State: AHQUAubJOEvFdy8tyti7TjqkbuPR3EIMIJLAA1RVc6we7a54/sHqjAmf tmjdioJxjFAFs4AnXFNU2RyF00o5NeZgzmmf8pnJog==
X-Google-Smtp-Source: AHgI3IZPqFC28cc7/PQqtJmTHqSh4BWEYE3eN71/jtz8eZhwVdSdEtwpN2N32UXF8vkdf6rvfnAOSyTqcAE7+LDrIKk=
X-Received: by 2002:a19:2d44:: with SMTP id t4mr2913433lft.90.1550853937404; Fri, 22 Feb 2019 08:45:37 -0800 (PST)
MIME-Version: 1.0
References: <155076138334.8654.4433425046363509880.idtracker@ietfa.amsl.com> <BYAPR16MB27907AFCEC70695076EFD2B9EA7F0@BYAPR16MB2790.namprd16.prod.outlook.com> <CABcZeBOAYzwf1SzdEJWwGgd3z3t+nGeJ1i4GW58OOwoDtLCn5w@mail.gmail.com> <DM6PR16MB27948B94FCBF0A460F90A9C7EA7F0@DM6PR16MB2794.namprd16.prod.outlook.com>
In-Reply-To: <DM6PR16MB27948B94FCBF0A460F90A9C7EA7F0@DM6PR16MB2794.namprd16.prod.outlook.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 22 Feb 2019 08:44:58 -0800
Message-ID: <CABcZeBNezmCh7X80BqnizXmX2r42SS=+h3PWO9vpboMaDW30og@mail.gmail.com>
To: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@mcafee.com>
Cc: The IESG <iesg@ietf.org>, "dots-chairs@ietf.org" <dots-chairs@ietf.org>, "frank.xialiang@huawei.com" <frank.xialiang@huawei.com>, "draft-ietf-dots-requirements@ietf.org" <draft-ietf-dots-requirements@ietf.org>, "dots@ietf.org" <dots@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000009c2c205827e5235"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/H9J5G2CqOP0YzdxxAcbspxeLVTk>
Subject: Re: [Dots] Eric Rescorla's Discuss on draft-ietf-dots-requirements-18: (with DISCUSS and COMMENT)
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Feb 2019 16:45:52 -0000

On Fri, Feb 22, 2019 at 8:06 AM Konda, Tirumaleswar Reddy <
TirumaleswarReddy_Konda@mcafee.com> wrote:

> Please see inline
>
>
>
> *From:* Eric Rescorla <ekr@rtfm.com>
> *Sent:* Friday, February 22, 2019 7:11 PM
> *To:* Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com>
> *Cc:* The IESG <iesg@ietf.org>; dots-chairs@ietf.org;
> frank.xialiang@huawei.com; draft-ietf-dots-requirements@ietf.org;
> dots@ietf.org
> *Subject:* Re: Eric Rescorla's Discuss on
> draft-ietf-dots-requirements-18: (with DISCUSS and COMMENT)
>
>
>
> *CAUTION*: External email. Do not click links or open attachments unless
> you recognize the sender and know the content is safe.
> ------------------------------
>
>
>
>
>
> On Fri, Feb 22, 2019 at 3:41 AM Konda, Tirumaleswar Reddy <
> TirumaleswarReddy_Konda@mcafee.com> wrote:
>
> Hi Eric,
>
> Please see inline
>
> > -----Original Message-----
> > From: Eric Rescorla <ekr@rtfm.com>
> > Sent: Thursday, February 21, 2019 8:33 PM
> > To: The IESG <iesg@ietf.org>
> > Cc: dots-chairs@ietf.org; frank.xialiang@huawei.com; Liang Xia
> > <frank.xialiang@huawei.com>; draft-ietf-dots-requirements@ietf.org;
> > dots@ietf.org
> > Subject: Eric Rescorla's Discuss on draft-ietf-dots-requirements-18:
> (with
> > DISCUSS and COMMENT)
> >
> > This email originated from outside of the organization. Do not click
> links or
> > open attachments unless you recognize the sender and know the content is
> safe.
> >
> > Eric Rescorla has entered the following ballot position for
> > draft-ietf-dots-requirements-18: Discuss
> >
> > When responding, please keep the subject line intact and reply to all
> email
> > addresses included in the To and CC lines. (Feel free to cut this
> introductory
> > paragraph, however.)
> >
> >
> > Please refer to
> https://www.ietf.org/iesg/statement/discuss-criteria.html
> > for more information about IESG DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-dots-requirements/
> >
> >
> >
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > Rich version of this review at:
> > https://mozphab-ietf.devsvcdev.mozaws.net/D3543
> >
> >
> > I only had a short time to read this, but I find myself confused about
> the
> > COMSEC requirements here.
> >
> > There is no COMSEC requirement for the signaling channel in S 2.2.
> > DATA-002 requires a secure COMSEC protocol for the data channel.
>
> Both signal and data channel require confidentiality and have the same
> data privacy and integrity requirements.
>
>
>
> Great. That seems appropriate.
>
>
>
>
>
>
> > SEC-001 and SEC-002 require "peer mutual authentication" and "message
> > confidentiality, integrity, and authentication" according to "industry
> best
> > practices". This doesn't seem to be a requirement which I can verify or
> > evaluate. If "industry best practices" were to use raw TCP, would such an
> > implementation be conformant.
> >
> > I think what needs to be required here is cryptographic authentication
> of both
> > sides and of the messages on both channels.
>
> Yes, both the protocols using (D)TLS to mutually authenticate both sides
> and the messages on both channels are encrypted.
>
> > Generally I would prefer to require
> > confidentiality on both, but I could maybe see an argument for why that
> wasn't
> > needed.
>
> Removed DATA-002 and updated security requirements to discuss
> confidentiality for both DOTS protocols.
>
>    SEC-003  Data privacy and integrity: Transmissions over the DOTS
>       protocols are likely to contain operationally or privacy-sensitive
>       information or instructions from the remote DOTS agent.  Theft,
>       modification, or replay of message transmissions could lead to
>       information leaks or malicious transactions on behalf of the
>       sending agent (see Section 4 below).  Consequently data sent over
>       the DOTS protocols MUST be encrypted using secure transports
>       (like TLS and DTLS).  DOTS servers MUST enable means to prevent
> leaking
>       operationally or privacy-sensitive data.  Although administrative
>       entities participating in DOTS may detail what data may be
>       revealed to third-party DOTS agents, such considerations are not
>       in scope for this document.
>
>
>
> This looks good. Note that if you are using DTLS, you may need to opt-in
> to the anti-replay service,
>
> as it is optional.
>
>
>
> Yes, DTLS anti-replay is a mandatory profile for the DOTS agents (see
> https://tools.ietf.org/html/draft-ietf-dots-signal-channel-28#section-7.1)
>
>
>
>
>
> >
> > DETAIL
> > S 2.2.
> > >         free to attempt abbreviated security negotiation methods
> supported
> > >         by the protocol, such as DTLS session resumption, but MUST be
> > >         prepared to negotiate new security state with the redirection
> > >         target DOTS server.  The authentication domain of the
> redirection
> > >         target DOTS server MUST be the same as the authentication
> domain
> > >         of the redirecting DOTS server.
> >
> > what is an "authentication domain"?
>
> We are trying to say both the redirecting and redirected target DOTS
> server belong to the same administrative domain.
>
> Modified the last line as follows:
> The redirection DOTS server and redirecting DOTS server MUST belong to the
> same administrative domain.
>
>
>
> How do I interpret this as the redirected party? Does it have to be the
> same identity in the certificate? Something else?
>
>
>
> The redirected (or alternate) DOTS server’s FQDN will be conveyed by the
> redirecting DOTS server, and DOTS client uses the same explicit trust store
> to validate
>
> both the servers certificates.
>

OK, so the client has no way of knowing if these are actually the same
admin domain, it's just an operational requirement?

-Ekr


>
>
> > S 2.4.
> > >      SEC-002  Message Confidentiality, Integrity and Authenticity: DOTS
> > >         protocols MUST take steps to protect the confidentiality,
> > >         integrity and authenticity of messages sent between client and
> > >         server.  While specific transport- and message-level security
> > >         options are not specified, the protocols MUST follow current
> > >         industry best practices for encryption and message
> authentication.
> >
> > This is not a verifiable conformance requirement
>
> When the requirements draft is initially drafted, the WG wanted to select
> the current IETF best practices for encryption and message authentication
> of DOTS messages.  The DOTS WG has decided to use (D)TLS for signal channel
> and TLS  for data channel.  I can modify the text to say "current IETF best
> practices for encryption and message authentication" for both SEC-001 and
> SEC-002.
>
>
>
> If it 's (D)TLS, then I think you want to cite RFC 7525 here
>
>
>
> Sure, will cite RFC7525.
>
>
>
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > S 2.1.
> > >         proprietary DDoS defenses.  Future extensions MUST be backward
> > >         compatible.  Implementations of older protocol versions MUST
> > >         ignore optional information added to DOTS messages as part of
> > >         newer protocol versions.  Implementations of older protocol
> > >         versions MUST reject mandatory information added to DOTS
> messages
> > >         as part of newer protocol versions.
> >
> > MUST reject the information or MUST reject the messages.
> > Conventionally, it's the latter.
>
> Yes, modified the line as follows:
> Implementations of older protocol versions MUST reject DOTS messages
> carrying mandatory information as part of newer protocol versions.
>
>
>
> Thanks.
>
>
>
>
>
>
> >
> >
> > S 2.2.
> > >         discussed in [I-D.ietf-intarea-frag-fragile].  If the PMTU
> cannot
> > >         be discovered, DOTS agents MUST assume a PMTU of 1280 bytes for
> > >         IPv6.  If IPv4 support on legacy or otherwise unusual networks
> is
> > >         a consideration and the PMTU is unknown, DOTS implementations
> MAY
> > >         rely on a PMTU of 576 bytes for IPv4 datagrams, as discussed in
> > >         [RFC0791] and [RFC1122].
> >
> > I'm having trouble reading this text. You say above "MUST assume" and
> "MAY
> > rely" here. Are you saying "send no more than 576" or "you can assume
> you can
> > send at least 576 and we're not saying anything about the upper bound"
>
> I have replaced the above lines with the text suggested by Suresh.
>
>
>
> OK.
>
>
>
>
> >
> >
> > S 2.2.
> > >         active DOTS client has not requested mitigation, in order to
> > >         control load.
> > >
> > >         Following mutual authentication, a signal channel MUST be
> > >         considered active until a DOTS agent explicitly ends the
> session.
> > >         During peace time, signal channel MUST be considered active
> > > until
> >
> > "peace time" is probably not the right word here. After all, my country
> might
> > be at peace but still subject to a DoS attack
>
> Added the following term to avoid confusion :
> Peacetime: In DDoS, ‘peacetime’ refers to the period during which the
> target network is not under DDoS attack.
>
>
>
> If you must, but I think this is might be considered a little in bad taste
> by people who are involved in actual wars.
>
>
>
> Okay, removed the word.
>
>
>
> Cheers,
>
> -Tiru
>
>
>
> -Ekr
>
>
>
>
> Cheers,
> -Tiru
>
> >
>
>