[Dots] Benjamin Kaduk's Yes on draft-ietf-dots-signal-channel-31: (with COMMENT)
Benjamin Kaduk via Datatracker <noreply@ietf.org> Tue, 02 April 2019 21:59 UTC
Return-Path: <noreply@ietf.org>
X-Original-To: dots@ietf.org
Delivered-To: dots@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 461DE120333; Tue, 2 Apr 2019 14:59:54 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Benjamin Kaduk via Datatracker <noreply@ietf.org>
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-dots-signal-channel@ietf.org, Liang Xia <frank.xialiang@huawei.com>, dots-chairs@ietf.org, frank.xialiang@huawei.com, dots@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.94.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Benjamin Kaduk <kaduk@mit.edu>
Message-ID: <155424239427.6306.4549019967046760351.idtracker@ietfa.amsl.com>
Date: Tue, 02 Apr 2019 14:59:54 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/thc3CgorfP90o_83c59Ije_0o7c>
Subject: [Dots] Benjamin Kaduk's Yes on draft-ietf-dots-signal-channel-31: (with COMMENT)
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Apr 2019 21:59:55 -0000
Benjamin Kaduk has entered the following ballot position for draft-ietf-dots-signal-channel-31: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about IESG DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-dots-signal-channel/ ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- I am balloting YES but noticed a few things in the -31 that can get addressed with the rest of the IESG comments. Section 4.4.1 Implementations SHOULD set 'cuid' to the output of a cryptographic [...] [RFC6234]. The output of the cryptographic hash algorithm is truncated to 16 bytes; truncation is done by stripping off the final 16 bytes. The truncated output is base64url encoded. [...] If a DOTS client has to change its 'cuid' for some reason, it MUST NOT do so when mitigations are still active for the old 'cuid'. The 'cuid' SHOULD be 22 characters to avoid DOTS signal message fragmentation over UDP. [...] We need to cite RFC 4648, Section 5, for base64url. Also, getting a 22-character base64url-encoded cuid requires stripping the trailing '=' from the encoding, and we should explicitly say to do that. A similar attack can be achieved by a compromised DOTS client which can sniff the TLS 1.2 handshake, use the client certificate to identify the 'cuid' used by another DOTS client. This attack is not possible if algorithms such as [RFC4122] are used to generate the 'cuid'. [...] I think the key part of RFC4122 cuid generation (w.r.t. preventing sniffing) is that it's non-deterministic (and thus non-guessable), so we should say something like "because such UUIDs are not a deterministic function of the client certificate". Figure 11 needs to show the response that indicates a conflicting cuid that triggers the second request. Section 10 When FQDNs are used as targets, the DOTS server MUST rely upon DNS privacy enabling protocols (e.g., DNS over TLS [RFC7858], DoH [RFC8484]) to prevent eavesdroppers from possibly identifying the target resources protected by the DDoS mitigation service and means to ensure the target FQDN resolution is authentic (e.g., DNSSEC [RFC4034]). nits: "DNS over TLS or DoH" ("or" instead of comma, but keep the references as-is); comma before "and means to ensure", since the DOTS server has to do both of those (as opposed to the DOTS server using DoT/DoH which provides both eavesdropping protection and data authenticity, which is what the current text says).
- [Dots] Benjamin Kaduk's Yes on draft-ietf-dots-si… Benjamin Kaduk via Datatracker
- Re: [Dots] Benjamin Kaduk's Yes on draft-ietf-dot… mohamed.boucadair