Re: comments on draft-houseley-aaa-key-mgmt-07.txt

Lakshminath Dondeti <ldondeti@qualcomm.com> Tue, 20 February 2007 03:36 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HJLng-0002fE-Fs; Mon, 19 Feb 2007 22:36:20 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HJLnf-0002f7-6K for ietf@ietf.org; Mon, 19 Feb 2007 22:36:19 -0500
Received: from ithilien.qualcomm.com ([129.46.51.59]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HJLnd-00041K-Lr for ietf@ietf.org; Mon, 19 Feb 2007 22:36:19 -0500
Received: from totoro.qualcomm.com (totoro.qualcomm.com [129.46.61.158]) by ithilien.qualcomm.com (8.13.6/8.12.5/1.0) with ESMTP id l1K3aGTq020057 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Mon, 19 Feb 2007 19:36:16 -0800
Received: from [10.50.70.25] (qconnect-10-50-70-25.qualcomm.com [10.50.70.25]) by totoro.qualcomm.com (8.13.6/8.13.6/1.0) with ESMTP id l1K3aEuO018625 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 19 Feb 2007 19:36:15 -0800 (PST)
Message-ID: <45DA6C65.3070701@qualcomm.com>
Date: Mon, 19 Feb 2007 19:35:01 -0800
From: Lakshminath Dondeti <ldondeti@qualcomm.com>
User-Agent: Thunderbird 2.0b2 (Windows/20070116)
MIME-Version: 1.0
To: Sam Hartman <hartmans-ietf@mit.edu>
References: <41825.12.108.168.179.1171660575.squirrel@www.trepanning.net> <tslwt2hiybm.fsf@cz.mit.edu> <C24CB51D5AA800449982D9BCB90325134F192B@NAEX13.na.qualcomm.com> <tslfy947pol.fsf@cz.mit.edu> <45D73CEB.2000701@qualcomm.com> <C24CB51D5AA800449982D9BCB90325134F192D@NAEX13.na.qualcomm.com> <34728.69.12.173.8.1171826655.squirrel@www.trepanning.net> <45D8C5BE.5070008@qualcomm.com> <tslbqjqp6jq.fsf@cz.mit.edu>
In-Reply-To: <tslbqjqp6jq.fsf@cz.mit.edu>
Content-Type: text/plain; charset="ISO-8859-15"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 6ffdee8af20de249c24731d8414917d3
Cc: bernarda@microsoft.com, Dan Harkins <dharkins@lounge.org>, ietf@ietf.org
Subject: Re: comments on draft-houseley-aaa-key-mgmt-07.txt
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Errors-To: ietf-bounces@ietf.org

Sam,

Please read the thread again and make a convincing case as to why my 
message -- and please consider the entire message -- is disgusting, and 
I shall apologize.

Some notes inline:

Sam Hartman wrote:
>>>>>> "Lakshminath" == Lakshminath Dondeti <ldondeti@qualcomm.com> writes:
> 
>     Lakshminath> Dan, We are discussing the case of the authenticator
>     Lakshminath> providing a different identity to the peer and the
>     Lakshminath> server here.  Sam raised that issue.
> 
> This is probably the last message you'll hear from me for the next
> week.  I'm supposed to be on vacation but I made the mistake of
> reading my ietf mail.
> 
> However, I was so disgusted by your message that I had to reply.  I
> will not make the mistake of reading ietf mail until I return again.
> 
> We're discussing Dan's last call comment.  There's no way Dan can be
> wrong about what problem we're discussing.H We may not understand him,
> but it is completely inappropriate to correct him and tell him that
> he's bringing up the wrong problem.

First, a fact to consider: Dan's last call comment never really made it 
to my mailbox and it is not available in the archive (perhaps he was/is 
not subscribed to the IETF list; I have 1 message from him in my mailbox 
that was cc'ed to the IETF list, but that is not in the archive either).

This thread started with your message calling the list's attention to 
Dan's message; unfortunately, Dan's message was not included in your 
message either.  Vidya was kind enough to summarize the problem for the 
list based on the long discussion on this topic in the HOKEY list.

You responded to Vidya's message saying that "the model you proposed 
didn't fit what Dan was talking about very well."  You went on to 
summarize the problem as "Dan wants to focus on problems
resulting from the fact that the name of the authenticator used
between the peer and the authenticator may be different than the name
of the authenticator used between the authenticator and the AAA
server."

Now I haven't seen Dan's original message and so I don't know whether 
you are capturing the entirety of Dan's message.  In my response, I was 
in fact bringing in Dan's concern (as I understood it on the HOKEY list) 
back into the discussion.

I responded to you and noted that there are two problems, 1) the entity 
in the middle giving a different identity to the peer and the server 
(which may be solved by including the identity in the key derivation; 
there are other solutions) and 2) the entity in the middle giving the 
same wrong identity to both sides.

I went on to say "Let me put it this way, both issues are considered 
problems to address/solve in this case."

By the way, I think #2 above briefly and correctly summarizes what Dan 
is describing.  Below is the attack in his own words.

Here is Dan's summary of the problem: "No, there is a problem even if 
the identity is part of the key
derivation. The reason is that this is a _symmetric_ key that is used
by the client to gain network access. If it is possible for some
entity to lie about its identity to obtain one of these keys, then that
key can be used to impersonate the client to the authenticator whose
identity was lied about and/or attack a connection the client makes to
the authenticator whose identity was lied about.

   Any security properties you're trying to assign to this key have been
thrown out the window.

   Dan."

My message that you were so "disgusted" by was in response to Dan's 
email above.

I was attempting to say to Dan that the reference to including the 
identity as part of key derivation came about as a response to your 
summary of the problem.  I went on to talk about the problem he has 
described in the HOKEY list as well in this thread in the second 
paragraph and concluded "Please provide your thoughts on whether her 
proposed text covers the issue adequately.  Otherwise, please provide 
text. "

I did not correct him, I was merely saying the focus of the thread at 
that moment was on a slightly different problem (and that was from your 
summary of the issue, btw) than the one he has described.

I did not "tell him that he's bringing up the wrong problem."  What gave 
you that impression?

So where do I think we are?  At the risk of repeating myself, there is 
the problem of an entity in the middle giving different identities to 
the peer and the server and there is the problem of the entity in the 
middle giving the wrong identity to the server and the peer (giving the 
wrong identity to the server alone may also be sufficient in some cases, 
but requiring that the peer trigger the key delivery mitigates that 
aspect of it).

This is my opinion; last I checked I can express my opinion on any of 
the IETF lists, just as anyone else.  I am also quite fallible.

I look forward to other summaries of where we are in the discussion and 
what needs to be added to draft-housley-aaa-key-mgmt.  I may have overly 
simplified something or understood the threat incorrectly; please point 
out what I got wrong.

Finally, if someone cares to explain in what way my messages (I sent all 
of two in this thread) are sidetracking (I guess that's what Sam is 
saying below) or otherwise disrupting the discussion, I am willing to learn.

thanks,
Lakshminath

> 
> Please stop trying to refocus the discussion.  Bringing up a model to
> think about an issue can be a useful tool, but it can also be a tool
> used to add obscurity.  In this instance, I think you and Vidya may be
> having the ladder effect.
> 
> --Sam
> 
> 

_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf