Re: secdir review of draft-ietf-csi-send-cert-03

Suresh Krishnan <suresh.krishnan@ericsson.com> Mon, 31 May 2010 05:37 UTC

Return-Path: <suresh.krishnan@ericsson.com>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C52E93A69C2; Sun, 30 May 2010 22:37:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[AWL=-2.000, BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e4rZx4F27q7Z; Sun, 30 May 2010 22:37:44 -0700 (PDT)
Received: from imr3.ericy.com (imr3.ericy.com [198.24.6.13]) by core3.amsl.com (Postfix) with ESMTP id 1845C3A69C0; Sun, 30 May 2010 22:37:43 -0700 (PDT)
Received: from eusaamw0707.eamcs.ericsson.se ([147.117.20.32]) by imr3.ericy.com (8.13.8/8.13.8) with ESMTP id o4V5bRSm000699 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 31 May 2010 00:37:27 -0500
Received: from [142.133.10.113] (147.117.20.212) by eusaamw0707.eamcs.ericsson.se (147.117.20.92) with Microsoft SMTP Server id 8.2.234.1; Mon, 31 May 2010 01:37:26 -0400
Message-ID: <4C034A8C.9020205@ericsson.com>
Date: Mon, 31 May 2010 01:35:08 -0400
From: Suresh Krishnan <suresh.krishnan@ericsson.com>
User-Agent: Thunderbird 2.0.0.24 (X11/20100411)
MIME-Version: 1.0
To: Richard Barnes <rbarnes@bbn.com>
Subject: Re: secdir review of draft-ietf-csi-send-cert-03
References: <00CEF527-9674-47CF-BC3E-66A9FC7289F7@bbn.com>
In-Reply-To: <00CEF527-9674-47CF-BC3E-66A9FC7289F7@bbn.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: The IETF <ietf@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "draft-ietf-csi-send-cert@tools.ietf.org" <draft-ietf-csi-send-cert@tools.ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 May 2010 05:37:46 -0000

Hi Richard,
   Thanks a lot for your extensive review. Please find responses inline.

Richard Barnes wrote:
> I have reviewed this document as part of the security directorate's  
> ongoing effort to review all IETF documents being processed by the  
> IESG.  These comments were written primarily for the benefit of the  
> security area directors.  Document editors and WG chairs should treat  
> these comments just like any other last call comments.
> 
> This document defines a certificate profile for use in the Secure  
> Neighbor Discovery protocol for IPv6.  Starting from the RPKI cert  
> profile, it adds some refinements for SEND, e.g., EKUs that authorize  
> the subject to act in certain roles within SEND (router, proxy, host).
> 
> Overall, the document is reasonably well-written, but could benefit  
> from more precision in its use of terminology.  There are a few points  
> (noted below) where certificate processing rules are unclear.  With  
> regard to the security considerations in particular, I would prefer if  
> they stated the risks slightly more directly (text is suggested  
> below), but in general, the authors address the major security concerns.
> 
> Detailed comments follow.
> 
> --Richard
> 
> 
> Sec 2 Para 1
> Suggest changing "authority over an" to "authorization to advertise an".

OK.

> 
> Sec 2 Para 2
> Suggest rewording to avoid referring to SIDR WG (which is temporary).   
> Suggested text: "The Resource Public Key Infrastructure (RPKI) is the  
> global PKI that attests to allocation of IP address space."  Also,  
> instead of "SIDR certificate profile", use "RPKI certificate profile".

Sounds good.

> 
> Sec 2 Para 3, General
> I'm confused by the several instances of the phrase "address owner" in  
> the document (the phrase is not used in RFC 3971).  Do you mean "host"?

Since RFC3971 did not expect hosts to use certificates to defend their 
addresses (hosts traditionally use CGAs), this role was not defined. I 
proposed the following text to explain what the address owner role means

The inclusion of the owner authorization value indicates that the
certificate has been issued for allowing the node to use the
address(es) or prefix(es) that are mentioned using the X.509
extensions for IP addresses and AS identifiers [RFC3779]. For an address
in such certificate the host can assign the address, send/receive
traffic from this address, and can respond to NSes about that address.
For a prefix in such certificate the node can perform all the above
mentioned operations for any address in that prefix. Also, when a prefix
is present in the certificate with the owner authorization value, the
node cannot advertise the prefix in an RA.

This will replace paragraph 6 of section 7. Does this work?

> 
> Sec 3 Para "End Entity"
> This definition is incorrect.  Refer to RFC 4949.

Can we use

"End Entity - an entity that is not a CA"

> 
> Sec 4 Para 1
> The RPKI profile should be applied in *addition* to the RFC 3971  
> profile, right?  Please clarify.

Not really. The csi wg decided to base the new SEND certificate profile 
solely on the RPKI profile.

> 
> Sec 4 Para 2
> Why can there only be one RFC 3779 extensions?  It doesn't seem like  
> there's a risk in including IPv4 space (e.g., for a dual-stack router  
> that was vouching for IPv4 space in some other application?), or  
> multiple extensions for IPv6 space.

I am not sure where this restriction is specified. Can you clarify?

> 
> Sec 5
> This section should note that another deployment model (arguably the  
> most likely) is a combination of these two, in which most resources  
> are certified under the global RPKI, while some (e.g., ULAs) are  
> certified under local TAs.

Sounds good. Will add the following text about a hybrid deployment model 
at the end of section 5.

"  These two models are not mutually exclusive.  It is entirely possible
    to have a hybrid model that incorporates features from both these
    models.  In one such hybrid deployment model most IP address
    resources (e.g. global unicast addresses) would be certified under
    the global RPKI, while some others (e.g., ULAs) are certified under
    local TAs."

> 
> Sec 6 Para 4
> The requirement for RFC 3779 extension seems to contradict the use of  
> ETAs as Trust Anchor Material, i.e., the last sentence of the first  
> paragraph in this section.

Good catch. I am not sure how to resolve this. One way would be to 
specify that the ETA EE certificates are exempt from requiring the 
RFC3779 extensions. Do you have any suggestions?

> 
> Sec 7 Para "The inclusion of ..." et seq.
> It would be helpful for the document to specify how prefix matching  
> should be done when validating these extensions.  Which of the  
> following should the RP use?
> -- Exact matching
> -- Subset matching (RA within cert)
> -- The weird subset/intersection algorithm that RFC 3971 defines
> What prefix should the RP be matching against from SEND, per EKU?   
> E.g., for id-kp-sendRouter, the RFC 3779 extension in the cert should  
> match against any RAs the router emits.  It may be useful to refer to  
> the ROA validation document [draft-ietf-sidr-roa-validation].

My gut feel is subset matching, but we need to make sure this will work 
with all scenarios. We will come back with text proposals for this.

> 
> Sec 7 Para "Certificate-using applications..."
> Suggest changing "Certificate-using applications" to "Relying Parties".

OK.

> 
> Sec 8
> This section correctly identifies the main risk with these extensions  
> (namely, issuance of certs with incorrect roles assigned), but it  
> would be helpful to clarify the application-level impact of these bad  
> issuances.  Suggested text:
> "                                                              > "

I will include this text in the security considerations section.

Thanks
Suresh