Comments on draft-ietf-ipdvb-sec-req-06

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Sat, 17 May 2008 07:47 UTC

Return-Path: <owner-ipdvb@erg.abdn.ac.uk>
X-Original-To: ietfarch-ipdvb-archive@core3.amsl.com
Delivered-To: ietfarch-ipdvb-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 93AAD3A682D for <ietfarch-ipdvb-archive@core3.amsl.com>; Sat, 17 May 2008 00:47:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jD8fecsx00OJ for <ietfarch-ipdvb-archive@core3.amsl.com>; Sat, 17 May 2008 00:47:40 -0700 (PDT)
Received: from erg.abdn.ac.uk (dee.erg.abdn.ac.uk [139.133.204.82]) by core3.amsl.com (Postfix) with ESMTP id 0E39128C355 for <ipdvb-archive@ietf.org>; Sat, 17 May 2008 00:47:39 -0700 (PDT)
Received: from dee.erg.abdn.ac.uk (localhost [IPv6:::1]) by erg.abdn.ac.uk (8.13.4/8.13.4) with ESMTP id m4H6snQ9005035 for <ipdvb-subscribed-users@dee.erg.abdn.ac.uk>; Sat, 17 May 2008 07:54:49 +0100 (BST)
Received: (from majordomo.lists@localhost) by dee.erg.abdn.ac.uk (8.13.4/8.12.2/Submit) id m4H6snq6005034 for ipdvb-subscribed-users; Sat, 17 May 2008 07:54:49 +0100 (BST)
X-Authentication-Warning: dee.erg.abdn.ac.uk: majordomo.lists set sender to owner-ipdvb@erg.abdn.ac.uk using -f
Received: from Gorry-Fairhursts-Laptop.local (fgrpf.plus.com [212.159.18.54]) (authenticated bits=0) by erg.abdn.ac.uk (8.13.4/8.13.4) with ESMTP id m4H6sM9e004992 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Sat, 17 May 2008 07:54:22 +0100 (BST)
Message-ID: <482E811E.1040502@erg.abdn.ac.uk>
Date: Sat, 17 May 2008 07:54:22 +0100
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Organization: The University of Aberdeen is a charity registered in Scotland, No SC013683.
User-Agent: Thunderbird 2.0.0.14 (Macintosh/20080421)
MIME-Version: 1.0
To: ipdvb@erg.abdn.ac.uk
CC: S.Iyengar@surrey.ac.uk, p.pillai@Bradford.ac.uk, "H.Cruickshank@surrey.ac.uk" <H.Cruickshank@surrey.ac.uk>
Subject: Comments on draft-ietf-ipdvb-sec-req-06
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-ERG-MailScanner: Found to be clean, Found to be clean
Sender: owner-ipdvb@erg.abdn.ac.uk
Precedence: bulk
Reply-To: ipdvb@erg.abdn.ac.uk
X-ERG-MailScanner-From: owner-ipdvb@erg.abdn.ac.uk

Thank you for preparing a response to the SECDIR review.

I've now had time to read the new revision and consider the review 
comments. I think there are still some areas where the language could be 
further improved - especially to clarify the requirements. My comments 
follow. Some of these are minor editorial (which I shall forward 
separately), some detailed comments may require proposing new text. Most 
of these comments stem from the need to clarify the requirements.

I suggest that you quickly prepare a new revision that addresses these 
concerns and any others raised by the group, and we can then put the 
revised document to a short WGLC before sending to the IESG.

Best wishes,

Gorry

----


Overall comments:

Page 8:
* /Examining the threat cases in section 3.3, /
- This section makes requirements. It looks like a summary, if it is a 
summary it probably should not use keywords, since these requirements 
have already been defined earlier?

- How best should these paragraphs be best formatted?
---
Page 11:
* I wonder whether the May Requirements for 2,3,4,5 have really been
captured correctly? I can see what you are saying, but at the same time,
I think you would agree that the framework MUST or SHOULD support these
functions, but their use is OPTIONAL, depending on the profile. Can you
think of a better way to express this?
---
Page 13:
* The three cases on page 13 appear also to introduce RFC 2119
requirements. I find this confusing (as did the SECDIR reviewer). I can
see what you are trying to do here (and this seems to be heading towards
two (or more?) profiles, but it does not quite work for me, yet.
----
=======

---
page 8:
   /could still have to employ approved
    cryptographic equipment at the network layer or above, unless a
    manufacturer of ULE Link Security equipment obtains governmental
    approval for their implementation./
- True in a way, but I think this could be clearer...
- Is this any better:
   /will need to employ approved
    cryptographic equipment (e.g. at the network layer). An
implementation of ULE Link Security equipment could also be certified
for use by specific user communities./
---
In section 3.1, page 8:
/ where the two end-points are not under central control /
- Are these IP end-points or ULE end-points (i.e. Encapsulator and
Receiver)?
- I saw this discussion on the mailing list, but the final text seems
to need some re-wording.
---
Page 8:
- I can not recall the history of:
  / In contrast to the above, if a ULE Stream is used to directly
    join networks which are considered physically secure, for example
    branch offices to a central office, ULE link Security could be
    the sole provider of confidentiality and integrity. In this
    scenario, governmental users could still have to employ approved
    cryptographic equipment at the network layer or above, unless a
    manufacturer of ULE Link Security equipment obtains governmental
    approval for their implementation./
- /join/ seems the wrong word, could it be "link"
- /which/that/
- I also find this last case rather confusing, could we perhaps simplify
this to:
/When a ULE Stream connects two offices to a central office, ULE link
Security could be the sole provider of confidentiality and integrity. /
- Even in this case, I am not sure why we need to say this. I have some
doubts whether ULE Link-Layer security really satisfies this need, and
would probably prefer to recommend additional higher layer methods.
---
Page 10:
/ Req 1. Data confidentiality MUST be considered in order to/
- Do you need to consider, or provide? (I think the latter)
- I suggest:
/ Req 1. Data confidentiality MUST be provided by a link that supports
ULE Stream Security to/
---
Page 11:
/   Req 5. Layer L2 ULE Source and Receiver authentication MAY /
- this worries me.
- Do you wish to justify this choice?
- I suspect that key authentication is a SHOULD when bidirectional 
communication  is provided, although at the link layer authentication of 
individual packets is not a strong requirement because there is a single 
ULE Encapsulator feeding each ULE stream.
---
/   Other general requirements are:/
- I guess you mean by this that these are required for all threat cases
for link-layer security? - Please clarify.
---
/GReq (a) ULE key management functions SHALL be decoupled/
- Agreed can you chnage /SHALL/MUST/
---
/GReq (b,c)/c
- Seems good
---
/GReq (d,e)/
- These properties do not seem to be requirements at the link layer, but
more system-wide requirements. I am not sure what value they have in
this document.
---
/GReq (e)/
- I am not sure how you propose to satisfy this requirement?
- It seems quite general, and something that needs consideration at the
system level, do we need to explicitly call this out in the document?
---
/GReq (f) The security system MUST be compatible
  networking functions such as NAT Network Address Translation.../
- Not sure I would agree, and anyway how can this be a MUST for
/TCP acceleration/ when this defines a set of various methods.?
- My suggestion would be to eliminate this requirement and if you really
want to, then make it a comment, rather than a requirement. I'd suggest
that NAT and PEP interactions are problem-spaces in themselves, and it
may be best to discount these from this document.
---
/GReq (h)/
- The use of MAY here is not dictating a requirement, you need to
rephrase this. I am also not sure what this requirement requires, is
this saying we need to do this in some case, or may do something, I am
not sure.
---

Table 1 would be more valuable if it directly follows the above.
- please change /Dos/ to /DoS/ or /DOS/
- There are also some slight formatting problems that I tried to correct:

       Please view in a fixed-width font such as Monaco or Courier.


                                 Mitigation of Threat
                  +-------+-------+-------+-------+-------+------+
                  |Data   | Data  |Source |Data   |Intru  |Iden  |
                  |Privacy| fresh |Authent|Integ  |sion   |tity  |
                  |       | ness  |ication|rity   |Dete   |Prote |
                  |       |       |       |       |ction  |ction |
        Attack    |       |       |       |       |       |      |
   +--------------+-------+-------+-------+-------+-------+------+
   |Monitoring    |   X   |   -   |   -   |   -   |   -   |  X   |
   +--------------+-------+-------+-------+-------+-------+------+
   |Masquerading  |   X   |   -   |   X   |   X   |   -   |  X   |
   +--------------+-------+-------+-------+-------+-------+------+
   |Replay Attacks|   -   |   X   |   X   |   X   |   X   |  -   |
   +--------------+-------+-------+-------+-------+-------+------+
   |Dos Attacks   |   -   |   X   |   X   |   X   |   X   |  -   |
   +--------------+-------+-------+-------+-------+-------+------+
   |Modification  |   -   |   -   |   X   |   X   |   X   |  -   |
   |of Messages   |       |       |       |       |       |      |
   +--------------+-------+-------+-------+-------+-------+------+

- I also wonder whether this would be improved by linking two the two
profiles - i.e. say which Threats Attacks are considered in each profile.

                    p               Mitigation of Threat
                    r +-------+-------+-------+-------+-------+------+
                    o |Data   | Data  |Source |Data   |Intru  |Iden  |
                    f |Privacy| fresh |Authent|Integ  |sion   |tity  |
                    i |       | ness  |ication|rity   |Dete   |Prote |
                    l |       |       |       |       |ction  |ction |
        Attack      e |       |       |       |       |       |      |
   +--------------+---+-------+-------+-------+-------+-------+------+
   |Monitoring    | 1 |   X   |   -   |   -   |   -   |   -   |  X   |
   +--------------+---+-------+-------+-------+-------+-------+------+
   |Masquerading  | 1 |   X   |   -   |   X   |   X   |   -   |  X   |
   +--------------+---+-------+-------+-------+-------+-------+------+
   |Replay Attacks|1,2|   -   |   X   |   X   |   X   |   X   |  -   |
   +--------------+---+-------+-------+-------+-------+-------+------+
   |Dos Attacks   |1,2|   -   |   X   |   X   |   X   |   X   |  -   |
   +--------------+---+-------+-------+-------+-------+-------+------+
   |Modification  |1,2|   -   |   -   |   X   |   X   |   X   |  -   |
   |of Messages   |   |       |       |       |       |       |      |
   +--------------+---+-------+-------+-------+-------+-------+------+

Would this work? - or not?
- Are these correct assignments to the two profiles?
- Are there more than 2 profiles?
- Does identity hiding also counter masquerading?

---
section 7:
/optional requirement/
- The SECDIR review commented on this.
- I think the requirement is that framework must support the optional
ability to provide...
---
   /This is optional
    because of the associated overheads for  the extra features and
    they are only required for specific service cases./
- need to be clear
   /This set of features are optional to reduce encapsulation
    overhead when these features are not required./

-End-



-- 
Dr Gorry Fairhurst, School of Engineering.
The University of Aberdeen is a charity registered in
Scotland No SC013683.