Re: [karp] Karp Agenda 2: KeyStore?

Gregory Lebovitz <gregory.ietf@gmail.com> Tue, 23 March 2010 05:13 UTC

Return-Path: <gregory.ietf@gmail.com>
X-Original-To: karp@core3.amsl.com
Delivered-To: karp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3A5F83A67F4 for <karp@core3.amsl.com>; Mon, 22 Mar 2010 22:13:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -96.948
X-Spam-Level:
X-Spam-Status: No, score=-96.948 tagged_above=-999 required=5 tests=[AWL=-0.620, DNS_FROM_OPENWHOIS=2.431, HTML_MESSAGE=0.001, SARE_LWSHORTT=1.24, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fF4ZMszjkLcv for <karp@core3.amsl.com>; Mon, 22 Mar 2010 22:13:03 -0700 (PDT)
Received: from mail-iw0-f197.google.com (mail-iw0-f197.google.com [209.85.223.197]) by core3.amsl.com (Postfix) with ESMTP id 5DF1A3A6905 for <karp@ietf.org>; Mon, 22 Mar 2010 22:13:01 -0700 (PDT)
Received: by iwn35 with SMTP id 35so3491972iwn.31 for <karp@ietf.org>; Mon, 22 Mar 2010 22:13:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=5QAjU11d4puVE2SBsgpi3Ji8C55ZAL0GinJuBLeGQL0=; b=VFtCYVElnaRmuXlTEHY/udMTd6atVKziPXbjQIIq43loaJNCs5duo/fkyLs7cpW37y 7ymGWGG+yycq++QqaI/bNkBeyHVZqQr4aaQTLaX3mJWWJLb3uhtfVHUxmTb67U6DDyU6 pSfn1LWoWrvEScflBUOcEhp0QIzqKg6A9AGGY=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=awjBzuEioJ0x2l3XVaQPTMtf9HUq2aT8JDMYK/yoMuygE8y9mkVao+HT7hWS4Tpfqc 1G8pOxISBLyd5yFfjdaWRTW7Gkpejv+6E1/+0rs/geYrUzFiyhr4UhehxcjGVjm7BIXY 0LedRLyGQzbdoyRHuUIvZPFA2khP6HjJTc0Yo=
MIME-Version: 1.0
Received: by 10.231.145.206 with SMTP id e14mr418331ibv.10.1269321196451; Mon, 22 Mar 2010 22:13:16 -0700 (PDT)
In-Reply-To: <C7CD7614.14B5F%tim.polk@nist.gov>
References: <77ead0ec1003221612h7e7f24c8u4f0195aa3fec1b45@mail.gmail.com> <C7CD7614.14B5F%tim.polk@nist.gov>
Date: Mon, 22 Mar 2010 22:13:16 -0700
Message-ID: <f1548841003222213j351ca7b7o289700a8114b2058@mail.gmail.com>
From: Gregory Lebovitz <gregory.ietf@gmail.com>
To: "Polk, William T." <william.polk@nist.gov>
Content-Type: multipart/alternative; boundary="0016e6476656053873048270df38"
Cc: Russ Housley <housley@vigilsec.com>, "karp@ietf.org" <karp@ietf.org>
Subject: Re: [karp] Karp Agenda 2: KeyStore?
X-BeenThere: karp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion list for key management for routing and transport protocols <karp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/karp>, <mailto:karp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/karp>
List-Post: <mailto:karp@ietf.org>
List-Help: <mailto:karp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/karp>, <mailto:karp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Mar 2010 05:13:06 -0000

inline...

On Mon, Mar 22, 2010 at 7:31 PM, Polk, William T. <william.polk@nist.gov>wrote:

> Hi Vishwas,
>
> Comments inline...
>
> On 3/22/10 4:12 PM, "Vishwas Manral" <vishwas.ietf@gmail.com> wrote:
>
> > Gregory/ Tim,
> >
> > I agree with Gregory regarding having the presentation at the KARP
> meeting.
> >
> > I scanned through the Polk draft. One comment is that the Long lived
> > Crypto Keys stillneed to be changed manually.
>
> Glad to have a reader!
>
> Actually, the Long Lived Keys can be established manually *or* through an
> Automated Key Management Protocol.  (See Figure 1 in
> draft-polk-saag-rtg-auth-keytable-02).  This is a key concept for our draft
> - the routing protocol need not know (or care) how long lived keys were
> established.  This allows incremental introduction of automated key
> management techniques seamlessly.
>

I agree with this design "feature", that the RPD (routing protocol daemon)
need not know or care how the keys were established.


>
> Removing keys from the document isn't covered, though.  Should it be added?
>

I think so. For purposes of quick response when a key has been compromised,
an admin is terminated, a business relationship terminates, etc.


> Expiration of entries is covered in draft-housley-saag-crypto-key-table-00,
> but perhaps we need to discuss removal for other circumstances.  (I'm
> thinking of severing a business relationship, or deciding a long lived key
> has been compromised before its expiration date.)  I suspect that would be
> a
> manual process...
>

Agreed that we need this. The process could be manual to start (given the
goal of incremental deployability), but I could envision an end state when a
simple execution command at the router's command line interface kicks-off a
fully automated process of generating, distributing and employing new keys.


>
> >
> > Another comment is Session Acceptance diagram has a Key Id while the
> > Session Initiation does not.
>
> In our model, a session initiator is not concerned which long-lived key
> they
> get, only that the key is shared with the right peer(s) and intended for
> use
> with the right protocol.  So, the initiator's request for a key does not
> contain a KeyID.
>

Might this leave us vulnerable to MitM run step-down attacks, i.e. to an old
key (assuming said key was not properly discarded in a timely fashion)?


>
> When a peer accepts a session, the initiator has already selected a
> long-lived key.  The KeyID is essential in this case, or the peer will not
> derive the right session key.
>
> >
> > Some things to think of are what needs to be done when both sides
> > initiate the connection at the same time.
>
> Won't different protocols handle this differently?  I could envision ending
> up with two parallel (but authenticated) sessions, or the protocol could
> attempt to resolve this into a single connection by selecting one peer as
> the "initiator" and discard the session key material from the aborted
> session.
>
> >                                           The document also does not
> > talk about how the short term keys are changed.
>
> The keytable does not force any key changes - it just lies there.
> Generation of short term keys is entirely under the routing protocol's
> control.
>

Could be so. Or it could be a function of a KMP, one that is keeping the key
life times and thus knowing when it's time to kick off the negotiation of a
new security association, then install it for use.


>
> First and foremost, a new session means a new short term key. That may be
> enough for some protocols.  For protocols with long-lived sessions, the
> routing protocol can incorporate protocol specific mechanisms for changing
> session keys during an existing session.
>

I think there needs to be both:  the Routing Protocol needs to be able to
change keys during an existing session, and some function needs to exist by
which to tell the routing protocol that it's time to do so, then the various
parameters needed for that new key usage need to be available to the Routing
Protocol. In the framework we have this covered by:
 - KeyStore - the place where the security association parameters go, so
that the Routing Protocol knows how/where to look for the info
 - The three API's, so that the KMP and the RoutingPRotocol can notify each
other that there is new security association material ready, or needed.
 - KMP

-Gregory


>
> If these protocol specific mechanisms are designed such that the new
> session
> keys are derived from different long lived keys, the peer initiating the
> transition requests new keys just as if it was initiating a new session.
> The other peer would behave as if it was accepting a new session...
>
> We could add some text here if you would like.  (I think a brief reference
> to tcp-ao's mechanism for changing keys during sessions is all we have
> now.)
>
> Thanks,
>
> Tim
> >
> > Thanks,
> > Vishwas
> >
> > On Mon, Mar 22, 2010 at 2:38 PM, Gregory Lebovitz
> > <gregory.ietf@gmail.com> wrote:
> >>
> >>
> >> On Mon, Mar 22, 2010 at 2:35 PM, Polk, William T. <
> william.polk@nist.gov>
> >> wrote:
> >>>
> >>> Gregory,
> >>>
> >>> There has really been no change to those documents since Hiroshima, so
> I
> >>> did not suggest a presentation.  (We simply havenĀ¹t received any
> suggestion
> >>> to change them.)  I do have karp on my schedule and will be in the
> room.
> >>
> >> I'll leave it to the chairs to decide. Since the last preso was a BoF,
> it
> >> may make sense to do it again, if only to push people to read and review
> and
> >> provide input.
> >>
> >>>
> >>> I think that maintaining them as separate documents is advisable, given
> >>> their simplicity...
> >>
> >> If there is applicability outside of karp-framework, then I agree. If
> the
> >> applicability is only w/in the karp-framework, then I'd suggest we suck
> it
> >> into the "KeyStore" section of that document. But I haven't thought too
> much
> >> about it until just now, sitting here with Bill Atwood, working on
> slides
> >> and open issues / open sections.
> >> Bill will have this as an open question on his slides and we can discuss
> in
> >> WG. WFY?
> >> Gregory
> >>
> >>>
> >>> Thanks,
> >>>
> >>> Tim
> >>>
> >>>
> >>> On 3/22/10 2:11 PM, "Gregory M. Lebovitz" <gregory.ietf@gmail.com>
> wrote:
> >>>
> >>> KARPies, Tim & Russ,
> >>> I notice that the current agenda for KARP does NOT include a
> presentation
> >>> by Tim/Russ on their documents that defines in more detail what
> >>> draft-ietf-karp-framework calls the KeyStore. I'm thinking that would
> be a
> >>> good thing to have presented again (it was presented at the BoF already
> >>> once), because we need to decide if these become WG documents, or how
> to
> >>> proceed them.
> >>>
> >>> Those documents are:
> >>> draft-housley-saag-crypto-key-table-01
> >>> draft-polk-saag-rtg-auth-keytable-02
> >>>
> >>> Another question is:  "Do these documents serve better as stand-alone,
> or
> >>> ought they be incorporated into the karp-framework document"
> >>>
> >>> Thoughts?
> >>>
> >>> Gregory.
> >>
> >>
> >>
> >> --
> >> ----
> >> IETF related email from
> >> Gregory M. Lebovitz
> >> Juniper Networks
> >>
> >> _______________________________________________
> >> karp mailing list
> >> karp@ietf.org
> >> https://www.ietf.org/mailman/listinfo/karp
> >>
> >>
> >
>
>


-- 
----
IETF related email from
Gregory M. Lebovitz
Juniper Networks