[Lsvr] lsoe security: tofu, hierarchy, ...?

Randy Bush <randy@psg.com> Sun, 31 March 2019 00:24 UTC

Return-Path: <randy@psg.com>
X-Original-To: lsvr@ietfa.amsl.com
Delivered-To: lsvr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F7481200A3 for <lsvr@ietfa.amsl.com>; Sat, 30 Mar 2019 17:24:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level:
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PCRBFkGw_myW for <lsvr@ietfa.amsl.com>; Sat, 30 Mar 2019 17:23:58 -0700 (PDT)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:8006::18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C67BA120041 for <lsvr@ietf.org>; Sat, 30 Mar 2019 17:23:58 -0700 (PDT)
Received: from localhost ([127.0.0.1] helo=ryuu.rg.net) by ran.psg.com with esmtp (Exim 4.90_1) (envelope-from <randy@psg.com>) id 1hAOGT-0002f4-Cs for lsvr@ietf.org; Sun, 31 Mar 2019 00:23:57 +0000
Date: Sat, 30 Mar 2019 17:23:57 -0700
Message-ID: <m2sgv3lwma.wl-randy@psg.com>
From: Randy Bush <randy@psg.com>
To: LSVR WG <lsvr@ietf.org>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/25.3 Mule/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsvr/s_i3TtSXYs42rGiUCwKtgeyooew>
Subject: [Lsvr] lsoe security: tofu, hierarchy, ...?
X-BeenThere: lsvr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Vector Routing <lsvr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsvr>, <mailto:lsvr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsvr/>
List-Post: <mailto:lsvr@ietf.org>
List-Help: <mailto:lsvr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsvr>, <mailto:lsvr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 31 Mar 2019 00:24:00 -0000

so it's time to get serious about lsoe security.

currently, the OPEN PDU contains a variable length Authentication Data
blob.

we want to sign all PDUs; though maybe not the KEEPALIVE.  as KEEPALIVEs
are frequent, we may want to keep them small and not have the crypto
overhead of validating them.  worth discussing.

i have repeatedly asked for the threat model behind folk's desire for
PDU security.  perhaps an illustration of two possible paths would help
clarify why i am undecided.

    Trust On First Use, AKA TOFU: the OPEN might have a key, symmetric
    or asymmetric, which is automaticaly trusted by the other party, and
    is used to sign all subsequent PDUs.  the security provided is that
    you know you are talking to the same party as the one with whom you
    OPENed.

    CA Hierarchy: the clos could have a CA which signs per-device
    certificates.  each device would have a (chain to the) root cert by
    which it could verify the public key in the OPEN and all PDU
    signatures.  this provides a stronger trust model than TOFU, but is
    more complex in that one has to maintain a CA hierarchy, have good
    key signing and distribution mechanisms, anticipate key rolls, etc.

surely there are other models.  i am just trying to illustrate.

i have this fantasy about finessing the draft in such a way that either
could be used.  but fear that the result would be underspecified to the
extent that security reviewers would not be happy.

feedback time!

randy