Re: [manet] draft-perkins-manet-aodv-e2esec-00

Anders Nilsson Plymoth <lanilsson@gmail.com> Sun, 06 March 2016 00:16 UTC

Return-Path: <lanilsson@gmail.com>
X-Original-To: manet@ietfa.amsl.com
Delivered-To: manet@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3B4B1A1B6A for <manet@ietfa.amsl.com>; Sat, 5 Mar 2016 16:16:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.999
X-Spam-Level:
X-Spam-Status: No, score=-0.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YQ2AtroVXXvC for <manet@ietfa.amsl.com>; Sat, 5 Mar 2016 16:16:53 -0800 (PST)
Received: from mail-io0-x231.google.com (mail-io0-x231.google.com [IPv6:2607:f8b0:4001:c06::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFE1E1A1B69 for <manet@ietf.org>; Sat, 5 Mar 2016 16:16:52 -0800 (PST)
Received: by mail-io0-x231.google.com with SMTP id m184so98410213iof.1 for <manet@ietf.org>; Sat, 05 Mar 2016 16:16:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=z6x4H3fEPamnH0xKUJQ9rL9B5vcHWwEmhL7LnTiwVVI=; b=lUyP8nZzAufBCOWs6jo5hS8uIF44FCRNJCKySODRk8NcNc9N8I/4tlbI2nkPfWdidN P2WkvifrYePyDqdIGYsgLFI0c6CurpP2pLeo1n8hCkc5dkkYtpLpT4pR++FDl+gBhXqM EyfipFsmN21ZqpT0/7BOcv96Q1INzN88cJREu9F3UnIjbTpRYMbaM3oEq5WmsUn28eY9 Ti+MfLoqZ7xfYVcUzASS5/BH6ZjpUdi6sYQqd2ci4odQ1nfTGbe0FKbxp6OAiIPidOTZ 1zwOtKGSMDZXOrInANX6rNhyAJ9eptmgPahMikqthNnPCOM88ilxM4PqJuQTKBClDmH9 wstg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=z6x4H3fEPamnH0xKUJQ9rL9B5vcHWwEmhL7LnTiwVVI=; b=cxD1A0TKH/CjDqBF2Xxxf5zcQdvrR870+hQd3zFH69zFL9gV95LZ7Soae6YVHU4Cgx jtAzp8ju1bHcnfJF4cjRwL0vhlb2xfPzTmz9AsobVWGfon1BZSCr15UUn3mDFD19UfWI uCduXy6VYCXk/2KABp2ZOebmDu991FkB10Zn5lWnIVYfq4opYlH6QfD0oZgxym6Li6Zt Pe8rDj/fND1SJobi0zwNAPaz0FOoRm2iJqAGmyWdDu2aIAWlwfVon7RMiaoeKx1gP9U7 aUFwKlmm8jf42IEfCZuS4n8OwY/kL+WBbrSDagE5GAluolO3eYhbV7tYveEF1mtLZ1z3 xA+g==
X-Gm-Message-State: AD7BkJKCsXvsxllhlwgut4L+T0l0HUwDxCZF6ZkAsMRDtMR/I7NMnODvAWwuwgcqPhjFk8cCMXgU9Gk1YOyJfw==
X-Received: by 10.107.26.203 with SMTP id a194mr17644571ioa.115.1457223412346; Sat, 05 Mar 2016 16:16:52 -0800 (PST)
MIME-Version: 1.0
Received: by 10.79.128.210 with HTTP; Sat, 5 Mar 2016 16:16:32 -0800 (PST)
In-Reply-To: <3E84E2D1-2CF7-4F2B-80AD-98D1E37594E6@gmail.com>
References: <56D8B980.7010705@earthlink.net> <CAL95ndLYjvjs25T0siVMqHrWmw5B0k6H2ntjhMZDKMREU9Fo5g@mail.gmail.com> <3E84E2D1-2CF7-4F2B-80AD-98D1E37594E6@gmail.com>
From: Anders Nilsson Plymoth <lanilsson@gmail.com>
Date: Sun, 06 Mar 2016 01:16:32 +0100
Message-ID: <CAL95ndJB-Zt8ipHB8dNFTmnNguxr_f6G9Du9tsL=bzLQ_1otgg@mail.gmail.com>
To: Christopher Dearlove <christopher.dearlove@gmail.com>
Content-Type: multipart/alternative; boundary="001a113fd448d9f8e8052d5643dd"
Archived-At: <http://mailarchive.ietf.org/arch/msg/manet/rna00h7bcJkuJ6h6XPyL98mlGS8>
Cc: Charlie Perkins <charles.perkins@earthlink.net>, Mobile Ad Hoc Networks mailing list <manet@ietf.org>
Subject: Re: [manet] draft-perkins-manet-aodv-e2esec-00
X-BeenThere: manet@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Mobile Ad-hoc Networks <manet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/manet>, <mailto:manet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/manet/>
List-Post: <mailto:manet@ietf.org>
List-Help: <mailto:manet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Mar 2016 00:16:56 -0000

Hi Christopher,

My point wasn't that a signature based approach should be the only
solution, but that I think that signatures are preferable over HMAC based
E2E authentication approaches. My point was also that I would like to see a
tighter integration of the methods in RFC 7182 into the AODVv2 draft
describing the protocol operation rather than just as security
considerations. Maybe this is deemed not necessary, but I find that when
using the current draft in combination with RFC 7182, it is hard to make an
implementation that would be inter-operable. From my reading of RFC 7182
signatures should be supported, but is unclear how. I also see
authentication as desirable which was also indicated by Charlie.

Even so, I regard a signature based approach as highly desirable,
draft-ietf-manet-ibs is one example, but I don't see the big issue with
certificates. Each node would need a certificate before joining the
network. This is similar to the keys in draft-ietf-manet-ibs. The node
would also need to have the certificate for the destination node in order
to setup the route. How would have the node have this certificate? How
would the node know the IP address of the destination? If a node knows the
IP address of a destination and would like to exchange encrypted data, it
would also have the certificate. How about authenticating routing messages?
Certificates of neighboring nodes can easily be exchanged by a local
protocol, e.g. NHDP. I have manet type network running with this approach
and it works well. It also enables TLS/DTLS when desirable.
Another approach as taken by SAODV was to include public keys, signatures
and hashes into routing messages.

And to quote you, I am saying not this is the one and only solution, but
one that I think shouldn't be excluded.

Thanks,
Anders




On Sat, Mar 5, 2016 at 1:36 PM, Christopher Dearlove <
christopher.dearlove@gmail.com> wrote:

> Requiring a signature based approach is I think quite undesirable. That
> puts a serious key management load on what is an ad hoc network, some of
> which are intended to be lightweight.
>
> Where are the certificates coming from? Note that you can't simply
> download them, until the routing protocol has done its job, you don't have
> any way to do that. Pre-loaded? But that's getting really into scalability
> issues if you have to preload certificates for anyone who might be in the
> network. I think it's actually particularly bad for an on-demand protocol.
>
> It also precludes what may be better solutions in many cases, for example
> draft-ietf-manet-ibs. (How do you get those keys? Also an issue, but a
> scalable one, you only need your own information, so preloading for example
> may be practical.)
>
> Of course I'm not saying this might not be a solution, just not the one
> and only solution, and not to exclude all others. If you do have to put key
> management in (and it's hard to talk the SEC ADs out of that, but it can be
> done) add many more months to your time to finish.
>
> This also doesn't address the key issue of the end to end or hop by hop
> architecture. I have some comments to make on that - comments that
> recognise there's a real issue that there is no ideal solution to - but I
> want to formulate them more clearly.
>
> --
> Christopher Dearlove
> christopher.dearlove@gmail.com
>
> On 5 Mar 2016, at 11:59, Anders Nilsson Plymoth <lanilsson@gmail.com>
> wrote:
>
> Hi Charlie,
>
> I understand you are mainly addressing E2E protection here, with regards
> to RREQ and RREP, but I am of the strong opinion that AODVv2 should have a
> more integrated security model, rather than ad hoc.
>
> The use of HMACs for message authentication is a well known and well used
> approach. However, the use of HMAC implies the use of symmetric keys, and
> the question is how this key distribution should take place. I have seen
> hints of the usage of a single shared key, but this seems a little naive to
> me.
>
> I would instead argue for a signature based approach, i.e. the use of
> public keys and certificates. This is the approach that was proposed for
> the SAODV draft, and although that draft is clearly outdated, I think the
> general idea there is good.
>
> Regarding RFC 7182 instead of RFC 4868? Yes, definitely. You already rely
> on RFC 7182 for the security considerations of the AODVv2 draft. However,
> in the AODVv2 draft you mainly consider integrity protection, and less that
> of authentication. Also, this draft, draft-perkins-manet-aodv-e2esec-00
> seems to address integrity more than authentication.
>
> In summary, what I personally would like to see is a stronger integration
> of RFC 7182 and its concepts into the AODVv2 protocol specification, that
> also addresses authentication and key management considerations. As it is,
> it would be very hard to read the AODVv2 and its security considerations
> and build an implementation that incorporates RFC 7182, and have different
> implementations inter-operable.
>
> Thanks,
> Anders
>
>
>
>
>
> On Thu, Mar 3, 2016 at 11:24 PM, Charlie Perkins <
> charles.perkins@earthlink.net> wrote:
>
>>
>> Hello folks,
>>
>> In order to promote useful discussion about the security model for
>> AODVv2, I have submitted a new draft with an idea to enable the source and
>> destination of a Route Discovery to verify that they were indeed the source
>> and destination of the route that was discovered. This is not a guarantee
>> of a useful route, because intermediate routers are not authenticated, only
>> the endpoints.  Nevertheless the idea seems like a useful adjunct to the
>> existing hop-by-hop security as currently specified in AODVv2.
>>
>> It can use more work:
>> - Should RFC 7182 be specified instead of RFC 4868?  If so, what is the
>> simplest way to make the conversion?
>> - Should other message types be covered as well?  This would be pretty
>> simple; I just need to reword the section specifying the input data.
>>
>> I only used RFC 4868 because it seemed very straightforward for me to
>> understand.
>>
>> Comments are solicited and welcome.  The content of the document may well
>> belong in the upcoming revision of AODVv2 that will be provide resolutions
>> for the many recent comments.
>>
>> Regards,
>> Charlie P.
>>
>> _______________________________________________
>> manet mailing list
>> manet@ietf.org
>> https://www.ietf.org/mailman/listinfo/manet
>>
>
> _______________________________________________
> manet mailing list
> manet@ietf.org
> https://www.ietf.org/mailman/listinfo/manet
>
>