Re: [mile] Eric Rescorla's Discuss on draft-ietf-mile-xmpp-grid-09: (with DISCUSS and COMMENT)

Eric Rescorla <ekr@rtfm.com> Wed, 20 March 2019 21:42 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: mile@ietfa.amsl.com
Delivered-To: mile@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EADA12705F for <mile@ietfa.amsl.com>; Wed, 20 Mar 2019 14:42:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N5EznHR6c4aU for <mile@ietfa.amsl.com>; Wed, 20 Mar 2019 14:42:38 -0700 (PDT)
Received: from mail-lj1-x22d.google.com (mail-lj1-x22d.google.com [IPv6:2a00:1450:4864:20::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FBF1131074 for <mile@ietf.org>; Wed, 20 Mar 2019 14:42:38 -0700 (PDT)
Received: by mail-lj1-x22d.google.com with SMTP id k8so3595881lja.8 for <mile@ietf.org>; Wed, 20 Mar 2019 14:42:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=B2DNuCefw6sX29QE7RIE68CUADJVGaKg5lbDKGFr+Q4=; b=pZFQ2Vcox5WgeJJO8y2lPtGFoDaUKRWmgyhu/IVQ/QxFz5+EWuDxw84AyF9pDFof/V aKKV9sdlJxeBBLNhevrPLGTxBg6j8CKtcfSpbC/vomLg3PotEYiphDAWtPLHGBXPqok8 c2ArDa/KblcSJj98pV7NBbxW7bo8Y9cDnZ2N6kQir3LmB62dELUq8s0Um1yRF/U8CUd2 bWxLth6hg/c1Np0O8xKQEXTTwEkZW3l1NMXw0i2rtn0ac75gdzs7zoJK3lgHixmND9Tc Sb6ZkPsSe7+aOLDXk9ybgZRCk4aQhTKl6mbwBteiaDwvCTMtxqE2i2BfifyappL4wEOx A31g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=B2DNuCefw6sX29QE7RIE68CUADJVGaKg5lbDKGFr+Q4=; b=bcbUKom99r5fruXej0Y+tpXG7iDNHZ+wDXF1tEGx1IHXecZUyHmBfu3xzLGs+FKNcI OaNQx4+u0Md+ISCrpxBcRwwzKt7MgbIAxdTuANQo1AHqe5C/d8raBOMCXKTLX+dGFXrF jybMxVXC8JUrJYcC5R5H0hJ7OuJfmZw0pccDUhOOmmowmKV5ynoQOetK4FbHAhLjP5Xo ZecxEYQY2nRqFEIR7ryKDKL9S6cgIGhPEbRQJkecttMsvRCRvjU57cW+oE/bAfR4j2BY +0Yb6rPhiFmaQIHbC/qt7PVSZ/+Ox+SLhNPPYRDguZRSLVBaFfU8jGw2kT3DfkOd3ZQV NeaA==
X-Gm-Message-State: APjAAAX6JsNfrplmJlDfqtxjxxm2vbxNnQO5HPhtvfaMX/DWyoyBzerj Dw5n6LgfbV28vq2Xk68IoR9xdJiy7C83cMHH4hYtaQ==
X-Google-Smtp-Source: APXvYqwFbsf+RmyHiytwPHdhy6uP0czq8gPqmldWW9z6URruRbamdLriZUSCNItrcKC0lTDPdcfYesBQinEoi7TxB2w=
X-Received: by 2002:a2e:9e89:: with SMTP id f9mr177616ljk.28.1553118156231; Wed, 20 Mar 2019 14:42:36 -0700 (PDT)
MIME-Version: 1.0
References: <154833770862.25104.14121457719973234955.idtracker@ietfa.amsl.com> <312B7C3D-8DFA-4539-9E31-E4B1E8ADDDE3@gmail.com> <CABcZeBOVJ0SScEYY0LHgJMf0MekNgYXbaxWy5E-rL16e-9m4vg@mail.gmail.com> <B0BD72B1-B6E3-428D-8A53-6D47A29928FD@cisco.com>
In-Reply-To: <B0BD72B1-B6E3-428D-8A53-6D47A29928FD@cisco.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 20 Mar 2019 14:41:59 -0700
Message-ID: <CABcZeBMOD0JAt_dW0MP88uvM_DR+B1nqpPncH=1-HUUG5zKfrQ@mail.gmail.com>
To: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
Cc: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, The IESG <iesg@ietf.org>, "mile@ietf.org" <mile@ietf.org>, "mile-chairs@tools.ietf.org" <mile-chairs@tools.ietf.org>, "draft-ietf-mile-xmpp-grid@ietf.org" <draft-ietf-mile-xmpp-grid@ietf.org>, "mile-chairs@ietf.org" <mile-chairs@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ff31de05848d7f7d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mile/OIsWIt9NMFeTvQdmX0tG_HcGVIQ>
Subject: Re: [mile] Eric Rescorla's Discuss on draft-ietf-mile-xmpp-grid-09: (with DISCUSS and COMMENT)
X-BeenThere: mile@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Managed Incident Lightweight Exchange, IODEF extensions and RID exchanges" <mile.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mile>, <mailto:mile-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mile/>
List-Post: <mailto:mile@ietf.org>
List-Help: <mailto:mile-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mile>, <mailto:mile-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2019 21:42:42 -0000

> ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > S 5.
> >>         <item node='NEA1'
> >>               name='Endpoint Posture Information'
> >>               jid='broker.security-grid.example'/>
> >>         <item node='MILEHost'
> >>               name='MILE Host Data'
> >>               jid='broker.security-grid.example'/>
> >
> > Assuming I am understanding this correctly, there's no machine-
> > readable description of the topics; they are just freeform
> > descriptions and then some human has to decide what to consume.
> > Assuming that's correct you should state it upfront.
>
> [NCW] The response itself doesn’t provide a full description of the topic,
> but further in Section 5
>
> We do describe how the broker responds with the supported namespace.  Is
> that not sufficient?
>
>
I'm not following you here. My point is that the topics are just described
in some freeform text field, so there's no way to automatically subscribe
to them based on some taxonomy.


> > S 8.2.1.
> >>     o  Network traffic can be passively monitored to glean information
> >>        from any unencrypted traffic
> >>
> >>     o  Even if all traffic is encrypted, valuable information can be
> >>        gained by traffic analysis (volume, timing, source and
> destination
> >>        addresses, etc.)
> >
> > This text is kind of misleading because below you require TLS.
>
>
>
> The point here is that data is exposed at relays and a grid is used where
> data may be exposed on XMPP servers that are not the source or
> destination.  The need for object level encryption is important when
> sensitive data is exchanged.
>
> If this is clearer, then it addresses several comments as TLS doesn’t
> suffice in this case.
>
>
>
> Thanks. I agree that TLS doesn't address attack by the XMPP relay servers
> and that object level encryption would help. What's confusing here, at
> least to me, however, is that this section is entitled "Network Attacks"
> and there is a separate section (8.2.2) that talks about what the
> XMPP-Grid-Controller can do. Moreover S 8.3.1 talks about requiring TLS and
> says "These protocol security measures provide protection against all the
> network attacks listed in the above document section [I'm assuming 8.2.1 --
> EKR] except denial of service attacks." So, these are odd read in context.
>
> [NCW] I’m open to suggestions on reworking or shuffling to improve
> readability
>

Why don't you just remove these bullets. They don't seem relevant. And
maybe sharpen that these are capabilities of the controller.

>
>
>
>
> -Ekr
>
>
>
>
> Best regards,
> Kathleen
>
> >
> > S 8.2.1.
> >>     o  Network traffic can be blocked, perhaps selectively
> >>
> >>     o  A "Man In The Middle" (MITM) attack can be mounted where an
> >>        attacker interposes itself between two communicating parties and
> >>        poses as the other end to either party or impersonates the other
> >>        end to either or both parties
> >
> > How would this be possible? Is it only in the case of unencrypted
> > transport or something else?
>
> [NCW] Yes, it is only the case with unencrypted transport.=
>
>
But unencrypted transport is forbidden by this document.
> >



> > S 8.3.1.
> >>
> >>  8.3.1.  Securing the XMPP-Grid Data Transfer Protocol
> >>
> >>     To address network attacks, the XMPP-Grid data transfer protocol
> >>     described in this document requires that the XMPP-Grid messages MUST
> >>     be carried over TLS (minimally TLS 1.2 [RFC8446]) as described in
> >
> > It would have been useful to state this earlier.
>
> [NCW] Actually Section 8.2 presents the Threat Model and the issues whereas
>
> Section 8.3 presents the countermeasures to the issues.
>
>
Well, usually at this point I would just state that this is a 3552 attacker.


>
> >>     authentication technique to use in any particular deployment is left
> >>     to the administrator.
> >>
> >>     These protocol security measures provide protection against all the
> >>     network attacks listed in the above document section except denial
> of
> >>     service attacks.  If protection against these denial of service
> >
> > This is a bit hard to read in context. It seems almost like you wrote
> > the "network attacks" section as if TLS wasn't required and then added
> > the TLS requirement? In any case, if all those attacks are prevented,
> > I would rewrite that section
>
> [NCW] I am not sure why you believe TLS solves passive monitoring
> (especially of metadata or general traffic analysis as noted above)?
>
>
Well, I certainly hope it solves passive monitoring of the plaintext.
That's the point of TLS, after all. I agree that it doesn't stop traffic
analysis.

But it's not *me* who says it, it's this document which says it. My point
is that it's not useful to describe a bunch of threats that would happen if
this traffic were unencrypted when it's always encrypted. Anyway, this is
just a comment, so you are free to ignore.

-Ekr


>
>
> >
> >
> > S 11.
> >>
> >>     The authors would like to acknowledge the contributions, authoring
> >>     and/or editing of the following people: Joseph Salowey, Lisa
> >>     Lorenzin, Clifford Kahn, Henk Birkholz, Jessica Fitzgerald-McKay,
> >>     Steve Hanna, and Steve Venema.  In addition, we want to thank
> Takeshi
> >>     Takahashi, Panos Kampanakis, Adam Montville, Chris Inacio, and Dave
> >
> > "Ignacio", right?
>
> [NCW] No. It is Chris Inacio.
>
>
>
>
> >
> >
> > _______________________________________________
> > mile mailing list
> > mile@ietf.org
> > https://www.ietf.org/mailman/listinfo/mile
>
>