[Mip6] Icos BoF -- IP Configuration Security
Jari Arkko <jari.arkko@kolumbus.fi> Thu, 17 February 2005 20:33 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02129 for <mip6-web-archive@ietf.org>; Thu, 17 Feb 2005 15:33:17 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D1sgP-0006mB-5h for mip6-web-archive@ietf.org; Thu, 17 Feb 2005 15:55:34 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D1qb0-0007d0-SU; Thu, 17 Feb 2005 13:41:50 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D1nuM-0007di-0b for mip6@megatron.ietf.org; Thu, 17 Feb 2005 10:49:38 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08958 for <mip6@ietf.org>; Thu, 17 Feb 2005 10:49:36 -0500 (EST)
Received: from p130.piuha.net ([193.234.218.130]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D1oFp-0007S0-7P for mip6@ietf.org; Thu, 17 Feb 2005 11:11:49 -0500
Received: from kolumbus.fi (p130 [193.234.218.130]) by p130.piuha.net (Postfix) with ESMTP id 1DB6189883; Thu, 17 Feb 2005 17:49:00 +0200 (EET)
Message-ID: <4214BC94.8050206@kolumbus.fi>
Date: Thu, 17 Feb 2005 17:47:32 +0200
From: Jari Arkko <jari.arkko@kolumbus.fi>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7b) Gecko/20040316
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Mobile IPv6 Mailing List <mip6@ietf.org>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 72dbfff5c6b8ad2b1b727c13be042129
Content-Transfer-Encoding: 7bit
Cc: Bernard Aboba <aboba@internaut.com>
Subject: [Mip6] Icos BoF -- IP Configuration Security
X-BeenThere: mip6@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: mip6.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/mip6>, <mailto:mip6-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:mip6@ietf.org>
List-Help: <mailto:mip6-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/mip6>, <mailto:mip6-request@ietf.org?subject=subscribe>
Sender: mip6-bounces@ietf.org
Errors-To: mip6-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 1e467ff145ef391eb7b594ef62b8301f
Content-Transfer-Encoding: 7bit
For your information: we intend to arrange a BoF in the next IETF about the secure configuration needs at IP layer. This is an issue that has come up in several WGs, including MIP6 and DHC. The purpose of this one-time BoF is provide an additional forum where these needs can be discussed along with their architectural implications. Hopefully we can also learn a bit from others, about their problems and solutions. All actual work would, however, be still performed in the respective working groups. Mailing list has been set up; we'd appreciate your discussion about the issues. See below for a link to subscribe yourself. IP Configuration Security BoF Chairs: Bernard Aboba <aboba@internaut.com> Jari Arkko <jari.arkko@piuha.net> Area Directors: Thomas Narten <narten@us.ibm.com> Margaret Wasserman <margaret@thingmagic.com> Mailing list: https://www.machshav.com/mailman/listinfo.cgi/icos This BoF will provide an overview of secure Internet layer configuration needs, discussing the architectural issues, areas of applicability and potential solutions under discussion in different areas of the IETF. The purpose of the BoF is to discuss a common topic that touches several existing Working Groups, and it is not expected that a new working group will be formed as a result. The BoF will also not replace ongoing process in existing WGs, though it is hoped that the discussion gives additional insights to the participants to deal with these issues. The need for this BoF has came up in the context of expanding EAP usage, including the use of EAP for configuration in different IETF WGs. However, the BoF will discuss this issue from a general point of view, as the issue is not related to just a single protocol. Examples of specific issues in IP layer protocols are brought forward, however, as are examples of solutions in order make it easier to understand the concrete implications of the issues. Internet layer configuration is defined as the configuration required to support the operation at the Internet layer. This includes IP address configuration, default gateway(s), name server configuration, boot configuration (TFTP, NFS), service location and directory configuration, mobility configuration, and time server configuration (NTP). Configuration is typically performed insecurely today. For example, DHCP is rarely secured for a variety of reasons, even though a security mechanism has been defined in RFC 3118. In other cases, such as in Mobile IPv6, the use of security tools is mandatory in the protocols, but there are deployment barriers. As a result, Internet Area working groups are exploring alternative solutions. These include use of EAP for use for key derivation, and configuration. For example, the DHC WG has considered employment of EAP-derived keys for use with DHCP security, as defined in RFC 3118 and 3315. The MIPv6 WG, in investigating the bootstrapping problem, has considered proposals involving use of IKEv2 with EAP, as well as utilization of link layer EAP exchanges for configuration. IPv6 uses Router Advertisements for address autoconfiguration; however, a mechanism is needed to secure them. The SEND working group defined a zero-configuration mechanism for secure IP address configuration, based on Cryptographically Generated Addresses (CGAs). It also defined a certificate-based authorization for routers, where hosts can use a router that has a certificate traceable to a trusted root configured for the host. All these configuration tasks have delay constraints, because they typically need to be performed before a node that just moved can resume communications. Reading list: [RFC3118] Droms, R. and W. Arbaugh, "Authentication for DHCP Messages", RFC 3118, June 2001. [RFC3315] Droms, R., Ed., Bound, J., Volz,, B., Lemon, T., Perkins, C. and M. Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", RFC 3315, July 2003. [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J. and H. Lefkowetz, "Extensible Authentication Protocol (EAP)", RFC 3748, June 2004. [RFC3736] Droms, R., "Stateless Dynamic Host Configuration Protocol (DHCP) Service for IPv6", RFC 3736, April 2004. [RFC3756] Nikander, P., Kempf, J. and E. Nordmark, "IPv6 Neighbor Discovery (ND) Trust Models and Threats", RFC 3756, May 2004. [RFC3818] Schryver, V., "IANA Considerations for Point-to-Point Protocol", RFC 3818, June 2004. [ANYCAST] Hagino, J., and K. Ettikan, "An Analysis of IPv6 Anycast", draft-ietf-ipngwg-ipv6-anycast-analysis-02.txt, Internet draft (work in progress), June 2003. [DHCPv4Threat] Hibbs, R., Smith, C., Volz, B., Zohar, M., "Dynamic Host Configuration Protocol for IPv4 (DHCPv4) Threat Analysis", draft-ietf-dhc-v4-threat-analysis-02.txt, Internet draft (work in progress), April 2004. [DHCPv6Threat] Prigent, N., Marchand, J., Dupont, F., Cousin, B., Laurent- Maknavicius, M. and J. Bournelle, "DHCPv6 Threats", draft- prigent-dhcpv6-threats-00.txt, March 2001. [DNSConfv6] Jeong, J. (ed.), "IPv6 Host Configuration of DNS Server Information Approaches", draft-ietf-dnsop-ipv6-dns- configuration-04.txt, Internet draft (work in progress), September 2004. [EAP3118] Yegin, A., Tschofenig, H. and D. Forsberg, "Bootstrapping RFC 3118 Delayed DHCP AUthentication Using EAP-based Network Access Authentication", draft-yegin-eap-boot-rfc3118-01.txt, Internet draft (work in progress), January 2005. [EAPIKE] Tschofenig, H., Kroeselberg, D., Ohba, Y. and F. Bersani, "EAP IKEv2 Method (EAP-IKEv2)", draft-tschofenig-eap-ikev2-05.txt, Internet draft (work in progress), October 2004. [IKEv2] Kaufman, C., (ed.), "Internet Key Exchange (IKEv2) Protocol", draft-ietf-ipsec-ikev2-17.txt, Internet draft (work in progress), September 2004. [IPCPMIPv6] Song, J., Chong, C. and D. Leigh, "MIPv6 IPCP configuration option for PPP IPv6CP", draft-song-pppext-mipv6-ppp- support-01.txt, Internet draft (work in progress), October 2001. [SEND] Arkko, J., Kempf, J., Sommerfeld, B., Zill, B. and P. Nikander, "SEcure Neighbor Discovery (SEND)", draft-ietf-send- ndopt-06.txt, Internet draft (work in progress), January 2005. [SEND-CGA] Aura, T., "Cryptographically Generated Addresses (CGA)", draft-ietf-send-cga-06.txt, Internet draft (work in progress), October 2004. [MIPv6-BOOT] A. Patel, "Problem Statement for bootstrapping Mobile IPv6, draft-ietf-mip6-bootstrap-ps-01.txt, Internet draft (work in progress), October 2004. [MIPv6-IKEv2] Devarapalli, V., "Mobile IPv6 Operation with IKEv2 and the revised IPsec Architecture", draft-ietf-mip6-ikev2-ipsec-00.txt, Internet draft (work in progress), October 2004. [MIPv6-EAP] Giaretta, G., Guardini, I., Demaria, E., Bournelle, J., and M. Laurent-Maknavicius, "MIPv6 Authorization and Configuration based on EAP", draft-giaretta-mip6-authorization-eap-02.txt, Internet draft (work in progress), October 2004. [MIPv6-AAA] Yegin, A., "AAA Mobile IPv6 Application Framework", draft-yegin-mip6-aaa-fwk-00.txt, Internet draft (work in progress), August 2004. [MIPv6-BOOT2] J. Kempf, E. Nordmark, S. Chakrabarti, "Bootstrapping Mobile IPv6", draft-chakrabarti-mip6-bmip-00.txt, Internet draft (work in progress), December 2004. ---- IP Configuration Security BOF Agenda Time and Date: Monday, March 7, 2005, 1530-1730 (Tentative - have asked to be moved to Wed-Thu!) Preliminaries: (5 minutes) - Minute Takers - Bluesheets IP Configuration Security Problem, Bernard Aboba (10 minutes) http://www.drizzle.com/~aboba/IETF62/icos.ppt Why do we care, TBD (10 minutes) Credential Reuse, TBD (10 minutes) EAP and its Applicability, Bernard Aboba (15 minutes) http://www.drizzle.com/~aboba/IETF62/icos.ppt (To Be Provided) http://www.ietf.org/rfc/rfc3748.txt http://www.ietf.org/internet-drafts/draft-ietf-eap-keying-04.txt Overview of The MIPv6 Bootstrap Problem, James Kempf (20 minutes) http://www.ietf.org/internet-drafts/draft-ietf-mipv6-bootstrap-ps-01.txt http://www.ietf.org/internet-drafts/draft-giaretta-mipv6-authorization-eap-02.txt http://www.ietf.org/internet-drafts/draft-chakrabarti-mip6-bmip-00.txt http://www.ietf.org/internet-drafts/draft-ietf-mipv6-ikev2-ipsec-00.txt (more documents in the reading list) Overview of DHCP Security, Mark Stapp/Ralph Droms (20 minutes) http://www.ietf.org/rfc/rfc3118.txt http://www.ietf.org/rfc/rfc3315.txt http://www.ietf.org/internet-drafts/draft-ietf-dhc-v4-threat-analysis-03.txt http://www.ietf.org/internet-drafts/draft-yegin-eap-boot-rfc3118-01.txt http://bgp.potaroo.net/ietf/all-ids/draft-ietf-dhc-auth-sigzero-00.txt http://www.drizzle.com/~aboba/IETF62/draft-stapp-dhc-eap-00.txt (To Be Provided) Overview of Secure Configuration in SEND, Jari Arkko (10 minutes) http://www.ietf.org/internet-drafts/draft-ietf-send-cga-06.txt http://www.ietf.org/internet-drafts/draft-ietf-send-ndopt-06.txt Overview of Other IP Layer Needs, TBD (5 min) - Mobile IPv4 - PANA - IKEv2 Discussion and Wrapup (20 minutes) _______________________________________________ Mip6 mailing list Mip6@ietf.org https://www1.ietf.org/mailman/listinfo/mip6
- [Mip6] Icos BoF -- IP Configuration Security Jari Arkko