Re: [netconf] netconf-tls wasRe: Latest ietf-netconf-server draft and related modules

tom petch <ietfc@btconnect.com> Wed, 12 May 2021 16:34 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 555903A0FCA for <netconf@ietfa.amsl.com>; Wed, 12 May 2021 09:34:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RArO7ZfDqkq0 for <netconf@ietfa.amsl.com>; Wed, 12 May 2021 09:34:03 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-eopbgr140097.outbound.protection.outlook.com [40.107.14.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D5A03A0FB3 for <netconf@ietf.org>; Wed, 12 May 2021 09:34:02 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jLrq014QMXjVmKpCJrNdhIXQMk0fmSlQvPLgY1AfZNmQSbOU5cz4aZo0iV6RELHgoqVhNKftgB+niOzYjIE1kgsceLitqfUpznE6aphQ9KYwW0D9kV1n4i62HtXcOUGFpKTZb8Ur/0SAm05zIbsMH5vus7lejitUJfNolIPR2mnGaHI8lJhwTbGgACva2tekauYydQiO08sx+rWA8XZrsvGQKHrv6UhJagKnsjXu70/W8/b0WSu4GyVfLDZMQF1y3AAPHhkW4FNdpF2Apwn9y5A7TfmDSugpHzx/0Mj4Y2uUU97QuPOOw0clMagvy33HatNYI3oU9jCiwzO1ffdR9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=e+c1EWZS25p9Avcdq0Fjmz78yU6tzbwzbexUTd7AkYg=; b=bmabWj+WyMYha2RgTdpQFf1Pfq9/cXe7mm8mqHed7/XJa7JPx0b92lX1fAPtsX8flxdI4BgkavACIhPx8lgOqMRPf1dEwFLgRFKUWTq17U7tI6mlmmJNEYjQK3R9ngNWR2DwTBSAPpqupYeKfb4nzoSIiikANwBUapAPn3qWzm2b/FaDB3iFXe4TU+CYdjdVSedRS3RJM1ESYPS3gYuyIxgoQ69yRNaCw2HR3aLqFe/ZomE9ODgH6X3vuTZhlmb7D5EUwdgKgEth5PHqJEB3hryjcsgOY6xXvYSB19573+5E+DoOB+20Ql6FiIa4TW2QYFP1QL1Fj4WjqDPtQtA9Zg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=e+c1EWZS25p9Avcdq0Fjmz78yU6tzbwzbexUTd7AkYg=; b=jFeiqueWAe/LpAvR2Z7iHF3+iPNvrRVWkDFK0nY4enMvkrqD1yF7enzacfmJk+fiYItOV1qBC1thVZYic9mycGmk2ZrHrif8IBgVlpvWahzpbC4I+xxBHBq7A/KJn1VvlEk/Iyi0RMYVlg2kKcp9cG861FMZ8dzDyy01Wy4Ak0E=
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com (2603:10a6:20b:134::11) by AM7PR07MB6546.eurprd07.prod.outlook.com (2603:10a6:20b:1a2::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4150.11; Wed, 12 May 2021 16:34:00 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::a05a:a474:bf78:f0a9]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::a05a:a474:bf78:f0a9%6]) with mapi id 15.20.4150.011; Wed, 12 May 2021 16:34:00 +0000
From: tom petch <ietfc@btconnect.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: netconf-tls wasRe: [netconf] Latest ietf-netconf-server draft and related modules
Thread-Index: AQHXPP5RkEf2qGX72kaPVI9y99M1OqrePBVcgABbZwCAAX7/Uw==
Date: Wed, 12 May 2021 16:33:59 +0000
Message-ID: <AM7PR07MB6248FA0E52A5510FFC8DE8E2A0529@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <972-608a4700-29-1b90d060@24617716> <010001791de3029b-730530a6-f4fb-4d57-9d39-a1551ab76260-000000@email.amazonses.com> <AM7PR07MB62488B98AE0E394EFF5C80B1A0539@AM7PR07MB6248.eurprd07.prod.outlook.com>, <010001795c69dcf8-0d94c645-4824-4dca-a1d1-c88d1d2e8f1e-000000@email.amazonses.com>
In-Reply-To: <010001795c69dcf8-0d94c645-4824-4dca-a1d1-c88d1d2e8f1e-000000@email.amazonses.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: watsen.net; dkim=none (message not signed) header.d=none;watsen.net; dmarc=none action=none header.from=btconnect.com;
x-originating-ip: [86.143.250.49]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 774fa28c-885f-4fa1-9df4-08d91563bf0a
x-ms-traffictypediagnostic: AM7PR07MB6546:
x-microsoft-antispam-prvs: <AM7PR07MB6546B474903D713D3AA6C264A0529@AM7PR07MB6546.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(39860400002)(136003)(396003)(366004)(346002)(376002)(71200400001)(7696005)(86362001)(66946007)(66476007)(6506007)(26005)(966005)(55016002)(4326008)(122000001)(33656002)(8936002)(8676002)(478600001)(9686003)(52536014)(5660300002)(66446008)(64756008)(2906002)(316002)(38100700002)(83380400001)(186003)(91956017)(76116006)(66556008); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 774fa28c-885f-4fa1-9df4-08d91563bf0a
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 May 2021 16:33:59.7718 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: x/Od8p9AS1UgwlvBcH6/fPZv3sFeNCnSXEUa+puG03xDLulNhq0m5uVQYJ2rYv9/drfwW26nt+6z31xsMiVDQQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR07MB6546
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/s3rDQ1-3nCd0IOzKlCeqBDDvL1U>
Subject: Re: [netconf] netconf-tls wasRe: Latest ietf-netconf-server draft and related modules
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 May 2021 16:34:08 -0000

From: Kent Watsen <kent+ietf@watsen.net>
Sent: 11 May 2021 18:11

Hi Tom,

I find this I-D confused about which versions of TLS are supported.  It is 1.0/1.1/1.2 or1.2/1.3 or 1.0/1.1/1.2/1.3 or 1.2 or ...
This needs addressing and the text changed to match.

The “ietf-tls-common” module has features: "tls-1_0”, "tls-1_1”, "tls-1_2”, and "tls-1_3”.  Per this recent thread [1], my local-copy now has for all features except “tls-1_3” a comment in the “description” statement along the lines of "TLS 1.x is obsolete and thus it is NOT RECOMMENDED to enable this feature."

[1] https://mailarchive.ietf.org/arch/msg/netconf/dGGP4kQU8EnlcMVMq1ZZ0uAYBO0

<tp>
My comment is that in different places in the I-D there are references to different combinations of different versions of TLS so I am not clear that all four versions are supported.  If they are, as you suggest, then editorial changes are needed - look for example at all the places where RFC5246 is referenced - valid for TLS 1.2 but for the other versions of TLS? I think not.
</tp>

I suspect that the IESG will not accept any support for 1.0 or 1.1 given the existence of an RFC deprecating them and that this I-D should not go further than putting in place hooks with which an organisation could augment such support if they wanted to, but even that may be going too far.

Disagree.  It's one thing to say that a protocol is deprecated and another to say that the configuration for a still somewhat-widely used deprecated-protocol is deprecated.
<tp>
Well, time will tell.  I expect pushback from Security AD which I why I suggested getting secdir or some such to look now rather than when it has reached the IESG
</tp>

I wonder too about what forms of authentication are acceptable, something that has changed several times in the life of the I-D.  I do  not have a view of which are and which are not but think that guidance from the TLS WG or SecDir or Security AD would be useful now rather than later.

What is there to wonder about with regards to forms of authentication?  Saying they’ve changed several times is exaggerated - they changes only once, and that was to add support for “raw public keys” and “pre-shared-keys”, per request.  AFAIK, the auth mechanisms (the two just mentioned + X.509 certs) are the minimally viable set.

<tp>
I do not know if TLS1.3 works with raw public keys - I have not seen that documented.

PSK support changes with TLS1.3.  Its prime use AFAICT is session resumption and there are now constraints on its use, such as not using a key with any other version of TLS ie one PSK for TLS1.2 (or earlier) and a different one for TLS1.3.  Also, a given TLS1.3 PSK should only be used with a single hash algorithm.  This may or may not be in the YANG module but needs a mention IMHO.

So yes, there are things to wonder about with authentication in TLS1.3 because it is so different.
</tp>

In a similar vein, TLS 1.3 is keen to ship application data before the handshake is complete, before authentication has happened, which causes problems for applications which want the handshake and authentication to complete first.  I see NETCONF as being such an application and the I-D needs to address that, as it is being addressed by other WG.

Is that really true?  How is it not considered a security hole in the protocol?!  I agree that it’s undesirable, but it’s unclear what text could be added to the “tis-client-server”, “netconf-client-server” or “restconf-client-server” drafts to address this.  Please advise.

<tp>
I am not sure which part of my post you are querying but yes, data ships before authentication is complete and the application must cater for that.  AFAICT the driver for this is HTTPS, or a number of large web providers, who want to improve the customer experience by eliminating round trips which creates a security hole which the application then has to plug.  This is no problem for HTTP but I think will be for most other protocols, such as NETCONF, but this is a general TLS problem so I think belongs in this I-D as a security hole.

EAP fell into the hole needing to know when authentication was complete and not realising that they could not tell with TLS1.3.  It was the IESG who spotted this and there is now an addition to EAP to tell it when the handshake is really complete as opposed to gone far 
enough to meet the needs of HTTPS.  draft-ietf-eap-emu-tls-13 gets it wrong, -15 fixes it, a topic of much discussion last December and January on the TLS list.

Tom Petch


Thanks,
Kent