RE: [netlmm] Question on security model

"Alper Yegin" <alper.yegin@yegin.org> Tue, 11 September 2007 21:02 UTC

Return-path: <netlmm-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IVCsB-00056Q-3j; Tue, 11 Sep 2007 17:02:15 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IVCsA-00056L-51 for netlmm@ietf.org; Tue, 11 Sep 2007 17:02:14 -0400
Received: from mout.perfora.net ([74.208.4.197]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IVCs9-0001Li-GZ for netlmm@ietf.org; Tue, 11 Sep 2007 17:02:14 -0400
Received: from [88.233.214.210] (helo=IBM52A5038A94F) by mrelay.perfora.net (node=mrus1) with ESMTP (Nemesis), id 0MKpCa-1IVCs60pK2-0007Uj; Tue, 11 Sep 2007 17:02:12 -0400
From: Alper Yegin <alper.yegin@yegin.org>
To: netlmm@ietf.org
Subject: RE: [netlmm] Question on security model
Date: Wed, 12 Sep 2007 00:01:56 +0300
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
Thread-Index: Acf0gtDWPSwhZKFsQKG6YgDS9HfwMwAMzqwQ
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3138
In-Reply-To: <200709111648.19896.julien.IETF@laposte.net>
Message-Id: <0MKpCa-1IVCs60pK2-0007Uj@mrelay.perfora.net>
X-Provags-ID: V01U2FsdGVkX1/hqLeLoDtKSLCZPCUYZZfFTLMQI2gmKXuhS/5 z9BsTudvTZhdjs2fRpTpOBthFOdFa39hQVdvp43LJGnkVDQaCk 2T33PT5SvEhifeGw2rOTQ==
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2857c5c041d6c02d7181d602c22822c8
X-BeenThere: netlmm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: NETLMM working group discussion list <netlmm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/netlmm>, <mailto:netlmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/netlmm>
List-Post: <mailto:netlmm@ietf.org>
List-Help: <mailto:netlmm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/netlmm>, <mailto:netlmm-request@ietf.org?subject=subscribe>
Errors-To: netlmm-bounces@ietf.org

There are two types of components to security space for PMIP (so far)...

Security mechanism: IPsec, Auth Option, etc...
Security association: MAG-LMA, per-MN MAG-LMA


All combinations are possible between the two components.

While recommending support for one combination (IPsec with MAG-LMA SA) is
necessary for interop, we shall not prevent use of other combinations in the
base spec.  

I'm fine with the current recommendation, as long as we weed out text that
unnecessarily or accidentally bars other combinations. This is better than
having to enter a beauty contest and try to pick a winner.

Alper 

> -----Original Message-----
> From: Julien Laganier [mailto:julien.IETF@laposte.net]
> Sent: Tuesday, September 11, 2007 5:48 PM
> To: netlmm@ietf.org
> Cc: 'DE JUAN HUARTE FEDERICO'
> Subject: Re: [netlmm] Question on security model
> 
> On Tuesday 11 September 2007, Sri Gundavelli wrote:
> > Hi Federico,
> >
> > I dont want to reopen this thread or enter any discussions. But, let
> > me quickly make these points.
> >
> >
> > 1. The security model, Configuring a MAG with all the MN's SA's does
> > not offer any greater security than the other security model. Even in
> > the Per-Node security model, there could be multiple SA's between the
> > LMA and MAG, and different SA's can be used for different flows.
> >
> > 2. If a MAG is compromised, so are all the MN SA's. The damage is the
> >    same. If we argue that the MAG will not be allowed to create a BCE
> >    for a MN, that it does not have SA for, the same authorization can
> >    be achieved in the other model, by requiring the LMA to authorize
> > the MAG before it creates BCE for a given MN.
> >
> > There is no advantage using Per-MN security model. Its just a false
> > sense of security, IMHO.
> 
> Trying to be more precise here.
> 
> The "Per-MN security model" reffered to is actually one in which the a
> LMA and a given MAG have a different security association for each MN
> attached to that MAG.
> 
> I think it is more precise to denote this model as "Per-MN LMA-MAG
> Security Association" model.
> 
> In this model, even though there's one security association per MN, the
> security association is still established between the _MAG_ and LMA.
> Thus, if the _MAG_ is compromised, the per-MN LMA-MAG SA cannot prevent
> the MAG to issue undue signalling on behalf of a MN attached to it
> since it has the corresponding per-MN LMA-MAG security association. On
> the other hand, it would prevent a compromised MAG to issue undue
> signalling on behalf of a MN which is not attached to it _if_ it has no
> per-MN LMA-MAG SA for that MN.
> 
> The draft currently specifies a "Per-MAG LMA-MAG Security Association"
> model with no mechanisms in place to prevent a compromized MAG to issue
> undue signalling for any MN (both attached and not attached to it). The
> draft does however call in it security considerations section for such
> a mechanism to be present, but as part of another, unspecified,
> protocol:
> 
>    To eliminate the threats related to a compromised mobile access
>    gateway, this specification recommends that the local mobility anchor
>    before accepting a Proxy Binding Update message for a given mobile
>    node, should ensure the mobile node is definitively attached to the
>    mobile access gateway that sent the binding registration request.
> 
> Thus, the "Per-MN LMA-MAG Security Association" model can be more secure
> than the "per-MAG LMA-MAG Security Association" against MAG
> compromission only if is guaranteed that establishment of the "Per-MN
> LMA-MAG Security Association" cannot happen with a MAG to which the MN
> is not attached. That might be ensured by tying this SA establishment
> to network access control, but this would be, as for the "Per-MAG
> LMA-MAG Security Association", a mechanism implemented as part of
> another, unspecified, protocol.
> 
> In conclusion, without another mechanism realizing what's being called
> for in the security considerations, both security models are IMHO
> equivalent.
> 
> --julien
> 
> _______________________________________________
> netlmm mailing list
> netlmm@ietf.org
> https://www1.ietf.org/mailman/listinfo/netlmm


_______________________________________________
netlmm mailing list
netlmm@ietf.org
https://www1.ietf.org/mailman/listinfo/netlmm