[OPSAWG] Fwd: I-D Action: draft-ietf-opsawg-mud-23.txt

Eliot Lear <lear@cisco.com> Mon, 04 June 2018 21:49 UTC

Return-Path: <lear@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 807CA130E00 for <opsawg@ietfa.amsl.com>; Mon, 4 Jun 2018 14:49:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.25
X-Spam-Level:
X-Spam-Status: No, score=-14.25 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oMIYXeirDHxy for <opsawg@ietfa.amsl.com>; Mon, 4 Jun 2018 14:49:42 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55EB3130DFE for <opsawg@ietf.org>; Mon, 4 Jun 2018 14:49:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12987; q=dns/txt; s=iport; t=1528148981; x=1529358581; h=references:subject:to:from:message-id:date:mime-version: in-reply-to; bh=krhoWDNsgjIvpPsHufBA7xYgf6xd3wNkKhE1qPX5Dks=; b=kNYt2XmOm2Cl9dOWsZizQPhpsUsQy+VL6q+ZnEJwPhkb5xleAHjrvZET YRdQP7EF3OgUQjwC0YVZrj134Z3W99TIjZk7+ptjajlporrqwkxNs21GL oXzsLyoqrXh/0y0vAtJm3rGivkIeNbrPzte05Q0sLzttc/D3qyh0sd51o 8=;
X-Files: signature.asc, signature.asc : 3005, 488
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0C1BQCSshVb/xbLJq1cGQEBAQECAQEBAQEIAQEBAYMagXkShCCIY41fCCGPVIR3gXgIA4RsAoIxNhYBAgEBAQEBAQJsHQtXAQGERgoBBSMERQIbDgECEioCAk0KBg0IAQGDHgKBf6ZqgWkzH4gigVkPilWBDyQMgl2ELTCDFoJUAocmMpEWCYNHgVWBQIgBBoE8g3iCQIUmh1+JQIFICidAgRIzGggbFTuCRIIaAgMXegECjRw9jFYSGw0XB4IaAQE
X-IronPort-AV: E=Sophos;i="5.49,477,1520899200"; d="asc'?eml'208?scan'208,208,217";a="4259989"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 Jun 2018 21:49:39 +0000
Received: from [10.61.163.162] ([10.61.163.162]) by aer-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id w54LndqK000724 for <opsawg@ietf.org>; Mon, 4 Jun 2018 21:49:39 GMT
References: <5308aaa9-ef66-dd94-14bb-a7261020c1de@cisco.com>
To: "opsawg@ietf.org" <opsawg@ietf.org>
From: Eliot Lear <lear@cisco.com>
Openpgp: preference=signencrypt
Autocrypt: addr=lear@cisco.com; prefer-encrypt=mutual; keydata= xsBNBFMe1UQBCADdYOS5APDpIpF2ohAxB+nxg1GpAYr8iKwGIb86Wp9NkK5+QwbW9H035clT lpVLciExtN8E3MCTPOIm7aITPlruixAVwlBY3g7U9eRppSw9O2H/7bie2GOnYxqmsw4v1yNZ 9NcMLlD8raY0UcQ5r698c8JD4xUTLqybZXaK2sPeJkxzT+IwupRSQ+vXEvFFGhERQ88zo5Ca Sa1Gw/Rv54oH0Dq2XYkO41rhxQ60BKZLZuQK1d9+1y3I+An3AJeD3AA31fJZD3H8YRKOBgqe ILPILbw1mM7gCtCjfvFCt6AFCwEsjITGx55ceoQ+t5B5XGYJEppMWsIFrwZsfbL+gP31ABEB AAHNJUVsaW90IExlYXIgPGxlYXJAb2Zjb3Vyc2VpbXJpZ2h0LmNvbT7CwJEEEwECADsCGwMC HgECF4ACGQEWIQSY0L2QRh2wkqeyYR2HtmtG2dJ6MwUCWxJwMwULCQgHAgYVCAkKCwIEFgID AQAKCRCHtmtG2dJ6MyMyCACXvtFjAYGMtOkD9MD4nI3ifFpkrj8xTMbXjrv5hdqmzRmQ0wqA 1U/OlZux+P/NaVMiZNZc8zw0nsx/INAqDOVd4/tLWF+ywTkeRFR0VnaUxLwCReZAZOaRS+md +52u/6ddoFja2RnjZ43qbbuvVUARQVIyMJz+GbR6mEZQHR0psD7dDYZDyrpivCxm8zHQwmB6 AZUlO7OJgljDvVPVDCabg/ZnJw1qS0OzSiNb0MySk1D5A7FdwDgeKxuMYUOOoVVTTMWNWcME UkRX9LxElswEt0PQWiz/j3FYXTxiFfl/1vKcHx4pM+E5C5mhTbrdFUFLJC3Y5fLID7stK/Ch aEaBzsBNBFMe1UQBCAC0WV7Ydbv95xYGPhthTdChBIpPtl7JPCV/c6/3iEmvjpfGuFNaK4Ma cj9le20EA5A1BH7PgLGoHOiPM65NysRpZ96RRVX3TNfLmhGMFr5hPOGNdq+xcGHVutmwPV9U 7bKeUNRiPFx3YdEkExddqV2E8FltT0x2FSKe2xszPPHB6gVtMckX5buI9p1K3fbVhXdvEkcY Y/jB0JEJGyhS5aEbct5cHUvDAkT81/YFK5Jfg8RRwu1q1t1YuIJSOWAZQ9J9oUsg6D9RpClU +tIFBoe3iTp1AUfJcypucGKgLYKtpu/aygcpQONHYkYW5003mPsrajFhReVF5veycMbHs4u5 ABEBAAHCwF8EGAECAAkFAlMe1UQCGwwACgkQh7ZrRtnSejOSuQgA27p2rYB7Kh20dym6V8c6 2pWpBHHTgxr/32zevxHSiXl6xvUCg5T8WUwfUk8OvgDcBErK/blDAMXQzSg3sp450JhR8RnX HXF5Zz2T04X7HnlIVJGwf2CjnwyEAJCqMzaCmI+g3Imvg/8L4nyBFvhlFHDv+kIvMiujyycj PAu7xxKplBs1/IEwmDoAMjneFmawvfeQnwdMhSKK8PjKSuzGU5uUmxj3GBfRqvTM0qpmhMPF OmDhJSmH55HLAky2MlmqJYXJPt/9EfSEhFiua1M6gLiuNEuPkp+8jcnHQqKr0IeHt8UqcwLt 2mGfIyl0FVdF9hvWPjNRzGbgqoT1Di03RQ==
X-Forwarded-Message-Id: <5308aaa9-ef66-dd94-14bb-a7261020c1de@cisco.com>
Message-ID: <fb949d15-8085-d06d-efe2-bf73aba12896@cisco.com>
Date: Mon, 04 Jun 2018 23:49:35 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.8.0
MIME-Version: 1.0
In-Reply-To: <5308aaa9-ef66-dd94-14bb-a7261020c1de@cisco.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="1qMfu0FGi6A8ZjGeKYP4nfdpb46IOYZ8S"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/-UlkWcdpvarlN-ekqp8DKJf9Psg>
Subject: [OPSAWG] Fwd: I-D Action: draft-ietf-opsawg-mud-23.txt
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jun 2018 21:49:45 -0000

I've been told to resend this message due to a mailing list glitch. 
Please see below.

--- Begin Message ---
Ben,

Barring any objections to the below I will issue a new draft with edits
tomorrow.  Now please see below.

On 04.06.18 17:40, Benjamin Kaduk wrote:
> Hi Eliot,
>
> On Sat, Jun 02, 2018 at 03:40:34PM +0200, Eliot Lear wrote:
>> This update contains only the following changes:
>>
>>   * A correction (signature -> certificate)
>>   * Slightly change language to make clear that the certificate subject
>>     must be the sameas the id-pe-mudsigner
>>   * Updated dates on the YANG files
>>
>> At this point, I really hope we're done.  Eric, Ben?
> I think we're basically done -- I have just one quibble which
> hopefully is not problematic, and also noted a handful of editorial
> things you can deal with at your leisure.  Thanks for going through
> the multiple rounds of changes addressing our concerns -- the
> document really is much better for it!
>
> At the start of the Security Considerations, we say:
>
>    Based on how a MUD URL is emitted, a Thing may be able to lie about
>    what it is, thus gaining additional network access.  This happens
>    when a device emits a MUD URL using DHCP or LLDP, and is either
>    inappropriately admitted to a class such as "same-manufacturer" or
>    given access to a device such as "my-controller", where such access
>    would otherwise be disallowed.
>
> To me, "[t]his happens when" indicates that the subsequent
> enumeration is an exhaustive list.  I don't really think we've got
> enough experience with this stuff to be able to make such a claim,
> and the list should instead be treated as illustrative.  I think
> that there was some text emailed around that did this nicely,
> something like:
>
> %   Based on how a MUD URL is emitted, a Thing may be able to lie about
> %   what it is, thus gaining additional network access.  This can happen
> %   in a number of ways when a device emits a MUD URL using DHCP or
> %   LLDP, such as being inappropriately admitted to a class such as
> %   "same-manufacturer", given access to a device such as
> %   "my-controller", or being permitted access to an Internet resource,
> %   where such access would otherwise be disallowed.

I think that's fine.
>
>
> And, here's the editorial stuff.
>
> Section 1.5
>
>    o  A DHCP option[RFC2131],[RFC3315] that the DHCP client uses to
>       inform the DHCP server.  The DHCP server may take further actions,
>       such as act as the MUD manager or otherwise pass it along to the
>       MUD manager.
>
> nit: We lost the immediately previous "URL" that "it" referred to, so we
> may want to specifically say "pass the MUD URL along".
>
> Section 13.2
>
>    Prior to processing the rest of a MUD file, the MUD manager MUST
>    retrieve the MUD signature file by retrieving the value of "mud-
>    signature" and validating the signature across the MUD file.  The Key
>    Usage Extension in the signing certificate MUST have the bit
>    digitalSignature(0) set.
>
> nit: do we need to go with "MUST be present and have the bit
> digitalsignature(0) set"?

That is fine.
>
>                             The subject of this certificate MUST be
>    equal to that of the value of id-pe-mudsigner when that extension is
>    present in the device certificate.  If these conditions are not met,
>    or if it cannot validate the chain of trust to a known trust anchor,
>    the MUD manager MUST cease processing the MUD file until an
>    administrator has given approval.
>
> nit-level as well, I guess: I might wordsmith this differently.
>
> NEW:
>
>    When the id-pe-mudsigner extension is present in a device's X.509
>    certificate, the MUD signature file MUST have been generated by
>    a certificate whose subject matches the contents of that
>    id-pe-mudsigner extension.  If these conditions are not met,
>    or if it cannot validate the chain of trust to a known trust anchor,
>    the MUD manager MUST cease processing the MUD file until an
>    administrator has given approval.

Ok.
>
> I might also consider adding something like the following (though
> hopefully it would be obvious and thus not necessary to say):
>
>    Before the signature has been validated, both the MUD file and
>    the resource retrived from the "mud-signature" URL are unverified
>    and should be treated as untrusted input.  In particular, MUD
>    managers can impose a cap on the number of bytes they retrieve
>    from a "mud-signature" URL, to avoid DoS attacks involving
>    presenting a large (invalid) signature file or similar scenarios.

I would rather leave this out for the very reasons you state.  The draft
is already quite wordy.
>
> Section 16
>
>    Implementations SHOULD be configurable to
>    disallow additive access for devices using MUD-URLs that not emitted
>    in a secure fashion such as in a certificate.
>
> nit: "that are not emitted".

Ok
>
>    When certificates are not present, Things claiming to be of a certain
>    manufacturer SHOULD NOT be included in that manufacturer grouping
>    without additional validation of some form.  This will be relevant
>    when it makes use of primitives such as "manufacturer" for the
>    purpose of accessing Things of a particular type.
>
> What is "it" that makes use of primitives such as "manufacturer"?

the MUD manager.
>
>    [...] If the actual MUD file has changed, the MUD
>    manager MAY check the WHOIS database to see if registration ownership
>    of a domain has changed.
>
> Do we need a reference for WHOIS?

I don't think so.  RFC Editor will sort if so.
>
> Appendix C
>
>    In this sample extension we augment the core MUD model to indicate
>    whether the device implements DETNET.  If a device claims not to use
>    NETNET, but then later attempts to do so, a notification or exception
>
> That's also supposed to be 'D'ETNET, right?

Indeed.  Thanks.

Eliot


--- End Message ---