Re: [OPSAWG] Start of WGLC for TACACS+ document.

Alan DeKok <aland@deployingradius.com> Thu, 06 October 2016 18:51 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FB3C1293E9 for <opsawg@ietfa.amsl.com>; Thu, 6 Oct 2016 11:51:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WJQtV2Q_9dbT for <opsawg@ietfa.amsl.com>; Thu, 6 Oct 2016 11:51:24 -0700 (PDT)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) by ietfa.amsl.com (Postfix) with ESMTP id A82A41293D8 for <OpsAWG@ietf.org>; Thu, 6 Oct 2016 11:51:24 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.networkradius.com (Postfix) with ESMTP id F18B71F3B; Thu, 6 Oct 2016 18:51:23 +0000 (UTC)
Received: from mail.networkradius.com ([127.0.0.1]) by localhost (mail-server.vmhost2.networkradius.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AqiRjKe0ux77; Thu, 6 Oct 2016 18:51:23 +0000 (UTC)
Received: from [192.168.120.42] (unknown [23.233.24.114]) by mail.networkradius.com (Postfix) with ESMTPSA id CFB8D11B8; Thu, 6 Oct 2016 18:51:22 +0000 (UTC)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <D41C42F2.195352%dcmgash@cisco.com>
Date: Thu, 06 Oct 2016 14:51:21 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <0AD4416D-361C-492C-9B7D-FBA85A3BACD5@deployingradius.com>
References: <CAHw9_iK-1=Epr5CLAtFayd0Bss6oZrsDTfyox6y2SfPJAav78Q@mail.gmail.com> <5019ABA9-BB74-4C69-A455-12C17A2958CE@deployingradius.com> <E6C64895-F0C6-40B8-A687-4DC56590B22E@deployingradius.com> <025401d21fb8$71906e20$4001a8c0@gateway.2wire.net> <2769B0A9-00DE-41F8-9971-9C0AABDC8109@deployingradius.com> <003101d21fed$6978cb80$4001a8c0@gateway.2wire.net> <0124D7D3-98BA-4175-AE57-39C03349009C@deployingradius.com> <D41C42F2.195352%dcmgash@cisco.com>
To: "Douglas Gash (dcmgash)" <dcmgash@cisco.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/0BK2rBhiQKUUUVWqrIsXlpIqbxA>
Cc: "opsawg-chairs@tools.ietf.org" <OpsAWG-chairs@tools.ietf.org>, Andrej Ota <aota@google.com>, "draft-ietf-opsawg-tacacs-05@tools.ietf.org" <draft-ietf-opsawg-tacacs-05@tools.ietf.org>, Thorsten Dahm <thorstendlux@google.com>, "opsawg@ietf.org" <OpsAWG@ietf.org>
Subject: Re: [OPSAWG] Start of WGLC for TACACS+ document.
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Oct 2016 18:51:26 -0000

On Oct 6, 2016, at 1:34 PM, Douglas Gash (dcmgash) <dcmgash@cisco.com> wrote:
> Regarding the security concern, the approach we have with the current
> document is:
> 
> 1) A statement that the protocol does not provide security in a modern
> environment. 

  I'm happy with that.

> 2) The two common approaches to support T+ so that it may be used.

  OK...

> 3) An indication that a version with built-in security is to follow, which
> will not require the mitigations in 2) (actually I suspect it may precede
> the info document ;-))

  Except that the current document doesn't even document CHAP securely.

  RFC 1994 (published in 1996) says:
 
   Each challenge value SHOULD be unique, since repetition of a
   challenge value in conjunction with the same secret would permit an
   attacker to reply with a previously intercepted response.  Since it
   is expected that the same secret MAY be used to authenticate with
   servers in disparate geographic regions, the challenge SHOULD exhibit
   global and temporal uniqueness.

  Tho I'll also note that RFC 1994 also doesn't specify a minimum length for the challenge.

  That is, the document doesn't even meet the security requirements in place in 1994.

> We need to make sure there is no ambiguity for 1) for any security review.
> No soft-peddalling. T+ provides the function, not the security.

  I'm fine with that.

  I want to document historical TACACS+.  This means the document needs to answer the following questions:

a) can people implement it?

b) can people gain the maximum amount of security available in the historical protocol?

c) can people be aware of the security concerns and trade-offs with using the historical protocol?

  The push-back so far shows that the answers are:

a) no

b) no

c) no

  I suggest these are the wrong answers.  *All* of them are the wrong answers.

> My question would be: would this dissection of vulnerabilities and
> exploration of the attack vectors would help anyone from a security
> perspective, when we have established that the approaches 2) are required?

  Yes.  See any of the RADIUS RFCs in the last 5 years.  The SAAG reviews require discussion not only of the issues with the new standards, but also of the problems with the historical protocol.

> I suspect that we¹d probably miss some, and that may give implementors
> more comfort than is afforded by the clear and simple statement.

  The argument that we can't be perfect isn't a reason to give up entirely.

  If the statement is anything other than "no one should use this protocol for anything", we might as well *try* to document security issues.

> Therefore, for security review, I¹d suggest we keep the statement simple,
> as defined above. However, if this statement is not clear enough/correct
> in the document, then certainly, it should be clarified.

  Then the introduction and/or abstract should say:

 "This document attempts to specify the historical TACACS+ protocol.  However, there are many portions of the protocol which are under-specified or unspecified.  We cannot second-guess twenty years of practice here.  As a result, this specification is incomplete, under-specified, insecure, and should not be used by anyone to implement anything.  Please wait for the Standards track document to get the actual TACACS+ specification that people can implement".

  It shouldn't be a contentious issue.  Either document the protocol, or admit we're not going to document the protocol.

  Alan DeKok.