Re: [OPSAWG] [secdir] Secdir last call review of draft-ietf-opsawg-mud-tls-10

Ben Schwartz <bemasc@google.com> Mon, 09 January 2023 19:08 UTC

Return-Path: <bemasc@google.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EDB84C19E118 for <opsawg@ietfa.amsl.com>; Mon, 9 Jan 2023 11:08:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -22.596
X-Spam-Level:
X-Spam-Status: No, score=-22.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wVM0MS3nnxXy for <opsawg@ietfa.amsl.com>; Mon, 9 Jan 2023 11:08:52 -0800 (PST)
Received: from mail-wr1-x42f.google.com (mail-wr1-x42f.google.com [IPv6:2a00:1450:4864:20::42f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1F91C1522A1 for <opsawg@ietf.org>; Mon, 9 Jan 2023 11:08:52 -0800 (PST)
Received: by mail-wr1-x42f.google.com with SMTP id r2so9238477wrv.7 for <opsawg@ietf.org>; Mon, 09 Jan 2023 11:08:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=kY0XlO5GBUIJQtwo9sZXBMuKEPKujS+ACo87ylDg0NM=; b=FpAvYKDvfEgQUsJtBAo3zHuwFFCvk2YCsQV6M8NfFi5y56d3T+cgfPfZx2O3kK6uyF Ku54EK8pXmr7dlRRfLPuF+EYS5QKYs0SkBbfva2GJf9b4TaHVjKPDw75gJT7SnmnrzYz oSARndgvU0n4aPdQXP5R0uV8dtdwIyeZiz1ODmSKcvJ79cbHyxgh6EViRzuitOqBg3NE DCT+9tjJl1px1IVOvajZdQDgknDvzvxtukKalv+uoOR+8QqD+agEKrthmf8b8ELvB/YP jr2svHbd8MmG059upCxpG9jDdB/oLkS2kGDjR6VM636EPeyHLyp8RgiHzUERsHptPMNz NSbw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=kY0XlO5GBUIJQtwo9sZXBMuKEPKujS+ACo87ylDg0NM=; b=kXsULaTecTdgY0s4z5AN5E73lmB8cwPJDtMfbC9KHJh8P+kNmV8F9+kW+lgIi6kVdM sTOYgWLimRnfRHeeEVjX+o04dovEYYN3wVtXQN05eOBiNacKfXkBUupHXv5++V9u4LWi kZeGCwFFrwuEzHAv9dPRfAArpotZ9578tJT1E+32iUY11qZwsCuYBB8zp7PQmfjkcefw XF11oVuiyI2W5AhETFIfRI34jcCMQL14SOZIXlWNEeCLBKou/VwOuMCRoErDFLYrgyKR E1mEBf5OCXOXwxg5mK+Go9sMsMSmjP1H0n+81WyRsISqUQwBI6hft5WpB/OwR77X0QsI BLXg==
X-Gm-Message-State: AFqh2kqTrhqJNv84o6mWr7S79TNPyJGM7QvoQL+ASOYTYhW4AP/XUXze 6PKK/T+JIiDIZhk4RTQ2FCma4hmop8vHYRVRQbXrOg==
X-Google-Smtp-Source: AMrXdXtDI7eYvpJvA/Yu53VxTHAgIkWWmICLlxljhfJxKk+7iJYN8+y3NI4RPYJD6kffRnFLzWt+/k9EFoy1AAC42HQ=
X-Received: by 2002:a5d:50ca:0:b0:2bc:841d:c9b0 with SMTP id f10-20020a5d50ca000000b002bc841dc9b0mr52528wrt.181.1673291330929; Mon, 09 Jan 2023 11:08:50 -0800 (PST)
MIME-Version: 1.0
References: <166879247786.62318.15372394698104176531@ietfa.amsl.com> <CAHbrMsCrCXe68f1YAH=p4vo7=ESuGUEjmAW+T6SovCMyhA75Gw@mail.gmail.com> <CAFpG3geKg8cfe8DXuXq3L-6ARAhUGD92E3zr3_6Aa3vNteMuPA@mail.gmail.com>
In-Reply-To: <CAFpG3geKg8cfe8DXuXq3L-6ARAhUGD92E3zr3_6Aa3vNteMuPA@mail.gmail.com>
From: Ben Schwartz <bemasc@google.com>
Date: Mon, 09 Jan 2023 14:08:39 -0500
Message-ID: <CAHbrMsCzHmaQVo80fhEMbapYNkjainyyim-ypgL_oGgzxwdsBQ@mail.gmail.com>
To: tirumal reddy <kondtir@gmail.com>
Cc: Linda Dunbar <linda.dunbar@futurewei.com>, secdir@ietf.org, draft-ietf-opsawg-mud-tls.all@ietf.org, last-call@ietf.org, opsawg@ietf.org
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="0000000000006950a205f1d97f45"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/80SuPBFuz4CbViW54b5tPwKJgJU>
Subject: Re: [OPSAWG] [secdir] Secdir last call review of draft-ietf-opsawg-mud-tls-10
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jan 2023 19:08:58 -0000

Thanks for addressing these issues, Tiru.  To confirm that this document
now reflects IETF consensus, I think it would be logical to send it to the
TLS WG (noting those changes) and confirm that it now has consensus there.

On Mon, Jan 9, 2023 at 1:07 AM tirumal reddy <kondtir@gmail.com> wrote:

> Hi Ben,
>
> I re-looked into the discussion in the TLS WG mailing list and we have
> addressed all the comments raised by the WG members.
>
> The issues raised by the TLS WG and addressed in the draft are:
>
> (a) We added Section 6 to explain the rules to processing the MUD (D)TLS
> rules to handle ossification and updated Section 10 to enable faster update
> to the YANG module.
> (b) Updates to the draft that the YANG module must not include GREASE
> values (see Section 5).
> (c) Privacy issues related to not revealing the MUD URL to an attacker is
> discussed in Section 9.
>
> Please let us know if you see any other pending issues.
>
> Cheers,
> -Tiru
>
> On Fri, 6 Jan 2023 at 21:43, Ben Schwartz <bemasc@google.com> wrote:
>
>> Since this happened to cross my inbox, I want to reiterate that, in my
>> view, this document has not been properly reviewed by the TLS WG.  As the
>> shepherd's writeup notes, previous reviews in the TLS group raised some
>> significant concerns about whether this draft's approach is advisable.
>>
>> I would encourage the responsible AD(s) to make sure that this document
>> has strong consensus support from the TLS WG before proceeding.
>>
>> On Fri, Nov 18, 2022 at 12:29 PM Linda Dunbar via Datatracker <
>> noreply@ietf.org> wrote:
>>
>>> Reviewer: Linda Dunbar
>>> Review result: Has Nits
>>>
>>> I have reviewed this document as part of the security directorate's
>>> ongoing
>>> effort to review all IETF documents being processed by the IESG.  These
>>> comments were written primarily for the benefit of the security area
>>> directors.
>>> Document editors and WG chairs should treat these comments just like any
>>> other
>>> last-call comments.
>>>
>>> This document extends the Manufacturer Usage Description specification to
>>> incorporate the (D)TLS profile parameters for a network security service
>>> to
>>> identify unexpected (D)TLS usage. The document has very good description
>>> of
>>> common malware behavior that is informative.
>>>
>>> Questions
>>> - Are the profile on the remote IoT device or on the network device? If
>>> the
>>> profile is on remote IoT devices, are those attributes in the profiles
>>> attached
>>> as metadata when requesting TLS connections? Are those attributes
>>> encrypted? -
>>> If the Malware on IoT doesn't participate in TLS, can those MUD be used
>>> to
>>> detect the Malware on the remote IoT devices?
>>>
>>> - Page 6, first paragraph says:
>>>  "malware developers will have to develop malicious agents per IoT
>>> device type,
>>>  manufacturer and model, infect the device with the tailored malware
>>> agent and
>>>  will have keep up with updates to the device's (D)TLS profile
>>> parameters over
>>>  time."
>>>
>>> Does it mean that if all the IoT devices deployed in the network
>>> register their
>>> DeviceType/ManufacturerName/Model with the network services, then the
>>> network
>>> services can validate the TLS requests from the IoT?
>>>
>>> -  Section 3 last paragraph says that "compromised IoT devices are
>>> typically
>>> used for launching DDoS attacks". Can today's TLS re-negotiation
>>> validate the
>>> TLS requests by evaluating if the server certificates are signed by the
>>> same
>>> certifying authorities trusted by the IoT device"?
>>>
>>> Thank you very much,
>>>
>>> Linda Dunbar
>>>
>>>
>>> _______________________________________________
>>> secdir mailing list
>>> secdir@ietf.org
>>> https://www.ietf.org/mailman/listinfo/secdir
>>> wiki: https://trac.ietf.org/trac/sec/wiki/SecDirReview
>>>
>>