Re: [OPSAWG] Fwd: New Version Notification for draft-ietf-opsawg-mud-21.txt

Eric Rescorla <ekr@rtfm.com> Tue, 22 May 2018 12:52 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCC4712EB37 for <opsawg@ietfa.amsl.com>; Tue, 22 May 2018 05:52:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.608
X-Spam-Level:
X-Spam-Status: No, score=-2.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HZgKM6DJlU9H for <opsawg@ietfa.amsl.com>; Tue, 22 May 2018 05:51:58 -0700 (PDT)
Received: from mail-oi0-x232.google.com (mail-oi0-x232.google.com [IPv6:2607:f8b0:4003:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15EF712EB32 for <opsawg@ietf.org>; Tue, 22 May 2018 05:51:58 -0700 (PDT)
Received: by mail-oi0-x232.google.com with SMTP id k17-v6so16071006oih.5 for <opsawg@ietf.org>; Tue, 22 May 2018 05:51:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=pDfK0NCkARuoES8J9VsvCncor+UehAMIviFb/x3Umew=; b=SFz3mGmBW4zfbGK51Qd1jCLfZAoH56Klv3aT4ozIRTDmArbJbSzD2/xmA/pTVyHufi hCEhX3VYouGJh/AQcXRPfGHGuS15mXNRqBtyY3SMNevTtRd3/zaiDvLxbgypzihELMTD JK1+2ZLz8uGb4kAAzsiZ/a2CAroxRqYKJJ9WH4ToCvPSRFlvhOPv6yJfZZof4ZKWQipt OVFKh4w4nZYLMuj2xVqeAvhJAzq/05rubB7yfwmmvPIVL3Ujr9jeinnf8lE7d6fNpspG gCdvedHwSY0s/nTMKGwjtvpA7IjpZEntUSLLed9Xcecw9K88h2H48Sdfr4my++K+JFtX LBPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=pDfK0NCkARuoES8J9VsvCncor+UehAMIviFb/x3Umew=; b=qAioxVFPrKE5zGb5leYECSlUrI8Osyy+LotAVkLpaqDMV2DsqX/XYDXlEFyM9YHDD7 J+h2kROvdVArNNJHzrfWammyJUvjpVHyejZUvK0SfSgoxPaE/v1xNkwdJDXWcBPAUoNx K5be+mv+x7ZpEdMSQySif8CjrTBbsWxBxWXKuGB4j0e6Noj1xOKtfU3ZHHFTRGmM1hup 8gvvtQwbPnDymJAxTwPJNieDlPpIrrOK6Py5pLZ6Z28iVM3Zuo7bLJISPIMdkY3fCIh2 j9rsZQpnz27mccFBroedPyMdpXL+xfctMJi3d3GSi/HwoBM2UjEAaxGGLgqH9VlXZwiT UXjA==
X-Gm-Message-State: ALKqPwfdwgCV4wSJLmYEmoIG0oikQob9bp2Ol67i6iLRKxC41SXlyfIU /Zcvmh+OHXrgySiJEBeAy6DpAfBzs+nm5WzLsGlHew==
X-Google-Smtp-Source: AB8JxZpwgl4KP4rqwxsb3/+m6G5+XySyMkPLcgRjrWlaCkMv7S53EYQJ/6WoQQS23AT7oOCSc8txC3d6O4NY94zn3c0=
X-Received: by 2002:aca:5405:: with SMTP id i5-v6mr14327180oib.262.1526993517392; Tue, 22 May 2018 05:51:57 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.201.118.130 with HTTP; Tue, 22 May 2018 05:51:16 -0700 (PDT)
In-Reply-To: <7ed8a9c3-4b71-3b62-c722-9c9158fc27e9@cisco.com>
References: <152657039204.7694.840577957694607451.idtracker@ietfa.amsl.com> <8bafe1e0-12af-6526-d16e-6d39fded3bf3@cisco.com> <0dc704d2-73a2-977f-08c8-8e0b01c3b57c@cisco.com> <CABcZeBPgiSi7rxPwj9XPECcD1SimZ1B=Xnym5tXoUkASFD2TGg@mail.gmail.com> <998ca370-69b1-cd29-15d8-25d2e55459e1@cisco.com> <CABcZeBOqTQkqicN7exzk+_sqpYHAPx3TYa-BBF9uHj3qRafPqg@mail.gmail.com> <7ed8a9c3-4b71-3b62-c722-9c9158fc27e9@cisco.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Tue, 22 May 2018 05:51:16 -0700
Message-ID: <CABcZeBNy4wQe82-Pdjh23DoTWERM-ZGKh30G2g029jkkQC6hwA@mail.gmail.com>
To: Eliot Lear <lear@cisco.com>
Cc: Joe Clarke <jclarke@cisco.com>, "opsawg@ietf.org" <opsawg@ietf.org>, IESG <iesg@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002dc532056ccae26a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/EYTO-Nxd5bLASrTTfDyOR7g7OWc>
Subject: Re: [OPSAWG] Fwd: New Version Notification for draft-ietf-opsawg-mud-21.txt
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 May 2018 12:52:02 -0000

On Fri, May 18, 2018 at 12:52 PM, Eliot Lear <lear@cisco.com> wrote:

>
>
> On 18.05.18 20:59, Eric Rescorla wrote:
>
>
>
> On Fri, May 18, 2018 at 11:56 AM, Eliot Lear <lear@cisco.com> wrote:
>
>> Hi EKR,
>>
>>
>> On 18.05.18 19:57, Eric Rescorla wrote:
>> > Eliot, > > The certificate part seems basically right (I think you
>> should require specific KeyUsage bits).
>> It's in there:
>>
>> It is expected that the Key Usage extension would contain "Digital
>> Signature" and that the extended key usage would include either "code
>> signing" or "email protection".
>>
>>
>> This leaves a little a little flexibility.  I think this is sufficient,
>> and compatible with existing CAs.
>>
>
> I disagree. This is going to lead to a lot of interop problems. You need
> to actually specify the bits
>
>
>
> Do you mean something like this:
>
> The Key Usage Extension in the MUD file signature MUST have the bit
> digitalSignature(0) or set.
>

Yes. Though I would defer to Russ on the bits :)

> > Maybe I missed it, but I didn't see anything about the level of trust
you should have in cases where you can't reliably tie the endpoint's
transmissions to its certificate.
It's there but could be clearer:

OLD:

A
MUD manager MUST cease processing of that file it cannot validate the
chain of trust to a known trust anchor until an administrator has
given approval.


NEW:

A
MUD manager MUST cease processing of that file it cannot validate the
chain of trust to a known trust anchor or the MUDsigner until an
administrator has
given approval.


That is- throw an exception and let the admin sort it out.

This is about the file. I'm talking about IP/MAC forgery.


OK.  Noting that this is NOT an authentication standard, we can certainly
reference them.  I propose the following in Security Considerations:

Devices may forge source (L2/L3) information.  Deployments should apply
appropriate protections to bind communications to the authentication that
has taken place.  For 802.1X authentication, IEEE 802.1AE (MACsec) is one
means by which this may happen.  A similar approach can be used with
802.11i (WPA2).  Other means are available with other lower layer
technologies.  Implementations using session-oriented access that is not
cryptographically bound should take care to remove state when any form of
break in the session is detected.

Comments

I think the relevant point is:
"Implementations SHOULD NOT grant elevated permissions (beyond those of
devices presenting no MUD policy) to devices which do not strongly bind
their identity to their L2/L3 transmissions"

-Ekr