Re: [OPSAWG] Fwd: New Version Notification for draft-ietf-opsawg-mud-21.txt
Eric Rescorla <ekr@rtfm.com> Tue, 22 May 2018 12:52 UTC
Return-Path: <ekr@rtfm.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCC4712EB37 for <opsawg@ietfa.amsl.com>; Tue, 22 May 2018 05:52:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.608
X-Spam-Level:
X-Spam-Status: No, score=-2.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HZgKM6DJlU9H for <opsawg@ietfa.amsl.com>; Tue, 22 May 2018 05:51:58 -0700 (PDT)
Received: from mail-oi0-x232.google.com (mail-oi0-x232.google.com [IPv6:2607:f8b0:4003:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15EF712EB32 for <opsawg@ietf.org>; Tue, 22 May 2018 05:51:58 -0700 (PDT)
Received: by mail-oi0-x232.google.com with SMTP id k17-v6so16071006oih.5 for <opsawg@ietf.org>; Tue, 22 May 2018 05:51:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=pDfK0NCkARuoES8J9VsvCncor+UehAMIviFb/x3Umew=; b=SFz3mGmBW4zfbGK51Qd1jCLfZAoH56Klv3aT4ozIRTDmArbJbSzD2/xmA/pTVyHufi hCEhX3VYouGJh/AQcXRPfGHGuS15mXNRqBtyY3SMNevTtRd3/zaiDvLxbgypzihELMTD JK1+2ZLz8uGb4kAAzsiZ/a2CAroxRqYKJJ9WH4ToCvPSRFlvhOPv6yJfZZof4ZKWQipt OVFKh4w4nZYLMuj2xVqeAvhJAzq/05rubB7yfwmmvPIVL3Ujr9jeinnf8lE7d6fNpspG gCdvedHwSY0s/nTMKGwjtvpA7IjpZEntUSLLed9Xcecw9K88h2H48Sdfr4my++K+JFtX LBPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=pDfK0NCkARuoES8J9VsvCncor+UehAMIviFb/x3Umew=; b=qAioxVFPrKE5zGb5leYECSlUrI8Osyy+LotAVkLpaqDMV2DsqX/XYDXlEFyM9YHDD7 J+h2kROvdVArNNJHzrfWammyJUvjpVHyejZUvK0SfSgoxPaE/v1xNkwdJDXWcBPAUoNx K5be+mv+x7ZpEdMSQySif8CjrTBbsWxBxWXKuGB4j0e6Noj1xOKtfU3ZHHFTRGmM1hup 8gvvtQwbPnDymJAxTwPJNieDlPpIrrOK6Py5pLZ6Z28iVM3Zuo7bLJISPIMdkY3fCIh2 j9rsZQpnz27mccFBroedPyMdpXL+xfctMJi3d3GSi/HwoBM2UjEAaxGGLgqH9VlXZwiT UXjA==
X-Gm-Message-State: ALKqPwfdwgCV4wSJLmYEmoIG0oikQob9bp2Ol67i6iLRKxC41SXlyfIU /Zcvmh+OHXrgySiJEBeAy6DpAfBzs+nm5WzLsGlHew==
X-Google-Smtp-Source: AB8JxZpwgl4KP4rqwxsb3/+m6G5+XySyMkPLcgRjrWlaCkMv7S53EYQJ/6WoQQS23AT7oOCSc8txC3d6O4NY94zn3c0=
X-Received: by 2002:aca:5405:: with SMTP id i5-v6mr14327180oib.262.1526993517392; Tue, 22 May 2018 05:51:57 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.201.118.130 with HTTP; Tue, 22 May 2018 05:51:16 -0700 (PDT)
In-Reply-To: <7ed8a9c3-4b71-3b62-c722-9c9158fc27e9@cisco.com>
References: <152657039204.7694.840577957694607451.idtracker@ietfa.amsl.com> <8bafe1e0-12af-6526-d16e-6d39fded3bf3@cisco.com> <0dc704d2-73a2-977f-08c8-8e0b01c3b57c@cisco.com> <CABcZeBPgiSi7rxPwj9XPECcD1SimZ1B=Xnym5tXoUkASFD2TGg@mail.gmail.com> <998ca370-69b1-cd29-15d8-25d2e55459e1@cisco.com> <CABcZeBOqTQkqicN7exzk+_sqpYHAPx3TYa-BBF9uHj3qRafPqg@mail.gmail.com> <7ed8a9c3-4b71-3b62-c722-9c9158fc27e9@cisco.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Tue, 22 May 2018 05:51:16 -0700
Message-ID: <CABcZeBNy4wQe82-Pdjh23DoTWERM-ZGKh30G2g029jkkQC6hwA@mail.gmail.com>
To: Eliot Lear <lear@cisco.com>
Cc: Joe Clarke <jclarke@cisco.com>, "opsawg@ietf.org" <opsawg@ietf.org>, IESG <iesg@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002dc532056ccae26a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/EYTO-Nxd5bLASrTTfDyOR7g7OWc>
Subject: Re: [OPSAWG] Fwd: New Version Notification for draft-ietf-opsawg-mud-21.txt
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 May 2018 12:52:02 -0000
On Fri, May 18, 2018 at 12:52 PM, Eliot Lear <lear@cisco.com> wrote: > > > On 18.05.18 20:59, Eric Rescorla wrote: > > > > On Fri, May 18, 2018 at 11:56 AM, Eliot Lear <lear@cisco.com> wrote: > >> Hi EKR, >> >> >> On 18.05.18 19:57, Eric Rescorla wrote: >> > Eliot, > > The certificate part seems basically right (I think you >> should require specific KeyUsage bits). >> It's in there: >> >> It is expected that the Key Usage extension would contain "Digital >> Signature" and that the extended key usage would include either "code >> signing" or "email protection". >> >> >> This leaves a little a little flexibility. I think this is sufficient, >> and compatible with existing CAs. >> > > I disagree. This is going to lead to a lot of interop problems. You need > to actually specify the bits > > > > Do you mean something like this: > > The Key Usage Extension in the MUD file signature MUST have the bit > digitalSignature(0) or set. > Yes. Though I would defer to Russ on the bits :) > > Maybe I missed it, but I didn't see anything about the level of trust you should have in cases where you can't reliably tie the endpoint's transmissions to its certificate. It's there but could be clearer: OLD: A MUD manager MUST cease processing of that file it cannot validate the chain of trust to a known trust anchor until an administrator has given approval. NEW: A MUD manager MUST cease processing of that file it cannot validate the chain of trust to a known trust anchor or the MUDsigner until an administrator has given approval. That is- throw an exception and let the admin sort it out. This is about the file. I'm talking about IP/MAC forgery. OK. Noting that this is NOT an authentication standard, we can certainly reference them. I propose the following in Security Considerations: Devices may forge source (L2/L3) information. Deployments should apply appropriate protections to bind communications to the authentication that has taken place. For 802.1X authentication, IEEE 802.1AE (MACsec) is one means by which this may happen. A similar approach can be used with 802.11i (WPA2). Other means are available with other lower layer technologies. Implementations using session-oriented access that is not cryptographically bound should take care to remove state when any form of break in the session is detected. Comments I think the relevant point is: "Implementations SHOULD NOT grant elevated permissions (beyond those of devices presenting no MUD policy) to devices which do not strongly bind their identity to their L2/L3 transmissions" -Ekr
- [OPSAWG] Fwd: New Version Notification for draft-… Eliot Lear
- Re: [OPSAWG] Fwd: New Version Notification for dr… Joe Clarke
- Re: [OPSAWG] Fwd: New Version Notification for dr… Eliot Lear
- Re: [OPSAWG] Fwd: New Version Notification for dr… Joe Clarke
- Re: [OPSAWG] Fwd: New Version Notification for dr… M. Ranganathan
- Re: [OPSAWG] Fwd: New Version Notification for dr… Eliot Lear
- Re: [OPSAWG] Fwd: New Version Notification for dr… Joe Clarke
- Re: [OPSAWG] Fwd: New Version Notification for dr… Eric Rescorla
- Re: [OPSAWG] Fwd: New Version Notification for dr… Eliot Lear
- Re: [OPSAWG] Fwd: New Version Notification for dr… Eric Rescorla
- Re: [OPSAWG] Fwd: New Version Notification for dr… Eliot Lear
- Re: [OPSAWG] Fwd: New Version Notification for dr… Eric Rescorla
- Re: [OPSAWG] Fwd: New Version Notification for dr… Eliot Lear
- [OPSAWG] Fwd: New Version Notification for draft-… Eliot Lear