Re: [pcp] Posted auth req slide that was edited during meeting

<yoshihiro.ohba@toshiba.co.jp> Tue, 26 March 2013 03:22 UTC

Return-Path: <yoshihiro.ohba@toshiba.co.jp>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65A2421F891D for <pcp@ietfa.amsl.com>; Mon, 25 Mar 2013 20:22:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.089
X-Spam-Level:
X-Spam-Status: No, score=-6.089 tagged_above=-999 required=5 tests=[AWL=2.000, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_HI=-8, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id me8UNPwRnzUh for <pcp@ietfa.amsl.com>; Mon, 25 Mar 2013 20:22:26 -0700 (PDT)
Received: from imx12.toshiba.co.jp (imx12.toshiba.co.jp [61.202.160.132]) by ietfa.amsl.com (Postfix) with ESMTP id 232E621F890D for <pcp@ietf.org>; Mon, 25 Mar 2013 20:22:26 -0700 (PDT)
Received: from tsbmgw-mgw01.tsbmgw-mgw01.toshiba.co.jp ([133.199.232.103]) by imx12.toshiba.co.jp with ESMTP id r2Q3MNuR024583 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 26 Mar 2013 12:22:23 +0900 (JST)
Received: from tsbmgw-mgw01 (localhost [127.0.0.1]) by tsbmgw-mgw01.tsbmgw-mgw01.toshiba.co.jp (8.13.8/8.14.5) with ESMTP id r2Q3MNen032329; Tue, 26 Mar 2013 12:22:23 +0900
Received: from localhost ([127.0.0.1]) by tsbmgw-mgw01 (JAMES SMTP Server 2.3.1) with SMTP ID 254; Tue, 26 Mar 2013 12:22:23 +0900 (JST)
Received: from arc11.toshiba.co.jp ([133.199.90.127]) by tsbmgw-mgw01.tsbmgw-mgw01.toshiba.co.jp (8.13.8/8.14.5) with ESMTP id r2Q3MNlf032323; Tue, 26 Mar 2013 12:22:23 +0900
Received: (from root@localhost) by arc11.toshiba.co.jp id r2Q3MNJh011753; Tue, 26 Mar 2013 12:22:23 +0900 (JST)
Received: from ovp11.toshiba.co.jp [133.199.90.148] by arc11.toshiba.co.jp with ESMTP id NAA11752; Tue, 26 Mar 2013 12:22:23 +0900
Received: from mx.toshiba.co.jp (localhost [127.0.0.1]) by ovp11.toshiba.co.jp with ESMTP id r2Q3MMjI005813; Tue, 26 Mar 2013 12:22:23 +0900 (JST)
Received: from TGXML330.toshiba.local by toshiba.co.jp id r2Q3MMqq017498; Tue, 26 Mar 2013 12:22:22 +0900 (JST)
Received: from TGXML337.toshiba.local ([169.254.3.203]) by TGXML330.toshiba.local ([133.199.60.204]) with mapi id 14.02.0328.009; Tue, 26 Mar 2013 12:22:22 +0900
From: yoshihiro.ohba@toshiba.co.jp
To: hartmans@painless-security.com
Thread-Topic: [pcp] Posted auth req slide that was edited during meeting
Thread-Index: AQHOKcibZVo7fOcKTKW7xX5uXeSScpi3Pwtw
Date: Tue, 26 Mar 2013 03:22:22 +0000
Message-ID: <674F70E5F2BE564CB06B6901FD3DD78B12CE01AA@tgxml337.toshiba.local>
References: <341064315C6D0D498193B256F238CF9747C9C9@TK5EX14MBXW603.wingroup.windeploy.ntdev.microsoft.com> <5EF8B214-6563-47C7-9D48-621D9D5E1B29@yegin.org> <tslip4r42r3.fsf@mit.edu> <674F70E5F2BE564CB06B6901FD3DD78B12CD0A01@tgxml337.toshiba.local> <tslk3p4zyze.fsf@mit.edu> <674F70E5F2BE564CB06B6901FD3DD78B12CDB0CB@tgxml337.toshiba.local> <tsl620ox0zb.fsf@mit.edu> <674F70E5F2BE564CB06B6901FD3DD78B12CDB148@tgxml337.toshiba.local> <674F70E5F2BE564CB06B6901FD3DD78B12CDEA18@tgxml337.toshiba.local> <tslvc8e52al.fsf@mit.edu>
In-Reply-To: <tslvc8e52al.fsf@mit.edu>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
x-originating-ip: [133.196.20.101]
msscp.transfermailtomossagent: 103
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: pcp@ietf.org
Subject: Re: [pcp] Posted auth req slide that was edited during meeting
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Mar 2013 03:22:27 -0000

Sam,

-----Original Message-----
From: Sam Hartman [mailto:hartmans@painless-security.com] 
Sent: Tuesday, March 26, 2013 11:21 AM
To: ohba yoshihiro
Cc: pcp@ietf.org
Subject: Re: [pcp] Posted auth req slide that was edited during meeting

>>>>>   <yoshihiro.ohba@toshiba.co.jp> writes:

    > Can we take silence as agreement about re-auth to happen before
    > the SA expires?  Yoshihiro Ohba
I'm sorry; I missed this message somehow (my fault) and noticed it because you replied to it.

[YO] No problem.

When we were last conversing, we agreed that the attacks we were trying to prevent were a PCP client modifying mapping state after the SA has expired.

However,  I don't see how those attacks are  possible with either option
3 or 4.

Option 3 provides protected signaling of a re-auth request.
At worst, option 3 is no more secure than option 2.

Option 4  provides  protected signaling about potential server updates in an expired SA. However, the attacks we agreed are the ones of concern cannot happen with option 4 , because the client cannot change PCP state using an expired SA in that case.

[YO] If an SA is bidirectional, it is not possible to use the SA such that only one end of the SA can use it.  The following cases are logically possible:

- Both the client and server can use the expired SA.  This is an unacceptable option since client can modify the existing mapping.  This eliminates options 3 and 4.

- Neither the client or server can use the expired SA.  This eliminates options 3 and 4 as well.

If an SA is bidirectional this is not the case, but bidirectional SA for PCP will add more complexity with little benefit and is not a viable option.


My preference list of options is 4, 3, 2, 1, your modified option 1.
The reason I dislike your modified option is that it's not clear when a client or server should offer re-authentication in that case, so I believe that your proposal will lead to less interoperability than option 1.
[YO] Options 3 and 4 can be logically eliminated for the reasons I explained above.  Option 2 (unprotected notice from server about need for re-auth) is vulnerable to false re-auth trigger attack that I mentioned last year (http://www.ietf.org/mail-archive/web/pcp/current/msg02668.html for example).  Option 1 and modified option 1 are not different in that both do not prohibit the client to initiate re-aut, and I don't see any interoperability issue for allowing both entities to initiate re-auth especially when using PANA.  Can you elaborate?

Prior to the meeting, I believe that we had ruled out option 1 and 4 and had a consensus on the list that was ambiguous between option 2 and 3.
At the meeting Stuart asked to re-open option 4.
My assumption is that Stuart probably also considers option 4 most preferred.

[YO] My understanding is the option 4 is the "starting point".  Since I found a problem with option 4, I argue here.

Regards,
Yoshihiro Ohba

--Sam