Re: [pcp] PANA misconceptions (was Re: CONSENSUS CALL on PCP security)

Rafa Marin Lopez <rafa@um.es> Sun, 21 July 2013 23:44 UTC

Return-Path: <rafa@um.es>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08B5721F96A7 for <pcp@ietfa.amsl.com>; Sun, 21 Jul 2013 16:44:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level:
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GH3ETfZwytIs for <pcp@ietfa.amsl.com>; Sun, 21 Jul 2013 16:43:53 -0700 (PDT)
Received: from xenon14.um.es (xenon14.um.es [155.54.212.168]) by ietfa.amsl.com (Postfix) with ESMTP id BC6E421F8749 for <pcp@ietf.org>; Sun, 21 Jul 2013 16:43:52 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by xenon14.um.es (Postfix) with ESMTP id C83D25D4D5; Mon, 22 Jul 2013 01:43:50 +0200 (CEST)
X-Virus-Scanned: by antispam in UMU at xenon14.um.es
Received: from xenon14.um.es ([127.0.0.1]) by localhost (xenon14.um.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP id Phtk+W-qwYDY; Mon, 22 Jul 2013 01:43:49 +0200 (CEST)
Received: from [192.168.1.67] (188.Red-79-159-149.staticIP.rima-tde.net [79.159.149.188]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: rafa) by xenon14.um.es (Postfix) with ESMTPSA id 3A6415D4D2; Mon, 22 Jul 2013 01:43:45 +0200 (CEST)
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: multipart/alternative; boundary="Apple-Mail-1-1006033373"
From: Rafa Marin Lopez <rafa@um.es>
In-Reply-To: <9374F3A019050A4C805B8DEF27285BE40115E08BCF@LWLMBX01.olympus.F5Net.com>
Date: Mon, 22 Jul 2013 01:43:44 +0200
Message-Id: <AB4765D1-92E2-4FFD-8C00-982DC17F5B45@um.es>
References: <c91bb8469abe4b079e46454e022546e6@BY2PR03MB269.namprd03.prod.outlook.com> <9374F3A019050A4C805B8DEF27285BE40115E075A9@LWLMBX01.olympus.F5Net.com> <839332CA-66AD-48A5-AF0E-7AAD1964FE5F@yegin.org> <9374F3A019050A4C805B8DEF27285BE40115E08503@LWLMBX01.olympus.F5Net.com> <76B8454D-73F0-4E3D-81A6-55F121535901@um.es> <9374F3A019050A4C805B8DEF27285BE40115E08BCF@LWLMBX01.olympus.F5Net.com>
To: Ben McCann <B.McCann@F5.com>
X-Mailer: Apple Mail (2.1085)
Cc: pcp@ietf.org
Subject: Re: [pcp] PANA misconceptions (was Re: CONSENSUS CALL on PCP security)
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Jul 2013 23:44:00 -0000

Hi Ben:

On Jul 19, 2013, at 2:55 AM, Ben McCann wrote:

> Hi Rafa,
> 
> I incorrectly used a discussion about the suitability of the OpenPANA  implementation as an argument to defend my statement "EAP-in-PCP provides a clean slate that's unencumbered by the design decisions and assumptions of an existing protocol (PANA).". That argument was a waste of time because the suitability or availability of a reference implementation is irrelevant to whether PANA was designed with a set of security considerations that are appropriate for PCP. This understanding of the security considerations is the "clean slate" that is important to me.

[Rafa] I must say I am a little bit confused about your general line of thoughts here. You started your arguments first saying about PANA is not mobile-friendly, then PANA consumes resources and then implementation problems or the liveliness test. Those are clearly misconceptions about PANA that we have clarified. Now, "clean slate" is regarding security considerations. Ok, let us discuss about security, but you may agree with me that this line of arguments might be a little bit confusing. 

> 
> For example, PANA negotiates its own security association so it can provide data integrity for the final EAP response packet.
> That's fine, but where have we decided that PCP needs to secure the integrity of that response packet? (It probably should).

[Rafa] The main purpose of the PANA SA does not have anything to do with protecting the final EAP response packet. As many security protocols, it provides key confirmation to bind authentication with the exported key material by EAP. This  is a cryptographic binding between the two layers. This ensures that same two entities participate not only performing EAP but also the EAP lower-layer protocol. This is useful to avoid man-in-the-middle attacks. Moreover it serves to avoid the attack you mention about ciphersuite and authentication parameters below (see how PANA generates the PANA_AUTH_KEY). 

> PANA does not secure the earlier EAP packets that carry parameters like the cipher suite selection or authentication parameters for the selected EAP method. So, those could be compromised by an attacker. Where have we decided that this is an acceptable risk for PCP?

[Rafa] If you don't have any keys.... how are you supposed to protect anything?  If we assume we are performing EAP for authentication and key management, we will not have any key material exported to any EAP lower-layer (e.g. PCP or PANA) until EAP is successfully finished at the end.  Moreover EAP is designed to operate with no security assumption in the lower-layer. 
 
> We haven't discussed that, but we implicitly agree to live with it if we move forward with PANA. (Or, at least, we accept that risk with some EAP methods).

[Rafa] See my comment above, there is no such a risk. Btw, what EAP methods are you referring to? As I said EAP is designed to operate with no security.

> 
> I prefer EAP-in-PCP because it will make us think through those issues for PCP. (We've made a good start in the auth requirements draft).

[Rafa] About simplicity, how about this? Let assume that the only thing you have to worry about at PCP level is to manage a pre-shared key between PCP client and PCP server. That is simple, don't you think?

> Until we get those requirements down, I think it's premature to decide PANA is the right choice.

[Rafa] Then, do you think the consensus call is too premature? 

> It might be, if we agree that PANA's security considerations are OK for PCP. Or, we could decide that a simple EAP-in-PCP transport w/o *any* security association is sufficient because we can leverage the security properties of EAP methods such as EAP-TTLS to achieve the data integrity required for the EAP protocol.

[Rafa] Either or I don't understand your point or I think there is some confusion about EAP and its layers (see Fig. 1 and 2 in RFC 3748) EAP-TTLS is a method and it will export keys to the EAP lower-layer . Why do you relate EAP-TTLS with the protection of the EAP protocol ?

In this regard, I also think there is a general misconception about EAP. For example, people may think that this is just tunneling EAP in PCP (I think you even mentioned this in a previous e-mail). But it is not. RFC 3748 defines requirements for a correct EAP lower-layer. If we transport EAP in PCP , PCP will become an EAP lower-layer according to the EAP standard. Consequence is PCP has to follow requirements imposed by RFC 3748 and RFC 5247 to be a correct EAP lower-layer. In other words, this means we will have to define a new EAP lower-layer and to follow the same path we already followed with PANA which is a RFC now. In other words, we are essentially re-inventing the wheel (I say this based also on experience since, at research level, I have tried to design different EAP lower-layers... EAP-in-X, EAP-in-Y, etc...). I would appreciate if you could read this link I sent to the list about this aspect:  http://www.ietf.org/mail-archive/web/pcp/current/msg02349.html

The usage of PANA avoids to include all these aspects in PCP itself (PANA already does it), and as a consequence the PCP security would be simplified a lot.

> 
> I'm vacation for two weeks and won't be in Berlin to continue this discussion face-to-face.

Enjoy your vacations!

> 
> -Ben McCann
> 
> -----Original Message-----
> From: Rafa Marin Lopez [mailto:rafa@um.es] 
> Sent: Thursday, July 18, 2013 5:31 PM
> To: Ben McCann
> Cc: pcp@ietf.org
> Subject: Re: [pcp] PANA misconceptions (was Re: CONSENSUS CALL on PCP security)
> 
> Hi Ben:
> 
> On Jul 18, 2013, at 7:00 PM, Ben McCann wrote:
> 
>> Thank you for clarifying that "PANA does not force clients to always have a session, or always stay awake or connected".
>> 
>> That, I believe, wasn't Margaret's point. PANA *supports* server side re-authentication even if the client doesn't think it's necessary. So, if the server chooses, it can wake up the client by sending packets. That said, this really isn't a legitimate criticism of the PANA protocol. It's an issue that can be addressed by proper programming or configuration of the PCP/PANA server to make sure it doesn't unnecessarily re-authenticate the clients. 
>> 
>> So, I agree with you that PANA, on a properly configured server, can be as "mobile friendly" and lightweight as EAP-in-PCP. 
>> 
>> 
>> My concerns about starting from a clean slate are based, in part, on Steve Hartman's "Implementation Analysis: strong preference for PCP-specific approach" (http://www.ietf.org/mail-archive/web/pcp/current/msg02324.html). His arguments were persuasive (to me) and the counter-arguments were not. 
> 
> [Rafa] Why my answers in http://www.ietf.org/mail-archive/web/pcp/current/msg02349.html are not ok?
> 
>> 
>> I understand that implementation should not dictate protocol design but I think we should let implementation *inform* protocol design. If I have to select between two ways to define a protocol, and one of them is simpler to implement, then I will tend to vote for the simpler option if all other criteria are equal. I see EAP-in-PCP as the simpler option even if there is source code for PANA.
>> 
>> I've also reviewed the OpenPANA source code and I have some concerns that illustrate this point:
>> 
>> * The PANA state machine includes 13 states with 22 separate input events. That state machine has to be integrated with the simpler PCP state machine. My intuition, based on too many years of experience, is that integrating the PANA and PCP state machines is tricky to implement, debug, and verify. That complexity is, in part, because PANA already has a fairly complex state machine. I don't believe EAP-in-PCP requires this much complexity.
> 
> [Rafa] Ben, I have always assumed we all have experience in the area. In particular, I have been working on PANA since 2003 and I have done source coding myself, I have been leading an open source PANA implementation and deployed PANA in several EU projects,  without any inconvenience so far.
> 
> About the state machine, I can tell you that part of it is completely optional. 
> 
> And about the integration between PANA and PCP, I disagree based on the experience we got from http://www.ietf.org/proceedings/86/slides/slides-86-pcp-17
> 
>> 
>> * The OpenPANA implementation is about 6900 SLOCs long as measured by an sloccount version 2.26. This seems like a lot of code (aka complexity) to tunnel EAP packets over PCP. And, that doesn't include the code that must be added to PCP required to integrate PCP with PANA. I believe an EAP-in-PCP implementation will be much simpler but, I admit, I don't have an implementation to show you that proves that point.
> 
> [Rafa] This number is completely wrong as I already explained in http://www.ietf.org/mail-archive/web/pcp/current/msg02631.html (as you may observe this is a repeating conversation). You may agree with me that doing the sloccount  over the entire package does not help too much. We need to be more specific.
> 
> In the message I already sent, the discussion was about openpana-0.2.3. Right now, we have openpana-0.2.4 and we have new values. The following values only show the LoC dedicated to PANA, not to EAP ST, EAP-Method or RADIUS client since those values will be common to any other solution using EAP and RADIUS.
> 
> OpenPANA:
> 
> The PAA:
> 
> 3130 LoC (PAA ST + PAA main program + PANA messages + PAA session + PRF)
> 
> The PaC
> 
> 2720 (PaC ST + PaC main + PANA messages + PaC session + PRF)
> 
> It is worth noting that those values includes 1846 LoCs which are common functionality to PaC and PAA.
> 
> Moreover, as I also explained in the e-mail we have a version for very constrained devices (sensor nodes). In particular we have a PaC implementation for Contiki OS named PANATIKI (http://sourceforge.net/projects/panatiki) and the values are: 
> 
> PANATIKI : 517 (PaC state machine) + 141 (PaC main program)
> 
> But again, please take into account this is just an open source implementation and not a product. And, of course, running code is absolutely better than no code.
> 
> Regarding your comment "And, that doesn't include the code that must be added to PCP required to integrate PCP with PANA", please see slide 12 in http://www.ietf.org/proceedings/86/slides/slides-86-pcp-17  .  Just a 100 lines that includes "PCP Key derivation and export. Unix Sockets."  in the case of OpenPANA.
> 
> 
>> 
>> * The presence of an open source version of PANA is a vote in its favor but that depends on whether that code is easily portable to many environments. I think the OpenPANA implementation makes assumptions about its runtime environment that aren't very portable. It assumes a multi-threaded environment with posix sockets and my runtime environment doesn't meet those requirements.
> 
> [Rafa] For example, PANATIKI does not assume multi-threaded environment with posix sockets (it is an implementation for a sensor node after all). Btw, there are two open source implementations OpenPANA/PANATIKI and CPANA.
> 
>> 
>> To be fair, I don't think I've said anything here that wasn't already covered by Steve Hartman. But, I did review the code and I agree with his conclusions.
> 
> [Rafa] As you can see, I already counter-argumented that analysis. In any case, I will be in Berlin so any doubt you have about OpenPana/PANATIKI or just implementating PANA, let me know and I will be more than happy to meet and discuss.
> 
> Best regards.
> 
>> 
>> -Ben McCann
>> 
>> -----Original Message-----
>> From: Alper Yegin [mailto:alper.yegin@yegin.org]
>> Sent: Thursday, July 18, 2013 4:34 AM
>> To: Ben McCann
>> Cc: Dave Thaler; pcp@ietf.org
>> Subject: PANA misconceptions (was Re: [pcp] CONSENSUS CALL on PCP 
>> security)
>> 
>> Hello,
>> 
>> I'm afraid your below issues are based on misconceptions introduced by the http://www.ietf.org/proceedings/85/slides/slides-85-pcp-17.pdf slides.
>> We did address those misconceptions in several rounds, but it seems like some still linger.
>> 
>> PANA does not force clients to always have a session, or always stay awake or connected.
>> 
>> If a client wants to get authenticated and generate a 5 minute key, and afterwards sleep, detach, etc., it can very well do that using PANA.
>> We can support that by simply setting the lifetime of the PANA SA to that short fix value, or letting the PANA SA timeout and expire. 
>> So, you can run PANA and have a 5 min SA, then have no PANA activity for 23:55hrs, and then come back and do another PANA authentication and have another 5min SA. No problems.
>> 
>> Therefore, there are no issues with mobile, and no issues with server side resources.
>> 
>> After all, PANA is adopted by Zigbee Alliance. I don't think the deployment cases considered here are any more constrained than theirs...
>> 
>>> EAP-in-PCP provides a clean slate that's unencumbered by the design decisions and assumptions of an existing protocol (PANA). 
>> 
>> 
>> Was there any other concern leading to your above statement?
>> 
>> Alper
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> On Jul 17, 2013, at 10:20 PM, Ben McCann wrote:
>> 
>>> 1) Could you *live with* EAP-in-PCP? If not, state reason you would object.
>>> 
>>>  YES
>>> 
>>> 2) Could you *live with* PANA? If not, state reason you would object.
>>> 
>>>  Yes, but we really rather not use PANA. See below...
>>> 
>>> 3) If you said yes to both 1 and 2, but have a strong preference between the two, which approach do you prefer and why?
>>> 
>>> We strongly prefer EAP-in-PCP for several reasons:
>>> 
>>> * PANA, as we understand it, is not mobile-friendly. It requires the PCP client to *always* have an authenticated session active and that is wasteful on mobile clients when the authentication rekey interval is much shorter than the mapping lifetime. Margaret Wasserman captured this in slides 13 and 14 of her presentation http://www.ietf.org/proceedings/85/slides/slides-85-pcp-17.pdf. We believe the *client* should decide when to authenticate (because it needs to create or refresh a mapping) because that lets the client optimize its use of the network and reduce its power consumption. 
>>> 
>>> We understand that a PCP server may need to send a message to the client when no authenticated session is active. If no authenticated session is active then we prefer the server send an UN-authenticated "call home" message directing the client to authenticate and then the server can send its messages over the authenticated channel. We recognize an attacker can induce the client to connect to the server by forging an unauthenticated "call home" message. But, having done that, the client can ignore subsequent forged call home messages because it will already have an authenticated session. Worse case, an attacker can't make EAP-in-PCP consume any more client resources than PANA does because PANA requires the client to always have an authenticated session available.
>>> 
>>> * PANA requires more server side resources. The authentication protocol should efficiently support 100,000's of clients on a large PCP server. Why should the server continuously maintain authenticated sessions with *every* client? Clients using 24 hour mapping lifetimes can be served by short authentication key lifetime like, for example, 5 minutes. Let the client connect, authenticate, program the mappings, and then let the authenticated session expire. Rinse and repeat in 24 hours,. Client-driven authentication via EAP-in-PCP requires less resources on the server because the server can discard the authenticated session state once the key lifetime expires.
>>> 
>>> There was some discussion that PANA is preferable to EAP-in-PCP because it supports "liveness testing". We don't believe liveness testing is useful when the server resources consumed, per client, are PCP mappings. Checking the liveness of 100,000 clients is much more resource intensive on the server than just keeping the client's mappings around until they expire naturally at the end of their lifetime. In short, we believe EAP-in-PCP will scale better on the server than PANA.
>>> 
>>> * We believe the decision to use EAP-in-PCP vs. PANA is a choice between designing and implementing an EAP-in-PCP transport that is tailored for PCP versus adapting an existing protocol (PANA) to fit the needs of PCP.  We don't think implementing an EAP-in-PCP transport is difficult so we prefer it over PANA. EAP-in-PCP provides a clean slate that's unencumbered by the design decisions and assumptions of an existing protocol (PANA). 
>>> 
>>> -Ben McCann
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> pcp mailing list
>>> pcp@ietf.org
>>> https://www.ietf.org/mailman/listinfo/pcp
>> 
>> _______________________________________________
>> pcp mailing list
>> pcp@ietf.org
>> https://www.ietf.org/mailman/listinfo/pcp
> 
> -------------------------------------------------------
> Rafael Marin Lopez, PhD
> Dept. Information and Communications Engineering (DIIC) Faculty of Computer Science-University of Murcia
> 30100 Murcia - Spain
> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
> -------------------------------------------------------
> 
> 

-------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and Communications Engineering (DIIC)
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
-------------------------------------------------------