Re: [pcp] Authentication scenarios (was Re: PANA implementatinos to consider)

Alper Yegin <alper.yegin@yegin.org> Mon, 17 September 2012 15:01 UTC

Return-Path: <alper.yegin@yegin.org>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CD6E21F86E2 for <pcp@ietfa.amsl.com>; Mon, 17 Sep 2012 08:01:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.47
X-Spam-Level:
X-Spam-Status: No, score=-102.47 tagged_above=-999 required=5 tests=[AWL=0.129, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3sPt726a01QN for <pcp@ietfa.amsl.com>; Mon, 17 Sep 2012 08:01:59 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.195]) by ietfa.amsl.com (Postfix) with ESMTP id AA3E721F86E1 for <pcp@ietf.org>; Mon, 17 Sep 2012 08:01:58 -0700 (PDT)
Received: from [192.168.2.5] (88.247.135.202.static.ttnet.com.tr [88.247.135.202]) by mrelay.perfora.net (node=mrus2) with ESMTP (Nemesis) id 0MSdem-1T3lST2hW8-00SFKR; Mon, 17 Sep 2012 11:01:54 -0400
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset="us-ascii"
From: Alper Yegin <alper.yegin@yegin.org>
In-Reply-To: <EAE3B73F-5957-4234-B8F5-13D04B0410B6@gmail.com>
Date: Mon, 17 Sep 2012 18:01:35 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <B7A36540-DC38-4F71-B31D-926E13A7B640@yegin.org>
References: <0MZjvC-1SyMXc0ZaA-00Lf23@mx.perfora.net> <F621C78A-2005-46E4-969C-DF25495A735A@yegin.org> <B860EA81-0451-4F26-BF46-382176DC9103@lilacglade.org> <6657E02B-2D08-40BE-A567-F8AB976F2741@yegin.org> <6F4080C4-A6E2-4FC0-9D3E-61992E86C22F@gmail.com> <040C6F6B-1884-49FD-B51C-E82F9F9772F4@yegin.org> <EAE3B73F-5957-4234-B8F5-13D04B0410B6@gmail.com>
To: Margaret Wasserman <margaretw42@gmail.com>
X-Mailer: Apple Mail (2.1278)
X-Provags-ID: V02:K0:1xvqHNyoi80ZYL3Y3g1yhcPSEDHYBzcg03fQLSNW7sn mdilgDsb3GaQTxzXIzobTB7rdOW3AYjT+9o7T0tjoZ15M+BO9Y rvjffDve1KTyQxuaK8Cs2X+LaiBaemQcPbEukDHyfF7e9GznnI 72wppP/TChNysMkIfzdjEsZM1lfLo7ASQLtWuV0atXDIm9abbI kkRJVAOa+z5sUchFVe21YnJNg6UBEEw4B0EGPW/rRA61exEDpi Ex/NJeAH1Kdwz/mWBHFrOi3NnkXIdf4dXztN+apRO3xYGtiHP/ 3JVur0dNvTbtn7aUK7Wev23tI/A/gyj/IfIrvkYIODBwFKPMx+ EvqOnY/k/2Bj6FPApUyLpBMdAIHvIklNC0A5nbwGxErKMIL67g es8fG5RfoUf9w==
Cc: pcp@ietf.org
Subject: Re: [pcp] Authentication scenarios (was Re: PANA implementatinos to consider)
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Sep 2012 15:01:59 -0000

Hi Margaret,

The simplest solution is to discover security policy along with the IP address of the PCP server.
After that point on, the client-side knows whether to engage authentication or not.

Alper



On Sep 17, 2012, at 3:55 PM, Margaret Wasserman wrote:

> 
> Hi Alper,
> 
> On Sep 17, 2012, at 4:02 AM, Alper Yegin wrote:
>> Few questions:
>> 
>> - Why is there an unauthenticated case? Or, under what real-life scenarios would authentication be necessary? And under what real-life scenarios would authentication be unnecessary? 
>> 
>> - If authentication is optional, is it client's preference to use it, or network's? Would client ever attempt to use it w/o knowing network's preference? Would it bail out if network does not support/use it? 
>> 
>> - Are we talking about optional to use or optional to implement? You mentioned "PCP Server that does not support authentication".
> 
> The scenarios under which authentication is needed are described in the Security Considerations section of the PCP base spec, and are reiterated at the beginning of draft-ietf-pcp-authentiction.
> 
> This authentication mechanism will be both optional to use and optional to implement -- the only mandatory-to-implement security mechanism is the "simple security model" described in the base spec Security Considerations section. The PCP base spec is currently with the IESG, about to be approved as a standards track RFC.  There have been several PCP base spec implementations tested at interop events, and we expect that there will be many PCP implementations that support the base PCP spec and do not support this (optional) authentication mechanism.  
> 
> So, our PCP authentication spec needs to consider the case where a PCP client that implements (and attempts to use) the authentication mechanism is talking to a server that doesn't even implement it.  The client needs to get a clear error in that case, so that it can pass a useful error to the user and/or take appropriate action.
> 
> If we go with a demux approach, the PCP server will receive a packet on the PCP port that appears to contain a PCP version number that isn't implemented by the server.  It would be interesting to know what existing PCP servers do in this case...  If they return a "unsupported version" error to the client, will the error message that is returned contain the version number from the original header sent in the client's request?  Or will it contain the server's highest supported PCP version?  In the latter case, the error would not be returned to the PANA client, it would be returned to the PCP Client (due to the overloading nature of your proposed demux scheme), and we need to explain how the PCP client will distinguish between the PCP server not implementing PANA and a real PCP version mismatch.  It is also quite unfortunate that the PCP Server is likely to log a "version mismatch" error, when that isn't an accurate reflection of what happened.  This type of problem is typical of cases where we overload fields in existing protocols to perform additional functions.
> 
> Margaret
> 
> 
> 
> 
> 
> 
> 
>