Re: [Rserpool] security review of enrp, asap, et al

Ran Canetti <canetti@csail.mit.edu> Sun, 22 June 2008 15:38 UTC

Return-Path: <rserpool-bounces@ietf.org>
X-Original-To: rserpool-archive@megatron.ietf.org
Delivered-To: ietfarch-rserpool-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 91DF03A6A0F; Sun, 22 Jun 2008 08:38:11 -0700 (PDT)
X-Original-To: rserpool@core3.amsl.com
Delivered-To: rserpool@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 41DCA3A6A27 for <rserpool@core3.amsl.com>; Mon, 16 Jun 2008 12:29:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6
X-Spam-Level:
X-Spam-Status: No, score=-6 tagged_above=-999 required=5 tests=[AWL=-0.200, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_SUB_RAND_LETTRS4=0.799]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id USezD0YlXGso for <rserpool@core3.amsl.com>; Mon, 16 Jun 2008 12:29:55 -0700 (PDT)
Received: from outgoing.csail.mit.edu (outgoing.csail.mit.edu [128.30.2.149]) by core3.amsl.com (Postfix) with ESMTP id A40043A68CE for <rserpool@ietf.org>; Mon, 16 Jun 2008 12:29:54 -0700 (PDT)
Received: from penguin.csail.mit.edu ([128.30.48.46]) by outgoing.csail.mit.edu with esmtps (TLSv1:AES256-SHA:256) (Exim 4.63) (envelope-from <canetti@csail.mit.edu>) id 1K8KPU-0003JX-J7; Mon, 16 Jun 2008 15:30:36 -0400
Received: from canetti (helo=localhost) by penguin.csail.mit.edu with local-esmtp (Exim 4.63) (envelope-from <canetti@csail.mit.edu>) id 1K8KPU-0007MX-GK; Mon, 16 Jun 2008 15:30:36 -0400
Date: Mon, 16 Jun 2008 15:30:36 -0400
From: Ran Canetti <canetti@csail.mit.edu>
To: rserpool@ietf.org
In-Reply-To: <Pine.LNX.4.64.0806161509520.26802@penguin.csail.mit.edu>
Message-ID: <Pine.LNX.4.64.0806161530250.26802@penguin.csail.mit.edu>
References: <Pine.LNX.4.64.0805040027090.18004@penguin.csail.mit.edu> <Pine.LNX.4.64.0806161509520.26802@penguin.csail.mit.edu>
MIME-Version: 1.0
X-Mailman-Approved-At: Sun, 22 Jun 2008 08:38:11 -0700
Cc: canetti@watson.ibm.com, secdir@mit.edu, Samuel Weiler <weiler+secdir@watson.org>
Subject: Re: [Rserpool] security review of enrp, asap, et al
X-BeenThere: rserpool@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Reliable Server Pooling <rserpool.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/rserpool>, <mailto:rserpool-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/rserpool>
List-Post: <mailto:rserpool@ietf.org>
List-Help: <mailto:rserpool-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rserpool>, <mailto:rserpool-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: rserpool-bounces@ietf.org
Errors-To: rserpool-bounces@ietf.org


On Mon, 16 Jun 2008, Ran Canetti wrote:

>
>
> I have been asked to review the revised versions of these documents (from May 
> 29). Of the concerns I raised in the original review blow, the second one was 
> addressed, by requiring authenticated communication. The first concern 
> (potential abuse of the system by a legitimate-but-savvy user or server) does 
> not seem to have been addressed. Note that this concern does not seem to be 
> solvable using standard authentication mechanisms (Such as TLS etc), since 
> the problem is not an authentication problem. One solution is proposed in my 
> note below. I'm sure other solutions exist as well.
>
> Also, regarding security threats 1 and 2: I'm not sure how mutual 
> authentication helps against a malicious ENRP server or a malicious PE.
> They can be completely authentic, yet malicious/hacked...

I meant threats 1 and 2 in the security considerations sections of the
asap and enrp documents. sorry for the inclarity.


>
> Hope this helps,
> Ran
>
>
>
> On Sun, 4 May 2008, Ran Canetti wrote:
>
>> 
>> 
>> *I have reviewed these documents as part of the security directorate's
>> *ongoing effort to review all IETF documents being processed by the
>> *IESG.  These comments were written primarily for the benefit of the
>> *security area directors.  Document editors and WG chairs should treat
>> *these comments just like any other last call comments.
>> 
>> 
>> I have been asked to review:
>>
>>            draft-ietf-rserpool-asap-19
>>            draft-ietf-rserpool-common-param-16
>>            draft-ietf-rserpool-enrp-19
>>            draft-ietf-rserpool-policies-08
>> 
>> Overall, the documents seem to be well presented and well organized.
>> The main comment I have is that I didnt see enough attention paid to 
>> potential attacks by legitimate pool users and/or pool members.
>> 
>> One issue is that legitimate users may choose to not follow the proposed 
>> policies regarding choice ofservers (namely, members in the pool).
>> If the "choose a member at random" policy is employed, then a pool user can 
>> always set its "random coices" so that it picks a partiuclar pool member. 
>> This bypasses the "load asharing" idea behind the policy.
>> another issue is that a pool member (or server) may report a wrong policy 
>> to a user.
>> 
>> The threats draft, draft-ietf-rserpool-threats I-D, does not seem to 
>> address such issues. However, I think these issues fit nicely within the 
>> scope of this protocol suite (if not here, then where else). In addition, 
>> there do exist simple ways to mitigate some attacks of this sort:
>> 
>> To mitigate the first attack, the protocol may require the pool user to 
>> "prove" to the pool member that the pool member was chosen "randomly", say 
>> by demonstrating that the random choice was the result of applying some 
>> hash function to a public nonce. Different methods may be appropriate for 
>> other member scheduling policies.
>> 
>> To mitigate the second attack, the protocol might require the pool server 
>> (or members) to sign the policy sent to the user, in a way that will allow 
>> the user to later hold the server accountable to the policy.
>> 
>> Best,
>> Ran
>> 
>> 
>
_______________________________________________
rserpool mailing list
rserpool@ietf.org
https://www.ietf.org/mailman/listinfo/rserpool