[RTG-DIR] RtgDir review : draft-ietf-lisp-sec-12

Manav Bhatia <manavbhatia@gmail.com> Wed, 17 May 2017 08:44 UTC

Return-Path: <manavbhatia@gmail.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFF0812942F; Wed, 17 May 2017 01:44:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.8
X-Spam-Level:
X-Spam-Status: No, score=-0.8 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VjscNFFPnf96; Wed, 17 May 2017 01:44:52 -0700 (PDT)
Received: from mail-oi0-x230.google.com (mail-oi0-x230.google.com [IPv6:2607:f8b0:4003:c06::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DBEFA126CD6; Wed, 17 May 2017 01:41:02 -0700 (PDT)
Received: by mail-oi0-x230.google.com with SMTP id w10so6785968oif.0; Wed, 17 May 2017 01:41:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=uDIShUAIv32qUL0X2ovq72NJsbtFJYtrJUSDTNuTamA=; b=sGjqDqS7ASBRTyIrgw4HY42tP+PialdqIqtgJxdMAnsQeBBXWv/u4lQgQPFtgbrC68 G9TOj/H+G8AYlacKuJGU27FMT4CxbtiFMOtAR1vjuw+oppy1LWe7aiUInMeQ2pojLovi mqozLGEvdlkP3WBKY5JOo4k5LjRNHScXDF88IuU/wiTI2LuOsmkWm21/kDIpeXGOCH1l 4AHsPblKcXu6XxGiU7urUpxla8xvI5mCM+Xp8F9GoW9+xYHOZjtoNmCTC30baZbCfCj6 juV4op5JheVMA7G+O3alD+nVM9U5RkTZ4SHIOoNmB64Fk4mVba+jHHPzXLMUsCGWAQTT K7vA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=uDIShUAIv32qUL0X2ovq72NJsbtFJYtrJUSDTNuTamA=; b=OgAUpGSepdIajxnFobt/vkZsRzTW5fK46ZkbQ5ZjFhJMKiUh7fWiC7mk2vNVTGdbHM jQ8BBHYFLYVglmAr9NzALqf44IoP4cVggfOvG5Om0yupqIu6HoCFHvZ+51a/7n2MHRYg jhMh64ZiBb5lj4fjSRF2HYbtr8zcfn5Oy6KyIaUliKjSNDLdOmOnDqodPgSID+rpdpie IQ0GdY3sYomBMSj+/wpiKu7FXuZES+OAUjAjQJLMT7ShMavWBcbVlROCYBRT7OHfunr0 Q5faZio+SZm74HyNl7/q0iZVcXHDua4efikGCBQkJ0theuLWY8kG5QMVTKZZTLASfB5+ WGFQ==
X-Gm-Message-State: AODbwcB9tUpTeXOydZowcRn2tnvzdimFMhXJI+zGys5UL8R/aEN3qyWz 4RRzCgRljEFy1MVGcP30QDVO3bin/Qsa
X-Received: by 10.202.224.198 with SMTP id x189mr1177910oig.213.1495010462252; Wed, 17 May 2017 01:41:02 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.157.29.166 with HTTP; Wed, 17 May 2017 01:41:01 -0700 (PDT)
From: Manav Bhatia <manavbhatia@gmail.com>
Date: Wed, 17 May 2017 14:11:01 +0530
Message-ID: <CAG1kdoiMwBNhkpTwvzx7vssuuvOboa3_MO8tEWkn31Sj0WWOnQ@mail.gmail.com>
To: "rtg-ads@tools.ietf.org" <rtg-ads@tools.ietf.org>
Cc: "rtg-dir@ietf.org" <rtg-dir@ietf.org>, draft-ietf-lisp-sec@ietf.org, lisp@ietf.org
Content-Type: multipart/alternative; boundary="001a113d343089c777054fb43f42"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-dir/56UuIoudr-5aUeqRhhK_MGJftzs>
Subject: [RTG-DIR] RtgDir review : draft-ietf-lisp-sec-12
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 May 2017 08:44:55 -0000

Hello,

I have been selected as the Routing Directorate reviewer for this draft.
The Routing Directorate seeks to review all routing or routing-related
drafts as they pass through IETF last call and IESG review, and sometimes
on special request. The purpose of the review is to provide assistance to
the Routing ADs. For more information about the Routing Directorate, please
see http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir

Although these comments are primarily for the use of the Routing ADs, it
would be helpful if you could consider them along with any other IETF Last
Call comments that you receive, and strive to resolve them through
discussion or by updating the draft.

Document: draft-ietf-lisp-sec-12

Reviewer: Manav Bhatia

Review Date: 17/05/2017
IETF LC End Date: Unknown
Intended Status: Experimental

Summary:

I have some minor concerns about this document that I think should be
resolved before publication.

Comments:

The draft describes the protocol mechanisms to secure LISP messages to
provide origin authentication, integrity and anti-replay protection. The
draft is very well written and readable even for someone who had never read
LISP documents before.

Major Issues:

None

Minor Issues:

1. All one time keys are exchanged by encrypting those using preconfigured
shared keys (PSKs).  This is done for messages exchanged between ITR and
the MapResolver and the ETR and the Map-Server. Given that the entire
security of the LISP domain falls on the PSK I found it rather strange that
the authors have not spent any time discussing on the crypto life cycle of
the PSKs. I would like to see some discussion on whether the PSKs should be
long lived and need to be changed or whether they exist till eternity. I
would presume that they should have a limited lifetime and may need to be
changed when an operator who had access to them leaves. It can be argued
that the user will never even know if an attacker has compromised the key
if it remains "passive" till the d-day. Frequent key changes will limit
potential damage from compromised keys.

Another threat against the long-lived key is that one of the systems
storing the key, or one of the users entrusted with the key, could get
subverted. So, while there may not be cryptographic motivations of changing
the keys, there could be system security motivations for rolling the key.

2. Has the WG considered using a Key Management protocol to dynamically
distribute the keys, instead of using the PSKs? Can the authors add some
text around that?

3. I am afraid I dont see how the messages are protected against the replay
attacks.

Thanks, Manav