Re: [saag] Additions to RFC 3631?

Steven Bellovin <smb@cs.columbia.edu> Mon, 21 May 2012 14:01 UTC

Return-Path: <smb@cs.columbia.edu>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC6E021F8673 for <saag@ietfa.amsl.com>; Mon, 21 May 2012 07:01:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 644LG1vAo4rT for <saag@ietfa.amsl.com>; Mon, 21 May 2012 07:01:23 -0700 (PDT)
Received: from rambutan.cc.columbia.edu (rambutan.cc.columbia.edu [128.59.29.5]) by ietfa.amsl.com (Postfix) with ESMTP id DECA821F8681 for <saag@ietf.org>; Mon, 21 May 2012 07:01:22 -0700 (PDT)
Received: from [192.168.2.166] (74-92-112-54-Philadelphia.hfc.comcastbusiness.net [74.92.112.54]) (user=smb2132 mech=PLAIN bits=0) by rambutan.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id q4LE0rdX005191 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Mon, 21 May 2012 10:01:20 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset="us-ascii"
From: Steven Bellovin <smb@cs.columbia.edu>
In-Reply-To: <4FB9ECA4.3010904@gmail.com>
Date: Mon, 21 May 2012 10:01:19 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <D54BB652-9B1D-4A19-8F8F-AF288E4ADE24@cs.columbia.edu>
References: <300A2E9F-E99B-46FA-A101-E3611BD0D197@cs.columbia.edu> <877gw69h81.fsf@latte.josefsson.org> <4FB9ECA4.3010904@gmail.com>
To: Yaron Sheffer <yaronf.ietf@gmail.com>
X-Mailer: Apple Mail (2.1278)
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.5
Cc: Simon Josefsson <simon@josefsson.org>, IETF Security Area Advisory Group <saag@ietf.org>
Subject: Re: [saag] Additions to RFC 3631?
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 May 2012 14:01:23 -0000

As noted by others, RFC 4086 covers that.  It may also need improving; I haven't reread it recently.  However, even a pointer to it is out of place in 3631bis.  3631 is about protocol mechanisms; 4086 is about implementations.  Mouse Mouse's suggestions are more in the domain of 3365, which is security design philosophy.  3631 says "if you want to put security into a protocol, here are the best choices we have today".  My question is whether or not that list should be changed.

On May 21, 2012, at 3:20 04AM, Yaron Sheffer wrote:

> And a short section on crypto-grade random number generation. I would be glad to contribute it.
> 
> 	Yaron
> 
> On 05/21/2012 09:32 AM, Simon Josefsson wrote:
>> Steven Bellovin<smb@cs.columbia.edu>  writes:
>> 
>>> Does anyone have any suggestions for additions or corrections to RFC 3631?
>>> It looks to me like it's held up pretty well, save for newer versions of
>>> some of the protocols.
>> 
>> I think channel bindings ought to be discussed, as a simple way to bind
>> different layers together to avoid certain attacks.  It could be
>> discussed in the SASL or GSS-API section.  Further, I think EAP as a
>> protocol should be included in the list of standard security mechanisms.
>> 
>> /Simon
>> _______________________________________________
>> saag mailing list
>> saag@ietf.org
>> https://www.ietf.org/mailman/listinfo/saag
> 


		--Steve Bellovin, https://www.cs.columbia.edu/~smb