Re: [Sat] WG Last Call for comments: draft-ietf-satp-architecture-02

Thomas Hardjono <hardjono@mit.edu> Tue, 12 March 2024 21:31 UTC

Return-Path: <hardjono@mit.edu>
X-Original-To: sat@ietfa.amsl.com
Delivered-To: sat@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DED4C14F6AC for <sat@ietfa.amsl.com>; Tue, 12 Mar 2024 14:31:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.004
X-Spam-Level:
X-Spam-Status: No, score=-2.004 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, TRACKER_ID=0.1, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mit.edu
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9_pSBNC_8M1p for <sat@ietfa.amsl.com>; Tue, 12 Mar 2024 14:31:38 -0700 (PDT)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2120.outbound.protection.outlook.com [40.107.244.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1B4DC14E513 for <sat@ietf.org>; Tue, 12 Mar 2024 14:31:38 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lu4f6aKYqIQw2PXFtE/KRs1MdBvkOHGDH/bt8FLpnBxDHLIH9mKF53vlnVekNRn7pWJKTJg+O6mNKnbRnzSEWpp/vPCLtotE8V6OPQpyfTl34PRujfXY6+KX4/J9hxrDYIA8IP/a5+Ln93IeEtrexKYTh+F2+lrPE4MHAlQo25IqmMj66oAb0/lrvRwVsW5a3lpN+RfsQOlucvsxVj6u6cbc+uGYbIqAu8OeBX2ZfdVc5moQEfBZNyXOASpwmRkWPQsb1YxUd4enw/wJjDOLlXaECE/HHINrJySuWdIRrlngCKuaHSeTs4WWprM6udmBQoOmJgaopGFEJZEnZfoyBA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y8qCZKY6TiIP0+feREAkPZh882ROCk7oAVU7WWlWx64=; b=kQwwyLPxgrytoLH9FcdvOKkuRC20JCgzR8sh6WhJZyKhL8uxYGr/1UAA75xH5+cqls6YtDS6j97MHgUKAVCAY9ppQvTPApjYC6xGC+mqJTIa0/zF8HVRmN7r8N26A50sMjYQX0RSdd+yx03SVjHPnMMMDV57RlgPz72wiiY1ALySammUKfP3sdXPweSlezWw6rivwvKOztzpaiOrWmRHO1T543GwHDfna5k7djK1M83+ynhCuxO69a2L2kXmDWklZg1t3o8WGVW3BJoxWE0/B05+NuYwFAuy6I+O/jy4JIUt02ssxL+rr9OQtQY7Z5C3blVyZUTvUCqTvcIdd16IHg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=mit.edu; dmarc=pass action=none header.from=mit.edu; dkim=pass header.d=mit.edu; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y8qCZKY6TiIP0+feREAkPZh882ROCk7oAVU7WWlWx64=; b=eGEwvkKM0kED4fsH9Xt5P3OAAAo+5VjXz16jHxikSFxZa50NGC6Gi0WYF0x6AgARkMj1AU7XgogBLr/jwyQ1GMG0NJSHd/SbGw4FrqFbSsio85Ha4r+Zjelp8rvzyj5gDCFvvwY1NAwi3b0pRMbotmjQGsxsP5qtF5+3fF5DdGU=
Received: from DM6PR01MB4395.prod.exchangelabs.com (2603:10b6:5:7a::16) by DM8PR01MB7030.prod.exchangelabs.com (2603:10b6:8:18::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12 Mar 2024 21:31:36 +0000
Received: from DM6PR01MB4395.prod.exchangelabs.com ([fe80::e4f9:514d:5169:6582]) by DM6PR01MB4395.prod.exchangelabs.com ([fe80::e4f9:514d:5169:6582%5]) with mapi id 15.20.7362.035; Tue, 12 Mar 2024 21:31:36 +0000
From: Thomas Hardjono <hardjono@mit.edu>
To: VENKATRAMAN RAMAKRISHNA <vramakr2@in.ibm.com>, "ladler2@bellatlantic.net" <ladler2@bellatlantic.net>, "sat@ietf.org" <sat@ietf.org>, Thomas Hardjono <hardjono@mit.edu>
Thread-Topic: [Sat] WG Last Call for comments: draft-ietf-satp-architecture-02
Thread-Index: AQHacitFHn4v6HjvmEq+STkh5S/wTLE0TICAgAAV3oCAABCZVIAAB4KAgAApJhs=
Date: Tue, 12 Mar 2024 21:31:36 +0000
Message-ID: <DM6PR01MB43950A5955A657343A6D4FF9CB2B2@DM6PR01MB4395.prod.exchangelabs.com>
References: <yblbk7nh517.fsf@wx.hardakers.net> <017d01da7498$6c7d8f70$4578ae50$@bellatlantic.net> <SJ0PR15MB513247E0DC4DBCC3EA3AB0DAB82B2@SJ0PR15MB5132.namprd15.prod.outlook.com> <DM6PR01MB439526AD9219E9F0D2806936CB2B2@DM6PR01MB4395.prod.exchangelabs.com> <SJ0PR15MB513284153249CD8875399553B82B2@SJ0PR15MB5132.namprd15.prod.outlook.com>
In-Reply-To: <SJ0PR15MB513284153249CD8875399553B82B2@SJ0PR15MB5132.namprd15.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=mit.edu;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM6PR01MB4395:EE_|DM8PR01MB7030:EE_
x-ms-office365-filtering-correlation-id: 424752cb-f363-4692-c32b-08dc42dbcbb0
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR01MB4395.prod.exchangelabs.com; PTR:; CAT:NONE; SFS:(13230031)(1800799015)(376005)(38070700009); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DM6PR01MB43950A5955A657343A6D4FF9CB2B2DM6PR01MB4395prod_"
MIME-Version: 1.0
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR01MB4395.prod.exchangelabs.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 424752cb-f363-4692-c32b-08dc42dbcbb0
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Mar 2024 21:31:36.2343 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3U1JWIxCmiJkY1LlVgs6TzNkXWa/UTRTa7bafMeUYvTLnYnGxdSlVxY0XxVyc2xqgeh1hzJkGLgi61RGSoA6HQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR01MB7030
Archived-At: <https://mailarchive.ietf.org/arch/msg/sat/0bVWm8vit869roPG2pnNmHARZFk>
Subject: Re: [Sat] WG Last Call for comments: draft-ietf-satp-architecture-02
X-BeenThere: sat@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "The purpose of this mailing-list is to discuss the secure asset transfer \(SAT\) protocol and related aspects." <sat.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sat>, <mailto:sat-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sat/>
List-Post: <mailto:sat@ietf.org>
List-Help: <mailto:sat-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sat>, <mailto:sat-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Mar 2024 21:31:42 -0000

Folks,

How’s about this text for an Appendix in the SATP-Architecture.  I’m thinking we should make each paragraph short, kind of like Appendix F in RFC5246.

Please feel free to suggest additional bullet points on attack points in the SATP protocol run.

--- --- --- ---
Appendix A: Security Analysis

The SAT protocol utilizes a TLS1.2 (TLS1.3) secure channel that must be establishes between the sender gateway (G1) and the receiver gateway (G2). The two gateways must first establish this secure channel in Stage-0 before they can proceed to execute the SAT protocol. This includes both gateways verifying all the relevant parameters required for their TLS1.2 session (e.g. correct TLS endpoints, certificate validation, identity validation, etc.).

Assuming the two gateways have established the secure channel and have proceeded to commence the SAT protocol, there are a number of possible attacks points within the SAT protocol run that may occur if one (or both) of the gateways are dishonest. Alternatively, an attacker may target one (or both) gateways by disrupting the message exchange between gateways G1 and G2.

(a) Multiple intentional aborts by the sender gateway G1:

A dishonest sender gateway G1 may purposely fail to continue the protocol run at certain crucial points.  One such crucial point is in Stage-3, where the gateway G1 is expected to transmit the Commit-Final Assertion message (3.5). If the gateway G1 intentionally fails to transmit this message, gateway G2 may conclude that the message has been lost and may proceed to reverse the temporary hold it has previously created (temporary asset mint in message 3.2).  Although this dishonest behavior by G1 does not cause asset damage to G2, it may exhaust computing resources at gateway G2. If network NW2 incurs transaction fees, such a reversal may be costly for gateway G2.


(b) Multiple intentional aborts by the receiver gateway G2:

In a similar manner, a receiver gateway G2 may also purposely fail to continue the protocol run at certain crucial points. One such point is in the Commit-Ready message (3.3) that it should transmit to G1 after receiving the commit prepare message (3.1) from G1. In this case, gateway G1 may conclude that the message is lost and simply abort the protocol run.


(c) Failure to transmit ACK-Final Receipt:

Another possible point of attack by a dishonest gateway G2 may occur by the gateway intentionally failing to transmit the ACK-Final-Receipt (3.7) in response to a the Commit-Final Assertion message (3.5) from gateway G1. Here, the senser gateway G1 may conclude that the message is lost and will assume that the transaction has reach finality in network NW2. The sender gateway G1 has retained the previous Lock-Assertion Receipt (2.4) in Stage-2 that was signed by G2, indicating that the gateway G2 has accepted the responsibility of ensuring that the asset-assignment (3.6) by G2 will be correctly executed. Failure by G2 to complete this task becomes a financial and legal liability for the owner of gateway G2.


(d) Other?

--- --- --- ---



--thomas




From: VENKATRAMAN RAMAKRISHNA <vramakr2@in.ibm.com>
Date: Tuesday, March 12, 2024 at 2:59 PM
To: Thomas Hardjono <hardjono@mit.edu>, ladler2@bellatlantic.net <ladler2@bellatlantic.net>, sat@ietf.org <sat@ietf.org>
Subject: RE: [Sat] WG Last Call for comments: draft-ietf-satp-architecture-02
FYI, we did discuss security threats a couple of months ago on this mailing list: https://mailarchive.ietf.org/arch/msg/sat/CPTQfYeEH0acV_5ryeBdCEPAD0c/. The outcome was that “12. Threat Model Considerations” was added to the architecture draft.

Rama

From: Thomas Hardjono <hardjono@mit.edu>
Sent: Wednesday, March 13, 2024 12:13 AM
To: VENKATRAMAN RAMAKRISHNA <vramakr2@in.ibm.com>; ladler2@bellatlantic.net; sat@ietf.org
Cc: Thomas Hardjono <hardjono@mit.edu>
Subject: [EXTERNAL] Re: [Sat] WG Last Call for comments: draft-ietf-satp-architecture-02

Thanks David and Rama, One useful analogy at the protocol level is to compare the function/purpose of the SATP protocol with the function/purpose TLS1. 2 protocol (RFC5246). The TLS1. 2 spec defines the behavior of the client/server to establish
ZjQcmQRYFpfptBannerStart
This Message Is From an External Sender
This message came from outside your organization.
    Report Suspicious  <https://us-phishalarm-ewt.proofpoint.com/EWT/v1/AdhS1Rd-!-HFV_fb-Xk972ls5DoWgMWW79oH20YfNH8hjCg3JlqiuFsXT2NITBT7QRPylcK8cqNSq3CDVQ6pUL0xR8KH4JB2dmkL9SjtYZgBubMWLl0x9qJWTlFfUIpU1ph2Fp4CrUIPjIw$>   ‌
ZjQcmQRYFpfptBannerEnd
Thanks David and Rama,

One useful analogy at the protocol level is to compare the function/purpose of the SATP protocol with the function/purpose TLS1.2 protocol (RFC5246).

The TLS1.2 spec defines the behavior of the client/server to establish keys amd secure session etc., but the RFC does not say _how_ to implement a TLS Server.  The server could be a standalone box, a microservice in a private cloud, or on a public cloud.  In each of these cases, the actual implementation quality and attack-resistance will vary.

Similarly, the SATP-Architecture and SATP-Core defines the behavior of gateways (which we call Client/Server in SATP-Core). It does not say how to implement a Gateway in a relatively attack-resistant manner.

A useful part of RFC5246  is its Appendix F (Security Analysis), which discusses some of the possible attacks and some strategies to counter them.  Even there, the Appendix does not explain how to implement against these attacks.

Perhaps SATP-Architecture (or SATP-Core) could be improved by adding an Appendix discussing the Security Threats.

What do folks think?


Best
--thomas



From: sat <sat-bounces@ietf.org<mailto:sat-bounces@ietf.org>> on behalf of VENKATRAMAN RAMAKRISHNA <vramakr2@in.ibm.com<mailto:vramakr2@in.ibm.com>>
Date: Tuesday, March 12, 2024 at 1:33 PM
To: ladler2@bellatlantic.net<mailto:ladler2@bellatlantic.net> <ladler2@bellatlantic.net<mailto:ladler2@bellatlantic.net>>, sat@ietf.org<mailto:sat@ietf.org> <sat@ietf.org<mailto:sat@ietf.org>>
Subject: Re: [Sat] WG Last Call for comments: draft-ietf-satp-architecture-02
David,

In my opinion, SATP doesn't require "everybody" to be honest, but just requires that each counterparty network be "collectively honest", i.e., maintain internal consistency and have the capacity to thwart insider Byzantine failures.

Further, if a gateway acts dishonestly, "honest" counterparty networks will be able to find out through an audit (which is not as satisfactory as a prevention, but it may be the best we can get in a completely decentralized setting.)

Your point about SATP coming under intense threat (and scrutiny, if it handles large-valued assets) is very well taken though. We do need to make the security assumptions and caveats crystal clear. IMO the design principle of network opacity as mentioned in Section 3.1 covers the point about collective network honesty as it tells users that, from SATP's perspective, the network is a unitary entity that has delegated asset transfer privileges to a gateway.

Rama

-----Original Message-----
From: sat <sat-bounces@ietf.org<mailto:sat-bounces@ietf.org>> On Behalf Of ladler2@bellatlantic.net<mailto:ladler2@bellatlantic.net>
Sent: Tuesday, March 12, 2024 9:45 PM
To: sat@ietf.org<mailto:sat@ietf.org>
Subject: [EXTERNAL] Re: [Sat] WG Last Call for comments: draft-ietf-satp-architecture-02

Hi:
  I have a problem with the architecture document because it contains only small sections related to security.
The SAT process will come under intense threat from external theft and internal fraud.
The architecture document focuses on a clean asset exchange where everyone is honest and uses well tested software.

I am not an expert on blockchain or related technologies so the experts in the WG should add to the architecture document the features necessary to deal with the threats.

Question:  Do we want to revisit the architecture document when the threats to the SAT process are enumerated?

David Millman

-----Original Message-----
From: sat <sat-bounces@ietf.org<mailto:sat-bounces@ietf.org>> On Behalf Of Wes Hardaker
Sent: Saturday, March 9, 2024 9:08 AM
To: sat@ietf.org<mailto:sat@ietf.org>
Subject: [Sat] WG Last Call for comments: draft-ietf-satp-architecture-02


Greetings all,

The authors have requested that draft-ietf-satp-architecture-02 be placed into WG last call and after a review by the chairs we agree it's ready to progress forward.  I have some personal comments that I'll submit during last call, but nothing substantive or process-problematic that should hold up it progressing.  Thus, we have changed the document's status to being in WG LC and have set a deadline of 4 weeks from now.  Thus, WG LC will end on April 6th, AOE (anywhere on earth).

We encourage all participants of the WG to read the document,  suggest any changes you feel are needed from simple editorial suggestions to calling out major issues you find with the document.  WG participants should also express their opinions about whether or not the document is ready to progress and you support it's publication.

All comments should be sent to the mailing list.

--
Wes Hardaker
USC/ISI

--
sat mailing list
sat@ietf.org<mailto:sat@ietf.org>
https://www.ietf.org/mailman/listinfo/sat

--
sat mailing list
sat@ietf.org<mailto:sat@ietf.org>
https://www.ietf.org/mailman/listinfo/sat

--
sat mailing list
sat@ietf.org<mailto:sat@ietf.org>
https://www.ietf.org/mailman/listinfo/sat