Re: [Secauth] Review request- secauth - authentication and authorization - second draft

Hosnieh Rafiee <hosnieh.rafiee@huawei.com> Tue, 16 September 2014 15:17 UTC

Return-Path: <hosnieh.rafiee@huawei.com>
X-Original-To: secauth@ietfa.amsl.com
Delivered-To: secauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54A221A070F for <secauth@ietfa.amsl.com>; Tue, 16 Sep 2014 08:17:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.853
X-Spam-Level:
X-Spam-Status: No, score=-5.853 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.652, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MIu-QiSJAecY for <secauth@ietfa.amsl.com>; Tue, 16 Sep 2014 08:17:08 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 038631A068A for <secauth@ietf.org>; Tue, 16 Sep 2014 08:17:07 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BJN13043; Tue, 16 Sep 2014 15:17:05 +0000 (GMT)
Received: from LHREML513-MBX.china.huawei.com ([10.201.4.199]) by lhreml402-hub.china.huawei.com ([10.201.5.241]) with mapi id 14.03.0158.001; Tue, 16 Sep 2014 16:17:01 +0100
From: Hosnieh Rafiee <hosnieh.rafiee@huawei.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Thread-Topic: [Secauth] Review request- secauth - authentication and authorization - second draft
Thread-Index: AQHP0Pjem6xKx/YzMUuAvU7OwT31FJwCResAgAATAxCAAOYdgIAAj5sA
Date: Tue, 16 Sep 2014 15:17:00 +0000
Message-ID: <814D0BFB77D95844A01CA29B44CBF8A7A362A6@lhreml513-mbx>
References: <814D0BFB77D95844A01CA29B44CBF8A7A29685@lhreml513-mbb.china.huawei.com> <53FDDDA2.3070607@freeradius.org> <814D0BFB77D95844A01CA29B44CBF8A7A2A44F@lhreml513-mbb.china.huawei.com> <7BAC95F5A7E67643AAFB2C31BEE662D01EE567EDFD@SC-VEXCH2.marvell.com> <000101cfc768$b26d56b0$17480410$@rozanak.com> <814D0BFB77D95844A01CA29B44CBF8A7A351FE@lhreml513-mbx> <54170A00.3060107@gmx.net> <814D0BFB77D95844A01CA29B44CBF8A7A35A41@lhreml513-mbx> <5417DAFB.4070905@gmx.net>
In-Reply-To: <5417DAFB.4070905@gmx.net>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.221.82.100]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: http://mailarchive.ietf.org/arch/msg/secauth/_po_UBXGxhiiTAg0rM4ugk2Yq5Q
Cc: "secauth@ietf.org" <secauth@ietf.org>
Subject: Re: [Secauth] Review request- secauth - authentication and authorization - second draft
X-BeenThere: secauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Omni-purpose Network-layer based Secure Authentication and Authorization non-working group discussion list <secauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secauth>, <mailto:secauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secauth/>
List-Post: <mailto:secauth@ietf.org>
List-Help: <mailto:secauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secauth>, <mailto:secauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Sep 2014 15:17:12 -0000

Hi Hannes,

Thanks again for sharing your inputs. Please find my responses inline..

> 
> An IPsec-based solution was developed in the 3GPP but the IETF solution
> uses digest authentication (a challenge-response mechanism similar to
> the one used in HTTP) combined with TLS between the proxy and the
> user's SIP UA.
> 
> You can see example call flows here: http://tools.ietf.org/html/rfc3665

I checked the RFC reference you have provided including RFC 3261 and RFC 2617 that discussed about HTTP digest. There are some problems:
1- MD5 is a weak hash function and no longer is recommended
2- section 26.4.3 RFC 3261 already discussed the problem with TLS
Another problem with TLS was already discussed in secauth requirement draft.

So it appears that this problem wasn't solved and still there. 

Some time ago I saw a draft but cannot find it... it was about SIP and IPsec... I guess (maybe I am confused with other work...)


> >
> >
> >> [hannes] Today this issue is solved by either connecting to the
> >> device in a special way (when you install it) and then provision
> your
> >> username/password or you use some other pairing procedure (such as
> >> entering info that is printed on the bottom of the device).
> >
> > The use of secauth doesn't necessarily reduce the need of passwords.
> > You can use two level authentication and authorization. The other
> case
> > is that what if you need to change your IP or other parameters?
> > Do you need to reconfigure manually? This is again what I plan to
> > address.
> 
> If you want to change configuration parameters in your home gateway
> then you need to log-in using the initially provisioned account
> credentials.
> Whether an IP address change requires you (as a user to actually take
> some actions) very much depends on the overall configuration.

As I explained before, secauth does not necessarily remove the requirement for the use of password but only aims to ensure that the user enters its password in a so called correct server/device. However, if user doesn't like to use password, then it can handle the communication in other ways that I do not want to jump to solution space. (however I have some solutions in my mind)


> This is certainly an interesting area of work but not an easy topic for
> the IETF since some of the mechanisms are outside the scope of the IETF
> itself (since they rely mostly on out-of-band channels with humans
> doing some stuff).

I am not quite agree with your sentence where you said it is out of scope of the IETF. This is because as long as we can use or offer something that reduce this human interaction with new or current available standards, then this is not something not achievable at IETF. Although, this is true that nobody can claim that we can completely remove the human interaction for the configurations. But there is a difference between having easy configuration than having complex configuration. In other word, to what level the human needs to interact. 


> You might want to take a brief look at these two documents and follow
> the references:
> http://tools.ietf.org/html/draft-gilger-smart-object-security-workshop-
> 02
> http://tools.ietf.org/html/draft-tschofenig-ace-overview-00

Thanks I will do it.

> 
> The ability for devices to connect to some cloud-based infrastructure
> is very common (and has been for a long time). I am not sure how common
> it is with washing machines that get connected to an app from a
> technician (if I understood it correctly). 

That article was more focused in someone remotely control home devices like a wash machine and also the information that a wash machine sent to the technical service to inform about its health. 
I imagine that when this is already implemented for a wash machine might exist for other devices as well and the main focus of that article was the privacy and security concerns.

>Maybe you want to clarify
> the interaction between the technical service app and the washing
> machine.

Ok, will do it. 

> >
> >> 3.4.  Verification of an App. to an App. Over the Network
> >>
> >> [hannes] I don't know a lot about these use cases since I did not
> >> follow the OpenFlow work. So, I will skip those.
> >>
> >
> > SDN/NFV are quite new and there are still working on progress for
> > their security. So secauth can be an answer to the authentication and
> > authorization.
> 
> Isn't SDN very much a network-operator internal aspect with pre-
> arranged trust relationships?

Not completely since the environment is more dynamic and needs more flexibility that wasn't require in the current infrastructure.