[secdir] Secdir review of draft-ietf-intarea-broadcast-consider-05

Vincent Roca <vincent.roca@inria.fr> Fri, 05 January 2018 13:26 UTC

Return-Path: <vincent.roca@inria.fr>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69622127010; Fri, 5 Jan 2018 05:26:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level:
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ITkpuW_ZhmIb; Fri, 5 Jan 2018 05:26:09 -0800 (PST)
Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 930EE126DC2; Fri, 5 Jan 2018 05:26:05 -0800 (PST)
X-IronPort-AV: E=Sophos;i="5.46,318,1511823600"; d="scan'208,217";a="307781731"
Received: from dom38-1-82-236-155-50.fbx.proxad.net (HELO [192.168.1.112]) ([82.236.155.50]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Jan 2018 14:26:03 +0100
From: Vincent Roca <vincent.roca@inria.fr>
Content-Type: multipart/alternative; boundary="Apple-Mail=_D6A7D508-0DB2-4665-A1BC-9FEE4D090177"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Message-Id: <383EA7C8-CFF0-48AF-AD0C-840545483E94@inria.fr>
Date: Fri, 05 Jan 2018 14:26:02 +0100
To: IESG <iesg@ietf.org>, secdir@ietf.org, draft-ietf-intarea-broadcast-consider.all@ietf.org
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/06xz1bCg4RlhEWRTTiyN8GjZakI>
Subject: [secdir] Secdir review of draft-ietf-intarea-broadcast-consider-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jan 2018 13:26:12 -0000

Hello,

I have reviewed this document as part of the security directorate’s ongoing
effort to review all IETF documents being processed by the IESG. These
comments were written primarily for the benefit of the security area
directors.  Document editors and WG chairs should treat these comments just
like any other last call comments.

Summary: Ready with issues

This document lists recommendations concerning the use of
broadcast/multicast traffic from a privacy point of view, which is
highly valuable. However I have a certain number of comments.
(sorry if my email is a bit long…)


Main comments:

1) First of all, the focus of this document looks ambiguous.
The title refers to "IP broadcast and multicast protocol designers"
which I can understand as those low level protocols for IP broadcast
and multicast (e.g., IGMP, MLD, and why not various multicast routing
protocols, etc.). On the opposite, the abstract restricts the focus:
"application-layer protocols make use of IP broadcasts or multicast
messages" (1st sentence). Then, when reading the document, I sometimes
understand that it could also consider lower layer protocols. This
should be clarified.

Also, instead of "designers of broadcast/multicast protocols" I'd
rather say "designers of protocols relying (in parts or totally) on
broadcast/multicast traffic". This applies to the title (in a
condensed version) and throughout the core of the document.


2) Another point: I'd like to see the item (b) of introduction
developed as this is the key issue with multicast/broadcast traffic.
Without encryption, application messages are vulnerable to
eavesdropping and all kinds of analyses. A group key could be
negociated and used for encrypting this traffic, but this requires a
more complex setup mechanism (typically a key management system,
probably with re-keying and all the stuff) and requires a preliminary
association of a terminal that is not necessarily compatible with the
application-layer protocol features.
The text could say that if possible, multicast/broadcast traffic
encryption should be used, otherwise risks should be minimised as
discussed in this document. And of course, it's always good to remind
the designers that unicast traffic should be always encrypted since
there's no good reason not to do that.


3) I'd like to suggest another recommendation: when applicable, limit
or avoid user-originated broadcast/multicast messages, preferring
infrastructure originated messages.
An example: in a discovery mechanism, avoid terminal sollicitation as
much as possible and limit oneself to infrastructure announcement
broadcast messages, even if it can include some extra delay (controled
with the announcement frequency). This is exactly what happened in
Wifi AP discovery, where the passive discovery scheme, AP based, is
now prefered to the active scheme.
Said differently, multicast/broadcast is not per se the issue, when
originating from the infrastructure it is generaly safe.


4) A more general comment, related to item (a) of intro:
Broadcast/multicast can simplify user surveillance, I agree. However,
when I'm looking at all the practicies of companies working in the
advertising area (in particular A&A companies, sitting between
smartphone users and advertisers, domain that I know a little bit),
the techniques deployed are incredibly smart, some of them bypassing
technical protections set up by the OS manufacturers, others relying
on hidden technical features. It's impressive how inventive those
companies can be.
My point is that even if traffic is 100% unicast, as long as a
wireless medium is used, anyone wanting to monitor users in order to
profile them will set up the required hardware/software configuration.
This is trivial and extremely cheap nowadays (except perhaps for 4G
connections), and most of the time this is a purely passive
monitoring. The unicast/multicast/broadcast nature of traffic has no
importance as long as you are within wireless network range.


Clarification needed:

** section 4: I cannot understand the meaning of "information" in:
        "* You SHOULD try to design the protocol in a way that the
         information cannot be correlated with other information in
         broadcast/multicast messages"
What does the first instance of "information" refer to?


** Last but one sentence of section 2.2: Why do you say "or at least
much more difficult"? Without encryption, a persistant application
layer identifier voids any lower layer attempt. I'd remove this
comment altogether.


Various:

** the authors use the term "host name" to refer to a higher layer
name of a device. To me this term refers to the DNS notion of
"hostname", i.e. something different, hence confusion. I'd recommend
to use "device name" in order to avoid it.

** section 2.3: instead of:
        "If only a persistent ID is needed, this can be generated
        randomly. »
I'd rather say:
        "Persistent identifiers SHOULD be avoided (section 2.2), but
        if one is absolutely needed and if the devide name is not
        required, then the identifier SHOULD be generated randomly."


Typos:

** section 4: s/broad-/broadcast/ in:
        "because of the special nature of broad- and multicast."

** section 5: "are" is missing in:
        ...for another class of attacks that not related to privacy."


Regards,

  Vincent