Re: [secdir] SecDir Review of draft-weis-gdoi-iec62351-9-08
"Brian Weis (bew)" <bew@cisco.com> Fri, 14 October 2016 18:08 UTC
Return-Path: <bew@cisco.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB549126579; Fri, 14 Oct 2016 11:08:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.517
X-Spam-Level:
X-Spam-Status: No, score=-17.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EinUVMg4JSP5; Fri, 14 Oct 2016 11:08:17 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E455129618; Fri, 14 Oct 2016 11:08:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9706; q=dns/txt; s=iport; t=1476468496; x=1477678096; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=3VnEryZPbnJnZLttZDGmrtxYQIfMfWuwb+GprBdNHsg=; b=d32cFJ3OFsrY47S8/DzaiIatedNKWaTDPYx7MzhmF1FUvAigoHKVevfn 7O6RYdZHSVrR+uu8wsKs7HVq8fDRdY8iiB1hg6PvBf+b0HuxqUZuW4XGn evxC/aHLUxqPoToltgPE924hao4eK/dSPQMb+POLeorNdARTD8FFXKfSg I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AqAQC1HgFY/4sNJK1ZAxkBAQEBAQEBAQEBAQcBAQEBAYM8AQEBAQEdV3wHjS2XBYddjFuCCB0NhS5KAhqBfTgUAQIBAQEBAQEBXieEYQEBAQMBAQEBIBE6CwULAgEIDgoCAiYCAgIfBgsVEAIEDgWIOAMPCA61fokPDYNvAQEBAQEBAQEBAQEBAQEBAQEBAQEBHYEHhzMIglCCR4FSEQECBBYXCiaCPSyCLwWZUTUBhieGTIMMgW5Oh1CFaYhlhBSDfgEeNlKCdQUcgVNyhhWBIIEAAQEB
X-IronPort-AV: E=Sophos;i="5.31,346,1473120000"; d="scan'208";a="335886894"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 14 Oct 2016 18:08:15 +0000
Received: from XCH-RTP-001.cisco.com (xch-rtp-001.cisco.com [64.101.220.141]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id u9EI8Fjn031384 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 14 Oct 2016 18:08:15 GMT
Received: from xch-rtp-001.cisco.com (64.101.220.141) by XCH-RTP-001.cisco.com (64.101.220.141) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Fri, 14 Oct 2016 14:08:14 -0400
Received: from xch-rtp-001.cisco.com ([64.101.220.141]) by XCH-RTP-001.cisco.com ([64.101.220.141]) with mapi id 15.00.1210.000; Fri, 14 Oct 2016 14:08:14 -0400
From: "Brian Weis (bew)" <bew@cisco.com>
To: Yoav Nir <ynir.ietf@gmail.com>
Thread-Topic: [secdir] SecDir Review of draft-weis-gdoi-iec62351-9-08
Thread-Index: AQHSHl3IqR3ruc/h1Ue4GXf9RA8ZO6Coki6A
Date: Fri, 14 Oct 2016 18:08:14 +0000
Message-ID: <29AF5DAD-3197-4650-9ED8-37FE45D6B5B5@cisco.com>
References: <834C9D97-98D2-49EB-BD34-5C28C84AB10F@gmail.com>
In-Reply-To: <834C9D97-98D2-49EB-BD34-5C28C84AB10F@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.191.163]
Content-Type: text/plain; charset="utf-8"
Content-ID: <06CD4822AE483949BD0431A01D084430@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/AVW_tYAIGsRo0F810CtlrGCL3mg>
Cc: "draft-weis-gdoi-iec62351-9.all@tools.ietf.org" <draft-weis-gdoi-iec62351-9.all@tools.ietf.org>, The IESG <iesg@ietf.org>, secdir <secdir@ietf.org>
Subject: Re: [secdir] SecDir Review of draft-weis-gdoi-iec62351-9-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Oct 2016 18:08:19 -0000
Hi Yoav, Thanks for your careful review. A last minute change before publishing -08 caused some inconsistencies that you have noted below, and I’ve added some comments inline addressing those inconsistencies. > On Oct 4, 2016, at 9:38 AM, Yoav Nir <ynir.ietf@gmail.com> wrote: > > Hi. > > I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. > These comments were written primarily for the benefit of the security area directors. > Document editors and WG chairs should treat these comments just like any other last call comments. > > Summary: Ready with a question > > The draft describes using GDOI with some extensions to transport keying material for the IEC 61850 power utility automation family of standards. > > I have previously reviewed version -02 of the draft three years ago ([1]). Later versions addressed my issues about the document being too opaque for people not versed in IEC protocols and terminology. It is still rather hard to read without the relevant background, but that is to be expected in a document targeted at a very specific audience (which I am not part of). > > The Security Considerations section points to the section in RFC 6407 (GDOI). Additional paragraphs point out that message authentication is mandatory, while confidentiality is optional. And yet the same paragraph makes confidentiality a SHOULD if the packets are expected to traverse the public Internet. This text was not precisely matching the operational realities of networks where this standard will be used. This became even more apparent when addressing the last issue that you noted below. In reality, there are a number of operational environments where these devices will be deployed: in some cases they are in a private network where traffic does not need to protected on a private network, and a site security policy will protect the traffic with network-level encryption (such as an IPsec tunnel) when it leaves the private network. In other cases, the application traffic needs to be protected at the end host. While authentication is a firm requirement when a cipher is used, there are cases where neither authentication nor confidentiality is absolutely required. In a simple world this would result in a distributed policy where a group member were configured with exactly which flows did not requiring protection and does not need to ask a central Group Controller/Key Server (GCKS) how to protect the flow. But a system using a centralized key management system generally is one where configuring such granulated distributed policy is not operationally feasible. Therefore, it can make sense for the group member to ask the GCKS on a flow by flow basis how to protect it, and sometimes get a response that it is not to be protected. This is especially true during a migration period, where the policy for each flow is individually converted from unprotected to protected by the GCKS administrator. Addressing this need requires re-instating the NONE value in both Authentication Algorithm and Confidentiality Algorithm lists. (These values had been present in -07). We also propose the following additions to the Security Considerations section to clarify how these are used. Does it seem adequate to you? IEC 62351 Security Services describes a variety of policy choices for protecting network traffic, including the option of specifying no protection at all. This is enabled with the use of NONE as an Authentication Algorithm and/or Confidentiality Algorithm. The following guidance is given regarding the use of NONE. o Setting both Authentication Algorithm and Confidentiality Algorithm to NONE is possible, but NOT RECOMMENDED. Setting such a policy is sometimes necessary during a migration period, when traffic is being protected incrementally and some traffic has not yet been scheduled for protection. Alternatively, site security policy for some packet flows requires inspection of packet data on the private network followed by network-layer encryption before delivery to a public network. o Setting the Confidentiality Algorithm to NONE, but setting the Authentication Algorithm to a MAC can be an acceptable policy in the following conditions: the disclosed information in the data packets is comprised of raw data values, and the disclosure of the data files is believed to be of no more value to an observer than traffic analysis on the frequency and size of packets protected for confidentiality. Alternatively, site security policy for some packet flows requires inspection of packet data on the private network followed by network-layer encryption before delivery to a public network. o Setting the Authentication Algorithm to NONE, but setting the Confidentiality Algorithm to an algorithm that does not includes authentication is not safe, and MUST NOT be specified. > The last sentence says that 128-bit AES-CBC is good enough for the foreseeable future, "but some security policies may require the use of AES-CBC-256.” There is no mention of why such policies may require this. The usual reason is to protect against future attacks by quantum computers, but I think it’s fine to leave that out. > > My question is about the IEC-61850 SA TEK Payload described in Figure 4 in section 2.2. It has separate fields for Auth Alg and Enc Alg. The Enc Alg field has 4 possible values described in section 2.2.3, including AES-GCM-128 and AES-GCM-256. AES-GCM is an AEAD algorithm. As such it should not be used in conjunction with a MAC algorithm. Other protocols either omit the MAC algorithm when an AEAD is used, or create a special ‘none’ value for such cases. Here there are no None value (though there are two Reserved values in the IANA considerations section). This makes it possible to have SA TEK payloads with AES-GCM-128 and HMAC-SHA256-128. How do you even do that? And why? The removal of the NONE value from the Authentication Algorithm list (present in -07) caused this problem, just as you imply. It will be reinstated, accompanied by some precise text describing with which Confidentially Algorithms MUST and MUST not be accompanied by the NONE Authentication Algorithm value. I.e., the defined AES-CBC algorithms MUST NOT be used with a NONE Authentication Algorithm, and AES-GCM algorithms MUST be used with an Authentication Algorithm. The example payloads in Appendix A will also be corrected. Thanks, Brian > > Yoav > > [1] https://mailarchive.ietf.org/arch/msg/secdir/-C5_XjfTk42DO013DkbA6q0tQmA > _______________________________________________ > secdir mailing list > secdir@ietf.org > https://www.ietf.org/mailman/listinfo/secdir > wiki: http://tools.ietf.org/area/sec/trac/wiki/SecDirReview -- Brian Weis Security, CSG, Cisco Systems Telephone: +1 408 526 4796 Email: bew@cisco.com
- [secdir] SecDir Review of draft-weis-gdoi-iec6235… Yoav Nir
- Re: [secdir] SecDir Review of draft-weis-gdoi-iec… Brian Weis (bew)
- Re: [secdir] SecDir Review of draft-weis-gdoi-iec… Kathleen Moriarty