Re: [secdir] [Anima] Secdir last call review of draft-ietf-anima-bootstrapping-keyinfra-16

Brian E Carpenter <brian.e.carpenter@gmail.com> Wed, 03 October 2018 03:50 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8519613118E; Tue, 2 Oct 2018 20:50:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L_mzmb38hz9v; Tue, 2 Oct 2018 20:50:41 -0700 (PDT)
Received: from mail-pg1-x542.google.com (mail-pg1-x542.google.com [IPv6:2607:f8b0:4864:20::542]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F2B0130FF0; Tue, 2 Oct 2018 20:50:41 -0700 (PDT)
Received: by mail-pg1-x542.google.com with SMTP id i4-v6so898457pgq.9; Tue, 02 Oct 2018 20:50:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=YCO26Ru5U8yCAVo8WxdeaOUQz0M8ImyUxZpvSp1rKWM=; b=qQgvxv+RwzUp/4kMAQzZIr1DrG9coydRTPJRv/Rmak/Bt2IsC65zZ6Hr2VEMikjStR Ob9DLHKjeO4aLbwNVZ1EIj2aeI+kPUW/I7X9ra1Y7ZyKUEZQo6NVa/cGsyt8WZuqMmYI FJfiIX4ZGyV2HzBiF39zRAzzNbziP9aIfZyMdYjUdvp7HIjZo5nsGKOwKHr9aXmVxxLM CKyOzAIdt89i0cQHR+P+Slwtt8L+VrpjgmCghsPo8BXM7sWE0FB65qy/22GChFBVBitE Z/hAVEBwZkTWsmTB/IOelOLx+dExaQACkjhK5uyKx2nal8nkXZrbfGz04QUWpPl/TnEn gXcg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=YCO26Ru5U8yCAVo8WxdeaOUQz0M8ImyUxZpvSp1rKWM=; b=uS6S3N9yBKezooNwzVTDpueRZo9T8O5EJE+9Yw0ctqAN7nbGf60qfMKRzQ3LDgdQKx 7IcfxAEpqn4LE+FopOM7VLWUR/1t65puxxQzo2fvasBuDC/coRODPKRlFHPPyTjaOK5S LdUErJHbzw/+RL33hNEIu0KtFJijcbRSr4NXFQObdSgpdKxDmPF3QN7BYdY8ohr30n75 CkLKl7laN1raZbhqc8NMuomtbirwPIRhD1e+k46Xewg/u8h3tzQPhkGz/h53KGh1AyEh NDJp25z9FvO3dHI+soyd0/X7fhatcmTBYFfLhXf7p58f4StcVTU8lp4yH5cjcu0Sr5KD aRbA==
X-Gm-Message-State: ABuFfoilHXISDLlnHFQCa++BAIUylqHBcdt4+/49aFoUKomxyxCmqGYW 25GUTAzQ9KcYELwbfOxU+rnthU/U
X-Google-Smtp-Source: ACcGV60mSz+w+e9/6DV8JE5INgFSBQ8wDlGsdEE2S9CxYC/2ozvq/M/hZbLhzT12+8UReFJOtJq5jw==
X-Received: by 2002:a63:214d:: with SMTP id s13-v6mr11908202pgm.148.1538538640119; Tue, 02 Oct 2018 20:50:40 -0700 (PDT)
Received: from [192.168.178.30] ([118.148.76.40]) by smtp.gmail.com with ESMTPSA id d2-v6sm82042pfd.100.2018.10.02.20.50.37 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 02 Oct 2018 20:50:38 -0700 (PDT)
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: anima@ietf.org, Security Directorate <secdir@ietf.org>
References: <153826253306.18743.9250084704876465818@ietfa.amsl.com> <m2sh1qkebi.wl-randy@psg.com> <057bd957-06b4-824e-a7c8-214383819621@huitema.net> <m2murxi8ws.wl-randy@psg.com> <b4a32733-c2df-6bea-17d2-4d45ee4d5136@cisco.com> <m2wor0h9vu.wl-randy@psg.com> <1fd9c9d5-508f-901e-818c-3cc87725c331@cisco.com> <m2d0ssh661.wl-randy@psg.com> <2555.1538506845@localhost> <6b2f2b80-5e9e-101f-4aac-f182f638f8b1@gmail.com> <23133.1538520783@localhost> <acea1a3a-b2ec-5381-128c-b13e903c1158@gmail.com> <10809.1538534121@localhost>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <fa5bdf78-2b80-e63b-8722-3c2532d57fdb@gmail.com>
Date: Wed, 03 Oct 2018 16:50:33 +1300
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <10809.1538534121@localhost>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/AwWQEn4GYUy1VyDGDVIVKUmS90A>
Subject: Re: [secdir] [Anima] Secdir last call review of draft-ietf-anima-bootstrapping-keyinfra-16
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Oct 2018 03:50:44 -0000

On 2018-10-03 15:35, Michael Richardson wrote:
> 
> Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>     > I'm still gnawing on my original bone: if I was running a highly
>     > secure, personnel-safety-critical network, like the particle
>     > accelerator control network I used to run for a living, I *would not*
>     > allow it to rely on masa.vendor.com, and it would be physically
>     > impossible to do so because there would be no physical link anyway. I
>     > would get my vouchers some other way. This is not light bulbs either.
> 
> So possibilities that I see:
> 
> 1) you run a half-mind Registrar that is on the secure side of your air-gap, and it has
>    a USB interface (or 9-track tape drive... statscan.gc.ca used to run
>    unidirectional UUCP over 9-track tapes walked across the machine room air-gap)
>    on which it can place voucher requests, and receive vouchers from
>    other-half-mind Registrar.
> 
>    This lets you use nonced vouchers, potentially with expiry dates.
>    Maybe very long expiry dates.  Or maybe your personnel-safety-critical
>    equipment has a best-before date, and so it's acceptable for you to have
>    vouchers only until that date.
> 
>    Also recall that we permit the Registrar to ask for, and get, voucher
>    renewals at any time, so the connected ("other-half-mind") Registrar could
>    always keep a live set of vouchers.

Yes, that sort of solution would work.
 
> 2) you use NETCONF's mechanism with vouchers that you obtain another way, and
>    you place them on USB key/CDROM/QR-code.

You could. But that makes me a bit nervous too. It's not far from
seeing a yellow sticky in the ops room saying "sys pw muggle3scop#"
or whatever. People who want airgap security are very cautious about
USB keys these days.

> 3) you continue to configure such a network with craft-serial console,
>    initiating the EST connection via some other credential.

It still doesn't scale.

> 
>     > I believe this can be fixed by clearer scoping of the document, and by
>     > renaming the "lower security" section as "alternative trust models" or
>     > something.
> 
> I accept that the document could have better text here.
> At one point we discussed an operational considerations document.
> Is that really what you are asking for?

Later, maybe, but to get this draft out of the door I think we can
do a simpler fix. As Christian pointed out, there isn't really
a distinct security analysis, so I think we need to say:
This <text> is the recommencded trust model, based on an on-line
MASA. If you don't like that trust model, here are the alternatives: <text>.

   Brian