Re: [secdir] SECDIR review of draft-ietf-ftpext2-hosts-02

Robert McMurray <robmcm@microsoft.com> Fri, 24 June 2011 19:03 UTC

Return-Path: <robmcm@microsoft.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37ABA22801B; Fri, 24 Jun 2011 12:03:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.092
X-Spam-Level:
X-Spam-Status: No, score=-6.092 tagged_above=-999 required=5 tests=[AWL=-1.225, BAYES_00=-2.599, J_CHICKENPOX_37=0.6, RCVD_IN_DNSWL_HI=-8, SARE_RAND_6=2, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HYLSNyXmGEZI; Fri, 24 Jun 2011 12:03:33 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by ietfa.amsl.com (Postfix) with ESMTP id 1A050228006; Fri, 24 Jun 2011 12:03:31 -0700 (PDT)
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (157.54.86.9) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 24 Jun 2011 12:03:24 -0700
Received: from DB3EHSOBE005.bigfish.com (157.54.51.80) by mail.microsoft.com (157.54.86.9) with Microsoft SMTP Server (TLS) id 14.1.289.8; Fri, 24 Jun 2011 12:03:22 -0700
Received: from mail28-db3-R.bigfish.com (10.3.81.246) by DB3EHSOBE005.bigfish.com (10.3.84.25) with Microsoft SMTP Server id 14.1.225.22; Fri, 24 Jun 2011 19:03:20 +0000
Received: from mail28-db3 (localhost.localdomain [127.0.0.1]) by mail28-db3-R.bigfish.com (Postfix) with ESMTP id C6CFC9281C6; Fri, 24 Jun 2011 19:03:20 +0000 (UTC)
X-SpamScore: -34
X-BigFish: PS-34(zz9371M4015L103dK542Mzz1202h1082kzz1033IL8275bh8275dhz31h2a8h668h839h34h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: CIP:157.55.61.146; KIP:(null); UIP:(null); IPV:SKI; H:CH1PRD0302HT008.namprd03.prod.outlook.com; R:internal; EFV:INT
Received-SPF: softfail (mail28-db3: transitioning domain of microsoft.com does not designate 157.55.61.146 as permitted sender) client-ip=157.55.61.146; envelope-from=robmcm@microsoft.com; helo=CH1PRD0302HT008.namprd03.prod.outlook.com ; .outlook.com ;
Received: from mail28-db3 (localhost.localdomain [127.0.0.1]) by mail28-db3 (MessageSwitch) id 1308942200408783_12126; Fri, 24 Jun 2011 19:03:20 +0000 (UTC)
Received: from DB3EHSMHS019.bigfish.com (unknown [10.3.81.252]) by mail28-db3.bigfish.com (Postfix) with ESMTP id 5CEC31950054; Fri, 24 Jun 2011 19:03:20 +0000 (UTC)
Received: from CH1PRD0302HT008.namprd03.prod.outlook.com (157.55.61.146) by DB3EHSMHS019.bigfish.com (10.3.87.119) with Microsoft SMTP Server (TLS) id 14.1.225.22; Fri, 24 Jun 2011 19:03:19 +0000
Received: from CH1PRD0302MB131.namprd03.prod.outlook.com ([169.254.11.234]) by CH1PRD0302HT008.namprd03.prod.outlook.com ([10.28.29.127]) with mapi id 14.01.0225.056; Fri, 24 Jun 2011 19:03:17 +0000
From: Robert McMurray <robmcm@microsoft.com>
To: "kathleen.moriarty@emc.com" <kathleen.moriarty@emc.com>, "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-ftpext2-hosts.all@tools.ietf.org" <draft-ietf-ftpext2-hosts.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Thread-Topic: SECDIR review of draft-ietf-ftpext2-hosts-02
Thread-Index: AcwyiBUFO2skqoQCSLqk+KSpXVMV4QADvEhg
Date: Fri, 24 Jun 2011 19:03:16 +0000
Message-ID: <01AA9EC92749BF4894AC2B3039EA4A2C1949D137@CH1PRD0302MB131.namprd03.prod.outlook.com>
References: <AE31510960917D478171C79369B660FA0E0325300F@MX06A.corp.emc.com>
In-Reply-To: <AE31510960917D478171C79369B660FA0E0325300F@MX06A.corp.emc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.28.29.74]
Content-Type: multipart/mixed; boundary="_003_01AA9EC92749BF4894AC2B3039EA4A2C1949D137CH1PRD0302MB131_"
MIME-Version: 1.0
X-OrganizationHeadersPreserved: CH1PRD0302HT008.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%EMC.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%TOOLS.IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HETHMON.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%GMAIL.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC103.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC103.redmond.corp.microsoft.com
X-Mailman-Approved-At: Fri, 24 Jun 2011 13:45:01 -0700
Cc: "phethmon@hethmon.com" <phethmon@hethmon.com>, "Anthony Bryan (anthonybryan@gmail.com)" <anthonybryan@gmail.com>
Subject: Re: [secdir] SECDIR review of draft-ietf-ftpext2-hosts-02
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jun 2011 19:03:37 -0000

Thanks, Kathleen.

[Note: Adding Anthony Bryan as the document shepherd.]

Here is a suggested rewording of the fragment from Section 3.2 for which you had requested an update - does this agree with what you were looking for?

"The resultant actions needed to create that environment are not specified here, and may range from doing nothing at all, to performing a simple change of working directory, or changing authentication schemes and/or username and password lists, or making much more elaborate state changes - such as creating isolated environments for each FTP session."

Your first of comment about Section 4 is an easy change - thanks!

Your second set of comments about Section 4 seems to me to be less about the protocol and more about the actual implementation details, which I think we should avoid. As an example, I have a background on UNIX, Windows, and several other platforms; the way that I might choose to implement segregation/isolation for each of those platforms will differ radically. For example, process isolation might come to mind as one possible implementation, but the way that processes actually work varies greatly depending on the platform, and it might only make sense on one platform and not the others, but in any case we shouldn't be suggesting something that specific in an RFC anyway. For that matter, the way that accounts and permissions are used on each platform also differs greatly, so it does not seem to make sense to call out those concepts, either. In the end, each server implementer has a variety of platform-specific options that are available within their specific situation when they are considering how to implement their unique security environments, and all of which are outside the scope of this draft.  With that in mind, I do not think that Section 4 should be updated with verbiage that says something to the effect of, "Actual server implementations for creating security environments for virtual hosts are outside the scope of this document, but you could use a combination of platform-specific technologies such as authentication, isolation, access control, etc."

That being said, I have attached an updated version of the draft in TXT and XML format.

Thanks!

-----Original Message-----
From: kathleen.moriarty@emc.com [mailto:kathleen.moriarty@emc.com] 
Sent: Friday, June 24, 2011 9:02 AM
To: secdir@ietf.org; draft-ietf-ftpext2-hosts.all@tools.ietf.org; iesg@ietf.org
Cc: phethmon@hethmon.com; Robert McMurray
Subject: SECDIR review of draft-ietf-ftpext2-hosts-02

I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG.  These comments were written primarily for the benefit of the security area directors.  Document editors and WG chairs should treat these comments just like any other last call comments.

Summary:  The document requires more information in the security considerations section.

Section 3.2:

In terms of the types of changes that may be made, it does state 'more elaborate changes' may be made depending on the environment.  However, for security and the developers reading the specification, I think it would be best to include the high end of the spectrum here and include isolation as one of the explicitly stated examples as the scenario may be used in hosted environments.

Upon receiving the HOST command, before authenticating the user-PI, a
   server-FTP process SHOULD validate that the hostname given represents
   a valid virtual host for that server, and, if it is valid, establish
   the appropriate environment for that virtual host.  The resultant
   actions needed to create that environment are not specified here, and
   may range from doing nothing at all, to performing a simple change of
   working directory, to changing authentication schemes and/or username
   and password lists, to making much more elaborate state changes, as
   necessary.

Section 4: Security Considerations

Please replace the term Confidentiality where you have listed "integrity" in the opening sentence as the protection of privacy related information is described through confidentiality.  The integrity and confidentiality of the data on the servers are both potentially important, but this opening sentence is in context of login parameters.

The second paragraph does address the authentication between virtual hosts, which is good.  I think it is also important to ensure readers are aware of possible concerns with segregation or isolation of the virtual FTP environments.  If there are security concerns that may include different user bases on the same physical host or different levels (sensitivity) of information in different FTP hosts on the same server, the ability to have segregation of the environments will be important (this will happen).  How can segregation/isolation be provided in this model?  Please include information on the options here.  I am assuming that since we are talking about multiple hosts on a single IP, that we may be within a physical host or a virtual environment that has one IP address.  If this is the case, what security options are available - authentication, access controls, etc.?  Please include them in this section.

Thank you,
Kathleen