Re: [secdir] Interest in draft-dong-savi-cga-header-03.txt; possibility of a five minute slot at saag?

"Laganier, Julien" <julienl@qualcomm.com> Tue, 27 July 2010 15:22 UTC

Return-Path: <julienl@qualcomm.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DAEE73A6862; Tue, 27 Jul 2010 08:22:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IFzH7dHiMKPQ; Tue, 27 Jul 2010 08:22:48 -0700 (PDT)
Received: from wolverine02.qualcomm.com (wolverine02.qualcomm.com [199.106.114.251]) by core3.amsl.com (Postfix) with ESMTP id D816D3A6768; Tue, 27 Jul 2010 08:22:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qualcomm.com; i=julienl@qualcomm.com; q=dns/txt; s=qcdkim; t=1280244187; x=1311780187; h=from:to:cc:date:subject:thread-topic:thread-index: message-id:references:in-reply-to:accept-language: content-language:x-ms-has-attach:x-ms-tnef-correlator: acceptlanguage:content-type:mime-version; z=From:=20"Laganier,=20Julien"=20<julienl@qualcomm.com> |To:=20Stephen=20Kent=20<kent@bbn.com>|CC:=20Sam=20Hartma n=20<hartmans-ietf@mit.edu>,=20Margaret=20Wasserman=0D=0A =09<mrw@painless-security.com>,=20PaddyNallur=20<paddy@hu aweisymantec.com>,=0D=0A=09"saag@ietf.org"=20<saag@ietf.o rg>,=20Dong=20Zhang=20<zhangdong_rh@huawei.com>,=0D=0A=09 "secdir@ietf.org"=20<secdir@ietf.org>|Date:=20Tue,=2027 =20Jul=202010=2008:23:06=20-0700|Subject:=20RE:=20[secdir ]=20Interest=20in=20draft-dong-savi-cga-header-03.txt=3B =0D=0A=20=20possibility=20of=20a=20five=20minute=20slot =20at=20saag?|Thread-Topic:=20[secdir]=20Interest=20in=20 draft-dong-savi-cga-header-03.txt=3B=0D=0A=20=20possibili ty=20of=20a=20five=20minute=20slot=20at=20saag? |Thread-Index:=20Acspj0CZ+SySXdOnRcaAON+nc4AYiAEDgjcg |Message-ID:=20<BF345F63074F8040B58C00A186FCA57F1F6688540 F@NALASEXMB04.na.qualcomm.com>|References:=20<tsl630fmwok .fsf@mit.edu>=20<p06240805c86a38f57df9@[128.89.89.72]>=0D =0A=20<BF345F63074F8040B58C00A186FCA57F1F66885082@NALASEX MB04.na.qualcomm.com>=0D=0A=20<p06240801c86d39d160ab@[192 .168.9.234]>|In-Reply-To:=20<p06240801c86d39d160ab@[192.1 68.9.234]>|Accept-Language:=20en-US|Content-Language:=20e n-US|X-MS-Has-Attach:|X-MS-TNEF-Correlator: |acceptlanguage:=20en-US|Content-Type:=20multipart/altern ative=3B=0D=0A=09boundary=3D"_000_BF345F63074F8040B58C00A 186FCA57F1F6688540FNALASEXMB04na_"|MIME-Version:=201.0; bh=ZSpJ/zcGcQqQi6Uwh5V0t/WGfW90uPMeNazff1EHNRs=; b=mmqq8rmFJV+S4MWGiqhigrO4GQg3jWQIkD4zZRGUmYbQgwvKYvZgbjAf LrVy/cEvlmlklV3nFXGjGC/IpRwz88K6XxCuDElB/OrVwYCcMEmLmlgj4 NOaOsa8sBNrwIgRMRI3koN67lJSmu06q5eBRiMNR3NaypJdBkFSb9BD6v 4=;
X-IronPort-AV: E=McAfee;i="5400,1158,6055"; a="48797070"
Received: from ironmsg01-l.qualcomm.com ([172.30.48.15]) by wolverine02.qualcomm.com with ESMTP; 27 Jul 2010 08:23:07 -0700
X-IronPort-AV: E=Sophos; i="4.55,267,1278313200"; d="scan'208,217"; a="47602859"
Received: from nasanexhub01.na.qualcomm.com ([10.46.93.121]) by ironmsg01-l.qualcomm.com with ESMTP/TLS/RC4-MD5; 27 Jul 2010 08:23:07 -0700
Received: from nasanexhc04.na.qualcomm.com (172.30.48.17) by nasanexhub01.na.qualcomm.com (10.46.93.121) with Microsoft SMTP Server (TLS) id 8.2.254.0; Tue, 27 Jul 2010 08:23:09 -0700
Received: from nalasexhub01.na.qualcomm.com (10.47.130.49) by nasanexhc04.na.qualcomm.com (172.30.48.17) with Microsoft SMTP Server (TLS) id 14.0.694.0; Tue, 27 Jul 2010 08:23:09 -0700
Received: from NALASEXMB04.na.qualcomm.com ([10.47.7.114]) by nalasexhub01.na.qualcomm.com ([10.47.130.49]) with mapi; Tue, 27 Jul 2010 08:23:08 -0700
From: "Laganier, Julien" <julienl@qualcomm.com>
To: Stephen Kent <kent@bbn.com>
Date: Tue, 27 Jul 2010 08:23:06 -0700
Thread-Topic: [secdir] Interest in draft-dong-savi-cga-header-03.txt; possibility of a five minute slot at saag?
Thread-Index: Acspj0CZ+SySXdOnRcaAON+nc4AYiAEDgjcg
Message-ID: <BF345F63074F8040B58C00A186FCA57F1F6688540F@NALASEXMB04.na.qualcomm.com>
References: <tsl630fmwok.fsf@mit.edu> <p06240805c86a38f57df9@[128.89.89.72]> <BF345F63074F8040B58C00A186FCA57F1F66885082@NALASEXMB04.na.qualcomm.com> <p06240801c86d39d160ab@[192.168.9.234]>
In-Reply-To: <p06240801c86d39d160ab@[192.168.9.234]>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_BF345F63074F8040B58C00A186FCA57F1F6688540FNALASEXMB04na_"
MIME-Version: 1.0
Cc: Dong Zhang <zhangdong_rh@huawei.com>, "secdir@ietf.org" <secdir@ietf.org>, PaddyNallur <paddy@huaweisymantec.com>, "saag@ietf.org" <saag@ietf.org>, Margaret Wasserman <mrw@painless-security.com>, Sam Hartman <hartmans-ietf@mit.edu>
Subject: Re: [secdir] Interest in draft-dong-savi-cga-header-03.txt; possibility of a five minute slot at saag?
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2010 15:23:00 -0000

Hi Steve,

Please see some comments below, marked with [JL].

From: Stephen Kent [mailto:kent@bbn.com]
Sent: Thursday, July 22, 2010 2:46 AM
To: Laganier, Julien
Cc: Sam Hartman; Margaret Wasserman; PaddyNallur; saag@ietf.org; Dong Zhang; secdir@ietf.org
Subject: RE: [secdir] Interest in draft-dong-savi-cga-header-03.txt; possibility of a five minute slot at saag?

At 10:35 AM -0700 7/21/10, Laganier, Julien wrote:
Steve,

Stephen Kent wrote:
>
> Sam,
>
> Based on a quick reading, I am troubled by many aspects of this
> proposal.
>
> CGAs were intended to afford privacy for IPv6 users, while allowing a
> first-hop router to verify the binding between the host asserting the
> address and the address in question.

My recollection is that a form of CGA were first proposed to secure the binding between a host asserting that a Mobile IPv6 home address is reachable at a care-of address (via a MIPv6 Binding Update) and the home address in question.

Section 7.3 of RFC 3792 (the original CGA RFC) says:

7.3.  Privacy Considerations

   CGAs can give the same level of pseudonymity as the IPv6 address
   privacy extensions defined in RFC 3041 [RFC3041].  An IP host can
   generate multiple pseudo-random CGAs by executing the CGA generation
   algorithm of Section 4 multiple times and by using a different random
   or pseudo-random initial value for the modifier every time.  The host
   should change its address periodically as in [RFC3041].  When privacy
   protection is needed, the (pseudo)random number generator used in
   address generation SHOULD be strong enough to produce unpredictable
   and unlinkable values.  Advice on random number generation can be
   found in [RFC1750].
This text  motivates my characterization of the privacy aspects of CGAs, which depends on the ability of a hos to use different CGAs, either serially or in parallel.  I think of the CGA mechanism as a way to enable use of varried address by a host, but to also enable a first hop router, to have confidence that an address of this sort (generated in an auto-config fashion) is not being hijacked by another local host.

[JL] I read the above RFC 3972 text as not negating the privacy feature that can be afforded by periodically regenerating an IPv6 as in RFC 3041. Thus a CGA might or might not have privacy feature, and privacy is thus a feature that is orthogonal to CGAs. The central feature of a CGA is that one can verify that host "owns" the address (own in the sense that it's the one that generated in the first place, i.e., it's not hijacked.)
>From my perspective the key intent behind the use CGA's was the ability to verify the binding without recourse to an infrastructure, not privacy.
I also don't see how the use of CGA's would afford to an IPv6 user any better privacy than another IPv6 address given that it is uniquely bound to a long (1024+ bits) public key.

I think the text above, and the cited text in RFC 3041 explains the rationale for privacy assertions re CGAs.

[JL] Understood.

> The proposal to use CGAs in ACLs seems to negate the privacy feature,
> because it would (I assume) call for the CGAs to be static (for ease
> of ACL management).

I agree that if CGAs were to be used in ACLs they would need to be static (or long-term), but this does not negate a privacy feature that CGA's do not have.

yes, it does, because the privacy is afforded by the host generating a sequence of CGAs for parallel or serial use is in conflict with use of a static CGA as an address space identifier for access control purposes.

[JL] I think we agree but differ on how we're expressing it. I'd say that the use of static addresses in ACLs is in conflict with the privacy afforded by being able to periodically regenerate an address, as per 3041.

> The proposal says that "any host along the path" can engage in an
> exchange to cause the subject host to verify itself as the "owner" of
> the address. this is a very big deviation from the much more limited,
> local SeND context.

As above, CGA use is not limited to a local context such as SEND. In particular, the use of CGA's for Mobile IPv6 security is in a _global_ context.

I admit that I was not thinking about CGAs in the mobile IP context; RFC 3972 does refer to mobile nodes, but does not say much in that regard. RFC 4581, which updated 3972, never mentions mobile nodes.

[JL] The use of CGA in the mobile IP context was documented later, in RFC 4866 "Enhanced Route Optimization for Mobile IPv6".
 > The proposal also calls for the sender to generate the signature on
> the payload of the packet, ala IPsec in Transport mode.  The document
> cites RFC 3971 (the SeND) spec, which calls for sig generation is a
> very different context, i.e., NDP packets in the SeND exchange.
>
> This proposal includes an example (from the wireless context)
> suggesting that the sig is to be generated for every packet sent by a
> host, a requirement that would place a substantial burden on a host.
> IPsec rejected solutions of this sort for performance reasons.
If there were to be only one intermediary on-path node going to verify that the packets were generated by the CGA owner, it would be possible to execute a key exchange protocol bound to the CGAs of the sending host and the verifying node, and use symmetric keying material derived from that exchange to afford integrity protection to every packet at a cost comparable to that of IPsec providing integrity protection.

yes, one could do what you suggest above, but that would be duplicating IPsec (ESP-NULL) functionality, which I hope would be frowned upon :-).

[JL] Well that could be all done based on IPsec, as you note below.
 > Conversely, if only an initial packet exchange, involves the signed
> packet from the host, the secruity offered is much lower, making it
> vulnerable to MITM attacks.

As above, an initial packet exchange could be used to derive symmetric keys bound to the CGA's of the parties involved.

and IPsec would be a good idea here too :-).

[JL] Agree

> Also note that SeND requires a trust anchor to be shared between the
> host and its local router. This is a reasonable assumption for that
> local context, but it less viable in a more general source/destination
> context that may extend outside a local space, as many of the offered
> examples do.

The SEND trust anchor is used by hosts to verify a router certificates chain. The router public key being certified is used to sign the router advertisement messages of the router discovery function of ND.

In contrast, hosts uses uncertified public keys that are used to generate CGA's and sign neighbor solicitations and advertisement messages of the address resolution function of ND.
Thus the SEND requirement of hosts and router sharing a trust anchor is entirely orthogonal to the use and generation of CGA's.

Mostly, but not quite. if a host is challenged to provide a signed sequence of packets by a purported intermediary, how does the host know that the challenge is legitimate, and not just a DoS attack?

[JL] if there's execution of a key establishment protocol based on the public keys bound to the CGAs, the opportunity for a DoS attack is reduced and more in line with what's been done in the context of BTNS.

[JL] All of that being said, I agree that the requirement to use static CGAs is a bad thing. That requirement could be removed if the ACLs were based on the public keys generating the CGAs, rather than the CGAs themselves. But if that were the case, coupled with the use of a key establishment protocol, then it becomes dubious what is the additional value provided by CGAs as IPsec seems to afford the required security service: access control, integrity protection.

--julien