Re: [secdir] Secdir review of draft-ietf-p2psip-concepts-08

Radia Perlman <radiaperlman@gmail.com> Mon, 14 March 2016 01:20 UTC

Return-Path: <radiaperlman@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12EDA12D8D5; Sun, 13 Mar 2016 18:20:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ez2r_i2DdcUt; Sun, 13 Mar 2016 18:20:10 -0700 (PDT)
Received: from mail-ob0-x22a.google.com (mail-ob0-x22a.google.com [IPv6:2607:f8b0:4003:c01::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFC2012D634; Sun, 13 Mar 2016 18:20:09 -0700 (PDT)
Received: by mail-ob0-x22a.google.com with SMTP id ts10so161922861obc.1; Sun, 13 Mar 2016 18:20:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=RpXVcbxAxUFBnFVFrOL9J3tVTym7XkyOLZzyAi0XgSw=; b=nIan8OyVEF9y39vZplFo9TUJ45GfUxW7/GuErojuh+ACsXOJUjPK9vDpLCeyTHnw4d O+YYAOBoh7zZDrVxf5pSsxKpkJxTnAyCQgTEBdplhPdSg9WcSrWPnCeIExr+z4DXAvT9 LcYp02Sa05MJGPZ3Ysq7MKnz8h5Lg8JfN/S7u+bNqCGfqtjFhh1ph+JEZDV6fFPlV6aJ ayImi8hRAwJbzYbiex0B+Wb/ca9GP+3IwQVg2lekB78ZhtIYbR4SnLMkiesHxF91EkR1 oL437IiTKwPpaQMbyXB6RrtmOn4wK9hiAIk8DuwIy+ImaA4hF2ukcv1rQBJky0SO5i6g FoNQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=RpXVcbxAxUFBnFVFrOL9J3tVTym7XkyOLZzyAi0XgSw=; b=W0ZYgGlhhJvUpZJBelx9K6i6JaUWIY76HPNHqSQ728wdML0LfpfdNkrwqBxe0Rl1KG ERzB+zstUA4NRvo1q7S6XhUzwr+S2LqUTYkTpGZhgd5+aGOV4iVBduAKO7l8Dz4M6FMo +gYtGyOC/yzDDhsjV8GoT8E0tbVeSdLhNTwx/WngN27ZijUMcPnlbDNFI+xpfc8bBXtW UysfPsiK+RSxnOfFDwrBUD89O5DvqTXRLLeVc/rxo9+H4KfyjEMnoYwL0k3iGdXdCA/0 /sZEWfuCxdkfWqxnBFGfhTeF9AExHsIMN2p1tVhR4UNZqzmWgaBad0C9yBGzTCDo2BGC Bu8Q==
X-Gm-Message-State: AD7BkJL27xAUFNxMJys8fKGGYD0OliYz+TDT7YkjhGgjNuB4TvC9aSjQxi42HFxg/sn1WDlAmJlKNu6vT2rfKw==
MIME-Version: 1.0
X-Received: by 10.60.128.229 with SMTP id nr5mr13014221oeb.56.1457918409298; Sun, 13 Mar 2016 18:20:09 -0700 (PDT)
Received: by 10.182.159.1 with HTTP; Sun, 13 Mar 2016 18:20:09 -0700 (PDT)
In-Reply-To: <E1D6A68D-D2A9-4854-A28C-FB38D4E14D8F@softarmor.com>
References: <CAFOuuo7MpSbTfMzAZgV1B1xVi0D4R7bwotbzTe=3RAY-O_vXhw@mail.gmail.com> <E1D6A68D-D2A9-4854-A28C-FB38D4E14D8F@softarmor.com>
Date: Sun, 13 Mar 2016 18:20:09 -0700
Message-ID: <CAFOuuo4e=+-3K2qW9sGoGdJgtzFs+exDEV4YO5bfj19mHcSyCw@mail.gmail.com>
From: Radia Perlman <radiaperlman@gmail.com>
To: Dean Willis <dean.willis@softarmor.com>
Content-Type: multipart/alternative; boundary="047d7b2e3f74e5dcf2052df81457"
Archived-At: <http://mailarchive.ietf.org/arch/msg/secdir/MezX1tlysvdJPflXl0gEyQTyimg>
Cc: The IESG <iesg@ietf.org>, draft-ietf-p2psip-concepts.all@tools.ietf.org, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] Secdir review of draft-ietf-p2psip-concepts-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2016 01:20:17 -0000

Re Dean's question to me:

>>So, here’s the question: Where should such motivations be documented? Do
they belong in the terminology document? I can see making this into a
terminology-and->>rationale document. Do they belong in the protocol
specifications?

I wish a protocol could be all in one document.  I assume in some cases
that's impractical because it would be too long.  But at any rate, I'd
prefer either the rationale should be in a few paragraphs, repeated in each
document for which it's relevant (in this case, all the documents
pertaining to the peer-to-peer variant), or the rationale be in one of the
documents, and all the others have a sentence saying "the rationale for why
in some cases the peer-to-peer variant is desirable is in XXX".

Back to wishing a protocol could all be in one document...if it can't be,
I'd love a single roadmap document that points to all the pieces needed for
understanding the protocol (and rationale, and proofs it works, and
terminology, and anything else relevant), with an explanation about what is
in each one (rather than just saying "here are 17 other documents you
should read).

I'm not quite sure why documents wind up in so many pieces.  I suppose in
some cases something is added after the fact (like "how to run this over
X"), and it's easier to come out with a tiny new simple document just for
that, rather than editing it into the main document.  But as a reader
catching up on a new technology, I'd find it easier to just read one,
well-organized, complete document.

Radia



On Thu, Mar 10, 2016 at 11:28 AM, Dean Willis <dean.willis@softarmor.com>
wrote:

> Thanks, Radia. Good catch on “the the typo.”
>
> RFC 6940 has most of the security considerations for RELOAD (the protocol
> that came out of this work), using the terminology from this document. In
> short, it boils down to the single-cert problem; the typical RELOAD overlay
> has a simple PKI understructure, using a singular authority (the enrollment
> server) that has a public key used to sign the credentials for each
> enrollee.
>
> RFC 5765 is, in its entirety, security considerations for P2P.
>
> You actually ask a very good question here about motivation, one that we
> spent a lot of time TALKING about, but apparently didn’t spend much time
> WRITING about. There were “scenarios” drafts that covered motivations, but
> they didn’t get conserved into a publication-ready state. An example is
> https://tools.ietf.org/html/draft-jiang-p2psip-peer-protocol-requirement-01
>
> The short answer to your concern is that the “enrollment” process happens
> on the order of N times, where N is the number of nodes participating in
> the overlay (multiplied some relatively low expiry rate). But registration
> and resolution (aka, rendezvous) operations are vastly more frequent,
> happening (at the least) every time the IP address of a node changes (or in
> SIP, every 30 seconds, just in case),  and every time one node needs to
> contact another (which scales with the link-density of the network,
> typically an exponential).
>
> Practically speaking, an enrollment server can run on a typical LAMP stack
> with one box (or perhaps a redundant pair) supporting millions of users.
> But the rendezvous problem is more like trying to run the Internet on
> dynamic DNS servers — it gets gnarly quickly.
>
> Further, if enrollment breaks, no new nodes can be added, but existing
> nodes continue to work. But if rendezvous breaks, the whole system grinds
> to a halt.
>
> Rendezvous, therefore, benefits from a high level of distribution — both
> from a load scaling and a resilience perspective.
>
> Yet another issue is that the traditional SIP proxy/registrar represents a
> very rich target for interception of communications metadata. If every
> movement of a user  and every communications between any two users  is
> mediated by a single box, that box becomes a very high priority target. The
> attack surface is narrow, but the payoff is huge. The P2P routing model, on
> the other hand, stores relatively little information at any given node,
> producing a broader attack surface, but requiring vastly more nodes to be
> compromised before overall opsec is diminished. This is particularly
> significant in the scenario of a nation-state actor, who must penetrate not
> just the local proxy-registrar but potentially millions of foreign nodes in
> order to tap the metadata.
>
> So, here’s the question: Where should such motivations be documented? Do
> they belong in the terminology document? I can see making this into a
> terminology-and-rationale document. Do they belong in the protocol
> specifications?
>
> —
> Dean
>
>
>
> On Mar 10, 2016, at 11:57, Radia Perlman <radiaperlman@gmail.com> wrote:
>
> (Sorry...I'm resending because I mistyped and sent to
> draft-ietf-p2psip-concept.all@tools.ietf.org the first time)
>
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the IESG.
> These comments were written primarily for the benefit of the security area
> directors. Document editors and WG chairs should treat these comments just
> like any other last call comments.
>
> This document is titled "Concepts and Terminology for Peer to Peer SIP",
> and as such would have no security considerations, as noted in the document.
>
> However, this document describes how to discover which host a client is
> at, instead of using a SIP proxy, by using a peer-to-peer network and DHT.
>
> I'd have liked a motivation for why this would be a preferable mechanism.
> It seems like it would be less secure, in that more things will need to be
> trusted.  And furthermore, as this document says in section 5.4:
>
> "The P2PSIP WG does not impose a particular mechanism for how the
>  peer-ID and the credentials are obtained, but the RELOAD protocol
>  does specify the format for the configuration information."
>
> I'd think the hard problems would be things like who to get a credential
> from for joining the peer-to-peer group of proxies, and how that entity
> would decide whether you should be trusted to join the peer-to-peer group.
> And if there is such a trusted entity (a central administration), why
> wouldn't the whole discovery process be more centralized?
>
> Also, with a peer-to-peer DHT, it seems like there are more things that
> need to be trusted.  Any of them acting maliciously can cause incorrect
> answers.
>
> Admittedly, I didn't read all the background documents.
>
> There's a minor typo in section 2.2, clearly a cut and paste error:
>
> "A special peer may be a member of the in the P2PSIP overlay"
>
> Radia
>
>
>
>