Re: [secdir] Secdir last call review of draft-ietf-core-dev-urn-08

Brian Weis <bew.stds@gmail.com> Thu, 03 December 2020 20:04 UTC

Return-Path: <bew.stds@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 557EF3A0A71; Thu, 3 Dec 2020 12:04:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RUS3cAhI0F7I; Thu, 3 Dec 2020 12:04:06 -0800 (PST)
Received: from mail-pf1-x430.google.com (mail-pf1-x430.google.com [IPv6:2607:f8b0:4864:20::430]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEEBF3A0A26; Thu, 3 Dec 2020 12:04:03 -0800 (PST)
Received: by mail-pf1-x430.google.com with SMTP id t8so2026863pfg.8; Thu, 03 Dec 2020 12:04:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:content-transfer-encoding:mime-version:subject:date:references :to:in-reply-to:message-id; bh=O7LOZBcv5AUbyL1hB+zamToePkHY6bTqGg2rBeTzKd8=; b=hwwigHKdbdkZA+BdOm9rTgbcr3Ijgypw8X9ORLTyYJ9PTK+otOkRPqO6vqkeBg8fLr dPcdDnrtEpdDM4kBIND4TlGL7O7lYnw+Jf2REEaRF2eBpA45J73VgXrrM4PYFbkn/d2Q y07xRjx5qSdE/vjf3fg6u3hacdc9+A2nxO7Y5V6De+hT/6oRsM0JKo+pQcZSA2HiIa2A zFcp5sFMyvstnGVjiTb7WPM74xNcyWHLs1+BRjo5WaKrR2Z9PZk+xfJShBFDnwoWBinL pmdf0b6qegCftDoX2iTBQo2TX3tXxFWEFtLdW14Ljwhgt7MM8leNbQRR05gtQLkoyNA2 OE9Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:content-transfer-encoding:mime-version :subject:date:references:to:in-reply-to:message-id; bh=O7LOZBcv5AUbyL1hB+zamToePkHY6bTqGg2rBeTzKd8=; b=EE8Y5pTPu9DUZKzZ4gw1/jT3Qqz2+9LIPReMNFzb8Zx/Zr2giEYG0mlQydQhOPMtTH QQNlIMYkxyhndjoQ7dJSO87UbxeVvaGt21HxGsLJJRovdQs/MjLaWnR4LvkbCJ8YBE9d 1jD1+xJGUAO3vHxwrNR+YVXZ7CZnMrsvyEv8QLrHFH3xTabP7CTQfMjMHgIIJTtaEvzq jvbadUmaef7yv0LkSadb28gc9x00X1a/HmVRTbjv7XZSrL3eyaTEpQlgkP59Qtx0ZeMI 95st5NZfu+pJhkD0Xye2ghk3vX/HdVgjftSaqejavqh9iKYPZIKs9FaOqxIISH6TjWUv kTyA==
X-Gm-Message-State: AOAM5331YMWzERqfe2WlmhdY3u1neC2BxtgqBGeUQphErIABmlutJy/J 5GS2+ax62KwiZrap5M6+VJtrwQ8dU3E=
X-Google-Smtp-Source: ABdhPJwvBHQ3HZHVFze8OdHtIj+85ig0fygQv9w8VvFFhbb02g+aKF31r5Nn2hfvPcGt7u/NsOu0Dg==
X-Received: by 2002:aa7:864b:0:b029:18e:fc45:f2a1 with SMTP id a11-20020aa7864b0000b029018efc45f2a1mr603848pfo.58.1607025842762; Thu, 03 Dec 2020 12:04:02 -0800 (PST)
Received: from ?IPv6:2603:3024:151c:c200:545f:374a:e165:7255? ([2603:3024:151c:c200:545f:374a:e165:7255]) by smtp.gmail.com with ESMTPSA id x10sm1305593pff.214.2020.12.03.12.04.01 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 03 Dec 2020 12:04:02 -0800 (PST)
From: Brian Weis <bew.stds@gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
Date: Thu, 03 Dec 2020 12:04:01 -0800
References: <160702546541.14061.15940689920006174458@ietfa.amsl.com>
To: secdir@ietf.org, last-call@ietf.org, draft-ietf-core-dev-urn.all@ietf.org, core@ietf.org
In-Reply-To: <160702546541.14061.15940689920006174458@ietfa.amsl.com>
Message-Id: <C46E7831-BB98-4D46-893A-93CE83B8A2FA@gmail.com>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/RgrURVkNbLXKYqjOGWhFi42I-n4>
Subject: Re: [secdir] Secdir last call review of draft-ietf-core-dev-urn-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Dec 2020 20:04:08 -0000

Oops: this review is marked “Serious Issues”, where (as mentioned in the comments) 
I intended it to be “Ready with nits”.  Sorry for the confusion.

Brian

> On Dec 3, 2020, at 11:57 AM, Brian Weis via Datatracker <noreply@ietf.org> wrote:
> 
> Reviewer: Brian Weis
> Review result: Serious Issues
> 
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should
> treat these comments just like any other last call comments.
> 
> The summary of the review is Ready with nits.
> 
> This document generally defines a new URN namespace for hardware
> device identifiers, and then further defines the URN body layout
> for several types of devices, where devices are identified by a
> global identity (e.g., a MAC address, organizational-specific serial
> number, etc.).
> 
> Long-term identifiers have privacy considerations, and these are
> well documented here.
> 
> Here are some things that ought to be thought about:
> 
> (1) The Security Considerations section seems to focus on concerns
> around devices not allowing the device identifiers to be modified,
> and gives rather broad advice about a DEV URN implementation
> faithfully representing the device. It would be good for this section
> to also warn implementors of the risks of a DEV URN being transmitted
> without integrity protection. That is, if the device faithfully
> represents itself, a man in the middle changing the DEV URN in a
> protocol may cause the system using the device to not manage the
> device properly, or in some manner inappropriately adjust the privileges
> allowed by the device within that system.
> 
> (2) Section 1 says about privacy “Note that long-term stable unique
> identifiers are problematic for privacy reasons and should be used
> with care or avoided as described in [RFC7721].” Given the later
> guidance that “The DEV URN type SHOULD only be used for persistent
> identifiers”, I think the “or avoided” portion of that sentence is
> inappropriate for this document.
> 
> (3) Section 5 begins with “The following three examples provide
> examples of MAC-based, 1-Wire, and Cryptographic identifiers”. There 
> are now more than three examples provided (thanks for that!), and 
> it appears that cryptographic identifiers have ben removed in an
> earlier draft.
> 
> 
> _______________________________________________
> secdir mailing list
> secdir@ietf.org
> https://www.ietf.org/mailman/listinfo/secdir
> wiki: http://tools.ietf.org/area/sec/trac/wiki/SecDirReview