Re: [secdir] SECDIR Review of draft-ietf-dime-local-keytran-11.txt

Glen Zorn <gwz@net-zen.net> Fri, 15 July 2011 07:15 UTC

Return-Path: <gwz@net-zen.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5ED3021F8562 for <secdir@ietfa.amsl.com>; Fri, 15 Jul 2011 00:15:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZL5n-KO6veor for <secdir@ietfa.amsl.com>; Fri, 15 Jul 2011 00:15:32 -0700 (PDT)
Received: from smtpauth18.prod.mesa1.secureserver.net (smtpauth18.prod.mesa1.secureserver.net [64.202.165.31]) by ietfa.amsl.com (Postfix) with SMTP id 77D4B21F855B for <secdir@ietf.org>; Fri, 15 Jul 2011 00:15:31 -0700 (PDT)
Received: (qmail 26497 invoked from network); 15 Jul 2011 07:15:30 -0000
Received: from unknown (110.168.113.93) by smtpauth18.prod.mesa1.secureserver.net (64.202.165.31) with ESMTP; 15 Jul 2011 07:15:29 -0000
Message-ID: <4E1FE90C.8050001@net-zen.net>
Date: Fri, 15 Jul 2011 14:15:24 +0700
From: Glen Zorn <gwz@net-zen.net>
Organization: Network Zen
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20110624 Thunderbird/5.0
MIME-Version: 1.0
To: Phillip Hallam-Baker <hallam@gmail.com>
References: <CAMm+Lwh0CkuA_HRkgRB=GAQ4B-rG79kv+Nf=jnVJYUYfmhn8+g@mail.gmail.com>
In-Reply-To: <CAMm+Lwh0CkuA_HRkgRB=GAQ4B-rG79kv+Nf=jnVJYUYfmhn8+g@mail.gmail.com>
X-Enigmail-Version: 1.2
Content-Type: multipart/mixed; boundary="------------030506040702030700000406"
Cc: violeta.cakulev@alcatel-lucent.com, sunseawq@huawei.com, iesg@ietf.org, secdir@ietf.org
Subject: Re: [secdir] SECDIR Review of draft-ietf-dime-local-keytran-11.txt
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jul 2011 07:15:37 -0000

On 7/14/2011 3:05 AM, Phillip Hallam-Baker wrote:

> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG. Document editors and WG chairs should treat these comments just
> like any other last call comments.
> 
> SECURITY
> 
> There is no substantive security considerations, only a redirect to the
> previous drafts.
> 
> This is somewhat problematic given that this is a document defining new
> formats for key transport.

If it is problematic then it would be quite helpful to say what exactly
the problem is.  Has the nature of cryptographic keys or Diameter
changed fundamentally since the publication of RFC 4072?  If not, what
is the problem?

> 
> 
> Minor
> 
> 3.1.4.  Key-Lifetime AVP
> 
> The Key-Lifetime AVP (AVP Code <AC4>) is of type Unsigned32 and
> represents the period of time (in seconds) for which the contents of the
> Keying-Material AVP (Section 3.1.3) is valid.
> 
> If the key lifetime is really expected to be 2^32, i.e. 136 years

They are most certainly not.

> then
> we should probably expect quite a bit more mechanism here.
> 
> The delta encoding avoids millennium bug type problems (we.. maybe, it
> probably just means that code will start to fail in 2032 or so when
> people start specifying key lifetimes that cause signed 32 bit time to
> wrap.) but it means that the start of the period is not fixed in time.
> 
> I think that at a minimum we need to have a security consideration
> pointing out that there is an issue here. What happens if these messages
> are proxied or cached in some fashion (OK it may not be in the protocol
> now, but can we guarantee it never will be?)
> 
> Its probably not worth fixing since the protocols themselves are full of
> the same issue but it should be called out as an SC.
> 
> 
> 
> -- 
> Website: http://hallambaker.com/
>