Re: [secdir] review of draft-hollenbeck-rfc4933bis-02
"Hollenbeck, Scott" <shollenbeck@verisign.com> Thu, 16 July 2009 16:07 UTC
Return-Path: <shollenbeck@verisign.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C58F53A6930; Thu, 16 Jul 2009 09:07:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id est7esOJmn4H; Thu, 16 Jul 2009 09:07:05 -0700 (PDT)
Received: from osprey.verisign.com (osprey.verisign.com [216.168.239.75]) by core3.amsl.com (Postfix) with ESMTP id B40903A6DB9; Thu, 16 Jul 2009 09:07:05 -0700 (PDT)
Received: from dul1wnexcn02.vcorp.ad.vrsn.com (dul1wnexcn02.vcorp.ad.vrsn.com [10.170.12.139]) by osprey.verisign.com (8.13.6/8.13.4) with ESMTP id n6GFsa2c003771; Thu, 16 Jul 2009 11:54:36 -0400
Received: from dul1wnexmb01.vcorp.ad.vrsn.com ([10.170.12.134]) by dul1wnexcn02.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 16 Jul 2009 12:06:52 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 16 Jul 2009 12:06:51 -0400
Message-ID: <046F43A8D79C794FA4733814869CDF0702B8DF05@dul1wnexmb01.vcorp.ad.vrsn.com>
In-Reply-To: <Pine.WNT.4.64.0907161151370.4816@SANDYM-LT.columbia.ads.sparta.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [secdir] review of draft-hollenbeck-rfc4933bis-02
Thread-Index: AcoGLuISCQv7N5l1ThuUAr1OH9enpwAADFhA
References: <C684B760.11AC5%tim.polk@nist.gov> <Pine.WNT.4.64.0907161151370.4816@SANDYM-LT.columbia.ads.sparta.com>
From: "Hollenbeck, Scott" <shollenbeck@verisign.com>
To: Sandra Murphy <sandy@sparta.com>, "Polk, William T." <william.polk@nist.gov>
X-OriginalArrivalTime: 16 Jul 2009 16:06:52.0767 (UTC) FILETIME=[6EEBFEF0:01CA062F]
Cc: iesg@ietf.org, Nicolas Williams <Nicolas.Williams@sun.com>, secdir@ietf.org
Subject: Re: [secdir] review of draft-hollenbeck-rfc4933bis-02
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2009 16:07:06 -0000
> -----Original Message----- > From: Sandra Murphy [mailto:sandy@sparta.com] > Sent: Thursday, July 16, 2009 12:01 PM > To: Polk, William T. > Cc: Alexey Melnikov; Hollenbeck, Scott; Catherine Meadows; > iesg@ietf.org; Nicolas Williams; secdir@ietf.org > Subject: Re: [secdir] review of draft-hollenbeck-rfc4933bis-02 > > > On Thu, 16 Jul 2009, Polk, William T. wrote: > > > Hi Alexey, > > > > > > On 7/16/09 7:18 AM, "Alexey Melnikov" > <alexey.melnikov@isode.com> wrote: > > > >> Hi Tim, > >> > >> Polk, William T. wrote: > >> > >>> I¹m a little late to the party, but I have been quietly > mulling over > >>> this problem as well. Now that Sandy has explicitly asked > for an AD > >>> to step in, I figured I should participate more actively. I have > >>> also added Nico Williams to the CC list (my apologies, > Nico) since > >>> channel bindings is really his area of expertise. > >>> > >>> I think there is a real need for channel bindings with some > >>> applications of EPP, but may not always be strictly necessary in > >>> other cases. For example, the e-Automation project for the > >>> administration of DNS root zone uses EPP but if I recall > correctly > >>> most of the objects that are transferred are digitally signed > >>> objects. In this case, channel bindings are perhaps less > important > >>> since we aren¹t relying solely on the EPP authentication > mechanism. > >>> So, in my opinion we should encourage their use but > should not require channel bindings. > >> > >>> > >>> However, if the application is relying on EPP in combination with > >>> transport for security, channel bindings would provide > significantly > >>> enhanced security. That says channel bindings deserves to be > >>> mentioned and a little guidance on (1) implementing > channel bindings > >>> and (2) determining when channel bindings is required. > That begs a > >>> new question of course where does this information go? > >> > >> Nico's response confirmed what I was thinking about this > myself: for > >> EPP running over TLS over TCP (4934bis), channel bindings are not > >> required, because TLS authentication is mandatory and because TLS > >> server certificate verification procedure is also mandatory. > >> So I don't think there is an issue with 4934bis document. > >> > > > > I'm not so sure... TLS server certificate verification protects the > > client against a MITM attack. The server has no way of knowing > > whether this procedure has been implemented. So, the > server does not > > have all the protection it needs unless the TLS connection > uses client > > certificate authentication as well. > > > > Channel bindings would extend the level of assurance for the server. > > Alternatively, mutual authentication using certificates > would resolve > > the problem as well. > > > >>> I am starting to believe that the security considerations > section of > >>> 4930bis should note that enhanced security SHOULD be achieved > >>> through channel bindings unless the application involves > digitally > >>> signed objects, > >> > >> I think another alternative can be to require mutual TLS > >> authentication in a transport protocol mapping document. > > > > I think that would be a great solution, and it wouldn't > need to tamper > > with EPP or 4934bis. Any new EPP transport protocol > mappings in the works? > > rfc4930bis mentions a couple of others in sect 2.1 Transport > Mapping Considerations > > - The transport mapping MUST be onto a transport such as TCP > [RFC0793] or Stream Control Transmission Protocol > (SCTP) [RFC4960] > that provides congestion avoidance that follows RFC 2914 > [RFC2914], or if it maps onto a protocol such as SMTP > [RFC5321] or > Blocks Extensible Exchange Protocol (BEEP) [RFC3080], then the > performance issues need to take into account issues of > overload, > server availability, and so forth. > > I don't know how close to "in the works" those other > suggested examples are. > > Later it says that EPP can be carried over both > connection-less and connection oriented transports. > > And the security considerations section says that > > EPP instances MUST be protected using > a transport mechanism or application protocol that provides > integrity, confidentiality, and mutual strong client-server > authentication. I'm not aware of any other IETF work to develop a standards-track transport mapping for EPP. I have heard that other transports are being used by ccTLDs (they often "roll their own" when it comes to how they operate), but I don't have specific info on-hand. -Scott-
- [secdir] review of draft-hollenbeck-rfc4933bis-02 Catherine Meadows
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Hollenbeck, Scott
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Catherine Meadows
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Hollenbeck, Scott
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Sandra Murphy
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Polk, William T.
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Hollenbeck, Scott
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Alexey Melnikov
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Polk, William T.
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Polk, William T.
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Nicolas Williams
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Sandra Murphy
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Hollenbeck, Scott
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Nicolas Williams