Re: [secdir] Review of draft-ietf-hip-hiccups-02

Jan Melen <jan.melen@ericsson.com> Fri, 09 July 2010 10:00 UTC

Return-Path: <jan.melen@ericsson.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D363B3A6999; Fri, 9 Jul 2010 03:00:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.064
X-Spam-Level:
X-Spam-Status: No, score=-5.064 tagged_above=-999 required=5 tests=[AWL=1.535, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fEbi4DvwwZ+5; Fri, 9 Jul 2010 03:00:13 -0700 (PDT)
Received: from mailgw10.se.ericsson.net (mailgw10.se.ericsson.net [193.180.251.61]) by core3.amsl.com (Postfix) with ESMTP id 6B8263A68FC; Fri, 9 Jul 2010 03:00:12 -0700 (PDT)
X-AuditID: c1b4fb3d-b7b90ae00000278d-22-4c36f328c748
Received: from esealmw129.eemea.ericsson.se (Unknown_Domain [153.88.253.125]) by mailgw10.se.ericsson.net (Symantec Mail Security) with SMTP id C3.49.10125.823F63C4; Fri, 9 Jul 2010 12:00:08 +0200 (CEST)
Received: from esealmw129.eemea.ericsson.se ([153.88.254.177]) by esealmw129.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.3959); Fri, 9 Jul 2010 12:00:07 +0200
Received: from mail.lmf.ericsson.se ([131.160.11.50]) by esealmw129.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.3959); Fri, 9 Jul 2010 12:00:07 +0200
Received: from nomadiclab.lmf.ericsson.se (nomadiclab.lmf.ericsson.se [131.160.33.3]) by mail.lmf.ericsson.se (Postfix) with ESMTP id 65F3C271F; Fri, 9 Jul 2010 13:00:07 +0300 (EEST)
Received: from nomadiclab.lmf.ericsson.se (localhost [127.0.0.1]) by nomadiclab.lmf.ericsson.se (Postfix) with ESMTP id 2E6964F8B1; Fri, 9 Jul 2010 13:00:07 +0300 (EEST)
Received: from esealmw967.eemea.ericsson.se (localhost [127.0.0.1]) by nomadiclab.lmf.ericsson.se (Postfix) with ESMTP id BFCAD4F38B; Fri, 9 Jul 2010 13:00:06 +0300 (EEST)
Mime-Version: 1.0 (Apple Message framework v1081)
Content-Type: multipart/signed; boundary="Apple-Mail-36--285303694"; protocol="application/pkcs7-signature"; micalg="sha1"
From: Jan Melen <jan.melen@ericsson.com>
In-Reply-To: <FD1ABD5D-E552-418F-9A0D-1F89B2E33395@ericsson.com>
Date: Fri, 09 Jul 2010 13:00:06 +0300
Message-Id: <66B7E019-3782-4780-8CB7-C77D61E19DBF@ericsson.com>
References: <E14135F5-C08E-4B8E-A5C4-670C892A814D@cisco.com> <FD1ABD5D-E552-418F-9A0D-1F89B2E33395@ericsson.com>
To: David McGrew <mcgrew@cisco.com>
X-Mailer: Apple Mail (2.1081)
X-Virus-Scanned: ClamAV using ClamSMTP
X-OriginalArrivalTime: 09 Jul 2010 10:00:07.0593 (UTC) FILETIME=[82B36990:01CB1F4D]
X-Brightmail-Tracker: AAAAAA==
X-Mailman-Approved-At: Mon, 12 Jul 2010 09:21:32 -0700
Cc: draft-ietf-hip-hiccups.all@tools.ietf.org, IESG <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] Review of draft-ietf-hip-hiccups-02
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Jul 2010 10:00:16 -0000

Hi,

Now -03 version is available and this should address all your previously identified concerns:
http://datatracker.ietf.org/doc/draft-ietf-hip-hiccups/

  Regards,
    Jan

On Jul 1, 2010, at 4:02 PM, Jan Melen wrote:

> 
> Thanks for review. I will submit a new version as soon as I have gone through all the other review comments from other reviewers.
> 
> On Jun 15, 2010, at 12:38 AM, David McGrew wrote:
> 
>> I have reviewed this document as part of the security directorate's  
>> ongoing effort to review all IETF documents being processed by the  
>> IESG.  These comments were written primarily for the benefit of the  
>> security area directors.  Document editors and WG chairs should treat  
>> these comments just like any other last call comments.
>> 
>> There are several points where the draft could be made more clear,  
>> some of which might impact security.  I've listed those below,  
>> intermingled with some nits.
>> 
>> Abstract and Section 1.  "secure" is used where "authenticated" would  
>> be better, since this protocol does not provide any confidentiality  
>> services or encryption.
>> 
> 
> Changed as proposed
> 
> 
>> RFC 4949 lists "message integrity code (MIC)" as a deprecated term,  
>> but this term is defined and used.  In this case what is meant is  
>> "collision-resistant hash"; that phrase should be used in Sections 2  
>> and 7.  "Checksum" is an inappropriate term for a collision-resistant  
>> hash and it should be replaced in Section 4.   For the security  
>> considerations section: does the hash need strong collision- 
>> resistance, or just second preimage resistance (also called weak  
>> collision-resistance)?
> 
> 
> Replaced with collision-resistance and added preimage requirements to security considerations.
> 
> 
>> Section 4 nits: "with help of MIC." -> "with the help of the MIC."
>> "HIP DATA packet"-> "The HIP DATA packet"
>> "Hash algorithm used to generate MIC is same " -> "The hash algorithm  
>> used to generate the MIC is the same "
> 
> Done
> 
>> 
>> Section 4.1.  I suggest emphasizing the requirement for the "Sequence  
>> Number" fields in distinct SEQ_DATA parameters to be distinct.
>> 
> 
> Done
> 
>> Section 4.3. says "Payload Data 8 last bytes of the payload data over  
>> which the MIC is calculated. This field is used to uniquely bind  
>> PAYLOAD_MIC parameter to next header, in case there are multiple  
>> copies of same type."   It seems to me that this uniqueness is not  
>> guaranteed, but that if the last-8-bytes is not unique, the MIC  
>> verification process would fail, but that there is no way that an  
>> attacker could exploit this fact.   I suggest noting this property in  
>> the security considerations.
>> 
> 
> Added to Security considerations
> 
>> Section 4.3: The PAYLOAD_MIC parameter has a field called "Payload  
>> MIC".  It would be less confusing if the latter was called "MIC Value"  
>> or some other named that is distinct from the parameter name.
> 
> Done
> 
>> Section 4.3 nit: "Identifies the data that protected by this MIC." add  
>> "is".
> 
> Done.
> 
>> Section 5.1 nit: "A HIP DATA packet MUST contain SEQ_DATA or ACK_DATA  
>> parameter if both parameters are missing then packet MUST be dropped  
>> as invalid." -> "A HIP DATA packet MUST contain either a SEQ_DATA or  
>> ACK_DATA parameter; if both parameters are missing, then the packet  
>> MUST be dropped as invalid."
> 
> Done.
> 
>> Section 5.2 says "The receiver MUST validate these MICs."  It should  
>> also describe how to validate them, and S 5.3 would be a more  
>> appropriate place to detail that process.
> 
> That is already defined in 5.3.1 so I added reference to that.
> 
> 
>> Section 5.2 says " ... no SEQ_DATA sequence number is reused before  
>> the receiver has closed the processing window for the previous packet  
>> using the same SEQ_DATA sequence number."  Important question: what  
>> enables the receiver to tell the difference?   I assume that there are  
>> some other fields (e.g. nonces) associated with the connection that  
>> might serve this purpose; if that is right, I suggest documenting that  
>> fact.
> 
> It can be easily checked by comparing the MIC value and I added also a statement on that to section 5.3.1.
> 
>   Regards,
>     Jan
> 
>