Re: [secdir] Review of draft-ietf-hip-hiccups-02
Jan Melen <jan.melen@ericsson.com> Fri, 09 July 2010 10:00 UTC
Return-Path: <jan.melen@ericsson.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D363B3A6999; Fri, 9 Jul 2010 03:00:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.064
X-Spam-Level:
X-Spam-Status: No, score=-5.064 tagged_above=-999 required=5 tests=[AWL=1.535, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fEbi4DvwwZ+5; Fri, 9 Jul 2010 03:00:13 -0700 (PDT)
Received: from mailgw10.se.ericsson.net (mailgw10.se.ericsson.net [193.180.251.61]) by core3.amsl.com (Postfix) with ESMTP id 6B8263A68FC; Fri, 9 Jul 2010 03:00:12 -0700 (PDT)
X-AuditID: c1b4fb3d-b7b90ae00000278d-22-4c36f328c748
Received: from esealmw129.eemea.ericsson.se (Unknown_Domain [153.88.253.125]) by mailgw10.se.ericsson.net (Symantec Mail Security) with SMTP id C3.49.10125.823F63C4; Fri, 9 Jul 2010 12:00:08 +0200 (CEST)
Received: from esealmw129.eemea.ericsson.se ([153.88.254.177]) by esealmw129.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.3959); Fri, 9 Jul 2010 12:00:07 +0200
Received: from mail.lmf.ericsson.se ([131.160.11.50]) by esealmw129.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.3959); Fri, 9 Jul 2010 12:00:07 +0200
Received: from nomadiclab.lmf.ericsson.se (nomadiclab.lmf.ericsson.se [131.160.33.3]) by mail.lmf.ericsson.se (Postfix) with ESMTP id 65F3C271F; Fri, 9 Jul 2010 13:00:07 +0300 (EEST)
Received: from nomadiclab.lmf.ericsson.se (localhost [127.0.0.1]) by nomadiclab.lmf.ericsson.se (Postfix) with ESMTP id 2E6964F8B1; Fri, 9 Jul 2010 13:00:07 +0300 (EEST)
Received: from esealmw967.eemea.ericsson.se (localhost [127.0.0.1]) by nomadiclab.lmf.ericsson.se (Postfix) with ESMTP id BFCAD4F38B; Fri, 9 Jul 2010 13:00:06 +0300 (EEST)
Mime-Version: 1.0 (Apple Message framework v1081)
Content-Type: multipart/signed; boundary="Apple-Mail-36--285303694"; protocol="application/pkcs7-signature"; micalg="sha1"
From: Jan Melen <jan.melen@ericsson.com>
In-Reply-To: <FD1ABD5D-E552-418F-9A0D-1F89B2E33395@ericsson.com>
Date: Fri, 09 Jul 2010 13:00:06 +0300
Message-Id: <66B7E019-3782-4780-8CB7-C77D61E19DBF@ericsson.com>
References: <E14135F5-C08E-4B8E-A5C4-670C892A814D@cisco.com> <FD1ABD5D-E552-418F-9A0D-1F89B2E33395@ericsson.com>
To: David McGrew <mcgrew@cisco.com>
X-Mailer: Apple Mail (2.1081)
X-Virus-Scanned: ClamAV using ClamSMTP
X-OriginalArrivalTime: 09 Jul 2010 10:00:07.0593 (UTC) FILETIME=[82B36990:01CB1F4D]
X-Brightmail-Tracker: AAAAAA==
X-Mailman-Approved-At: Mon, 12 Jul 2010 09:21:32 -0700
Cc: draft-ietf-hip-hiccups.all@tools.ietf.org, IESG <iesg@ietf.org>, secdir@ietf.org
Subject: Re: [secdir] Review of draft-ietf-hip-hiccups-02
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Jul 2010 10:00:16 -0000
Hi, Now -03 version is available and this should address all your previously identified concerns: http://datatracker.ietf.org/doc/draft-ietf-hip-hiccups/ Regards, Jan On Jul 1, 2010, at 4:02 PM, Jan Melen wrote: > > Thanks for review. I will submit a new version as soon as I have gone through all the other review comments from other reviewers. > > On Jun 15, 2010, at 12:38 AM, David McGrew wrote: > >> I have reviewed this document as part of the security directorate's >> ongoing effort to review all IETF documents being processed by the >> IESG. These comments were written primarily for the benefit of the >> security area directors. Document editors and WG chairs should treat >> these comments just like any other last call comments. >> >> There are several points where the draft could be made more clear, >> some of which might impact security. I've listed those below, >> intermingled with some nits. >> >> Abstract and Section 1. "secure" is used where "authenticated" would >> be better, since this protocol does not provide any confidentiality >> services or encryption. >> > > Changed as proposed > > >> RFC 4949 lists "message integrity code (MIC)" as a deprecated term, >> but this term is defined and used. In this case what is meant is >> "collision-resistant hash"; that phrase should be used in Sections 2 >> and 7. "Checksum" is an inappropriate term for a collision-resistant >> hash and it should be replaced in Section 4. For the security >> considerations section: does the hash need strong collision- >> resistance, or just second preimage resistance (also called weak >> collision-resistance)? > > > Replaced with collision-resistance and added preimage requirements to security considerations. > > >> Section 4 nits: "with help of MIC." -> "with the help of the MIC." >> "HIP DATA packet"-> "The HIP DATA packet" >> "Hash algorithm used to generate MIC is same " -> "The hash algorithm >> used to generate the MIC is the same " > > Done > >> >> Section 4.1. I suggest emphasizing the requirement for the "Sequence >> Number" fields in distinct SEQ_DATA parameters to be distinct. >> > > Done > >> Section 4.3. says "Payload Data 8 last bytes of the payload data over >> which the MIC is calculated. This field is used to uniquely bind >> PAYLOAD_MIC parameter to next header, in case there are multiple >> copies of same type." It seems to me that this uniqueness is not >> guaranteed, but that if the last-8-bytes is not unique, the MIC >> verification process would fail, but that there is no way that an >> attacker could exploit this fact. I suggest noting this property in >> the security considerations. >> > > Added to Security considerations > >> Section 4.3: The PAYLOAD_MIC parameter has a field called "Payload >> MIC". It would be less confusing if the latter was called "MIC Value" >> or some other named that is distinct from the parameter name. > > Done > >> Section 4.3 nit: "Identifies the data that protected by this MIC." add >> "is". > > Done. > >> Section 5.1 nit: "A HIP DATA packet MUST contain SEQ_DATA or ACK_DATA >> parameter if both parameters are missing then packet MUST be dropped >> as invalid." -> "A HIP DATA packet MUST contain either a SEQ_DATA or >> ACK_DATA parameter; if both parameters are missing, then the packet >> MUST be dropped as invalid." > > Done. > >> Section 5.2 says "The receiver MUST validate these MICs." It should >> also describe how to validate them, and S 5.3 would be a more >> appropriate place to detail that process. > > That is already defined in 5.3.1 so I added reference to that. > > >> Section 5.2 says " ... no SEQ_DATA sequence number is reused before >> the receiver has closed the processing window for the previous packet >> using the same SEQ_DATA sequence number." Important question: what >> enables the receiver to tell the difference? I assume that there are >> some other fields (e.g. nonces) associated with the connection that >> might serve this purpose; if that is right, I suggest documenting that >> fact. > > It can be easily checked by comparing the MIC value and I added also a statement on that to section 5.3.1. > > Regards, > Jan > >
- [secdir] Review of draft-ietf-hip-hiccups-02 David McGrew
- Re: [secdir] Review of draft-ietf-hip-hiccups-02 Jan Melen
- Re: [secdir] Review of draft-ietf-hip-hiccups-02 Jan Melen