Re: [secdir] review of draft-hollenbeck-rfc4933bis-02
Sandra Murphy <sandy@sparta.com> Thu, 16 July 2009 16:02 UTC
Return-Path: <Sandra.Murphy@cobham.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 512573A69D9; Thu, 16 Jul 2009 09:02:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.55
X-Spam-Level:
X-Spam-Status: No, score=-2.55 tagged_above=-999 required=5 tests=[AWL=0.049, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cbjQMDgsS7qM; Thu, 16 Jul 2009 09:02:01 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by core3.amsl.com (Postfix) with ESMTP id 043E93A67AC; Thu, 16 Jul 2009 09:02:00 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id n6GG1Cet007132; Thu, 16 Jul 2009 11:01:12 -0500
Received: from nemo.columbia.ads.sparta.com (nemo.columbia.sparta.com [157.185.80.75]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id n6GG1CRN016977; Thu, 16 Jul 2009 11:01:12 -0500
Received: from SANDYM-LT.columbia.ads.sparta.com ([157.185.81.126]) by nemo.columbia.ads.sparta.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Thu, 16 Jul 2009 12:01:11 -0400
Date: Thu, 16 Jul 2009 12:01:09 -0400
From: Sandra Murphy <sandy@sparta.com>
To: "Polk, William T." <william.polk@nist.gov>
In-Reply-To: <C684B760.11AC5%tim.polk@nist.gov>
Message-ID: <Pine.WNT.4.64.0907161151370.4816@SANDYM-LT.columbia.ads.sparta.com>
References: <C684B760.11AC5%tim.polk@nist.gov>
X-X-Sender: sandy@nemo.columbia.sparta.com
MIME-Version: 1.0
Content-Type: MULTIPART/MIXED; BOUNDARY="74044448-22167-1247760069=:4816"
X-OriginalArrivalTime: 16 Jul 2009 16:01:11.0568 (UTC) FILETIME=[A38D2900:01CA062E]
Cc: Nicolas Williams <Nicolas.Williams@sun.com>, "secdir@ietf.org" <secdir@ietf.org>, "Hollenbeck, Scott" <shollenbeck@verisign.com>, "iesg@ietf.org" <iesg@ietf.org>
Subject: Re: [secdir] review of draft-hollenbeck-rfc4933bis-02
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2009 16:02:02 -0000
On Thu, 16 Jul 2009, Polk, William T. wrote: > Hi Alexey, > > > On 7/16/09 7:18 AM, "Alexey Melnikov" <alexey.melnikov@isode.com> wrote: > >> Hi Tim, >> >> Polk, William T. wrote: >> >>> I¹m a little late to the party, but I have been quietly mulling over >>> this problem as well. Now that Sandy has explicitly asked for an AD to >>> step in, I figured I should participate more actively. I have also >>> added Nico Williams to the CC list (my apologies, Nico) since channel >>> bindings is really his area of expertise. >>> >>> I think there is a real need for channel bindings with some >>> applications of EPP, but may not always be strictly necessary in other >>> cases. For example, the e-Automation project for the administration of >>> DNS root zone uses EPP but if I recall correctly most of the objects >>> that are transferred are digitally signed objects. In this case, >>> channel bindings are perhaps less important since we aren¹t relying >>> solely on the EPP authentication mechanism. So, in my opinion we >>> should encourage their use but should not require channel bindings. >> >>> >>> However, if the application is relying on EPP in combination with >>> transport for security, channel bindings would provide significantly >>> enhanced security. That says channel bindings deserves to be mentioned >>> and a little guidance on (1) implementing channel bindings and (2) >>> determining when channel bindings is required. That begs a new >>> question of course where does this information go? >> >> Nico's response confirmed what I was thinking about this myself: for EPP >> running over TLS over TCP (4934bis), channel bindings are not required, >> because TLS authentication is mandatory and because TLS server >> certificate verification procedure is also mandatory. >> So I don't think there is an issue with 4934bis document. >> > > I'm not so sure... TLS server certificate verification protects the client > against a MITM attack. The server has no way of knowing whether this > procedure has been implemented. So, the server does not have all the > protection it needs unless the TLS connection uses client certificate > authentication as well. > > Channel bindings would extend the level of assurance for the server. > Alternatively, mutual authentication using certificates would resolve the > problem as well. > >>> I am starting to believe that the security considerations section of >>> 4930bis should note that enhanced security SHOULD be achieved through >>> channel bindings unless the application involves digitally signed objects, >> >> I think another alternative can be to require mutual TLS authentication >> in a transport protocol mapping document. > > I think that would be a great solution, and it wouldn't need to tamper with > EPP or 4934bis. Any new EPP transport protocol mappings in the works? rfc4930bis mentions a couple of others in sect 2.1 Transport Mapping Considerations - The transport mapping MUST be onto a transport such as TCP [RFC0793] or Stream Control Transmission Protocol (SCTP) [RFC4960] that provides congestion avoidance that follows RFC 2914 [RFC2914], or if it maps onto a protocol such as SMTP [RFC5321] or Blocks Extensible Exchange Protocol (BEEP) [RFC3080], then the performance issues need to take into account issues of overload, server availability, and so forth. I don't know how close to "in the works" those other suggested examples are. Later it says that EPP can be carried over both connection-less and connection oriented transports. And the security considerations section says that EPP instances MUST be protected using a transport mechanism or application protocol that provides integrity, confidentiality, and mutual strong client-server authentication. --Sandy > >> >>> and that the TLS usage section of 4934bis (section 9) should include a >>> pointer to techniques for implementing channel bindings with TLS. >> >> As per my coment above, I don't think this is needed. >> Besides adding channel bindings to EPP would require an extension to EPP >> itself. > > That has been part of my concern from the beginning. Since we are > progressing to Full Standard, extending EPP is pretty much a non-starter. > > That is why I would prefer to restrict my discuss or comment to raising > issues in the security considerations of 4930bis. > >> >>> I am still mulling this over, and will probably not enter any discuss >>> until tomorrow, but this seems the best approach. (Hopefully Nico will >>> weigh in before then and keep me straight on this one...) >> >> >> > >
- [secdir] review of draft-hollenbeck-rfc4933bis-02 Catherine Meadows
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Hollenbeck, Scott
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Catherine Meadows
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Hollenbeck, Scott
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Sandra Murphy
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Polk, William T.
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Hollenbeck, Scott
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Alexey Melnikov
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Polk, William T.
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Polk, William T.
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Nicolas Williams
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Sandra Murphy
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Hollenbeck, Scott
- Re: [secdir] review of draft-hollenbeck-rfc4933bi… Nicolas Williams