[secdir] Re: secdir review of draft-ietf-anima-brski-prm-15

"Fries, Steffen" <steffen.fries@siemens.com> Tue, 04 February 2025 17:47 UTC

Return-Path: <steffen.fries@siemens.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B990DC14F61A; Tue, 4 Feb 2025 09:47:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=siemens.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m2_H_G5o76Uq; Tue, 4 Feb 2025 09:47:50 -0800 (PST)
Received: from DU2PR03CU002.outbound.protection.outlook.com (mail-northeuropeazon11012001.outbound.protection.outlook.com [52.101.66.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6582AC151091; Tue, 4 Feb 2025 09:47:50 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Fej4Au5UTG868pEH7cxpvMjz0b541L5aVeB+SzGSDMl0ngA/9qkKDI6s0oyXWGDN+VcoUqZfW6Dcpz0dKoCwfkBtvVq/VuKCLBAQ++lFCS71PrBNPzLMBaACtO01+WVTKGbBhS7LlUMtQRP2zqlIZnBUp4MFvQvthlqhpJDALewNwXBw793Aa5RzxvHZgB9QFVDekf/nMsVZqQGg8z6tpyDWYFT5b66rg4jijZbwn6BUVUtQh2nYX5DXLdrNyUScVaREvWVy3Dz2kBJyIvd3C4InXRRonte4z9JFkycRTW6OW/pC3SjsmAO+am2X3m/HYHAZGMwd5GWFOoyRB3W+QA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=j7RKKvqmxadau6ZHeS0586BdQiKxWE/BLG5q8G9Znk8=; b=FOR8FH7PoAXkflAKF+t6lYugTQtr2zUUVN5Zt6bQZ0m8oQetc+hRZPi7Lq8qp/5+gyezXpciiXIR557YsdT/JHZHnKU8JI75J9b/NZAkFLdaYphIzCdRC2sWn06axL14CrNYYPiakL1bBliM+5kJe3JMkcagrH1AOEBW67kcYBpKNvuHlI5ijnKpxVcIphE3Syydd2DrAOsc2wvAq+wZUGLfpH6obt+vACgrjMwXdGiVk0B2QkBMcKdnTAcvQPxL5RWK5ylZipksBOLs6Rx4q6D5hp77NyGT2Od77Z493S5WFvbwqgLdRI0y9Kx8itAxqZITfihXSA2lowvseb14hQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=j7RKKvqmxadau6ZHeS0586BdQiKxWE/BLG5q8G9Znk8=; b=Tb8juKyMYw3hOgTUJs+GBbqcZmCz0p06tchF7KHU/DNBqjUQ6IYWlPu5WfUm/ECV9/PcMGuzQhKEHAUoBQEugx8I28NIawZ9ho7bbRjZuK3CtwCIunvfkBRFQwFr2hWd/GeLEkXJ5dK5we9pWvnTV+txzkCwQib+RYo5g1pdPcCsBqOXExKGuOn+qhKiMtT8fzHhha3gKPIkeOjJkS+x2B5QsLSxWXKAfUBO0TSnsPc0eZ7K+WLQQVJigYSbdWq4Rw/1Yl6IxISHRCkeyUYtAq5BPsJ3RADeLJcI7xB9/sPtD87v8R/bqB0+yBCf+jXsZG1MMDWT7oyVXK2In2E6FQ==
Received: from DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:10:3c6::22) by PA2PR10MB8362.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:102:418::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8422.10; Tue, 4 Feb 2025 17:47:48 +0000
Received: from DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM ([fe80::634b:e5d0:8c00:762a]) by DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM ([fe80::634b:e5d0:8c00:762a%3]) with mapi id 15.20.8422.005; Tue, 4 Feb 2025 17:47:48 +0000
From: "Fries, Steffen" <steffen.fries@siemens.com>
To: Wes Hardaker <wjhns1@hardakers.net>, "draft-ietf-anima-brski-prm.all@ietf.org" <draft-ietf-anima-brski-prm.all@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
Thread-Topic: secdir review of draft-ietf-anima-brski-prm-15
Thread-Index: AQHbdnBKm9eyO4uYak6BCkgCZ/VFmLM2+BpQgAB0eVA=
Date: Tue, 04 Feb 2025 17:47:48 +0000
Message-ID: <DB9PR10MB63545AF86D1071B45C29119FF3F42@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
References: <yblr04ej0s6.fsf@wd.hardakers.net> <DB9PR10MB63540ACDCC8FD3749B99126CF3F42@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
In-Reply-To: <DB9PR10MB63540ACDCC8FD3749B99126CF3F42@DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ActionId=6d63db56-62f3-46d5-ae32-268fb6651979;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ContentBits=0;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Enabled=true;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Method=Standard;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Name=restricted;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SetDate=2025-02-04T10:49:39Z;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DB9PR10MB6354:EE_|PA2PR10MB8362:EE_
x-ms-office365-filtering-correlation-id: 84519a78-99c9-47ac-561a-08dd454409f8
x-ms-exchange-atpmessageproperties: SA
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: siemens.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB9PR10MB6354.EURPRD10.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 84519a78-99c9-47ac-561a-08dd454409f8
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 17:47:48.3283 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: S0fGcBexPRPmNJHsrrxy8Q8E4sou7KOwtWs18eJ/oMoxuDZCdxrm9FgDekIujGOLMMD7Hwd1GJ63R5GwS3JPaglzqsMuCwcoJH9AqTmKy8E=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA2PR10MB8362
Message-ID-Hash: B4WZL3UCQJZTFRGX4W3QDY6DLYWO6KKI
X-Message-ID-Hash: B4WZL3UCQJZTFRGX4W3QDY6DLYWO6KKI
X-MailFrom: steffen.fries@siemens.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-secdir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [secdir] Re: secdir review of draft-ietf-anima-brski-prm-15
List-Id: Security Area Directorate <secdir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/soso9rLTYWwm9c3SSW0orIj-a78>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Owner: <mailto:secdir-owner@ietf.org>
List-Post: <mailto:secdir@ietf.org>
List-Subscribe: <mailto:secdir-join@ietf.org>
List-Unsubscribe: <mailto:secdir-leave@ietf.org>

Hello Wes, 

My email went out without my reaction on your last comment. Here it is:

> 14. 8.: It would be good to include types of failures to be logged as well.  The list
> in section 8 seems to only list positive (successful) telemetry.
[stf] Section 8 was enhanced based on review feedback from the AD in version 16, which is after the version you reviewed. This should already cater success and failure situations.

Best regards
Steffen


> -----Original Message-----
> From: Fries, Steffen <steffen.fries@siemens.com>
> Sent: Tuesday, February 4, 2025 6:43 PM
> To: Wes Hardaker <wjhns1@hardakers.net>; draft-ietf-anima-brski-
> prm.all@ietf.org; secdir@ietf.org; last-call@ietf.org
> Subject: RE: secdir review of draft-ietf-anima-brski-prm-15
> 
> Hello Wes,
> 
> Thank you for your review.
> 
> We will address the your comments in the next version of the document. I made
> some inline comments to the points your raised and also provided suggestions to
> be taken over in the next version to address your comments.
> 
> 
> > -----Original Message-----
> > From: Wes Hardaker <wjhns1@hardakers.net>
> > Sent: Monday, February 3, 2025 8:17 PM
> > To: draft-ietf-anima-brski-prm.all@ietf.org; secdir@ietf.org;
> > last-call@ietf.org
> > Subject: secdir review of draft-ietf-anima-brski-prm-15
> >
> >
> > Up top:  So I'm in Tero's summary assignment list as being assigned to
> > this document, but when I finished the review and went to look at the
> > datatracker I see that Charlie Kaufman is actually assigned to it as
> > well (as a re-review).  So apparently you may get two reviews from the secdir
> instead?  I'm confused here...
> >
> >
> > I have reviewed this document as part of the security directorate's
> > ongoing effort to review all IETF documents being processed by the
> > IESG. These comments were written primarily for the benefit of the
> > security area directors. Document editors and WG chairs should treat these
> comments just like any other last call comments.
> >
> > A note about my background: I'm very familiar with the DNS and how the
> > registry/registar system works, but not familiar with the work of
> > anima or the work of the BRSKI framework specifically.
> >
> > Again, apologies for the delay in this review as January turned out to
> > be a very long with both hardware failures and a very nasty human
> > virus (and now yesterday an all-day power-outage).
> >
> > The summary of the review is: ready with a few minor comments/nits
> >
> > Version reviewed: -15
> >
> > Overall: the document is, of course, very lengthy but generally well
> > organized and each of the protocol description sections are easy to
> > follow.  I'll note that the excellent timing diagram in the top of
> > section 7 would have been highly helpful to have seen earlier in the
> > document in order to help the reader come to terms with the larger
> > goal of the protocol.  There are wording issues in various places, it
> > would be good for the authors to make one last read top-to-bottom for
> > clarity purposes.  [based on looking at -17 while typing this up, it
> > looks like this may have already been done]
> [stf] Yes, we tried to further ensure correct terminology usage and provided
> further updates. Meanwhile we also addressed further comments and have an
> intermediate version in the ANIMA git
> 
> >
> > More specific comments:
> >
> > 1. EST should be expanded on its first use (introduction)
> [stf] Thanks, incorporated as suggested
> 
> >
> > 2. The terminology specifically section could use some stronger
> > definitions.  For example "CA:  Certification Authority, issues
> > certificates."  is rather short and although everyone that understands
> > what a CA is will already understand it, new readers will not benefit much from
> such a short definition.
> [stf] Included some further information like maintenance of revocation information
> for the CA. In general, we expected the reader to be familiar with most of the
> terms as they are already used in base or related specifications like RFC 8995.
> 
> >
> > 3. Section 4 starts with "...the following requirements..." but the
> > bullets themselves aren't really written as "requirements".
> [stf] Yes, true, proposal to rename to "... the following boundary conditions ..."
> 
> >
> > 4. Section 5.3: "which may result in undesirable communications
> > pattern".  It would be helpful to have this negative communication
> > pattern better defined for the reader.
> [stf] Okay, understood. The intention was to outline that there may be increased
> communication during the onboarding in BRSKI depending on the number of
> pledges onboarding simultaneously
> OLD:
> In [RFC8995], pledges instead need to continuously request enrollment from a
> domain registrar, which may result in undesirable communications pattern and
> possible overload of a domain registrar.
> NEW:
> In [RFC8995], pledges instead need to continuously interact with the domain
> registrar during onboarding, through discovery, voucher exchange, and
> enrollment. This may increase the load on the domain registrar, specifically, if a
> larger number of pledges onboards simultaneously.
> 
> >
> > 5. Similarly, in 6.1 "it is RECOMMENDED to use short lived
> > Registrar-Agent EE certificates", but no where does it discuss why.
> > Without a background behind statements like this, you risk that the
> > reader will ignore the recommendation if they can't see the security reasoning
> behind it.
> [stf] Proposal to Include
> "This is to address the assumed nature of stand-alone Registrar-Agents as
> nomadic devices (see section 5.2) and to avoid potential misuse as outlined in in
> Section 12.3."
> This provides some reasoning upfront and points to the security consideration
> section handling that case.
> 
> >
> > 6. The document talks about security (potentially many) devices of
> > various types as they begin operation, but no where does it enumerate
> > the issues with devices that have been on the shelf for a long time
> > before power-on and discuss the ramifications of trust anchors within them that
> may be stale.
> [stf] BRSKI-PRM (s BRSKI) build upon IDevIDs (including the trust anchors)
> provided during manufacturing. The expectation on IDevID certificates is that they
> typically have a validity period in the area of the lifetime of the product. They are
> only used to bootstrap operational certificates (LDevID certificates) with a much
> shorter lifetime. But yes, if they are taken out of operation and reapplied without
> proper re-onboarding, they may fail.
> I propose to provide a statement in Section 9, Operational considerations (was
> introduced in version 16) to address this:
> "BRSKI-PRM requires pledges to possess an IDevID to enable onboarding in new
> domains. IDevID (and corresponding trust anchors) are expected to have a rather
> long lifetime. This may allow for a longer period between device acquisition and
> initial onboarding. Contrary, if devices that have been provided with an LDevID
> (and corresponding trust anchors) and temporarily taken out of service, immediate
> connectivity when bringing them back to operation may not be given, as the
> LDevIDs typically have a much shorter validity period compared to IDevIDs. It is
> therefore recommended to onboard them as new devices to ensure they possess
> valid LDevIDs."
> 
> >
> > 7. In many places (mostly in section 7) it states that TLS is optional
> > as object security properly secures the actual underlying data
> > (objects) being transferred around, which makes sense.  However, TLS
> > is referenced as being helpful to provide privacy for the exchange
> > (eg. section 7.1 (and 7.2 and ...) "TLS MAY be used...").  But that's
> > not the only goal of a transport security: it can also assure you're
> > talking to the end-entity you believed you were attempting to
> > establish a connection with.  End-point verification may be a useful feature worth
> spelling out in these sentences as well.
> [stf] Proposal to include this in section 7.1 OLD
> 	Optionally, TLS MAY be used to provide privacy for this exchange
> between the Registrar-Agent and the pledge (see Appendix B).
> NEW
> 	Optionally, TLS MAY be used to provide transport security, e.g., privacy
> and peer authentication, for the exchange between the Registrar-Agent and the
> pledge (see Appendix B).
> 
> >
> > 8. In some places (eg 7.1 again) the document states that the Accept
> > field SHOULD be set to application/voucher-jws+json, but doesn't ever
> > really say whether or not the receiving party MAY choose to accept a
> > connection from an entity that doesn't have an Accept field and simply
> > assume this.  There is an error for what happens when you refuse to,
> > but no flip side of can the connection receiver just make assumptions in
> absence of information.
> [stf] Good point!
> Included:
> - "If the Accept header was not provided in the PVR, the pledge assumes that the
> accepted response format is application/voucher-jws+json and proceeds
> processing." into section 7.1
> - "If the Accept header was not provided in the PER, the pledge assumes that the
> accepted response format is `application/voucher-jws+json` and proceeds
> processing. " into section 7.2
> 
> >
> > 9. I think the clock drift situations in 7.2.2.3 a bit understate the
> > problem.  Clock drift without connections always has rather bad drift
> > accuracy issues without a highly accurate clock source available to them.
> [stf] The note was intended as a hint. Is there anything we could provide in
> addition?
> 
> >
> > 10. I'd like to have a better mime-type string than starting with
> > "voucher" that was ideally more specific to the voucher this
> > particular system is using.  Voucher is generic but this use case is
> > just to this protocol/application type, and thus I'd expect/prefer
> > brski-voucher-jws or something.  But I recognize this is really a
> > point for a different document, however, and likely already fairly well set in stone
> and monopolized the more generic "voucher" term.
> [stf] yes, true, we synchronized the naming with the existing BRSKI and voucher
> RFCs.
> 
> 
> > 11. 7.3.5 and example in figure 22: it would be good if this figure
> > contained the agent-proximity string too.
> [stf] Hm, it was already contained in version 15 and is still available in the last
> version (17)
> 
> >
> > 12. 7.7 "The pledge MAY use the response body to signal
> > success/failure details to the service technician operating the
> > Registrar-Agent." -- it might be helpful to suggest that such
> > information be returned as JSON or some other expected structure.  As is, any
> form could be returned?
> [stf] Currently, we did not state it explicitly, but since the communication uses
> JSON already it would be good to provide the suggestion regarding the format
> directly.
> Proposal to add the following:
> "While BRSKI-PRM does not specify which content may be provided in the
> response body, it is recommended to provided the content as JSON encoded
> information as other BRSKI-PRM exchanges also utilize this encoding".
> 
> >
> > 13. 7.11.1.1: "SHOULD log the contents and alert a human."  -- I'd
> > argue that alerting a human is always an impossible task (or more
> > specifically, there is no way a for a device to know whether it's
> > alerting another system or a life form).  How about "SHOULD log the contents
> and emit an operational notification"?
> [stf] Good suggestion. Took the suggested text directly over into the draft