Re: [tcpm] TCP-AO review comments.

Joe Touch <touch@ISI.EDU> Mon, 28 July 2008 09:02 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 44E2D3A6AFF; Mon, 28 Jul 2008 02:02:31 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 794673A6B07 for <tcpm@core3.amsl.com>; Mon, 28 Jul 2008 02:02:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.354
X-Spam-Level:
X-Spam-Status: No, score=-2.354 tagged_above=-999 required=5 tests=[AWL=0.245, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id peth67Z8NJHW for <tcpm@core3.amsl.com>; Mon, 28 Jul 2008 02:02:27 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by core3.amsl.com (Postfix) with ESMTP id E27E13A6AB6 for <tcpm@ietf.org>; Mon, 28 Jul 2008 02:02:27 -0700 (PDT)
Received: from [130.129.20.69] ([130.129.20.69]) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id m6S92K1m026367 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 28 Jul 2008 02:02:23 -0700 (PDT)
Message-ID: <488D8AFD.2070601@isi.edu>
Date: Mon, 28 Jul 2008 02:01:49 -0700
From: Joe Touch <touch@ISI.EDU>
User-Agent: Thunderbird 2.0.0.16 (Windows/20080708)
MIME-Version: 1.0
To: "Anantha Ramaiah (ananth)" <ananth@cisco.com>
References: <0C53DCFB700D144284A584F54711EC58058C2FD4@xmb-sjc-21c.amer.cisco.com>
In-Reply-To: <0C53DCFB700D144284A584F54711EC58058C2FD4@xmb-sjc-21c.amer.cisco.com>
X-Enigmail-Version: 0.95.6
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: tcpm@ietf.org
Subject: Re: [tcpm] TCP-AO review comments.
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi, Ananth,

As I noted with Eric's comments, we can discuss this further in the
meeting today, but it might be useful to try to discuss some on the list
first... see below.

Joe

Anantha Ramaiah (ananth) wrote:
| Hi,
|   I went over the latest copy of the TCP authentication draft and
| jotting down my observations and comments.
|
| #1
|    I have problem with the term "obsoletes 2385" [ I did bring this up

Whether or not we are obsoleting things is a topic for today's
discussion. I should have removed it from the doc header until we make a
decision, though.

| before] It is going to be a long time before deployments move over to
| the new TCP auth option. Many customers (deployments) are fine with TCP
| MD5 with periodic key rollover option and hence would not move to TCP-AO

There is no key rollover option to TCP MD5. The doc is vague on this
issue, saying only "presumably connection specific"; there is no key ID,
and no discussion of the impact of changing keys during a connection.

| immediately. So, in short it really depends on combination of perceived
| threat levels, desired security level of a network. Also, TCP-AO is
| taking a new TCP option number with backward compatibility in mind.

The desire to use a new option number has nothing to do with backward
compatibility. As noted in precursors to this doc, the TCP MD5 ID could
be reused. Backward compatibility is limited - and we are discussing the
extent to which that is needed today as well. A given connection is not
intended to back off from TCP-AO and use TCP-MD5 automatically.

| Abstract
|
| - It mentions BGP and LDP. FWIW MSDP also uses TCP MD5 and some
| proprietary protocols as well. Should we use the word, "long lived
| connections" instead? Just wanted to convey the feeling that it is
| intended to be a generic TCP authentication option.

We probably want to leave the current examples (and add MSDP), as well
as noting the general utility of this mechanism.

| Section 1.1
|
| "allows rekeying during a TCP connection "
|
| 2385 doesn't mention re-keying nor does it preclude one from doing so.
| Like I mentioned earlier, deployments have been running code with some
| implicit key rollover schemes.

Agreed that it is not discussed explicitly, but a key rollover would
generate logging error messages ("probably advisable"). Current
implementations may have a working mechanism for rollover, but they make
many presumptions that are not specified, e.g., that retransmissions
must use the new key once installed. Further, key rollover would result
in lost segments, retransmission, and potential impact on the congestion
window.

The section should clarify that TCP-AO "explicitly allows rekeying
during a TCP connection, without impacting packet loss"

| Section 3
| (security association management (TSAD)
|
| - IMO, the contents and interpreation of TSAD should be implementation
| specific. Applications can use some out of band (or configuration)
| mechanism to set up the TSAD.

TSAD is setup out-of-band; that's the purpose of the key management
mechanism, e.g.

The contents are specified for two reasons:
	- to define the API to access the info
	- to define the syntactic relationship between components

The TSAD can be implemented in any way the user desires, so long as it
stores and retrieves the data specified thusly.

| - It says : "there MUST be no more than one matching TSAD entry" Not
| sure why, you could have a primary and secondary key here. (I understand
| that this is not robust) but using a MUST here seems too much of a
| restriction. In other words, IMO, this document shouldn't be specifying
| too much about TSAD.

A single TSAD entry can have multiple keys. Having multiple matching
TSAD entries means there is a collision that cannot be resolved.

| - TCP option exclusion : reading this it seems unclear to me as to
| whether TCP-AO is excluded in the option calculation or not.

This can be clarified. The intent is to exclude or include all options;
parsing and including individual options would be expensive on a
per-packet basis. The TCP-AO option MAC is zeroed if the options are
included.

| - it says : "TCP option kind exclusion list MUST NOT change during TCP
| connection" Not sure why? Needs explanation.

This can be clarified. The goal is that all changes during a connection
do not affect packet loss. Doing so for the option exclusion means an
additional per-packet check which doesn't seem to be necessary.

| - It says "keyID MAY have value of 0" - really what is the point here?

The goal is to not preclude or reserve any KeyID values.

| Also, shouldn't we allow non-numeric key ID's ?

The KeyID is an 8-bit field, interpreted as an index of 0-255. What
purpose would non-numeric IDs serve?

| - "Asymmetric use of TCP-AO" - I am kind of confused here, are we saying
| that the ACK's are not going to be signed, from the peer which has
| negotaited "NONE" ? If so, isn't a security hole since someone can spoof
| an ACK and cause issues for the side which HAS signed up for
| authentication?

The utility of this was discussed in Philadelphia. The doc might benefit
from expanded review of that discussion.

| - Question :
| I have heard cases where some customers (although rare) want the
| authentication to be turned off at some point of time, and also turned
| on dynamically. TCP, today doesn't allow options negotiation "on
| demand", so the latter point is moot for now. What are the thoughts
| about turning off the AO option ?

IMO, that's handled by using NONE, i.e., the keyID changes and thus the
corresponding algorithm. TCP state - i.e., the fact that TCP-AO is being
used - never changes during a connection; that's because TCP doesn't
support such state negotiation after the SYN exchange, and to add that
would effectively change the TCP state diagram (which seems avoidable
and desirable to avoid).

| - TCP user interface - I am not sure why this document (no other TCP
| option document even mentions that), for eg:- STATUS call, there is no
| such thing as TCP API document,

RFC793 specifies the TCP API. STATUS is defined there. BSD implements
that API (or at least a close approximation of it ;-)

| typically BSD sockets are the popular
| API set, the point is that you may want to simply say "appropriate API's
| for the application to read/configure entries"  Just a nitpick since I
| haven't seen any other TCP option document even talk about such things..

IMO, that's a deficiency of other option docs ;-)

| This comment can be ignored if needed..
|
| - On connectionless resets.
| Today, the way implementations work is that when a RST is generated, if
| the incoming TCP segment has the TCP MD5 option, then it consults the
| database to obtain the key for the the 4 tuple in question. In the case
| TCP-AO option with the use of index, you could still obtain this piece
| of information and generate the RST. Well, this is a "best effort", but
| has been proven to be useful field experience.

I'm not sure what the question here is; the RST MUST have the TCP-AO
with the correct fields to be accepted at the receiver. Can you restate
the question regarding RSTs?

Joe
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkiNiv0ACgkQE5f5cImnZrtOTQCg05lOQTahQTIRDFk1lRyUjl9P
NhoAn37/C7donQo8Er//Xtmra4j/0dHF
=ok2w
-----END PGP SIGNATURE-----
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm