Hi Roque,
| -----Mensaje original-----
| De: Roque Gagliano [mailto:[email protected]]
| Enviado el: jueves, 16 de septiembre de 2010 11:16
| Para: Alberto García
| CC: [email protected]
| Asunto: Re: [CGA-EXT] Key Purpose Id specification and
draft-ietf-csi-proxy-send
|
[...]
| > c) could be to have 2 Key Purpose Ids for proxy operation instead of
one
| (therefore replacing id-kp-sendProxy), in which case the following text
could be
| included in draft-ietf-csi-send-cert, section 7:
|
| I take option c).
|
| When I first thought about this, I remembered the old times of modem
access
| and Proxy-ARP in routers. I see now a use-case for
"id-kp-sendProxiedOwner"
| even without considering MIP6.
|
| I agree that we should go this path, it will make a better set of
documents.
| However, I believe that if we go this path, we need also to make sure
that there
| is a synchronization between this document and the proxy document to
reflect
| the correct sender/receiver behavior.
Fine. Then, the main changes in draft-ietf-csi-proxy-send would be:
CHANGE #1
--------------
"5.2.1. Processing rules for senders
A Secure ND Proxy MUST NOT use a key to sign NDP message types which
do not correspond to the authorization granted to the considered key.
NA, NS and RS messages MUST be signed with a key corresponding to a
Secure Proxy ND certificate with a KeyPurposeID value
[I-D.ietf-csi-send-cert] of id-kp-sendProxiedOwner, and the source
addresses of the messages MUST belong to the prefix associated to the
certificate. RA and Redirect messages MUST be signed with a key
corresponding to a Secure Proxy ND certificate with a KeyPurposeID
value of id-kp-sendProxiedRouter. The prefix included in the RA
message for on-link determination and/or stateless address
autoconfiguration, and the Target Address of the Redirect message,
MUST be equal or be included into the prefix associated to that
certificate.
[...]"
CHANGE #2
--------------
Rule #2 in "5.2.2. Processing rules for receivers"
"2. The Key Hash field MUST indicate the use of a known public key.
A valid certification path (see [RFC3971] Section 6.3) between
the receiver's trust anchor and the sender's public key MUST be
known. The Secure Proxy ND's X509v3 certificate MUST contain an
extended key usage extension including the appropriate
KeyPurposeId value and prefix for the message to validate:
* For RA messages, a KeyPurposeId value of id-kp-
sendProxiedRouter MUST exist for the certificate, and the
prefix included in the RA message for on-link determination
and/or stateless address autoconfiguration MUST be equal or be
included into the prefix associated to that certificate.
* For Redirect messages, a KeyPurposeId value of id-kp-
sendProxiedRouter MUST exist for the certificate, and the
prefix included in the Target Address of the Redirect message
MUST belong to the prefix associated to that certificate.
* For NA, NS and RS messages, a KeyPurposeId value of id-kp-
sendProxiedOwner MUST exist for the certificate, and the
source addresses of the messages MUST belong to the prefix
associated to the certificate.
If any of these tests fails, the verification fails."
CHANGE #3
--------------
Modification of the application scenarios to detail how the certificates are
configured. For example, for PMIPv6:
" To provide SEND protection, each MAG is configured to act as a proxy
by means of a certificate associated to the PMIPv6 domain,
authorizing each MAG to proxy securely NA and RS messages by means of
a KeyPurposeId value of id-kp-sendProxiedOwner. In addition, the
certificate must also authorize the MAG to advertise prefixes, by
associating to the same certificate a KeyPurposeId value of id-kp-
sendProxiedRouter. Note that the inclusion of multiple KeyPurposeId
values is supported by [I-D.ietf-csi-send-cert]."
CHANGE #4
--------------
And finally, in the following paragraph would be included in the security
considerations section:
" A compromised Secure ND Proxy provisioned with an authorization
certificate with a KeyPurposeId value of id-kp-sendProxiedRouter is
able, like a compromised router to siphon off traffic from the host,
or mount a man-in-the-middle attack, for hosts communicating to off-
link hosts. However, a Secure ND Proxy with an authorization
certificate with a KeyPurposeId value of id-kp-sendProxiedOwner can
also siphon off traffic or mount a man-in-the-middle attack for
communication between on-link hosts, even if the hosts use SEND.
Note that different application scenarios may require one type of
authorization, the other, or both. To minimize security risks,
authorization capabilities SHOULD NOT exceed the ones strictly
required by the application scenario to be deployed."
Do you think the new text is reasonable?
|
| Finally, I would like to clarify the validation behavior when listen
several EKUs in
| a certificate. At this time, the document states that the existence of a
particular
| EKU is a sufficient condition. This means that if a certificate has a
id-kp-
| sendProxiedRouter and a id-kp-sendRouter EKU and I am validating a RA
with or
| without the proxy option, it will validate in either cases using the same
key. I
| believe this should be the correct behavior as it should be the operator
to decide
| how it want to configure its network.
I agree that a certificate could hold both id-kp-sendProxiedRouter and
id-kp-sendRouter EKUs and validate RA or Redirect/RA proxying with the same
key.
I think the text provided above allows this behavior.
Thanks and regards,
Alberto
|
|
|
| Regards,
|
| Roque
|
|
| >
| > "The inclusion of the proxied routing authorization value (id-kp-
| sendProxiedRouter)
| > indicates that the certificate has been issued for allowing the proxy
| > to perform proxying of RA and Redirect messages for the prefix(es)
| > that are mentioned in the X.509 extensions for IP addresses. When a
| > node's only certificate includes a prefix and only the
| > id-kp-sendProxiedRouter authorization KeyPurposeId value, the node
cannot
| > perform proxying of NS, NA and RS messages.
| >
| > The inclusion of the proxied owner authorization value (id-kp-
| sendProxiedOwner)
| > Indicates that the certificate has been issued for allowing the proxy
to
| > perform proxying of NS, NA and RS messages for any address in the
prefix of
| > such certificate. When a node's only certificate includes a prefix and
only
| > the id-kp-sendProxiedOwner authorization KeyPurposeId value, the node
| > cannot advertise that prefix in an RA."
| >
| > The benefit of option c) is that proxy security is tailored to the
proxy
| requirements, in the sense that different application scenarios may
require one
| type of authorization, the other, or both. For example, MIPv6 would use a
| certificate with just id-kp-sendProxiedOwner, while PMIPv6 and RFC4389
would
| use a certificate with both id-kp-sendProxiedRouter and sendProxiedOwner.
| Compromising a MIPv6 HA would not allow an attacker to issue RA and
Redirects.
| My personal opinion is that, to minimize security risks, authorization
capabilities
| should not exceed the ones strictly required by the application scenario
to be
| deployed, and two Key Purpose Ids for proxy operation provide appropriate
| granularity for this.
| >
| > (sorry if I fail to expose fairly the benefits of all options - feel
free to comment,
| of course)
| >
| > For me, b) would acceptable, but I think c) should be better.
| > What do you think?
| >
| > Regards,
| > Alberto
| >
| > _______________________________________________
| > CGA-EXT mailing list
| > [email protected]
| > https://www.ietf.org/mailman/listinfo/cga-ext
_______________________________________________
CGA-EXT mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cga-ext