Hi Eric,

On 16.04.18 14:25, Eric Rescorla wrote:
> Hi Eliot,
>
> Thanks for continuing the conversation. My question is how this fits
> into the system as a whole.
>
> ISTM that there are two ways in which a MUD policy can affect the
> network's behavior:
>
> - Additive -- it lets the device do things it otherwise might not be
> permitted to do (e.g., accept incoming TCP connections)
> - Restrictive -- it stops the device from doing things that it
> otherwise would be permitted to do (e.g., make connections to IP
> addresses on non-443 ports)

What you describe is the choice of the network administrator, and not
the standard nor the manufacturer.  You are essentially asking, “what is
the default policy?” and that will vary based on deployment.  It could
be "additive", "restrictive", or something else.  It could be a
walled-off IoT network.  Consider the cases:

  * This device has a MUD file and will be segmented accordingly.
  * This device has no MUD file and we may,
      o 1: give it no access,
      o 2: give it all access,
      o 3: give it some limited access,
      o 4: ask, or
      o 5: other.

All of these are perfectly valid approaches, depending on the deployment.
>
> In the former case, it's very important not to be able to forge
> acceptable MUD policies, but in the latter case, an attacker can just
> not serve *any* MUD policy and be in a stronger position than they
> would be if they had a valid policy,[...]

And so that will depend on the deployment.  And many of the attacks
would be detectable.  All?  I would never be so bold.  But also, MUD is
not an acronym for "magic bullet".  I really did try to spell that out
in the draft.

> I should mention one use case that I did think of, where additive
> would be immediately useful: "This device is made by the same
> manufacturer as another device (and hence they can talk to each
> other). However, I note that MUD is actually not capable of securely
> conveying that, because there's no proof that the device in hand
> actually is made by the manufacturer, only that it possesses a public
> credential for some device made by that manufacturer.

That is the point of building out a PKI, and as I wrote, there are some
interested in providing what amounts to a certification for this
purpose.  This is also something the MUD manager can take on: as time
goes on it can white list signers, and it can flag devices that are not
recognized as being risky.  In addition, if you have someone willing to
take accountability for that device to lay a claim, it may not be
"proof", but that is  good enough in an enterprise environment, where
someone can be called to account for having added the device.

And we have to start somewhere.  The goal here it to establish a “walk
before we run” approach in several dimensions.  I just ask that we be
allowed to walk ;-)

With that, how would you like to proceed?  I've proposed text but could
go further if you like.

Eliot

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to