From proxies-bounces@ietf.org Tue Nov 4 06:27:27 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F0AB63A68FB; Tue, 4 Nov 2008 06:27:26 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 225933A6810 for ; Tue, 4 Nov 2008 06:27:26 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.598 X-Spam-Level: X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JmXySvg2Mwyo for ; Tue, 4 Nov 2008 06:27:25 -0800 (PST) Received: from smtp.nist.gov (rimp2.nist.gov [129.6.16.227]) by core3.amsl.com (Postfix) with ESMTP id 12B8A3A67AA for ; Tue, 4 Nov 2008 06:27:21 -0800 (PST) Received: from mesico.nist.gov (csme13.ncsl.nist.gov [129.6.54.47]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id mA4ERCMS002419 for ; Tue, 4 Nov 2008 09:27:13 -0500 Message-Id: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 04 Nov 2008 09:27:07 -0500 To: proxies@ietf.org From: Katrin Hoeper Mime-Version: 1.0 X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: katrin.hoeper@nist.gov Subject: [proxies] New draft: draft-hoeper-proxythreat-01.txt X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============0848379787==" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org --===============0848379787== Content-Type: multipart/alternative; boundary="=====================_1088640==.ALT" --=====================_1088640==.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed Hey, A new version of the "Threat Model for Networks Employing AAA Proxies" is available at http://tools.ietf.org/html/draft-hoeper-proxythreat-01. Stefan Winter joined as a co-author and the 01-draft contains his comments on the first draft. ---------- Katrin Hoeper Computer Security Division National Institute of Standards and Technology (NIST) 100 Bureau Dr. Mail stop: 8930 Gaithersburg, MD 20899 (301) 975 - 4024 --=====================_1088640==.ALT Content-Type: text/html; charset="us-ascii" Hey,

A new version of the "Threat Model for Networks Employing AAA Proxies" is available at http://tools.ietf.org/html/draft-hoeper-proxythreat-01.

Stefan Winter joined as a co-author and the 01-draft contains his
comments on the first draft.



Katrin Hoeper
Computer Security Division
National Institute of Standards and Technology (NIST)
100 Bureau Dr. Mail stop: 8930
Gaithersburg, MD 20899
(301) 975 - 4024
--=====================_1088640==.ALT-- --===============0848379787== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies --===============0848379787==-- From proxies-bounces@ietf.org Tue Nov 4 07:58:17 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9B1263A6A62; Tue, 4 Nov 2008 07:58:17 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B7AD73A6A62 for ; Tue, 4 Nov 2008 07:58:16 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.598 X-Spam-Level: X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pkMEIJNJJ7ra for ; Tue, 4 Nov 2008 07:58:16 -0800 (PST) Received: from smtp.nist.gov (rimp2.nist.gov [129.6.16.227]) by core3.amsl.com (Postfix) with ESMTP id AAA693A684E for ; Tue, 4 Nov 2008 07:58:15 -0800 (PST) Received: from mesico.nist.gov (csme13.ncsl.nist.gov [129.6.54.47]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id mA4Fw8EO032521 for ; Tue, 4 Nov 2008 10:58:09 -0500 Message-Id: <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Tue, 04 Nov 2008 10:58:06 -0500 To: proxies@ietf.org From: Katrin Hoeper In-Reply-To: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> Mime-Version: 1.0 X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: katrin.hoeper@nist.gov Subject: Re: [proxies] New draft: draft-hoeper-proxythreat-01.txt X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1807651575==" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org --===============1807651575== Content-Type: multipart/alternative; boundary="=====================_6543281==.ALT" --=====================_6543281==.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed Please post your comments on the -00 draft that have not been addressed in -01 as well as your comments on the -01 draft to the list. If you have no time to write up your comments, you can find me at the IETF 73 meeting in Minneapolis. Just send me an email and we can arrange a meeting. Katrin At 09:27 AM 11/4/2008, Katrin Hoeper wrote: >Hey, > >A new version of the "Threat Model for Networks Employing AAA >Proxies" is available at >http://tools.ietf.org/html/draft-hoeper-proxythreat-01. > > >Stefan Winter joined as a co-author and the 01-draft contains his >comments on the first draft. > > > >---------- >Katrin Hoeper >Computer Security Division >National Institute of Standards and Technology (NIST) >100 Bureau Dr. Mail stop: 8930 >Gaithersburg, MD 20899 >(301) 975 - 4024 >_______________________________________________ >Proxies mailing list >Proxies@ietf.org >https://www.ietf.org/mailman/listinfo/proxies ---------- Katrin Hoeper Computer Security Division National Institute of Standards and Technology (NIST) 100 Bureau Dr. Mail stop: 8930 Gaithersburg, MD 20899 (301) 975 - 4024 --=====================_6543281==.ALT Content-Type: text/html; charset="us-ascii" Please post your comments on the -00 draft that have not been addressed in -01 as well as your comments on the -01 draft to the list.

If you have no time to write up your comments, you can find me at the IETF 73 meeting in Minneapolis.
Just send me an email and we can arrange a meeting.

Katrin


At 09:27 AM 11/4/2008, Katrin Hoeper wrote:
Hey,

A new version of the "Threat Model for Networks Employing AAA Proxies" is available at http://tools.ietf.org/html/draft-hoeper-proxythreat-01.


Stefan Winter joined as a co-author and the 01-draft contains
his
comments on the first draft.



Katrin Hoeper
Computer Security Division
National Institute of Standards and Technology (NIST)
100 Bureau Dr. Mail stop: 8930
Gaithersburg, MD 20899
(301) 975 - 4024
_______________________________________________
Proxies mailing list
Proxies@ietf.org
https://www.ietf.org/mailman/listinfo/proxies


Katrin Hoeper
Computer Security Division
National Institute of Standards and Technology (NIST)
100 Bureau Dr. Mail stop: 8930
Gaithersburg, MD 20899
(301) 975 - 4024
--=====================_6543281==.ALT-- --===============1807651575== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies --===============1807651575==-- From proxies-bounces@ietf.org Wed Nov 5 00:56:46 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 654A83A692F; Wed, 5 Nov 2008 00:56:46 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EE3603A6A10 for ; Wed, 5 Nov 2008 00:56:44 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.637 X-Spam-Level: X-Spam-Status: No, score=-1.637 tagged_above=-999 required=5 tests=[AWL=0.961, BAYES_00=-2.599, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZAJDo3hvtqhl for ; Wed, 5 Nov 2008 00:56:43 -0800 (PST) Received: from blu0-omc2-s36.blu0.hotmail.com (blu0-omc2-s36.blu0.hotmail.com [65.55.111.111]) by core3.amsl.com (Postfix) with ESMTP id DFD113A68EF for ; Wed, 5 Nov 2008 00:56:42 -0800 (PST) Received: from BLU137-W54 ([65.55.111.72]) by blu0-omc2-s36.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 5 Nov 2008 00:56:26 -0800 Message-ID: X-Originating-IP: [24.16.101.127] From: Bernard Aboba To: , Date: Wed, 5 Nov 2008 00:56:27 -0800 Importance: Normal In-Reply-To: <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> MIME-Version: 1.0 X-OriginalArrivalTime: 05 Nov 2008 08:56:26.0930 (UTC) FILETIME=[63034120:01C93F24] Subject: [proxies] Review of draft-hoeper-proxythreat-01.txt (Part 1) X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1381339774==" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org --===============1381339774== Content-Type: multipart/alternative; boundary="_eeb64690-3dfd-4736-b9ba-0ed54c34e4bc_" --_eeb64690-3dfd-4736-b9ba-0ed54c34e4bc_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Overall comment: =20 Discussion of AAA proxy security issues has a long history within the IETF= =2C starting in 1996 with the IESG review of RFC 2607=2C which spawned the development of RFC 49= 62=2C the=20 AAA requirements documents=2C and threat model and security analysis includ= ed within RFC 5247.=20 As with NAT=2C AAA proxies became widely entrenched before their implicatio= ns were fully understood=2C and in addition=2C they offered the solution to a wide = range of real or perceived problems=2C as discussed in RFC 2607. =20 Given this=2C progress on the proxy problem has experienced some of the sam= e issues that have been encountered in developing "NATless" infrastructures w= ithin IPv6. While in theory alternatives are possible=2C in practice there are m= any operational details that would need to be solved before they can be deploye= d.=20 Teasing out all the potential benefits of proxies=2C and evaluating the ext= ent to which deployable alternatives are available has proven to be a daunting task. For example=2C the key management issues identified in RFC 2607 have been attacked via a variety of PKI approaches=2C which themselves have encountered deployment issues=2C influencing the perceived practicalit= y of proposals such as Diameter CMS and Redirect. =20 However=2C at the same time=2C some of the operational issues with proxies (such as increased packet loss and latency) have also come to be better appreciated=2C motivating new approaches to solutions within organizations such as EDUROAM. As a result=2C it would appear to me that operational issues=2C not security=2C provide both the major impediments to and motivat= ions=20 for progress.=20 While the focus of this document is threat analysis=2C it would seem import= ant to address some of those operational concerns=2C given their critical influ= ence on deployment. Otherwise we risk developing a scism between the=20 Security and O&M Areas in addressing these concerns.=20 Specific Comments The introduction of proxies can change the security model of a network as well as of the implemented protocols. As a consequence=2C AAA proxies may introduce new security vulnerabilities. However=2C currently the role of AAA proxies in networks and all their security implications are not considered in many existing RFCs and Internet drafts. The relationship with RFC 4962 [1] is the most glaring aspect of the problem=2C but the progress of numerous drafts in a number of working groups is affected by the so-called "proxy problem". Recently=2C there have been attempts to reconcile the widespread deployment of AAA proxies with the security requirements of individual Internet protocols or protocol extensions. The security vulnerabilities introduced by AAA proxies are not "new"=3B the RFC 2607 security analysis was initially requested by the IESG a=20 decade ago. In order to address the issues raised by the RFC 2607 threat analysis=2C support for end-to-end security was made a=20 requirement for the development of a new AAA protocol.=20 RFC 4962 was developed in part to formalize that requirement=2C and RFC 5247 was added to the EAP WG charter in order to provide an analysis of the degree to which existing EAP/AAA implementations complied with those requirements.=20 In order to satisfy the requirements that eventually were codified in RFC 4962=2C the AAA WG developed multiple proposals for end-to-end transport of attributes through proxies=3B these included CMS=2C Kerberos=2C and Redirect proposals. Of these=2C the AAA WG eventual= ly settled on Diameter Redirect=2C and this proposal was included within RFC 3588. =20 Given all of this=2C AAA proxies have long been an area of focus within the IETF=2C encompassing many man-years of work which have resulted in more than a hundred pages of RFCs and Internet-Drafts relating to the issue as well as many=2C many discussions and postings on the subject.=20 Therefore to say that the implications are "not considered" seems odd=2C given the amount of time that has been spent on this.=20 Doubts exist whether current security claims stated in RFCs and Internet Drafts are still valid for implementations with proxies. "Doubts" is perhaps too weak a word -- RFC 5247 shows that many of the fundamental security requirements can no longer be met where proxies are present.=20 Hence=2C providers of networks with proxies that rely on such security claims may have unknowingly introduced new vulnerabilities to their systems that have not been covered in the respective protocol specifications. For the same reasons=2C users of such systems may be unknowingly exposed to attacks. Not sure that the term "unknowing" is appropriate here. Given the=20 volume of work=2C it would be quite hard for providers to plead ignorance. Rather=2C the issue is more likely to be the difficulty of operating and managing a network that addresses the problems.=20 Concluding=2C the proxy problem may affect existing and future implementations of Internet protocols whose specifications neglected proxies in their security considerations. If security issues introduced by proxies are not identified and addressed=2C future protocol specifications will suffer from the same problems. Proxies have become a fundamental aspect of the architecture of a number of IETF protocols=2C including SMTP=2C SIP and AAA. In each case=2C implementers and deployers of those protocols are painfully aware of the problems that they cause. Also=2C in each case a number of proposals have been made (such as domain certificates) to address operational issues. So I don't think you can say that proxies have been neglected in the security considerations. Section 1.1 This document solely identifies security-related issues introduced by AAA proxies and their severity but neither provides solutions to address these problems nor discusses non-security related issues (such as routing=2C performance=2C etc.). Furthermore=2C this document d= oes not consider AAA proxies that are configured to solely serve as a re- direct (as supported by Diameter)=2C because such proxies do not need to gain access to attributes and/or keying material. As noted earlier=2C operational issues have proven to be a very difficult challenge. If you ignore these=2C I think you will miss the crux of the problem.=20 Section 2 Unlike some other network entities that simply forward packets in the network=2C AAA proxies are designed to have additional capabilities and properties such that the AAA protocols executed through AAA proxies may have the following features: o AAA proxies are able to modify and/or delete AAA attributes o AAA proxies share pairwise AAA keys with the AAA server and/or other AAA proxies=3B o AAA proxies and NAS cannot be distinguished by AAA server=3B o AAA proxies and AAA server cannot be distinguished by NAS=3B o AAA proxy chains cannot be distinguished from single proxies by neither NAS nor AAA server. Each of the above statements are not always true: a. The Diameter CMS=2C Redirect and Kerberos proposals limited the=20 ability of AAA proxies to modify attributes. =20 b. Security schemes such as Diameter or RADSEC do not rely on=20 pairwise AAA keys=2C but are based on certificates.=20 c. Properly configured AAA servers *can* distinguish between AAA clients.=20 d. Properly configured NASes *can* distinguish between AAA servers and prox= ies. e. Some proposals *do* support distinguishing of proxy chains from single p= roxies (e.g. RADIUS/Kerberos=2C Route Record functionality).=20 Section 3 3. Related Work [Editor's note: what other references should be mentioned here?] I'd look at RFC 5247=2C which discusses the EAP security model and the effects of proxies (and AAA mis-configuration) in some detail. There are also the Diameter CMS and RADIUS/Kerberos proposals=2C the AAA Requirements Documents=2C and discussions of proxy security and deployment in the RADIUS=2C AAA=2C RADEXT=2C DIME and SIP WGs.=20 Section 4.1 In enterprise networks or other local networks with a single administrative domain=2C AAA proxies are used to enable easy and scalable network access in large networks. Given the prevalence of enterprise customer arrangements with=20 access wholesalers and aggregators=2C many enterprise deployments do in fact support inter-domain usage. However=2C in those deployments it's probably accurate to say that the enterprise trusts the wholesaler/aggregator infrastructure.=20 Hierarchical proxy routing can further simplify key management=2C as has been pointed out in RFC 2607. The Terena/EDUROAM experience is probably worth pointing out here=2C since they are both using certificates (rather than symmetric keys)=2C as well as encountering issues with latency (leading to the desire for reduced chain length). =20 --_eeb64690-3dfd-4736-b9ba-0ed54c34e4bc_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Overall comment: =3B

Discussion of AAA proxy security issues ha= s a long history within the IETF=2C starting in 1996
with the IESG revie= w of RFC 2607=2C which spawned the development of RFC 4962=2C the
AAA r= equirements documents=2C and threat model and security analysis included wi= thin RFC 5247.

As with NAT=2C AAA proxies became widely entrenched = before their implications were
fully understood=2C and in addition=2C th= ey offered the solution to a wide range of
real or perceived problems=2C= as discussed in RFC 2607. =3B =3B

Given this=2C progress o= n the proxy problem has experienced some of the same
issues that have be= en encountered in developing "NATless" infrastructures within
IPv6. = =3B While in theory alternatives are possible=2C in practice there are many=
operational details that would need to be solved before they can be dep= loyed.

Teasing out all the potential benefits of proxies=2C and eva= luating the extent
to which deployable alternatives are available has pr= oven to be a daunting
task. =3B =3B For example=2C the key manag= ement issues identified in RFC 2607
have been attacked via a variety of = PKI approaches=2C which themselves
have encountered deployment issues=2C= influencing the perceived practicality
of proposals such as Diameter CM= S and Redirect. =3B

However=2C at the same time=2C some of the = operational issues with proxies
(such as increased packet loss and laten= cy) have also come to be better
appreciated=2C motivating new approaches= to solutions within organizations
such as EDUROAM. =3B As a result= =2C it would appear to me that operational
issues=2C not security=2C pro= vide both the major impediments to and motivations
for progress.
While the focus of this document is threat analysis=2C it would seem impo= rtant
to address some of those operational concerns=2C given their criti= cal influence
on deployment. =3B Otherwise we risk developing a scis= m between the
Security and O&=3BM Areas in addressing these concerns= .

Specific Comments

   The introducti=
on of proxies can change the security model of a
network as well as o= f the implemented protocols. As a consequence=2C
AAA proxies may intr= oduce new security vulnerabilities. However=2C
currently the role of = AAA proxies in networks and all their security
implications are not c= onsidered in many existing RFCs and Internet
drafts. The relationship= with RFC 4962 [1] is the most glaring aspect
of the pr= oblem=2C but the progress of numerous drafts in a number of
working g= roups is affected by the so-called "proxy problem".
Recently=2C there= have been attempts to reconcile the widespread
deployment of AAA pro= xies with the security requirements of
individual Internet protocols = or protocol extensions.

The security vulnerabilities introduced by A= AA proxies are not "new"=3B
the RFC 2607 security analysis was initially= requested by the IESG a
decade ago. In order to address the issues ra= ised by the RFC 2607
threat analysis=2C support for end-to-end security = was made a
requirement for the development of a new AAA protocol.
R= FC 4962 was developed in part to formalize that requirement=2C
and RFC 5= 247 was added to the EAP WG charter in order to provide
an analysis of t= he degree to which existing EAP/AAA implementations
complied with those = requirements.

In order to satisfy the requirements that eventually = were codified
in RFC 4962=2C the AAA WG developed multiple proposals for=
end-to-end transport of attributes through proxies=3B these includedCMS=2C Kerberos=2C and Redirect proposals. Of these=2C the AAA WG eventua= lly
settled on Diameter Redirect=2C and this proposal was included withi= n
RFC 3588.

Given all of this=2C AAA proxies have long been an = area of focus within
the IETF=2C encompassing many man-years of work whi= ch have resulted in
more than a hundred pages of RFCs and Internet-Draft= s relating to the
issue as well as many=2C many discussions and postings= on the subject.

Therefore to say that the implications are "not co= nsidered" seems
odd=2C given the amount of time that has been spent on t= his.

Doubts exist whether current security claims stated in RFCs= and
Internet Drafts are still valid for implementations with proxies= .

"Doubts" is perhaps too weak a word -- RFC 5247 shows that manyof the fundamental security requirements can no longer be met
where pro= xies are present.

Hence=2C providers of networks with proxies th= at rely on such security
claims may have unknowingly introduced new v= ulnerabilities to their
systems that have not been covered in the res= pective protocol
specifications. For the same reasons=2C users of suc= h systems may be
unknowingly exposed to attacks.

Not sure that= the term "unknowing" is appropriate here. Given the
volume of work=2C= it would be quite hard for providers to plead ignorance.
Rather=2C the = issue is more likely to be the difficulty of operating
and managing a ne= twork that addresses the problems.

Concluding=2C the proxy probl= em may affect existing and future
implementations of Internet protoco= ls whose specifications neglected
proxies in their security considera= tions. If security issues
introduced by proxies are not identified an= d addressed=2C future
protocol specifications will suffer from the sa= me problems.

Proxies have become a fundamental aspect of the archite= cture of a
number of IETF protocols=2C including SMTP=2C SIP and AAA. I= n each
case=2C implementers and deployers of those protocols are painful= ly
aware of the problems that they cause. Also=2C in each case a number=
of proposals have been made (such as domain certificates) to addressoperational issues. So I don't think you can say that proxies
have bee= n neglected in the security considerations.

Section 1.1

Th= is document solely identifies security-related issues introduced by
A= AA proxies and their severity but neither provides solutions to
addre= ss these problems nor discusses non-security related issues
(such as = routing=2C performance=2C etc.). Furthermore=2C this document does
no= t consider AAA proxies that are configured to solely serve as a re-
d= irect (as supported by Diameter)=2C because such proxies do not need
= to gain access to attributes and/or keying material.

As noted earlie= r=2C operational issues have proven to be a very difficult
challenge. I= f you ignore these=2C I think you will miss the crux of the
problem.
Section 2

Unlike some other network entities that simply forw= ard packets in the
network=2C AAA proxies are designed to have additi= onal capabilities and
properties such that the AAA protocols executed= through AAA proxies
may have the following features:

o AA= A proxies are able to modify and/or delete AAA attributes

o AAA = proxies share pairwise AAA keys with the AAA server and/or
other A= AA proxies=3B

o AAA proxies and NAS cannot be distinguished by A= AA server=3B

o AAA proxies and AAA server cannot be distinguishe= d by NAS=3B

o AAA proxy chains cannot be distinguished from sing= le proxies by
neither NAS nor AAA server.

Each of the above= statements are not always true:

a. The Diameter CMS=2C Redirect a= nd Kerberos proposals limited the
ability of AAA proxies to modify attr= ibutes.

b. Security schemes such as Diameter or RADSEC do not rely= on
pairwise AAA keys=2C but are based on certificates.

c. Prop= erly configured AAA servers *can* distinguish between AAA clients.

= d. Properly configured NASes *can* distinguish between AAA servers and prox= ies.

e. Some proposals *do* support distinguishing of proxy chains f= rom single proxies
(e.g. RADIUS/Kerberos=2C Route Record functionality).=

Section 3

3. Related Work



[Editor's note: what other references= should be mentioned here?]

I'd look at RFC 5247=2C which discusses = the EAP security model and the
effects of proxies (and AAA mis-configura= tion) in some detail. There
are also the Diameter CMS and RADIUS/Kerbe= ros proposals=2C the AAA
Requirements Documents=2C and discussions of pr= oxy security and deployment
in the RADIUS=2C AAA=2C RADEXT=2C DIME and S= IP WGs.

Section 4.1

In enterprise networks or other local= networks with a single
administrative domain=2C AAA proxies are used= to enable easy and
scalable network access in large networks.
Given the prevalence of enterprise customer arrangements with
access w= holesalers and aggregators=2C many enterprise deployments
do in fact sup= port inter-domain usage. However=2C in those
deployments it's probably = accurate to say that the enterprise
trusts the wholesaler/aggregator inf= rastructure.

Hierarchical proxy routing can
further simpli= fy key management=2C as has been pointed out in
RFC 2607.

The Terena/EDUROAM experience is p= robably worth pointing out here=2C since
they are both using certificate= s (rather than symmetric keys)=2C as well
as encountering issues with la= tency (leading to the desire for reduced
chain length).
















= --_eeb64690-3dfd-4736-b9ba-0ed54c34e4bc_-- --===============1381339774== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies --===============1381339774==-- From proxies-bounces@ietf.org Fri Nov 14 07:01:58 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EFDB43A6808; Fri, 14 Nov 2008 07:01:58 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BAA963A6808 for ; Fri, 14 Nov 2008 07:01:57 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.398 X-Spam-Level: X-Spam-Status: No, score=-2.398 tagged_above=-999 required=5 tests=[AWL=0.201, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GqFBQQpCP3OE for ; Fri, 14 Nov 2008 07:01:56 -0800 (PST) Received: from legolas.restena.lu (legolas.restena.lu [158.64.1.34]) by core3.amsl.com (Postfix) with ESMTP id 0A4723A6767 for ; Fri, 14 Nov 2008 07:01:53 -0800 (PST) Received: from legolas.restena.lu (localhost [127.0.0.1]) by legolas.restena.lu (Postfix) with ESMTP id 31991A98B1; Fri, 14 Nov 2008 16:01:52 +0100 (CET) Received: from [158.64.1.155] (aragorn.restena.lu [158.64.1.155]) by legolas.restena.lu (Postfix) with ESMTPA id 20D11A98A8; Fri, 14 Nov 2008 16:01:52 +0100 (CET) Message-ID: <491D92DF.6020100@restena.lu> Date: Fri, 14 Nov 2008 16:01:51 +0100 From: Stefan Winter User-Agent: Thunderbird 2.0.0.17 (X11/20080922) MIME-Version: 1.0 To: Bernard Aboba References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> In-Reply-To: X-Enigmail-Version: 0.95.7 X-Virus-Scanned: ClamAV Cc: proxies@ietf.org, katrin.hoeper@nist.gov Subject: Re: [proxies] Review of draft-hoeper-proxythreat-01.txt (Part 1) X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org Hi Bernard, thanks a lot for this thorough review! I won't be able to answer you in all detail before leaving to MSP, but a few general remarks: as you may have seen, I've recently been invited as a co-author of this document. I was starting with the precondition that this document is strictly dealing with the *threats* which are introduced by proxies. I'm in line with your comments below though that it might make more sense to broaden the scope to include usage considerations about proxies. renaming it to, say, "AAA Proxy Operational Considerations" or so. If such a broadening of scope is seen as a good idea, I would certainly also be available to include the operational experience of the eduroam community, where I'm somewhat involved. I'm sure we will have one or another opportunity to discuss the course of the document in Minneapolis. Greetings, Stefan Winter Bernard Aboba schrieb: > Overall comment: = > > Discussion of AAA proxy security issues has a long history within the > IETF, starting in 1996 > with the IESG review of RFC 2607, which spawned the development of RFC > 4962, the > AAA requirements documents, and threat model and security analysis > included within RFC 5247. > > As with NAT, AAA proxies became widely entrenched before their > implications were > fully understood, and in addition, they offered the solution to a wide > range of > real or perceived problems, as discussed in RFC 2607. = > > Given this, progress on the proxy problem has experienced some of the same > issues that have been encountered in developing "NATless" > infrastructures within > IPv6. While in theory alternatives are possible, in practice there > are many > operational details that would need to be solved before they can be > deployed. > > Teasing out all the potential benefits of proxies, and evaluating the > extent > to which deployable alternatives are available has proven to be a daunting > task. For example, the key management issues identified in RFC 2607 > have been attacked via a variety of PKI approaches, which themselves > have encountered deployment issues, influencing the perceived practicality > of proposals such as Diameter CMS and Redirect. = > > However, at the same time, some of the operational issues with proxies > (such as increased packet loss and latency) have also come to be better > appreciated, motivating new approaches to solutions within organizations > such as EDUROAM. As a result, it would appear to me that operational > issues, not security, provide both the major impediments to and > motivations > for progress. > > While the focus of this document is threat analysis, it would seem > important > to address some of those operational concerns, given their critical > influence > on deployment. Otherwise we risk developing a scism between the > Security and O&M Areas in addressing these concerns. > > Specific Comments > > The introduction of proxies can change the security model of a > network as well as of the implemented protocols. As a consequence, > AAA proxies may introduce new security vulnerabilities. However, > currently the role of AAA proxies in networks and all their security > implications are not considered in many existing RFCs and Internet > drafts. The relationship with RFC 4962 [1 ] is= the most glaring aspect > of the problem, but the progress of numerous drafts in a number of > working groups is affected by the so-called "proxy problem". > Recently, there have been attempts to reconcile the widespread > deployment of AAA proxies with the security requirements of > individual Internet protocols or protocol extensions. > > The security vulnerabilities introduced by AAA proxies are not "new"; > the RFC 2607 security analysis was initially requested by the IESG a = > decade ago. In order to address the issues raised by the RFC 2607 > threat analysis, support for end-to-end security was made a = > requirement for the development of a new AAA protocol. = > RFC 4962 was developed in part to formalize that requirement, > and RFC 5247 was added to the EAP WG charter in order to provide > an analysis of the degree to which existing EAP/AAA implementations > complied with those requirements. = > > In order to satisfy the requirements that eventually were codified > in RFC 4962, the AAA WG developed multiple proposals for > end-to-end transport of attributes through proxies; these included > CMS, Kerberos, and Redirect proposals. Of these, the AAA WG eventually > settled on Diameter Redirect, and this proposal was included within > RFC 3588. = > > Given all of this, AAA proxies have long been an area of focus within > the IETF, encompassing many man-years of work which have resulted in > more than a hundred pages of RFCs and Internet-Drafts relating to the > issue as well as many, many discussions and postings on the subject. = > > Therefore to say that the implications are "not considered" seems > odd, given the amount of time that has been spent on this. = > > Doubts exist whether current security claims stated in RFCs and > Internet Drafts are still valid for implementations with proxies. > > "Doubts" is perhaps too weak a word -- RFC 5247 shows that many > of the fundamental security requirements can no longer be met > where proxies are present. = > > Hence, providers of networks with proxies that rely on such security > claims may have unknowingly introduced new vulnerabilities to their > systems that have not been covered in the respective protocol > specifications. For the same reasons, users of such systems may be > unknowingly exposed to attacks. > > Not sure that the term "unknowing" is appropriate here. Given the = > volume of work, it would be quite hard for providers to plead ignorance. > Rather, the issue is more likely to be the difficulty of operating > and managing a network that addresses the problems. = > > Concluding, the proxy problem may affect existing and future > implementations of Internet protocols whose specifications neglected > proxies in their security considerations. If security issues > introduced by proxies are not identified and addressed, future > protocol specifications will suffer from the same problems. > > Proxies have become a fundamental aspect of the architecture of a > number of IETF protocols, including SMTP, SIP and AAA. In each > case, implementers and deployers of those protocols are painfully > aware of the problems that they cause. Also, in each case a number > of proposals have been made (such as domain certificates) to address > operational issues. So I don't think you can say that proxies > have been neglected in the security considerations. > > Section 1.1 > > This document solely identifies security-related issues introduced by > AAA proxies and their severity but neither provides solutions to > address these problems nor discusses non-security related issues > (such as routing, performance, etc.). Furthermore, this document does > not consider AAA proxies that are configured to solely serve as a re- > direct (as supported by Diameter), because such proxies do not need > to gain access to attributes and/or keying material. > > As noted earlier, operational issues have proven to be a very difficult > challenge. If you ignore these, I think you will miss the crux of the > problem. = > > Section 2 > > Unlike some other network entities that simply forward packets in the > network, AAA proxies are designed to have additional capabilities and > properties such that the AAA protocols executed through AAA proxies > may have the following features: > > o AAA proxies are able to modify and/or delete AAA attributes > > o AAA proxies share pairwise AAA keys with the AAA server and/or > other AAA proxies; > > o AAA proxies and NAS cannot be distinguished by AAA server; > > o AAA proxies and AAA server cannot be distinguished by NAS; > > o AAA proxy chains cannot be distinguished from single proxies by > neither NAS nor AAA server. > > Each of the above statements are not always true: > > a. The Diameter CMS, Redirect and Kerberos proposals limited the = > ability of AAA proxies to modify attributes. = > > b. Security schemes such as Diameter or RADSEC do not rely on = > pairwise AAA keys, but are based on certificates. = > > c. Properly configured AAA servers *can* distinguish between AAA clients. = > > d. Properly configured NASes *can* distinguish between AAA servers and pr= oxies. > > e. Some proposals *do* support distinguishing of proxy chains from single= proxies > (e.g. RADIUS/Kerberos, Route Record functionality). = > > Section 3 > > > > 3. Related Work > > > > [Editor's note: what other references should be mentioned here?] > > I'd look at RFC 5247, which discusses the EAP security model and the > effects of proxies (and AAA mis-configuration) in some detail. There > are also the Diameter CMS and RADIUS/Kerberos proposals, the AAA > Requirements Documents, and discussions of proxy security and deployment > in the RADIUS, AAA, RADEXT, DIME and SIP WGs. = > > Section 4.1 > > In enterprise networks or other local networks with a single > administrative domain, AAA proxies are used to enable easy and > scalable network access in large networks. > > Given the prevalence of enterprise customer arrangements with = > access wholesalers and aggregators, many enterprise deployments > do in fact support inter-domain usage. However, in those > deployments it's probably accurate to say that the enterprise > trusts the wholesaler/aggregator infrastructure. = > > Hierarchical proxy routing can > further simplify key management, as has been pointed out in RFC 2607 <= http://tools.ietf.org/html/rfc2607>. > > The Terena/EDUROAM experience is probably worth pointing out here, since > they are both using certificates (rather than symmetric keys), as well > as encountering issues with latency (leading to the desire for reduced > chain length). = > > > > > > > > > > > > = > > > > > > > ------------------------------------------------------------------------ > > _______________________________________________ > Proxies mailing list > Proxies@ietf.org > https://www.ietf.org/mailman/listinfo/proxies > = -- = Stefan WINTER Ingenieur de Recherche Fondation RESTENA - R=E9seau T=E9l=E9informatique de l'Education Nationale = et de la Recherche 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg Tel: +352 424409 1 Fax: +352 422473 _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies From proxies-bounces@ietf.org Fri Nov 14 07:54:46 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2D98D3A6A60; Fri, 14 Nov 2008 07:54:46 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A6F343A6A60 for ; Fri, 14 Nov 2008 07:54:44 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.202 X-Spam-Level: X-Spam-Status: No, score=-5.202 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q2YDprhmsGhx for ; Fri, 14 Nov 2008 07:54:42 -0800 (PST) Received: from smtp.nist.gov (rimp2.nist.gov [129.6.16.227]) by core3.amsl.com (Postfix) with ESMTP id 038FE3A6A07 for ; Fri, 14 Nov 2008 07:54:41 -0800 (PST) Received: from mesico.nist.gov (csme13.ncsl.nist.gov [129.6.54.47]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id mAEFsXO6020673; Fri, 14 Nov 2008 10:54:34 -0500 Message-Id: <7.0.1.0.2.20081114103956.025440d8@nist.gov> X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0 Date: Fri, 14 Nov 2008 10:54:32 -0500 To: Stefan Winter , Bernard Aboba From: Katrin Hoeper In-Reply-To: <491D92DF.6020100@restena.lu> References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> <491D92DF.6020100@restena.lu> Mime-Version: 1.0 X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: katrin.hoeper@nist.gov Cc: proxies@ietf.org Subject: Re: [proxies] Review of draft-hoeper-proxythreat-01.txt (Part 1) X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1640011580==" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org --===============1640011580== Content-Type: multipart/alternative; boundary="=====================_6203281==.ALT" --=====================_6203281==.ALT Content-Type: text/plain; charset="iso-8859-1"; format=flowed Content-Transfer-Encoding: quoted-printable Bernard, thank you for your comments. As I am working in the security area, my and my=20 group's main interest are naturally in securing systems. I agree that operational and management issues=20 are also of great importance but given my=20 background, I cannot write such a document. If there should be an interest in extending the=20 scope to cover both security and O&M issues, I=20 am absolutely not against it, as long as there=20 are co-authors with O&M background taking on this task. It seems that Stefan is interested, but I would=20 like to know from the rest of the list how they=20 feel about this extension of the scope. And even more importantly, if they think this=20 would be a great idea, if they are interested to=20 actively contribute to the draft by becoming a co-author. I really hope we and other interested folks can=20 meet in Minneapolis to discuss this. Katrin At 10:01 AM 11/14/2008, Stefan Winter wrote: >Hi Bernard, > >thanks a lot for this thorough review! I won't be able to answer you in >all detail before leaving to MSP, but a few general remarks: > >as you may have seen, I've recently been invited as a co-author of this >document. I was starting with the precondition that this document is >strictly dealing with the *threats* which are introduced by proxies. I'm >in line with your comments below though that it might make more sense to >broaden the scope to include usage considerations about proxies. >renaming it to, say, "AAA Proxy Operational Considerations" or so. If >such a broadening of scope is seen as a good idea, I would certainly >also be available to include the operational experience of the eduroam >community, where I'm somewhat involved. I'm sure we will have one or >another opportunity to discuss the course of the document in Minneapolis. > >Greetings, > >Stefan Winter > >Bernard Aboba schrieb: > > Overall comment: > > > > Discussion of AAA proxy security issues has a long history within the > > IETF, starting in 1996 > > with the IESG review of RFC 2607, which spawned the development of RFC > > 4962, the > > AAA requirements documents, and threat model and security analysis > > included within RFC 5247. > > > > As with NAT, AAA proxies became widely entrenched before their > > implications were > > fully understood, and in addition, they offered the solution to a wide > > range of > > real or perceived problems, as discussed in RFC 2607. > > > > Given this, progress on the proxy problem has experienced some of the= same > > issues that have been encountered in developing "NATless" > > infrastructures within > > IPv6. While in theory alternatives are possible, in practice there > > are many > > operational details that would need to be solved before they can be > > deployed. > > > > Teasing out all the potential benefits of proxies, and evaluating the > > extent > > to which deployable alternatives are available has proven to be a= daunting > > task. For example, the key management issues identified in RFC 2607 > > have been attacked via a variety of PKI approaches, which themselves > > have encountered deployment issues, influencing the perceived= practicality > > of proposals such as Diameter CMS and Redirect. > > > > However, at the same time, some of the operational issues with proxies > > (such as increased packet loss and latency) have also come to be better > > appreciated, motivating new approaches to solutions within organizations > > such as EDUROAM. As a result, it would appear to me that operational > > issues, not security, provide both the major impediments to and > > motivations > > for progress. > > > > While the focus of this document is threat analysis, it would seem > > important > > to address some of those operational concerns, given their critical > > influence > > on deployment. Otherwise we risk developing a scism between the > > Security and O&M Areas in addressing these concerns. > > > > Specific Comments > > > > The introduction of proxies can change the security model of a > > network as well as of the implemented protocols. As a consequence, > > AAA proxies may introduce new security vulnerabilities. However, > > currently the role of AAA proxies in networks and all their security > > implications are not considered in many existing RFCs and Internet > > drafts. The relationship with RFC 4962=20 > [1=20 > ]=20 > is the most glaring aspect > > of the problem, but the progress of numerous drafts in a number of > > working groups is affected by the so-called "proxy problem". > > Recently, there have been attempts to reconcile the widespread > > deployment of AAA proxies with the security requirements of > > individual Internet protocols or protocol extensions. > > > > The security vulnerabilities introduced by AAA proxies are not "new"; > > the RFC 2607 security analysis was initially requested by the IESG a > > decade ago. In order to address the issues raised by the RFC 2607 > > threat analysis, support for end-to-end security was made a > > requirement for the development of a new AAA protocol. > > RFC 4962 was developed in part to formalize that requirement, > > and RFC 5247 was added to the EAP WG charter in order to provide > > an analysis of the degree to which existing EAP/AAA implementations > > complied with those requirements. > > > > In order to satisfy the requirements that eventually were codified > > in RFC 4962, the AAA WG developed multiple proposals for > > end-to-end transport of attributes through proxies; these included > > CMS, Kerberos, and Redirect proposals. Of these, the AAA WG eventually > > settled on Diameter Redirect, and this proposal was included within > > RFC 3588. > > > > Given all of this, AAA proxies have long been an area of focus within > > the IETF, encompassing many man-years of work which have resulted in > > more than a hundred pages of RFCs and Internet-Drafts relating to the > > issue as well as many, many discussions and postings on the subject. > > > > Therefore to say that the implications are "not considered" seems > > odd, given the amount of time that has been spent on this. > > > > Doubts exist whether current security claims stated in RFCs and > > Internet Drafts are still valid for implementations with proxies. > > > > "Doubts" is perhaps too weak a word -- RFC 5247 shows that many > > of the fundamental security requirements can no longer be met > > where proxies are present. > > > > Hence, providers of networks with proxies that rely on such security > > claims may have unknowingly introduced new vulnerabilities to their > > systems that have not been covered in the respective protocol > > specifications. For the same reasons, users of such systems may be > > unknowingly exposed to attacks. > > > > Not sure that the term "unknowing" is appropriate here. Given the > > volume of work, it would be quite hard for providers to plead ignorance. > > Rather, the issue is more likely to be the difficulty of operating > > and managing a network that addresses the problems. > > > > Concluding, the proxy problem may affect existing and future > > implementations of Internet protocols whose specifications neglected > > proxies in their security considerations. If security issues > > introduced by proxies are not identified and addressed, future > > protocol specifications will suffer from the same problems. > > > > Proxies have become a fundamental aspect of the architecture of a > > number of IETF protocols, including SMTP, SIP and AAA. In each > > case, implementers and deployers of those protocols are painfully > > aware of the problems that they cause. Also, in each case a number > > of proposals have been made (such as domain certificates) to address > > operational issues. So I don't think you can say that proxies > > have been neglected in the security considerations. > > > > Section 1.1 > > > > This document solely identifies security-related issues introduced by > > AAA proxies and their severity but neither provides solutions to > > address these problems nor discusses non-security related issues > > (such as routing, performance, etc.). Furthermore, this document does > > not consider AAA proxies that are configured to solely serve as a re- > > direct (as supported by Diameter), because such proxies do not need > > to gain access to attributes and/or keying material. > > > > As noted earlier, operational issues have proven to be a very difficult > > challenge. If you ignore these, I think you will miss the crux of the > > problem. > > > > Section 2 > > > > Unlike some other network entities that simply forward packets in the > > network, AAA proxies are designed to have additional capabilities and > > properties such that the AAA protocols executed through AAA proxies > > may have the following features: > > > > o AAA proxies are able to modify and/or delete AAA attributes > > > > o AAA proxies share pairwise AAA keys with the AAA server and/or > > other AAA proxies; > > > > o AAA proxies and NAS cannot be distinguished by AAA server; > > > > o AAA proxies and AAA server cannot be distinguished by NAS; > > > > o AAA proxy chains cannot be distinguished from single proxies by > > neither NAS nor AAA server. > > > > Each of the above statements are not always true: > > > > a. The Diameter CMS, Redirect and Kerberos proposals limited the > > ability of AAA proxies to modify attributes. > > > > b. Security schemes such as Diameter or RADSEC do not rely on > > pairwise AAA keys, but are based on certificates. > > > > c. Properly configured AAA servers *can* distinguish between AAA= clients. > > > > d. Properly configured NASes *can*=20 > distinguish between AAA servers and proxies. > > > > e. Some proposals *do* support distinguishing=20 > of proxy chains from single proxies > > (e.g. RADIUS/Kerberos, Route Record functionality). > > > > Section 3 > > > > > > > > 3. Related Work > > > > > > > > [Editor's note: what other references should be mentioned here?] > > > > I'd look at RFC 5247, which discusses the EAP security model and the > > effects of proxies (and AAA mis-configuration) in some detail. There > > are also the Diameter CMS and RADIUS/Kerberos proposals, the AAA > > Requirements Documents, and discussions of proxy security and deployment > > in the RADIUS, AAA, RADEXT, DIME and SIP WGs. > > > > Section 4.1 > > > > In enterprise networks or other local networks with a single > > administrative domain, AAA proxies are used to enable easy and > > scalable network access in large networks. > > > > Given the prevalence of enterprise customer arrangements with > > access wholesalers and aggregators, many enterprise deployments > > do in fact support inter-domain usage. However, in those > > deployments it's probably accurate to say that the enterprise > > trusts the wholesaler/aggregator infrastructure. > > > > Hierarchical proxy routing can > > further simplify key management, as has=20 > been pointed out in RFC 2607 . > > > > The Terena/EDUROAM experience is probably worth pointing out here, since > > they are both using certificates (rather than symmetric keys), as well > > as encountering issues with latency (leading to the desire for reduced > > chain length). > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------------------------------------------------------ > > > > _______________________________________________ > > Proxies mailing list > > Proxies@ietf.org > > https://www.ietf.org/mailman/listinfo/proxies > > > > >-- >Stefan WINTER >Ingenieur de Recherche >Fondation RESTENA - R=E9seau T=E9l=E9informatique de=20 >l'Education Nationale et de la Recherche >6, rue Richard Coudenhove-Kalergi >L-1359 Luxembourg > >Tel: +352 424409 1 >Fax: +352 422473 ---------- Katrin Hoeper Computer Security Division National Institute of Standards and Technology (NIST) 100 Bureau Dr. Mail stop: 8930 Gaithersburg, MD 20899 (301) 975 - 4024 --=====================_6203281==.ALT Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Bernard,

thank you for your comments.

As I am working in the security area, my and my group's main interest are naturally in securing systems.
I agree that operational and management issues are also of great importance but given my background, I cannot write such a document.

If there should be an interest in extending the scope to cover both security and O&M issues,  I am absolutely not against it, as long as there are co-authors with O&M background taking on this task.

It seems that Stefan is interested, but I would like to know from the rest of the list how they feel about this extension of the scope.
And even more importantly, if they think this would be a great idea, if they are interested to actively contribute to the draft by becoming a co-author.

I really hope we and other interested folks can meet in Minneapolis to discuss this.

Katrin

At 10:01 AM 11/14/2008, Stefan Winter wrote:
Hi Bernard,

thanks a lot for this thorough review! I won't be able to answer you in
all detail before leaving to MSP, but a few general remarks:

as you may have seen, I've recently been invited as a co-author of this
document. I was starting with the precondition that this document is
strictly dealing with the *threats* which are introduced by proxies. I'm
in line with your comments below though that it might make more sense to
broaden the scope to include usage considerations about proxies.
renaming it to, say, "AAA Proxy Operational Considerations" or so. If
such a broadening of scope is seen as a good idea, I would certainly
also be available to include the operational experience of the eduroam
community, where I'm somewhat involved. I'm sure we will have one or
another opportunity to discuss the course of the document in Minneapolis.

Greetings,

Stefan Winter

Bernard Aboba schrieb:
> Overall comment:
>
> Discussion of AAA proxy security issues has a long history within the
> IETF, starting in 1996
> with the IESG review of RFC 2607, which spawned the development of RFC
> 4962, the
> AAA requirements documents, and threat model and security analysis
> included within RFC 5247.
>
> As with NAT, AAA proxies became widely entrenched before their
> implications were
> fully understood, and in addition, they offered the solution to a wide
> range of
> real or perceived problems, as discussed in RFC 2607. 
>
> Given this, progress on the proxy problem has experienced some of the same
> issues that have been encountered in developing "NATless"
> infrastructures within
> IPv6.  While in theory alternatives are possible, in practice there
> are many
> operational details that would need to be solved before they can be
> deployed.
>
> Teasing out all the potential benefits of proxies, and evaluating the
> extent
> to which deployable alternatives are available has proven to be a daunting
> task.   For example, the key management issues identified in RFC 2607
> have been attacked via a variety of PKI approaches, which themselves
> have encountered deployment issues, influencing the perceived practicality
> of proposals such as Diameter CMS and Redirect.
>
> However, at the same time, some of the operational issues with proxies
> (such as increased packet loss and latency) have also come to be better
> appreciated, motivating new approaches to solutions within organizations
> such as EDUROAM.  As a result, it would appear to me that operational
> issues, not security, provide both the major impediments to and
> motivations
> for progress.
>
> While the focus of this document is threat analysis, it would seem
> important
> to address some of those operational concerns, given their critical
> influence
> on deployment.  Otherwise we risk developing a scism between the
> Security and O&M Areas in addressing these concerns.
>
> Specific Comments
>
>    The introduction of proxies can change the security model of a
>    network as well as of the implemented protocols. As a consequence,
>    AAA proxies may introduce new security vulnerabilities. However,
>    currently the role of AAA proxies in networks and all their security
>    implications are not considered in many existing RFCs and Internet
>    drafts. The relationship with RFC 4962 < http://tools.ietf.org/html/rfc4962> [1 < http://tools.ietf.org/html/draft-hoeper-proxythreat-01#ref-1>] is the most glaring aspect
>    of the problem, but the progress of numerous drafts in a number of
>    working groups is affected by the so-called "proxy problem".
>    Recently, there have been attempts to reconcile the widespread
>    deployment of AAA proxies with the security requirements of
>    individual Internet protocols or protocol extensions.
>
> The security vulnerabilities introduced by AAA proxies are not "new";
> the RFC 2607 security analysis was initially requested by the IESG a
> decade ago.  In order to address the issues raised by the RFC 2607
> threat analysis, support for end-to-end security was made a
> requirement for the development of a new AAA protocol.
> RFC 4962 was developed in part to formalize that requirement,
> and RFC 5247 was added to the EAP WG charter in order to provide
> an analysis of the degree to which existing EAP/AAA implementations
> complied with those requirements.
>
> In order to satisfy the requirements that eventually were codified
> in RFC 4962, the AAA WG developed multiple proposals for
> end-to-end transport of attributes through proxies; these included
> CMS, Kerberos, and Redirect proposals.  Of these, the AAA WG eventually
> settled on Diameter Redirect, and this proposal was included within
> RFC 3588. 
>
> Given all of this, AAA proxies have long been an area of focus within
> the IETF, encompassing many man-years of work which have resulted in
> more than a hundred pages of RFCs and Internet-Drafts relating to the
> issue as well as many, many discussions and postings on the subject.
>
> Therefore to say that the implications are "not considered" seems
> odd, given the amount of time that has been spent on this.
>
>    Doubts exist whether current security claims stated in RFCs and
>    Internet Drafts are still valid for implementations with proxies.
>
> "Doubts" is perhaps too weak a word -- RFC 5247 shows that many
> of the fundamental security requirements can no longer be met
> where proxies are present.
>
>    Hence, providers of networks with proxies that rely on such security
>    claims may have unknowingly introduced new vulnerabilities to their
>    systems that have not been covered in the respective protocol
>    specifications. For the same reasons, users of such systems may be
>    unknowingly exposed to attacks.
>
> Not sure that the term "unknowing" is appropriate here.  Given the
> volume of work, it would be quite hard for providers to plead ignorance.
> Rather, the issue is more likely to be the difficulty of operating
> and managing a network that addresses the problems.
>
>    Concluding, the proxy problem may affect existing and future
>    implementations of Internet protocols whose specifications neglected
>    proxies in their security considerations. If security issues
>    introduced by proxies are not identified and addressed, future
>    protocol specifications will suffer from the same problems.
>
> Proxies have become a fundamental aspect of the architecture of a
> number of IETF protocols, including SMTP, SIP and AAA.  In each
> case, implementers and deployers of those protocols are painfully
> aware of the problems that they cause.  Also, in each case a number
> of proposals have been made (such as domain certificates) to address
> operational issues.  So I don't think you can say that proxies
> have been neglected in the security considerations.
>
> Section 1.1
>
>    This document solely identifies security-related issues introduced by
>    AAA proxies and their severity but neither provides solutions to
>    address these problems nor discusses non-security related issues
>    (such as routing, performance, etc.). Furthermore, this document does
>    not consider AAA proxies that are configured to solely serve as a re-
>    direct (as supported by Diameter), because such proxies do not need
>    to gain access to attributes and/or keying material.
>
> As noted earlier, operational issues have proven to be a very difficult
> challenge.  If you ignore these, I think you will miss the crux of the
> problem.
>
> Section 2
>
>   Unlike some other network entities that simply forward packets in the
>    network, AAA proxies are designed to have additional capabilities and
>    properties such that the AAA protocols executed through AAA proxies
>    may have the following features:
>
>    o  AAA proxies are able to modify and/or delete AAA attributes
>
>    o  AAA proxies share pairwise AAA keys with the AAA server and/or
>       other AAA proxies;
>
>    o  AAA proxies and NAS cannot be distinguished by AAA server;
>
>    o  AAA proxies and AAA server cannot be distinguished by NAS;
>
>    o  AAA proxy chains cannot be distinguished from single proxies by
>       neither NAS nor AAA server.
>
> Each of the above statements are not always true:
>
> a.  The Diameter CMS, Redirect  and Kerberos proposals limited the
> ability of AAA proxies to modify attributes. 
>
> b. Security schemes such as Diameter or RADSEC do not rely on
> pairwise AAA keys, but are based on certificates.
>
> c. Properly configured AAA servers *can* distinguish between AAA clients.
>
> d. Properly configured NASes *can* distinguish between AAA servers and proxies.
>
> e. Some proposals *do* support distinguishing of proxy chains from single proxies
> (e.g. RADIUS/Kerberos, Route Record functionality).
>
> Section 3
>
>
>
>     3. Related Work
>
>
>
>    [Editor's note: what other references should be mentioned here?]
>
> I'd look at RFC 5247, which discusses the EAP security model and the
> effects of proxies (and AAA mis-configuration) in some detail.   There
> are also the Diameter CMS and RADIUS/Kerberos proposals, the AAA
> Requirements Documents, and discussions of proxy security and deployment
> in the RADIUS, AAA, RADEXT, DIME and SIP WGs.
>
> Section 4.1
>
>    In enterprise networks or other local networks with a single
>    administrative domain, AAA proxies are used to enable easy and
>    scalable network access in large networks.
>
> Given the prevalence of enterprise customer arrangements with
> access wholesalers and aggregators, many enterprise deployments
> do in fact support inter-domain usage.  However, in those
> deployments it's probably accurate to say that the enterprise
> trusts the wholesaler/aggregator infrastructure.
>
>    Hierarchical proxy routing can
>    further simplify key management, as has been pointed out in RFC 2607 < http://tools.ietf.org/html/rfc2607>.
>
> The Terena/EDUROAM experience is probably worth pointing out here, since
> they are both using certificates (rather than symmetric keys), as well
> as encountering issues with latency (leading to the desire for reduced
> chain length). 
>
>
>
>
>
>
>
>
>
>
>
>  
>
>
>
>
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> Proxies mailing list
> Proxies@ietf.org
> https://www.ietf.org/mailman/listinfo/proxies
>  


--
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - R=E9seau T=E9l=E9informatique de l'Education Nationale e= t de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473


Katrin Hoeper
Computer Security Division
National Institute of Standards and Technology (NIST)
100 Bureau Dr. Mail stop: 8930
Gaithersburg, MD 20899
(301) 975 - 4024
--=====================_6203281==.ALT-- --===============1640011580== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies --===============1640011580==-- From proxies-bounces@ietf.org Sat Nov 15 04:18:04 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF4A33A68E0; Sat, 15 Nov 2008 04:18:04 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9B2F93A68F5 for ; Sat, 15 Nov 2008 04:18:03 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HaQoxzvUQI4Q for ; Sat, 15 Nov 2008 04:18:02 -0800 (PST) Received: from teletubbie.het.net.je (teletubbie.het.net.je [IPv6:2001:610:508:110:192:87:110:29]) by core3.amsl.com (Postfix) with ESMTP id CFABF3A68B0 for ; Sat, 15 Nov 2008 04:18:01 -0800 (PST) Received: from 194-133.surfsnel.dsl.internl.net ([145.99.133.194] helo=[192.168.1.129]) by teletubbie.het.net.je with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from ) id 1L1K68-00053t-Tj; Sat, 15 Nov 2008 13:17:57 +0100 Message-ID: <491EBDA2.4060209@wierenga.net> Date: Sat, 15 Nov 2008 13:16:34 +0100 From: Klaas Wierenga User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: Stefan Winter References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> <491D92DF.6020100@restena.lu> In-Reply-To: <491D92DF.6020100@restena.lu> X-Enigmail-Version: 0.95.7 X-Antivirus: no malware found Cc: Bernard Aboba , proxies@ietf.org, katrin.hoeper@nist.gov Subject: Re: [proxies] Review of draft-hoeper-proxythreat-01.txt (Part 1) X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org Hi, I am not very much in favor of mixing security considerations with operational considerations of proxies. It is my understanding that these are of a different nature. I would prefer to work from the assumption in this document that we stay out of any debate about whether proxies are a good or a bad thing but rather take it as a given and analyse the security and privacy threats that result. An operational considerations document would be a welcome separate document, but let's not mix these two. In a way the latter document to some extent will explain how the security threats can be overcome (in addition to other operational considerations). Or to put in yet another way, I believe the former document is more of a theorteical exercise whereas the second is dealing with the practical impact of this exercise. Klaas > thanks a lot for this thorough review! I won't be able to answer you in > all detail before leaving to MSP, but a few general remarks: > > as you may have seen, I've recently been invited as a co-author of this > document. I was starting with the precondition that this document is > strictly dealing with the *threats* which are introduced by proxies. I'm > in line with your comments below though that it might make more sense to > broaden the scope to include usage considerations about proxies. > renaming it to, say, "AAA Proxy Operational Considerations" or so. If > such a broadening of scope is seen as a good idea, I would certainly > also be available to include the operational experience of the eduroam > community, where I'm somewhat involved. I'm sure we will have one or > another opportunity to discuss the course of the document in Minneapolis. > > Greetings, > > Stefan Winter > > Bernard Aboba schrieb: >> Overall comment: >> >> Discussion of AAA proxy security issues has a long history within the >> IETF, starting in 1996 >> with the IESG review of RFC 2607, which spawned the development of RFC >> 4962, the >> AAA requirements documents, and threat model and security analysis >> included within RFC 5247. >> >> As with NAT, AAA proxies became widely entrenched before their >> implications were >> fully understood, and in addition, they offered the solution to a wide >> range of >> real or perceived problems, as discussed in RFC 2607. >> >> Given this, progress on the proxy problem has experienced some of the same >> issues that have been encountered in developing "NATless" >> infrastructures within >> IPv6. While in theory alternatives are possible, in practice there >> are many >> operational details that would need to be solved before they can be >> deployed. >> >> Teasing out all the potential benefits of proxies, and evaluating the >> extent >> to which deployable alternatives are available has proven to be a daunting >> task. For example, the key management issues identified in RFC 2607 >> have been attacked via a variety of PKI approaches, which themselves >> have encountered deployment issues, influencing the perceived practicality >> of proposals such as Diameter CMS and Redirect. >> >> However, at the same time, some of the operational issues with proxies >> (such as increased packet loss and latency) have also come to be better >> appreciated, motivating new approaches to solutions within organizations >> such as EDUROAM. As a result, it would appear to me that operational >> issues, not security, provide both the major impediments to and >> motivations >> for progress. >> >> While the focus of this document is threat analysis, it would seem >> important >> to address some of those operational concerns, given their critical >> influence >> on deployment. Otherwise we risk developing a scism between the >> Security and O&M Areas in addressing these concerns. >> >> Specific Comments >> >> The introduction of proxies can change the security model of a >> network as well as of the implemented protocols. As a consequence, >> AAA proxies may introduce new security vulnerabilities. However, >> currently the role of AAA proxies in networks and all their security >> implications are not considered in many existing RFCs and Internet >> drafts. The relationship with RFC 4962 [1 ] is the most glaring aspect >> of the problem, but the progress of numerous drafts in a number of >> working groups is affected by the so-called "proxy problem". >> Recently, there have been attempts to reconcile the widespread >> deployment of AAA proxies with the security requirements of >> individual Internet protocols or protocol extensions. >> >> The security vulnerabilities introduced by AAA proxies are not "new"; >> the RFC 2607 security analysis was initially requested by the IESG a >> decade ago. In order to address the issues raised by the RFC 2607 >> threat analysis, support for end-to-end security was made a >> requirement for the development of a new AAA protocol. >> RFC 4962 was developed in part to formalize that requirement, >> and RFC 5247 was added to the EAP WG charter in order to provide >> an analysis of the degree to which existing EAP/AAA implementations >> complied with those requirements. >> >> In order to satisfy the requirements that eventually were codified >> in RFC 4962, the AAA WG developed multiple proposals for >> end-to-end transport of attributes through proxies; these included >> CMS, Kerberos, and Redirect proposals. Of these, the AAA WG eventually >> settled on Diameter Redirect, and this proposal was included within >> RFC 3588. >> >> Given all of this, AAA proxies have long been an area of focus within >> the IETF, encompassing many man-years of work which have resulted in >> more than a hundred pages of RFCs and Internet-Drafts relating to the >> issue as well as many, many discussions and postings on the subject. >> >> Therefore to say that the implications are "not considered" seems >> odd, given the amount of time that has been spent on this. >> >> Doubts exist whether current security claims stated in RFCs and >> Internet Drafts are still valid for implementations with proxies. >> >> "Doubts" is perhaps too weak a word -- RFC 5247 shows that many >> of the fundamental security requirements can no longer be met >> where proxies are present. >> >> Hence, providers of networks with proxies that rely on such security >> claims may have unknowingly introduced new vulnerabilities to their >> systems that have not been covered in the respective protocol >> specifications. For the same reasons, users of such systems may be >> unknowingly exposed to attacks. >> >> Not sure that the term "unknowing" is appropriate here. Given the >> volume of work, it would be quite hard for providers to plead ignorance. >> Rather, the issue is more likely to be the difficulty of operating >> and managing a network that addresses the problems. >> >> Concluding, the proxy problem may affect existing and future >> implementations of Internet protocols whose specifications neglected >> proxies in their security considerations. If security issues >> introduced by proxies are not identified and addressed, future >> protocol specifications will suffer from the same problems. >> >> Proxies have become a fundamental aspect of the architecture of a >> number of IETF protocols, including SMTP, SIP and AAA. In each >> case, implementers and deployers of those protocols are painfully >> aware of the problems that they cause. Also, in each case a number >> of proposals have been made (such as domain certificates) to address >> operational issues. So I don't think you can say that proxies >> have been neglected in the security considerations. >> >> Section 1.1 >> >> This document solely identifies security-related issues introduced by >> AAA proxies and their severity but neither provides solutions to >> address these problems nor discusses non-security related issues >> (such as routing, performance, etc.). Furthermore, this document does >> not consider AAA proxies that are configured to solely serve as a re- >> direct (as supported by Diameter), because such proxies do not need >> to gain access to attributes and/or keying material. >> >> As noted earlier, operational issues have proven to be a very difficult >> challenge. If you ignore these, I think you will miss the crux of the >> problem. >> >> Section 2 >> >> Unlike some other network entities that simply forward packets in the >> network, AAA proxies are designed to have additional capabilities and >> properties such that the AAA protocols executed through AAA proxies >> may have the following features: >> >> o AAA proxies are able to modify and/or delete AAA attributes >> >> o AAA proxies share pairwise AAA keys with the AAA server and/or >> other AAA proxies; >> >> o AAA proxies and NAS cannot be distinguished by AAA server; >> >> o AAA proxies and AAA server cannot be distinguished by NAS; >> >> o AAA proxy chains cannot be distinguished from single proxies by >> neither NAS nor AAA server. >> >> Each of the above statements are not always true: >> >> a. The Diameter CMS, Redirect and Kerberos proposals limited the >> ability of AAA proxies to modify attributes. >> >> b. Security schemes such as Diameter or RADSEC do not rely on >> pairwise AAA keys, but are based on certificates. >> >> c. Properly configured AAA servers *can* distinguish between AAA clients. >> >> d. Properly configured NASes *can* distinguish between AAA servers and proxies. >> >> e. Some proposals *do* support distinguishing of proxy chains from single proxies >> (e.g. RADIUS/Kerberos, Route Record functionality). >> >> Section 3 >> >> >> >> 3. Related Work >> >> >> >> [Editor's note: what other references should be mentioned here?] >> >> I'd look at RFC 5247, which discusses the EAP security model and the >> effects of proxies (and AAA mis-configuration) in some detail. There >> are also the Diameter CMS and RADIUS/Kerberos proposals, the AAA >> Requirements Documents, and discussions of proxy security and deployment >> in the RADIUS, AAA, RADEXT, DIME and SIP WGs. >> >> Section 4.1 >> >> In enterprise networks or other local networks with a single >> administrative domain, AAA proxies are used to enable easy and >> scalable network access in large networks. >> >> Given the prevalence of enterprise customer arrangements with >> access wholesalers and aggregators, many enterprise deployments >> do in fact support inter-domain usage. However, in those >> deployments it's probably accurate to say that the enterprise >> trusts the wholesaler/aggregator infrastructure. >> >> Hierarchical proxy routing can >> further simplify key management, as has been pointed out in RFC 2607 . >> >> The Terena/EDUROAM experience is probably worth pointing out here, since >> they are both using certificates (rather than symmetric keys), as well >> as encountering issues with latency (leading to the desire for reduced >> chain length). >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> ------------------------------------------------------------------------ >> >> _______________________________________________ >> Proxies mailing list >> Proxies@ietf.org >> https://www.ietf.org/mailman/listinfo/proxies >> > > _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies From proxies-bounces@ietf.org Sat Nov 15 12:51:45 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EC2D23A6887; Sat, 15 Nov 2008 12:51:45 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7B6073A6887 for ; Sat, 15 Nov 2008 12:51:44 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.747 X-Spam-Level: X-Spam-Status: No, score=-1.747 tagged_above=-999 required=5 tests=[AWL=0.851, BAYES_00=-2.599, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r3v2WWoXYF1P for ; Sat, 15 Nov 2008 12:51:43 -0800 (PST) Received: from blu0-omc1-s38.blu0.hotmail.com (blu0-omc1-s38.blu0.hotmail.com [65.55.116.49]) by core3.amsl.com (Postfix) with ESMTP id 361913A6834 for ; Sat, 15 Nov 2008 12:51:43 -0800 (PST) Received: from BLU137-W18 ([65.55.116.7]) by blu0-omc1-s38.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Sat, 15 Nov 2008 12:51:43 -0800 Message-ID: X-Originating-IP: [71.222.81.45] From: Bernard Aboba To: , Stefan Winter Date: Sat, 15 Nov 2008 12:51:43 -0800 Importance: Normal In-Reply-To: <491EBDA2.4060209@wierenga.net> References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> <491D92DF.6020100@restena.lu> <491EBDA2.4060209@wierenga.net> MIME-Version: 1.0 X-OriginalArrivalTime: 15 Nov 2008 20:51:43.0011 (UTC) FILETIME=[F71F0730:01C94763] Cc: proxies@ietf.org, katrin.hoeper@nist.gov Subject: Re: [proxies] Review of draft-hoeper-proxythreat-01.txt (Part 1) X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============0776534015==" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org --===============0776534015== Content-Type: multipart/alternative; boundary="_8484578a-2700-4b49-ba1f-2f234a9659ab_" --_8484578a-2700-4b49-ba1f-2f234a9659ab_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable > I am not very much in favor of mixing security considerations with> opera= tional considerations of proxies. It is my understanding that these> are of= a different nature. I would prefer to work from the assumption in> this do= cument that we stay out of any debate about whether proxies are a> good or = a bad thing but rather take it as a given and analyse the> security and pri= vacy threats that result. =20 The point is that the IETF has been working on this problem for a long time already. Multiple areas within the IETF have had major issues with proxie= s=2C and in toto=2C there are probably several hundred pages of threat analyses = and proposals (some implemented=2C some not). Many of the issues encountered by different areas are very similar (e.g. the discussion relating to SRTP keying in SDP is not very different from the discussion of key transport in AAA). =20 =20 Given this extensive body of work=2C the question is how to move forward. = =20 One of the things we learned from the NAT debate was that it was critical to develop a detailed understanding of how NATs deployed in the field actually behaved. In many cases the actual behavior was more complex and variable that we had believed originally. =20 =20 Similarly=2C I believe that understanding how proxies are actually deployed and used is critical. For example=2C at present inter-domain=20 key transport via proxies is very rarely deployed (EDUROAM is the only major deployment I am aware of). This is because 802.11i has not caught on in hospitality=2C hotspots or carriers=2C where web portals are overwhel= mingly popular. In enterprise=2C where 802.11i has caught on=2C but there is not = much interest in inter-domain key transport=2C probably because most of the loca= l access networks don't support IEEE 802.11i.=20 =20 Aside from IEEE 802.11=2C the major wireless technology that has contemplat= ed use of EAP keying along with AAA roaming is WiMAX. However=2C WMF v1.0 ro= aming support is weak (there is no mandatory-to-implement user authentication mec= hanism)=2C so that most of the initial deployments don't support roaming. In addition= =2C wholesaling is also not well supported (AAA servers need to obtain a certificate from t= he WMF=2C at considerable cost). As a result=2C there is not much chance that inter-= domain=20 key transport will be deployed for WiMAX in the near future.=20 =20 Some similar observations can be made relating to the deployment of inter-d= omain SIP with SRTP. Neither SIP inter-domain use nor SRTP support are common to= day=2C and the intersection of the two is virtually non-existent. So while end-t= o-end security might seem like a useful goal=2C in practice there is not much mov= ement toward that in evidence. It's barely possible to even purchase a handset w= ith minimal SRTP (e.g. RFC 3711) support today.=20 =20 My takeaway from all this is that real world deployments appear to have a very low complexity tolerance. Even technologies which are frequently assumed to be well established (e.g. EAP=2C 802.1X) frequently exceed that= =20 tolerance level. > An operational considerations document would be a welcome separate> docu= ment=2C but let's not mix these two. In a way the latter document to> some = extent will explain how the security threats can be overcome (in> addition = to other operational considerations). =20 The IETF has already produced lots of documents relating to "solutions" to the proxy security problem. The AAA WG alone spent 5 years on this=2C producing three different proposals=2C two of which have actually been implemented (e.g. Diameter Redirect and AAA/Kerberos integration).=20 =20 So neither a problem analysis nor proposed solutions are new. = --_8484578a-2700-4b49-ba1f-2f234a9659ab_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable >=3B I am not very much in favor of mixing security considerations with>=3B operational considerations of proxies. It is my understanding that= these
>=3B are of a different nature. I would prefer to work from the= assumption in
>=3B this document that we stay out of any debate about= whether proxies are a
>=3B good or a bad thing but rather take it as = a given and analyse the
>=3B security and privacy threats that result.=
 =3B
The point is that the IETF has been working on this problem for a long time=
already. =3B =3B Multiple areas within the IETF have had major issu= es with proxies=2C
and in toto=2C there are probably several hundred pages of threat analyses = and
proposals (some implemented=2C some not). =3B Many of the issues encoun= tered
by different areas are very similar (e.g. the discussion relating to SRTP keying in SDP is not very different from the discussion of key transport in AAA). =3B
 =3B
Given this extensive body of work=2C the question is =3Bhow to move for= ward. =3B
One of the things we learned from the NAT debate was that it was
critical to develop a detailed understanding of how NATs deployed in the field actually behaved. =3B In many cases the actual behavior was
more complex and variable that we had believed originally. =3B
 =3B
Similarly=2C I believe that understanding how proxies are actually deployed=
and used is critical. =3B For example=2C at present inter-domain
key transport via proxies is very rarely deployed (EDUROAM is the only
major deployment I am aware of). =3B This is because 802.11i has not ca= ught
on in hospitality=2C hotspots or carriers=2C where web portals are overwhel= mingly
popular. =3B In enterprise=2C where 802.11i has caught on=2C but there = is not much
interest in inter-domain key transport=2C probably because most of the loca= l
access networks don't support IEEE 802.11i.
 =3B
Aside from IEEE 802.11=2C the major wireless technology that has contemplat= ed
use of EAP keying along with AAA roaming is WiMAX. =3B =3B However= =2C WMF v1.0 roaming
support is weak (there is no mandatory-to-implement user authentication mec= hanism)=2C
so that most of the initial deployments don't support roaming. =3B In a= ddition=2C wholesaling
is also not well supported (AAA servers need to obtain a certificate from t= he WMF=2C
at considerable cost). =3B As a result=2C there is not much chance that= inter-domain
key transport will be deployed for WiMAX in the near future.
 =3B
Some similar observations can be made relating to the deployment of inter-d= omain
SIP with SRTP. =3B Neither SIP inter-domain use nor SRTP support are co= mmon today=2C
and the intersection of the two is virtually non-existent. =3B =3B = So while end-to-end
security might seem like a useful goal=2C in practice there is not much mov= ement
toward that in evidence. =3B It's barely possible to even purchase a ha= ndset =3Bwith
minimal SRTP (e.g. RFC 3711) support today.
 =3B
My takeaway from all this is that real world deployments appear to have a very low complexity tolerance. =3B =3BEven technologies which are f= requently
assumed to be well established (e.g. EAP=2C 802.1X) =3Bfrequently excee= d that
tolerance level.
 =3B
>=3B An operational considerations document would be a welcom= e separate
>=3B document=2C but let's not mix these two. In a way the = latter document to
>=3B some extent will explain how the security thre= ats can be overcome (in
>=3B addition to other operational considerati= ons).
 =3B
The IETF has already produced lots of documents relating to "solutions"
to the proxy security problem. =3B The AAA WG alone spent 5 years on th= is=2C
producing three different proposals=2C two of which have actually been
implemented (e.g. Diameter Redirect and AAA/Kerberos integration).
 =3B
So neither a problem analysis =3Bnor =3Bproposed solutions are new.=  =3B =3B
= --_8484578a-2700-4b49-ba1f-2f234a9659ab_-- --===============0776534015== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies --===============0776534015==-- From proxies-bounces@ietf.org Sun Nov 16 01:18:51 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F1C123A684B; Sun, 16 Nov 2008 01:18:51 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 451533A684B for ; Sun, 16 Nov 2008 01:18:51 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YOFJiZL6jpuY for ; Sun, 16 Nov 2008 01:18:50 -0800 (PST) Received: from teletubbie.het.net.je (teletubbie.het.net.je [IPv6:2001:610:508:110:192:87:110:29]) by core3.amsl.com (Postfix) with ESMTP id 31CEE3A6805 for ; Sun, 16 Nov 2008 01:18:50 -0800 (PST) Received: from 64-103-25-233.cisco.com ([64.103.25.233] helo=ams-kwiereng-87111.cisco.com) by teletubbie.het.net.je with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from ) id 1L1dmG-000C3T-O2; Sun, 16 Nov 2008 10:18:44 +0100 Message-ID: <491FE573.4060505@wierenga.net> Date: Sun, 16 Nov 2008 10:18:43 +0100 From: Klaas Wierenga User-Agent: Thunderbird 2.0.0.17 (Macintosh/20080914) MIME-Version: 1.0 To: Bernard Aboba References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> <491D92DF.6020100@restena.lu> <491EBDA2.4060209@wierenga.net> In-Reply-To: X-Antivirus: no malware found Cc: proxies@ietf.org, katrin.hoeper@nist.gov Subject: Re: [proxies] Review of draft-hoeper-proxythreat-01.txt (Part 1) X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="us-ascii"; Format="flowed" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org Bernard Aboba wrote: Bernard, Fair points, but aren't you than essentially saying "forget about the threats and write *only* a deployment draft"? Klaas > > I am not very much in favor of mixing security considerations with > > operational considerations of proxies. It is my understanding that these > > are of a different nature. I would prefer to work from the assumption in > > this document that we stay out of any debate about whether proxies are a > > good or a bad thing but rather take it as a given and analyse the > > security and privacy threats that result. > > The point is that the IETF has been working on this problem for a long time > already. Multiple areas within the IETF have had major issues with > proxies, > and in toto, there are probably several hundred pages of threat analyses and > proposals (some implemented, some not). Many of the issues encountered > by different areas are very similar (e.g. the discussion relating to SRTP > keying in SDP is not very different from the discussion of key transport > in AAA). > > Given this extensive body of work, the question is how to move forward. > One of the things we learned from the NAT debate was that it was > critical to develop a detailed understanding of how NATs deployed in the > field actually behaved. In many cases the actual behavior was > more complex and variable that we had believed originally. > > Similarly, I believe that understanding how proxies are actually deployed > and used is critical. For example, at present inter-domain > key transport via proxies is very rarely deployed (EDUROAM is the only > major deployment I am aware of). This is because 802.11i has not caught > on in hospitality, hotspots or carriers, where web portals are > overwhelmingly > popular. In enterprise, where 802.11i has caught on, but there is not much > interest in inter-domain key transport, probably because most of the local > access networks don't support IEEE 802.11i. > > Aside from IEEE 802.11, the major wireless technology that has contemplated > use of EAP keying along with AAA roaming is WiMAX. However, WMF v1.0 > roaming > support is weak (there is no mandatory-to-implement user authentication > mechanism), > so that most of the initial deployments don't support roaming. In > addition, wholesaling > is also not well supported (AAA servers need to obtain a certificate > from the WMF, > at considerable cost). As a result, there is not much chance that > inter-domain > key transport will be deployed for WiMAX in the near future. > > Some similar observations can be made relating to the deployment of > inter-domain > SIP with SRTP. Neither SIP inter-domain use nor SRTP support are common > today, > and the intersection of the two is virtually non-existent. So while > end-to-end > security might seem like a useful goal, in practice there is not much > movement > toward that in evidence. It's barely possible to even purchase a > handset with > minimal SRTP (e.g. RFC 3711) support today. > > My takeaway from all this is that real world deployments appear to have a > very low complexity tolerance. Even technologies which are frequently > assumed to be well established (e.g. EAP, 802.1X) frequently exceed that > tolerance level. > > > An operational considerations document would be a welcome separate > > document, but let's not mix these two. In a way the latter document to > > some extent will explain how the security threats can be overcome (in > > addition to other operational considerations). > > The IETF has already produced lots of documents relating to "solutions" > to the proxy security problem. The AAA WG alone spent 5 years on this, > producing three different proposals, two of which have actually been > implemented (e.g. Diameter Redirect and AAA/Kerberos integration). > > So neither a problem analysis nor proposed solutions are new. _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies From proxies-bounces@ietf.org Sun Nov 16 06:42:50 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9A22D3A681D; Sun, 16 Nov 2008 06:42:50 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 44AD63A681D for ; Sun, 16 Nov 2008 06:42:49 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.27 X-Spam-Level: X-Spam-Status: No, score=-1.27 tagged_above=-999 required=5 tests=[AWL=1.328, BAYES_00=-2.599, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xUN8tnRAGk0j for ; Sun, 16 Nov 2008 06:42:48 -0800 (PST) Received: from blu0-omc1-s28.blu0.hotmail.com (blu0-omc1-s28.blu0.hotmail.com [65.55.116.39]) by core3.amsl.com (Postfix) with ESMTP id 319E13A67AD for ; Sun, 16 Nov 2008 06:42:48 -0800 (PST) Received: from BLU137-W54 ([65.55.116.8]) by blu0-omc1-s28.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Sun, 16 Nov 2008 06:42:47 -0800 Message-ID: X-Originating-IP: [71.222.81.45] From: Bernard Aboba To: Date: Sun, 16 Nov 2008 06:42:47 -0800 Importance: Normal In-Reply-To: <491FE573.4060505@wierenga.net> References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> <491D92DF.6020100@restena.lu> <491EBDA2.4060209@wierenga.net> <491FE573.4060505@wierenga.net> MIME-Version: 1.0 X-OriginalArrivalTime: 16 Nov 2008 14:42:47.0863 (UTC) FILETIME=[97F53C70:01C947F9] Cc: proxies@ietf.org, katrin.hoeper@nist.gov Subject: Re: [proxies] Review of draft-hoeper-proxythreat-01.txt (Part 1) X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============0959486993==" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org --===============0959486993== Content-Type: multipart/alternative; boundary="_f72f953c-e715-4aaa-a3cb-3d082eeb347b_" --_f72f953c-e715-4aaa-a3cb-3d082eeb347b_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable > Fair points=2C but aren't you than essentially saying "forget about the=20 > threats and write *only* a deployment draft"? The document doesn't cite some existing threat model assessments=2C including RFC 5247 which is standards track and was chartered for this purpose. So I'd say that a new threat model document (if it is needed) should focus on what is missing or what has=20 changed with respect to those prior assessments. One thing that has changed is RADSEC. RADSEC challenges may of the=20 assumptions that have been made relating to RADIUS=2C such as: RADIUS clients and servers cannot support certificates RADIUS cannot support confidentiality RADIUS requires a "trapezoid" model similar to SIP RADIUS clients cannot handle DNS lookups Proxy-avoidance technologies such as Diameter "redirect" cannot be= deployed Large scale roaming between many domains is very difficult to set = up =20 Once these assumptions become invalid=2C many of the security threats/issue= s also disappear=2C and new ones may appear in their place. In particular=2C give= n that EDUROAM is virtually the only large scale deployed instance of inter-domain= key=20 transport=2C it probably makes sense to focus on it=2C rather than analyzin= g the=20 security risks of other (nonexistent) deployments such as WiMAX.=20 For example=2C if we start with the analysis of the operational benefits of proxies described in RFC 2607=2C we find that several of the benefits don't exist with RADSEC: 1. Scalability improvement 2=2C Authentication forwarding 3. Capabilities adjustment 4. Policy implementation 5. Accounting reliability improvement 6. Atomic operation Of these benefits=2C at least #1 and #2 is no longer=20 required with RADSEC using certificates. Do benefits #3=2C 4=2C 5 or 6 occur in a network such as EDUROAM? --_f72f953c-e715-4aaa-a3cb-3d082eeb347b_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable >=3B Fair points=2C but aren't you than essentially saying "forget about = the
>=3B threats and write *only* a deployment draft"?

The doc= ument doesn't cite some existing threat model assessments=2C
including R= FC 5247 which is standards track and was chartered for
this purpose.&nbs= p=3B So I'd say that a new threat model document (if it
is needed) shoul= d focus on what is missing or what has
changed with respect to those pr= ior assessments.

One thing that has changed is RADSEC. =3B RADSE= C challenges may of the
assumptions that have been made relating to RAD= IUS=2C such as:

 =3B =3B =3B =3B =3B =3B&nbs= p=3B =3B RADIUS clients and servers cannot support certificates
&nbs= p=3B =3B =3B =3B =3B =3B =3B =3B RADIUS cannot = support confidentiality
 =3B =3B =3B =3B =3B =3B=  =3B =3B RADIUS requires a "trapezoid" model similar to SIP
&nbs= p=3B =3B =3B =3B =3B =3B =3B =3B RADIUS clients= cannot handle DNS lookups
 =3B =3B =3B =3B =3B = =3B =3B =3B Proxy-avoidance technologies such as Diameter "redirect= " cannot be deployed
 =3B =3B =3B =3B =3B =3B&nb= sp=3B =3B Large scale roaming between many domains is very difficult to= set up
 =3B =3B =3B =3B =3B =3B =3B =3B=
Once these assumptions become invalid=2C many of the security threats/= issues also
disappear=2C and new ones may appear in their place. =3B= In particular=2C given that
EDUROAM is virtually the only large scale d= eployed instance of inter-domain key
transport=2C it probably makes sen= se to focus on it=2C rather than analyzing the
security risks of other = (nonexistent) deployments such as WiMAX.

For example=2C if we start= with the analysis of the operational benefits
of proxies described in RFC 2607=2C we find that several of the benefitsdon't exist with RADSEC:
1.   Scalability improvement
2=2C Au= thentication forwarding
3. Capabilities adjustment
4. Policy impl= ementation
5. Accounting reliability improvement
6. Atomic operat= ion

Of these benefits=2C at least #1 and #2 is no longer
require= d with RADSEC using certificates. Do benefits
#3=2C 4=2C 5 or 6 occur i= n a network such as EDUROAM?

= --_f72f953c-e715-4aaa-a3cb-3d082eeb347b_-- --===============0959486993== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies --===============0959486993==-- From proxies-bounces@ietf.org Sun Nov 16 21:04:04 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 994183A6A2A; Sun, 16 Nov 2008 21:04:04 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 460BC3A6A2A for ; Sun, 16 Nov 2008 21:04:03 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.999 X-Spam-Level: X-Spam-Status: No, score=-3.999 tagged_above=-999 required=5 tests=[BAYES_50=0.001, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cfBmQCf4Cc76 for ; Sun, 16 Nov 2008 21:04:02 -0800 (PST) Received: from smtp.nist.gov (rimp2.nist.gov [129.6.16.227]) by core3.amsl.com (Postfix) with ESMTP id 76F3E3A6A28 for ; Sun, 16 Nov 2008 21:04:02 -0800 (PST) Received: from webmail.nist.gov (webmail.nist.gov [129.6.16.34]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id mAH53vuK021644 for ; Mon, 17 Nov 2008 00:03:57 -0500 Received: from apache by webmail.nist.gov with local (Exim 4.63) (envelope-from ) id 1L1wHF-0003MO-Jv for proxies@ietf.org; Mon, 17 Nov 2008 00:03:57 -0500 Received: from 75-146-152-44-minnesota.hfc.comcastbusiness.net (75-146-152-44-minnesota.hfc.comcastbusiness.net [75.146.152.44]) by webmail.nist.gov (Horde Framework) with HTTP; Mon, 17 Nov 2008 00:03:57 -0500 Message-ID: <20081117000357.43534i90t9zyv8l9@webmail.nist.gov> Date: Mon, 17 Nov 2008 00:03:57 -0500 From: khoeper@nist.gov To: proxies@ietf.org MIME-Version: 1.0 Content-Disposition: inline User-Agent: Internet Messaging Program (IMP) H3 (4.2) X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: khoeper@nist.gov Subject: [proxies] Meeting at 73rd IETF meeting X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="Yes" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org For all interested 73rd IETF participants, there will be an informal meeting to discuss the current proxy draft and possible future directions after the SAAG meeting on Thursday. Let's meet in front of Salon G, after the SAAG meeting is over, i.e. ~7.30 pm Depending on the number of interested people, we will be looking for another location. Please join us if you: * have comments on the current proxy draft but had not time to post them * would like to become a co-author * have followed the recent discussions on the list about extending the scope to O&M and have an opinion about it * are interested in the "proxy problem" Hope to see you there, Katrin PS: Let me know if you have a time conflict and I will try to meet you at another time. _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies From proxies-bounces@ietf.org Mon Nov 17 01:51:44 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BD0483A6987; Mon, 17 Nov 2008 01:51:44 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6BD063A6987 for ; Mon, 17 Nov 2008 01:51:43 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0hwN89y+KU1r for ; Mon, 17 Nov 2008 01:51:41 -0800 (PST) Received: from toshi17.tari.toshiba.com (unknown [IPv6:2001:418:1403:0:212:17ff:fe52:7811]) by core3.amsl.com (Postfix) with ESMTP id C96B23A695D for ; Mon, 17 Nov 2008 01:51:40 -0800 (PST) Received: from steelhead.localdomain (home.tari.toshiba.com [172.30.24.10]) by toshi17.tari.toshiba.com (8.13.1/8.13.1) with ESMTP id mAH9ppAP035833; Mon, 17 Nov 2008 04:51:52 -0500 (EST) (envelope-from yohba@tari.toshiba.com) Received: from ohba by steelhead.localdomain with local (Exim 4.69) (envelope-from ) id 1L20fL-0006LX-7D; Mon, 17 Nov 2008 04:45:07 -0500 Date: Mon, 17 Nov 2008 04:45:07 -0500 From: Yoshihiro Ohba To: proxies@ietf.org Message-ID: <20081117094507.GA18657@steelhead.localdomain> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.18 (2008-05-17) Subject: [proxies] Comments on draft-hoeper-proxythreat-01 X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org My comments on draft-hoeper-proxythreat-01 are below. Thanks, Yoshihiro Ohba --------------------------------------------------------- 1. Introduction Currently, AAA proxies are implemented in many access networks serving a variety of purposes. For example, proxies provide a scalable solution for access management in large networks. Furthermore, proxies can enable roaming because mobile nodes (MN) can access other networks by authenticating to their home server through local proxies. [YO] I think roaming is possible without proxies. Perhaps this paragraph needs more explanation. Some of these tasks require proxies to possess AAA keying material. [YO] An example of AAA keying material would be needed to understand this paragraph. The introduction of proxies can change the security model of a network as well as of the implemented protocols. As a consequence, AAA proxies may introduce new security vulnerabilities. However, [YO] Since security threats described in this document is general ones, I don't see new security vulnerabilities. currently the role of AAA proxies in networks and all their security implications are not considered in many existing RFCs and Internet drafts. The relationship with RFC 4962 [1] is the most glaring aspect of the problem, but the progress of numerous drafts in a number of working groups is affected by the so-called "proxy problem". [YO] This document would be useful if it gives some analysis on why the "proxy problem" has been unsolved. IMO, the "proxy problem" is left unsolved due to lack of a practical and complete solution for dynamically establishing end-to-end security associations betweeen AAA clients and AAA servers. Recently, there have been attempts to reconcile the widespread deployment of AAA proxies with the security requirements of individual Internet protocols or protocol extensions. While the re-occurrence of the proxy problem in several WGs may be bothersome and slow down progress, the problems are more severe for providers and users of already existing implementations with proxies. Doubts exist whether current security claims stated in RFCs and Internet Drafts are still valid for implementations with proxies. [YO] The above sentence require detailed explanation on what security claims stated in which RFCs and I-Ds are doubtful. Hence, providers of networks with proxies that rely on such security claims may have unknowingly introduced new vulnerabilities to their systems that have not been covered in the respective protocol specifications. For the same reasons, users of such systems may be unknowingly exposed to attacks. Concluding, the proxy problem may affect existing and future implementations of Internet protocols whose specifications neglected proxies in their security considerations. If security issues introduced by proxies are not identified and addressed, future protocol specifications will suffer from the same problems. 1.1. Goals of this Document Since the "proxy problem" challenges the credibility of existing RFCs and slows down the progress of many IETF WGs, it seems necessary to evaluate this problem in detail and make the results available to all current and future IETF WGs and other standard bodies. This document shows how AAA proxies may change the security models of networks and their employed protocols in several use cases. Even more importantly, the document analyses the feasibility as well as severity of the identified threats. As a result, this draft can be used as a tool for risk assessment of a network with AAA proxies or protocols implemented in such networks. This draft shows which attacks by proxies are feasible in particular use cases under certain conditions. It is up to the provider/implementer/protocol designer to decide whether the identified threats justify the costs that would be introduced by countermeasures such as infrastructure and/or protocol modifications Current and future drafts that are subject to the "proxy problem" could reference this document to point out possible vulnerabilities and risks. Technical solutions addressing the identified vulnerabilities are not presented in this draft. However, authors of affected protocol specifications are encouraged to use the presented threat model to design a case-based security solution or at least highlight proxy- related security vulnerabilities. The threat model presented in this draft could also serve as basis for designing more general solutions in a separate draft. 1.2. Scope This document focuses on security issues related to AAA proxies and the discussions and results in this memo should not be applied to other types of proxies. However, it is encouraged to work on similar documents for other kind of proxies. This document solely identifies security-related issues introduced by AAA proxies and their severity but neither provides solutions to address these problems nor discusses non-security related issues (such as routing, performance, etc.). Furthermore, this document does not consider AAA proxies that are configured to solely serve as a re- direct (as supported by Diameter), because such proxies do not need to gain access to attributes and/or keying material. 1.3. Terminology This section defines terms that are frequently used in this document. AAA Authentication, Authorization, and Accounting (AAA). AAA protocols include RADIUS [2] and Diameter [3]. AAA Server A server which provides AAA services via an implemented AAA protocol to mobile nodes. [YO] Add a statement "AAA proxy can act as AAA server." AAA Client A network entity sending AAA requests to the AAA server and receiving AAA replies from the AAA server. NAS and AAA proxy can both act as AAA client. AAA Proxy An AAA proxy provides routing for AAA requests and replies. An AAA proxy appears to act as an AAA client to the AAA server and as AAA server to the AAA client. In this draft, pure re-direct proxies as supported by Diameter are not considered. Only AAA proxies that are capable of modifying attributes and may possess cryptographic keying material are considered. MN A mobile node (MN) that wishes to access the network. NAS The Network Access Server (NAS) is the network entity that mobile nodes contact in order to obtain access to the network. Proxy Chain A routing path through a sequence of AAA proxies. In roaming scenarios, when a proxy chain is across different administrative domains, roaming agreements exist between the first and last proxy of the chain as well as between each neighboring pair of proxies. Roaming agreement Roaming agreements include agreements between companies and Internet Service Providers (ISPs), agreements among peer ISPs within a roaming association, and relationships between an ISP and a roaming consortium. These agreements require a certain level of trust among all parties of a roaming agreement. In the context of this draft, roaming agreements between two administrative domains imply that AAA proxies in these domains may share pairwise AAA keys with each other or may be capable of establishing such pairwise keys. 2. Problem Statement Unlike some other network entities that simply forward packets in the network, AAA proxies are designed to have additional capabilities and properties such that the AAA protocols executed through AAA proxies may have the following features: o AAA proxies are able to modify and/or delete AAA attributes o AAA proxies share pairwise AAA keys with the AAA server and/or other AAA proxies; o AAA proxies and NAS cannot be distinguished by AAA server; o AAA proxies and AAA server cannot be distinguished by NAS; o AAA proxy chains cannot be distinguished from single proxies by neither NAS nor AAA server. The above special features may lead to new security vulnerabilities. For example, a proxy could modify or delete some attributes of an AAA request/reply. Or a proxy in possession of AAA keying material can break the end-to-end integrity and/or confidentiality between NAS and AAA server that is assumed in some protocols. [YO] Are these new security vulnerabilities? I don't think so. The last three bullets show that the other communicating entities might not even be aware of the proxies on the communication path. In the case of a single proxy or a chain of proxies [4] between NAS and AAA server, not every party authenticates to all parties it communicates with as required in RFC 4962[1]. The sum of these and other security issues imposed by AAA proxies is referred to as "proxy problem" in this document. 3. Related Work [Editor's note: what other references should be mentioned here?] The "Security Consideration" Section of RFC 2607 [4] outlines security threats introduced by proxies in roaming scenarios using RADIUS. These observations and other threats will be further analyzed in this draft in a more general context. For instance, threats introduced by AAA proxies are analyzed in several use cases. In addition, this draft allows an application-based risk analysis. 4. Use Cases [Editor's note: Any more use cases?] For easier identification of vulnerabilities as well as analysis of feasibility and severity of attacks, a representative set of use cases for AAA proxies in networks are supplied here. (snip) 5. Threat Model To be able to analyze security vulnerabilities introduced by AAA proxies and their risks, a threat model needs to be established first. Section 5.1. describes the different players in the threat model. Section 5.2. defines the attacks an AAA proxy may launch in any of the use cases that have been described in Section 4. 5.1. Network Entities and their Trust Relationships Since this document focuses on potential security risks introduced by AAA proxies, all other network entities (such as AAA servers and NAS) and MNs are assumed to execute all protocol steps faithfully and do not behave maliciously in any way. The practicability of these assumptions is out of scope of this document. [YO] I would say all other AAA protocol elements are assumed to execute all protocol steps faithfully. For example, MNs that are not AAA protocol elements may not be considered as faithful if we want to discuss a malicous AAA proxy and a malicous MN work together to do some malicious attempt on the roaming services. The above assumptions are generally based on the following trust relationships: o Within a home domain (can be also considered as an intra-domain) it is assumed that all entities are correctly configured and not controlled by a malicious party. This can be achieved by intrusion detection systems or other means to detect so-called malicious insiders. [YO] The above is an assumption not a trust relationship. Also, I am not sure if there is any difference between home domain and other domains in terms of existence of a malicious party and mis-configuration. o The trust relationships between a home network and other local networks are specified in roaming agreements. These roaming agreements imply that the home network trusts the local network to faithfully carry out the roaming services that have been agreed on under specified conditions (e.g. roaming fees). [YO] Do you also assume that AAA proxies in the local network faithfully carry out the roaming services? If yes, then what is the problem with AAA proxies? This document deals with potential security threats introduced by AAA proxies. The attacks (as specified in the next Section) are executed by an AAA proxy that is either controlled by an adversary or mis- configured. In this threat model the following types of malicious proxies are distinguished: 1. Proxies in the home network 2. Proxies in the visited network 3. Proxies in a proxy chain between the home and the visited networks Furthermore, these three proxy types are split into authentication and accounting proxies. 5.2. Potential Attacks A malicious or misconfigured AAA proxy may launch the following attacks: [YO] Should we include issues with misconfigured AAA proxies in the scope of the proxy problem? If yes, then it may be difficult to find out a solution for it based on security solutions. I would suggest focusing on issues with malicious AAA proxies only. 1. Passively eavesdrop on network traffic Monitoring network traffic is feasible for any entity with access to the network. It does not require any special capabilities or privileges, such as the knowledge of cryptographic keying material. Consequently, this attack is not limited to AAA proxies. Traffic analysis can be used to track the activity and/or mobility of particular users. 2. Replay data packets This attack consists of two phases: (i) the recording of data packets of previous network authentications and (ii) the replaying of this data at a later time. This requires access to the network but no knowledge of keying material. Hence, the attack is not limited to proxies. Replay attacks are typically prevented by the AAA protocol itself with the aid of time variant information. There are legacy operation modes in RADIUS that can be replayed easily (Access- Request packets without the Message-Authenticator attribute, which is against the Recommendation of RFC 5080[6]). 3. Re-direct data packets Any proxy could maliciously re-direct AAA data packets. This requires access to the routing path but no knowledge of keying material. Hence, the attack can also be carried out by routers and is not specific to proxies. It appears that this attack can only be exploited for Denial of Service (DoS) attacks [Editor's note: Is this true?] which are typically not preventable by cryptographic means. 4. Drop data packets As for re-direction attacks, any proxy can drop packets causing re- transmissions that can lead to a denial of service. [Editor's note: Is there any other attack?]. This attack can be executed by all entities on the routing paths, i.e. it is not limited to proxies and, e.g., can also be executed by routers. Note that this attack cannot easily be distinguished from "natural" packet losses. 5. Actively extract confidential information from network traffic Where AAA protocols do not encrypt their payload or parts of it on the wire, an attacker may extract confidential information from the packet without knowledge of encryption keys. In this case, any intermediate hop (like routers) can eavesdrop on the non-encrypted parts of the protocol payload. If the protocol payload is encrypted as a whole, this attack requires the knowledge of the encryption key(s). If shared AAA keys are used for encrypting data, then a proxy in possession of these keys can decrypt the data. For example, this attack can be used to gather personal user information or accounting information (such as roaming fees and offered services) of competitive networks. 6. Fabricate fake data packets This attack requires the knowledge of the keying material used to protect data packets. If shared AAA keys are used for protecting data, then a proxy in possession of these keys can generate fake data packets. For instance, a malicious proxy could fabricate valid authentication packets for an unauthorized mobile node or fabricate fake accounting data to charge for unused services. 7. Modify messages If shared AAA keys are used for protecting AAA messages, then a proxy in possession of these keys can modify the data. If an AAA message is not protected, any proxy or any other network entity can modify it. If an AAA message (protected or unprotected) is not bound to any other protected message it can be dropped by any proxy or other network entity on the routing path. 8. Modify AAA attributes If shared AAA keys are used for protecting AAA attributes, then a proxy in possession of these keys can modify the attributes. If an AAA attribute is not protected, any proxy or any other network entity can modify it. If an AAA attribute (protected or unprotected) is not bound to any other protected AAA message or attribute it can be dropped by any proxy or other network entity on the routing path. Current AAA protocols provide shared keying material for payload protection and thus expose packet contents to proxies. There are key wrapping schemes to protect individual attributes though, which can encrypt AAA attributes between any two AAA servers while not exposing them to intermediate AAA proxies. These key wrapping schemes require out of band negotiation of wrapping keys, which is hardly scalable. [YO] In addition to the above security issues, I think there is another security issue in which a malicous AAA proxy provides keying material to a malicous MN offline to launch security attacks on the roaming services, and it may not be considered as violation of the roaming agreement if there is no evidence that AAA proxy provided the keying material to the malicous MN. 6. Risk Analysis This section uses the threat model in Section 5. to analyze the feasibility and severity of the identified attacks 5. in each of the uses cases discussed in Section 4. An attack is only considered a risk, if the attack is feasible and the impact is sufficiently severe to justify the attack's costs from an attacker's perspective. 6.1. Feasibility It can be observed that the feasibility of attacks by proxies depend on the use case, the type of employed proxies, and whether the proxy possesses keying material required for an attack. In general, the existence of malicious home proxies in an enterprise network (and thus the feasibility of attacks in such networks) is fairly unlikely because enterprise networks can be efficiently protected. For such an attack, the trust assumption in the home network must be violated (see Section5.1. ). On the other hand, in roaming scenarios, the attacks by proxies (as listed in Section 5.2. ) can be classified as more feasible because they can be carried out by local proxies and/or proxies in a proxy chain between home and visited network. The trustworthiness of visited proxies is specified in the respective roaming agreements, while the trustworthiness of proxies in proxy chains may depend on a chain of roaming agreements. In a proxy chain, both ends of the chain (i.e. home and visited network) have roaming agreements with each other as well as neighboring pairs of proxies in the chain. Only if [YO] Is it always the case both ends of the proxy chain have direct roaming agreements with each other? the chain consists of three or less proxies, the home network directly trusts all proxies (up to two) in the chain. For chains [YO] I don't understand why the home network can directly trusts all proxies (up to two) in the chain. longer than three (including the end points) trust is transitive, i.e. the home proxy does not directly trust all proxies on the chain but rather trusts its direct neighbor to only have agreements with other trusted proxies and so forth. This results into a chain of trust. It can be observed, that a violation of this chain of trust is more likely than a direct trust violation in the home or visited network. Furthermore, the longer the proxy chain, the more diluted may the trust relations become and the more likely is a compromised or mis-configured proxy as part of the proxy chain. [YO] Why the longer the proxy chain, the more diluted may the trust relations become? In any case, attacks in roaming use cases require that a trust relation as part of the roaming agreements is violated (see Section 5.1. . [YO] There may be some attacks that may not require that a trust relation as part of the roaming agreements is violated. See my earlier comment. In addition, the feasibility of attacks depend whether they require knowledge of keying material. For instance, attacks 1-4 in Section 5.2. do not require the knowledge of keying material and thus can be executed by any proxy. On the other hand, attacks 5-8 require the knowledge of the AAA keying material that has been used to protect the data under attack. However, the possession of keying material is likely because AAA protocols are often based on hop-by-hop security using shared keys. In addition, proxies often need to be able to adjust (protected) AAA attributes to meet local requirements. 6.2. Severity In enterprise networks, the severity of attacks are rather limited, because the exchanged data would not be of great value for an attacker and the exploitation of fabricated of modified packets is limited (e.g. because of the lack of accounting data and mobility pattern of users). [YO] Are you saying that information exchanged over enterprise networks is not be of great value? If so, I have to disagree. The severity of all attacks in roaming scenarios is higher due to the higher value of the exchanged information and offered services. For instance, traffic analysis attacks (attack 1) could be of interest to track the movements of particular mobile users. DoS attacks (attacks 3 and 4) could bring down the entire services, so the risk can be considered moderate to severe depending on the offered services. Especially accounting information is an attractive target for an adversary. However, the information of free roaming services (use case 2) can be of value as well. For example, in [5] data can contain the age, nationality, and other personal information of the mobile user wishing to access the network. Modification attacks can also be a severe risk, e.g. under aged users can control proxies to modify the age in order to pass the age limit for a requested service or local proxies may modify the roaming information to make their network services more attractive but later charge more. In addition modification attacks can be used for the downgrading of negotiated security credentials. Fabrication attacks can be classified as extremely severe in use case 3, because a malicious accounting proxy could fabricate false accounting information, such that the home network is charged for roaming fees even though no mobile node actually roamed. 7. Security Considerations TBD 8. IANA Considerations This document has no IANA considerations. 9. Conclusions This draft facilitates implementers and providers of networks with AAA proxies as well as protocols designers to carry out a risk analysis of threats introduced by AAA proxies. The result of such analysis enables to decide whether the potential security vulnerabilities introduced by AAA proxies in the network justify the costs of necessary system or protocol modifications to thwart the identified attacks. Furthermore, as another result of this draft, it can be observed that security solutions thwarting proxy attacks can be expected not to be of pure technical nature. The feasibility of attacks highly depends on the reliability of trust assumptions in enterprise networks and roaming agreements in roaming applications. [YO] I am not sure whether the above paragraph can be observed by reading this document. How do you define the reliability of trust assumptions in the first place? Technical solutions such as providing end-to-end protection of AAA attributes and messages can prevent modifications and fabrication attacks and should be carefully studied in future works. [YO] I would be much interested in technical solutions... (snip) ------------------------------------------------------------------------- _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies From proxies-bounces@ietf.org Mon Nov 17 04:46:15 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 48E413A6924; Mon, 17 Nov 2008 04:46:15 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 619B73A682E for ; Mon, 17 Nov 2008 04:46:14 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.417 X-Spam-Level: X-Spam-Status: No, score=-1.417 tagged_above=-999 required=5 tests=[AWL=1.181, BAYES_00=-2.599, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vb3-iTq2DvvU for ; Mon, 17 Nov 2008 04:46:12 -0800 (PST) Received: from blu0-omc2-s23.blu0.hotmail.com (blu0-omc2-s23.blu0.hotmail.com [65.55.111.98]) by core3.amsl.com (Postfix) with ESMTP id EF51828C0E9 for ; Mon, 17 Nov 2008 04:46:04 -0800 (PST) Received: from BLU137-W33 ([65.55.111.73]) by blu0-omc2-s23.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Mon, 17 Nov 2008 04:46:04 -0800 Message-ID: X-Originating-IP: [130.129.77.140] From: Bernard Aboba To: Yoshihiro Ohba , Date: Mon, 17 Nov 2008 04:46:04 -0800 Importance: Normal In-Reply-To: <20081117094507.GA18657@steelhead.localdomain> References: <20081117094507.GA18657@steelhead.localdomain> MIME-Version: 1.0 X-OriginalArrivalTime: 17 Nov 2008 12:46:04.0369 (UTC) FILETIME=[73F69C10:01C948B2] Subject: Re: [proxies] Comments on draft-hoeper-proxythreat-01 X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: multipart/mixed; boundary="===============1202805927==" Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org --===============1202805927== Content-Type: multipart/alternative; boundary="_670bba84-094c-48e8-b9b8-77e30ef6a9c9_" --_670bba84-094c-48e8-b9b8-77e30ef6a9c9_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable > [YO] This document would be useful if it gives some analysis on why > the "proxy problem" has been unsolved. IMO=2C the "proxy problem" is > left unsolved due to lack of a practical and complete solution for > dynamically establishing end-to-end security associations betweeen AAA > clients and AAA servers. The problem is greater than AAA.=20 In AAA and SIP=2C a number of "end-to-end" security proposals have been put forward. In SIP=2C we have S/MIME for message bodies=3B in AAA we had Diameter CMS. There are no known implementations of either.=20 In AAA we have had an implementation of Kerberos/RADIUS=3B however=2C=20 there is little or no deployment of Kerberos for the purposes of federation either within RADIUS or SIP (where Kerberos has also been implemented). Both Diameter and SIP have included the concept=20 of Redirects=3B while this functionality is widely implemented=2C I don't believe it is widely deployed for either protocol. There are now=20 new initiatives in SIP for e2e keying (ZRTP=2C DTLS/SRTP). =20 We will see if these are successful. =20 > o AAA proxies are able to modify and/or delete AAA attributes=20 Not all AAA intermediaries are proxies. For example=2C in Diameter there are also Redirects and Relays. I'd also note that SIP proxies (as opposed to SBCs) have very restricted header modification behavior.=20 > o AAA proxies share pairwise AAA keys with the AAA server and/or=20 > other AAA proxies=3B=20 Note sure what "AAA keys" means here. Are we talking about=20 keying material used to protect AAA? The term "AAA keys" was deprecated by RFC 5247.=20 > The above special features may lead to new security vulnerabilities.=20 > For example=2C a proxy could modify or delete some attributes of an AA= A=20 > request/reply. Or a proxy in possession of AAA keying material can=20 > break the end-to-end integrity and/or confidentiality between NAS and= =20 > AAA server that is assumed in some protocols.=20 >=20 > [YO] Are these new security vulnerabilities? I don't think so. Right. These threats are discussed in detail in RFC 5247.=20 > o The trust relationships between a home network and other local=20 > networks are specified in roaming agreements. These roaming=20 > agreements imply that the home network trusts the local network to= =20 > faithfully carry out the roaming services that have been agreed on= =20 > under specified conditions (e.g. roaming fees). =20 >=20 > [YO] Do you also assume that AAA proxies in the local network > faithfully carry out the roaming services? If yes=2C then what is the > problem with AAA proxies? In the PSTN=2C can we really say that all parties trust each other? For example=2C does AT&T really trust rural Iowa phone companies? I would suggest not: http://www.msnbc.msn.com/id/17752411/ If not=2C are we talking about trust or "Trust but Verify"? > 1. Passively eavesdrop on network traffic =20 >=20 > Monitoring network traffic is feasible for any entity with access=20 > to the network. It does not require any special capabilities or=20 > privileges=2C such as the knowledge of cryptographic keying material= .=20 > Consequently=2C this attack is not limited to AAA proxies.=20 >=20 > Traffic analysis can be used to track the activity and/or mobility=20 > of particular users.=20 It should be understood that data and signaling traffic do not necessarily follow the same path=2C either for AAA or SIP.=20 > 2. Replay data packets =20 >=20 > This attack consists of two phases: (i) the recording of data=20 > packets of previous network authentications and (ii) the replaying=20 > of this data at a later time. This requires access to the network=20 > but no knowledge of keying material. Hence=2C the attack is not=20 > limited to proxies.=20 I would suggest using a term other than "data packets" for AAA traffic. We're really talking about signaling here.=20 > 3. Re-direct data packets=20 >=20 > Any proxy could maliciously re-direct AAA data packets. This=20 > requires access to the routing path but no knowledge of keying=20 > material. Hence=2C the attack can also be carried out by routers and= =20 > is not specific to proxies.=20 Any proxy on the AAA roaming relationship path by=20 definition has access to AAA signaling traffic=2C right?=20 Routers can redirect AAA packets=2C but they lack the credentials necessary to fool other AAA intermediaries into accepting them. =20 > 5. Actively extract confidential information from network traffic=20 >=20 > Where AAA protocols do not encrypt their payload or parts of it on=20 > the wire=2C an attacker may extract confidential information from th= e=20 > packet without knowledge of encryption keys. In this case=2C any=20 > intermediate hop (like routers) can eavesdrop on the non-encrypted=20 > parts of the protocol payload.=20 >=20 > If the protocol payload is encrypted as a whole=2C this attack=20 > requires the knowledge of the encryption key(s). If shared AAA keys= =20 > are used for encrypting data=2C then a proxy in possession of these= =20 > keys can decrypt the data. =20 Are we talking about data traffic here or AAA traffic? As described in=20 RFC 5247=2C it is not necessarily true that possession of the MSK/EMSK can allow an attacker to decrypt data between the user and the NAS.=20 For example=2C this is not true in IKEv2 using EAP authentication=20 (e.g. transient keys are not derived from EAP keying material).=20 > For example=2C this attack can be used to gather personal user=20 > information or accounting information (such as roaming fees and=20 > offered services) of competitive networks.=20 In particular=2C it can be used to gather geographic location information= =2C Network Access Control Posture or Statement of Health info=2C etc. > 6. Fabricate fake data packets=20 >=20 > This attack requires the knowledge of the keying material used to=20 > protect data packets. If shared AAA keys are used for protecting=20 > data=2C then a proxy in possession of these keys can generate fake=20 > data packets. =20 What kind of data are we talking about? AAA signalling?=20 Possession of EAP keying material does not necessarily imply the ability to forge data packets on behalf of the user.=20 > For instance=2C a malicious proxy could fabricate valid=20 > authentication packets for an unauthorized mobile node or fabricate= =20 > fake accounting data to charge for unused services.=20 For this attack to work=2C the fake authentication would need to=20 succeed -- otherwise the accounting data would have no corresponding successful authentication=2C which would be suspicious. Posession of AAA shared secrets is not sufficient for this -- the attack would need to possess user credentials (or mount a successful replay attack).=20 > 7. Modify messages=20 >=20 > If shared AAA keys are used for protecting AAA messages=2C then a=20 > proxy in possession of these keys can modify the data. =20 By data we mean AAA signaling=2C right? > If an AAA message is not protected=2C any proxy or any other network= =20 > entity can modify it. =20 I'm told that it is common for Diameter deployments to provide no security at all (e.g. no integrity=2C authentication=2C confidentiality=2C = etc.). > If shared AAA keys are used for protecting AAA attributes=2C then a= =20 > proxy in possession of these keys can modify the attributes. =20 >=20 > If an AAA attribute is not protected=2C any proxy or any other=20 > network entity can modify it. =20 Does "protected" mean "hidden" here? Just because an attribute isn't "hidden" doesn't mean that any entity can modify it without detection (e.g. the AAA packets can still be integrity protected).=20 > Current AAA protocols provide shared keying material for payload=20 > protection and thus expose packet contents to proxies. There are=20 > key wrapping schemes to protect individual attributes though=2C whic= h=20 > can encrypt AAA attributes between any two AAA servers while not=20 > exposing them to intermediate AAA proxies. These key wrapping=20 > schemes require out of band negotiation of wrapping keys=2C which is= =20 > hardly scalable. =20 Why is out-of-band negotiation required? This was not the case in say=2C Diameter CMS or RADIUS/Kerberos. > [YO] Is it always the case both ends of the proxy chain have direct > roaming agreements with each other? With roaming brokers (e.g. Boingo) this is typically not the case.=20 > [YO] I don't understand why the home network can directly trusts all > proxies (up to two) in the chain. If a company makes a roaming agreement with Boingo they might trust them=2C but do they trust all the entities that Boingo might make an=20 agreement with=2C including Fred's Bait and Sushi shop?=20 > Technical solutions such as providing end-to-end protection of AAA=20 > attributes and messages can prevent modifications and fabrication=20 > attacks and should be carefully studied in future works.=20 >=20 > [YO] I would be much interested in technical solutions... I would be interested in understanding why the solutions that have already been proposed (and in some cases=2C implemented) were not deployed.=20 --_670bba84-094c-48e8-b9b8-77e30ef6a9c9_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable >=3B [YO] This document would be useful if it gives some analysis on why<= br>>=3B the "proxy problem" has been unsolved. IMO=2C the "proxy problem= " is
>=3B left unsolved due to lack of a practical and complete soluti= on for
>=3B dynamically establishing end-to-end security associations = betweeen AAA
>=3B clients and AAA servers.

The problem is great= er than AAA.

In AAA and SIP=2C a number of "end-to-end" security pr= oposals have been
put forward. =3B In SIP=2C we have S/MIME for mess= age bodies=3B in AAA we
had Diameter CMS. =3B There are no known imp= lementations of either.
In AAA we have had an implementation of Kerbero= s/RADIUS=3B however=2C
there is little or no deployment of Kerberos for= the purposes of
federation either within RADIUS or SIP (where Kerberos = has also been
implemented). =3B Both Diameter and SIP have included = the concept
of Redirects=3B while this functionality is widely implemen= ted=2C I don't
believe it is widely deployed for either protocol. = =3B There are now
new initiatives in SIP for e2e keying (ZRTP=2C DTLS/S= RTP). =3B
We will see if these are successful. =3B

>= =3B o AAA proxies are able to modify and/or delete AAA attributes
<= br>Not all AAA intermediaries are proxies. =3B For example=2C in
Dia= meter there are also Redirects and Relays. =3B I'd also note
that SI= P proxies (as opposed to SBCs) have very restricted
header modification = behavior.

>=3B o AAA proxies share pairwise AAA keys with the= AAA server and/or
>=3B other AAA proxies=3B

Note sure = what "AAA keys" means here. =3B Are we talking about
keying materia= l used to protect AAA? =3B The term "AAA keys" was
deprecated by RFC= 5247.

>=3B The above special features may lead to new securit= y vulnerabilities.
>=3B For example=2C a proxy could modify or del= ete some attributes of an AAA
>=3B request/reply. Or a proxy in po= ssession of AAA keying material can
>=3B break the end-to-end inte= grity and/or confidentiality between NAS and
>=3B AAA server that = is assumed in some protocols.
>=3B
>=3B [YO] Are these new secu= rity vulnerabilities? I don't think so.

Right. =3B These threat= s are discussed in detail in RFC 5247.

>=3B o The trust relat= ionships between a home network and other local
>=3B networks a= re specified in roaming agreements. These roaming
>=3B agreemen= ts imply that the home network trusts the local network to
>=3B = faithfully carry out the roaming services that have been agreed on
>= =3B under specified conditions (e.g. roaming fees).
>=3B
&= gt=3B [YO] Do you also assume that AAA proxies in the local network
>= =3B faithfully carry out the roaming services? If yes=2C then what is the<= br>>=3B problem with AAA proxies?

In the PSTN=2C can we really say= that all parties trust each other?
For example=2C does AT&=3BT reall= y trust rural Iowa phone companies?
I would suggest not:
http://www.m= snbc.msn.com/id/17752411/

If not=2C are we talking about trust or "T= rust but Verify"?



>=3B 1. Passively eavesdrop on netw= ork traffic
>=3B
>=3B Monitoring network traffic is feasi= ble for any entity with access
>=3B to the network. It does not = require any special capabilities or
>=3B privileges=2C such as t= he knowledge of cryptographic keying material.
>=3B Consequently= =2C this attack is not limited to AAA proxies.
>=3B
>=3B T= raffic analysis can be used to track the activity and/or mobility
>= =3B of particular users.

It should be understood that data and= signaling traffic do not
necessarily follow the same path=2C either for= AAA or SIP.

>=3B 2. Replay data packets
>=3B
>= =3B This attack consists of two phases: (i) the recording of data
= >=3B packets of previous network authentications and (ii) the replay= ing
>=3B of this data at a later time. This requires access to t= he network
>=3B but no knowledge of keying material. Hence=2C th= e attack is not
>=3B limited to proxies.

I would suggest= using a term other than "data packets" for AAA
traffic. =3B We're r= eally talking about signaling here.

>=3B 3. Re-direct data p= ackets
>=3B
>=3B Any proxy could maliciously re-direct AAA= data packets. This
>=3B requires access to the routing path but= no knowledge of keying
>=3B material. Hence=2C the attack can a= lso be carried out by routers and
>=3B is not specific to proxie= s.

Any proxy on the AAA roaming relationship path by
definition= has access to AAA signaling traffic=2C right?

Routers can redirect= AAA packets=2C but they lack the credentials
necessary to fool other AA= A intermediaries into accepting them. =3B

>=3B 5. Active= ly extract confidential information from network traffic
>=3B
>= =3B Where AAA protocols do not encrypt their payload or parts of it on=
>=3B the wire=2C an attacker may extract confidential informati= on from the
>=3B packet without knowledge of encryption keys. In= this case=2C any
>=3B intermediate hop (like routers) can eaves= drop on the non-encrypted
>=3B parts of the protocol payload. >=3B
>=3B If the protocol payload is encrypted as a whole=2C= this attack
>=3B requires the knowledge of the encryption key(s= ). If shared AAA keys
>=3B are used for encrypting data=2C then = a proxy in possession of these
>=3B keys can decrypt the data. =

Are we talking about data traffic here or AAA traffic? =3B As d= escribed in
RFC 5247=2C it is not necessarily true that possession of t= he MSK/EMSK
can allow an attacker to decrypt data between the user and t= he NAS.
For example=2C this is not true in IKEv2 using EAP authenticati= on
(e.g. transient keys are not derived from EAP keying material).
=
>=3B For example=2C this attack can be used to gather personal u= ser
>=3B information or accounting information (such as roaming = fees and
>=3B offered services) of competitive networks.
In particular=2C it can be used to gather geographic location information= =2C
Network Access Control Posture or Statement of Health info=2C etc.

>=3B 6. Fabricate fake data packets
>=3B
>=3B = This attack requires the knowledge of the keying material used to
= >=3B protect data packets. If shared AAA keys are used for protectin= g
>=3B data=2C then a proxy in possession of these keys can gene= rate fake
>=3B data packets.

What kind of data are we t= alking about? =3B AAA signalling?

Possession of EAP keying mate= rial does not necessarily imply the
ability to forge data packets on beh= alf of the user.

>=3B For instance=2C a malicious proxy coul= d fabricate valid
>=3B authentication packets for an unauthorize= d mobile node or fabricate
>=3B fake accounting data to charge f= or unused services.

For this attack to work=2C the fake authenticat= ion would need to
succeed -- otherwise the accounting data would have n= o corresponding
successful authentication=2C which would be suspicious.&= nbsp=3B Posession of
AAA shared secrets is not sufficient for this -- th= e attack would need to
possess user credentials (or mount a successful r= eplay attack).

>=3B 7. Modify messages
>=3B
>=3B= If shared AAA keys are used for protecting AAA messages=2C then a >=3B proxy in possession of these keys can modify the data.
By data we mean AAA signaling=2C right?

>=3B If an AAA mess= age is not protected=2C any proxy or any other network
>=3B enti= ty can modify it.

I'm told that it is common for Diameter deployme= nts to provide no
security at all (e.g. no integrity=2C authentication= =2C confidentiality=2C etc.).


>=3B If shared AAA keys are= used for protecting AAA attributes=2C then a
>=3B proxy in poss= ession of these keys can modify the attributes.
>=3B
>=3B = If an AAA attribute is not protected=2C any proxy or any other
>=3B = network entity can modify it.

Does "protected" mean "hidden" = here? =3B Just because an attribute
isn't "hidden" doesn't mean that= any entity can modify it without
detection (e.g. the AAA packets can st= ill be integrity protected).

>=3B Current AAA protocols prov= ide shared keying material for payload
>=3B protection and thus = expose packet contents to proxies. There are
>=3B key wrapping s= chemes to protect individual attributes though=2C which
>=3B can= encrypt AAA attributes between any two AAA servers while not
>=3B = exposing them to intermediate AAA proxies. These key wrapping
>=3B= schemes require out of band negotiation of wrapping keys=2C which is =
>=3B hardly scalable.

Why is out-of-band negotiation re= quired? =3B This was not the case in say=2C
Diameter CMS or RADIUS/K= erberos.
>=3B [YO] Is it always the case both ends of the proxy chain = have direct
>=3B roaming agreements with each other?

With roami= ng brokers (e.g. Boingo) this is typically not the case.

>=3B [YO= ] I don't understand why the home network can directly trusts all
>=3B= proxies (up to two) in the chain.

If a company makes a roaming agre= ement with Boingo they might trust
them=2C but do they trust all the ent= ities that Boingo might make an
agreement with=2C including Fred's Bait= and Sushi shop?

>=3B Technical solutions such as providing en= d-to-end protection of AAA
>=3B attributes and messages can preven= t modifications and fabrication
>=3B attacks and should be careful= ly studied in future works.
>=3B
>=3B [YO] I would be much inte= rested in technical solutions...

I would be interested in understand= ing why the solutions that have
already been proposed (and in some cases= =2C implemented) were not
deployed.
= --_670bba84-094c-48e8-b9b8-77e30ef6a9c9_-- --===============1202805927== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies --===============1202805927==-- From proxies-bounces@ietf.org Mon Nov 17 06:45:21 2008 Return-Path: X-Original-To: proxies-archive@ietf.org Delivered-To: ietfarch-proxies-archive@core3.amsl.com Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 041CB3A688B; Mon, 17 Nov 2008 06:45:21 -0800 (PST) X-Original-To: proxies@core3.amsl.com Delivered-To: proxies@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 81D063A68EB for ; Mon, 17 Nov 2008 04:44:09 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RwL+D0mBnMNh for ; Mon, 17 Nov 2008 04:44:08 -0800 (PST) Received: from liberty.deployingradius.com (liberty.deployingradius.com [88.191.76.128]) by core3.amsl.com (Postfix) with ESMTP id A4FD73A688B for ; Mon, 17 Nov 2008 04:44:08 -0800 (PST) Received: from Thor.local (unknown [12.104.246.163]) by liberty.deployingradius.com (Postfix) with ESMTPSA id C66521234251; Mon, 17 Nov 2008 13:44:05 +0100 (CET) Message-ID: <49216718.6070905@deployingradius.com> Date: Mon, 17 Nov 2008 13:44:08 +0100 From: Alan DeKok User-Agent: Thunderbird 2.0.0.17 (Macintosh/20080914) MIME-Version: 1.0 To: Bernard Aboba References: <7.0.1.0.2.20081104092258.0251aaa0@nist.gov> <7.0.1.0.2.20081104105518.025aa8c8@nist.gov> <491D92DF.6020100@restena.lu> <491EBDA2.4060209@wierenga.net> In-Reply-To: X-Enigmail-Version: 0.95.7 X-Mailman-Approved-At: Mon, 17 Nov 2008 06:45:19 -0800 Cc: proxies@ietf.org, katrin.hoeper@nist.gov Subject: Re: [proxies] Review of draft-hoeper-proxythreat-01.txt (Part 1) X-BeenThere: proxies@ietf.org X-Mailman-Version: 2.1.9 Precedence: list List-Id: Discussion list for ad hoc group interested in security and proxies List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: proxies-bounces@ietf.org Errors-To: proxies-bounces@ietf.org Bernard Aboba wrote: > Similarly, I believe that understanding how proxies are actually deployed > and used is critical. For example, at present inter-domain > key transport via proxies is very rarely deployed (EDUROAM is the only > major deployment I am aware of). This is because 802.11i has not caught > on in hospitality, hotspots or carriers, where web portals are > overwhelmingly popular. There are, as always, discussions about rolling out world-wide roaming for 802.1X. Trials are occurring now, but I think widespread deployment is 2-3 years out. > My takeaway from all this is that real world deployments appear to have a > very low complexity tolerance. Even technologies which are frequently > assumed to be well established (e.g. EAP, 802.1X) frequently exceed that > tolerance level. Even standard RADIUS has significant complexities when used for world-wide roaming. The people building the equipment often don't understand the specs (and therefore don't follow them), the people deploying the equipment often don't understand networking, and the people managing the businesses often don't understand their market. The result is a world-wide network which is composed of the lowest common denominator. Usernames/passwords go one way, ACKs/NAKs go the other, and generally you see an accounting Start. I think there's a need for a document that covers *more* than the bits & bytes in the protocols. e.g. Both recommended and not recommended network design, practices, etc. Such a document could be used as a reference for global roaming implementations. It could also significantly increase network reliability, and shorten deployment times, by educating the people who build and maintain those networks. Alan DeKok. _______________________________________________ Proxies mailing list Proxies@ietf.org https://www.ietf.org/mailman/listinfo/proxies