[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Fwd: RE: COPS-over-TLS v05 draft review]



Hi Uri,

Thanks for reviewing the draft and providing feedback.

I'm updating the draft based on your comments (finally :) ). Before I
send out the draft, I'd like to address the comments here. Please see
below for my responses.

Thanks,
Amol

-----Original Message-----
From: Uri Blumenthal [mailto:uri@bell-labs.com] 
Sent: Friday, February 28, 2003 1:01 PM
To: rap@ops.ietf.org
Subject: [Fwd: RE: COPS-over-TLS v05 draft review]

Folks,

This is from your friendly Security Advisor. (:-)

And since I'm not the member of this mailing list,
please kindly copy me on the relevant e-mails that
might occur in response to this posting. (:-)

Regards,
Uri.

-------- Original Message --------
From: "Hahn, Scott" <scott.hahn@intel.com>

...I think this should be posted to the list for discussion.
	-Scott

 > From: Uri Blumenthal [mailto:uri@bell-labs.com]
 >
 > Here are the issues I see with the draft
 > "draft-ietf-rap-cops-tls-05.txt".
 >
 > First, overall I want to see how it ensures that when both client and
 > server can do security, it will be enabled. For example, a
 > man-in-the-middle can modify the traffic to convince one party that
 > the other one doesn't support security ("bid-down") and thus force
 > them to establish an insecure connection even though they both are
 > capable of secure communications. I would like to see a capability
 > to enforce secure mode.
---------------
Amol> Uri, COPS messages need to attach an 'integrity' object at the end
in order to verify the integrity of the message. The integrity object
has a unique sequence number which is incremented for each new message.
It also contains an identifier identifying a shared key. Finally, the
integrity object has a digest of the entire message computed with the
identified key. This mechanism should help in avoiding tampering of
messages on the wire.

 >
 > Also, I would like to see scenarios based not [only] on whether
 > client/server SUPPORTS security - but also on whether its POLICY
 > REQUIRES secure connection to a given peer. If it was meant so,
 > it isn't clear from the document.
--------------------
Amol> I'll clarify this in the document.

 >
 >
 > Details by sections:
 >
 > 4.2. So what should the client do after receiving the error?
------------------
Amol> If the Client's policies dictate that security is mandatory, and
the server's policies prohibit the client from connecting securely, the
connection cannot be established.

 >
 > 4.3. So the server MAY send a ClientClose... Anything else
 >       it "may" do? Nothing it "should" do in this case...?
 >       What should an implementor do here?
------------------
Amol> This point should be expanded to say that if the server's policy
allows the client to connect, the server should redirect the client to
the COPS/TLS port. Else it should send an error and close the
connection.

 >
 > 4.4. Same as above.
 >
 > 4.7. Why is this subsection here? I'd say - remove it.
 >
 > 8. It is good to require PKI - what happens if CA isn't
 >     available, isn't accessible, whatever?
 >     Reverts to insecure?
-----------
Amol> Yes.
 >
 >
 >
 >
 > Thanks!
 >
 > Regards,
 > Uri