On Thu, Dec 17, 2020 at 1:19 PM Rob Wilton (rwilton) <rwil...@cisco.com> wrote:
> Hi Donald,
>
> > -----Original Message-----
> > From: Donald Eastlake <d3e...@gmail.com>
> > Sent: 17 December 2020 18:00
> > To: Rob Wilton (rwilton) <rwil...@cisco.com>
> > Cc: The IESG <i...@ietf.org>; draft-ietf-dnsop-server-cook...@ietf.org;
> > dnsop-chairs <dnsop-cha...@ietf.org>; <dnsop@ietf.org> <dnsop@ietf.org>;
> > Tim Wicinski <tjw.i...@gmail.com>
> > Subject: Re: Robert Wilton's No Objection on draft-ietf-dnsop-server-
> > cookies-04: (with COMMENT)
> >
> > Hi,
> >
> > On Thu, Dec 17, 2020 at 6:50 AM Robert Wilton via Datatracker
> > <nore...@ietf.org> wrote:
> > >
> > > Robert Wilton has entered the following ballot position for
> > > draft-ietf-dnsop-server-cookies-04: No Objection
> > >
> > > ...
> > >
> > > ----------------------------------------------------------------------
> > > COMMENT:
> > > ----------------------------------------------------------------------
> > >
> > > Hi,
> > >
> > > Thanks for this document, I found it easy to read.  I have a couple of
> > minor
> > > questions/comments related to the lifecycles.
> > >
> > > Section 3:
> > >
> > >    Except for when the Client IP address changes, there is no need to
> > >    change the Client Cookie often.  It is reasonable to change the
> > >    Client Cookie then only if it has been compromised or after a
> > >    relatively long period of time such as no longer than a year.  Client
> > >    Cookies are not expected to survive a program restart.
> > >
> > > It isn't clear to me why it is necessary to put an upper bound a on when
> > a
> > > client cookie needs to be changed at all.  What is the benefit of
> > changing the
> > > client cookie once a year?
> >
> > This is normal crypto hygiene. It is unsafe to trust a key/cookie
> > forever. Sooner or later it will get compromised by loss, accident,
> > whatever. Given this, an upper bound needs to be recommended. If it
> > were up to me, I would have said a month and that is in fact what it
> > says in RFC 7873 as follows:
> >
> >    The longer a secret is used, the higher the probability that it has
> >    been compromised.  Thus, clients and servers are configured with a
> >    lifetime setting for their secret, and they roll over to a new secret
> >    when that lifetime expires, or earlier due to deliberate jitter as
> >    described below.  The default lifetime is one day, and the maximum
> >    permitted is one month.  To be precise and to make it practical to
> >    stay within limits despite long holiday weekends, daylight saving
> >    time shifts, and the like, clients and servers MUST NOT continue to
> >    use the same secret in new requests and responses for more than
> >    36 days and SHOULD NOT continue to do so for more than 26 hours.
> >
> > Of course how often to change is a judgement call on which opinions will
> > differ.
> [RW]
>
> Yes, the explanation above all makes sense. But this is also why a year seems 
> like a strange limit to me:
>
> It is long enough that it doesn't seem to offer any great practical benefits, 
> assuming both that it is bad practice to allow it to be compromised for a 
> long time, and also that we care if it has been compromised.
>
> Conversely, it is also long enough that it seems like implementations are 
> more likely to be buggy (or not bother at all).  Suddenly things stop working 
> after a year and nobody knows why, so they reboot the system and magically 
> the problem goes away again for another year.
>
> So, if this should be changed periodically, and it is easy and low impact to 
> do so, then it would seem to make sense for it to change more frequently, say 
> once a week?  It seems like my PC wants me to reboot for security updates 
> every week or two anyway ...

Clients are not necessarily user systems that reboot weekly. They
might be recursive servers that run, potentially for years, without
reboot. But I mostly agree with your point and think a month is a
reasonable limit which is why it says that in RFC 7873. This sort of
thing is a judgement/engineering call.

Thanks,
Donald
===============================
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 2386 Panoramic Circle, Apopka, FL 32703 USA
 d3e...@gmail.com

> Regards,
> Rob
>
> >
> > Assuming you do plan to change it periodically, another consideration
> > is operational. Say security considerations would mean you should
> > change it at least every 5 years. What is the chance that, after five
> > years, anyone will even remember to do it or even remember how to do
> > it? So the interval should be short enough that operational experience
> > is kept up.
> >
> > Thanks,
> > Donald
> > =============================
> >  Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
> >  2386 Panoramic Circle, Apopka, FL 33896 USA
> >  d3e...@gmail.com
> >
> > > 5.  Updating the Server Secret
> > >
> > > I think that it would be useful to remind the reader that server secrets
> > are
> > > expected to be updated on a semi-regular basis, as described in section
> > 4.
> > >
> > > Regards,
> > > Rob

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to