(removing w3, as my comments aren't related to the web)

On Jul 17, 2024, at 10:57 PM, Bernard Aboba <bernard.ab...@gmail.com> wrote:
> 
> In RFC 5505, the IAB took on this question, separating basic IP configuration 
> (which has in practice proved difficult to secure) from application-layer 
> configuration (which can be postponed until later in the boot process when 
> security facilities are available to secure it).

  IIRC we had some discussions about this in 2016.  Since then, there have been 
related issues popping up:

- CVE-2024-3661, a local DHCP server can spoof routes and get VPN traffic to 
bypass the VPN.   The underlying issue has been known for decades.  Paul 
Wouters has strong opinions here.

- https://www.akamai.com/blog/security-research/spoofing-dns-by-abusing-dhcp  - 
DHCP can request DDNS updates, leading to unauthenticated arbitrary DNS record 
overwrite

- in contrast to DHCP, DNS has been updated with DNS over TLS and DNS over 
HTTPS.

- Despite RFC 5505 Section 2.4 explicitly mentioning the separation of EAP and 
network configuration, we have EAP / 802.1X configuring keys for Wi-Fi, or 
MacSec (wired), so the separation of issues is not quite as strict as 5505 
would make it seem.


  All this means that when my machine wants network access, it uses the latest 
super-duper post-quantum crypto algorithms, certs with huge keys, the latest 
digest algorithms, secure encryption from me to the next hop, and then... 

  Nothing.  Everything after that is unauthenticated, unproven, and 
untrustworthy,

  My local machine has no idea if it can trust the DHCP server.   It has no way 
of knowing that the local link has been secured.  There is no way even for the 
machine to know if it's running in the local coffee shop, or in the secure 
corporate network.

  i.e. even if the machine does full 802.1X auth to the local network, and then 
uses MacSec, everything after that is not only insecure, but completely 
uninformed about any security, and is unrelated to any strong security 
processes.

  The outcome is then that my only choice is to treat the local networks as a 
swamp, and perhaps use IPSec for everything.  Even for the corporate network.

  I understand why RFC 5505 _requires_ that local networks be simple, and use 
simple protocols.  My concern is that it implicitly _forbids_ local networks 
from taking any extra steps to increase their security.

  I'm not proposing that the local network prove the security of every 
potential device / switch / router to each edge machine.  I'm hoping that 
there's a secure way for the local network to say to tell an edge device what 
security posture it should use for the local network.

  In the absence of any trusted claim, the edge device should treat the local 
network as untrusted.  But it's not clear to me why it wouldn't be possible (or 
even useful) for the local network to make certain security claims.

  The outcome of the current situation (as seen above) is that applications on 
edge devices have to be aware of the insecurity of lower-layer protocols, and 
to take steps to work around them.  In some cases, there is no work-around 
(DHCP spoofing DDNS updates), and the only solution is "Yup, that's how it 
works.  Live with it".

  As these recent attacks show, there is a need for increased security at the 
edge.  The question I have is how we increase security, not whether we want 
increased security.

  Alan DeKok.

_______________________________________________
Int-area mailing list -- int-area@ietf.org
To unsubscribe send an email to int-area-le...@ietf.org

Reply via email to