Hi, Deb, thank you for the comments. Deb Cooley via Datatracker <nore...@ietf.org> wrote: > ---------------------------------------------------------------------- > DISCUSS: > ----------------------------------------------------------------------
> I don't have a ton of experience w/ mud, but I do have a fair bit of experience > w/ PKI certs. I think there is work to be done on this draft to tighten it up > and make it clearer, hence my discuss. Where I could, I have made suggestions. > I agree with the other comments on this draft. > Shepherd writeup: It would be nice to enumerate the manufacturers that have > implemented this concept. The link to 'https://mudmaker.org' causes my browser > to throw big flashy warning signs. When I click through them, it tells me to > 'GO AWAY'. fun... This is not really DISCUSSable. Some large lighting and microcontroller manufacturers have implemented RFC8520. But that’s an issue for 8520 not this document. We’re not seeking to elevate 8520 at this time: if we were we would provide interoperation evidence. > Section 3.1 upgrade causes vulnerabilities: One would think that this > situation should be avoided at all costs. There could be a way for the device > to signal which version of F/W it is running, allowing the MUD file to be > tailored. Deb, I think have misunderstood Section 3, and if you did, surely others will as well. ALL of section 3 is a risk analysis, and doesn’t go into resolving the issues that raised. Section 3 establishes the need for multiple MUD files being active when devices are at different firmware revisions. Updating in place is clearly a better choice: when you can do it. That’s for Sections 4, 5, and 6. Keep in mind, all of this is about improving existing deployments of RFC 8520. We do think the example in Section 3.1 goes off course, and we’ve removed it. The device *does* signal which version of MUD file it needs via LLDP or DHCP (and perhaps later via SUIT) > Section 4: Updating IDevID URLs can't be updated with a F/W update? F/W > updates are signed by the manufacturer's signing key, correct? As discussed in Eliot's previous message, it’s not possible to update an 802.1AR certificate. This is in part because that would require a per-device action, and the point of a burned-in certificate is to provide some level of assurance that it is the manufacturer and not the device that is making claims about the MUD URL. We might be able to do something with SUIT, but the manufacturers are not there yet. > Section 4.2: Just how hard would it be to specify the CA certificate paired > with a subject name (subject alt name, or CN)? Seems like this is more > secure than your proposed methods. Oddly enough, Section 5.1 proposes this. We need to make clear which certificate we’re talking about. This is the detached signature of the MUD file, and the threat occurs when the MUD-URL itself in Section 4.2 is being emitted via insecure means, such as LLDP or DHCP, as specified by RFC 8520. Malware on the device would modify the MUD URL, as discussed in security considerations of that document, to choose an inappropriate MUD file that uses the same trusted CA. As you point out, the rules in Section 5.1 limit the risks. Obviously this is better solved by using more secure communication paths, but for some manufacturers, especially of older or constrained devices, that’s not possible. So we are attempting to provide some additional advice in this insecure case. We will clarify the text a little bit to make clear the above. > Section 5, last para: Instead of subject names, SKI should be used [RFC5280, > section 4.2.1.2]. This can be easily checked in a certificate validate that > is presented. We should be clear: it’s not possible to use an SKI for end entity certificates because those are going to change just as they age. It is possible for us to use them for CA certificates. We expect that manufacturers might need to rotate the MUD file End Entity key pair. > > Section 5.2: Can't this be used all the time? If the intended MUD file change is bound to a firmware update, then it cannot be used when old firmware needs the old MUD file and new firmware needs the new one. > > Section 5.3.3: Classically to change a 'root' one signs the new with the > old and signs the old with the new. If it is done this way, I suspect one > could change whatever names, CAs one needs to change. We aren't trying to change the root here, but rather to continue to use the same End Entity certificate that was used the first time. So SKI pin for CA, with SubjectAltName pin for the EE. > > Section 7: One might argue that the use of server authenticated TLS might > mitigate a bunch of concerns. If we are just repeating RFC8520's concerns, we could remove the section. The second paragraph suggests server authenticated TLS. > > Section 9. This is confusing. Please seperate the before issues and the > after issues into seperate sections (at least). There are many potential > vulnerabilities listed earlier in the draft. Please consolidate those here > (possibly with draft section links to where the mitigation is suggested). I understand the confusion, and maybe section 9.0 is more of a conclusion. I will rework that section. > ---------------------------------------------------------------------- > COMMENT: > ---------------------------------------------------------------------- > Nits: > Section 1, para 6: change 'check the signatures, rejecting files whose > signatures do not match' to '... whose signatures do not validate'. Using > language like 'match' leads to bad behavior, when the entity should be taking a > positive action to validate the signature. changed match to validate. > Section 9, last sentence: jargon? I'm not sure I know what this means, and > English is my (only) language. Is it this sentence: > There is therefore no significant flag day: MUD controllers may > implement the new policy without significant concern about backwards > compatibility. -- Michael Richardson <mcr+i...@sandelman.ca> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
signature.asc
Description: PGP signature
_______________________________________________ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg