Roman Danyliw has entered the following ballot position for
draft-ietf-opsawg-mud-tls-15: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-mud-tls/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you to Christer Holmberg for the GENART review.

** Section 1.
   [malware] indicates that there are observable differences in
   how malware uses encryption compared with how non-malware uses
   encryption.  There are several interesting findings specific to
   (D)TLS which were found common to malware:
...
[bulleted lists of findings]

The techniques, tactics, and procedures (TTPSs) described in the [malware] are
from 2016, 8 years ago.  Is the WG confident that these exact TTPs are still in
use as described?  Will this text age well and is it needed?  The general
observation that (D)TLS protocols parameters can be used to block malicious
traffic or traffic that violates policy still stands without the specifics
having to be described here.

** Section 1
   If observable (D)TLS profile parameters are used, the following
   functions are possible which have a positive impact on the local
   network security:

What is a “profile parameter”?  How does a “profile parameter” differ from any
other (D)TLS protocol parameter?  Editorially, the idea of profiles hasn't been
introduced yet.

** Section 1 and 3.  The motivation for this work is repeated multiple times as
being malware and malicious behavior.  Why is more basic enforcement of policy
not also part of this justification.  This is hinted at by text in Section 1
about “ensur[ing] TLS certificates” are valid.  Observing the network for use
of legacy ciphersuite or non-conformant certificates are also common cyber
hygiene use cases.

** Section 3.
  Typically, IoT devices have an
   infrastructure that supports a rapid deployment of updates, and
   malware agents will have a near-impossible task of similarly
   deploying updates and continuing to mimic the TLS behavior of the IoT
   device it has infected.

Realizing that “IoT” can mean number of things, I am surprised by this
assertion.  I was under the impression that update practices vary for IoT
devices and rapid deployment could NOT be assumed.  Specifically, being
deployed on disadvantaged networks or having inconsistent/poor long-term
support from their manufacturer were among a few of the reasons why timely
patching of IoT doesn’t happen.

** Section 4.1
   To obtain more visibility into negotiated TLS 1.3 parameters, a
   middlebox can act as a (D)TLS 1.3 proxy.  A middlebox can act as a
   (D)TLS proxy for the IoT devices owned and managed by the IT team in
   the Enterprise network and the (D)TLS proxy must meet the security
   and privacy requirements of the organization.

If I’m understanding correctly, the setup described above is a full terminating
proxy. At that point, one could certainly look at parameters, but one could
also perform full content inspection.  It might be useful to mention that.  I
am not sure what this means relative to MUD.

** Section 4.2.  What is the (D)TLS profile information being conveyed in this
section?

** Section 5.
   The (D)TLS profile YANG module provides a method for
   network security services to observe the (D)TLS profile parameters in
   the (D)TLS handshake to permit intended use and to block malicious
   behavior.

I’m having difficulty with the clarity of this language.  How does this module
provide a method to observe anything?  There are no RPC here. Would it be more
accurate to say:

NEW
This YANG module provides a means to characterize the (D)TLS traffic profile of
a device.  Network security services can use these profiles to permit
conformant traffic or to deny traffic from devices that deviates from it.

** Section 8
   Although it is challenging for a malware to mimic the TLS behavior of
   various IoT device types and IoT device models from several
   manufacturers, malicious agents have a very low probability of using
   the same (D)TLS profile parameters as legitimate agents on the IoT
   device to evade detection.

Could the observation being made here be clarified?  Is it saying that it is
challenging to mimic TLS behavior across devices, but it could still be done by
malware?  If so, it would be beneficial to describe why this is generically
true.  Certainly, some of the profile parameters are harder to mimic (e.g.,
certificate-authorities), but others would not (e.g., signature-algorithm.  The
difficulty of replications seems tied in some part to how the profile is
specified.

** Section 9
   The MUD URL can be stored in Trusted Execution
   Environment (TEE) for secure operation, enhanced data security, and
   prevent exposure to unauthorized software.

It is common for “IoT” to have a TEE?

** Section 9
   However, the
   malware on the IoT device won't be able to establish a (D)TLS
   connection with the C&C server to reveal this information because the
   connection would be blocked by the network security service
   supporting this specification.

Perhaps soften this language because while it is desired/intended for the
malware to be blocked the efficacy of this signature based approached is not
guaranteed.



_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to