On Wed, 7 Aug 2024 at 15:19, Deb Cooley <debcool...@gmail.com> wrote:

> inline below w/ [DC].... I'd like to see the revised draft, once it is
> published (recognizing that I'm not blocking publication).
>

We published a revised draft to address comments from the ISEG review.


>
> Deb
>
> On Mon, Aug 5, 2024 at 6:58 AM tirumal reddy <kond...@gmail.com> wrote:
>
>> Hi Deb,
>>
>> Thanks for the review. Please see inline
>>
>> On Sun, 4 Aug 2024 at 00:27, Deb Cooley via Datatracker <nore...@ietf.org>
>> wrote:
>>
>>> Deb Cooley has entered the following ballot position for
>>> draft-ietf-opsawg-mud-tls-15: No Objection
>>>
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>>
>>>
>>> Please refer to
>>> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
>>> for more information about how to handle DISCUSS and COMMENT positions.
>>>
>>>
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/draft-ietf-opsawg-mud-tls/
>>>
>>>
>>>
>>> ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>>
>>> Thank you to Linda Dunbar for the secdir review of this draft.
>>>
>>> General comment:  Personally, I think this draft needs a rewrite to
>>> tighten and
>>> clarify the language used.  I was 'this close' to filing a discuss.
>>>
>>> Specific comments:
>>>
>>> Abstract:  I thought originally that this was a profile of (D)TLS, but
>>> it is
>>> not.  At best, I'd call this a framework to allow a manufacturer to
>>> create a
>>> profile.  Replacing 'incorporate' with 'allow manufacturers to define'
>>> might
>>> make it more clear.
>>>
>>
>> Thanks, updated text.
>>
>>
>>>
>>> Section 1, para 2:  I share Roman's concern about the age of the
>>> reference, and
>>> the claims made by that reference a full 8 years later.
>>>
>>
>> Yes, I responded to Roman that we will generalize the description of TTPs
>> and focus on the broader observation that (D)TLS protocol parameters can be
>> leveraged to block malicious and security policy-violating traffic.
>>
>>
>>>
>>> Section 1, para 2, bullet 3:  I'm not sure what 'self-signed certificates
>>> compared with typical legitimate software' means.  As written it seems
>>> like an
>>> 'apples to oranges' comparison?  Maybe the authors mean that they see
>>> more
>>> self-signed certificates compared with CA certificates that the IOT
>>> device
>>> trusts'?
>>>
>>
>> No, we meant self-signed certificates are typically used by malware (for
>> instance see,
>> https://www.trendmicro.com/en_us/research/21/i/analyzing-ssl-tls-certificates-used-by-malware.html)
>> compared to legitimate software using PKIX certificates.
>>
> [DC}  will you make a change in the text?  PKIX certificates should be
> called 'certificates from a CA trusted by the device' to be clear.  (there
> are many ways to say this, neither PKIX or X.509 are specific).
>

Thanks, Fixed.


>
>
>>
>>>
>>> Section 1, para 3:  Replace the first phrase of the first sentence
>>> with:  'If
>>> (D)TLS profile parameters are selected, the following...'?  It needs to
>>> be
>>> clear that this RFC is establishing a way for a profile to be defined
>>> for both
>>> DTLS and TLS.
>>>
>>
>> Yes, replaced with 'If (D)TLS profile parameters are defined, the
>> following...'
>>
>>
>>>
>>> Section 1, para 3, bullet 1:  Please define ACL.  And if it is 'access
>>> control
>>> list', please explain what that means in this context.  [later in the
>>> draft it
>>> is use in a way that I'm not used to - i.e. not as a way to control
>>> access....]
>>>
>>
>> Fixed.
>>
>>
>>>
>>> Section 3:  In general, a malware developer just needs a key and
>>> certificate
>>> signed by any of the IOT device's trusted certificate authorities
>>> (CAs).  How
>>> hard that is depends on how many CAs the IOT device trusts.
>>>
>>
>> Unlike the developers of legitimate applications, malware authors are
>> under additional constraints such as avoiding any noticeable differences on
>> the infected devices and the potential for take-down requests impacting
>> their server infrastructure (e.g., CA revoking the certificate).
>>
>
> [DC]  surely this is true no matter what key/certificate they use? A legit
> CA won't revoke a certificate unless there is reporting - I'm not sure what
> reporting would have to happen for a CA to revoke a malware authors'
> certificate.  And then revocation would have to be checked, which honestly
> doesn't happen often.
>

Yes, CA typically revokes a certificate only upon receiving a report of
misuse. OSCP stapling would solve the problem of checking whether the
certificate is revoked.


>
>>
>>>
>>> Section 4:  If these fields of the handshake are in the clear, then it is
>>> possible that the malware developer can see them just as easily as the
>>> middlebox.  It is always good practice for a server to reject connection
>>> attempts that don't follow the installed configuration.  I'm not sure
>>> what the
>>> value is of a middlebox that is not a (D)TLS proxy in this case.
>>>
>>
>> It is possible to identify malware without having to act as a proxy, the
>> results with Google Home and several malware families were presented in
>> T2TRG, please see
>> https://datatracker.ietf.org/meeting/interim-2020-t2trg-01/materials/slides-interim-2020-t2trg-01-sessa-
>> mud-dtls-profiles-for-iot-devices-00.pdf for details.
>>
>>
>>>
>>> Section 5:  The YANG modules establish the framework for a manufacturer
>>> to
>>> design and deploy a (D)TLS profile.  The YANG module itself makes no
>>> selections.  It is just a laundry list of options that can be chosen.
>>>
>>
>> It provides a comprehensive and flexible framework for manufacturers to
>> define (D)TLS profiles. For instance, see the white paper (Traffic
>> Analytics
>> <https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/enterprise-network-security/nb-09-encrytd-traf-anlytcs-wp-cte-en.html>)
>>  on
>> encrypted traffic analytics, which lists various TLS parameters used to
>> identify malware.
>>
>
> [DC] this is fine, but it isn't a profile as it is published.
>
>
>>
>>> Section 8, para 2:  These are statements made by the authors, is there a
>>> reference or evidence to back up that claim?
>>>
>>
>> Yes, please see my above response and TLS profile parameters are already
>> leveraged by network security vendors to identify malware (for example, see
>> https://secure.cisco.com/secure-firewall/docs/encrypted-visibility-engine
>> ).
>>
>
> [DC] will you reference this?
>

Done.

-Tiru


>
>
>> Cheers,
>> -Tiru
>>
>>
>>>
>>> Section 8.1-8.3:  As I've commented in the past, these statements are not
>>> actually security considerations.  Given that it has apparently been
>>> agreed
>>> that the statements are sufficient, no change is required.
>>
>>
>>
>
_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to