On Fri, Nov 10, 2017 at 11:39 AM, Nancy Cam-Winget (ncamwing) < ncamw...@cisco.com> wrote:
> > Hi all, > > I think Flemming has expressed our points well. But I think we are losing > sight of the purpose of the draft: this is what industry is doing today in > response to requirements; whether imposed by customers or regulations. I > would not expect these to explicitly state how a solution, architecture and > protocol is to be implemented, they do impose requirements to an expected > outcome. As such, solutions have embraced the use of TLS pervasively and > balanced the requirements of customers/regulations to provide firewall, > inspection for monitoring and troubleshooting by the use cases as > documented in the draft. > > We are NOT against the use of PFS and improved security; we continue to > look forward to evolving solutions that use TLS (1.3)…but in some cases > there are implications that we thought merited awareness and further > discussion. > Nancy, I don't dispute that some organizations ("industry" seems like a pretty overbroad term as many organizations do not do these things) engage in some of the practices that you list. However, as I noted in my review, I think there are real concerns about whether these practices in fact securely achieve their stated goals (even ignoring the impact that accommodating them would have on TLS 1.3). -Ekr > Warm regards, Nancy > > > On 11/7/17, 4:40 PM, "Stephen Farrell" <stephen.farr...@cs.tcd.ie> wrote: > > > Hiya, > > On 08/11/17 00:23, Nancy Cam-Winget (ncamwing) wrote: > > Hi Stephen, > > Please see below: > > > > On 11/7/17, 4:08 PM, "Stephen Farrell" <stephen.farr...@cs.tcd.ie> > wrote: > > > > > > Hiya, > > > > On 07/11/17 23:53, Nancy Cam-Winget (ncamwing) wrote: > > > Hi Stephen, Adding to Flemming’s comment, finding “exact > quotes” > > > will be difficult > > > > I'm sorry but when making a claim that such and such a regulation > > *requires* breaking TLS then you really do need to be that > precise. > > [NCW] In TLS 1.2, not sure why you state *requires* as there is the > visibility afforded to > > at least allow for the identity disclosure to enable white or > blacklist for example. > > Quoting from your draft wrt PCI-DSS: > > " Requirement #2 (and Appendix A2 as it concerns TLS) > describes the need to be able to detect protocol and protocol usage > correctness." > > That one is nice - you seem to be arguing for protocol non-conformance > (or for weakening conformant implementations) in order to help ensure > "protocol usage correctness." That kind of makes my head spin. > > Another quote wrt NERC: > > " In fact, regulatory standards such as NERC CIP > [NERCCIP] place strong requirements about network perimeter security > and its ability to have visibility to provide security information > to > the security management and control systems. " > > Where exactly did you see those "strong requirements" that presumably > *require* breaking TLS? > > I don't see them. > > When I or others ask to be shown them we don't get shown them. > > To me that means those are not *required*. > > > > > > as their intent is really not to break things but > > > rather want to ensure that inspection and oversight is > available to > > > affect guards/protections within an (enterprise/data center) > > > infrastructure. That said, PCI and other regulations will > have a > > > lot of documents that one has to go through….one that kind-of > calls > > > explicitly to the use of packet inspection, firewalling and > such is > > > in: > > > > > > https://www.pcisecuritystandards.org/ > documents/SAQ_D_v3_Merchant.pdf > > > > The first mention of TLS there talks about protecting > administrator > > passwords via TLS. That totally argues against deployment of any > kind > > of MitM infrastructure. > > [NCW] Agreed, they also state in ensuring that the newest TLS > version where > > possible is used. BUT, they also expect monitoring and > troubleshooting. > > Sure. Not all monitoring *requires* breaking TLS. Same for > troubleshooting. > > Of course people who sell kit for that or have been doing > that for a while might want to see what they do as being > mandatory/required/regulated-for but I'm not seeing it. > > > > > > > > > It is an assessment questionnaire for vendors to evaluate their > > > compliance, the requirements speak to securing the network and > > > systems including firewalls, DMZs and the ability to do packet > > > inspection. > > > > Please point me at the specific text. Given you added PCI-DSS to > > your document I would assume you did the work already. If not, > > that's a bit odd. > > [NCW] From the link above, you can look at requirements in 1.3, > > also Requirement 10 details the need to monitor and provide audit > trails > > for network resources and cardholder data > > You mean 1.3 on page 6 I guess. I see nothing on pages 6 or 7 > that call for MitMing TLS. That seems to be about addressing > and DMZs and firewall and router configs. > > Requirement 10 seems to be dealing with audit of accesses to > cardholder data, not with TLS at all. I read pages 50-55 for > that. > > Honestly, what you're saying is there does not seem to be > there. > > S. > > > > > > S. > > > > > > > > > > Thanks, Nancy > > > > > > On 11/7/17, 3:27 PM, "Flemming Andreasen (fandreas)" > > > <fandr...@cisco.com> wrote: > > > > > > Thanks for taking an initial look at the document Stephen - > please > > > see below for responses so far > > > > > > On 11/7/17 4:13 AM, Stephen Farrell wrote: > > >> Hiya, > > >> > > >> On 07/11/17 02:48, Flemming Andreasen wrote: > > >>> We didn't draw any particular line, but the use case > scenarios > > >>> that we tried to highlight are those related to overall > security > > >>> and regulatory requirements (including public sector) > > >> I had a quick look at the draft (will try read properly > en-route > > >> to ietf-100) and I followed the reference to [1] but that > only lead > > >> to a forest of documents in which I didn't find any reference > to > > >> breaking TLS so far at least. Can you provide an explicit > pointer > > >> to the exact document on which that claim is based? > > > For NERC, you can look under "(CIP) Critital Infrastructure > > > Protection". CIP-005-5 for example covers the electronic > security > > > perimeter, which has a couple of relevant requirements and > associated > > > text: > > > > > > http://www.nerc.com/_layouts/PrintStandard.aspx? > standardnumber=CIP-005-5&title=Cyber%20Security%20-% > 20Electronic%20Security%20Perimeter(s)&jurisdiction=United%20States > > > > > > > > > > > > To be clear though, the document does not specifically call out > > > breaking TLS, but it does clearly call out the need to detect > > > malicious inbound and outbound communications by leveraging an > > > "Electronic Access Point" (e.g. IDS/IPS) to enforce the > Electronic > > > Security Perimeter. > > >> I'd also claim that your reference to PCI-DSS is misleading, > as > > >> that same spec also explicitly calls for there to be good key > > >> management specifically including minimising the number of > copies > > >> of keys, so at most, one might be able to claim that PCI-DSS > is ok > > >> with people who break TLS in a nod-and-a-wink manner. But if > you do > > >> have a real quote from PCI-DSS that calls for breaking TLS > then > > >> please do also send that (it's been asked for a bunch of times > > >> without any answer being provided so far). > > > > > > I will need to look more closely for such a quote - if anybody > else > > > knows of one, please chime in as well. > > > > > > Thanks > > > > > > -- Flemming > > > > > > > > >> Thanks, S. > > >> > > >> > > >> [1] > > >> https://tools.ietf.org/html/draft-camwinget-tls-use-cases- > 00.html#ref-NERCCIP > > > > > >> > > > > > > > > > > > > > > > > > > > > > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls