One document matched: draft-ietf-btns-prob-and-applic-00.txt
BTNS WG J. Touch, D. Black, Y. Wang
Internet Draft USC/ISI and EMC
Expires: January 2006 July 1, 2005
Problem and Applicability Statement
for Better Than Nothing Security (BTNS)
draft-ietf-btns-prob-and-applic-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that
any applicable patent or other IPR claims of which he or she is
aware have been or will be disclosed, and any of which he or she
becomes aware will be disclosed, in accordance with Section 6 of
BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on January 1, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005). All Rights Reserved.
Abstract
The Internet network security protocol suite, IPsec, consisting of
IKE, ESP, and AH, currently requires authentication via IKE of
network layer entities to bootstrap security. This authentication can
be based on mechanisms such as pre-shared symmetric keys, pre-shared
certificates and associated asymmetric keys, or the use of Kerberos.
Touch, Wang, Black Expires January 1, 2006 [Page 1]
Internet-Draft BTNS Problem and Applicability July 2005
The need for authentication information and its associated identities
between network layer entities can be a significant obstacle to
deploying network security. This document explains the rationale for
extending to the Internet network security suite to enable use of
IPsec security mechanisms without full IKE authentication. These
extensions are intended to protect communication "better than
nothing" (BTNS) on their own (Stand Alone BTNS, or SAB), and may be
useful in providing network layer security that can be authenticated
by higher layers in the protocol stack, called Channel Bound BTNS
(CBB). This document also explains situations in which use of SAB and
CBB extensions are appropriate and can achieve their intended
benefit.
Table of Contents
1. Introduction...................................................3
1.1. Assumptions...............................................4
2. Problem Statement..............................................5
2.1. Transport Protection From Packet Spoofing.................5
2.2. Authentication at Multiple Layers.........................6
2.3. Example - Secure Socket Layer.............................7
2.4. Threat Models.............................................8
3. Applicability Statement........................................9
3.1. Uses......................................................9
3.1.1. Symmetric SAB.......................................10
3.1.2. Asymmetric SAB......................................11
3.1.3. Symmetric CBB.......................................11
3.1.4. Asymmetric CBB......................................12
3.2. Vulnerabilities..........................................12
3.3. Benefits.................................................13
4. Security Considerations.......................................13
4.1. Evaluation of Threat Models..............................14
4.2. Protections..............................................15
5. Related Work and Other Issues.................................15
5.1. Not Considered...........................................15
5.2. Other IETF Efforts.......................................15
5.3. Extensions and Other Issues..............................16
6. Acknowledgments...............................................16
7. References....................................................16
7.1. Normative References.....................................16
7.2. Informative References...................................16
Author's Addresses...............................................18
Intellectual Property Statement..................................19
Disclaimer of Validity...........................................19
Copyright Statement..............................................19
Acknowledgment...................................................20
Touch, Black, Wang Expires January 1, 2006 [Page 2]
Internet-Draft BTNS Problem and Applicability July 2005
1. Introduction
Internet security is provided by a variety of protocols at different
layers of the protocol stack. Security at the network layer, IP, is
critical to protecting both network and transport protocols, the
latter because most include network identifiers in their
pseudoheaders, e.g., in TCP and UDP [2][12]. The current Internet
network security suite, IPsec, uses IKE, which currently relies on
pre-shared or pre-deployed information to authenticate identity
[3][6][9]. This pre-shared/pre-deployed state is a significant
impediment to its ubiquitous use.
This document describes a number of practical problems caused by the
Internet security suite that depend on pre-shared or pre-deployed
information for authentication, and describes "better than nothing
security" (BTNS), an extension of the Internet security suite that
secures communication between two parties. BTNS allows IPsec security
configured by IKE in which one or both parties avoid the need to be
authenticated either by a shared private key, certificate signed by a
mutually-known certificate authority, or other, pre-deployed
authentication infrastructure (e.g., Kerberos) [6][10].
Consider the case of transport protocols. Increases in network
performance and the use of long-lived connections have resulted in
increased vulnerability of connection-oriented transport protocols to
attack. Such attacks can be resisted to some extent within the
transport layer by performing additional validity checks, requiring
additional mechanisms added to each transport protocol. More direct
security can be provided, either at the transport or network layer.
This security currently requires a predetermined way to authenticate
the endpoints, e.g., a pre-shared secret, a certificate hierarchy
with pre-shared public keys, or an external key coordination system
such as Kerberos. In all cases, security can be established only
after ensuring that the endpoints are definitively identified before
their traffic is trusted.
Also consider the case where upper layers provide authentication. Web
transactions secure the server using HTTPS and SSL, where the server
has a certificate authenticated by a well-known certificate authority
(i.e., whose public keys are predeployed on many browsers) [3][14].
Clients typically lack such certificates, as they are prohibitively
expensive either in price or effort to obtain. Current secure web
transactions authenticate the client via application information,
such as passwords or credit card information. Web transaction
security protects the application information, but does not protect
the transport layer, where connections can be interrupted by spoofed
Touch, Black, Wang Expires January 1, 2006 [Page 3]
Internet-Draft BTNS Problem and Applicability July 2005
traffic. The network layer lacks authentication and thus cannot use
the IPsec suite, even though authentication is available at upper
layers.
This document suggests the need for an alternate approach to security
that avoids the need for authentication at the network layer. The
purpose is to protect a connection only after it has been
established. In this case, BTNS allows cryptographic protection for
the network and transport layers without requiring the endpoints to
be strongly authenticated at the network layer, possibly coupling
network layer security to higher layer protocols where strong
authentication is supported.
The goal of this approach to security is to protect established
connections but not to protect connection establishment, while
avoiding the need to deploy network layer secrets, keys, and/or
identities in advance. The resulting protection is not as complete,
but it would be "better than nothing security", thus the name BTNS.
This document presents the overall goal that BTNS is intended to
address: the desire to deploy security which avoids the need for pre-
deployed authentication identities and associated secrets or keys at
the network layer to achieve network layer protection which is
"better than nothing." It also presents discusses the intended
application of BTNS solutions, including Stand-Alone BTNS (SAB), as
well as integration with authentication at higher layers of the
protocol stack that still protect network and transport layer
traffic, called Channel Bound BTNS (CBB).
1.1. Assumptions
The problem and applicability statement for BTNS assume the use of
the IP network security protocol suite, i.e., IPsec, consisting of
IKE, ESP, and AH, as a reasonable platform for these extensions
because they are widely deployed, comparatively modular, and are
currently experiencing deployment challenges due to their dependence
on mutual pre-deployed shared authentication identities and
associated secrets or keys.
This document considers two variants of BTNS: one which supports
network protection without relying on mutual pre-deployed shared
authentication identities and associated secrets or keys, and one
which can be coupled with authentication higher in the protocol
stack. The differences in the problem statement and applicability of
both variants are addressed.
Touch, Black, Wang Expires January 1, 2006 [Page 4]
Internet-Draft BTNS Problem and Applicability July 2005
This document does not address what components of the IP network
security protocol suite may need modification or configuration to
support BTNS. Example scenarios are provided as design motivations
and are not intended to be a comprehensive list.
2. Problem Statement
BTNS removes the need for conventional authentication in providing
network security. There are two primary motivations for doing so: to
remove the need to deploy authentication information altogether
(Stand Alone BTNS, or SAB), and to remove the need for redundant
authentication at multiple layers (Channel Bound BTNS, or CBB). The
first is further motivated by the prevalence of proposed
modifications to transport layer protocols to provide protections
similar to a secure network layer.
2.1. Transport Protection From Packet Spoofing
TCP, like many other protocols, has been susceptible to off-path
third-party attacks [14]. Such attacks rely on the increase of
commodity platforms supporting public access to previously privileged
resources, such as root-level access. Given such access, it is
trivial for anyone to generate a packet with any header desired.
This, coupled with the lack of sufficient ingress filtering to drop
such spoofed traffic, has resulted in an increase in off-path third-
party spoofing attacks. As a result, a number of proposed solutions
have been developed, some of which modify TCP processing to defeat
off-path third-party spoofs by performing additional, security checks
inside the transport layer.
Some of these modifications augment the transport protocol with its
own security, e.g., TCP/MD5 [2]. Others modify the core TCP
processing rules to make it harder for off-path attackers to inject
meaningful packets, either during the initial handshake (e.g.
SYNcookies) or after a connection is established (e.g., TCPsecure)
[2][14]. Some of these modifications are new to TCP, but have already
been incorporated into other transport protocols (e.g., SCTP) or
intermediate (so-called L3.5) protocols (e.g., HIP) [10][14].
Such modifications are, at best, temporary patches to the ubiquitous
vulnerability to spoofing attacks. The obvious solution to spoofing
is to validate the segments of a connection, either at the transport
layer (which the patch provides, weakly) or the network layer. The
IPsec suite already intends to provide authentication of a network
layer packet and its contents, but its deployment overhead can be
prohibitive.
Touch, Black, Wang Expires January 1, 2006 [Page 5]
Internet-Draft BTNS Problem and Applicability July 2005
Protecting the network from spoofed packets is ultimately an issue of
authentication, ensuring that a receiver's interpretation of the
source of a packet is accurate. Authentication validates the identity
of the source of the packet. The current IPsec suite assumes that
identity is validated either by a trusted third party - e.g., the
certificate authority - or by a pre-deployed shared secret. Such an
identity is unique and invariant across associations (pairwise
security configuration), and can be used to reject packets that are
not authentic.
There is weaker notion of identity, one which is bootstrapped from
the session association itself. The identity doesn't mean "Bill
Smith" or "owner of shared secret X2YQ", but means something more
like "the end with whom I have been talking on connection #23". Such
identity is not invariant across associations, but because it is
invariant within an association it can still be used to provide
protection for that association.
BTNS thus provides a kind of intra-association integrity, a kind of
relative authentication, where the identity is not authenticated
across separate associations or out-of-band, but does not change
during the association. This kind of BTNS is known as Stand Alone
BTNS (SAB), because the protection is afforded solely by the use of
BTNS extensions, without authentication from higher layers in the
protocol stack.
2.2. Authentication at Multiple Layers
Some protocols used on the Internet provide authentication at a layer
above the transport, but rely on the IPsec suite for packet-by-packet
cryptographic integrity and confidentiality services. Examples of
such protocols include iSCSI and a proposed security mode for NFSv4
security <need better explanation> [16]. With the current IPsec
suite, the result is two authentications; one at the IPsec layer,
using an identity for IKE and an associated secret or key, and once
at the higher layer protocol using a higher layer identity and secret
or key. End-node software is then responsible for making sure that
the identities used for these two authentications are consistent in
some fashion, an authorization policy decision. In principle a
single authentication should suffice, removing the need for:
o the second authentication
o configuration and management of the identities and secrets or keys
for the second authentication
Touch, Black, Wang Expires January 1, 2006 [Page 6]
Internet-Draft BTNS Problem and Applicability July 2005
o determining in some fashion that the two authentications are
consistent (and potential vulnerabilities if this is not done)
IPsec is not always present for these higher layer protocols, and
even when present, will not always be used. Hence, if there is a
choice, the higher layer protocol authentication is preferable as it
will always be available for use independent of IPsec. This is
complicated by the fact that IPsec must set up its security
association before the higher layer protocol can send any traffic.
A "better than nothing" security approach to IPsec can address this
problem by setting up IPsec without an authentication and then
extending the higher layer authentication to check that the two ends
of the higher layer protocol session are on two ends of the same
security association, via some sort of check of the identity of the
security association. This check is referred to as "channel binding",
thus the name Channel Bound BTNS (CBB) [21]. Channel binding must be
done in a fashion that prevents a man-in-the-middle from changing the
security association identity when it is checked and from causing two
different security associations to have the same identity. Adding
the security association identifier to authentication mechanisms
based on one-way hashes, key exchanges, or (public key) cryptographic
signatures are three means by which channel binding can be
accomplished with man-in-the-middle resistance. This requires that
the security association identifier be the same at both ends of the
security association [21].
2.3. Example - Secure Socket Layer
HTTPS is a good example of an ubiquitous Internet security mechanism,
providing application-layer security for web client/server
communication. It consists of HTTP over SSL/TLS, which, like IKE,
relies on X.509 certificates and associated certificate authorities
(CAs) to identify parties [3][14]. In contrast to IKE, SSL can be
used where one or both parties use certificates which are not
authenticated by CAs preshared by those parties. Security may remain
unauthenticated, or may be further authenticated at the application
layer.
Consider the case of an individual accessing a corporate website to
purchase a product. Communication to the website is encrypted, based
on certificates on both the corporate and individual sides. The
corporate certificate is typically signed by a well-known CA, one of
a set whose public keys are predeployed with most modern web
browsers. The individual's certificate is only self-signed, to avoid
the expense of registering with a CA.
Touch, Black, Wang Expires January 1, 2006 [Page 7]
Internet-Draft BTNS Problem and Applicability July 2005
The corporate website agrees to communicate with the individual's web
browser even though the individual's identity has not yet been
established. In some cases, the individual's identity is later
verified at the application layer by confirming mutually shared
information (mother's maiden name, an account number), or by using a
protected preshared secret (password, PIN, etc.). In some cases, the
individual's identity is never confirmed.
Regardless of whether identity is confirmed later (by analogue, as in
CBB) or not at all (by analogue, as in SAB), the communication is
protected because of the use of unauthenticated security. The
protection is persistent within a connection, but not necessarily
between connections - which is why passwords are used to access
recently visited sites. Such systems are widely deployed
asymmetrically for the web, and symmetrically for e-mail. The kind of
protections afforded by these examples of SSL are the inspiration for
BTNS. BTNS differs from SSL in that it protects the network and
transport layer, whereas SSL protects the application layer. BTNS can
thus protect TCP connections from spoofed packets that are low-effort
attacks that interfere with the connection itself, which SSL cannot.
2.4. Threat Models
The following is a brief summary of the threat models of BTNS. A more
detailed assessment is provided in the Security Considerations
section of this document.
BTNS is intended to protect sessions from a variety of threats,
including man-in-the-middle after key exchange, other on-path attacks
after key exchange, and off-path attacks. It is intended to protect
the contents of a session once established using a "leap of faith"
during session establishment, but does not protect session
establishment itself.
BTNS is not intended to protect the key exchange itself, so this
presents an opportunity for a man-in-the-middle attack or a well-
timed attack from other sources. Stand-alone BTNS is not intended to
protect the endpoint from nodes masquerading as legitimate clients
but rather to raise the level of effort of an attack to that of
emulating a client. BTNS together with authentication from higher
layers in the stack can protect from such masquerading, depending on
how the authentication is coupled with the BTNS associations, and at
a later point in the protocol exchange.
BTNS is also not intended to protect from DOS overload of the CPU
load of verification, nor is it intended to protect from user
misconfiguration. These final assumptions are the same as that of the
Touch, Black, Wang Expires January 1, 2006 [Page 8]
Internet-Draft BTNS Problem and Applicability July 2005
IP network protocol security suite. Finally, manual keying is not
considered in this document.
3. Applicability Statement
BTNS is intended to provide network and transport protection in the
absence of network layer authentication, whether alone (stand-alone)
or in conjunction with application authentication. Recall that the
former is called Stand Alone BTNS (SAB), and the latter Channel Bound
BTNS (CBB).
BTNS protects associations once established, but does not itself
limit with whom associations are made. It is generally appropriate
for services open to the public but for which protected associations
are desired, or for services that can be authenticated at higher
layers in the protocol stack.
BTNS reduces vulnerability to attacks after associations have been
established by parties not participating in the association. This
helps protect systems from low-effort attacks on sessions or
connections involving higher levels of resources.
BTNS increases vulnerability to overloading, which can be the result
of legitimate flash crowds or from zombies posing as clients.
Although BTNS should be used only for public services, it can provide
some level of protection for private services if the alternative is
no protection at all.
3.1. Uses
BTNS is intended for use for public services (SAB) or for private
services that can be authenticated by higher layer protocols (CBB).
It can also be used either symmetrically, where both parties lack
network layer authentication information, or asymmetrically, where
only one party is lacking. There a number of cases to consider, based
on the matrix of SAB, CBB, and conventional authentication (denoted
as IKE below); note that these are classified by the weaker side of
the authentication, where SAB is the weakest, CBB is less weak, and
IKE is the strongest:
Touch, Black, Wang Expires January 1, 2006 [Page 9]
Internet-Draft BTNS Problem and Applicability July 2005
| IKE | SAB | CBB |
----+-----------+-----------+-----------+
| | | |
IKE | IKE | A-SAB | AI-CBB |
| | | |
----+-----------+-----------+-----------+
| | | |
SAB | A-SAB | S-SAB | AS-CBB |
| | | |
----+-----------+-----------+-----------+
| | | |
CBB | AI-CBB | AS-CBB | S-CBB |
| | | |
----+-----------+-----------+-----------+
1. IKE: both sides possess conventional, IKE-supported authentication
2. Symmetric SAB (S-SAB): both sides lack network layer
authentication information (and lack or do not use higher layer
authentication)
3. Asymmetric SAB (A-SAB): one side lacks network layer
authentication information (and lacks or does not use higher layer
authentication), but the other possesses it
4. Symmetric CBB (S-CBB): both sides lack network layer
authentication information, and both possess authentication at a
higher layer in the protocol stack
5. Asymmetric CBB (A-CBB): one side lacks network layer
authentication information and possesses authentication at a
higher layer in the protocol stack; there are two variants,
Asymmetric IKE CBB(AI-CBB) where the other side possesses
conventional IKE-supported authentication, and asymmetric stand-
alone CBB (AS-CBB), where the other side lacks network layer
authentication information and lacks authentication at higher
layers
The following is a discussion of each of these use cases.
Vulnerabilities and benefits are discussed in later subsections of
this section separately.
3.1.1. Symmetric SAB
Symmetric SAB (S-SAB) assumes that both parties lack network layer
authentication information and that authentication is not available
Touch, Black, Wang Expires January 1, 2006 [Page 10]
Internet-Draft BTNS Problem and Applicability July 2005
from higher layer protocols. S-SAB can still protect network and
transport protocols, but does not provide authentication at all. It
is useful where large files or long connections would benefit from
not being interrupted by DOS attacks, but where the particular
endpoint identities are not important.
Peer-to-peer networks could utilize S-SAB because no peer need be
privileged and preregistered at any layer in the stack. S-SAB
protects all transport protocols between two peers, which is
convenient because peer nets may test a variety of transport
protocols in order to traverse NATs and firewalls.
Public services, such as web servers, may also use S-SAB when their
identity need not be authenticated to clients, but where the
communication would benefit from protection. Such servers might
provide large files, either unvalidated or validated by other means
(e.g., published MD5 hashes). Downloads of these large files present
a target for off-path attacks, which could be reduced by the use of
S-SAB. S-SAB may also be useful for protecting the transport of
voice-over-IP (VoIP) between peers, such as direct calls between VoIP
clients.
3.1.2. Asymmetric SAB
Asymmetric SAB (A-SAB) allows one party lacking network layer
authentication information to establish associations with another
which possesses authentication, the latter by any means supported by
existing IKE.
Asymmetric SAB is useful for protecting the transport connections for
public services on the Internet, e.g., commercial web servers, DNS,
etc. In these cases, the server is typically authenticated by a
widely known CA, as is done with SSL, but the clients need not be
authenticated.
A-SAB also secures transport for streaming media as would be used
between a VoIP client and the commercial VoIP provider, or to view
broadcast streaming such as webcasts for remote education and
entertainment.
3.1.3. Symmetric CBB
Symmetric CCB (S-CCB) allows hosts lacking network layer
authentication information to utilize authentication at higher layers
in the protocol stack.
Touch, Black, Wang Expires January 1, 2006 [Page 11]
Internet-Draft BTNS Problem and Applicability July 2005
Such authentication already occurs during web transactions to sites
whose certificates are self-signed or signed by untrusted CAs; web
clients ask "do you want to trust this certificate for this session,"
e.g. S-CCB could support challenge/response PINs, such as used by
S/Key in software or copy protection dongles.
3.1.4. Asymmetric CBB
Asymmetric CBB (A-CBB) allows one host lacking network layer
authentication information to later authenticate itself using higher
layers in the protocol stack. A-CBB has variants depending on whether
the other side is authenticated at the network layer using
conventional IKE-supported means (AI-CBB), authenticated at higher
layers using CBB (symmetric CBB, or S-CBB), or protected but not
authenticated using SAB (AS-CBB).
Most of the A-CBB variants are useful for securing remote access with
unidirectional passwords, such as for FTP and email, to avoid sending
cleartext passwords prior to login, but where application security is
not available - e.g., for legacy applications. Which variant is
appropriate depends on the sensitivity of the passwords; most would
tend to be used with S-CBB or AI-CBB, where the server is
authenticated before the client presents the password.
AS-CBB is useful for obtaining authenticated data from a public
source, where client identity is irrelevant but server identity is.
3.2. Vulnerabilities
The vulnerabilities presented by BTNS depends on which variant is
supported on the two ends of an association. Hosts connecting to BTNS
hosts are vulnerable to communicating to a masquerader throughout the
association for SAB, or until higher layers provide additional
authentication for CBB. This is a deliberate design tradeoff; in
BTNS, network and transport layer access is no longer gated by the
network identity of the other host, so this opens hosts to
masquerading and flash crowd attacks. Conversely, BTNS secures
connections to hosts that cannot authenticate at the network layer,
so the network and transport layers are more protected.
Lacking network layer authentication information, other means must be
used to protect local resources. Filters can be used to limit which
interfaces, address ranges, and port ranges can access BTNS-enabled
services. Rate limiting can further restrict resource usage. For SAB,
these protections need to be considered throughout associations,
whereas for CBB they need be present only until higher layer
protocols provide the missing authentication. CCB also relies on the
Touch, Black, Wang Expires January 1, 2006 [Page 12]
Internet-Draft BTNS Problem and Applicability July 2005
effectiveness of the binding of higher layer authentication to the
BTNS network association.
3.3. Benefits
BTNS protects network and transport layers without requiring network
layer authentication information. It can be deployed without
configuration or pre-shared information, and protects the entire
variety of transport protocols using a single mechanism.
BTNS raises the level of effort for a network or transport attack.
Casual, simple packet attacks need to be augmented to full
associations and connection establishment for SAB, so that an
attacker must perform as much work as regular host. SAB thus raises
the effort for a DDOS attack to that of emulating a flash crowd. For
public services, there may be no way to distinguish such a DDOS
attack from a legitimate flash crowd anyway.
BTNS also allows individual associations to be private without
requiring predeployed authentication. We anticipate that it will use
the original Diffie-Hellman exchange to establish pairwise private
keys between ends of an association, effectively omitting the
authentication phase currently used in IKE. As such, associations
will be private, as well as protected.
4. Security Considerations
Although security considerations are discussed throughout this
document, there are several issues to be addressed regarding when and
where to use BTNS:
1. avoiding interference with conventional network layer
authentication
2. increased load on IPsec to reject spoofed traffic
3. integration with higher-layer authentication (for CBB)
4. exposure to anonymous access (for SAB)
As with any aspect of network security, the use of BTNS must not
interfere with conventional security services. It must be possible to
limit BTNS to specific interfaces, addresses, protocols, and/or ports
much the same way it is already possible to skip network security
based on these parameters. It is incumbent on the system
administrators to deploy BTNS only where safe, preferably as a
substitute to the use of "bypass" which avoids network security
Touch, Black, Wang Expires January 1, 2006 [Page 13]
Internet-Draft BTNS Problem and Applicability July 2005
altogether. In summary, BTNS should be used only as a substitute for
no security, rather than as a substitute for stronger security.
The use of BTNS means that more traffic will use cryptographic
transforms. Receivers will observe increased processing load in
verifying incoming traffic as a result. Although this may itself
present a substantial impediment to deployment, it is a challenge to
all cryptographically protected communication systems. The use of
crypto increases the load on those verifying it; we do not consider
the impact that BTNS has on such load simply by encouraging the use
of security.
Where BTNS is integrated with higher layer authentication, i.e., CBB,
special care must be taken to avoid undue resource use before higher
layer authentication is established. Further, the ways in which BTNS
is integrated with the higher layer protocol must take into
consideration vulnerabilities that could be introduced in the APIs
between these two systems or in the information that they share.
Finally, the use of SAB necessary implies that a service is being
offered for public access, since network layer authentication
information is not available. SAB must not be deployed on services
that are not intended to be publicly available.
4.1. Evaluation of Threat Models
BTNS is intended to protect the network and transport layer between
two parties after an association is established. SAB is not intended
to protect to whom associations are established based on
authenticated identity. CBB does not protect with whom associations
are established initially, but allows higher layer protocols that
provide authentication to couple to network layer security after the
association is established, at which time the association can be
adjusted accordingly.
BTNS does not protect from man-in-the-middle attacks during key
exchange during association establishment.
SAB in particular is intended for use for publicly available
services, and CBB may also be used in that capacity. In those cases,
neither protects from overload due to flash crowds or DDOS attacks
posing as flash crowds.
BTNS does not address attacks to the association establishment key
exchange, which can be substantial for flash crowds of public
services of SAB or for CBB until higher layer authentication is
established.
Touch, Black, Wang Expires January 1, 2006 [Page 14]
Internet-Draft BTNS Problem and Applicability July 2005
BTNS does not address the increased load on the system that the use
of IPsec security services will incur, either for processing
legitimate traffic or for rejecting attack traffic.
When channel binding is used with BTNS, a man-in-the-middle attack on
IPsec is discovered later than if IKE authentication were used. A
man in the middle cannot subvert IKE authentication, and hence an
attempt to attack it via use of two separate security associations
will cause an IKE authentication failure. In contrast, with BTNS and
channel binding, the IKE authentication will succeed, and the
security association will be set up, only to have the higher layer
authentication fail after more resources have been invested in this
session. Nonetheless, this is an improvement over the alternative of
minimizing the configuration of IPsec by using a group pre-shared
key, which provides no defense against man-in-the-middle attacks
among the nodes sharing the key.
4.2. Protections
BTNS does protect from man-in-the-middle attacks after the initial
association is established. Man-in-the-middle during association
establishment for CBB can be detected via channel binding with higher
layer authentication.
BTNS protects the network and transport layer from on-path non-man-
in-the-middle (i.e., snooping) and from off-path attacks. This helps
especially protect transport connections from attack.
5. Related Work and Other Issues
5.1. Not Considered
BTNS does not (at this time) consider the impact of mobility or
multihoming on the capabilities it intends to provide.
BTNS does not consider the impact of NAT or NAPT on the capabilities
it intends to provide, except as are already addressed by the current
Internet network security suite.
5.2. Other IETF Efforts
There are a number of related efforts in the IETF and elsewhere to
reduce the configuration effort of deploying the Internet security
suite.
PKI4IPsec is an IETF WG focused on providing an automatic
infrastructure for the configuration of Internet security services,
Touch, Black, Wang Expires January 1, 2006 [Page 15]
Internet-Draft BTNS Problem and Applicability July 2005
e.g., to assist in deploying signed certificates and CA information
[6]. The IETF KINK WG is focused on adapting Kerberos for IKE,
enabling IKE to utilize the Kerberos key distribution infrastructure
rather than requiring certificates signed by CAs or shared private
keys [6]. KINK takes advantage of an existing architecture for
automatic key management in Kerberos. Opportunistic Encryption (OE)
is a system for automating authentication infrastructure by
leveraging the existing use of the DNS [14]. BTNS differs from all
three in that BTNS is intended to avoid the need for such
infrastructure altogether, rather than to automate it.
Finally, BTNS does not address a number of existing challenges to
using the Internet network security suite. DOS attacks that involve
overloading endpoints with invalid signatures are not addressed, as
they are a natural aspect of using security and BTNS does not create
or amplify that aspect per se, except to possibly encourage broader
use of security. BTNS does not address errors of configuration that
could result in increased vulnerability; such vulnerability is
already possible using "bypass". We presume that associations using
BTNS will be separated from associations with more conventional,
stronger security just as "bypass" is currently separated from those
associations.
5.3. Extensions and Other Issues
One extension of particular interest is the ability to retain
association "identity" across multiple associations, i.e., to be able
to know when a host is communicating with a host it has had a
previous BTNS association with. Such capabilities are already used in
SSL applications, e.g., for web clients and email access.
<any other issues?>
6. Acknowledgments
<placeholder>
7. References
7.1. Normative References
(none)
7.2. Informative References
[1] Arends, R., R. Austein, M. Larson, D. Massey, S. Rose, "DNS
Security Introduction and Requirements," RFC-4033, Mar. 2005.
Touch, Black, Wang Expires January 1, 2006 [Page 16]
Internet-Draft BTNS Problem and Applicability July 2005
[2] Dalal, M., (ed.), "Improving TCP's Robustness to Blind In-
Window Attacks," (work in progress), draft-ietf-tcpm-tcpsecure-
03.txt, May 2005.
[3] Frier, A., P. Karlton, P. Kocher, "The SSL 3.0 Protocol",
Netscape Communications Corp., Nov 18, 1996.
[4] Harkins, D., D. Carrel, "The Internet Key Exchange (IKE)," RFC-
2409, Nov. 1998.
[5] Heffernan, A., "Protection of BGP Sessions via the TCP MD5
Signature Option," RFC-2385, Aug. 1998.
[6] IETF KINK WG web pages, http://www.ietf.org/html.charters/kink-
charter.html
[7] IETF PKI4IPSEC WG web pages,
http://www.ietf.org/html.charters/pki4ipsec-charter.html
[8] Kent, S., R. Atkinson, "Security Architecture for the Internet
Protocol," RFC-2401, Nov. 1998.
[9] Kent, S., K. Seo, "Security Architecture for the Internet
Protocol," (work in progress), draft-ietf-ipsec-rfc2401bis-06,
Mar. 2005.
[10] Kohl, J., C. Neuman, "The Kerberos Network Authentication
Service (V5)," RFC-1510, Sep. 1993.
[11] Mostkowitz, R., P. Nikander, P. Jokela (ed.), T. Henderson,
"Host Identity Protocol," draft-ietf-hip-base-03, June 2005.
[12] Postel, J., "User Datagram Protocol," RFC-768 / STD-6, Aug.
1980.
[13] Postel, J., (ed.), "Transmission Control Protocol," RFC-793 /
STD-7, Sept. 1981.
[14] Rescorla, E., "HTTP Over TLS," RFC-2818, May 2000.
[15] Richardson, M., "Opportunistic Encryption using The Internet
Key Exchange (IKE)," (work in progress), draft-richardson-
ipsec-opportunistic-17.txt, Jan. 2005.
[16] Satran, J., K. Meth, C. Sapuntzakis, M. Chadalapaka, E.
Zeidner, "Internet Small Computer Systems Interface (iSCSI)",
RFC 3720, April 2004.
Touch, Black, Wang Expires January 1, 2006 [Page 17]
Internet-Draft BTNS Problem and Applicability July 2005
[17] Shepler, S., B. Callaghan, D. Robinson, R. Thurlow, C., Beame,
M. Eisler, D. Noveck, "Network File System (NFS) version 4
Protocol," RFC-3530, April, 2003.
[18] Stewart, R., et al., "Stream Control Transmission Protocol,"
RFC-2960, Oct. 2000.
[19] TCP SYN-cookies, http://cr.yp.to/syncookies.html
[20] Touch, J., "Defending TCP Against Spoofing Attacks," (work in
progress), draft-ietf-tcpm-tcp-antispoof-01.txt, Apr. 2005.
[21] Williams, N., "On the Use of Channel Bindings to Secure
Channels," (work in progress), draft-ietf-nfsv4-channel-
bindings-03.txt, Feb. 2005.
[22] Copy protection dongles <insert good ref here>
[23] S/Key <insert good ref here>
Author's Addresses
Joe Touch
USC/ISI
4676 Admiralty Way
Marina del Rey, CA 90292-6695
U.S.A.
Phone: +1 (310) 448-9151
Email: touch@isi.edu
David Black
EMC Corporation
176 South Street
Hopkinton, MA 01748
USA
Phone: +1 (508) 293-7953
Email: black_david@emc.com
Touch, Black, Wang Expires January 1, 2006 [Page 18]
Internet-Draft BTNS Problem and Applicability July 2005
Yu-Shun Wang
USC/ISI
4676 Admiralty Way
Marina del Rey, CA 90292-6695
U.S.A.
Phone: +1 (310) 448-8742
Email: yushunwa@isi.edu
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005).
Touch, Black, Wang Expires January 1, 2006 [Page 19]
Internet-Draft BTNS Problem and Applicability July 2005
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Touch, Black, Wang Expires January 1, 2006 [Page 20]
| PAFTECH AB 2003-2026 | 2026-04-19 07:23:10 |