| < draft-ietf-opes-threats-02.txt | draft-ietf-opes-threats-03.txt > | |||
|---|---|---|---|---|
| Network Working Group A. Barbir | Network Working Group A. Barbir | |||
| Internet-Draft Nortel Networks | Internet-Draft Nortel Networks | |||
| Expires: August 11, 2003 O. Batuner | Expires: June 7, 2004 O. Batuner | |||
| Independent consultant | Independent consultant | |||
| B. Srinivas | B. Srinivas | |||
| Nokia | Nokia | |||
| M. Hofmann | M. Hofmann | |||
| Bell Labs/Lucent Technologies | Bell Labs/Lucent Technologies | |||
| H. Orman | H. Orman | |||
| Purple Streak Development | Purple Streak Development | |||
| February 10, 2003 | December 8, 2003 | |||
| Security Threats and Risks for OPES | Security Threats and Risks for OPES | |||
| draft-ietf-opes-threats-02 | draft-ietf-opes-threats-03 | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026. | all provisions of Section 10 of RFC2026. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that other | Task Force (IETF), its areas, and its working groups. Note that other | |||
| groups may also distribute working documents as Internet-Drafts. | groups may also distribute working documents as Internet-Drafts. | |||
| skipping to change at page 1, line 38 ¶ | skipping to change at page 1, line 38 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at http:// | The list of current Internet-Drafts can be accessed at http:// | |||
| www.ietf.org/ietf/1id-abstracts.txt. | www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on August 11, 2003. | This Internet-Draft will expire on June 7, 2004. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (C) The Internet Society (2003). All Rights Reserved. | Copyright (C) The Internet Society (2003). All Rights Reserved. | |||
| Abstract | Abstract | |||
| The document investigates the security threats associated with OPES. | The document investigates the security threats associated with OPES. | |||
| The effects of security threats on the underlying architecture are | The effects of security threats on the underlying architecture are | |||
| discussed. The main goal of this document is threat discovery and | discussed. The main goal of this document is threat discovery and | |||
| skipping to change at page 2, line 20 ¶ | skipping to change at page 2, line 20 ¶ | |||
| 2.1.1 Connection-Flow Denial-of-Service (DoS) . . . . . . . . . 6 | 2.1.1 Connection-Flow Denial-of-Service (DoS) . . . . . . . . . 6 | |||
| 2.1.2 Threats to network robustness . . . . . . . . . . . . . . 7 | 2.1.2 Threats to network robustness . . . . . . . . . . . . . . 7 | |||
| 2.2 OPES Flow Application Level Threats . . . . . . . . . . . 7 | 2.2 OPES Flow Application Level Threats . . . . . . . . . . . 7 | |||
| 2.2.1 Unauthorized OPES entities . . . . . . . . . . . . . . . . 7 | 2.2.1 Unauthorized OPES entities . . . . . . . . . . . . . . . . 7 | |||
| 2.2.2 Unauthorized actions of legitimate OPES entities . . . . . 7 | 2.2.2 Unauthorized actions of legitimate OPES entities . . . . . 7 | |||
| 2.2.3 Unwanted content transformations . . . . . . . . . . . . . 8 | 2.2.3 Unwanted content transformations . . . . . . . . . . . . . 8 | |||
| 2.2.4 Corrupted content . . . . . . . . . . . . . . . . . . . . 8 | 2.2.4 Corrupted content . . . . . . . . . . . . . . . . . . . . 8 | |||
| 2.2.5 Threats to message structure integrity . . . . . . . . . . 8 | 2.2.5 Threats to message structure integrity . . . . . . . . . . 8 | |||
| 2.2.6 Granularity of protection . . . . . . . . . . . . . . . . 9 | 2.2.6 Granularity of protection . . . . . . . . . . . . . . . . 9 | |||
| 2.2.7 Risks of hop-by-hop protection . . . . . . . . . . . . . . 9 | 2.2.7 Risks of hop-by-hop protection . . . . . . . . . . . . . . 9 | |||
| 2.2.8 Threats to integrity of complex data . . . . . . . . . . . 10 | 2.2.8 Threats to integrity of complex data . . . . . . . . . . . 9 | |||
| 2.2.9 Denial of Service (DoS) . . . . . . . . . . . . . . . . . 10 | 2.2.9 Denial of Service (DoS) . . . . . . . . . . . . . . . . . 9 | |||
| 2.2.10 Tracing and notification information . . . . . . . . . . . 10 | 2.2.10 Tracing and notification information . . . . . . . . . . . 10 | |||
| 2.2.11 Unauthenticated Communication in OPES Flow . . . . . . . . 10 | 2.2.11 Unauthenticated Communication in OPES Flow . . . . . . . . 10 | |||
| 3. Threats to out-of-band data . . . . . . . . . . . . . . . 11 | 3. Threats to out-of-band data . . . . . . . . . . . . . . . 11 | |||
| 3.1 Threats that endanger the OPES data flow . . . . . . . . . 11 | 3.1 Threats that endanger the OPES data flow . . . . . . . . . 11 | |||
| 3.2 Inaccurate Accounting Information . . . . . . . . . . . . 11 | 3.2 Inaccurate Accounting Information . . . . . . . . . . . . 11 | |||
| 3.3 OPES service request repudiation . . . . . . . . . . . . . 12 | 3.3 OPES service request repudiation . . . . . . . . . . . . . 12 | |||
| 3.4 Inconsistent privacy policy . . . . . . . . . . . . . . . 12 | 3.4 Inconsistent privacy policy . . . . . . . . . . . . . . . 12 | |||
| 3.5 Exposure of privacy preferences . . . . . . . . . . . . . 12 | 3.5 Exposure of privacy preferences . . . . . . . . . . . . . 12 | |||
| 3.6 Exposure of security settings . . . . . . . . . . . . . . 12 | 3.6 Exposure of security settings . . . . . . . . . . . . . . 12 | |||
| 3.7 Improper enforcement of privacy and security policy . . . 13 | 3.7 Improper enforcement of privacy and security policy . . . 13 | |||
| skipping to change at page 9, line 27 ¶ | skipping to change at page 9, line 27 ¶ | |||
| or to automatically detect policy violations. | or to automatically detect policy violations. | |||
| A fine-grained policy language should be devised, and it could be | A fine-grained policy language should be devised, and it could be | |||
| enforced using digital signatures. This would avoid the problems | enforced using digital signatures. This would avoid the problems | |||
| inherent in hop-by-hop data integrity measures (see next section). | inherent in hop-by-hop data integrity measures (see next section). | |||
| 2.2.7 Risks of hop-by-hop protection | 2.2.7 Risks of hop-by-hop protection | |||
| OPES services cannot be applied to data protected with end-to-end | OPES services cannot be applied to data protected with end-to-end | |||
| encryption methods because, by definition, the decryption key cannot | encryption methods because, by definition, the decryption key cannot | |||
| be shared with OPES processors. This means that if the endpoint | be shared with OPES processors. This means that if the endpoint | |||
| policies permit OPES services, the data must either be transmitted | policies permit OPES services, the data must either be transmitted | |||
| without confidentiality protections or else with an alternative to | without confidentiality protections or an alternative model to | |||
| end-to-end encryption: hop-by-hop encryption. In the latter case, all | end-to-end (hop-by-hop) encryption be developed. Extending the | |||
| the parties in the OPES processing path must understand the | end-to-end encryption model is out of scope of this work. In this | |||
| encryption requirement and negotiate encrypted connections with their | work security is end-to-end. OPES services cannot be performed if | |||
| OPES partners. | endpoints need security. | |||
| Hop-by-hop protection is less effective than end-to-end protection, | ||||
| because any processor in the path which shares a cryptographic key, | ||||
| can violate the confidentiality or integrity of the data without | ||||
| detection. | ||||
| If a pair of processors in the delivery path use weak cryptography or | ||||
| manage keys poorly, there is a danger of data leakage. For this | ||||
| reason, different cryptographic keys should be used for each leg of | ||||
| the data stream. | ||||
| Even if the data is not confidential, one might desire some checks on | ||||
| data integrity, to avoid modifications by unauthorized parties. The | ||||
| comments above apply to the use of end-to-end integrity, if it is | ||||
| based on shared-key cryptography. Again, it should be possible to | ||||
| use hop-by-hop data integrity to protect data as it moves between | ||||
| protection domains. | ||||
| Currently there is no method to signal hop-by-hop encryption or | ||||
| integrity requirements. Either this must be added to the application | ||||
| protocol, or OPES must define its own signaling protocol, or all OPES | ||||
| traffic MUST ALWAYS be encrypted. | ||||
| 2.2.8 Threats to integrity of complex data | 2.2.8 Threats to integrity of complex data | |||
| The OPES system may violate data integrity by applying inconsistent | The OPES system may violate data integrity by applying inconsistent | |||
| transformations to interrelated data objects or references within the | transformations to interrelated data objects or references within the | |||
| data object. Problems may range from a broken reference structure | data object. Problems may range from a broken reference structure | |||
| (modified/missing targets, references to wrong locations or missing | (modified/missing targets, references to wrong locations or missing | |||
| documents) to deliberate replacement/deletion/insertion of links that | documents) to deliberate replacement/deletion/insertion of links that | |||
| violate intentions of the content provider. | violate intentions of the content provider. | |||
| skipping to change at page 12, line 20 ¶ | skipping to change at page 12, line 20 ¶ | |||
| incorrect resource management and DoS by artificial resource | incorrect resource management and DoS by artificial resource | |||
| starvation. | starvation. | |||
| 3.3 OPES service request repudiation | 3.3 OPES service request repudiation | |||
| An entity (producer or consumer) makes an authorized request and | An entity (producer or consumer) makes an authorized request and | |||
| claim, later, that it did not make that request. As a result an OPES | claim, later, that it did not make that request. As a result an OPES | |||
| entity may be held liable for unauthorized changes to the data flow, | entity may be held liable for unauthorized changes to the data flow, | |||
| or will be unable to receive compensation for a service. | or will be unable to receive compensation for a service. | |||
| There SHOULD be a clear request that this service is required and | There should be a clear request that this service is required and | |||
| there SHOULD be a clear course of action on the behalf of all | there should be a clear course of action on the behalf of all | |||
| parties. This action SHOULD have a request, and SHOULD have an | parties. This action should have a request, and should have an | |||
| action, and SHOULD have a means of repudiation of the request, and | action, and should have a means of repudiation of the request, and | |||
| SHOULD have a means to specify the effect of the action. | should have a means to specify the effect of the action. | |||
| 3.4 Inconsistent privacy policy | 3.4 Inconsistent privacy policy | |||
| The OPES entities may have privacy policies that are not consistent | The OPES entities may have privacy policies that are not consistent | |||
| with the data consumer application or content provider application. | with the data consumer application or content provider application. | |||
| Privacy related problems may be further complicated if OPES entities, | Privacy related problems may be further complicated if OPES entities, | |||
| content providers and end users belong to different jurisdictions | content providers and end users belong to different jurisdictions | |||
| with different requirements and different levels of legal protection. | with different requirements and different levels of legal protection. | |||
| As a result the end user may not be aware that he or she does not | As a result the end user may not be aware that he or she does not | |||
| skipping to change at page 20, line 7 ¶ | skipping to change at page 20, line 7 ¶ | |||
| The limited permissions granted above are perpetual and will not be | The limited permissions granted above are perpetual and will not be | |||
| revoked by the Internet Society or its successors or assignees. | revoked by the Internet Society or its successors or assignees. | |||
| This document and the information contained herein is provided on an | This document and the information contained herein is provided on an | |||
| "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING | "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING | |||
| TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING | TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING | |||
| BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION | BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION | |||
| HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF | HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF | |||
| MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | |||
| Acknowledgement | Acknowledgment | |||
| Funding for the RFC Editor function is currently provided by the | Funding for the RFC Editor function is currently provided by the | |||
| Internet Society. | Internet Society. | |||
| End of changes. 9 change blocks. | ||||
| 40 lines changed or deleted | 18 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||