Skip to main content

Telechat Review of draft-ietf-anima-constrained-join-proxy-10
review-ietf-anima-constrained-join-proxy-10-opsdir-telechat-schoenwaelder-2022-06-13-00

Request Review of draft-ietf-anima-constrained-join-proxy
Requested revision No specific revision (document currently at 18)
Type Telechat Review
Team Ops Directorate (opsdir)
Deadline 2022-06-14
Requested 2022-06-06
Authors Esko Dijk , Michael Richardson , Peter Van der Stok , Panos Kampanakis
I-D last updated 2025-10-19 (Latest revision 2025-10-19)
Completed reviews Iotdir IETF Last Call review of -14 by Russ Housley (diff)
Secdir IETF Last Call review of -14 by Mališa Vučinić (diff)
Genart IETF Last Call review of -14 by Ines Robles (diff)
Opsdir IETF Last Call review of -14 by Jürgen Schönwälder (diff)
Iotdir IETF Last Call review of -05 by Russ Housley (diff)
Tsvart IETF Last Call review of -10 by Spencer Dawkins (diff)
Opsdir IETF Last Call review of -09 by Jürgen Schönwälder (diff)
Secdir IETF Last Call review of -09 by Mališa Vučinić (diff)
Genart IETF Last Call review of -09 by Ines Robles (diff)
Artart IETF Last Call review of -10 by Rich Salz (diff)
Opsdir Telechat review of -10 by Jürgen Schönwälder (diff)
Assignment Reviewer Jürgen Schönwälder
State Completed
Request Telechat review on draft-ietf-anima-constrained-join-proxy by Ops Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/ops-dir/-Nb-TA9lEaHvbxHH66xPBOYVxPg
Reviewed revision 10 (document currently at 18)
Result Has issues
Completed 2022-06-13
review-ietf-anima-constrained-join-proxy-10-opsdir-telechat-schoenwaelder-2022-06-13-00
Thanks for considering my comments.

I am still struggling with the fact that the constrained Join
Proxy does allow attackers to send packets to arbitrary link-local
endpoints. The new security considerations text gives this advice:

   If such scenario needs to be avoided, the constrained Join Proxy MUST
   encrypt the CBOR array using a locally generated symmetric key.  The
   Registrar is not able to examine the encrypted result, but does not
   need to.  The Registrar stores the encrypted header in the return
   packet without modifications.  The constrained Join Proxy can decrypt
   the contents to route the message to the right destination.

The usage of MUST surely looks promising, but then protection
against this kind of attacks still is entirely optional ("if such
scenario needs to be avoided"). This relates to the other main
concern I had, namely that it is not particularly clear what is
required to be implemented as an interoperable baseline so that
at deployment time appropriate decisions can be taken.