Telechat Review of draft-ietf-anima-constrained-join-proxy-10
review-ietf-anima-constrained-join-proxy-10-opsdir-telechat-schoenwaelder-2022-06-13-00
review-ietf-anima-constrained-join-proxy-10-opsdir-telechat-schoenwaelder-2022-06-13-00
Thanks for considering my comments.
I am still struggling with the fact that the constrained Join
Proxy does allow attackers to send packets to arbitrary link-local
endpoints. The new security considerations text gives this advice:
If such scenario needs to be avoided, the constrained Join Proxy MUST
encrypt the CBOR array using a locally generated symmetric key. The
Registrar is not able to examine the encrypted result, but does not
need to. The Registrar stores the encrypted header in the return
packet without modifications. The constrained Join Proxy can decrypt
the contents to route the message to the right destination.
The usage of MUST surely looks promising, but then protection
against this kind of attacks still is entirely optional ("if such
scenario needs to be avoided"). This relates to the other main
concern I had, namely that it is not particularly clear what is
required to be implemented as an interoperable baseline so that
at deployment time appropriate decisions can be taken.