Skip to main content

Last Call Review of draft-ietf-core-observe-14
review-ietf-core-observe-14-secdir-lc-gellert-2014-08-28-00

Request Review of draft-ietf-core-observe
Requested revision No specific revision (document currently at 16)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2014-08-19
Requested 2014-08-01
Authors Klaus Hartke
I-D last updated 2014-08-28
Completed reviews Genart Last Call review of -14 by Meral Shirazipour (diff)
Genart Telechat review of -14 by Meral Shirazipour (diff)
Secdir Last Call review of -14 by Dorothy Gellert (diff)
Assignment Reviewer Dorothy Gellert
State Completed Snapshot
Review review-ietf-core-observe-14-secdir-lc-gellert-2014-08-28
Reviewed revision 14 (document currently at 16)
Result Has Issues
Completed 2014-08-28
review-ietf-core-observe-14-secdir-lc-gellert-2014-08-28-00

I have reviewed this document as part of the security directorate's

ongoing effort to review all IETF documents being processed by the IESG.

These comments were written primarily for the benefit of the security

area directors. Document editors and WG chairs should treat these

comments just like any other last call comments.

This Standards Track draft is a best effort protocol extension to CoAP to
enable clients to retrieve a representation of a resource and keep this
representation updated by its server for a period of time.

The security considerations section does exist and discloses the following
threats and suggests ways to mitigate these attacks.

- an increase in amplification attacks, and requires the server to limit
notifications without client authentication.

- acknowledgements may be spoofed if confirmable messages are predictable.

- server may want access control to prevent resource exhaustion attacks,

- intermediaries may create loops..

Section 1.3, describes 2 issues where a client might be assuming an old state.
This issue could be considered a security threat depending on the sensitivity
of that resource.  You might
 want to flag this also in the security considerations section.

This protocol is intended to be best effort only, as noted in the abstract
section.    This should be also emphasized in the security section.

In general, very nice thorough analysis of all the race conditions inherent in
a best effort only protocol syncing state between client and server.

As an editorial comment, please expand the first occurrence of CoAP

Best Regards,

Dorothy Gellert

Silver Spring Networks

Director, Standards and Technology

E



dgellert at silverspringnet.com

O



+1 650 839 4378

C

+1
 650 556-5994