Skip to main content

Last Call Review of draft-ietf-pcp-base-
review-ietf-pcp-base-secdir-lc-harkins-2012-03-01-00

Request Review of draft-ietf-pcp-base
Requested revision No specific revision (document currently at 29)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2012-02-28
Requested 2012-02-15
Authors Dan Wing , Stuart Cheshire , Mohamed Boucadair , Reinaldo Penno , Paul Selkirk
I-D last updated 2012-03-01
Completed reviews Secdir Last Call review of -?? by Dan Harkins
Tsvdir Last Call review of -?? by Pasi Sarolahti
Assignment Reviewer Dan Harkins
State Completed
Request Last Call review on draft-ietf-pcp-base by Security Area Directorate Assigned
Completed 2012-03-01
review-ietf-pcp-base-secdir-lc-harkins-2012-03-01-00
  My apologies for the tardiness of this review. The tracker says
it's on the agenda for the next telechat so maybe this isn't completely
useless.

  I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

  This draft describes a simple request/response protocol to create
and manage mappings on upstream devices (like NATs) to control how
incoming packets get forwarded. It defines two threat models (a simple
one and an advanced one) that seem reasonable for the different use
cases. The Security Considerations are well-written and address all
attacks I could think of. The draft is very well-written and complete.

  PCP has a THIRD_PARTY option in which a PCP client can create a
mapping on a PCP server for a different device. This has the potential
for abuse. The implications of this option are mentioned somewhat in
passing in the section that describes the option ("Determining which PCP
clients are authorized to use the THIRD_PARTY Option for which other
hosts is deployment-dependent....A cryptographic authentication and
authorization model is outside the scope of this specification") but
it would be nice if they were addressed a bit more in the Security
Considerations section. It would be nice to see mention of:

  a) what capabilities should a PCP server have to properly address
     authorization of requests that include the THIRD_PARTY option; and,
  b) what are the implications of enabling the THIRD_PARTY option on a
     PCP server? In other words, what does a user need to understand
     before he enables it?

I understand that this is a very tardy request, my apologies again, so I
understand if this comment is not resolved.

  regards,

  Dan.