Softwire Security Analysis and Requirements
RFC 5619
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2015-10-14
|
09 | (System) | Notify list changed from softwire-chairs@ietf.org, draft-ietf-softwire-security-requirements@ietf.org to (None) |
|
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the No Objection position for Pasi Eronen |
|
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
|
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the Yes position for Ralph Droms |
|
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
|
2009-08-24
|
09 | Cindy Morgan | State Changes to RFC Published from RFC Ed Queue by Cindy Morgan |
|
2009-08-24
|
09 | Cindy Morgan | [Note]: 'RFC 5619' added by Cindy Morgan |
|
2009-08-21
|
09 | (System) | RFC published |
|
2009-07-01
|
09 | (System) | IANA Action state changed to No IC from In Progress |
|
2009-07-01
|
09 | (System) | IANA Action state changed to In Progress |
|
2009-07-01
|
09 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
|
2009-06-29
|
09 | Cindy Morgan | IESG state changed to Approved-announcement sent |
|
2009-06-29
|
09 | Cindy Morgan | IESG has approved the document |
|
2009-06-29
|
09 | Cindy Morgan | Closed "Approve" ballot |
|
2009-06-25
|
09 | (System) | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
|
2009-06-25
|
09 | Ralph Droms | [Ballot Position Update] Position for Ralph Droms has been changed to Yes from No Objection by Ralph Droms |
|
2009-06-12
|
09 | Ralph Droms | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ralph Droms |
|
2009-06-12
|
09 | Ralph Droms | [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms |
|
2009-06-11
|
09 | (System) | New version available: draft-ietf-softwire-security-requirements-09.txt |
|
2009-05-28
|
09 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
|
2009-05-28
|
09 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
|
2009-05-22
|
09 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
|
2009-05-22
|
09 | Pasi Eronen | [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen |
|
2009-05-21
|
09 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
|
2009-05-21
|
08 | (System) | New version available: draft-ietf-softwire-security-requirements-08.txt |
|
2009-04-10
|
09 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation - Defer by Amy Vezza |
|
2009-04-09
|
09 | Amy Vezza | [Ballot Position Update] New position, No Objection, has been recorded by Amy Vezza |
|
2009-04-09
|
09 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
|
2009-04-09
|
09 | Tim Polk | [Ballot discuss] This document has a number of issues that should be addressed efore publication. #1 the document does not clearly explain the scope or … [Ballot discuss] This document has a number of issues that should be addressed efore publication. #1 the document does not clearly explain the scope or goal, or what form the follow-on work will take... #2 upper and lower case musts and shoulds are used seemingly interchangably. Sorting out the requirements is very difficult imho. #3 Figure is mislabeled, I think... since the supporting text is all about the SI-SC authentication model for hubs and spokes #4 Section 3.4 talks about the "Softwire security protocol" but earlier text implied no mandatory to implement protocol would be specified. Are these requirements for softwires, or for a new protocol? [Note: I apologize for the brief nature of this discus. I will add comments later in the week to help ensure these issues are actionable...] |
|
2009-04-09
|
09 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
|
2009-04-08
|
09 | Pasi Eronen | [Ballot discuss] I have reviewed draft-ietf-softwire-security-requirements-07, and have a couple of concerns that I'd like to discuss before recommending approval of the document: - … [Ballot discuss] I have reviewed draft-ietf-softwire-security-requirements-07, and have a couple of concerns that I'd like to discuss before recommending approval of the document: - Section 3 needs to be clearer that there are *two* different (and incompatible) solutions for securing L2TPv2 with IPsec (see new text in Section 10 of hs-framework-l2tpv2-12). Some of the details differ, and the MUSTs etc. need to be aligned with hs-framework-l2tpv2. - Sections 3.5.4.1 and 3.5.4.2: To me it seems the SPD and PAD entries for IPv6-over-IPv4 and IPv4-over-IPv6 cases should be identical (except replacing IPv4 addresses with IPv6 and vice versa) -- but they're not. Why? (to me the entries in 3.5.4.1 look more correct than 3.5.4.2 -- at least the SC PAD entry in 3.5.4.2 looks unrealistic, since usually the SC won't know SI_address beforehand.) - Section 4.4.2: It seems this isn't fully aligned with softwire-encaps-ipsec, since it doesn't describe the use-public-key-crypto-without-PKI approach. - Section 4.2.2, 3rd paragraph: since softwires are created dynamically by BGP, the paragraph should clarify that "pre-shared key" here really means "group key" (same key in all routers), not pairwise shared keys. |
|
2009-04-08
|
09 | Pasi Eronen | [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen |
|
2009-04-08
|
09 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
|
2009-04-07
|
09 | Ralph Droms | [Ballot discuss] Has this document been reviewed by the Security Directorate? The attack threat scenarios list in sections 3.3 and 4.3 mostly describe attacks on … [Ballot discuss] Has this document been reviewed by the Security Directorate? The attack threat scenarios list in sections 3.3 and 4.3 mostly describe attacks on individual packets or flows; e.g.: 3.3: 1. An adversary may try to discover identities by snooping data packets. 4.3: 1. An adversary may try to discover confidential information by sniffing softwire packets. Why is the scenario in 3.4 limited to just identities and not other confidential information? I would expect that these packet attacks would be the same in both hub-and-spoke and mesh scenarios. At the same time, I would expect there would be different attack scenarios based on the different security and trust models; for example, in the message exchange between the visited and home AAA services in the case of the hub-and-spoke scenario. |
|
2009-04-07
|
09 | Ralph Droms | [Ballot discuss] Has this document been reviewed by the Security Directorate? The attack threat scenarios list in sections 3.4 and 4.3 mostly describe attacks on … [Ballot discuss] Has this document been reviewed by the Security Directorate? The attack threat scenarios list in sections 3.4 and 4.3 mostly describe attacks on individual packets or flows; e.g.: 3.4: 1. An adversary may try to discover identities by snooping data packets. 4.3: 1. An adversary may try to discover confidential information by sniffing softwire packets. Why is the scenario in 3.4 limited to just identities and not other confidential information? I would expect that these packet attacks would be the same in both hub-and-spoke and mesh scenarios. At the same time, I would expect there would be different attack scenarios based on the different security and trust models; for example, in the message exchange between the visited and home AAA services in the case of the hub-and-spoke scenario. |
|
2009-04-07
|
09 | Ralph Droms | [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms |
|
2009-04-07
|
09 | Ralph Droms | Responsible AD has been changed to Ralph Droms from Mark Townsley |
|
2009-04-06
|
09 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
|
2009-04-04
|
09 | Russ Housley | [Ballot discuss] After the Gen-ART Review by Christian Vogt, the authors agreed to make changes to the document. These changes have not appeared yet. |
|
2009-04-04
|
09 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
|
2009-04-02
|
09 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel |
|
2009-03-31
|
09 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
|
2009-03-13
|
09 | (System) | Removed from agenda for telechat - 2009-03-12 |
|
2009-03-12
|
09 | Pasi Eronen | State Changes to IESG Evaluation - Defer from Waiting for AD Go-Ahead by Pasi Eronen |
|
2009-03-12
|
09 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
|
2009-03-11
|
09 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
|
2009-03-11
|
09 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
|
2009-03-11
|
09 | David Ward | [Ballot Position Update] New position, Recuse, has been recorded by David Ward |
|
2009-03-11
|
09 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
|
2009-03-11
|
09 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
|
2009-03-11
|
09 | Lars Eggert | [Ballot comment] WG history or details are not typically relevant for RFCs. Rephrase the introduction to make this about the technology rather than the … [Ballot comment] WG history or details are not typically relevant for RFCs. Rephrase the introduction to make this about the technology rather than the WG. |
|
2009-03-11
|
09 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
|
2009-03-10
|
07 | (System) | New version available: draft-ietf-softwire-security-requirements-07.txt |
|
2009-03-02
|
09 | Mark Townsley | Placed on agenda for telechat - 2009-03-12 by Mark Townsley |
|
2009-02-23
|
09 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
|
2009-02-19
|
09 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Sam Weiler |
|
2009-02-19
|
09 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Sam Weiler |
|
2009-02-12
|
09 | Amanda Baber | IANA Last Call comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
|
2009-02-09
|
09 | Amy Vezza | Last call sent |
|
2009-02-09
|
09 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
|
2009-02-06
|
09 | Mark Townsley | [Ballot Position Update] New position, Yes, has been recorded for Mark Townsley |
|
2009-02-06
|
09 | Mark Townsley | Ballot has been issued by Mark Townsley |
|
2009-02-06
|
09 | Mark Townsley | Created "Approve" ballot |
|
2009-02-06
|
09 | Mark Townsley | Last Call was requested by Mark Townsley |
|
2009-02-06
|
09 | Mark Townsley | State Changes to Last Call Requested from AD Evaluation by Mark Townsley |
|
2009-02-06
|
09 | (System) | Ballot writeup text was added |
|
2009-02-06
|
09 | (System) | Last call text was added |
|
2009-02-06
|
09 | (System) | Ballot approval text was added |
|
2008-11-13
|
09 | Mark Townsley | State Changes to AD Evaluation from Publication Requested by Mark Townsley |
|
2008-10-27
|
09 | Cindy Morgan | draft-ietf-softwire-security-requirements-06 PROTO questionnaire for: prepared by: Dave Ward (dward@cisco.com) 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and … draft-ietf-softwire-security-requirements-06 PROTO questionnaire for: prepared by: Dave Ward (dward@cisco.com) 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and in particular, do they believe this ID is ready to forward to the IESG for publication? Which chair is the WG Chair Shepherd for this document? Dave Ward 1.c) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, internationalization, XML, etc.)? No. 1.d) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or have concerns whether there really is a need for it. In any event, if your issues have been discussed in the WG and the WG has indicated it that it still wishes to advance the document, detail those concerns in the write-up. No. 1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is strong WG consensus behind this document and no one that has expressed concerns about its progression. 1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email to the Responsible Area Director. (It should be separate email because this questionnaire will be entered into the tracker). No. 1.g) Have the chairs verified that the document checks out against all the ID nits? (see http://www.ietf.org/ID-Checklist.html). Boilerplate checks are not enough; this check needs to be thorough. Yes. 1.h) Has the document split its references into normative and informative? Are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? The RFC Editor will not publish an RFC with normative references to IDs (will delay the publication until all such IDs are also ready for RFC publicatioin). If the normative references are behind, what is the strategy for their completion? On a related matter, are there normative references that are downward references, as described in BCP 97, RFC 3967 RFC 3967 [RFC3967]? Listing these supports the Area Director in the Last Call downref procedure specified in RFC 3967. The references are split into normative and informative. Protocol write-up for: by Dave Ward, dward@cisco.com Technical Summary This document describes the security guidelines for the softwire "Hubs and Spokes" and "Mesh" solutions. Together with the discussion of the softwire deployment scenarios, the vulnerability to the security attacks is analyzed to provide the security protection mechanism such as authentication, integrity and confidentiality to the softwire control and data packets. Working Group Summary The SOFTWIRE WG supports the development and advancement of this document. Protocol Quality This document was thoroughly reviewed by WG chairs and WG members, including those with expertise in security, IPv4 to IPv6 transitions and interworking. Dave Ward is the WG chair shepherd. Mark Townsley is the responsible Area director. |
|
2008-10-27
|
09 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
|
2008-02-25
|
06 | (System) | New version available: draft-ietf-softwire-security-requirements-06.txt |
|
2007-12-24
|
05 | (System) | New version available: draft-ietf-softwire-security-requirements-05.txt |
|
2007-11-20
|
04 | (System) | New version available: draft-ietf-softwire-security-requirements-04.txt |
|
2007-07-12
|
03 | (System) | New version available: draft-ietf-softwire-security-requirements-03.txt |
|
2007-03-12
|
02 | (System) | New version available: draft-ietf-softwire-security-requirements-02.txt |
|
2006-10-23
|
01 | (System) | New version available: draft-ietf-softwire-security-requirements-01.txt |
|
2006-06-21
|
00 | (System) | New version available: draft-ietf-softwire-security-requirements-00.txt |