Skip to main content

Softwire Security Analysis and Requirements
RFC 5619

Revision differences

Document history

Date Rev. By Action
2015-10-14
09 (System) Notify list changed from softwire-chairs@ietf.org, draft-ietf-softwire-security-requirements@ietf.org to (None)
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Pasi Eronen
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
09 (System) post-migration administrative database adjustment to the Yes position for Ralph Droms
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2009-08-24
09 Cindy Morgan State Changes to RFC Published from RFC Ed Queue by Cindy Morgan
2009-08-24
09 Cindy Morgan [Note]: 'RFC 5619' added by Cindy Morgan
2009-08-21
09 (System) RFC published
2009-07-01
09 (System) IANA Action state changed to No IC from In Progress
2009-07-01
09 (System) IANA Action state changed to In Progress
2009-07-01
09 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2009-06-29
09 Cindy Morgan IESG state changed to Approved-announcement sent
2009-06-29
09 Cindy Morgan IESG has approved the document
2009-06-29
09 Cindy Morgan Closed "Approve" ballot
2009-06-25
09 (System) [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2009-06-25
09 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to Yes from No Objection by Ralph Droms
2009-06-12
09 Ralph Droms State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ralph Droms
2009-06-12
09 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms
2009-06-11
09 (System) New version available: draft-ietf-softwire-security-requirements-09.txt
2009-05-28
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-05-28
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-05-22
09 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2009-05-22
09 Pasi Eronen [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen
2009-05-21
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-05-21
08 (System) New version available: draft-ietf-softwire-security-requirements-08.txt
2009-04-10
09 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation - Defer by Amy Vezza
2009-04-09
09 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded by Amy Vezza
2009-04-09
09 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2009-04-09
09 Tim Polk
[Ballot discuss]
This document has a number of issues that should be addressed efore publication.

#1 the document does not clearly explain the scope or …
[Ballot discuss]
This document has a number of issues that should be addressed efore publication.

#1 the document does not clearly explain the scope or goal, or what form the follow-on
work will take...

#2 upper and lower case musts and shoulds are used seemingly interchangably.  Sorting
out the requirements is very difficult imho.

#3 Figure is mislabeled, I think... since the supporting text is all about the SI-SC
authentication model for hubs and spokes

#4 Section 3.4 talks about the "Softwire security protocol" but earlier text implied no mandatory to implement protocol would be specified.  Are these requirements for softwires, or for a new protocol?

[Note: I apologize for the brief nature of this discus.  I will add comments later in the week
to help ensure these issues are actionable...]
2009-04-09
09 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2009-04-08
09 Pasi Eronen
[Ballot discuss]
I have reviewed draft-ietf-softwire-security-requirements-07, and have
a couple of concerns that I'd like to discuss before recommending
approval of the document:

- …
[Ballot discuss]
I have reviewed draft-ietf-softwire-security-requirements-07, and have
a couple of concerns that I'd like to discuss before recommending
approval of the document:

- Section 3 needs to be clearer that there are *two* different (and
incompatible) solutions for securing L2TPv2 with IPsec (see new text
in Section 10 of hs-framework-l2tpv2-12). Some of the details differ,
and the MUSTs etc. need to be aligned with hs-framework-l2tpv2.

- Sections 3.5.4.1 and 3.5.4.2: To me it seems the SPD and PAD entries
for IPv6-over-IPv4 and IPv4-over-IPv6 cases should be identical
(except replacing IPv4 addresses with IPv6 and vice versa) -- but
they're not. Why? (to me the entries in 3.5.4.1 look more
correct than 3.5.4.2 -- at least the SC PAD entry in 3.5.4.2
looks unrealistic, since usually the SC won't know SI_address
beforehand.)

- Section 4.4.2: It seems this isn't fully aligned with
softwire-encaps-ipsec, since it doesn't describe the
use-public-key-crypto-without-PKI approach.

- Section 4.2.2, 3rd paragraph: since softwires are created
dynamically by BGP, the paragraph should clarify that "pre-shared key"
here really means "group key" (same key in all routers), not pairwise
shared keys.
2009-04-08
09 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2009-04-08
09 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-04-07
09 Ralph Droms
[Ballot discuss]
Has this document been reviewed by the Security Directorate?

The attack threat scenarios list in sections 3.3 and 4.3 mostly describe attacks on …
[Ballot discuss]
Has this document been reviewed by the Security Directorate?

The attack threat scenarios list in sections 3.3 and 4.3 mostly describe attacks on individual packets or flows; e.g.:

3.3:  1.  An adversary may try to discover identities by snooping data
      packets.

4.3:  1.  An adversary may try to discover confidential information by
      sniffing softwire packets.

Why is the scenario in 3.4 limited to just identities and not other confidential information?  I would expect that these packet attacks would be the same in both hub-and-spoke and mesh scenarios.

At the same time, I would expect there would be different attack scenarios based on the different security and trust models; for example, in the message exchange between the visited and home AAA services in the case of the hub-and-spoke scenario.
2009-04-07
09 Ralph Droms
[Ballot discuss]
Has this document been reviewed by the Security Directorate?

The attack threat scenarios list in sections 3.4 and 4.3 mostly describe attacks on …
[Ballot discuss]
Has this document been reviewed by the Security Directorate?

The attack threat scenarios list in sections 3.4 and 4.3 mostly describe attacks on individual packets or flows; e.g.:

3.4:  1.  An adversary may try to discover identities by snooping data
      packets.

4.3:  1.  An adversary may try to discover confidential information by
      sniffing softwire packets.

Why is the scenario in 3.4 limited to just identities and not other confidential information?  I would expect that these packet attacks would be the same in both hub-and-spoke and mesh scenarios.

At the same time, I would expect there would be different attack scenarios based on the different security and trust models; for example, in the message exchange between the visited and home AAA services in the case of the hub-and-spoke scenario.
2009-04-07
09 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms
2009-04-07
09 Ralph Droms Responsible AD has been changed to Ralph Droms from Mark Townsley
2009-04-06
09 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2009-04-04
09 Russ Housley [Ballot discuss]
After the Gen-ART Review by Christian Vogt, the authors agreed to make
  changes to the document.  These changes have not appeared yet.
2009-04-04
09 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2009-04-02
09 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel
2009-03-31
09 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2009-03-13
09 (System) Removed from agenda for telechat - 2009-03-12
2009-03-12
09 Pasi Eronen State Changes to IESG Evaluation - Defer from Waiting for AD Go-Ahead by Pasi Eronen
2009-03-12
09 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2009-03-11
09 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2009-03-11
09 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-03-11
09 David Ward [Ballot Position Update] New position, Recuse, has been recorded by David Ward
2009-03-11
09 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2009-03-11
09 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2009-03-11
09 Lars Eggert
[Ballot comment]
WG history or details are not typically relevant for RFCs. Rephrase the
  introduction to make this about the technology rather than the …
[Ballot comment]
WG history or details are not typically relevant for RFCs. Rephrase the
  introduction to make this about the technology rather than the WG.
2009-03-11
09 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2009-03-10
07 (System) New version available: draft-ietf-softwire-security-requirements-07.txt
2009-03-02
09 Mark Townsley Placed on agenda for telechat - 2009-03-12 by Mark Townsley
2009-02-23
09 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-02-19
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Sam Weiler
2009-02-19
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Sam Weiler
2009-02-12
09 Amanda Baber IANA Last Call comments:

As described in the IANA Considerations section, we understand this document to have NO IANA Actions.
2009-02-09
09 Amy Vezza Last call sent
2009-02-09
09 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2009-02-06
09 Mark Townsley [Ballot Position Update] New position, Yes, has been recorded for Mark Townsley
2009-02-06
09 Mark Townsley Ballot has been issued by Mark Townsley
2009-02-06
09 Mark Townsley Created "Approve" ballot
2009-02-06
09 Mark Townsley Last Call was requested by Mark Townsley
2009-02-06
09 Mark Townsley State Changes to Last Call Requested from AD Evaluation by Mark Townsley
2009-02-06
09 (System) Ballot writeup text was added
2009-02-06
09 (System) Last call text was added
2009-02-06
09 (System) Ballot approval text was added
2008-11-13
09 Mark Townsley State Changes to AD Evaluation from Publication Requested by Mark Townsley
2008-10-27
09 Cindy Morgan
draft-ietf-softwire-security-requirements-06

PROTO questionnaire for:
prepared by: Dave Ward (dward@cisco.com)

1.a) Have the chairs personally reviewed this version of the Internet
Draft (ID), and …
draft-ietf-softwire-security-requirements-06

PROTO questionnaire for:
prepared by: Dave Ward (dward@cisco.com)

1.a) Have the chairs personally reviewed this version of the Internet
Draft (ID), and in particular, do they believe this ID is ready
to forward to the IESG for publication? Which chair is the WG
Chair Shepherd for this document?

Dave Ward

1.c) Do you have concerns that the document needs more review from a
particular (broader) perspective (e.g., security, operational
complexity, someone familiar with AAA, internationalization,
XML, etc.)?

No.

1.d) Do you have any specific concerns/issues with this document
that
you believe the ADs and/or IESG should be aware of? For
example, perhaps you are uncomfortable with certain parts of
the
document, or have concerns whether there really is a need for
it. In any event, if your issues have been discussed in the WG
and the WG has indicated it that it still wishes to advance the
document, detail those concerns in the write-up.

No.

1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

There is strong WG consensus behind this document and no one that has
expressed concerns about its progression.

1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in
separate email to the Responsible Area Director. (It should be
separate email because this questionnaire will be entered into
the tracker).
No.

1.g) Have the chairs verified that the document checks out against
all the ID nits? (see http://www.ietf.org/ID-Checklist.html).
Boilerplate checks are not enough; this check needs to be
thorough.

Yes.

1.h) Has the document split its references into normative and
informative? Are there normative references to IDs, where the
IDs are not also ready for advancement or are otherwise in an
unclear state? The RFC Editor will not publish an RFC with
normative references to IDs (will delay the publication until
all such IDs are also ready for RFC publicatioin). If the
normative references are behind, what is the strategy for their
completion? On a related matter, are there normative
references
that are downward references, as described in BCP 97, RFC 3967
RFC 3967 [RFC3967]? Listing these supports the Area
Director in
the Last Call downref procedure specified in RFC 3967.

The references are split into normative and informative.


Protocol write-up for:
by Dave Ward, dward@cisco.com

Technical Summary

This document describes the security guidelines for the softwire
"Hubs
and Spokes" and "Mesh" solutions. Together with the discussion of
the
softwire deployment scenarios, the vulnerability to the security
attacks
is analyzed to provide the security protection mechanism such as
authentication, integrity and confidentiality to the softwire
control
and data packets.

Working Group Summary

The SOFTWIRE WG supports the development and advancement of this
document.


Protocol Quality

This document was thoroughly reviewed by WG chairs and WG members,
including those with expertise in security, IPv4 to IPv6
transitions and
interworking.

Dave Ward is the WG chair shepherd. Mark Townsley is the
responsible Area
director.
2008-10-27
09 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2008-02-25
06 (System) New version available: draft-ietf-softwire-security-requirements-06.txt
2007-12-24
05 (System) New version available: draft-ietf-softwire-security-requirements-05.txt
2007-11-20
04 (System) New version available: draft-ietf-softwire-security-requirements-04.txt
2007-07-12
03 (System) New version available: draft-ietf-softwire-security-requirements-03.txt
2007-03-12
02 (System) New version available: draft-ietf-softwire-security-requirements-02.txt
2006-10-23
01 (System) New version available: draft-ietf-softwire-security-requirements-01.txt
2006-06-21
00 (System) New version available: draft-ietf-softwire-security-requirements-00.txt