Security Threats and Security Requirements for the Access Node Control Protocol (ANCP)
RFC 5713
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2018-12-20
|
08 | (System) | Received changes through RFC Editor sync (changed abstract to 'The Access Node Control Protocol (ANCP) aims to communicate Quality of Service (QoS)-related, service-related, and subscriber-related … Received changes through RFC Editor sync (changed abstract to 'The Access Node Control Protocol (ANCP) aims to communicate Quality of Service (QoS)-related, service-related, and subscriber-related configurations and operations between a Network Access Server (NAS) and an Access Node (e.g., a Digital Subscriber Line Access Multiplexer (DSLAM)). The main goal of this protocol is to allow the NAS to configure, manage, and control access equipment, including the ability for the Access Nodes to report information to the NAS. This present document investigates security threats that all ANCP nodes could encounter. This document develops a threat model for ANCP security, with the aim of deciding which security functions are required. Based on this, security requirements regarding the Access Node Control Protocol are defined. This document is not an Internet Standards Track specification; it is published for informational purposes.') |
2015-10-14
|
08 | (System) | Notify list changed from ancp-chairs@ietf.org, draft-ietf-ancp-security-threats@ietf.org to (None) |
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Dan Romascanu |
2010-01-19
|
08 | Cindy Morgan | State Changes to RFC Published from RFC Ed Queue by Cindy Morgan |
2010-01-19
|
08 | Cindy Morgan | [Note]: 'RFC 5713' added by Cindy Morgan |
2010-01-14
|
08 | (System) | RFC published |
2009-10-16
|
08 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2009-10-15
|
08 | (System) | IANA Action state changed to No IC from In Progress |
2009-10-15
|
08 | (System) | IANA Action state changed to In Progress |
2009-10-15
|
08 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2009-10-15
|
08 | Cindy Morgan | IESG has approved the document |
2009-10-15
|
08 | Cindy Morgan | Closed "Approve" ballot |
2009-10-14
|
08 | Dan Romascanu | [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu |
2009-07-09
|
08 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2009-07-09
|
08 | (System) | New version available: draft-ietf-ancp-security-threats-08.txt |
2009-07-03
|
08 | (System) | Removed from agenda for telechat - 2009-07-02 |
2009-07-02
|
08 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
2009-07-02
|
08 | Tim Polk | [Ballot comment] In section 3, first paragraph after the list of components: The threat model and the security requirments in this draft consider this … [Ballot comment] In section 3, first paragraph after the list of components: The threat model and the security requirments in this draft consider this later case. s/later/latter/ In section 4, the document identifies three classes of attacks, but bullet three seems to identify two overlapping classes: o attacks to gain profit for the attacker (e.g., by modifying the QoS settings). Also, through replaying old packets, of another privileged client for instance, an attacker can attempt to configure a better QoS profile on its own DSL line increasing its own benefit. This is fine if there are no attacks that gain profit which do not involve modifying the QoS settings. Are the authors confident that there are 3 rather than 4 classes? |
2009-07-02
|
08 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk |
2009-07-02
|
08 | Dan Romascanu | [Ballot discuss] The threat analysis and the resulting requirements do not cover any manageability aspects (I am not including AAA here). However the ANCP framework … [Ballot discuss] The threat analysis and the resulting requirements do not cover any manageability aspects (I am not including AAA here). However the ANCP framework and WG charter include a MIB module, which can create by itself diclosure and mis-configuration related threats if the management channeld are not secured properly. I would expect the analysis to take this into consideration, and resulting requirements related to configuring and monitoring ANCP by management protocols to be added. |
2009-07-02
|
08 | Dan Romascanu | [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu |
2009-07-01
|
08 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
2009-07-01
|
08 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2009-07-01
|
08 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel |
2009-06-30
|
08 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2009-06-30
|
08 | Tim Polk | [Ballot comment] In section 3, first paragraph after the list of components: The threat model and the security requirments in this draft consider this … [Ballot comment] In section 3, first paragraph after the list of components: The threat model and the security requirments in this draft consider this later case. s/later/latter/ In section 4, the document identifies three classes of attacks, but bullet three seems to identify two overlapping classes: o attacks to gain profit for the attacker (e.g., by modifying the QoS settings). Also, through replaying old packets, of another privileged client for instance, an attacker can attempt to configure a better QoS profile on its own DSL line increasing its own benefit. This is fine if there are no attacks that gain profit which do not involve modifying the QoS settings. Are the authors confident that there are 3 rather than 4 classes? |
2009-06-30
|
08 | Ralph Droms | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ralph Droms |
2009-06-30
|
08 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2009-06-29
|
08 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2009-06-22
|
08 | Ralph Droms | Placed on agenda for telechat - 2009-07-02 by Ralph Droms |
2009-06-22
|
08 | Ralph Droms | [Note]: 'Matthew Bocci (matthew.bocci@alcatel-lucent.com) is the document shepherd.' added by Ralph Droms |
2009-06-22
|
08 | Ralph Droms | [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms |
2009-06-22
|
08 | Ralph Droms | Ballot has been issued by Ralph Droms |
2009-06-22
|
08 | Ralph Droms | Created "Approve" ballot |
2009-06-22
|
08 | Michelle Cotton | IANA Last Call Comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2009-06-16
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Ran Canetti |
2009-06-16
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Ran Canetti |
2009-06-15
|
08 | Cindy Morgan | [Note]: 'Matthew Bocci (matthew.bocci@alcatel-lucent.com) is the document shepherd.' added by Cindy Morgan |
2009-06-15
|
08 | Amy Vezza | Last call sent |
2009-06-15
|
08 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2009-06-15
|
08 | Ralph Droms | State Changes to Last Call Requested from AD Evaluation by Ralph Droms |
2009-06-15
|
08 | Ralph Droms | Last Call was requested by Ralph Droms |
2009-06-15
|
08 | (System) | Ballot writeup text was added |
2009-06-15
|
08 | (System) | Last call text was added |
2009-06-15
|
08 | (System) | Ballot approval text was added |
2009-06-15
|
08 | Ralph Droms | State Changes to AD Evaluation from Publication Requested by Ralph Droms |
2009-06-15
|
08 | Ralph Droms | Updated proto shepherd doc Document Shepard Write-Up (1.a) Who is the Document Shepherd for this document? Has the … Updated proto shepherd doc Document Shepard Write-Up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Matthew Bocci (matthew.bocci@alcatel-lucent.com) Yes, I have reviewed the document and I believe it is ready for ? forwading to the IESG. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes, the document has received adequate review. The document ? received in depth review from five reviewers nominated by the ? WG, as well as comments during WG last call. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No, although as it is a security threats analysis, close attention? from the Security ADs would be appropriate. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No specific concerns. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I am comfortable that the document represents WG consensus and has? been reviewed by a reasonable number of active WG aprticipants. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) None indicated. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? The document uses a per-5378 boilerplate because it was submitted prior? to the change in boilerplate requirements. This is an informational security threats analysis, so was not subject? to MIB doctor or other reviews. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Yes, the references are split appropriately. There is one reference? to the ANCP framework, that will need to be updated as both documents should be published together. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The IANA considerations section exists and there are no requests for IANA allocations. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? There are no sections that use a formal language. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Access Node Control Protocol (ANCP) aims to communicate QoS- related, service-related and subscriber-related configurations and operations between a Network Access Server (NAS) and an Access Node (e.g., a Digital Subscriber Line Access Multiplexer (DSLAM)). The main goal of this protocol is to allow the NAS to configure, manage and control access equipments including the ability for the access nodes to report information to the NAS. This document investigates security threats that all ANCP nodes could encounter. This document develops a threat model for ANCP security aiming to decide which security functions are required. Based on this, security requirements regarding the Access Node Control Protocol are defined. This document is a product of the ANCP working group. This document is INFORMATIONAL. Working Group Summary The origin of the working group can be traced back to the WT-147 "Layer 2 Control Protocol" document from the Broadband Forum. The ANCP protocol being developed in the ANCP working group as a result of that document is typically used in the access and aggregation portions of a broadband access network, and also in inter-provider environments. It was therefore decided as a part of the creation of the working group to document the security threats that this protocol could encounter to ensure that they were fully accounted for in the protocol design and that operators deploying the protocol were aware of any security threats. This draft is the result of that work. Document Quality The document is a security threats analysis, with the protocol being specified in a separate WG draft (draft-ietf-ancp-protocol). The latter has a number of implementations. |
2009-06-04
|
08 | Ralph Droms | draft-ietf-ancp-security-threats-07.txt Document Shepard Write-Up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally … draft-ietf-ancp-security-threats-07.txt Document Shepard Write-Up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Matthew Bocci (matthew.bocci@alcatel-lucent.com) Yes, I have reviewed the document and I believe it is ready for ? forwading to the IESG. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes, the document has received adequate review. The document ? received in depth review from five reviewers nominated by the ? WG, as well as comments during WG last call. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No, although as it is a security threats analysis, close attention? from the Security ADs would be appropriate. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No specific concerns. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I am comfortable that the document represents WG consensus and has? been reviewed by a reasonable number of active WG aprticipants. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) None indicated. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? The document uses a per-5378 boilerplate because it was submitted prior? to the change in boilerplate requirements. This is an informational security threats analysis, so was not subject? to MIB doctor or other reviews. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Yes, the references are split appropriately. There is one reference? to the ANCP framework, that will need to be updated as both documents should be published together. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The IANA considerations section exists and there are no requests for IANA allocations. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? There are no sections that use a formal language. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: The Access Node Control Protocol (ANCP) aims to communicate QoS- related, service-related and subscriber-related configurations and operations between a Network Access Server (NAS) and an Access Node (e.g., a Digital Subscriber Line Access Multiplexer (DSLAM)). The main goal of this protocol is to allow the NAS to configure, manage and control access equipments including the ability for the access nodes to report information to the NAS. The present document investigates security threats that all ANCP nodes could encounter. This document develops a threat model for ANCP security aiming to decide which security functions are required. Based on this, security requirements regarding the Access Node Control Protocol are defined. This document is a product of the ANCP working group. This document is INFORMATIONAL. |
2009-06-04
|
08 | Ralph Droms | Draft Added by Ralph Droms in state Publication Requested |
2009-03-04
|
07 | (System) | New version available: draft-ietf-ancp-security-threats-07.txt |
2008-10-07
|
06 | (System) | New version available: draft-ietf-ancp-security-threats-06.txt |
2008-04-09
|
05 | (System) | New version available: draft-ietf-ancp-security-threats-05.txt |
2008-04-09
|
04 | (System) | New version available: draft-ietf-ancp-security-threats-04.txt |
2007-10-09
|
03 | (System) | New version available: draft-ietf-ancp-security-threats-03.txt |
2007-07-11
|
02 | (System) | New version available: draft-ietf-ancp-security-threats-02.txt |
2007-06-21
|
01 | (System) | New version available: draft-ietf-ancp-security-threats-01.txt |
2007-01-04
|
00 | (System) | New version available: draft-ietf-ancp-security-threats-00.txt |