Skip to content

Latest commit

 

History

History
126 lines (108 loc) · 5.68 KB

examples.md

File metadata and controls

126 lines (108 loc) · 5.68 KB

Examples

draft-ietf-idr-te-pm-bgp-13

This is an example of security considerations by reference

   Procedures and protocol extensions defined in this document do not
   affect the BGP security model.  See the 'Security Considerations'
   section of [RFC4271] for a discussion of BGP security.  Also refer to
   [RFC4272] and [RFC6952] for analysis of security issues for BGP.
  • RFC 4271 is BGP. The model may be the same, but this is new information being sent out.
   The TLVs introduced in this document are used to propagate IGP
   defined information ([RFC7810] and [RFC7471].)  These TLVs represent
   the state and resources availability of the IGP link.  The IGP
   instances originating these TLVs are assumed to have all the required
   security and authentication mechanism (as described in [RFC7810] and
   [RFC7471]) in order to prevent any security issue when propagating
   the TLVs into BGP-LS.
  • RFC 7810 and 7471 describe sending TE information in IS-IS and OSPF respectively.
  • But IS-IS and OSPF run in different environments than BGP.
    • IS-IS and OSPF run in a local network, while BGP is the Internet
  • It is not clear that information that is fine to send in OSPF is fine to send in BGP
    • The Security Considerations section should specifically say this.

🐑

draft-ietf-lamps-pkix-shake-08

This is an example of irrelevant information

   The SHAKEs are deterministic functions.  Like any other deterministic
   function, executing multiple times with the same input will produce
   the same output.  Therefore, users should not expect unrelated
   outputs (with the same or different output lengths) from running a
   SHAKE function with the same input multiple times.  The shorter of
   any two outputs produced from a SHAKE with the same input is a prefix
   of the longer one.  It is a similar situation as truncating a 512-bit
   output of SHA-512 by taking its 256 left-most bits.  These 256 left-
   most bits are a prefix of the 512-bit output.
  • All true, but not really related to using the SHAKE functions in PKIX.
   When using ECDSA with SHAKEs, the ECDSA curve order SHOULD be chosen
   in line with the SHAKE output length.  NIST has defined appropriate
   use of the hash functions in terms of the algorithm strengths and
   expected time frames for secure use in Special Publications (SPs)
   [SP800-78-4] and [SP800-107].  These documents can be used as guides
   to choose appropriate key sizes for various security scenarios.  In
   the context of this document id-ecdsa-with-shake128 is RECOMMENDED
   for curves with group order of 256-bits. id-ecdsa-with-shake256 is
   RECOMMENDED for curves with group order of 384-bits or more.
  • This is actually quite good. It instructs the user or (more likely) future document authors about where to use the SHAKE functions and with what curves they should be combined.
  • This is not necessary for a fully compliant implementation, but it helps with where this function is to be used.

🐑

draft-xu-tictoc-ipsec-security-for-synchronization-02

   This protocol variation inherits all the security properties of
   regular ESP as described in [RFC4303].
  • The draft is about protecting IEEE-1588.
  • IEEE-1588 cannot run through a router, because it would introduce too much variable latency.
  • OTOH ESP can handle a little jitter just fine.
  • So it doesn't have the same threat model or operating environment as RFC 4303.
   This document describes the modification or extension for the WESP
   for the additional application.  The approach described in this
   document requires the ESP endpoints to be modified to support the new
   protocol.  It allows the ESP receiver or intermediate node not only
   to distinguish encrypted and unencrypted traffic deterministically,
   but also identify whether the encrypted packets are the common
   packets or the time packets by a simpler implementation for the
   transport node.
  • This is motivation for implementing this draft.
  • The only thing here related to security is that we are talking about IPsec.
  • This belongs in the introduction.
   Note that whether the time packets identified by the defined mark
   or tag are transparent or not, there is always a possibility for
   attackers to employ interception attacks to block transmission.
   How to prevent interception attack is out of scope of this draft.
  • This last part is OK, but it's not enough.
  • A protocol that runs in an environment so different from the Internet Threat Model should call out those differences in the Security Considerations section.

RFC 5246 (TLS 1.2)

This leaves a small timing channel, since MAC
performance depends to some extent on the size of the data fragment,
but it is not believed to be large enough to be exploitable, due to
the large block size of existing MACs and the small size of the
timing signal.
  • Not in security considerations section (which is massive!)
  • Apprendix D recommends supporting renegotation
  • Multiple insecure algorithms still permitted
  • Default cipher suite was vulnerable
  • Real life vulnerabilities resulted from this
  • You should REMOVE vulnerable options, pick SECURE options by default, and SHRINK what people need to think about.

🐑

draft-ietf-regext-epp-fees

   The mapping extensions described in this document do not provide any
   security services beyond those described by EPP [RFC5730], the EPP
   domain name mapping [RFC5731], and protocol layers used by EPP.  The
   security considerations described in these other specifications apply
   to this specification as well.

Well, if nothing's changed, why did you write this draft in the first place?

More seriously, we need to describe more than just security services.