1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
|
Network Working Group S. Bellovin
Request for Comments: 2316 AT&T Labs Research
Category: Informational April 1998
Report of the IAB Security Architecture Workshop
1. Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
2. Copyright Notice
Copyright (C) The Internet Society (1998). All Rights Reserved.
3. Abstract
On 3-5 March 1997, the IAB held a security architecture workshop at
Bell Labs in Murray Hill, NJ. We identified the core security
components of the architecture, and specified several documents that
need to be written. Most importantly, we agreed that security was
not optional, and that it needed to be designed in from the
beginning.
3.1. Specification Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119.
4. Motivations
On 3-5 March 1997, the IAB held a security architecture workshop at
Bell Labs in Murray Hill, NJ. The ultimate goal was to design a
security architecture for the Internet. More concretely, we wished
to understand what security tools and protocols exist or are being
developed, where each is useful, and where we are missing adequate
security tools. Furthermore, we wanted to provide useful guidance to
protocol designers. That is, if we wish to eliminate the phrase
"security issues are not discussed in this memo" from future RFCs, we
must provide guidance on acceptable analyses.
Bellovin Informational [Page 1]
^L
RFC 2316 Report of the IAB April 1998
There were twenty-four attendees (their names are listed in Appendix
A). Perhaps not surprisingly for such a group, the overwhelming
majority used some form of cryptography when connecting back to their
home site from the meeting room. But the situation on the rest of
the Internet is not nearly as good; few people use encryption, even
when they should.
The problem is that the rate of attacks is increasing. Apart from
the usual few elite hackers -- the ones who find the new holes --
there are many canned exploit scripts around. ("Click here to attack
this system.") Furthermore, the attackers have gotten smarter; rather
than going after random university machines, more and more are
targeting the Internet infrastructure, such as routers, high-level
name servers, and the like.
The problem is compounded by organizational laziness. Users and
system administrators want "magic security" -- they want whatever
they do to be secure, regardless of whether or not it is, or even can
be.
5. General Philosophy
We concluded that in general, end-to-end security is better. Thus,
one should use something like PGP or S/MIME for email, rather than
relying on an IPsec layer. In general, relying on the security of
the infrastructure is a bad idea; it, too, is under attack. Even
firewall-protected intranets can be subverted. At best, the
infrastructure should provide availability; it is the responsibility
of individual protocols not to make unreasonable demands on the
infrastructure during an attack.
6. IETF Structure
Our security problem is compounded by the IETF's inherent structure
(or, in some cases, the lack thereof). By intent, we are a volunteer
organization. Who should do the security work? The other protocol
designers? Often, they have neither the time nor the interest nor
the training to do it. Security area members? What if they are not
interested in some subject area, or lack the time themselves? We
cannot order them to serve.
To the extent that the IETF does have management, it is embodied in
the working group charters. These are in essence contracts between
the IESG and a working group, spelling out what is to be done and on
what schedule. Can the IESG unilaterally impose new requirements on
existing working groups? What if security cannot be added on without
substantial changes to the fundamental structure of a protocol that
has been reworked over several years?
Bellovin Informational [Page 2]
^L
RFC 2316 Report of the IAB April 1998
Finally, there is a perception problem: that IPsec will somehow
solve the security problem. It won't; indeed, it can't. IPsec
provides excellent protection of packets in transit. But it's hard
to deploy on individual hosts, does not protect objects that may be
retransmitted (i.e., email messages), does not address authorization
issues, cannot block against excess resource consumption, etc.
7. Documents to be Written
Collectively, we decided on several documents that need to be
written:
Taxonomy of Attacks
In order to defend a protocol against attacks, one must, of
course, know the kinds of attacks that are possible. While the
specifics differ from protocol to protocol, a number of general
categories can be constructed.
Implementation Hints and Pitfalls
Even if a protocol is sound, a host running it can be
vulnerable if the protocol is implemented improperly. A
variety of common errors can and do subvert the best designs.
Firewall Issues
Firewalls are both a common defense and a much-reviled wart on
the Internet. Regardless, they are unlikely to go away any
time soon. They have both strengths and weaknesses that must
be considered when deploying them. Furthermore, some protocols
have characteristics that are unnecessarily firewall-hostile;
such practices should be avoided.
Workshop Report
This document.
8. Working Group Charters
The actual text in the working group charter is likely to be
something fairly simple, like
Protocols developed by this working group will be analyzed for
potential sources of security breach. Identified threats will be
removed from the protocol if possible, and documented and guarded
against in other cases.
The actual charter text represents a policy enjoined and enforced by
the IESG, and may change from time to time and from charter to
Bellovin Informational [Page 3]
^L
RFC 2316 Report of the IAB April 1998
charter. However, it essentially references and asks for text in
documents conforming to the following, which may be very appropriate
to include in the RFC.
9. Guidelines on writing Security Considerations in an RFC
A "threat" is, by definition, a vulnerability available to a
motivated and capable adversary. CERT advisories are quite
predictable given a knowledge of the target of the threat; they
therefore represent an existence proof, but not a threat analysis.
The point is to determine what attacks are possible ("capabilities"
of a potential attacker) and formulate a defense against the attacks,
or convincingly argue that the attack is not realistic in some
environment and restrict use of the protocol to that environment.
Recommended guidelines:
All RFCs - MUST meaningfully address security in the protocol or
procedure it specifies. It MUST consider that it is giving its
data to "the enemy" and asking it to be delivered to its friends
and used in the manner it intended. Consideration MUST be given to
the ramifications of the inherent danger of the situation.
- MUST do "due diligence" to list the threats to which the
protocol is vulnerable. Use of legal term does not imply legal
liability, but rather the level of responsibility expected to be
applied to the analysis. This discussion might occur throughout
the document or in the Security Considerations section; if it
occurs throughout, it MUST be summarized and referenced in the
Security Considerations section.
- MUST discuss which of those threats are
* Ameliorated by protocol mechanisms (example: SYN attack is
ameliorated by clever code that drops sessions randomly when
under SYN attack)
* Ameliorated by reliance on external mechanisms (example: TCP
data confidentiality provided by IPSEC ESP)
* Irrelevant ("In most cases, MIBs are not themselves security
risks; If SNMP Security is operating as intended, the use of a
MIB to change the configuration of a system is a tool, not a
threat. For a threat analysis of SNMP Security, see RFC ZZZZ.")
* Not addressed by the protocol; results in applicability
statement. ("This protocol should not be used in an
environment subject to this attack")
Bellovin Informational [Page 4]
^L
RFC 2316 Report of the IAB April 1998
10. Core Security Mechanisms
A variety of security mechanisms exist today. Not all are well-
designed; not all are suitable for all purposes. The members of the
workshop designated a number of protocols as "core". Such protocols
should be used preferentially, if one of them has properties that
match the needs of your protocol. The following were designated as
core:
IPsec [RFC 1825] is the basic host-to-host security mechanism. It
is appropriate for use any time address-based protection would
have been used, including with such programs as rsh and rlogin.
If and when platforms support user-based keying, this scope may
be expanded.
One particular technique used by IPsec, HMAC [RFC 2104], is
more generally useful. If cryptographic authentication but not
secrecy is needed, and IPsec is not applicable, HMAC should be
used.
ISAKMP/Oakley [ISAKMP drafts] is the basic key negotiation
protocol for IPsec. As such, it should be deployed when IPsec
is used. With the appropriate "domain of interpretation"
document, it should be used to negotiate pairwise keys for
other protocols.
DNSsec [RFC 2065] is not only crucial for protecting the DNS --
cache contamination is the easiest way to launch active attacks
-- it's also needed in many situations when IPsec is used.
Security/Multipart [RFC 1847] is the preferred way to add secured
sections to MIME-encapsulated email.
Signed keys in the DNS. There is, as noted, widespread agreement
that DNS records themselves must be protected. There was less
agreement that the key records should be signed themselves,
making them in effect certificates. Still, this is one
promising avenue for Internet certificates.
X.509v3 is the other obvious choice for a certificate
infrastructure. Again, though, there was no strong consensus
on this point.
TLS [TLS draft] was seen by some as the preferred choice for
transport-layer security, though there was no consensus on this
point. TLS is less intrusive to the operating system than
IPsec; additionally, it is easier to provide fine-grained
protection this way.
Bellovin Informational [Page 5]
^L
RFC 2316 Report of the IAB April 1998
Some protocols were designated as "useful but not core". These were
insufficiently general, too new, or were substantially duplicative of
core protocols. These include AFT/SOCKS, RADIUS, firewalls, GSS-API,
PGP, Kerberos, PGP-MIME, PKIX-3, the various forms of per-hop
authentication (OSPF, RSVP, RIPv2), *POP, OTP, S/MIME, SSH, PFKey,
IPsec API, SASL, and CRAM/CHAP. Obviously, entries on this list may
move in either direction.
A few protocols were considered "not useful". Primarily, these are
ones that have failed to catch on, even though they've been available
for some time. These include PEM [RFC 1421, 1422, 1423, 1424] and
MOSS [RFC 1848]. (The phrase "not useful" does not imply that they
are incorrect, or are lacking in important information. However,
they do not describe protocols that we are currently encouraging the
use of.)
One security mechanism was deemed to be unacceptable: plaintext
passwords. That is, no protocol that relies on passwords sent over
unencrypted channels is acceptable.
11. Missing Pieces
Participants in the workshop identified three significant missing
pieces: object security, secure email, and route security.
Object security refers to protection for individual data objects,
independent of transport. We have one such already -- Secure DNS --
but we need a me general scheme. MIME is a candidate object
framework, in part because it is the core of the two most widely used
and deployed applications: the web and email. However, securing
email has been problematic and the web is not that far in front.
Secure email is a critical need and has been for some time. Two
attempts to standardize secure email protocols (PEM and MOSS) have
failed to be accepted by the community, while a third protocol (PGP)
has become a de facto standard around the world. A fourth protocol,
an industry standard (S/MIME), has been gaining popularity. Both of
these latter of entered the Internet standards process.
Route security has recently become a critical need. The
sophistication of the attackers is on the rise and the availability
of attacking toolkits has increased the number of sophisticated
attacks. This task is especially complex because the requirement for
maximum performance conflicts with the goal of adding security, which
usurps resources that would otherwise enhance the performance of the
router.
Bellovin Informational [Page 6]
^L
RFC 2316 Report of the IAB April 1998
12. Security Considerations
Security is not and cannot be a cookie cutter process. There is no
magic pixie dust that can be sprinkled over a protocol to make it
secure. Each protocol must be analyzed individually to determine
what vulnerabilities exist, what risks they may lead to, what
palliative measures can be taken, and what the residual risks are.
13. Acknowledgments
This RFC is largely based on the minutes compiled by Thomas Narten,
whose work in turn was partly based on notes by Erik Huizer, John
Richardson, and Bob Blakley.
14. References
[RFC 1825] Atkinson, R., "Security Architecture for the Internet
Protocol", RFC 1825, August 1995.
[RFC 2104] Krawcyzk, H., Bellare, M., and R. Canett, "HMAC:
Keyed-Hashing for Message Authentication", RFC 2104, February
1997.
[ISAKMP drafts] Works in Progress.
[RFC 2065] Eastlake, D., and C. Kaufman, "Domain Name System
Security Extensions", RFC 2065, January 1997.
[RFC 1847] Galvin, J., Murphy, S., Crocker, S., and N. Freed,
"Security Multiparts for MIME: Multipart/Signed and
Multipart/Encrypted", RFC 1847, October 1995.
[TLS draft] Dierks, T., and C. Allen, "The TLS Protocol Version
1.0", Work in Progress.
[RFC 1421] Linn, J., "Privacy Enhancement for Internet Electronic
Mail: Part I: Message Encryption and Authentication
Procedures", RFC 1421, February 1993.
[RFC 1422] Kent, S., "Privacy Enhancement for Internet Electronic
Mail: Part II: Certificate-Based Key Management", RFC 1422,
February 1993.
[RFC 1423] Balenson, D., "Privacy Enhancement for Internet
Electronic Mail: Part III: Algorithms, Modes, and Identifiers",
RFC 1423, February 1993.
Bellovin Informational [Page 7]
^L
RFC 2316 Report of the IAB April 1998
[RFC 1424] Kaliski, B. "Privacy Enhancement for Internet
Electronic Mail: Part IV: Key Certification and Related
Services", RFC 1424, February 1993.
[RFC 1848] Crocker, S., Freed, N., Galvin, J. and S. Murphy, "MIME
Object Security Services", RFC 1848, October 1995.
Appendix A. Attendees
Ran Atkinson rja@inet.org
Fred Baker fred@cisco.com
Steve Bellovin bellovin@acm.org
Bob Blakley blakley@vnet.ibm.com
Matt Blaze mab@research.att.com
Brian Carpenter brian@hursley.ibm.com
Jim Ellis jte@cert.org
James Galvin galvin@commerce.net
Tim Howes howes@netscape.com
Erik Huizer Erik.Huizer@sec.nl
Charlie Kaufman charlie_kaufman@iris.com
Steve Kent kent@bbn.com
Paul Krumviede paul@mci.net
Marcus Leech mleech@nortel.ca
Perry Metzger perry@piermont.com
Keith Moore moore@cs.utk.edu
Robert Moskowitz rgm@htt-consult.com
John Myers jgm@CMU.EDU
Thomas Narten narten@raleigh.ibm.com
Radia Perlman radia.perlman@sun.com
John Richardson jwr@ibeam.jf.intel.com
Allyn Romanow allyn@mci.net
Jeff Schiller jis@mit.edu
Ted T'So tytso@mit.edu
Appendix B. Author Information
Steven M. Bellovin
AT&T Labs Research
180 Park Avenue
Florham Park, NJ 07932
USA
Phone: (973) 360-8656
EMail: bellovin@acm.org
Bellovin Informational [Page 8]
^L
RFC 2316 Report of the IAB April 1998
Full Copyright Statement
Copyright (C) The Internet Society (1998). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Bellovin Informational [Page 9]
^L
|