Security Considerations
-
Upload
hayes-padilla -
Category
Documents
-
view
19 -
download
0
description
Transcript of Security Considerations
Security Considerations
• Overall scope(in the context of the use cases)
– Trust models
– Threat models
– Countermeasures & rationale/assumptions
– Guidance to implementors and deployers
– Proof of correctness of the design(s)
• Initial stab at an overall outline:draft-sstc-sec-consider-00
Overall Resource
• Guidelines for Writing RFC Text on Security Considerations
draft-rescorla-sec-cons-03.txt
Trust Models
• Simple Example: The relying party believes (trusts that) Alice is authenticated because they have a AuthentiationAssertion saying so.
• Cf. BobB’s more detailed example.
Threat Models
• See draft-rescorla-sec-cons-03 for global set of threats in an Internet environment
• Assess use cases, bindings, and profiles to determine which threats apply in each case
• Don’t neglect second-order threats, e.g. vulnerabilities of external services one relies upon– E.g. DNS
Countermeasures & rationale/assumptions
• SecCons doc may describe overall design approaches
• Core-xx, bindings-model-xx, et al should document concise rationale/assumptions and ref SecCons
• See bindings-model-05 section 4.1.5 for examples
Guidance to implementors and deployers
• An important aspect is “mandatory to implement” items
• Examples..– Section 15 of RFC2616 [HTTP/1.1]– An example of how to specify Certificate-based
authentication with TLS…• Section 7 of RFC2829 [LDAPv3]
Proof of correctness
• Requirement – Due Diligence– Don’t repeat known prior mistakes (don’t do a “WEP”)– This is hard work– How formal do we need to be?
• Excellent guiding principles..– Abadi & Needham, “Prudent Engineering Practice for
Cryptographic Protocols” [ref’d]
– Example of application: Anderson & Needham “Robustness principles for public key protocols”
• (good?) Example of techniques..– “Authenticity by Typing for Security Protocols”, Gordon
& Jeffrey
Moving Forward
• Use sec-consider-00 as an initial framework for guiding the work– Ensure appropriate detailed rationale &
assumptions are included in specification docs, e.g. core-15 and bindings-model-05
– Discover & raise design issues in specification docs
• Need champion to own sec-consider-xx and drive this subprocess
Moving Forward, cont’d
• Proof-of-correctness analysis – by outside party?– Begin once specs are more fully-baked
• Oct? (Need SAML profile of xmldsig!)
– JeffH & Joe to tug sleeves of Univ. contacts (others (BobB) have contacts?)