Re: [babel] Paul Wouters' Discuss on draft-ietf-babel-rtt-extension-05: (with DISCUSS and COMMENT)

Juliusz Chroboczek <jch@irif.fr> Tue, 13 February 2024 19:00 UTC

Return-Path: <jch@irif.fr>
X-Original-To: babel@ietfa.amsl.com
Delivered-To: babel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 994B7C15107F; Tue, 13 Feb 2024 11:00:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=irif.fr
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vtUIUQdzxidr; Tue, 13 Feb 2024 11:00:48 -0800 (PST)
Received: from korolev.univ-paris7.fr (korolev.univ-paris7.fr [IPv6:2001:660:3301:8000::1:2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46FFEC14CEE3; Tue, 13 Feb 2024 11:00:44 -0800 (PST)
Received: from mailhub.math.univ-paris-diderot.fr (mailhub.math.univ-paris-diderot.fr [81.194.30.253]) by korolev.univ-paris7.fr (8.14.4/8.14.4/relay1/82085) with ESMTP id 41DJ0d9u005145; Tue, 13 Feb 2024 20:00:39 +0100
Received: from mailhub.math.univ-paris-diderot.fr (localhost [127.0.0.1]) by mailhub.math.univ-paris-diderot.fr (Postfix) with ESMTP id 47293AE2DB; Tue, 13 Feb 2024 20:00:38 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=irif.fr; h= content-type:content-type:mime-version:user-agent:references :in-reply-to:subject:subject:from:from:message-id:date:date :received:received; s=dkim-irif; t=1707850835; x=1708714836; bh= 4z43WJVuliVDCjlerptHpkKSCtzPGst96bE02b9XyLE=; b=ILoZayf5Yh7z34GR awWTumwh1sGHEEVj1UCWvRVGeunG9MECjZAjfZUfKoWq4QsstKArxSr7JPPC3qbf pcx1JMJjKM3PbHcbVKHU0zMLzdR7Lw0F5Sp79PndQClwkKEcBdIZ09wR13his0bW HMcGezbCgc+Q3TZr9TVlkycJn6l49hVEVoZncEOALTjRq/ajxv7uenPxcdsQ8Swq Er5e3PZokeqbrrdgGzy+gPFLfSfLT9N9uXBSQ0bMuighm8OyOSUOqXakROX/bP8G 08EgpCkLmQMitdne5bK7ayBP6bzWdu8QEqxZ4gvmjo3u+f83zY7O84gA2XBMdD75 eRmBxQ==
X-Virus-Scanned: amavisd-new at math.univ-paris-diderot.fr
Received: from mailhub.math.univ-paris-diderot.fr ([127.0.0.1]) by mailhub.math.univ-paris-diderot.fr (mailhub.math.univ-paris-diderot.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id oAqBhjc3e9ky; Tue, 13 Feb 2024 20:00:35 +0100 (CET)
Received: from pirx.irif.fr (unknown [78.194.40.74]) (Authenticated sender: jch) by mailhub.math.univ-paris-diderot.fr (Postfix) with ESMTPSA id 0B970AE26E; Tue, 13 Feb 2024 20:00:32 +0100 (CET)
Date: Tue, 13 Feb 2024 20:00:30 +0100
Message-ID: <87frxwdwa9.wl-jch@irif.fr>
From: Juliusz Chroboczek <jch@irif.fr>
To: Paul Wouters <paul.wouters@aiven.io>
Cc: The IESG <iesg@ietf.org>, draft-ietf-babel-rtt-extension@ietf.org, babel-chairs@ietf.org, babel@ietf.org, Donald Eastlake <d3e3e3@gmail.com>
In-Reply-To: <170784364166.47495.16308239157765755257@ietfa.amsl.com>
References: <170784364166.47495.16308239157765755257@ietfa.amsl.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/29.1 Mule/6.0
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.7 (korolev.univ-paris7.fr [194.254.61.138]); Tue, 13 Feb 2024 20:00:39 +0100 (CET)
X-Miltered: at korolev with ID 65CBBC57.000 by Joe's j-chkmail (http : // j-chkmail dot ensmp dot fr)!
X-j-chkmail-Enveloppe: 65CBBC57.000 from mailhub.math.univ-paris-diderot.fr/mailhub.math.univ-paris-diderot.fr/null/mailhub.math.univ-paris-diderot.fr/<jch@irif.fr>
X-j-chkmail-Score: MSGID : 65CBBC57.000 on korolev.univ-paris7.fr : j-chkmail score : . : R=. U=. O=. B=0.000 -> S=0.000
X-j-chkmail-Status: Ham
Archived-At: <https://mailarchive.ietf.org/arch/msg/babel/StUpByEmhtA8R-K8W8WL_ba0kyQ>
Subject: Re: [babel] Paul Wouters' Discuss on draft-ietf-babel-rtt-extension-05: (with DISCUSS and COMMENT)
X-BeenThere: babel@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "A list for discussion of the Babel Routing Protocol." <babel.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/babel>, <mailto:babel-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/babel/>
List-Post: <mailto:babel@ietf.org>
List-Help: <mailto:babel-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/babel>, <mailto:babel-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Feb 2024 19:00:52 -0000

> I agree with Shivan's concern about privacy here. Perhaps something more can be
> said in the document? Maybe a Privacy Considerations section? Should a client
> using a VPN add some random range delay for privacy? Should it just say/act
> with something very slow to "opt out" of this entirely

A router can opt out of the mechanism entirely, simply by not sending the
timestamp sub-TLV in its Hello and IHU TLVs.  This will cause neighbouring
routers will fall back to RFC 8966 operation for route selection.
A router may even switch at any time from sending timestamps to omitting
them, for example if a previously stationary router becomes mobile and
therefore wishes to conceal its location.

The current implementations are not vulnerable to the attack, since they
use RTT information in order to penalise participating routers: RTT
information is used to identify far-away routers, in order to avoid
sending traffic through them.  In ten years, we have not come across
a network topology where we would want to do the opposite.

The Security Consideration currently says:

    However, having access to accurate timestamps could allow an attacker
    to determine the physical location of a node, which might be
    undesirable in some deployments.

If you wand us to be more explicit, I can replace it with the following:

    However, having access to accurate timestamps could allow an attacker
    to determine the physical location of a node, which might be
    considered confidential in some deployments.  Such nodes might avoid
    disclosure of location information by not including timestamp sub-TLVs
    in the TLVs that they send.

Would that satisfy you?

> I'm also worried about malicious clients sending pre-emptive IHUs and lying
> about the RTT, and thus making themselves the preferred gateway.

There are easier ways to achieve that in the Babel protocol, please see
Section 6 of RFC 8966.

> This could be avoided by adding a random COOKIE in the RTT timer
> request. Is there a reason why not to take this extra security step?

A malicious router has much easier ways to redirect traffic to itself.
That's why we recommend using RFC 8968, which uses random nonces and
cryptographic signatures, and that has been proved safe.  (Full
disclosure: pen and paper proof, not automated verification.)

-- Juliusz