Re: [Captive-portals] Requirements for "captive portal closed" notifications

Lorenzo Colitti <lorenzo@google.com> Tue, 20 March 2018 16:02 UTC

Return-Path: <lorenzo@google.com>
X-Original-To: captive-portals@ietfa.amsl.com
Delivered-To: captive-portals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5468F1270AB for <captive-portals@ietfa.amsl.com>; Tue, 20 Mar 2018 09:02:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.71
X-Spam-Level:
X-Spam-Status: No, score=-2.71 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GSY0gkQnnhOQ for <captive-portals@ietfa.amsl.com>; Tue, 20 Mar 2018 09:02:07 -0700 (PDT)
Received: from mail-wm0-x236.google.com (mail-wm0-x236.google.com [IPv6:2a00:1450:400c:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D13E126C0F for <captive-portals@ietf.org>; Tue, 20 Mar 2018 09:02:07 -0700 (PDT)
Received: by mail-wm0-x236.google.com with SMTP id a20so17986492wmd.1 for <captive-portals@ietf.org>; Tue, 20 Mar 2018 09:02:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=aWsmhUAW6iSRXrPWh0zdyP+DSW47Habky74WDWLgZIw=; b=kgwkb0gdV3ARSX6/BYb04SzcnkwxAjSM26R34bzP3fPjoYRo/FJ8ZzSqqDGCcyndO4 YKDO2HRYdVY4WXMv5u1/mgH4Y8H8CFEWa8WA7DfzNhGYAwADBFuPbo6Y+r600U9wiSJX sRfChKvqIbSt0f/x2o4vrsCr2yqjLCLVgohDb10LMIf33K3W2upaiLwZulMZpxHKpoz+ 7hr3BzGxqhgZMyNINe0wM9MARrsZd9Nc3onhs7dW3w7fqeM6ZR4xmcWt6CR+wSvXjJ+N 7fcMPVo20vcQzQLdvD0IUCEEFbKli6r++22SeotfoendFvGAHhViph+PocfoIeh4AFsy UQ0w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=aWsmhUAW6iSRXrPWh0zdyP+DSW47Habky74WDWLgZIw=; b=mbWQOIeJcGOFc9EfJ//35tPgZ8wh9KSYnTnVzpdnYBuUnvL+AwrzEsbGFqgkLKCHiW SW+gVGe1zxALy5pAZoUbayHAtGHdUcv3hKeDnWBi3TmAYQSHSDmRUl/jN7+M/KCafeS+ IgXAKcNtNgydeSuKTEbQZ7O9gZecPupR53Jbs2dCJ+EEXmyMMVoTgeCp+s8RCTZYzJwo Blse+vnJBVKzkVe3UZbn7Lh/fnkuoYuOH/8GdXq74XBHaAooUmNtlcTl9DRvtIHR07+Y yhWrXNhiY3FiyrlR7nzjRC3EpEdaySKuwlvybtKaq3ItgN1JnlPU4oML+NoThpJGpoed MFBg==
X-Gm-Message-State: AElRT7E1ffNKIF5jMGMhsjWxCGin4i5AudulUTzFjmMxv3GlA8gQrcFn Ge8UX1hetl5ZF6e7tsqaEGYhdEpepEokmbi9AfyGSQ==
X-Google-Smtp-Source: AG47ELuUHtaSzlBDHysdBp9fcdXynxiH25MUYdeOlohOCyJMQW6Msc8GjNt+DkV9ef7i6aRMfoB8Onsw1CYhyuXneP8=
X-Received: by 10.28.12.79 with SMTP id 76mr133739wmm.116.1521561725285; Tue, 20 Mar 2018 09:02:05 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.28.130.204 with HTTP; Tue, 20 Mar 2018 09:01:44 -0700 (PDT)
In-Reply-To: <CADo9JyXpW-rn81kwOkqx8+=iBMTWd+x1FoMm-YTCm+Efmb23gQ@mail.gmail.com>
References: <CAKD1Yr3rP24jQ6sMpoXZ3pU02FmvwDNc9=w2oAh4bMWZmEtQ_A@mail.gmail.com> <CADo9JyXpW-rn81kwOkqx8+=iBMTWd+x1FoMm-YTCm+Efmb23gQ@mail.gmail.com>
From: Lorenzo Colitti <lorenzo@google.com>
Date: Tue, 20 Mar 2018 16:01:44 +0000
Message-ID: <CAKD1Yr0oDZQJQ1n899Vtm1VPwwV2ZaLZTJV19a35G6pHf0x1Dg@mail.gmail.com>
To: David Bird <dbird@google.com>
Cc: captive-portals@ietf.org
Content-Type: multipart/alternative; boundary="001a11444ad624d9e50567da3206"
Archived-At: <https://mailarchive.ietf.org/arch/msg/captive-portals/AAruYELmRYXyuDi4pB4lRVHHmdg>
Subject: Re: [Captive-portals] Requirements for "captive portal closed" notifications
X-BeenThere: captive-portals@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion of issues related to captive portals <captive-portals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/captive-portals/>
List-Post: <mailto:captive-portals@ietf.org>
List-Help: <mailto:captive-portals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Mar 2018 16:02:09 -0000

On Tue, Mar 20, 2018 at 3:44 PM, David Bird <dbird@google.com> wrote:

>
>>    - An ICMP message by itself is not secure. For example, it's trivial
>>    for an off-path attacker to generate ICMP messages for sessions from
>>    legitimate UEs to <popularwebsite>:443. Getting a UE to trust such a
>>    message only requires getting the ephemeral port right, and many OSes have
>>    a quite limited range of ephemeral ports.
>>
>>
> Is there any data that shows ICMP (and its insecurity) being used for
> off-path attacks like this today? Networks (as they do today) may just
> filter out ICMP they don't support from the edge.
>

Regardless of whether this is happening today, it seems unwise to propose
something with an obvious security hole like this. The risk is that we do a
bunch of work and then security review tells us "?REDO FROM START".


> 3. The notification should not be on a per-destination basis. A hint that
>> conveys the information "you can reach facebook, but to reach CNN you need
>> to upgrade to another service plan" is not technically infeasible but is
>> unlikely ever to reach WG and IETF consensus and therefore I think we
>> should not spend our time talking about it.
>>
>
> Can't a network have this policy irrespective of how we implement ICMP?
> Can't they even today just use existing ICMP messages? I cringe when we
> start dictating how PUBLIC ACCESS networks manage their walled garden and
> businesses.
>

My point was that there's no use in having that discussion, because we know
there are strong opinions on both sides and thus we're not likely to get
consensus.