Re: [CGA-EXT] Comments on draft-ietf-csi-proxy-send-01

"Laganier, Julien" <julienl@qualcomm.com> Fri, 20 November 2009 17:21 UTC

Return-Path: <julienl@qualcomm.com>
X-Original-To: cga-ext@core3.amsl.com
Delivered-To: cga-ext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 822413A6A58 for <cga-ext@core3.amsl.com>; Fri, 20 Nov 2009 09:21:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.085
X-Spam-Level:
X-Spam-Status: No, score=-105.085 tagged_above=-999 required=5 tests=[AWL=1.514, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 73ZLkuBpV+m5 for <cga-ext@core3.amsl.com>; Fri, 20 Nov 2009 09:21:32 -0800 (PST)
Received: from wolverine01.qualcomm.com (wolverine01.qualcomm.com [199.106.114.254]) by core3.amsl.com (Postfix) with ESMTP id 30C8328C0E6 for <cga-ext@ietf.org>; Fri, 20 Nov 2009 09:21:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qualcomm.com; i=julienl@qualcomm.com; q=dns/txt; s=qcdkim; t=1258737690; x=1290273690; h=from:to:cc:date:subject:thread-topic:thread-index: message-id:references:in-reply-to:accept-language: content-language:x-ms-has-attach:x-ms-tnef-correlator: acceptlanguage:content-type:content-transfer-encoding: mime-version:x-ironport-av; z=From:=20"Laganier,=20Julien"=20<julienl@qualcomm.com> |To:=20Tony=20Cheneau=20<tony.cheneau@it-sudparis.eu>|CC: =20"draft-ietf-csi-proxy-send@tools.ietf.org"=0D=0A=09<dr aft-ietf-csi-proxy-send@tools.ietf.org>,=0D=0A=20=20=20 =20=20=20=20=20"cga-ext@ietf.org"=0D=0A=09<cga-ext@ietf.o rg>|Date:=20Fri,=2020=20Nov=202009=2009:21:25=20-0800 |Subject:=20RE:=20[CGA-EXT]=20Comments=20on=20draft-ietf- csi-proxy-send-01|Thread-Topic:=20[CGA-EXT]=20Comments=20 on=20draft-ietf-csi-proxy-send-01|Thread-Index:=20Acpp8uu zNycMFiN2R42CI37YYBeiGQAENluQ|Message-ID:=20<BF345F63074F 8040B58C00A186FCA57F1C65FB277D@NALASEXMB04.na.qualcomm.co m>|References:=20<alpine.LNX.2.00.0911191100150.7833@whit ebox>=0D=0A=09<BF345F63074F8040B58C00A186FCA57F1C66087842 @NALASEXMB04.na.qualcomm.com>=0D=0A=20<alpine.LNX.2.00.09 11201144010.7546@whitebox>|In-Reply-To:=20<alpine.LNX.2.0 0.0911201144010.7546@whitebox>|Accept-Language:=20en-US |Content-Language:=20en-US|X-MS-Has-Attach: |X-MS-TNEF-Correlator:|acceptlanguage:=20en-US |Content-Type:=20text/plain=3B=20charset=3D"us-ascii" |Content-Transfer-Encoding:=20quoted-printable |MIME-Version:=201.0|X-IronPort-AV:=20E=3DMcAfee=3Bi=3D"5 300,2777,5808"=3B=20a=3D"28069723"; bh=8h9t88blEijJfDno5hxJv2aot6TpYGyRGnGUlfFlduo=; b=ae8xRIzG3yjciUOOjahZQUFh3AgxvWsaRYGHfd4wXbBmLaVyrRCrbK6u Fw+5b6R0GOMEXHPhcVdKU6O0kQBXGzPUMbCyWnzZqWj4WAGSm2zh/ZZoa eF7BR7zfSSR/vfYZhgtLuS7Wps5OwiV4UZdTqQcdRjGoFNSJ5F5J0IQwa Y=;
X-IronPort-AV: E=McAfee;i="5300,2777,5808"; a="28069723"
Received: from pdmz-ns-mip.qualcomm.com (HELO numenor.qualcomm.com) ([199.106.114.10]) by wolverine01.qualcomm.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 20 Nov 2009 09:21:29 -0800
Received: from msgtransport06.qualcomm.com (msgtransport06.qualcomm.com [129.46.61.149]) by numenor.qualcomm.com (8.14.2/8.14.2/1.0) with ESMTP id nAKHLSvw008805 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Fri, 20 Nov 2009 09:21:28 -0800
Received: from nasanexhub03.na.qualcomm.com (nasanexhub03.na.qualcomm.com [10.46.93.98]) by msgtransport06.qualcomm.com (8.14.2/8.14.2/1.0) with ESMTP id nAKHLS5l004491 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Fri, 20 Nov 2009 09:21:28 -0800
Received: from nasanex14h01.na.qualcomm.com (10.46.94.107) by nasanexhub03.na.qualcomm.com (10.46.93.98) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 20 Nov 2009 09:21:28 -0800
Received: from nalasexhc03.na.qualcomm.com (10.47.129.194) by nasanex14h01.na.qualcomm.com (10.46.94.107) with Microsoft SMTP Server (TLS) id 14.0.639.21; Fri, 20 Nov 2009 09:21:27 -0800
Received: from NALASEXMB04.na.qualcomm.com ([10.47.7.118]) by nalasexhc03.na.qualcomm.com ([10.47.129.194]) with mapi; Fri, 20 Nov 2009 09:21:27 -0800
From: "Laganier, Julien" <julienl@qualcomm.com>
To: Tony Cheneau <tony.cheneau@it-sudparis.eu>
Date: Fri, 20 Nov 2009 09:21:25 -0800
Thread-Topic: [CGA-EXT] Comments on draft-ietf-csi-proxy-send-01
Thread-Index: Acpp8uuzNycMFiN2R42CI37YYBeiGQAENluQ
Message-ID: <BF345F63074F8040B58C00A186FCA57F1C65FB277D@NALASEXMB04.na.qualcomm.com>
References: <alpine.LNX.2.00.0911191100150.7833@whitebox> <BF345F63074F8040B58C00A186FCA57F1C66087842@NALASEXMB04.na.qualcomm.com> <alpine.LNX.2.00.0911201144010.7546@whitebox>
In-Reply-To: <alpine.LNX.2.00.0911201144010.7546@whitebox>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "draft-ietf-csi-proxy-send@tools.ietf.org" <draft-ietf-csi-proxy-send@tools.ietf.org>, "cga-ext@ietf.org" <cga-ext@ietf.org>
Subject: Re: [CGA-EXT] Comments on draft-ietf-csi-proxy-send-01
X-BeenThere: cga-ext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: CGA and SeND Extensions <cga-ext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/cga-ext>, <mailto:cga-ext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cga-ext>
List-Post: <mailto:cga-ext@ietf.org>
List-Help: <mailto:cga-ext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cga-ext>, <mailto:cga-ext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2009 17:21:33 -0000

Tony,

If a router is compromised, it can send a RA containing a PIO with the L bit set to zero, and thus two hosts on the link trying to communicate will sends their packets to the router and will not attempt to resolve each others' address. Doing so, it can mount a MiTM attack of siphon off packets sent by a host. This is acknowledged in section 4.2.1. of RFC 3756.

Regarding the fe80::/64 prefix, it does not need to be advertized by the router or proxy. It should be assumed that a ND proxy is always authorized to proxy signaling for the fe80::/64 prefix. That does not need to be signaled in the certificate, it has to be written down in the draft however :)

--julien

> -----Original Message-----
> From: cga-ext-bounces@ietf.org [mailto:cga-ext-bounces@ietf.org] On
> Behalf Of Tony Cheneau
> Sent: Friday, November 20, 2009 7:06 AM
> To: Laganier, Julien
> Cc: draft-ietf-csi-proxy-send@tools.ietf.org; cga-ext@ietf.org
> Subject: Re: [CGA-EXT] Comments on draft-ietf-csi-proxy-send-01
> 
> Hi Julien,
> 
> Comments inline:
> 
> On Thu, 19 Nov 2009, Laganier, Julien wrote:
> 
> > Hi Tony,
> >
> > Thanks for reviewing the draft!
> >
> > Replying to your concern on the security considerations "t would be
> nice to have a warning text such as: "Note that if a Secure Proxy ND is
> corrupted, it can impersonate all the node in the subnet in which it is
> authorized to act as a proxy."
> >
> > I wouldn't use the term impersonate -- the delegation certificate
> doesn't allow the proxy to impersonate nodes (they're only used for
> SEND), only to issue ND signalling on their behalf. So a compromised
> proxy is able, like a compromised router, to siphon off traffic from
> the host, or mount a man-in-the-middle attack.
> I agree that "impersonate" may be to strong as the node will likely
> realise that they are processing Proxy Signature Option.
> 
> However, to me, it seems that the attack I describe and the attack you
> describe (on a compromised RFC 3971) router are slightly different.
> 
> Allow me to clarify my point:
> Generally, without RFC 3971, given that two hosts are on the same link
> and uses two addresses with the same prefix, they will communicate
> directly.
> When you use RFC 3971, the two nodes will be able to perform
> a secured Address Resolution. If an attacker want to perform a MITM
> attack, it will try to send NS, NA or redirect message. However, since
> it does not know any of the Private Key, he will not be able to sign
> the
> messages, and the attack will fail. This is the expected behaviour.
> Even a router can not mount a MITM attack here (the worse he can do is
> a
> DoS by announcing a Prefix Lifetime of 0).
> 
> Your draft proposes a new entity named Secure Proxy ND. If we suppose
> that a Secure Proxy ND for a specific prefix is corrupted, then the two
> hosts from before which are communicating using two address from the
> same prefix, are vulnerable to a corrupted Secure Proxy ND that can
> send NS/NA and sign using the Proxy Signature Option. Its (compromised)
> certificate would authorize it to do so. Do you agree ?  On that
> specific point, I think you solution provide more incentive to an
> attacker to corrupt the Secure Proxy ND enabled routers. That is
> perfectly fine as long as it is stated to be vulnerable to this kind of
> attack.
> 
> > So maybe we want to say something like:
> >
> >   Thanks to the authorization certificate it is provisioned with, a
> proxy ND
> >   is authorized to issue ND signalling on behalf of nodes on the
> subnet.
> >   Thus, a compromised proxy is able, like a compromised router, to
> siphon off
> >   traffic from the host, or mount a man-in-the-middle attack. As for
> SEND,
> >   which does not protect against against compromise of the route as
> >   described in Sections 9.2.4 of [RFC3971], Secure Proxy ND Support
> for
> >   SEND does not protect against compromise of the proxy ND.
> >
> > What do you think?
> While I agree with the general phrasing, I think that you should
> emphasis that attack is "wider" that the generic SEND compromised
> router, as it allows man-in-the-middle attack on node that are
> communicating on the link (as stated before).
> 
> Another question that comes to my mind just now, and that may need
> clarification in your document is:
> Is your solution able to provide Secure Proxy ND for the fe80::/64
> prefix ? I mean, a router does not announce this prefix as it not a
> routable one. Then, there will be no CPS/CPA exchange for this prefix,
> meaning no certificate exchange.  What is the processing of a host
> receiving a ND message toward a fe80::/64 address signed with a Proxy
> Signature Option ?  How can he learn the certificate of the Secure
> Proxy
> ND ? This should be addressed as it is a use case of RFC 4389 (I think).
> 
> Feel free to ask if I'm not clear enough and you need clarifications.
> 
> Best regards,
>  	Tony
> 
> 
> _______________________________________________
> CGA-EXT mailing list
> CGA-EXT@ietf.org
> https://www.ietf.org/mailman/listinfo/cga-ext