Re: [Ideas] [lisp] FW: Technical plenary: Attacks against the architecture - implications for the Network Mapping System

Padmadevi Pillay Esnault <padma@huawei.com> Mon, 31 October 2016 18:48 UTC

Return-Path: <padma@huawei.com>
X-Original-To: ideas@ietfa.amsl.com
Delivered-To: ideas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 692361299D3; Mon, 31 Oct 2016 11:48:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.718
X-Spam-Level:
X-Spam-Status: No, score=-5.718 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.497, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h_fLGN6O-rWg; Mon, 31 Oct 2016 11:48:46 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC1141299A8; Mon, 31 Oct 2016 11:48:45 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml707-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CZK87733; Mon, 31 Oct 2016 18:48:43 +0000 (GMT)
Received: from DFWEML702-CAH.china.huawei.com (10.193.5.176) by lhreml707-cah.china.huawei.com (10.201.5.199) with Microsoft SMTP Server (TLS) id 14.3.235.1; Mon, 31 Oct 2016 18:48:40 +0000
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml702-cah.china.huawei.com ([10.193.5.176]) with mapi id 14.03.0235.001; Mon, 31 Oct 2016 11:48:31 -0700
From: Padmadevi Pillay Esnault <padma@huawei.com>
To: "Templin, Fred L" <Fred.L.Templin@boeing.com>
Thread-Topic: [Ideas] [lisp] FW: Technical plenary: Attacks against the architecture - implications for the Network Mapping System
Thread-Index: AQHSM5Q+tB8Wu9GAmk+kxUM29tK5Q6DDP3GA//+hTHA=
Date: Mon, 31 Oct 2016 18:48:31 +0000
Message-ID: <EC7A99B9A59C1B4695037EEB5036666B012C7540@dfweml501-mbb>
References: <EC7A99B9A59C1B4695037EEB5036666B012C63D0@dfweml501-mbb> <85dd645c-37ca-0839-a175-2fb05539fbf2@joelhalpern.com> <CAG-CQxr8gXiQi_D1PNN6HMk7NVc6P62kPsZicLdm1PgfL41prA@mail.gmail.com> <09534746-0A8F-4CAB-9778-5032F90604F0@gmail.com> <CAG-CQxpZoQWPp_wBpNLTB3ATUJrSB9=kwM05YKiB7i8_x3XTLg@mail.gmail.com> <1fb6fb630dd345cf8bed1d8164b04dd2@XCH15-06-08.nw.nos.boeing.com> <CCA233D5-9A07-4451-9894-466408FECE0D@gmail.com>
In-Reply-To: <CCA233D5-9A07-4451-9894-466408FECE0D@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.213.48.228]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090202.5817920B.027A, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: b55a82351c1e69ef9caa1780a4478e68
Archived-At: <https://mailarchive.ietf.org/arch/msg/ideas/RUNAwWruw5lssAuVs4p9PkvOW3E>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>, Dino Farinacci <farinacci@gmail.com>, "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [Ideas] [lisp] FW: Technical plenary: Attacks against the architecture - implications for the Network Mapping System
X-BeenThere: ideas@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Discussions relating to the development, clarification, and implementation of control-plane infrastructures and functionalities in ID enabled networks." <ideas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ideas>, <mailto:ideas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ideas/>
List-Post: <mailto:ideas@ietf.org>
List-Help: <mailto:ideas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ideas>, <mailto:ideas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Oct 2016 18:48:48 -0000

Hi Fred

Thanks for raising this interesting question.

Yes it has happened and will continue to do so. It will a very sensitive topic that none of the entities attack would want to be publicized at all cost.
That said, it is much easier for a private institution to keep it under the wraps.

Are they taking measures? Absolutely!
It is pretty recent that we now have authentication based on which computer is used to login using 2 step verification. The two
Step verification involving confirmation of code sent to mobile can be considered a tell tale sign.

I think the difference with the latest attack is that 
- it involved the DNS system or other services that cannot rely on the two step verification for instance which could potentially identify it the requests are from botnets. 
The larger and indiscriminate you are about users to your service, the higher the risk of a DDOS attack waiting to happen.
- It is harder to keep it under the wraps when you have multiple parties involved.

Coming back to the mapping systems, while it may be vulnerable just as many other components of the internet, now is time for rethinking. 
I am really looking forward to the technical plenary. The latest attack highlights the urgency to get started on working on it. 
The motivation for the IDEAS problem statement is to identify these critical issues and provide a framework leveraging properties in ID enabled networks.
IMHO, it is best to have a framework for all ID enabled networks rather than going about it in piecemeal, and this is the goal for IDEAS, or at least it is a starting point.

Padma

-----Original Message-----
From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Dino Farinacci
Sent: Monday, October 31, 2016 10:03 AM
To: Templin, Fred L
Cc: Padma Pillay-Esnault; ideas@ietf.org; lisp@ietf.org
Subject: Re: [Ideas] [lisp] FW: Technical plenary: Attacks against the architecture - implications for the Network Mapping System

> Hi, one observation and one question. The observation is that anything on the open
> Internet that provides a service can be subject to Denial of Service – and, I am not
> just talking about the LISP mapping system. The question is how is it that we have
> not yet seen DoS attacks take down critical Internet services such as online banking;
> have we just been lucky up to now?

Fred, it has happened. Just hidden to avoid headlines and fear.

Dino

_______________________________________________
Ideas mailing list
Ideas@ietf.org
https://www.ietf.org/mailman/listinfo/ideas