Re: Gen-ART Telechat Review of draft-ietf-karp-routing-tcp-analysis-06

"Joel M. Halpern" <jmh@joelhalpern.com> Thu, 20 December 2012 14:17 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F20C21F88C7; Thu, 20 Dec 2012 06:17:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.125
X-Spam-Level:
X-Spam-Status: No, score=-102.125 tagged_above=-999 required=5 tests=[AWL=0.140, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X4XPro-O0F6X; Thu, 20 Dec 2012 06:17:01 -0800 (PST)
Received: from morbo.mail.tigertech.net (morbo.mail.tigertech.net [67.131.251.54]) by ietfa.amsl.com (Postfix) with ESMTP id 579D621F84F8; Thu, 20 Dec 2012 06:17:01 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) by morbo.tigertech.net (Postfix) with ESMTP id B8ABCA3679; Thu, 20 Dec 2012 06:17:00 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 8D1551C2B48; Thu, 20 Dec 2012 06:17:00 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from [10.10.10.104] (pool-70-106-135-81.clppva.east.verizon.net [70.106.135.81]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 499D31C07AC; Thu, 20 Dec 2012 06:16:59 -0800 (PST)
Message-ID: <50D31DD6.5080100@joelhalpern.com>
Date: Thu, 20 Dec 2012 09:16:54 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/17.0 Thunderbird/17.0
MIME-Version: 1.0
To: Nick Hilliard <nick@inex.ie>
Subject: Re: Gen-ART Telechat Review of draft-ietf-karp-routing-tcp-analysis-06
References: <AEDD0F1A-EA31-4C3A-B1BF-BD16C9196740@nostrum.com> <50D0EA56.3050308@inex.ie> <50D0ED83.3090700@joelhalpern.com> <50D24A43.6050608@inex.ie>
In-Reply-To: <50D24A43.6050608@inex.ie>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: "draft-ietf-karp-routing-tcp-analysis.all@tools.ietf.org" <draft-ietf-karp-routing-tcp-analysis.all@tools.ietf.org>, "ietf@ietf.org List" <ietf@ietf.org>, "karp@ietf.org" <karp@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2012 14:17:02 -0000

Thank you Nick.
With regard to the suggest text replacement of "has to" with "needs to", 
if you think that will help, lets go wit it (at then let the RFC Editor 
tell us if it doesn't work.)

With regard to obsoleting TCP-MD5, that is what the RFCs say.  The 
TCP-MD5 is obsoleted by the TCP-AO RFC.  Further, the security folks are 
quite adamant that we should be shifting our recommendations, and where 
possible our practice.  If there are not yep implementations, we need to 
be pushing folks harder to get them.

If I understand your next item properly, you are asking that we add a 
sentence about the fact that implementation of security mechanisms needs 
to be doe carefully, so as not to make things worse.  Seems easy to do 
and can't hurt, so we should do so.

And equally, noting that security is more than cryptography, and more 
than signatures, is probably sensible.

Authors, WG, can we live with these?  I would think so.

Yours,
Joel

On 12/19/2012 6:14 PM, Nick Hilliard wrote:
> On 18/12/2012 22:26, Joel M. Halpern wrote:
>> Nick, I appreciate that you have read this document and commented.
>>
>> Two general questions:
>> 1) Can you be more specific about where you see unclear language usage?  It
>> is hard to fix a general coment.
>
> I was referring to the use of "has to", but the phrase only appears three
> times so maybe it's not going to be a large amount of work to eradicate it.
>   This might work:
>
> s/has to/needs to/g
>
> I overestimated to myself the number of times it appeared by flicking back
> and forwards through the document when looking at it last night.
>
>> 2) A number of your comments seem to be about general router security. Many
>> of them would see far more appicable to RFC 6518.  This document is just
>> about changes to protect TCP sessions (yes, what we are concerned about are
>> the TCP sessions used by routers.)  Can you take a look at your comments,
>> and tell us which ones are applicable to this document, and which ones
>> should be held for when the community is ready to revise RFC 6518?
>
> 6518 looks like a roadmap to me.  I don't see any of these comments as
> being especially relevant to that document.
>
> There are 3 general suggestions and the rest of the issues are either style
> or syntax editing issues, and I think they are all relevant to this
> document.  These suggestions are:
>
> 1:
>
>>> I have a general issue with the statement "TCP MD5 [RFC2385] has been
>>> obsoleted by TCP-AO [RFC5925]."  At this time, I'm not aware of any live
>>> TCP-AO implementations.  So while I understand that md5 is effectively
>>> obsolete from the specification point of view, from the point of view of
>>> operational reality it's still the only show in town (no-one uses ipsec for
>>> this).
>
> We don't have running code for the new protocol, but we have very wide
> deployment for the older protocol.  So I question how appropriate it is to
> make a statement on whether the new protocol has obsoleted the old one.
> I'm not familiar enough with ietf nous to know whether this is relevant to
> a document like this.  Wearing my operator hat, it looks a little odd,
> that's all.
>
> 2:
>
>>> There is a second operational issue which may merit mention here, namely
>>> the issue of ensuring that whatever session layer authentication is
>>> implemented on an actual network device, that it doesn't create more
>>> problems than it solves.  Specifically, if session layer authentication is
>>> pushed too far down the protocol stack, cryptographic authentication can
>>> occur before other basic checks which might be a whole pile less CPU
>>> intensive.  There was a scare about this several years ago when it turned
>>> out that a well-known vendor had implemented tcp md5 checksumming before
>>> more basic tcp session checks (e.g. seq numbers, ttl, etc).  In the event,
>>> this turned out to be a red herring because md5 is sufficiently gentle on
>>> the CPU that it didn't make much difference in reality.
>>>
>>> However, there is cryptographic value in using more computationally
>>> intensive hashing algorithms, and if routers (which often have relatively
>>> slow general CPUs or route-processor CPUs) were to get trashed with a large
>>> flood of packets which were signed with a cpu-intensive hashing algorithm,
>>> and if the checksum were to be implemented in the wrong place in the TCP
>>> stack, then this could become an actual problem.
>
> Whatever a router manufacturer does in terms of implementation, they need
> to be careful when writing code to ensure that they don't accidentally open
> up other attack vectors by implementing transport layer security badly.  It
> almost happened once before, and this could have caused damage at the time
> if we had had been using a computationally expensive algorithm like openbsd
> bcrypt instead of md5.
>
> 3:
>
>>> It may be useful to consider whether to acknowledge the existence of rfc
>>> 6192 in the context of providing a link to what other steps might be useful
>>> to secure routers.
>
> What I'm suggesting here is a single sentence around the first paragraph in
> section 2.1 to say that while it's outside the context of transport
> security, there's more to protecting routers than cryptography - and then
> provide a link to 6192 as an informative reference to someone who might be
> interested in the more general area router security.
>
> General router security is a large subject which is not particularly
> pertinent to keying and authentication, but a random operator who happens
> to read this ID when it's published might appreciate the pointer.
>
> Nick
>
>