Re: [Tsv-art] Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06

Christian Huitema <huitema@huitema.net> Sun, 25 November 2018 21:06 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D033A130DD5 for <ietf@ietfa.amsl.com>; Sun, 25 Nov 2018 13:06:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NRuMFu3yztZG for <ietf@ietfa.amsl.com>; Sun, 25 Nov 2018 13:06:53 -0800 (PST)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8988129C6A for <ietf@ietf.org>; Sun, 25 Nov 2018 13:06:52 -0800 (PST)
Received: from xsmtp12.mail2web.com ([168.144.250.177]) by mx12.antispamcloud.com with esmtps (TLSv1.2:AES128-SHA:128) (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1gR1Cv-0002BR-FC for ietf@ietf.org; Sun, 25 Nov 2018 21:40:48 +0100
Received: from [10.5.2.35] (helo=xmail10.myhosting.com) by xsmtp12.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from <huitema@huitema.net>) id 1gR1CJ-00037J-ST for ietf@ietf.org; Sun, 25 Nov 2018 15:40:41 -0500
Received: (qmail 4314 invoked from network); 25 Nov 2018 20:40:03 -0000
Received: from unknown (HELO [192.168.1.100]) (Authenticated-user:_huitema@huitema.net@[172.56.42.25]) (envelope-sender <huitema@huitema.net>) by xmail10.myhosting.com (qmail-ldap-1.03) with ESMTPA for <draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org>; 25 Nov 2018 20:40:03 -0000
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Joe Touch <touch@strayalpha.com>, Nick Hilliard <nick@foobar.org>
Cc: tsv-art <tsv-art@ietf.org>, OPSEC <opsec@ietf.org>, ietf <ietf@ietf.org>, draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org
References: <154300282321.9639.11604402305352742547@ietfa.amsl.com> <C4886ABA-3BBE-46AE-B2D9-9A6836D7A8BB@strayalpha.com> <2c28d4ac-87de-bcaf-54e8-4e745235c800@gmail.com> <977CA53D-7F72-4443-9DE2-F75F7A7C1569@strayalpha.com> <d6deb7af-99dd-9013-2722-8ebbe00c0b37@si6networks.com> <1CB13135-D87A-4100-8668-D761058E1388@strayalpha.com> <0f56c25d-7ac7-e534-4e2c-cc09f5154e77@foobar.org> <28EDE667-457E-4AED-8480-F27ECAA8E985@strayalpha.com> <6bd1ec94-f420-1f4c-9254-941814704dbb@gmail.com>
From: Christian Huitema <huitema@huitema.net>
Openpgp: preference=signencrypt
Autocrypt: addr=huitema@huitema.net; prefer-encrypt=mutual; keydata= xsBNBFIRX8gBCAC26usy/Ya38IqaLBSu33vKD6hP5Yw390XsWLaAZTeQR64OJEkoOdXpvcOS HWfMIlD5s5+oHfLe8jjmErFAXYJ8yytPj1fD2OdSKAe1TccUBiOXT8wdVxSr5d0alExVv/LO I/vA2aU1TwOkVHKSapD7j8/HZBrqIWRrXUSj2f5n9tY2nJzG9KRzSG0giaJWBfUFiGb4lvsy IaCaIU0YpfkDDk6PtK5YYzuCeF0B+O7N9LhDu/foUUc4MNq4K3EKDPb2FL1Hrv0XHpkXeMRZ olpH8SUFUJbmi+zYRuUgcXgMZRmZFL1tu6z9h6gY4/KPyF9aYot6zG28Qk/BFQRtj7V1ABEB AAHNJ0NocmlzdGlhbiBIdWl0ZW1hIDxodWl0ZW1hQGh1aXRlbWEubmV0PsLAeQQTAQIAIwUC UhFfyAIbLwcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEJNDCbJVyA1yhbYH/1ud6x6m VqGIp0JcZUfSQO8w+TjugqxCyGNn+w/6Qb5O/xENxNQ4HaMQ5uSRK9n8WKKDDRSzwZ4syKKf wbkfj05vgFxrjCynVbm1zs2X2aGXh+PxPL/WHUaxzEP7KjYbLtCUZDRzOOrm+0LMktngT/k3 6+EZoLEM52hwwpIAzJoscyEz7QfqMOZtFm6xQnlvDQeIrHx0KUvwo/vgDLK3SuruG1CSHcR0 D24kEEUa044AIUKBS3b0b8AR7f6mP2NcnLpdsibtpabi9BzqAidcY/EjTaoea46HXALk/eJd 6OLkLE6UQe1PPzQC4jB7rErX2BxnSkHDw50xMgLRcl5/b1bOwE0EUhFfyAEIAKp7Cp8lqKTV CC9QiAf6QTIjW+lie5J44Ad++0k8gRgANZVWubQuCQ71gxDWLtxYfFkEXjG4TXV/MUtnOliG 5rc2E+ih6Dg61Y5PQakm9OwPIsOx+2R+iSW325ngln2UQrVPgloO83QiUoi7mBJPbcHlxkhZ bd3+EjFxSLIQogt29sTcg2oSh4oljUpz5niTt69IOfZx21kf29NfDE+Iw56gfrxI2ywZbu5o G+d0ZSp0lsovygpk4jK04fDTq0vxjEU5HjPcsXC4CSZdq5E2DrF4nOh1UHkHzeaXdYR2Bn1Y wTePfaHBFlvQzI+Li/Q6AD/uxbTM0vIcsUxrv3MNHCUAEQEAAcLBfgQYAQIACQUCUhFfyAIb LgEpCRCTQwmyVcgNcsBdIAQZAQIABgUCUhFfyAAKCRC22tOSFDh1UOlBB/94RsCJepNvmi/c YiNmMnm0mKb6vjv43OsHkqrrCqJSfo95KHyl5Up4JEp8tiJMyYT2mp4IsirZHxz/5lqkw9Az tcGAF3GlFsj++xTyD07DXlNeddwTKlqPRi/b8sppjtWur6Pm+wnAHp0mQ7GidhxHccFCl65w uT7S/ocb1MjrTgnAMiz+x87d48n1UJ7yIdI41Wpg2XFZiA9xPBiDuuoPwFj14/nK0elV5Dvq 4/HVgfurb4+fd74PV/CC/dmd7hg0ZRlgnB5rFUcFO7ywb7/TvICIIaLWcI42OJDSZjZ/MAzz BeXm263lHh+kFxkh2LxEHnQGHCHGpTYyi4Z3dv03HtkH/1SI8joQMQq00Bv+RdEbJXfEExrT u4gtdZAihwvy97OPA2nCdTAHm/phkzryMeOaOztI4PS8u2Ce5lUB6P/HcGtK/038KdX5MYST Fn8KUDt4o29bkv0CUXwDzS3oTzPNtGdryBkRMc9b+yn9+AdwFEH4auhiTQXPMnl0+G3nhKr7 jvzVFJCRif3OAhEm4vmBNDE3uuaXFQnbK56GJrnqVN+KX5Z3M7X3fA8UcVCGOEHXRP/aubiw Ngawj0V9x+43kUapFp+nF69R53UI65YtJ95ec4PTO/Edvap8h1UbdEOc4+TiYwY1TBuIKltY 1cnrjgAWUh/Ucvr++/KbD9tD6C8=
Message-ID: <6be84ccf-9a72-2694-e19d-fa19043a0cb1@huitema.net>
Date: Sun, 25 Nov 2018 12:40:03 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
In-Reply-To: <6bd1ec94-f420-1f4c-9254-941814704dbb@gmail.com>
Content-Type: multipart/alternative; boundary="------------D59ADFBAB31468BBF2A117B1"
Content-Language: en-US
Subject: Re: [Tsv-art] Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06
X-Originating-IP: 168.144.250.177
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 168.144.250.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=168.144.250.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.29)
X-Recommended-Action: accept
X-Filter-ID: EX5BVjFpneJeBchSMxfU5rB4yPWYUCSdtdMqNq5uX95602E9L7XzfQH6nu9C/Fh9KJzpNe6xgvOx q3u0UDjvO4tDwdNAVmgs/7KSsJM2vK1s1ujulqUFmMITHM77eiViNcdahzeE2TVxU/iFECCDTs7i TvJ2/ZGzVWB9scFAaCdIFaUvXN+CI+RGy3Me16pBfeuTov1vPAP3qEy01CsKmx/TBCf6oYXAWGet lavcAjD9ytQxIHf9lN5jjLJaPK8l4YBmPrqPoeRXD34azf1rYZv5uZUEePrXZkexHL9EC3AAJAfA 9MMVcQ9WVjD1q+Rbd9IPG/DQ2p+GU04sTuYFs91jhnM/Mbva2XLV/LIEzaKyLm0zESXAkIAT8ZKA DvsGI5uh86ZVnyOrYkLMWyEaRt9fxN2oReTDHAyOynaY0CmHJLVH4DfVNbPXJmiLfub/IRFsicyJ MEhQFtD8PLoiniWmsFByBoXAuCZEyg59LM/9rUJrEbVA84BZVscMTXpbpuxXJTL417vaJWq5kk+j cuidX4Ts4xdG+C13IyWeZaJIXnGlagy/bmmgWDrsWrBKojmX5u6QQ8A3tr7Vu+yOd1W3D/mhAG/g Tx2BifEj2qlG047RODDSOAU8VRBdjarRhquvBzKEzdsRbaiLpp7t82t4C4SlaCuF6Oqyplz7a94E pv+Z3RfD+aRmwAVlEJHcERWeKKG4PAQYNyavp7c49KDXJbBeUq+plwVLxTzfQlHSGe3okMCcn14J 4XO+5ud/zOv92qcMp6uRdQEN3sZYPbXPXQCMPhqxpZp0HYSHLTfRZ4YizZEe9VMcrJA1Ttxd3VfQ E5DNiNWwEZ4OAJK/EDs7XWg9wGFzdK9KUOG9bsPJmnxScOZQ52ULRZzPCcWv15Q6CZxYjafGpi3c b03a4ZFy04e73oo5Jp1iUunX3+VlFawbDxpzYifNwA/+CbHA2fz9gpiGyR7D15JIzS+z7i8K8WY4 szo4Gwow0vwlYMfpTQuMHNi5DO10BOGC1ZJT0NaIcaHtK0XZjSPnTTBX4w==
X-Report-Abuse-To: spam@quarantine9.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/SE6h_er3PduVt9DW5COsB3qXAzA>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Nov 2018 21:06:55 -0000

On 11/25/2018 11:40 AM, Brian E Carpenter wrote:
> On 2018-11-26 04:53, Joe Touch wrote:
>> A reasoned discussion of the pros and cons would be useful.
>>
>> What we have is the perspective, often heavily represented by vendors and operators, of the driving reality that:
>>
>> a) implementing extended features is an attack on profits
>> b) properly configuring and monitoring extended features is an attack on effort
>>
>> A reasoned argument would be useful. That is not what has been repeatedly presented, IMO.
> I don't think that's entirely fair to RFC7045. But the fact is that
> there's a tussle here between the desire for the ability to deploy
> new protocols freely, and the desire for the ability to block
> potentially harmful or malicious traffic. The definition of "harmful
> or malicious" is not universally agreed. "Harmful to my business model"
> is certainly one possible interpretation. But then, we decided to
> implement the Internet as a largely unregulated competitive system,
> so we got tussles.

I am concerned that this draft is attempting to weight the scales and
favor one side of this ongoing tussle, which leads to something like
"ossification in the name of security". I think that's a huge overreach.
I would like to have a very general caveat at the beginning of the
draft, explaining that it is perfectly fine to deploy routers that do
not perform any such filtering and simply forward the packets. We need
something significantly more forceful than merely saying that the short
statement in section 2.3.

The policies that it describes are plausible for specialized filtering
devices such as firewalls, but the draft proposes adopting these
policies for "transit routers", an ill defined term that could cover
pretty much every router in the the Internet. There is a big difference
there. Security devices are engineered to implement specific policies,
and come with management systems to update these policies over time.

Nick made that point, probably unintentionally, when he wrote that
"transit operators would generally take the view that any data-plane
packet which needs to be put through a slow path will be rate limited up
to 100% loss". Last I checked, data plane processing is implemented in
specialized components that are designed for speed. I am quite concerned
that filtering recommendations made by the IETF will end up deeply
embedded in the hardware of at least some routers, and that changing
them in the future would be quite hard. That's pretty much the recipe
for ossification.

I am also concerned that the filtering is justified by "security
considerations", but that with the exception of the HBH header these
considerations apply to end points, not to transit router. Take the
example of the experimental options, described in section 3.4.10. The
consideration says that "implications of these EHs will depend on their
specific use." It fails to mention any security consequence for the
transit router that would fail to filter these options. In the absence
of filtering, the packets will arrive at the end system, where they will
be processed if the end system is part of the experiment, or treated as
unwanted traffic if the end system is not part of that experiment. There
definitely will not be any harmful effect for the router that passed the
traffic.

I understand that unwanted traffic can be used in denial of service
attacks. But then, any traffic profile can be used in such attacks. The
attacker who can inject packets with EH=253 can also, for example,
inject arbitrary TCP segments, or spoofed EH packets. I also understand
the desire to protect end systems from unwanted traffic. There is a
history of attacks performed by various kind of "magic packets" that
cause a catastrophic failure in some target systems. But it does not
follow that such protection should be implement by coarse policies
hardwired in every router on the Internet. The definition of these
attacks changes over time, and it would be folly to implement these
rules in systems that lack management capabilities. The proper place for
that is specialized security functions, not in general purpose routers.

I am also concerned that the draft does not define the difference
between EH options and IPv6 payload types. The IPv6 header contains a
"payload type" field, that may legitimately contain any of the payload
types defined in the IANA registry of protocol numbers
(https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml).
Some of those payload types are flagged as IPv6 extension header types
and listed in the corresponding registry
(https://www.iana.org/assignments/ipv6-parameters/ipv6-parameters.xhtml).
Discussing EH without discussing the other payload types seems bizarre.
Do the reasons for blocking for the experimental payload type 253 also
apply to, for example, the UDP Lite payload type? What about discussing
ESP and not discussing L2TP or MANET?

-- Christian Huitema


-- Christian Huitema