Re: [karp] Gen-ART Telechat Review of draft-ietf-karp-routing-tcp-analysis-06

Anantha Ramaiah <ananth@nttmcl.com> Tue, 18 December 2012 23:15 UTC

Return-Path: <ananth@nttmcl.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 419DC21E8045 for <ietf@ietfa.amsl.com>; Tue, 18 Dec 2012 15:15:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.843
X-Spam-Level:
X-Spam-Status: No, score=-1.843 tagged_above=-999 required=5 tests=[AWL=-1.133, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_73=0.6, RCVD_IN_DNSWL_LOW=-1, SARE_HTML_USL_OBFU=1.666]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OqT-+pc5bRvb for <ietf@ietfa.amsl.com>; Tue, 18 Dec 2012 15:15:42 -0800 (PST)
Received: from mail-vc0-f169.google.com (mail-vc0-f169.google.com [209.85.220.169]) by ietfa.amsl.com (Postfix) with ESMTP id 5BDB021F86C2 for <ietf@ietf.org>; Tue, 18 Dec 2012 15:15:42 -0800 (PST)
Received: by mail-vc0-f169.google.com with SMTP id gb23so1655859vcb.0 for <ietf@ietf.org>; Tue, 18 Dec 2012 15:15:41 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:x-gm-message-state; bh=DddHo5pyWh4QpU43phRHSG4mES1vXpZ5dgbk81NsXGo=; b=IzjWBCOSI7D3oVOsfdNAJ/YAk/wYigPMUkkckKs6njy0WiijB+tSIa9CrBpUlZ//PA v7vtKwEm6YiXMzTK4swbgtugDYlpH6ItOtxPXBqr6jYsglU5HUxaMMBzRYkU8Ggc+4EC OL8eV3EBjQ1XRWGWYOM2cF3Mr5dd8bw3Psn5YRQOyczG/dUoRZviuIZbwSovmSkNpEBR zhCgSHMPobL5uYa8kJFApAVx5u9Qix9sgxEO8pGF5zqxrNt1SDmkE2nFl2hu0zUIr/JC hnKTnhPKHRId5T0Tf3dvt/kOivpARFucLf5j2U80vqO8RHgR5puTQRJ0POuYa2Qktgr7 +3ZA==
MIME-Version: 1.0
Received: by 10.220.141.6 with SMTP id k6mr5839992vcu.24.1355872541485; Tue, 18 Dec 2012 15:15:41 -0800 (PST)
Received: by 10.220.3.229 with HTTP; Tue, 18 Dec 2012 15:15:41 -0800 (PST)
In-Reply-To: <50D0ED83.3090700@joelhalpern.com>
References: <AEDD0F1A-EA31-4C3A-B1BF-BD16C9196740@nostrum.com> <50D0EA56.3050308@inex.ie> <50D0ED83.3090700@joelhalpern.com>
Date: Tue, 18 Dec 2012 15:15:41 -0800
Message-ID: <CAFZUbhenPyaDoknGafGd4SOXOUVo5VpbohjC8D5rB21iB0v1xQ@mail.gmail.com>
Subject: Re: [karp] Gen-ART Telechat Review of draft-ietf-karp-routing-tcp-analysis-06
From: Anantha Ramaiah <ananth@nttmcl.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Content-Type: multipart/alternative; boundary="f46d04389221322a6504d128ad8e"
X-Gm-Message-State: ALoCoQlQ7MASS+ItKy7yKtChC1RbSLNjGcg7KjJQL5g9tIeAR9phKG0HzDH+kDetfiGMZW0bxqBB
X-Mailman-Approved-At: Thu, 20 Dec 2012 08:17:04 -0800
Cc: "draft-ietf-karp-routing-tcp-analysis.all@tools.ietf.org" <draft-ietf-karp-routing-tcp-analysis.all@tools.ietf.org>, "ietf@ietf.org List" <ietf@ietf.org>, "karp@ietf.org" <karp@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2012 23:15:44 -0000

FWIW,
      I have to agree with Nick's observations w.r.t TCP MD5. Especially
the following :-

- TCP MD5 is not universally turned on to protect LDP sessions. It is case
by case. TCP MD5 is better than no security at all. Also TCP MD5 with
periodic key rollover can make the life harder for TCP MD5 based collision
attacks. It is better than TCP-MD5 with no key rollover.

(so, you see the degree of protection varies and the Nick's example of 5
pin versus 7 pin barrel lock, which I like :-)

- I also agree that there are no live TCP-AO implementations to date.
TCP-MD5 on the other hand has been there and still there in many vendors
TCP stacks.

I think it is a good idea to note some the points (esp the CPU utilization
depending on the crypto algorithm of choice etc.,) into the draft. Makes
sense to me.

thanks,
-Anantha


On Tue, Dec 18, 2012 at 2:26 PM, Joel M. Halpern <jmh@joelhalpern.com>wrote:

> Nick, I appreciate that you have read this document and commented.
>
> Two general questions:
> 1) Can you be more specific about where you see unclear language usage?
>  It is hard to fix a general coment.
>
> 2) A number of your comments seem to be about general router security.
> Many of them would see far more appicable to RFC 6518.  This document is
> just about changes to protect TCP sessions (yes, what we are concerned
> about are the TCP sessions used by routers.)  Can you take a look at your
> comments, and tell us which ones are applicable to this document, and which
> ones should be held for when the community is ready to revise RFC 6518?
>
> Thank you,
> Joel
>
> On 12/18/2012 5:12 PM, Nick Hilliard wrote:
>
>> On 18/12/2012 20:14, Ben Campbell wrote:
>>
>>> ** Nits/editorial comments:
>>>
>>> -- The 2119 paragraph was removed, but there's still an orphaned 2119
>>> entry in the informational reference section.
>>>
>>
>> I'm not sure that this was a good idea.  There are a lot of "has to"s in
>> this text, and it's not clear to me whether they are phrased like that as
>> a
>> way of getting around 2119, or what's going on.  Whatever the reason, "has
>> to" sounds very informal and probably not suitable for a document like
>> this.  Could we have some clarification as to why "has to" doesn't mean
>> "MUST" (or even "SHOULD").
>>
>> --
>>
>> -   protocol stack from CPU-utilization based attacks.TCP Robustness
>> +   protocol stack from CPU-utilization based attacks. TCP Robustness
>>
>> --
>>
>> I have a general issue with the statement "TCP MD5 [RFC2385] has been
>> obsoleted by TCP-AO [RFC5925]."  At this time, I'm not aware of any live
>> TCP-AO implementations.  So while I understand that md5 is effectively
>> obsolete from the specification point of view, from the point of view of
>> operational reality it's still the only show in town (no-one uses ipsec
>> for
>> this).
>>
>> Secondly, as a general comment about the TCP MD5 option, no-one that I
>> know
>> uses it as a serious security mechanism, but instead as a means of putting
>> the equivalent of a padlock on the barn door.  This does two things: 1. it
>> stops bgp sessions from being accidentally re-used (e.g. at IXPs or on
>> commercial providers who are re-using access ports), and 2. it simply
>> raises the bar in terms of difficulty.  If your barnyard door has a
>> padlock, and the one beside doesn't, the average lazy human being will
>> attempt to poke at the one which doesn't.
>>
>>  From an operational view, i would generally see the difference between
>>>
>> tcp/md5 and tcp/sha1 (via tcp-ao) as being similar to the difference
>> between a 5 pin and a 7 pin barrel lock.  Both look like a lock on the
>> outside, and the thief is probably going to smash a window to get in
>> anyway, or look for the key which the owners left under the mat.
>>
>> --
>>
>> There is a second operational issue which may merit mention here, namely
>> the issue of ensuring that whatever session layer authentication is
>> implemented on an actual network device, that it doesn't create more
>> problems than it solves.  Specifically, if session layer authentication is
>> pushed too far down the protocol stack, cryptographic authentication can
>> occur before other basic checks which might be a whole pile less CPU
>> intensive.  There was a scare about this several years ago when it turned
>> out that a well-known vendor had implemented tcp md5 checksumming before
>> more basic tcp session checks (e.g. seq numbers, ttl, etc).  In the event,
>> this turned out to be a red herring because md5 is sufficiently gentle on
>> the CPU that it didn't make much difference in reality.
>>
>> However, there is cryptographic value in using more computationally
>> intensive hashing algorithms, and if routers (which often have relatively
>> slow general CPUs or route-processor CPUs) were to get trashed with a
>> large
>> flood of packets which were signed with a cpu-intensive hashing algorithm,
>> and if the checksum were to be implemented in the wrong place in the TCP
>> stack, then this could become an actual problem.
>>
>> I don't know whether these things should be noted in the draft.
>>
>> --
>>
>> It may be useful to consider whether to acknowledge the existence of rfc
>> 6192 in the context of providing a link to what other steps might be
>> useful
>> to secure routers.
>>
>> --
>>
>>      pairs of routers when using TCP MD5.  It is well known that the
>>>     longer the same key is used, the greater the chance that it can be
>>>     guessed or exposed
>>>
>>
>> I'm split between {{cn}} and [[Wikipedia:OBVIOUS]].  Hmmm, life's little
>> decisions.
>>
>> --
>>
>>      Routers lack comprehensive key management and keys derived from it
>>>     that they can use to authenticate data.
>>>
>>
>> clumsy wording (and grammatically incorrect).
>>
>> --
>>
>>      Authentication, tamper protection, and encryption all require the use
>>>
>>
>> should that second comma be dropped?  Not sure what the ietf style
>> dictates.
>>
>> --
>>
>>      Authentication, tamper protection, and encryption all require the use
>>>     of keys by sender and receiver.  An automated KMP therefore has to
>>>     include a way to distribute MKT between two end points with little or
>>>     no administration overhead.  It has to cover automatic key rollover.
>>>
>>
>> "has to" has to become "MUST", shouldn't it?
>>
>> Also, the third sentence is a semantic repeat of the second - and much
>> easier to understand, too.
>>
>> --
>>
>> -    that, where PCEs are discovered and not configured, the PCC cannot
>> +    that where PCEs are discovered and not configured, the PCC cannot
>>
>> --
>>
>> -   [draft-zheng-mpls-ldp-hello-**crypto-auth-04] suggest a new
>> +   [draft-zheng-mpls-ldp-hello-**crypto-auth-04] suggests a new
>>
>> --
>>
>>               An LSR can reduce the threat of spoofed Extended Hellos by
>>>     filtering them and accepting Hellos from sources permitted by an
>>>     access lists.
>>>
>>
>> "permitted by an access list".
>>
>> --
>>
>>    However, performing the filtering using access lists
>>>     requires LSR resource, and the LSR is still vulnerable to the IP
>>>     source address spoofing.
>>>
>>
>> This is a little clumsy.  Maybe rephrase as: "However, filtering with
>> access lists requires LSR resources, and the LSR may still be vulnerable
>> to
>> IP source address spoofing."
>>
>> "may" rather than is.  This will depend on the iACL policy of the network.
>>
>> --
>>
>>  Spoofed Hello messages are observed and reported as real
>>>     problem in production networks.
>>>
>>
>> s/problem/problems/
>>
>> {{cn}}
>>
>> --
>>
>>      The Message Authentication Codes (MACs) used by TCP MD5 option, is
>>>     considered too weak
>>>
>>
>> oops, grammar.
>>
>> --
>>
>>  Cryptographic research suggests that both these
>>>     MAC algorithms defined are fairly secure.
>>>
>>
>> Today's "fairly secure" algorithms are tomorrow's swiss cheese:
>>
>>  http://www.eetimes.com/**electronics-news/4051745/**Chinese-researchers-
>>> **compromise-SHA-1-hashing-**algorithm<http://www.eetimes.com/electronics-news/4051745/Chinese-researchers-compromise-SHA-1-hashing-algorithm>
>>>
>>
>> I would explicitly avoid the use of ".* secure", and if the authors feel
>> the need to make any statement about them, that it should be prefixed by
>> woolly, hand-wavey, get-out-of-jail-free phrases, e.g. "at the time of
>> authorship, there are no publicly known attacks on this algorithm which
>> reduce the strength to complexity of less than 1 in X", or however
>> crypto-heads like to phrase that sort of thing.  Right now, that phrase is
>> headed towards algorithmic oblivion.
>>
>> --
>>
>>  LDP [RFC5036] does not provide any security
>>>     mechanisms for use with Hello messages except for some configuration
>>>     which may help protect against bogus discovery events.  These
>>>     configurations include directly connected links and interfaces.
>>>
>>
>> suggest rewording:
>>
>> LDP [RFC5036] does not provide any security mechanisms for use with Hello
>> messages, although operational workarounds may be implemented such as
>> using directly interfaces.
>>
>> --
>>
>> There are possibly more nits in there - I haven't exhaustively gone
>> through
>> all the text, but it needs a good shake-down by a style editor.
>>
>> Otherwise I like this draft and think it has merit as a general
>> informational overview.
>>
>> Nick
>>
>>
>>  ______________________________**_________________
> karp mailing list
> karp@ietf.org
> https://www.ietf.org/mailman/**listinfo/karp<https://www.ietf.org/mailman/listinfo/karp>
>