Re: 6MAN WG Last Call: draft-ietf-6man-predictable-fragment-id-01

Fernando Gont <fernando@gont.com.ar> Tue, 09 December 2014 09:23 UTC

Return-Path: <fernando@gont.com.ar>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 843751A7004 for <ipv6@ietfa.amsl.com>; Tue, 9 Dec 2014 01:23:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.602
X-Spam-Level:
X-Spam-Status: No, score=-1.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HTUT_5YO5awz for <ipv6@ietfa.amsl.com>; Tue, 9 Dec 2014 01:23:16 -0800 (PST)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:8240:6:a::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D064A1A701F for <ipv6@ietf.org>; Tue, 9 Dec 2014 01:23:03 -0800 (PST)
Received: from cl-1071.udi-01.br.sixxs.net ([2001:1291:200:42e::2]) by web01.jbserver.net with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128) (Exim 4.84) (envelope-from <fernando@gont.com.ar>) id 1XyH0W-0006Ei-HO; Tue, 09 Dec 2014 10:23:00 +0100
Message-ID: <5486BF69.4020606@gont.com.ar>
Date: Tue, 09 Dec 2014 06:22:49 -0300
From: Fernando Gont <fernando@gont.com.ar>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: 神明達哉 <jinmei@wide.ad.jp>, Ole Troan <otroan@employees.org>
Subject: Re: 6MAN WG Last Call: draft-ietf-6man-predictable-fragment-id-01
References: <CC2EE99E-475C-4DB5-9E7F-ED00B4D48561@employees.org> <CAJE_bqdwrG6nGvJCQG4gpYR6hSpVBe-Pi=+XozCv4L-RJ1=URg@mail.gmail.com>
In-Reply-To: <CAJE_bqdwrG6nGvJCQG4gpYR6hSpVBe-Pi=+XozCv4L-RJ1=URg@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ipv6/7CWTj0Nuz4NG3K5edlN4dIiuYVU
Cc: 6man Chairs <6man-chairs@tools.ietf.org>, 6man WG <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 09:23:18 -0000

Hi, Jinmei,

On 12/08/2014 06:40 PM, 神明達哉 wrote:
> - Section 4:
> 
>    The Identification value of the Fragment Header MUST NOT be
>    predictable by an off-path attacker.
> 
>   'MUST NOT be predictable' sounds vague to me, especially with the
>   RFC2119 keyword.  I'm not sure if there's a precedent of the use of
>   this word with a normative keyword, but even if there's, I would
>   personally still like to see a clearer term here.

FWIW, RFC6056 (port randomization) says:

   Ephemeral port selection algorithms SHOULD obfuscate the selection of
   their ephemeral ports, since this helps to mitigate a number of
   attacks that depend on the attacker's ability to guess or know the
   five-tuple that identifies the transport-protocol instance to be
   attacked.


OTOH, RFC6528 (TCP SEQ randomization) says:

   F() MUST NOT be computable from
   the outside, or an attacker could still guess at sequence numbers
   from the ISN used for some other connection.

where F() is essentially the TCP SEQ generator..




> - Section 6.3:
>    secret1:
>       Secret data unknown to the attacker
>   (The latter one: this should be "secret2")

Good grief! -- Will do.



> - Section 10.1: Not a big deal, but I'm not sure why this has to be a
>   "normative reference".
> 
>    [RFC6946]  Gont, F., "Processing of IPv6 "Atomic" Fragments", RFC
>               6946, May 2013.

FWIW, the rationale for including it as a normative reference (rather
than in order to understand the attack description in Section 3 (pages
5-6), you need to read RFC6946.

Thanks!

Best regards,
-- 
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@si6networks.com
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1