RE: I-D Action: draft-ietf-6man-grand-02 - override flag for preferred address

Vasilenko Eduard <vasilenko.eduard@huawei.com> Wed, 16 September 2020 10:32 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C081F3A0FA3 for <ipv6@ietfa.amsl.com>; Wed, 16 Sep 2020 03:32:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level:
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LRgy86HPDGJh for <ipv6@ietfa.amsl.com>; Wed, 16 Sep 2020 03:32:48 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 226AD3A0F9D for <ipv6@ietf.org>; Wed, 16 Sep 2020 03:32:48 -0700 (PDT)
Received: from lhreml703-chm.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id D2692648450E8F61D632; Wed, 16 Sep 2020 11:32:45 +0100 (IST)
Received: from msceml701-chm.china.huawei.com (10.219.141.159) by lhreml703-chm.china.huawei.com (10.201.108.52) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1913.5; Wed, 16 Sep 2020 11:32:45 +0100
Received: from msceml703-chm.china.huawei.com (10.219.141.161) by msceml701-chm.china.huawei.com (10.219.141.159) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Wed, 16 Sep 2020 13:32:45 +0300
Received: from msceml703-chm.china.huawei.com ([10.219.141.161]) by msceml703-chm.china.huawei.com ([10.219.141.161]) with mapi id 15.01.1913.007; Wed, 16 Sep 2020 13:32:45 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Jen Linkova <furry13@gmail.com>
CC: "ipv6@ietf.org" <ipv6@ietf.org>
Subject: RE: I-D Action: draft-ietf-6man-grand-02 - override flag for preferred address
Thread-Topic: I-D Action: draft-ietf-6man-grand-02 - override flag for preferred address
Thread-Index: AdaLXezVEsH+qntxRsm4qUh2TiwzjAAWg9UAABMUOFAAA6PTUA==
Date: Wed, 16 Sep 2020 10:32:44 +0000
Message-ID: <54658b6d40e3476eab9edfb807769b6f@huawei.com>
References: <7120052452e644dcbf60485cb4224128@huawei.com> <CAFU7BATTpJtAPeKCJtapQCbwD2FFrYOH_ErfuPcZnO8uYar_kA@mail.gmail.com> <9cd9fb5962d44046871e7185ab344e34@huawei.com>
In-Reply-To: <9cd9fb5962d44046871e7185ab344e34@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.196.47]
Content-Type: multipart/alternative; boundary="_000_54658b6d40e3476eab9edfb807769b6fhuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/9wDBbei3ajEPO6kmu_7NIxjXrwQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2020 10:32:51 -0000

1 additional comment:
Intruder would not obey ND rules – he would set Override flag (and probably Solicited too).
Hence, GRAND could not improve security by extremely gentle behavior on legal hosts (O=0).
As we discussed before: address collision on 2^64 space that would follow by DAD lost – is extremely low probability for legal hosts. Moreover, it assumes that multicast was lost and ND does not operate properly – not good assumption.
You would not lose much setting O=1 for preferred - it is legal by ND architecture if address progressed to Preferred.

Because else I have to propose Override GRAND
That is not optimal standardization behavior (even if my draft would be rejected).
MITM is very important topic.

Ed/
From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Vasilenko Eduard
Sent: 16 сентября 2020 г. 12:29
To: Jen Linkova <furry13@gmail.com>
Cc: ipv6@ietf.org
Subject: RE: I-D Action: draft-ietf-6man-grand-02 - override flag for preferred address


Hi Jen,

If addresses is promoted to "Preferred", then DAD has passed. Then there is no way to shut up any host (from both duplicates). Very bad things would happen:

Only one would win the fight for neighbor cache record on the router.

1-way MITM: other one would sent upstream normal, but return traffic would go to first host.

2-way MITM at the same time: You could not assume what host (first or second) is more valuable - second one could be the important server after reboot. Then other one would get all requests to applications (DB, File Server, Web) from outside of the subnet. At least to collect passwords, and may be much more... depends on application type.



My problem: router could not see duplicity (and help) if at least legal host would not be persuasive to claim neighbor cache entry on the router.

Override flag set does permit for router to understand that address has achieved Preferred status (not optimistic) - action could be taken now.



In general, I do not respect this story about "first-come/first-serve" (I propose to block both). I have this text in my draft:

It could be the temptation to minimize Intercepted Victim disruption by blocking only the second node (first-come/first-serve approach). The Intruder would be the second in the majority of cases that would minimize disruption for Intercepted Victim. Unfortunately, there are less probable cases when Intruder would be capable to catch server with popular application in reload or upgrade state - than legal node would be blocked. The Intruder would be capable to pretend to be the particular application and start collection of valuable information from users that would visit this application. It would be at least login credentials and could be much more depending on application type. It is the leakage of information again. The leakage of information is considered much high security problem then DoS, hence such conversion of DoS back into leakage is not acceptable. Vulnerability harm is more important than the probability of vulnerability. It is especially true for [ND] where we have other DoS vulnerabilities anyway.

Only cryptographically based authentication does permit to really minimize DoS disruption for legal node.

Eduard

-----Original Message-----
From: Jen Linkova [mailto:furry13@gmail.com]
Sent: 16 сентября 2020 г. 5:29
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>
Cc: ipv6@ietf.org<mailto:ipv6@ietf.org>
Subject: Re: I-D Action: draft-ietf-6man-grand-02 - override flag for preferred address



On Tue, Sep 15, 2020 at 10:55 PM Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>> wrote:

> I did believe that your draft has already passed last call, I was late. Hence, I did not make one important comment.



That's perfectly fine - as the IESG asked for both drafts (v6ops-nd-cache-init and 6man-grand) to be merged, there will be another WGLC for 6man-grand.



> Meanwhile, I was working on my draft how to block MITM in ND. I am very unhappy about the leakage of information - you probably remember.

> I have almost finished - MITM blocked except very corner cases of host-to-host communication (no routers).

> But after many discussions with co-author we have found 1 hole that has been patched in this way:

>

> * Section 7.2.6 (Sending unsolicited NA) of [ND], add at the end:

> A node SHOULD send Neighbor Advertisement message with Override flag set to the all-routers multicast address after respective address would change state to preferred.

>

> There is the section later that explains interoperability with all ND-related extensions. Interoperability to GRAND is explained in this way:

> [Gratuitous ND] operates as intended in the combination with [Optimistic DAD].

> [Gratuitous ND] is effectively replaced by this document for the case when address is progressed to preferred, because stronger form of unsolicited NA (with override bit set) is proposed.

>

> May be I am asking too much (you better know IETF practices).

> 1. Could you consider to set Override flag after address progressed to Preferred? I need SHOULD.

> 2. Could you consider to recommend to send at least 1 unsolicited NA after address would go to preferred? I need SHOULD.



Setting O=1 would drastically increase the risk of disruption for a 'rightful' address owner, in case of duplicated addresses.

If a host configures a new preferred address while the same address is in use by another host:

- [without GRAND] the rightful owner continues to receive its traffic (and, potentially, some packets which actually belong to the new host). The new host does not have connectivity.

- [with GRAND] the same

- [ GRAND + O=1] the rightful owner losing the connectivity, and the new host starts receiving traffic for its own flows and some traffic which belongs to the rightful address owner.



--

SY, Jen Linkova aka Furry