RE: FW: New Version Notification for draft-rafiee-6man-cga-attack-00.txt

"Hosnieh Rafiee" <ietf@rozanak.com> Fri, 29 November 2013 07:29 UTC

Return-Path: <ietf@rozanak.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FEF71AE13A for <ipv6@ietfa.amsl.com>; Thu, 28 Nov 2013 23:29:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yyB0g2MUg1WZ for <ipv6@ietfa.amsl.com>; Thu, 28 Nov 2013 23:29:07 -0800 (PST)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by ietfa.amsl.com (Postfix) with ESMTP id D195A1AE138 for <ipv6@ietf.org>; Thu, 28 Nov 2013 23:29:07 -0800 (PST)
Received: from kopoli (g231248182.adsl.alicedsl.de [92.231.248.182]) by mrelay.perfora.net (node=mrus0) with ESMTP (Nemesis) id 0MSceq-1WDlXN3ZGG-00RtXv; Fri, 29 Nov 2013 02:28:52 -0500
From: Hosnieh Rafiee <ietf@rozanak.com>
To: 'Christian Huitema' <huitema@microsoft.com>, 'Ray Hunter' <v6ops@globis.net>
References: <005601ceec99$ed4cfc40$c7e6f4c0$@rozanak.com> <C91E67751B1EFF41B857DE2FE1F68ABA2FBC395D@tk5ex14mbxc272.redmond.corp.microsoft.com>
In-Reply-To: <C91E67751B1EFF41B857DE2FE1F68ABA2FBC395D@tk5ex14mbxc272.redmond.corp.microsoft.com>
Subject: RE: FW: New Version Notification for draft-rafiee-6man-cga-attack-00.txt
Date: Fri, 29 Nov 2013 08:28:42 +0100
Message-ID: <000001ceecd4$a69b4aa0$f3d1dfe0$@rozanak.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQE9GJPvaSDmmxKcFe2y5aQoBrVllQKrUp7gm0oP2sA=
Content-Language: en-us
X-Provags-ID: V02:K0:T3JFsb4dRwHH5DbtavcCryvhQjbK42Zi9NEje8i8GwJ rNaWeWR+/eUf2vNvWZAwPXVhvJ/9r773tn6S6o5aGQ9+TgD6F2 kroEMD/q0Fp58WXPacob7XoliodLoEZ4jIUlG7P9lDp8nYaZUZ u7SU4/RHNWUMfw8TK7NK/ALvSB43EALlpuFZw8GaYBtQq1H3gX Cg9hrpckf77/N2fOeM8REO0eVH5GPIZMQ51ZvIuIGdlSr/4X5V kE6r2mHAF3AHRZaCa8D4thDIaKHzlT/Mipt4v/6m5VCK3Xvp/b BAtEThOWGIfd8c/A00j4D6StyqEFRXDUCjatIM9Kj/KDdJw/HC t4JcQuut9ngNDjvPMibg=
Cc: 'marcelo bagnulo braun' <marcelo@it.uc3m.es>, ipv6@ietf.org, 'Erik Nordmark' <nordmark@sonic.net>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Nov 2013 07:29:10 -0000

Christian,

> The birthday paradox really does not apply in the SEND case. It would
allow an
> attacker to generates two keys that map to the same IPv6 address, but it
> would not allow the attacker to target a specific address, you will need
the
> brute force attack for that.


As far as I know, Birthday attack applies to hash functions and not the key
which is used by SSAS. SSAS didn't use any hash function for IP generation.

 
> There is a related attack, against a group. Suppose a subnet of, say, 1024
> nodes using SEND. An attacker that generates random value has 1024 chances
> each time to find a match not for one specific node, but for some random
> member of the subnet. It will need about 2^49 trials with SEND.

https://www.hackthissite.org/articles/read/1066

In CGA, we have a hash function or like the above example, we have a hash
password. What is important for us is only find another message that leads
to the same hash. This is where birthday paradox applies. So, in CGA, the
attacker really does not care what is the content of your message, it cares
about the hash value. He only wants to have another message (or in birthday
paradox to have another person with the same birthday that matches yours) to
match yours.


> Of course, your SSAS proposal is also susceptible to that attack. In your
design,
> the 64 bits are directly derived from the key, without mixing any subnet
> prefix. Suppose an attacker lists 1 million SSAS address from the DNS. In
2^44
> trials, it will be able to find a match for at least one of them.
> 
> The value of the SEC field does not change the number of required trials,
but
> it makes each trial 2*(16*SEC) times more expensive.
> 
> >> The CGA mechanism protects an IPv6 address. All the identifier bits
> >> are part of the IPv6 address. If an attacker uses a different SEC
> >> value, it is not attacking the protected IPv6 address, but a different
one.
> >
> > I guess I am repeating myself here as I explained it before that how
> > this attack can happens
> 
> I think you are repeating yourself. If an address differs by a few bits,
it is a
> different address. The CGA mechanism answers the question, "is the sender
> the legitimate owner of the specific address." To spoof the address, you
have
> to present a candidate that matches the target completely, including the
SEC
> bits.


As I am repeating here, the problem is the verification in all nodes and
also in CGA nodes or how these nodes behave during the verification. This
actually initiate this attack and make it possible. I only refer you to NDP
document. Because I several times explained that sec value really doesn't
help and the reason is the way they verify the node. Target address as you
know is different than the source address. You only need to have the victim
target address but different source address that follows the condition of
verification that is it is enough to match only 59 bits of the Interface ID.
SeND as I explained before only adds four options and explain them and ask
the nodes to use them to verify the other node but it does not change the
way NDP works. 

Smile,
Hosnieh