RE: [v6ops] Re: Improving ND security

"Templin (US), Fred L" <Fred.L.Templin@boeing.com> Mon, 03 August 2020 18:36 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 670EC3A09B9; Mon, 3 Aug 2020 11:36:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.2
X-Spam-Level:
X-Spam-Status: No, score=-0.2 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=boeing.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xmNP1NEy7aiv; Mon, 3 Aug 2020 11:36:25 -0700 (PDT)
Received: from clt-mbsout-01.mbs.boeing.net (clt-mbsout-01.mbs.boeing.net [130.76.144.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A35B3A09C4; Mon, 3 Aug 2020 11:36:24 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by clt-mbsout-01.mbs.boeing.net (8.15.2/8.15.2/DOWNSTREAM_MBSOUT) with SMTP id 073IaLoh003931; Mon, 3 Aug 2020 14:36:22 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=boeing.com; s=boeing-s1912; t=1596479782; bh=eyTp1lVmKExUtP3yuS3yoXyy/xfG6fWWBh2ymDaYNdk=; h=From:To:CC:Subject:Date:From; b=kbXB/FA0j+cwoEXFW73K530qbKGbXEp95cyab4Af4N3fBLibPc7cPgbRPOmexOLpr RcU0lleD9vsJ5m5qHoqbry2ITaiRpzgO4yVYcdWVjZEXRm/qZPMMsyKLCclS7dEmge EtALsjOpKuGYglSyBWJ2ipWc8j1OZPZ0K1MDDHTe3hnd+xcF8ktpG4T5WvTwMKszQP ehzWzJk95k/VTgG1sDeeQRE1ojvU7SxLBH/i+FJK0q/9E4T5QcTVTaxTNLcpHNDhi9 RHoXhkP068NP/DhsApmn61YA4jaUalN5HsEj0oUM8tyijRlNG5bl+Ez/S/YbMN05Ur opN+Hm5AwMZ8w==
Received: from XCH16-07-08.nos.boeing.com (xch16-07-08.nos.boeing.com [144.115.66.110]) by clt-mbsout-01.mbs.boeing.net (8.15.2/8.15.2/8.15.2/UPSTREAM_MBSOUT) with ESMTPS id 073IaGgE003654 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=OK); Mon, 3 Aug 2020 14:36:16 -0400
Received: from XCH16-07-10.nos.boeing.com (144.115.66.112) by XCH16-07-08.nos.boeing.com (144.115.66.110) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.1.1979.3; Mon, 3 Aug 2020 11:36:15 -0700
Received: from XCH16-07-10.nos.boeing.com ([fe80::1522:f068:5766:53b5]) by XCH16-07-10.nos.boeing.com ([fe80::1522:f068:5766:53b5%2]) with mapi id 15.01.1979.003; Mon, 3 Aug 2020 11:36:15 -0700
From: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>, Christian Huitema <huitema@huitema.net>, Fernando Gont <fernando@gont.com.ar>
CC: 6man <ipv6@ietf.org>, v6ops list <v6ops@ietf.org>
Subject: RE: [v6ops] Re: Improving ND security
Thread-Topic: [v6ops] Re: Improving ND security
Thread-Index: AdZpw9jXM9kteZhQTD+URMbCjzIWyw==
Date: Mon, 03 Aug 2020 18:36:15 +0000
Message-ID: <7eac263de7fd4616b78835b32fa98333@boeing.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [137.137.12.6]
x-tm-snts-smtp: C7168E0D02F15ED84DA101A07837D9A71F51E17B0A744A75C24F64810E939E542000:8
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/SJYx9CWcCIQaby3wBSV_-72Dq2M>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Aug 2020 18:36:27 -0000

Hi Ed,


> Hi Fred,
> SEND assumes RSA "RSASSA-PKCS1-v1_5  algorithm and SHA-1 hash" that is good enough for majority of purposes.
> Currently Elliptic-curve cryptography is more popular, but it is not mandatory - RSA is good enough.
> 
> Teredo specification assumes that "authentication algorithm, shared with the server", "agreed-upon authentication algorithm".
> Hence, it is not possible to tell exactly how secure it is.
> But because by default "To maximize interoperability, this specification defines a default algorithm in which the authentication value is
> computed according the HMAC specification [RFC2104] and the SHA1 function [FIPS-180]."
> We could say that it is much weaker then SEND, because HMAC in principle is much weaker then open key cryptography (RSA).
 


Thanks for this well-balanced note. If we consider just the cryptographic strength
of the security algorithms, then I don't mind going with SEND even though it means
also bringing along CGAs. I still have yet to understand how CGA is anything other
than a useless bag of bits for the purposes of OMNI, but if we have to carry along
CGAs we will. 



> And we are comparing orange to apple here, because
> - SEND is used for neighbor authentication
> - Teredo is the tunnel
> They have different purpose in networking.



The intention for OMNI is that the usage would be for one and the same purpose.
So, we have a tradeoff between quick-and-dirty for RFC4380 vs thorough-and-detailed
for SEND/CGA. Maybe Christian can tell us if quick-and-dirty is good enough - or maybe
he already has??

Thanks - Fred





> Eduard
> -----Original Message-----
> From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of Templin (US), Fred L
> Sent: 3 августа 2020 г. 20:20
> To: Christian Huitema <huitema@huitema.net>; Fernando Gont <fernando@gont.com.ar>
> Cc: 6man <ipv6@ietf.org>; v6ops list <v6ops@ietf.org>
> Subject: Re: [v6ops] [EXTERNAL] Re: Improving ND security
> 
> Christian,
> 
> > -----Original Message-----
> > From: Christian Huitema [mailto:huitema@huitema.net]
> > Sent: Monday, August 03, 2020 10:02 AM
> > To: Fernando Gont <fernando@gont.com.ar>
> > Cc: Templin (US), Fred L <Fred.L.Templin@boeing.com>; Pascal Thubert
> > (pthubert) <pthubert@cisco.com>; v6ops list <v6ops@ietf.org>; 6man
> > <ipv6@ietf.org>
> > Subject: Re: [v6ops] [EXTERNAL] Re: Improving ND security
> >
> > This message was sent from outside of Boeing. Please do not click
> > links or open attachments unless you recognize the sender and know that the content is safe.
> >
> > > On Aug 3, 2020, at 9:35 AM, Fernando Gont <fernando@gont.com.ar> wrote:
> > >
> > > On 3/8/20 11:22, Templin (US), Fred L wrote:
> > >> ...
> > >
> > >
> > >
> > >> But then, RFC4380 offers a “poor-man’s” alternative to SEND/CGA. It
> > >> places a message authentication code in the encapsulation
> > headers of IPv6 ND messages so that the messages can pass a rudimentary authentication check.
> > >
> > > You mean the Teredo spec? If so, I don't think it includes any sort of poor-man's SEND-CGA.
> >
> > Configuration mistakes were a big concern during the design of Teredo,
> > and that's a reason why Teredo embeds continuity tests. But these tests will not resist an on-path attacker, let alone an on-link
> attacker.
> 
> 
> 
> What has been the experience with RFC4380 security in-the-wild? Is it considered "secure enough" out of the box? Or, if you had to
> do it again would you incorporate something "more secure" like SEND/CGA?
> 
> Thanks - Fred
> 
> 
> > -- Christian Huitema
> 
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops