RE: ICMP PTB spoofing attacks (was: RE: 6MAN: Adoption call on draft-hinden-6man-rfc1981bis-01)
"Templin, Fred L" <Fred.L.Templin@boeing.com> Fri, 05 February 2016 18:42 UTC
Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ABCB31A8770 for <ipv6@ietfa.amsl.com>; Fri, 5 Feb 2016 10:42:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P1WvC8DmJWNC for <ipv6@ietfa.amsl.com>; Fri, 5 Feb 2016 10:42:47 -0800 (PST)
Received: from blv-mbsout-02.boeing.com (blv-mbsout-02.boeing.com [130.76.32.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 342B81A876B for <ipv6@ietf.org>; Fri, 5 Feb 2016 10:42:47 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by blv-mbsout-02.boeing.com (8.14.4/8.14.4/DOWNSTREAM_MBSOUT) with SMTP id u15IgqEu025258; Fri, 5 Feb 2016 10:42:53 -0800
Received: from XCH-BLV-505.nw.nos.boeing.com (xch-blv-505.nw.nos.boeing.com [130.247.25.195]) by blv-mbsout-02.boeing.com (8.14.4/8.14.4/UPSTREAM_MBSOUT) with ESMTP id u15IgpKc025251 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=OK); Fri, 5 Feb 2016 10:42:51 -0800
Received: from XCH-BLV-105.nw.nos.boeing.com ([169.254.5.221]) by XCH-BLV-505.nw.nos.boeing.com ([169.254.5.220]) with mapi id 14.03.0235.001; Fri, 5 Feb 2016 10:42:44 -0800
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: Fernando Gont <fgont@si6networks.com>, "Fred Baker (fred)" <fred@cisco.com>
Subject: RE: ICMP PTB spoofing attacks (was: RE: 6MAN: Adoption call on draft-hinden-6man-rfc1981bis-01)
Thread-Topic: ICMP PTB spoofing attacks (was: RE: 6MAN: Adoption call on draft-hinden-6man-rfc1981bis-01)
Thread-Index: AdFgO8UgUUOFg9xdTwqIJb3fPhAIDQARpl8AABAVV8D//4dJAIAAg16g
Date: Fri, 05 Feb 2016 18:42:44 +0000
Message-ID: <2134F8430051B64F815C691A62D983183395F0CE@XCH-BLV-105.nw.nos.boeing.com>
References: <2134F8430051B64F815C691A62D983183395EF42@XCH-BLV-105.nw.nos.boeing.com> <56B4E39A.5040608@si6networks.com> <2134F8430051B64F815C691A62D983183395F017@XCH-BLV-105.nw.nos.boeing.com> <56B4EA46.3080102@si6networks.com>
In-Reply-To: <56B4EA46.3080102@si6networks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [130.247.104.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-TM-AS-MML: disable
Archived-At: <http://mailarchive.ietf.org/arch/msg/ipv6/bkBXWaS9ITYwImyRpE-oGGp4Or8>
Cc: 6man WG <ipv6@ietf.org>, Bob Hinden <bob.hinden@gmail.com>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Feb 2016 18:42:48 -0000
Hi Fernando, > -----Original Message----- > From: Fernando Gont [mailto:fgont@si6networks.com] > Sent: Friday, February 05, 2016 10:31 AM > To: Templin, Fred L; Fred Baker (fred) > Cc: Bob Hinden; 6man WG > Subject: Re: ICMP PTB spoofing attacks (was: RE: 6MAN: Adoption call on draft-hinden-6man-rfc1981bis-01) > > On 02/05/2016 03:25 PM, Templin, Fred L wrote: > > Hi Fernando, > > > >> -----Original Message----- > >> From: Fernando Gont [mailto:fgont@si6networks.com] > >> Sent: Friday, February 05, 2016 10:02 AM > >> To: Templin, Fred L; Fred Baker (fred) > >> Cc: 6man WG; Bob Hinden > >> Subject: Re: ICMP PTB spoofing attacks (was: RE: 6MAN: Adoption call on draft-hinden-6man-rfc1981bis-01) > >> > >> On 02/05/2016 02:46 PM, Templin, Fred L wrote: > >>> Hi Fred, > >>> > >>>> As soon as I say "there is no such attack", one will materialize, so I won't assert that. However, I am not aware of attacks in > which > >>>> someone creates ICMP PTBs and sends them to someone else in order to reduce their windows unnecessarily. > >>> > >>> RFC4821 Section 11 (Security Considerations) recognizes the potential for spoofed > >>> (i.e., inaccurate) ICMP PTB messages and suggests a mitigation (ignore all ICMP PTBs). > >>> For paths over which any node in the network can inject an inaccurate ICMP PTB > >>> message, an attack vector exists. > >> > >> In theory, you can do some basic validation for ICMP messages. However, > >> in v6, as a result of possible EHs, you may not find any meaningful data > >> in the ICMP payload to apply validity checks on. > >> > >> Anyway, you can implement the countermeasure we implemented in > >> <https://tools.ietf.org/html/rfc5927#section-7.2> -- I implemented it > >> for OpenBSD, and it still runs it... and IIRC it was ported to at least > >> NetBSD later. > > > > Thanks for the reference. It seems to account for the case of paths that may > > deliver inaccurate ICMP PTBs, but does not account for the case of paths that > > fail to deliver accurate ICMP PTBs. Do we know of paths always deliver > > accurate ICMP PTBs but can also deliver inaccurate ICMP PTBs? > > What do you mean by "accurate"? By "accurate" I mean: - the router that sends the ICMP PTB is telling the truth that there is a restricting link - the MTU value that the router writes in the PTB is in fact the true MTU of the restricting link Thanks - Fred fred.l.templin@boeing.com > -- > Fernando Gont > SI6 Networks > e-mail: fgont@si6networks.com > PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 > > > >
- Re: ICMP PTB spoofing attacks (was: RE: 6MAN: Ado… Fernando Gont
- Re: ICMP PTB spoofing attacks Mark Andrews
- Re: ICMP PTB spoofing attacks Fernando Gont
- RE: ICMP PTB spoofing attacks (was: RE: 6MAN: Ado… Templin, Fred L
- ICMP PTB spoofing attacks (was: RE: 6MAN: Adoptio… Templin, Fred L
- Re: ICMP PTB spoofing attacks (was: RE: 6MAN: Ado… Fernando Gont
- RE: ICMP PTB spoofing attacks (was: RE: 6MAN: Ado… Templin, Fred L
- Re: ICMP PTB spoofing attacks (was: RE: 6MAN: Ado… Fernando Gont
- RE: ICMP PTB spoofing attacks (was: RE: 6MAN: Ado… Templin, Fred L
- Re: ICMP PTB spoofing attacks (was: RE: 6MAN: Ado… Fernando Gont