RE: New draft-vasilenko-6man-nd-mitm-protection-00.txt

Vasilenko Eduard <vasilenko.eduard@huawei.com> Mon, 28 September 2020 11:27 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D39A23A1031 for <ipv6@ietfa.amsl.com>; Mon, 28 Sep 2020 04:27:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jeLPOdPflWHe for <ipv6@ietfa.amsl.com>; Mon, 28 Sep 2020 04:27:21 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E5DF3A102F for <ipv6@ietf.org>; Mon, 28 Sep 2020 04:27:21 -0700 (PDT)
Received: from lhreml721-chm.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 5AB3DF11ECE45F361EFD; Mon, 28 Sep 2020 12:27:19 +0100 (IST)
Received: from msceml705-chm.china.huawei.com (10.219.141.144) by lhreml721-chm.china.huawei.com (10.201.108.72) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Mon, 28 Sep 2020 12:27:19 +0100
Received: from msceml703-chm.china.huawei.com (10.219.141.161) by msceml705-chm.china.huawei.com (10.219.141.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Mon, 28 Sep 2020 14:27:18 +0300
Received: from msceml703-chm.china.huawei.com ([10.219.141.161]) by msceml703-chm.china.huawei.com ([10.219.141.161]) with mapi id 15.01.1913.007; Mon, 28 Sep 2020 14:27:18 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Fernando Gont <fgont@si6networks.com>, Fernando Gont <fernando@gont.com.ar>, "ipv6@ietf.org" <ipv6@ietf.org>
Subject: RE: New draft-vasilenko-6man-nd-mitm-protection-00.txt
Thread-Topic: New draft-vasilenko-6man-nd-mitm-protection-00.txt
Thread-Index: AdaSeuTsmbwPBnUTQn6Mp+9CxjUGVgAe/f8AAAifoOAAiAPTgAAQ7fvg///hagD//8lcgA==
Date: Mon, 28 Sep 2020 11:27:18 +0000
Message-ID: <04cf31dceba243b495ce05d5bed3965b@huawei.com>
References: <652ba31a6ab64eb289fc731932aefba5@huawei.com> <8bb54f81-cc7d-89e1-8c4a-600b60fd7b3a@gont.com.ar> <a642b0167d4748bda6bcacada895225e@huawei.com> <a253fdc7-6889-e729-b9a4-d8fa20a4f66c@si6networks.com> <8f53085f508141b58131f4ececd502bd@huawei.com> <9baac493-37c1-9a3c-0e3d-b42d98e67f7a@si6networks.com>
In-Reply-To: <9baac493-37c1-9a3c-0e3d-b42d98e67f7a@si6networks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.201.168]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/kWKK3On3h_KYVkp6ZtA-b4d_zf8>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Sep 2020 11:27:24 -0000

Fernando,
> The point is that you simply can't address all ND-based MITM vectors -- basically
> because ND has been designed with the premise that you trust your neighbors.
Read the draft. I believe that rogue NA is blocked.

> Additionally, if you require layer-2 cooperation to address some of them, I'm not
> sure why you'd not require cooperation to address all of them.
No need for L2 cooperation for MITM based on rogue NA - it is solved just on ND level by current draft.

> Not sure what you mean: DHCP snooping is the equivalent of RA-guard.
No.
DHCP snooping creates ARP filtering table dynamically (for all ports).
RA-guard is static filter (router ports are at the stable location). RA-guard is very simple and easy to implement.

> Please see draft-ietf-opsec-nd-security.
OK. later

> However, you wither trust your neighbors, or you don't.
The life is in general not always black and white. Some things are more complicated (like distributed ND) - other possibilities exist.

Ed/
> -----Original Message-----
> From: Fernando Gont [mailto:fgont@si6networks.com]
> Sent: 28 сентября 2020 г. 14:03
> To: Vasilenko Eduard <vasilenko.eduard@huawei.com>; Fernando Gont
> <fernando@gont.com.ar>; ipv6@ietf.org
> Subject: Re: New draft-vasilenko-6man-nd-mitm-protection-00.txt
> 
> Hello, Eduard,
> 
> On 28/9/20 07:13, Vasilenko Eduard wrote:
> > Hi Fernando,
> >> If you consider RA-guard a mitigation for RA-based attacks, then,
> >> things like "First Hop Security"/ND inspection/SAVI would solve the ND
> counterpart.
> > I have not understood what you mean by "First Hop Security"/ND inspection" -
> it looks as very general term.
> 
> See e.g.:
> https://www.cisco.com/c/en/us/td/docs/ios-
> xml/ios/ipv6_fhsec/configuration/15-sy/ip6-nd-inspect.html
> 
> 
> 
> > I agree that SAVI deep assistance from L2 could be an alternative to
> > what I am proposing in the draft. But
> > - it is very complicated and expensive on switches, available only on
> > small portion of vendors
> > - it is better to fix L3 problem at L3 (if possible - I do not know
> > how to fix RA MITM without simple filtering on switch)
> > - 1st could be intruder, then SAVI would not block MITM: all users
> > (from other subnets) would contact server and show credentials to
> > intruder
> 
> The point is that you simply can't address all ND-based MITM vectors -- basically
> because ND has been designed with the premise that you trust your neighbors.
> 
> Additionally, if you require layer-2 cooperation to address some of them, I'm not
> sure why you'd not require cooperation to address all of them.
> 
> 
> 
> > I do not agree that IPv4 and IPv6 are equal on ND/ARP security.
> > IPv4 has DHCP - it is possible to snoop all messages and do filtering on the
> switch. It is simple and widely supported by switches.
> > IPv6 has no centralized authority to snoop, solution should be much more
> complex like SAVI. Hence, it is not widely supported by switch vendors.
> 
> Not sure what you mean: DHCP snooping is the equivalent of RA-guard.
> FHS is the equivalent of ARP policing.
> 
> 
> > Reference to "Trusted model" does not explain anything. Because this RFC has
> forgotten to document all attack vectors discussed in my current draft.
> 
> Please see draft-ietf-opsec-nd-security.
> 
> 
> 
> > Any MITM is the leakage if information, because man-in-the-middle is capable
> to record and even change it.
> 
> MITM does not necesarily imply information leakage.
> 
> 
> 
> > I do reference in the draft that encrypted authentication is the solution that
> supersede this draft by security protection.
> > Just one problem: it has been refused by the market.
> 
> Indeed.
> 
> However, you wither trust your neighbors, or you don't.
> 
> Thanks,
> --
> Fernando Gont
> SI6 Networks
> e-mail: fgont@si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
> 
> 
>