Re: IPv6 header insertion in a controlled domain

otroan@employees.org Sun, 08 December 2019 22:03 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 429221200F7 for <ipv6@ietfa.amsl.com>; Sun, 8 Dec 2019 14:03:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ONJx5d0AW3je for <ipv6@ietfa.amsl.com>; Sun, 8 Dec 2019 14:03:21 -0800 (PST)
Received: from clarinet.employees.org (clarinet.employees.org [198.137.202.74]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 436511200F6 for <ipv6@ietf.org>; Sun, 8 Dec 2019 14:03:21 -0800 (PST)
Received: from astfgl.hanazo.no (unknown [IPv6:2a01:79c:cebd:47d8:341c:af3f:45b:2496]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id 5B3744E11AED; Sun, 8 Dec 2019 22:03:20 +0000 (UTC)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by astfgl.hanazo.no (Postfix) with ESMTP id CBF92255D6A6; Sun, 8 Dec 2019 23:03:18 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3601.0.10\))
Subject: Re: IPv6 header insertion in a controlled domain
From: otroan@employees.org
In-Reply-To: <2ecefe0e-14c1-b991-754f-c2724e3fe198@gmail.com>
Date: Sun, 08 Dec 2019 23:03:18 +0100
Cc: 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <51AB190F-92A6-427D-8605-0796FAB9820A@employees.org>
References: <CALx6S3588ja9AZzBQ0dqwx0j-ki6A5tusye+odQKPyAyF+hEww@mail.gmail.com> <10E890EA-3278-44EE-881E-EBC91D419587@employees.org> <88287cb0-c0c3-f990-4dd7-338df87c7fb2@joelhalpern.com> <4E76C386-FB1E-4E48-814D-BB626466BEE3@employees.org> <CAO42Z2ze7tmkGh=E-YrPuJHMeD8V6EuxgjjaJ33iz+Ms3abNsA@mail.gmail.com> <ED9B7C60-ACDE-4107-A121-AE2DAEA6B640@employees.org> <CABNhwV0EGiMaX0Qkyk+_zqZfiaAS_RP_ewVEctgdSnMuJ3MBPw@mail.gmail.com> <8AE06652-D6DB-444D-A8BB-7924181C83E4@employees.org> <CABNhwV1Ym5xtDY+vo8haaaObhMayE+ejkUbm4Sq9A5axCQwopA@mail.gmail.com> <160F2740-7571-44D9-8995-5D2F23989DF6@employees.org> <2ecefe0e-14c1-b991-754f-c2724e3fe198@gmail.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
X-Mailer: Apple Mail (2.3601.0.10)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/qEhAc27GtbcHP7L1Es0aleb8Zdk>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2019 22:03:22 -0000

Brian,

>>>     I was thinking the obvious man in middle attack tampering with v6 header by intermediate node and possible impact to AH if used.
>> 
>> If AH is used, wouldn't A add the signature, and C when validating would know that B added the header and could do verification accordingly?
>> For a controlled domain where all of A,B and C are acting in cohort, then that wouldn't be too far fetched to assume.
>> At least a lot more probable than that AH would be used at all. ;-)
>> 
>> Any other security issues you see?
> 
> Two comments on this thread:
> 
> 1) It isn't just AH that is broken; any form whatever of cryptographic authentication of the packet header or the packet as a whole between A and C is impossible unless the key is shared between A and B. But whether that matters or not is a domain-specific decision. If I'm outside the domain, why would I care?

Right. I think Gyan's point was that header insertion made it harder to secure the tunnel between A and C.
So mainly a problem for the controlled domain itself.
ESP NULL would work fine probably, since it doesn't include payload length in the signature.
And you can ensure whatever is inserted is also treated as mutable.
Regardless, this is an inside the controlled domain problem, and one could probably define a suitable security scheme for it if required.

> 2) For me the test that matters is not whether this all works, but whether the fact that it's happening can in principle be detected from outside the domain. If it can't be detected from outside, why would I care?
> 
> Note that NAT fails test 2. I'm not convinced that SRH insertion inside a tunnel does so.

I suppose header insertion has to pass both tests.
It has to be transparent to the outside, and it has to be possible to secure within the domain.

Cheers,
Ole