Re: Scripting attacks [was Next step for draft-ietf-6man-rfc6874bis]

Michael Richardson <mcr+ietf@sandelman.ca> Tue, 05 July 2022 14:47 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42442C15CF5A for <ipv6@ietfa.amsl.com>; Tue, 5 Jul 2022 07:47:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.706
X-Spam-Level:
X-Spam-Status: No, score=-1.706 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (public key: not available)" header.d=sandelman.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KysVpqfrlMJn for <ipv6@ietfa.amsl.com>; Tue, 5 Jul 2022 07:47:09 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3EF9DC15A755 for <ipv6@ietf.org>; Tue, 5 Jul 2022 07:47:08 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 16FA139528; Tue, 5 Jul 2022 11:04:06 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id u3MRLNnMOFa2; Tue, 5 Jul 2022 11:04:05 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id F25603951F; Tue, 5 Jul 2022 11:04:04 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sandelman.ca; s=mail; t=1657033444; bh=jITQEzCbjBynBg2FAwk/QMUVJJZzPhXCzSvnUFJqCvQ=; h=From:To:Subject:In-Reply-To:References:Date:From; b=8r+DHOjJbUg048YVTbu0esiTg1tehS/yzBkAI645ByFPC2XLdeB4B9ONOSFHP7bjD QISO3FU+ghvyxM8Az5GyyQHooDgm3rOz6NNStjcL+Hxa9rSeW1QSJID+SlmXKR5o0Q XYXfaQsoXosrJOfm7f1cdXEGtC+eZUKSXY3quoMZTFa8nJHbMqsAjmITmPiTGgENdy 0lZjrxd+JV2L5IV8ffaWK70z4HmB1ZRND/O7Ec3v5mBFRlsutJ7Cu3Igbw8n5ig0PJ pqfuY8DnMMeHj0WX7cCQkcfTODSzCJgEUmwhnBlfEt1fbsPEHd0DLPnR5/O5fBLzpy fls+M878WBgxQ==
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id B913A554; Tue, 5 Jul 2022 10:47:05 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, 6man <ipv6@ietf.org>
Subject: Re: Scripting attacks [was Next step for draft-ietf-6man-rfc6874bis]
In-Reply-To: <edc17d00-83c7-25df-d125-14c8f15da172@gmail.com>
References: <164938402532.17740.11717866110301931501@ietfa.amsl.com> <b1780128-2069-b32e-7ca5-86977c119f0c@gmail.com> <11d4e419-11a9-8768-abf2-1335e5f1c3d8@gmail.com> <149924f9-da30-fa79-0509-c01c439d1796@gmail.com> <5BEFA97B-CF09-44D7-8C10-017FEAE4C3A8@tiesel.net> <e6ff75e7-b6c6-ea03-2e10-b1ad95d650f0@gmail.com> <98D15BD9-A631-4D09-AE9E-9D4C750714C9@tiesel.net> <95c82ad3-2138-ab2a-7ba5-57ad80472964@gmail.com> <E5C368C5-9DAE-4C61-ADDE-B881EA11EDA0@tiesel.net> <6968ca7b-dac3-b192-41ed-a193adab7eb4@gmail.com> <529B863C-BCC9-40C1-A5B8-B0598E7DF17C@tzi.org> <bf8c5c54-d548-a40a-0381-0583ef946f26@gmail.com> <CAPt1N1=4wbqrrzvwdr4FD7awa6pkyffhwRZC3zAWLs7uzY3BJQ@mail.gmail.com> <86509E47-77CE-4210-A1B7-C1E9955D9672@tzi.org> <edc17d00-83c7-25df-d125-14c8f15da172@gmail.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 27.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Tue, 05 Jul 2022 10:47:05 -0400
Message-ID: <31680.1657032425@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/sHKADJXTsQ0r3Gl_8Rp1ALuC-Ow>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jul 2022 14:47:14 -0000

Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
    > The sweet spot seems to be about several thousand threads, which is
    > impressive. I estimate from my observations that a carefully designed
    > script could scan about 1000 addresses per second, without alarming the
    > user that something was going on. That would amount to 585 million
    > years to scan a 64 bit space, *but* only 4.6 hours to scan a 24 bit
    > space. (All based on my very ordinary Windows laptop and home network.)

So if the attacker is looking for a specific device with a known EUI, because
they have a specific attack in mind against that device, then 4.6 hours.
I leave some tabs open for weeks (Google calendar), but for many unusual
ones, if you got me to open the tab just before going to bed, I might leave
it open all night.

PS: how long to scan all of RFC1918 space... 2^24 for 10.xx, and then far
    less than double that for the rest of 172.16 and 192.168.x.y.

    > That's interesting, because it means that there is no realistic risk if
    > using a random 64 bit interface identifier, but a real exposure if
    > using a Modified EUI, since many of the bits are guessable, as
    > discussed in RFC 7707. The numbers above are clearly specific to a
    > particular scenario, but we will mention this point in the draft
    > (update coming very soon).

I think that this part of the draft might become the most interesting
argument for IPv6 for home IoT.

I was thinking that if TLS was required each time, then it would be longer,
but no point in trying TLS if the TCP SYN does not finish.

--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide