RE: New draft-vasilenko-6man-nd-mitm-protection-00.txt

Vasilenko Eduard <vasilenko.eduard@huawei.com> Mon, 28 September 2020 15:21 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02A0A3A0F9F for <ipv6@ietfa.amsl.com>; Mon, 28 Sep 2020 08:21:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Uhqmjt8eHcFJ for <ipv6@ietfa.amsl.com>; Mon, 28 Sep 2020 08:21:25 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA0FB3A0F9D for <ipv6@ietf.org>; Mon, 28 Sep 2020 08:21:24 -0700 (PDT)
Received: from lhreml737-chm.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 69B4412F73D9DAF03863; Mon, 28 Sep 2020 16:21:23 +0100 (IST)
Received: from msceml706-chm.china.huawei.com (10.219.141.145) by lhreml737-chm.china.huawei.com (10.201.108.187) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Mon, 28 Sep 2020 16:21:23 +0100
Received: from msceml703-chm.china.huawei.com (10.219.141.161) by msceml706-chm.china.huawei.com (10.219.141.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Mon, 28 Sep 2020 18:21:22 +0300
Received: from msceml703-chm.china.huawei.com ([10.219.141.161]) by msceml703-chm.china.huawei.com ([10.219.141.161]) with mapi id 15.01.1913.007; Mon, 28 Sep 2020 18:21:22 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Fernando Gont <fgont@si6networks.com>, Fernando Gont <fernando@gont.com.ar>, "ipv6@ietf.org" <ipv6@ietf.org>
Subject: RE: New draft-vasilenko-6man-nd-mitm-protection-00.txt
Thread-Topic: New draft-vasilenko-6man-nd-mitm-protection-00.txt
Thread-Index: AdaSeuTsmbwPBnUTQn6Mp+9CxjUGVgAe/f8AAAifoOAAiAPTgAAQ7fvg///hagD//8lcgP//Vfew
Date: Mon, 28 Sep 2020 15:21:22 +0000
Message-ID: <e7e4760a9a46412583d26fd8a78415ca@huawei.com>
References: <652ba31a6ab64eb289fc731932aefba5@huawei.com> <8bb54f81-cc7d-89e1-8c4a-600b60fd7b3a@gont.com.ar> <a642b0167d4748bda6bcacada895225e@huawei.com> <a253fdc7-6889-e729-b9a4-d8fa20a4f66c@si6networks.com> <8f53085f508141b58131f4ececd502bd@huawei.com> <9baac493-37c1-9a3c-0e3d-b42d98e67f7a@si6networks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.201.168]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/uZ28MTlsB4X4WFAdNIRmIZLo-Bw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Sep 2020 15:21:27 -0000

Hi Fernando,
I have looked carefully into draft-ietf-opsec-ipv6-nd-security-00

It has small section 6.1.1 that is related to discussed topic (half a page).
It does not discuss in details attack vectors. It does not mention information leakage.
It proposes only one solution that is not compatible to "unsolicited NA" (not to permit to change MAC till reachability would expire) - it would break any clustering technology. It would not prevent MITM when server would go to reload.

You do use term "hijack" in this document for the leakage of information.
In reality "hijack" is about intercepting active flows that is not effective anymore on 70-80% of encrypted traffic (except very vulnerable DNS still not encrypted in majority of cases).
MITM is to be proxy during session initiation, when key/certificates should be accepted - it is still very possible to have MITM, many corporate resources are not properly connected to certification authorities. User would accept whatever pop up window with request "do you trust this key?".

Small section 6.3.1 is about MITM based on rogue NA  (half a page).
It does not discuss details. It does not propose any solution.
No reference that L2 switch is responsible for the solution of this problem.

That's it.
My draft discusses the problem of "rogue NA" much deeper (20x) and proposes solution on ND level.

Eduard
> -----Original Message-----
> From: Vasilenko Eduard
> Sent: 28 сентября 2020 г. 14:28
> To: 'Fernando Gont' <fgont@si6networks.com>; Fernando Gont
> <fernando@gont.com.ar>; ipv6@ietf.org
> Subject: RE: New draft-vasilenko-6man-nd-mitm-protection-00.txt
> 
> Fernando,
> > The point is that you simply can't address all ND-based MITM vectors
> > -- basically because ND has been designed with the premise that you trust your
> neighbors.
> Read the draft. I believe that rogue NA is blocked.
> 
> > Additionally, if you require layer-2 cooperation to address some of
> > them, I'm not sure why you'd not require cooperation to address all of them.
> No need for L2 cooperation for MITM based on rogue NA - it is solved just on
> ND level by current draft.
> 
> > Not sure what you mean: DHCP snooping is the equivalent of RA-guard.
> No.
> DHCP snooping creates ARP filtering table dynamically (for all ports).
> RA-guard is static filter (router ports are at the stable location). RA-guard is very
> simple and easy to implement.
> 
> > Please see draft-ietf-opsec-nd-security.
> OK. later
> 
> > However, you wither trust your neighbors, or you don't.
> The life is in general not always black and white. Some things are more
> complicated (like distributed ND) - other possibilities exist.
> 
> Ed/
> > -----Original Message-----
> > From: Fernando Gont [mailto:fgont@si6networks.com]
> > Sent: 28 сентября 2020 г. 14:03
> > To: Vasilenko Eduard <vasilenko.eduard@huawei.com>; Fernando Gont
> > <fernando@gont.com.ar>; ipv6@ietf.org
> > Subject: Re: New draft-vasilenko-6man-nd-mitm-protection-00.txt
> >
> > Hello, Eduard,
> >
> > On 28/9/20 07:13, Vasilenko Eduard wrote:
> > > Hi Fernando,
> > >> If you consider RA-guard a mitigation for RA-based attacks, then,
> > >> things like "First Hop Security"/ND inspection/SAVI would solve the
> > >> ND
> > counterpart.
> > > I have not understood what you mean by "First Hop Security"/ND
> > > inspection" -
> > it looks as very general term.
> >
> > See e.g.:
> > https://www.cisco.com/c/en/us/td/docs/ios-
> > xml/ios/ipv6_fhsec/configuration/15-sy/ip6-nd-inspect.html
> >
> >
> >
> > > I agree that SAVI deep assistance from L2 could be an alternative to
> > > what I am proposing in the draft. But
> > > - it is very complicated and expensive on switches, available only
> > > on small portion of vendors
> > > - it is better to fix L3 problem at L3 (if possible - I do not know
> > > how to fix RA MITM without simple filtering on switch)
> > > - 1st could be intruder, then SAVI would not block MITM: all users
> > > (from other subnets) would contact server and show credentials to
> > > intruder
> >
> > The point is that you simply can't address all ND-based MITM vectors
> > -- basically because ND has been designed with the premise that you trust your
> neighbors.
> >
> > Additionally, if you require layer-2 cooperation to address some of
> > them, I'm not sure why you'd not require cooperation to address all of them.
> >
> >
> >
> > > I do not agree that IPv4 and IPv6 are equal on ND/ARP security.
> > > IPv4 has DHCP - it is possible to snoop all messages and do
> > > filtering on the
> > switch. It is simple and widely supported by switches.
> > > IPv6 has no centralized authority to snoop, solution should be much
> > > more
> > complex like SAVI. Hence, it is not widely supported by switch vendors.
> >
> > Not sure what you mean: DHCP snooping is the equivalent of RA-guard.
> > FHS is the equivalent of ARP policing.
> >
> >
> > > Reference to "Trusted model" does not explain anything. Because this
> > > RFC has
> > forgotten to document all attack vectors discussed in my current draft.
> >
> > Please see draft-ietf-opsec-nd-security.
> >
> >
> >
> > > Any MITM is the leakage if information, because man-in-the-middle is
> > > capable
> > to record and even change it.
> >
> > MITM does not necesarily imply information leakage.
> >
> >
> >
> > > I do reference in the draft that encrypted authentication is the
> > > solution that
> > supersede this draft by security protection.
> > > Just one problem: it has been refused by the market.
> >
> > Indeed.
> >
> > However, you wither trust your neighbors, or you don't.
> >
> > Thanks,
> > --
> > Fernando Gont
> > SI6 Networks
> > e-mail: fgont@si6networks.com
> > PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
> >
> >
> >