Re: [lisp] Restarting last call on LISP threats

"Joel M. Halpern" <jmh@joelhalpern.com> Thu, 12 June 2014 16:15 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 840D01A0178 for <lisp@ietfa.amsl.com>; Thu, 12 Jun 2014 09:15:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D41AW8ZMU_EG for <lisp@ietfa.amsl.com>; Thu, 12 Jun 2014 09:15:43 -0700 (PDT)
Received: from mailc2.tigertech.net (mailc2.tigertech.net [208.80.4.156]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C77691B2A9A for <lisp@ietf.org>; Thu, 12 Jun 2014 09:15:34 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailc2.tigertech.net (Postfix) with ESMTP id E8D2521EA1; Thu, 12 Jun 2014 09:15:33 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at c2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-134-230.clppva.east.verizon.net [70.106.134.230]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by mailc2.tigertech.net (Postfix) with ESMTPSA id C2D1D21E9D; Thu, 12 Jun 2014 09:15:32 -0700 (PDT)
Message-ID: <5399D22A.2040207@joelhalpern.com>
Date: Thu, 12 Jun 2014 12:15:38 -0400
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Dino Farinacci <farinacci@gmail.com>, Ross Callon <rcallon@juniper.net>
References: <d690563db20d4fca945b810a14f37090@CO1PR05MB442.namprd05.prod.outlook.com> <B3A9D234-A6A2-45DC-B8FA-623B3A86DCE8@gmail.com> <a7c188aabbfe41ef80645d2ee1d6df99@CO1PR05MB442.namprd05.prod.outlook.com> <E0485205-9FCD-46FC-B852-06259334A47C@gmail.com> <40ecc5d773874ecdbdc05763004acfa7@CO1PR05MB442.namprd05.prod.outlook.com> <A2225E25-FE9E-4F97-B86F-9C078BB6A312@gmail.com> <db040d02b9a3402c9e53e1ae6374b2bb@CO2PR05MB636.namprd05.prod.outlook.com> <BEA94770-F16C-449E-BA44-3FC8E5DE1292@gmail.com>
In-Reply-To: <BEA94770-F16C-449E-BA44-3FC8E5DE1292@gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/lisp/8LhhkO9-Gtubk6xS8g16_bIUfhc
Cc: LISP mailing list list <lisp@ietf.org>
Subject: Re: [lisp] Restarting last call on LISP threats
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jun 2014 16:15:45 -0000

I will repeat myself.
Can we PLEASE not get into debating how we would solve the weakness in 
the protocol as documented.

The question focus on is whether the protocol as specified has the 
behavior described, and if so does it result in the weakness described.
If it does, that should be described in the threats document.
if not, then it should not be so described.

The presence, absence, validity, or possibility of solutions in other 
documents, operational practices, or people's heads, are not the topic 
for the WG at this time.

PLEASE stay on topic, or we will never get our current work done.
Which means that peoples wonderful ideas on how to do more or better 
will never get publsihed.

Yours,
Joel

On 6/12/14, 11:24 AM, Dino Farinacci wrote:
>
>>> Could you describe precisely the attack you have in mind?  The only
>>> think I can see is relying on the birthday paradox but that is a
>>> completely different story.
>>
>> If an attacker is on-path it could see the nonce's (assuming that the LISP header is not encrypted, regardless of whether the data packet is encrypted). This could be an issue if the attacker is physically on-path.
>
> The source EID is encrypted so it can only see a cleartext source RLOC and can't associated it with anything.
>
> When we merge lisp-cryto logic with echo-noncing, one has to determine if an xTR should participate in echo-noncing if the payload is not decrypted properly. That is, if I get a echoed nonce back from an attacker for a nonce I know I have sent and set the E-bit, and I cannot decrypt the payload that comes from the attacker, then I don't believe any NEW reachability information about the RLOC.
>
>> This could also be an issue for attackers which are physically off-path if gleaning is used, since an attacker could use a gleaning attack to temporarily insert itself on-path, which in turn would allow it to see the nonce.
>
> So by now we know there are many issues with gleaning. So we should document them and say they shouldn't be used for the general global Internet use-case.
>
> Dino
>
>>
>> Ross
>>
>> -----Original Message-----
>> From: lisp [mailto:lisp-bounces@ietf.org] On Behalf Of Damien Saucez
>> Sent: Thursday, June 12, 2014 8:08 AM
>> To: Ronald Bonica
>> Cc: LISP mailing list list
>> Subject: Re: [lisp] Restarting last call on LISP threats
>>
>> Hello,
>>
>> I am not sure I understand exactly what you are proposing.  How can a
>> LISP router decide that a RLOC is done by simply receiving an ICMP
>> packet from an attacker (except with LSB that is discussed in Sec
>> 4.3.2.1.  )?  All the other techniques are triggered by the LISP
>> router and are protected by the nonce.
>>
>> Could you describe precisely the attack you have in mind?  The only
>> think I can see is relying on the birthday paradox but that is a
>> completely different story.
>>
>> Damien Saucez
>>
>> On 10 Jun 2014, at 21:37, Ronald Bonica <rbonica@juniper.net> wrote:
>>
>>> Dino,
>>>
>>> Exactly! So, assume the following:
>>>
>>> - LISP is deployed on the global Internet
>>> - An RLOC is mapped to some number of EID prefixes
>>> - For a subset of those EID prefixes, the above mentioned RLOC is preferred
>>> - An ITR receives a hint indicating that the RLOC is down (either through a LISP data packet or an ICMP message)
>>>
>>> The ITR will verify RLOC reachability (possibly by polling the RLOC). But until the ITR has receives a response to its poll, how should it behave? Should it continue sending traffic though the above mentioned RLOC? Or should it begin to send traffic through another RLOC, if one exists? I don't see a normative recommendation.
>>>
>>> However, both behaviors have their drawbacks and could be vectors for attack.
>>>
>>>                                                                                                           Ron
>>>
>>>
>>>> -----Original Message-----
>>>> From: Dino Farinacci [mailto:farinacci@gmail.com]
>>>> Sent: Tuesday, June 10, 2014 1:23 PM
>>>> To: Ronald Bonica
>>>> Cc: LISP mailing list list
>>>> Subject: Re: [lisp] Restarting last call on LISP threats
>>>>
>>>> As I keep saying Ron, you need to verify anything you intend to glean. The
>>>> spec says the gleaning is "a hint" and not gospel.
>>>>
>>>> Dino
>>>>
>>>> On Jun 10, 2014, at 10:06 AM, Ronald Bonica <rbonica@juniper.net> wrote:
>>>>
>>>>> Hi Dino,
>>>>>
>>>>> Given that the LISP data packet or ICMP packet may be from an attacker, is
>>>> it even safe to glean that? I think not.
>>>>>
>>>>>
>>>>> Ron
>>>>>
>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Dino Farinacci [mailto:farinacci@gmail.com]
>>>>>> Sent: Tuesday, June 10, 2014 1:04 PM
>>>>>> To: Ronald Bonica
>>>>>> Cc: LISP mailing list list
>>>>>> Subject: Re: [lisp] Restarting last call on LISP threats
>>>>>>
>>>>>>
>>>>>> On Jun 10, 2014, at 9:57 AM, Ronald Bonica <rbonica@juniper.net> wrote:
>>>>>>
>>>>>>> Earlier in this thread, we agreed that when LISP is deployed on the
>>>>>>> global
>>>>>> Internet, mapping information cannot be gleaned safely from incoming
>>>>>> LISP data packets. Following that train of thought, when LISP is
>>>>>> deployed on the global Internet, is it safe to glean routing locator
>>>>>> reachability information from incoming LISP data packets as described
>>>>>> in RFC 6830, Section 6.3, bullet 1. If not, I think that we need to mention
>>>> this in the threats document.
>>>>>>
>>>>>> What you can glean is that the source RLOC is up, but you cannot
>>>>>> glean your path to it is reachable.
>>>>>>
>>>>>>> Given that ICMP packets are easily spoofed, when LISP is deployed on
>>>>>>> the
>>>>>> global Internet, is it safe to glean routing locator reachability
>>>>>> information from incoming ICMP packets as described in RFC 6830,
>>>>>> Section 6.3, bullet 2 and bullet 4. If not, I think that we need to
>>>>>> mention this in the threats document.
>>>>>>
>>>>>> What you can glean is that the source RLOC is up, but you cannot
>>>>>> glean your path to it is reachable.
>>>>>>
>>>>>> Dino
>>>>>>
>>>>>
>>>
>>> _______________________________________________
>>> lisp mailing list
>>> lisp@ietf.org
>>> https://www.ietf.org/mailman/listinfo/lisp
>>
>> _______________________________________________
>> lisp mailing list
>> lisp@ietf.org
>> https://www.ietf.org/mailman/listinfo/lisp
>>
>> _______________________________________________
>> lisp mailing list
>> lisp@ietf.org
>> https://www.ietf.org/mailman/listinfo/lisp
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp
>