Re: [manet] I-D Action: draft-ietf-manet-nhdp-sec-threats-01.txt

Abdussalam Baryun <abdussalambaryun@gmail.com> Mon, 25 February 2013 12:36 UTC

Return-Path: <abdussalambaryun@gmail.com>
X-Original-To: manet@ietfa.amsl.com
Delivered-To: manet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA42121F92EB for <manet@ietfa.amsl.com>; Mon, 25 Feb 2013 04:36:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.557
X-Spam-Level:
X-Spam-Status: No, score=-3.557 tagged_above=-999 required=5 tests=[AWL=0.041, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1psqCW7FJ1FN for <manet@ietfa.amsl.com>; Mon, 25 Feb 2013 04:36:10 -0800 (PST)
Received: from mail-da0-f50.google.com (mail-da0-f50.google.com [209.85.210.50]) by ietfa.amsl.com (Postfix) with ESMTP id DC70421F92E2 for <manet@ietf.org>; Mon, 25 Feb 2013 04:36:09 -0800 (PST)
Received: by mail-da0-f50.google.com with SMTP id h15so1255606dan.37 for <manet@ietf.org>; Mon, 25 Feb 2013 04:36:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=hQWg6ctUlcl1QjG7MPQOa4y+DwnkwCfqFclQQiDFnvc=; b=d3FwfHFkPpEmGr3IqI7WCyK+PUMCVJjJV8yIk6fxGshmaxeOvml9c613aqmyNigZuu s1EhhTYlwXrkl2+zcMi/UPXMHsQo9SgzdIRrRHwG0DO4l6Q4RbhaSy3ndFunz89Nk9SV KHHHUgxvOtyVQRBuVk5bmYpUGFdlzjAc+YgD7XGKHc+qawvwJXy5f3BCJOK6kOdFQV2j +38ucbCmVOZgQC8c59mKs4v99g168E9wP3bgPXRq0lb937dW6Vvybs0EqZwaVtc3QOvJ sG1A1q5B1QE4zXVCi4p2uGN9/8h8/P5mDqkUIjVooGmPj/8nYOiAUSbAXEwzEH6s9fgy F39A==
MIME-Version: 1.0
X-Received: by 10.68.217.2 with SMTP id ou2mr17879601pbc.6.1361795762473; Mon, 25 Feb 2013 04:36:02 -0800 (PST)
Received: by 10.68.33.132 with HTTP; Mon, 25 Feb 2013 04:36:02 -0800 (PST)
In-Reply-To: <512B1BD3.8080303@fkie.fraunhofer.de>
References: <20121022205917.15922.83347.idtracker@ietfa.amsl.com> <CADnDZ8_CGk-DMzcArFGkBVNa8J5=DSdzFpuA1tV5Nsz9kSe8nA@mail.gmail.com> <92A0E0AF-F962-4BC6-A1DA-27D7C26945C1@jiaziyi.com> <CADnDZ89Bge5RkTcMgfTp0Vz9epb+PagRRdet1ncfc9dKNvZ8YA@mail.gmail.com> <CAK=bVC--_HKdrqFkogPtieg6G6r7ABkBzz326rhNk8_1tCsEog@mail.gmail.com> <CADnDZ8-UUh-vnNEEMTECSS1Zarhe72=QTi0P34A=podEFm7Gtw@mail.gmail.com> <CAK=bVC8DtniriGpAi6Rhd4y4=4xEhH91eDepWZeZXUjSb4qKjg@mail.gmail.com> <CADnDZ89h6ePrk0SLyr7NhXJJV73jnLsgf8iKmiMFaLf4XG2yLw@mail.gmail.com> <CAGnRvuri3qXtDf-4KMsCCA1CHS=bhS33-ZkgvBJ-+v5V3+WX4w@mail.gmail.com> <CAK=bVC96NDWJ6dJJ_VMe9JRjnMJa8X9cakUvqhd9aLO-3zuctw@mail.gmail.com> <CADnDZ88a0w64ffxjbU=oqnMOG25yLhAVrDg7o5CfV1_TGpRWgg@mail.gmail.com> <CAK=bVC-X6fCU7rAqmY2KfiaEy=Amy04_HwFPpkv_Lq=vkejPRA@mail.gmail.com> <CADnDZ88QAHrmNjJO87tuVGTZ8YDcYt0-YJuYX=oOm+L6Fy-Xgg@mail.gmail.com> <512B15DC.1030002@fkie.fraunhofer.de> <CADnDZ88f-ah1S+Vscg3VyC28z+uuye0PCD9SK1oG5KqVaadKFA@mail.gmail.com> <512B1BD3.8080303@fkie.fraunhofer.de>
Date: Mon, 25 Feb 2013 12:36:02 +0000
Message-ID: <CADnDZ8-hftiaswFfwP8R_AEn=4RQXRrBpP91rMvAMbGDJW9Lfg@mail.gmail.com>
From: Abdussalam Baryun <abdussalambaryun@gmail.com>
To: Henning Rogge <henning.rogge@fkie.fraunhofer.de>
Content-Type: multipart/alternative; boundary="e89a8ff2430badcbe504d68bc83a"
Cc: manet@ietf.org
Subject: Re: [manet] I-D Action: draft-ietf-manet-nhdp-sec-threats-01.txt
X-BeenThere: manet@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Mobile Ad-hoc Networks <manet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/manet>, <mailto:manet-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/manet>
List-Post: <mailto:manet@ietf.org>
List-Help: <mailto:manet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2013 12:36:11 -0000

Hi Henning,

I agree that we should first had RFC5444-sec-threats, but don't mind just
doing NHDP because this discovery protocol is used by our routing
protocols. We should focus on the NHDP's processes and information if
attacked in this doc. Comments below,


> Okay, I will explain it once again.
>
> RFC6130 mentions the possibility (among other things) to use packet
> sequence numbers for hysteresis calculations, without going into details
> what to do with them.
>

I agree not to go into details as well, I like that, but want details what
are the information in NHDP,


>
> Because of this its a not a good idea to describe the "drop duplicate
> because of spoofed high sequence numbers attack", because the attack does
> not apply to this case at all. The duplicate detection described for
> RFC5444 does only work for message sequence numbers.
>

We don't want to describe the duplicate detection, I wanted to describe the
threats is a change in the NHDP information which may be wrong info. Any
information in NHDP may be used by the router. Some think it is threat to
router only, I think no also NHDP is attacked in its useless info that may
be useful for more important functions in the node.


>
> An attack on packet sequence level would not be a NHDP attack but a
> RFC5444 (de-)multiplixer attack, which would belong into a
> packetbb-sec-threats document.
>
>
>
All messages are in RFC5444 packet , if the packet attacked then message is
attacked,
if the message is attacked may not mean that packet is attacked. Does that
make sense?

I agree that we will need packetbb-sec-threat to be added in all threat
documents that use packetbb, but if we don't have now a participant
volunteering on the packetbb-threat then we should add related issues in
our other threat docs. We separated routing and NHDP but I don't agree to
separate messaging from protocols because such protocols not only use
packetbb but eat packetbb,


>
> There was a hysteresis implementation example in OLSRv1 (RFC3626)... it
> didn't worked well. I think that is the reason NHDP only gives some hints
> what you could look at when implementing a hysteresis function.
>
> NHDP also mentions the possibility to use signal-to-noise ratio or
> packet-acknowledgements.
>

maybe that SNR can be a threat but did not see a wg routing using that
info. If the NHDP is updating SNR and another routing protocol is using
that info from NHDP, I think if an attack on SNR then it will affect the
NHDP info and then the routing process.


>
> Do you want to add "threats descriptions and mitigations" to this attacks
> too?
>

Threats documented are not only to the NHDP processes, but also its
information. If the NHDP does not use one information item, then it does
not mean that if the item information was attacked the NHDP is not
attacked. Any information in NHDP is the NHDP responsibility don't you
think,

>
> If I ever write down my "packet sequence number based ETX", it should
> contain a "security" section because it would be the first Manet-WG
> document using the packet sequence numbers I think.
>
>
>

I did not want to make it complicated just simple issues that affect the
neighbor discovery related to our standard routings OLSR and AODV.

AB