Re: [MBONED] Benjamin Kaduk's No Objection on draft-ietf-mboned-driad-amt-discovery-11: (with COMMENT)

Benjamin Kaduk <kaduk@mit.edu> Fri, 20 December 2019 19:10 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47EAA120995; Fri, 20 Dec 2019 11:10:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SEoTIlqTvVlc; Fri, 20 Dec 2019 11:10:01 -0800 (PST)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3CC5120994; Fri, 20 Dec 2019 11:10:01 -0800 (PST)
Received: from kduck.mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id xBKJ9tkc030288 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Dec 2019 14:09:57 -0500
Date: Fri, 20 Dec 2019 11:09:54 -0800
From: Benjamin Kaduk <kaduk@mit.edu>
To: "Holland, Jake" <jholland@akamai.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-mboned-driad-amt-discovery@ietf.org" <draft-ietf-mboned-driad-amt-discovery@ietf.org>, "mboned-chairs@ietf.org" <mboned-chairs@ietf.org>, "mboned@ietf.org" <mboned@ietf.org>
Message-ID: <20191220190954.GN35479@kduck.mit.edu>
References: <157673506508.4859.18252907968152390250.idtracker@ietfa.amsl.com> <FEBA69F8-BF3B-4C88-8A37-52FA411F39B9@akamai.com> <20191220024643.GI35479@kduck.mit.edu> <960B7D8D-FDCE-409C-9E95-9B18A0541E85@akamai.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <960B7D8D-FDCE-409C-9E95-9B18A0541E85@akamai.com>
User-Agent: Mutt/1.12.1 (2019-06-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/fMDfJU-wHbEFeB76MnexbsQo29c>
Subject: Re: [MBONED] Benjamin Kaduk's No Objection on draft-ietf-mboned-driad-amt-discovery-11: (with COMMENT)
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Dec 2019 19:10:03 -0000

Hi Jake!

On Fri, Dec 20, 2019 at 06:14:12PM +0000, Holland, Jake wrote:
> Thanks Ben!
> 
> 2 more responses for the hopefully final rev:
> 
> On 2019-12-19, 18:47, "Benjamin Kaduk" <kaduk@mit.edu> wrote:
> > The potential edit (not quite a suggestion) was to note that when we're
> > using a relay-discovery procedure that involves "try one, and fall over to
> > another one if it doesn't work", an attacker can disrupt one (or more)
> > attempts early in the procedure to try to force a particular relay to be
> > used.  (That might be with the ultimate goal to intercept traffic, to alter
> > traffic, to gain the ability to selectively drop traffic, or otherwise, but
> > it's not terribly interesting for this point.)  Furthermore, the particular
> > procedure that we've chosen reduces the ability of an attacker to do so,
> > since we try the relays that are "closer" (and thus harder to attack)
> > first.
> 
> This is an interesting point, but I'm reluctant to claim that this
> improves the security in practice, so I'm thinking I'll leave it out.
> 
> The reason being that although we take a close relay first (with DNS-SD,
> for instance), and although that relay might be hard for an off-path
> attacker to disrupt, it's likely that upstream of the DNS-SD connection
> there's another gateway using DRIAD to connect to a sender-advertised
> relay (the main other option being native multicast connectivity to the
> sender, which is uncommon on today's internet).
> 
> So I think the "find a close relay first" approach likely doesn't do
> enough to warrant a mention as a useful mitigation to this issue, because
> an attacker who can disrupt a connection and force retrying to his target
> could still disrupt another connection further upstream that's still a
> part of the path.  Ultimately all the traffic from a sender would usually
> come from relays known to the sender, except where there's native multicast
> connectivity all the way to a "close" gateway (or to the receiver), which
> in practice today is mostly just walled garden scenarios that already
> limit the reachability for this kind of attack.

Seems reasonable; thanks for thinking it through all the way.

> >> Yes, but this is generic to AMT and is mentioned in the 2nd paragraph of
> >> Section 6.2 of RFC 7450.  I guess it's a fair point that it's not clear
> >> the warning there is entirely adequate--should I try to write a section
> >> about this on the grounds that I'm updating 7450 and making it more
> >> widely deployable?
> >
> > I don't insist on it, so maybe give it a quick go and see if it looks good.
> 
> I'll add a paragraph to the bottom of "6.1 Use of AMT" section:
> 
>    Note that AMT does not itself provide any integrity protection on
>    Multicast Data packets (Section 5.1.6 of [RFC7450]), so absent
>    protections like those mentioned above, even an off-path attacker who
>    discovers the gateway IP, the relay IP, and the relay source port for
>    an active AMT connection can inject multicast data packets for a
>    joined (S,G) into the data stream if he can get data packets
>    delivered to the gateway IP that spoof the relay as the source.

That sounds good and is not too verbose, so probably is worth including.
Thanks!

-Ben