Re: [MBONED] Benjamin Kaduk's No Objection on draft-ietf-mboned-driad-amt-discovery-11: (with COMMENT)
Benjamin Kaduk <kaduk@mit.edu> Fri, 20 December 2019 19:10 UTC
Return-Path: <kaduk@mit.edu>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47EAA120995; Fri, 20 Dec 2019 11:10:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SEoTIlqTvVlc; Fri, 20 Dec 2019 11:10:01 -0800 (PST)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3CC5120994; Fri, 20 Dec 2019 11:10:01 -0800 (PST)
Received: from kduck.mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id xBKJ9tkc030288 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Dec 2019 14:09:57 -0500
Date: Fri, 20 Dec 2019 11:09:54 -0800
From: Benjamin Kaduk <kaduk@mit.edu>
To: "Holland, Jake" <jholland@akamai.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-mboned-driad-amt-discovery@ietf.org" <draft-ietf-mboned-driad-amt-discovery@ietf.org>, "mboned-chairs@ietf.org" <mboned-chairs@ietf.org>, "mboned@ietf.org" <mboned@ietf.org>
Message-ID: <20191220190954.GN35479@kduck.mit.edu>
References: <157673506508.4859.18252907968152390250.idtracker@ietfa.amsl.com> <FEBA69F8-BF3B-4C88-8A37-52FA411F39B9@akamai.com> <20191220024643.GI35479@kduck.mit.edu> <960B7D8D-FDCE-409C-9E95-9B18A0541E85@akamai.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <960B7D8D-FDCE-409C-9E95-9B18A0541E85@akamai.com>
User-Agent: Mutt/1.12.1 (2019-06-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/fMDfJU-wHbEFeB76MnexbsQo29c>
Subject: Re: [MBONED] Benjamin Kaduk's No Objection on draft-ietf-mboned-driad-amt-discovery-11: (with COMMENT)
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Dec 2019 19:10:03 -0000
Hi Jake! On Fri, Dec 20, 2019 at 06:14:12PM +0000, Holland, Jake wrote: > Thanks Ben! > > 2 more responses for the hopefully final rev: > > On 2019-12-19, 18:47, "Benjamin Kaduk" <kaduk@mit.edu> wrote: > > The potential edit (not quite a suggestion) was to note that when we're > > using a relay-discovery procedure that involves "try one, and fall over to > > another one if it doesn't work", an attacker can disrupt one (or more) > > attempts early in the procedure to try to force a particular relay to be > > used. (That might be with the ultimate goal to intercept traffic, to alter > > traffic, to gain the ability to selectively drop traffic, or otherwise, but > > it's not terribly interesting for this point.) Furthermore, the particular > > procedure that we've chosen reduces the ability of an attacker to do so, > > since we try the relays that are "closer" (and thus harder to attack) > > first. > > This is an interesting point, but I'm reluctant to claim that this > improves the security in practice, so I'm thinking I'll leave it out. > > The reason being that although we take a close relay first (with DNS-SD, > for instance), and although that relay might be hard for an off-path > attacker to disrupt, it's likely that upstream of the DNS-SD connection > there's another gateway using DRIAD to connect to a sender-advertised > relay (the main other option being native multicast connectivity to the > sender, which is uncommon on today's internet). > > So I think the "find a close relay first" approach likely doesn't do > enough to warrant a mention as a useful mitigation to this issue, because > an attacker who can disrupt a connection and force retrying to his target > could still disrupt another connection further upstream that's still a > part of the path. Ultimately all the traffic from a sender would usually > come from relays known to the sender, except where there's native multicast > connectivity all the way to a "close" gateway (or to the receiver), which > in practice today is mostly just walled garden scenarios that already > limit the reachability for this kind of attack. Seems reasonable; thanks for thinking it through all the way. > >> Yes, but this is generic to AMT and is mentioned in the 2nd paragraph of > >> Section 6.2 of RFC 7450. I guess it's a fair point that it's not clear > >> the warning there is entirely adequate--should I try to write a section > >> about this on the grounds that I'm updating 7450 and making it more > >> widely deployable? > > > > I don't insist on it, so maybe give it a quick go and see if it looks good. > > I'll add a paragraph to the bottom of "6.1 Use of AMT" section: > > Note that AMT does not itself provide any integrity protection on > Multicast Data packets (Section 5.1.6 of [RFC7450]), so absent > protections like those mentioned above, even an off-path attacker who > discovers the gateway IP, the relay IP, and the relay source port for > an active AMT connection can inject multicast data packets for a > joined (S,G) into the data stream if he can get data packets > delivered to the gateway IP that spoof the relay as the source. That sounds good and is not too verbose, so probably is worth including. Thanks! -Ben
- [MBONED] Benjamin Kaduk's No Objection on draft-i… Benjamin Kaduk via Datatracker
- Re: [MBONED] Benjamin Kaduk's No Objection on dra… Holland, Jake
- Re: [MBONED] Benjamin Kaduk's No Objection on dra… Benjamin Kaduk
- Re: [MBONED] Benjamin Kaduk's No Objection on dra… Holland, Jake
- Re: [MBONED] Benjamin Kaduk's No Objection on dra… Benjamin Kaduk