Re: [Mip4] Does MIP support RegReq authentication without having to do timekeeping?

Ahmad Muhanna <amuhanna@awardsolutions.com> Thu, 14 March 2013 20:17 UTC

Return-Path: <amuhanna@awardsolutions.com>
X-Original-To: mip4@ietfa.amsl.com
Delivered-To: mip4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A41ED11E81A8 for <mip4@ietfa.amsl.com>; Thu, 14 Mar 2013 13:17:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id srDwTXU1ZVe4 for <mip4@ietfa.amsl.com>; Thu, 14 Mar 2013 13:17:41 -0700 (PDT)
Received: from exprod8og117.obsmtp.com (exprod8og117.obsmtp.com [64.18.3.34]) by ietfa.amsl.com (Postfix) with ESMTP id B3EDD11E8189 for <mip4@ietf.org>; Thu, 14 Mar 2013 13:17:40 -0700 (PDT)
Received: from mail.awardsolutions.com ([66.142.250.98]) (using TLSv1) by exprod8ob117.postini.com ([64.18.7.12]) with SMTP ID DSNKUUIwYh8mHIeb9npjoaygpsZo3Ws+owfH@postini.com; Thu, 14 Mar 2013 13:17:40 PDT
Received: from REDWOOD.usa.awardsolutions.com ([fe80::a1f1:7708:4a71:9fee]) by Redwood.usa.awardsolutions.com ([fe80::a1f1:7708:4a71:9fee%11]) with mapi id 14.01.0438.000; Thu, 14 Mar 2013 15:17:38 -0500
From: Ahmad Muhanna <amuhanna@awardsolutions.com>
To: "Kent Leung (kleung)" <kleung@cisco.com>, Alexandru Petrescu <alexandru.petrescu@gmail.com>
Thread-Topic: [Mip4] Does MIP support RegReq authentication without having to do timekeeping?
Thread-Index: AQHOIO747rndUjrH0UWKuVF8jTknMJil8QIA//+tHqA=
Date: Thu, 14 Mar 2013 20:17:37 +0000
Message-ID: <3359F724933DFD458579D24EAC769098857A53E5@Redwood.usa.awardsolutions.com>
References: <514206FE.7050807@gmail.com> <3359F724933DFD458579D24EAC769098857A51DC@Redwood.usa.awardsolutions.com> <51421CB9.1080100@gmail.com> <CD85F32117029D4F9AEF48BDEF5536AB10215B92@xmb-aln-x03.cisco.com> <514223C4.8010905@gmail.com> <CD85F32117029D4F9AEF48BDEF5536AB10215BCB@xmb-aln-x03.cisco.com> <514226A9.9020700@gmail.com> <CD85F32117029D4F9AEF48BDEF5536AB10215C28@xmb-aln-x03.cisco.com> <51422787.5060509@gmail.com> <CD85F32117029D4F9AEF48BDEF5536AB10215C72@xmb-aln-x03.cisco.com> <51422BCB.30409@gmail.com> <CD85F32117029D4F9AEF48BDEF5536AB10215CA7@xmb-aln-x03.cisco.com> <51422D07.9070901@gmail.com> <CD85F32117029D4F9AEF48BDEF5536AB10215CD2@xmb-aln-x03.cisco.com>
In-Reply-To: <CD85F32117029D4F9AEF48BDEF5536AB10215CD2@xmb-aln-x03.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.25.208.42]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "mip4@ietf.org" <mip4@ietf.org>
Subject: Re: [Mip4] Does MIP support RegReq authentication without having to do timekeeping?
X-BeenThere: mip4@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Mobility for IPv4 <mip4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mip4>, <mailto:mip4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mip4>
List-Post: <mailto:mip4@ietf.org>
List-Help: <mailto:mip4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mip4>, <mailto:mip4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Mar 2013 20:17:41 -0000

I guess Alex has a valid concern.
In order to avoid this Hacking scenario that Alex mentioned, I suggest the following, especially the MR implementation as Alex mentioned is open and possible for modification.

When the MR sends any RRQ, the MR MUST use a good random number generator and include that in the low 32 bits of the RRQ ID.
What does this mean?
When the HA sends RRP with code 133, it always include the same random number that was sent in the RRQ. i.e., The HA will insert its timestamp in the higher order 32 bits of the RRP ID. It also copies the lower 32 bits from the RRQ into the lower 32 bits in the RRP.

How this defeat replay attack:
When MR receives the RRP, as usual, it compares the lower 32 bits of the RRP ID field to the one that was used in the RRQ and they have to be equal. This means that this RRP with code 133 can be available ONLY once. Assuming a strong random number generator at the MR.

Best Regards,
Ahmad


-----Original Message-----
From: mip4-bounces@ietf.org [mailto:mip4-bounces@ietf.org] On Behalf Of Kent Leung (kleung)
Sent: Thursday, March 14, 2013 3:07 PM
To: Alexandru Petrescu
Cc: mip4@ietf.org
Subject: Re: [Mip4] Does MIP support RegReq authentication without having to do timekeeping?

The Authenticator value is different for RRQ vs RRP. The extension carries different value based on the message. The way to calculate the value requires the shared key between MR and HA. So it's not easy for an attacker to know the key.

Kent

-----Original Message-----
From: Alexandru Petrescu [mailto:alexandru.petrescu@gmail.com]
Sent: Thursday, March 14, 2013 1:03 PM
To: Kent Leung (kleung)
Cc: mip4@ietf.org
Subject: Re: [Mip4] Does MIP support RegReq authentication without having to do timekeeping?

Le 14/03/2013 20:59, Kent Leung (kleung) a écrit :
> The RRP1 cannot be faked since the MN-HA Auth Ext protects the 
> message.

I strongly doubt that.  Were it so, then the same extension could protect the first RRQ1 as well.

I believe it is possible for an attacker HA to intercept the initial RRQ1(time=1970), and the RRP1(time=2013) and fake a RREP towards the MR. 
  No?

Alex

>
> Kent
>
> -----Original Message----- From: Alexandru Petrescu 
> [mailto:alexandru.petrescu@gmail.com] Sent: Thursday, March 14, 2013
> 12:58 PM To: Kent Leung (kleung) Cc: mip4@ietf.org Subject: Re:
> [Mip4] Does MIP support RegReq authentication without having to do 
> timekeeping?
>
> Le 14/03/2013 20:47, Kent Leung (kleung) a écrit :
>> Hmm, I'm not clear with your response.
>>
>> Let's assume the following scenario.
>>
>> 1. MR sends initial RRQ1 (time=a) to HA 2. HA sends RRP1 (time=b) 
>> with code 133
>
> Ok.  Do you think MR receiving this RRP1 will be able to safele verify 
> it is legitimate?  Or is it possible than an attacker HA fakes this
> RRP1 message?
>
>> 3. MR sends RRQ2 (time=b+) 4. HA sends RRP2(time=b+) => registration 
>> successful 5. After MR recovers from failure, MR sends RRQ3(time=c) 
>> 6. HA sends RRP3(time=d) with code 133 7. MR sends RRQ4(time=d+) 8.
>> HA sends RRP4(time=d+) => reregistration successful
>
> These latter steps 3-8 make sense.
>
> Alex
>
>>
>> We would need to confirm if #6 happens properly for a specific 
>> vendor. :) But I would expect #7 should happen if code 133 is 
>> received.
>>
>> Kent
>>
>> -----Original Message----- From: mip4-bounces@ietf.org 
>> [mailto:mip4-bounces@ietf.org] On Behalf Of Alexandru Petrescu
>> Sent: Thursday, March 14, 2013 12:40 PM To: mip4@ietf.org Subject:
>> Re: [Mip4] Does MIP support RegReq authentication without having to 
>> do timekeeping?
>>
>> Le 14/03/2013 20:38, Kent Leung (kleung) a écrit :
>>>
>>> It needs to have the time, even if it does second registration.
>>> It's not a problem it takes longer (we can send easily two 
>>> messages). But the second message will also be refused by the HA 
>>> because it still has the wrong time.
>>>
>>> KL> Why is the timestamp in the 2nd RRQ wrong?
>>
>> Because the computer has lost its time, because it was turned off 
>> long time (vehicle in garage for several weeks in winter time).
>> It now has year 1970.
>>
>> Alex
>>
>>>
>>> Kent
>>>
>>>
>>
>>
>> -- Mip4 mailing list: Mip4@ietf.org Web interface:
>> https://www.ietf.org/mailman/listinfo/mip4 Charter page:
>> http://www.ietf.org/html.charters/mip4-charter.html Supplemental
>> site: http://www.mip4.org/
>>
>>
>
>
>
>


--
Mip4 mailing list: Mip4@ietf.org
    Web interface: https://www.ietf.org/mailman/listinfo/mip4
     Charter page: http://www.ietf.org/html.charters/mip4-charter.html
Supplemental site: http://www.mip4.org/