[mpls] LDP Security

Stewart Bryant <stewart.bryant@gmail.com> Wed, 08 November 2017 17:27 UTC

Return-Path: <stewart.bryant@gmail.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B09012946A; Wed, 8 Nov 2017 09:27:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3I0OA-j42mmC; Wed, 8 Nov 2017 09:27:43 -0800 (PST)
Received: from mail-wm0-x230.google.com (mail-wm0-x230.google.com [IPv6:2a00:1450:400c:c09::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E100612726E; Wed, 8 Nov 2017 09:27:42 -0800 (PST)
Received: by mail-wm0-x230.google.com with SMTP id r68so12031379wmr.1; Wed, 08 Nov 2017 09:27:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:subject:to:cc:references:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=jeOK59oT+VX71/wppbjdIOksV7hFkganrkwNxvkSmek=; b=jDRYthp+9qCz/O5rUDipqTpMJOzcqz6bWkYZeFCQnJw//m72SsM+XK3BIkASsw6okg yU+MDysfwDJYysN2QhUrY/FC7oOkm1szq7R8CCciAftWInh0Bdk29hBchaa7t9shqPUG Pv/YWkY83DFk7FnoRDQknXcbT0zIemdkb26qGEcvW8KmAIS8gyM70QUNXbTNA8DRPpfj usTTmpmYwJ2XPkTcKEmZgGmAMzSfLXnvY+2tIzDOWrkWdxy6njz8cjpybvaZABD/ygbX VHypadfnFQFqdCvJxk4BEWA61KVvWSisQIvZUlB+cbJZpyQMZ9p6+kS+lqeZMzZiXRbt 2/YA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:subject:to:cc:references:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=jeOK59oT+VX71/wppbjdIOksV7hFkganrkwNxvkSmek=; b=iTZSKgfABg0k5n87nmcRl+GbQDq+QZeJq9vVvkJnoqtmznRf089B9qTYhDa/AcvU94 CjOAEBnmy7OhSDmC+4Gon6YQ+lBrLx86cfIALJr3pwqNeQ2HtQdk8HsMxo5OZ9ATk5El cVILp05AErtcpHF5RSPwvLGcYjCKQDAXX6czl227FMhZQzj14YgwLJPDZGZMJ474bi46 sFF6/T6KYd7OhXN+KVsEN/H2sz0JIkUHmHvLku0rsgGYwfmdvm5Gi95C6BM9ZngAAHeL y5mDxjI919X37DiBT1430mWw4y0VjGGlHFv3ihMr+PxUTmq/zr3+UrXOnqlAzA978h5r IJ2g==
X-Gm-Message-State: AJaThX7dGxT99Z0lrxLyn5Bq77uiFPWqlLNlSy/1eRBjL6zTvDe0zMdM 8WPfWFo6T9GRywFHnvPk26kJy8D4
X-Google-Smtp-Source: ABhQp+TnqIT9Mn9rbgz/m05Cm+0eyl/AIQbSdZNglFt3xnlfT+N5mj9QcE1BznjU679s3T2NzVqLcA==
X-Received: by 10.80.144.178 with SMTP id c47mr429739eda.240.1510162061159; Wed, 08 Nov 2017 09:27:41 -0800 (PST)
Received: from [192.168.2.126] (host213-123-124-182.in-addr.btopenworld.com. [213.123.124.182]) by smtp.gmail.com with ESMTPSA id c5sm4340435edd.38.2017.11.08.09.27.40 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 08 Nov 2017 09:27:40 -0800 (PST)
From: Stewart Bryant <stewart.bryant@gmail.com>
To: sec-ads@ietf.org, "<rtg-ads@ietf.org>" <rtg-ads@ietf.org>
Cc: "mpls-chairs@ietf.org" <mpls-chairs@ietf.org>, "pals-chairs@tools.ietf.org" <pals-chairs@tools.ietf.org>, "mpls@ietf.org" <mpls@ietf.org>, "pals@ietf.org" <pals@ietf.org>
References: <2da71163-cf29-cba6-df61-d75a2cfc9c43@gmail.com> <d3b28075-d8c0-c677-1f4b-6ad5ee5539ca@gmail.com> <CAA=duU2PzZLymVZk-PR9B94Pj1WMsHe+TTv51Ukef2MaSg-DbA@mail.gmail.com> <5994f353-5306-0fa8-2d2d-024ebdbb10df@gmail.com> <CAA=duU2YLjSg8Q5PDT+u9cxn9u2xsiPu-imBJrnyL3bfkQFW7A@mail.gmail.com> <7ee4fd77-7d8d-0db2-527e-9cf91d87e634@gmail.com> <CAA=duU3nJsS86udidgkH9jhB9ZD+xaRa2A4MniAVL1BpGE78ZQ@mail.gmail.com> <cf0cb5a4-cc21-97e1-1c26-38974bf9c0be@pi.nu> <51b9e5b4-0a44-1449-a4df-91e4f9df5d6b@pi.nu> <CAA=duU2R9kBMWnRdwPPO49LF1Jc1tyrxvwkyTgaE6SC6jsVruw@mail.gmail.com> <02a50f02-779e-bc39-505c-5a51d066b3f0@pi.nu> <CAA=duU1qV-LiU5pR7VtLLVGtb-8nZHrnUqVyOKpST3-6Dr-Xgw@mail.gmail.com> <ce2c75b6-156d-da80-91d7-b7e6ba2059a0@gmail.com> <CAA=duU1xvV0genbR0CBx2rmpOWUkFmRJX3qrMEp21gTd1HOVww@mail.gmail.com> <f0d553da-0ac4-e794-5cd5-d9cc95063dc6@pi.nu>
Message-ID: <15335748-e900-280d-554f-24c55c0f3ba5@gmail.com>
Date: Wed, 08 Nov 2017 17:27:39 +0000
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0
MIME-Version: 1.0
In-Reply-To: <f0d553da-0ac4-e794-5cd5-d9cc95063dc6@pi.nu>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-GB
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/qkPmTZzpDWWu2QnFmowJCdUezj8>
Subject: [mpls] LDP Security
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Nov 2017 17:27:44 -0000

To the SEC and RTG ADs,

I am sending the following message on behalf of the MPLS and the
PALS WG Chairs.

There is a concern shared among the security community and the working 
groups that develop the LDP protocol that LDP is no longer adequately 
secured. LDP currently relies on MD5 for cryptographic security of its 
messages, but MD5 is a hash function that is no longer considered to 
meet current security requirements.

In RFC5036 (published 2007) Section 5.1 (Spoofing) , List element 2. 
Session communication carried by TCP the following statements is made:

"LDP specifies use of the TCP MD5 Signature Option to provide for the 
authenticity and integrity of session messages.

"[RFC2385] asserts that MD5 authentication is now considered by some to 
be too weak for this application.  It also points out that a similar TCP 
option with a stronger hashing algorithm (it cites SHA-1 as an example) 
could be deployed.  To our knowledge, no such TCP option has been 
defined and deployed.  However, we note that LDP can use whatever TCP 
message digest techniques are available, and when one stronger than MD5 
is specified and implemented, upgrading LDP to use it would be 
relatively straightforward."

We note that BGP has already been through this process, and replaced MD5 
with TCP-AO in RFC 7454. I would be logical to follow the same approach 
to secure LDP. However, as far as we are able to ascertain, there is 
currently no recommended, mandatory to implement, cryptographic function 
specified. We are concerned that without such a mandatory function, 
implementations will simply fall back to MD5 and we will be no further 
forward

We think that the best way forward is to publish a draft similar to RFC 
7454 that contains the following requirement:

"Implementations conforming to this RFC MUST implement TCP-AO to secure 
the TCP sessions carrying LDP in addition to the currently required TCP 
MD5 Signature Option. Furthermore, the TBD cryptographic mechanism must 
be implemented and provided to TCP-AO to secure LDP messages. The TBD 
mechanism is the preferred option, and MD5 is only to be used when TBD 
is unavailable."

We are not an experts on this part of the stack, but it seems that TCP 
security negotiation is still work in progress. If we are wrong, then we 
need to include a requirement that such negotiation is also required. In 
the absence of a negotiation protocol, however, we need to leave this as 
a configuration process until such time as the negotiation protocol work 
is complete. On completion of a suitable negotiation protocol we need to 
issue a further update requiring its use.

Additionally we should note that no cryptographic mechanism has an 
indefinite lifetime, and that implementation should note the IETF 
anticipates updating the default cryptographic mechanism over time.

The TBD default security function will need to be chosen such that it 
can reasonably be implemented on a typical router route processor, and 
which will provide adequate security without significantly degrading the 
convergence time of an LSR. Without a function that does not 
significantly impact router convergence we simply close one 
vulnerability and open another.

As experts on the LDP protocol, but not on security mechanisms, we  need 
to ask the security area for a review of our proposed approach, and help 
correcting any misunderstanding of the security issues or our 
misunderstanding of the existing security mechanisms. We also need the 
recommendations of a suitable security function (TBD in the above text).

Best regards

The MPLS WG Chairs
The PALS WG Chairs