Re: [multipathtcp] MPTCP backup flag attack via MP_PRIO message

Christoph Paasch <cpaasch@apple.com> Thu, 20 July 2017 15:21 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F961131C43 for <multipathtcp@ietfa.amsl.com>; Thu, 20 Jul 2017 08:21:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.322
X-Spam-Level:
X-Spam-Status: No, score=-4.322 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pRvZt9rsuB69 for <multipathtcp@ietfa.amsl.com>; Thu, 20 Jul 2017 08:21:01 -0700 (PDT)
Received: from mail-in2.euro.apple.com (mail-in2.euro.apple.com [17.72.148.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8258D1252BA for <multipathtcp@ietf.org>; Thu, 20 Jul 2017 08:21:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=apple.com; s=mailout2048s; c=relaxed/simple; q=dns/txt; i=@apple.com; t=1500564059; h=From:Sender:Reply-To:Subject:Date:Message-id:To:Cc:MIME-version:Content-type: Content-transfer-encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-reply-to:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=KVQrIr090vYcfyHdA0T3LAkPpXMBvUXWW/oGiLb0Vfc=; b=WpFnIQ7XmNJLZ7GwuiE2mZoUN3Qh0zCTBBru3lrj+Cr0DUEhXods+sA2Jx0leY3a /R2VuXcMQoC08hmpd3zh/E6BA9N3vNx2RBeFnhqP9GBuIs1oiVO4Jkl24daoK2HK kz2EtNedZDb+CI57Zl9iZ3UwJhp8+WMID55DXN/hChU35pwzZHkrZr1Yf6AaKa0i 5x+k2OwoJdsy66idmtzZR2gghkPQ9Cewwe9ehlIOwIIYLg4tZtd+WY62D4MyLRh4 nCku/yExodWvHd7PkMXuwyvNkQ8SxmTFNqxjRiI3X1FWBqggn6WDWYAs4IWOrk29 9vr8Azi3rpb+Vq05AMd51w==;
Received: from relay2.euro.apple.com (relay2.euro.apple.com [17.66.55.12]) (using TLS with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail-in2.euro.apple.com (Symantec Mail Security) with SMTP id 34.9F.06273.B5AC0795; Thu, 20 Jul 2017 16:20:59 +0100 (BST)
X-AuditID: 1148940c-d5dff70000001881-dc-5970ca5b33c2
Received: from crk-mmpp-sz03 ( [17.66.12.165]) by relay2.euro.apple.com (Symantec Mail Security) with SMTP id 1C.E6.07255.B5AC0795; Thu, 20 Jul 2017 16:20:59 +0100 (BST)
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-disposition: inline
Content-type: text/plain; CHARSET="US-ASCII"
Received: from localhost ([17.235.220.88]) by crk-mmpp-sz03.euro.apple.com (Oracle Communications Messaging Server 8.0.1.2.20170222 64bit (built Feb 22 2017)) with ESMTPSA id <0OTE003H2AMYEW00@crk-mmpp-sz03.euro.apple.com>; Thu, 20 Jul 2017 16:20:59 +0100 (IST)
Sender: cpaasch@apple.com
Date: Thu, 20 Jul 2017 17:20:58 +0200
From: Christoph Paasch <cpaasch@apple.com>
To: Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>
Cc: Alan Ford <alan.ford@gmail.com>, Zhiyun Qian <zhiyunq@cs.ucr.edu>, multipathtcp@ietf.org, Zubair <zubair-shafiq@uiowa.edu>, Franck Le <fle@us.ibm.com>, Alex Liu <alexliu@cse.msu.edu>, Ali Munir <munirali@msu.edu>
Message-id: <20170720152058.GJ3049@Chimay.local>
References: <800c331f808d608354fc00be24283cb6.squirrel@webmail.cs.ucr.edu> <742E211F-F754-4149-88E2-3BE51645F49D@gmail.com> <c0929925-1b3a-e36c-511d-bda3da312a71@uclouvain.be>
In-reply-to: <c0929925-1b3a-e36c-511d-bda3da312a71@uclouvain.be>
User-Agent: Mutt/1.7.1 (2016-10-04)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrHIsWRmVeSWpSXmKPExsUi6GTOoxt9qiDS4GS/nMXKcyuYLc5sXshi cXH1e2aLz6uvs1ks7DrOZnGj4QeLxYFvbxktXlw8xOzA4dHSM5fR4+jBTnaPnbPusnssWfKT yePZkQiPV8e+s3hMmMrpce5aH3MARxSXTUpqTmZZapG+XQJXxp5tjSwFE4Uqdm+7zdLAuI2v i5GTQ0LARGLGq7OMXYxcHEIC25kktt5dwwSTWLjwGjtEYjWjxJ1Hd9lBErwCghI/Jt9j6WLk 4GAWkJc4eF4WJMwsIC3x6O8MdghbS+L7o1YWiN5uJonHV2eygCSEBSQluu/cYQaxWQRUJR42 3weLswE1vL3dzgpiiwhYSZw6PR1sMbPAPUaJqb2/WSGaPSQeT9vMCHGEgcTkq31gzUICmxkl +ho0QWxOAQeJfXdawGpEBZQl/h6+B3aFhMBnNok/d66yT2AUmYXkiVkIT8xC8sQsJE8sYGRZ xSiem5iZo5uZZ6SXWlqUr5dYUJCTqpecn7uJERSLHlN4djBePGh4iFGAg1GJhzc2zjdSiDWx rLgy9xCjBAezkghv/Y6CSCHelMTKqtSi/Pii0pzU4kOM0hwsSuK8JqXykUIC6YklqdmpqQWp RTBZJg5OqQbGQMeGnWe+fNBbn8poL1u36ufUQzbmdjFix/KZTIuOHp38wzvKbvM6nz6/G3tK Ms+t9d6nH3Xvdk7FLQ2vgraZ+190GCV2/tujJrEyxVpCqpQjw6jGIjZ3Z6JjgJX/SeEX+89N /jyJ7X7CEo1TaQp5No8sJP+6fnuWtumDaYMvoz0/+yX2wq9KLMUZiYZazEXFiQAnrhvxwQIA AA==
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpjkeLIzCtJLcpLzFFi42IRdOJZqht9qiDSoOuulMXKcyuYLc5sXshi cXH1e2aLz6uvs1ks7DrOZnGj4QeLxYFvbxktXlw8xOzA4dHSM5fR4+jBTnaPnbPusnssWfKT yePZkQiPV8e+s3hMmMrpce5aH3MARxSXTUpqTmZZapG+XQJXxp5tjSwFE4Uqdm+7zdLAuI2v i5GTQ0LARGLhwmvsXYxcHEICqxkl7jy6yw6S4BUQlPgx+R5LFyMHB7OAvMTB87IgYWYBaYlH f2ewQ9haEt8ftbJA9HYzSTy+OpMFJCEsICnRfecOM4jNIqAq8bD5PlicDajh7e12VhBbRMBK 4tTp6WCLmQXuMUpM7f3NCtHsIfF42mZGiCMMJCZf7QNrFhLYzCjR16AJYnMKOEjsu9MCViMq oCzx9/A9lgmMgrOQ3D0L4e5ZSO6eheTuBYwsqxhFi1JzEiuN9FJLi/L1EgsKclL1kvNzNzGC Y8ecZwfjq4OGhxgFOBiVeHgXbiuIFGJNLCuuzD3EKMHBrCTCW78DKMSbklhZlVqUH19UmpNa fIhRmoNFSZy3VhMoJZCeWJKanZpakFoEk2Xi4JRqYDRYo63bflDt67clbDKG564feJn44fVu CfnlKz4dU0r67dnU6y1lreTK2RqZfN5+Ba97Y0Tb3Q7NpBuV+xY1H37IHSA8J+11cu2v7pOT N7B52lvm+0s8kqj7d+6ov5N8qPANxU/8e//tXGZ15SHj6Z88H26YTuI6d2Umg8HUM+wTlj24 fVWwzUaJpTgj0VCLuag4EQBcYJZgmQIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/KAJlN-adejxTuutHl2k12_XCXZA>
Subject: Re: [multipathtcp] MPTCP backup flag attack via MP_PRIO message
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 15:21:03 -0000

On 20/07/17 - 17:05:40, Olivier Bonaventure wrote:
> Alan,
> > 
> > Please bear in mind that the goal of MPTCP with respect to security, as discussed in the original architectural design in RFC6182, is to provide a security model no worse than TCP. So whilst this attack would be possible, it can only be done by an on-path attacker, and if succeeded would allow the on-path attacker to intercept all traffic. Which would be the same for a single-path TCP connection on the same path.
> > 
> > As a side point, the same kind of attack could be launched via REMOVE_ADDR messages, but this would not succeed since this is specified with some protection - ensuring the subflow is really unavailable through the use of TCP keepalive signals. This same protection cannot be used against the MP_PRIO since the referenced subflow is not unavailable.
> > 
> > If the WG considered this risk worth addressing, we could look at adding a nonce + signature to MP_PRIO.
> 
> Since the attacker is on path, this does not help if the attacker is on the
> first path.
> 
> > 
> > We discuss several solutions in a forthcoming paper [ICNP2017], but a
> > simple approach to cope with this attack would be to reconsider the
> > utilisation of the address identifier in the MP_PRIO option. This
> > option allows a host to set/change the priority of all the subflows
> > associated to a given address identifier on another subflow. It could
> > have use cases, such as sending MP_PRIO over a WiFi subflow to put the
> > cellular subflow in backup mode without sending a packet over the
> > cellular interface, but this looks like an edge case. Looking at the
> > attack that we have identified, the working group should evaluate the
> > removal of the address identifier in rfc6824bis. If the MP_PRIO option
> > does not include an address identifier, then it becomes impossible for
> > an attacker who is on-path of a given subflow to change the priority
> > of the other subflows.
> 
> Remove the address identifier from the MP_PRIO seems a safe solution to me.
> I do not see a benefit in sending MP_PRIO on another subflow than the one
> that you want to affect.

+1

As far as I know, there is no implementation that relies on the address-ID
in the MP_PRIO to signal the priorities.


Christoph