Re: [NSIS] ntlp security thoughts

Henning Schulzrinne <hgs@cs.columbia.edu> Sun, 13 July 2003 13:37 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA20859 for <nsis-archive@odin.ietf.org>; Sun, 13 Jul 2003 09:37:28 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19bh2D-0007N0-5V for nsis-archive@odin.ietf.org; Sun, 13 Jul 2003 09:37:01 -0400
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id h6DDb1db028314 for nsis-archive@odin.ietf.org; Sun, 13 Jul 2003 09:37:01 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19bh2C-0007MZ-Tw; Sun, 13 Jul 2003 09:37:00 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19bh1Z-0007Lv-K6 for nsis@optimus.ietf.org; Sun, 13 Jul 2003 09:36:21 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA20770 for <nsis@ietf.org>; Sun, 13 Jul 2003 09:36:18 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19bh1X-0004Nk-00 for nsis@ietf.org; Sun, 13 Jul 2003 09:36:19 -0400
Received: from cs.columbia.edu ([128.59.16.20]) by ietf-mx with esmtp (Exim 4.12) id 19bh1X-0004Ng-00 for nsis@ietf.org; Sun, 13 Jul 2003 09:36:19 -0400
Received: from razor.cs.columbia.edu (IDENT:root@razor.cs.columbia.edu [128.59.16.8]) by cs.columbia.edu (8.12.9/8.12.9) with ESMTP id h6DDaHkM027277; Sun, 13 Jul 2003 09:36:17 -0400 (EDT)
Received: from cs.columbia.edu (IDENT:root@localhost [127.0.0.1]) by razor.cs.columbia.edu (8.11.6/8.9.3) with ESMTP id h6DDaGk00344; Sun, 13 Jul 2003 09:36:16 -0400
Message-ID: <3F115F5A.4030201@cs.columbia.edu>
Date: Sun, 13 Jul 2003 09:32:10 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
Organization: Columbia University
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4) Gecko/20030624
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Hannes Tschofenig <hannestschofenig@hotmail.com>
CC: nsis@ietf.org
Subject: Re: [NSIS] ntlp security thoughts
References: <BAY8-F54hmsmPXAPgIi0000ae17@hotmail.com>
In-Reply-To: <BAY8-F54hmsmPXAPgIi0000ae17@hotmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by cs.columbia.edu id h6DDaHkM027277
Content-Transfer-Encoding: quoted-printable
Sender: nsis-admin@ietf.org
Errors-To: nsis-admin@ietf.org
X-BeenThere: nsis@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/nsis>, <mailto:nsis-request@ietf.org?subject=unsubscribe>
List-Id: Next Steps in Signaling <nsis.ietf.org>
List-Post: <mailto:nsis@ietf.org>
List-Help: <mailto:nsis-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/nsis>, <mailto:nsis-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable

Hannes Tschofenig wrote:


Comments in-line.

> It should be noted that the introduction of the two-layer split might 
> cause that signaling messages traversing n NTLP nodes whereby only m of 
> these nodes (possibly with m<<n) support the required NSLP functionality 
> required.
> 
> Goal of this document is to describe some threats against the NTLP 
> protocol. The reader should by itself decide whether these threats 
> require countermeasures.

It might be helpful to divide these into threats that are particularly 
serious with non-NSLP-aware nodes and others that affect all nodes equally.

Also, some of these attacks can effectively be prevented or limited by 
forcing a return-routability test, without a full crypto mechanism. I 
think it would be helpful to highlight those.

Finally, it would be helpful to classify the attacks by whether they can 
be perpetrated by a remote third party (without ability to listen) or 
whether they need the attacker to be able to intercept the messages. 
Some consider the ability of backbone snooping sufficiently unlikely 
that those risks may not warrant mitigation.

> - Terminate signaling
> 
> Unprotected error messages allow an adversary to delete NTLP state (and 
> possibly NSLP state) when returned unprotected.
> 
> - Combined discovery and signaling message delivery
> 
> Combining discovery together with signaling message delivery prevents 
> usage of security mechanisms (even at the NSLP layer). Furthermore it 

Depends. If NSLP messages are individually integrity-protected with the 
sender's private key, this may not be the case.


> 
> - Create NTLP state
> 
> An RSVP path-alike message allows an adversary to create NTLP state at a 
> number of NSIS nodes along the path. This might be seen as an 
> amplification attack.

Or an adversary might just do a state-exhaustion attack by creating NTLP 
state. Here, return routability can help some since one can then limit 
the number of states that each previous hop can establish.


> 
> - Modification to the HOP address
> 
> When an RSVP path-alike signaling message is intercepted by an NTLP node 
> the HOP address is stored in the NTLP state table. This allows an 
> adversary to change routing of NTLP (and therefore NSLP messages). This 
> might either lead to messages routed to unreachable IP addresses or to 
> other NSIS nodes or to the adversary itself.

Assuming that NSLP services, such as QoS, cost money, I can then route 
the message to particularly expensive nodes, even though the data 
doesn't go there. A local reservation in Vienna can take a slight detour 
via New York, picking up reservation charges along the way. This is 
particularly helpful if one of the nodes can be located in a small 
Caribbean Island where the local telco has a cozy relationship with the 
attacker.


> 
> - Modification of the refresh period
> 
> An adversary changing the refresh period is able to control the rate at 
> which refresh messages are expected. Together with bogus state creation 
> messages this might allow an adversary to store state much longer 
> resulting in a more effective DoS attack.
> 
> Reducing the refresh interval causes NTLP nodes to expect refresh 
> messages at a higher rate. This might cause state timeouts due to the 
> absence of refresh messages.
> 
> - Teardown NTLP state
> 
> The NTLP protocol defines different operations on the NTLP state. One of 
> this operation allows to delete NTLP state information. An adversary can 
> issue a teardown message in both direction. A RSVP path-alike teardown 
> message might restrict the location of the adversary whereas the RSVP 
> resv-alike teardown message can be initiated from any location to any 
> NTLP node along the path.
> 
> The implications of deleted NTLP has implications for NSLPs (e.g. 
> reverse routing is not possible if reverse routing information is not 
> present).
> 
> - Session Ownership
> 
> Including the session identifier into the NTLP might be exploited by an 
> adversary as described in [3].
> 
> - Flow ID modification
> 
> It was mentioned that the inclusion of the flow identifier in the NTLP 
> allows NAT aware NTLPs to perform address translation independent of the 
> NSLP. It needs to be verified whether the inclusion of the flow 
> identifier for the purpose of network address translation helps in all 
> cases. As an other alternative it is necessary to enable NATs to 
> understand all NSLP protocols.
> 
> In any case if a flow identifier is included in the NTLP (unprotected) 
> then an adversary is able to modify the flow identifier to e.g. make QoS 
> reservations inefficient, exploit if for other purposes (e.g. theft of 
> service), for DoS attacks etc. The same implications can be considered 
> in case of NAT/firewall signaling.
> 
> 3. Summary
> 
> 
> As a summary it is possible to add, modify and delete any state 
> information available. This might cause NSLP signaling to become 
> ineffective or to abort. Various denial of service attacks are possible.
> 
> 4. References
> 
> [1]  M. Shore: "The NSIS Transport Layer Protocol (NTLP)", 
> <draft-shore-ntlp-00.txt>, (work in progress), May 2003.
> 
> [2] H. Schulzrinne: "GIMPS: General Internet Messaging Protocol for 
> Signaling" <draft-schulzrinne-nsis-ntlp-00.txt>, (work in progress), 
> June 2003.
> 
> [3] H. Tschofenig, et al.: "Security Implications of the Session 
> Identifier", <draft-tschofenig-nsis-sid-00.txt>, (work in progress), May 
> 2003.
> 
> _________________________________________________________________
> MSN Hotmail  -  Absolut kostenfrei! Der weltweit größte E-Mail-Anbieter 
> im Netz:  http://www.msn.de/hotmail
> 
> 
> _______________________________________________
> nsis mailing list
> nsis@ietf.org
> https://www1.ietf.org/mailman/listinfo/nsis



_______________________________________________
nsis mailing list
nsis@ietf.org
https://www1.ietf.org/mailman/listinfo/nsis