Re: [OPSEC] Paul Wouters' Discuss on draft-ietf-opsec-probe-attribution-07: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Thu, 06 July 2023 09:46 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74B63C152567; Thu, 6 Jul 2023 02:46:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.586
X-Spam-Level:
X-Spam-Status: No, score=-14.586 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="Yw+kxOwd"; dkim=pass (1024-bit key) header.d=cisco.com header.b="nvsSa9vW"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vJR5x4JHJRQX; Thu, 6 Jul 2023 02:46:29 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3BA80C1524C8; Thu, 6 Jul 2023 02:46:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13466; q=dns/txt; s=iport; t=1688636788; x=1689846388; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=sBABf1CrdlInR4+ij1Nb2ZMja1OvOGZKxlvJ/3uwc58=; b=Yw+kxOwdHfcs43X7YlgPZ5q/dB32dTZq2ejTHBzyGBkji1lglrwkt6lA j7oNafmi1PgkOIPcoA3kXILspgi1CaYLDZsAr/z0/tpe7JeeroQoC0za9 kR1Q3DEnmwCT2gVXLmzM83rj1+ymzcOzSC2T42DyXYDZrgZcpYLmrlET2 o=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:QK7pyxMjd417W7m9Qwwl6nfIWUAX0o4cdiYP4ZYhzrVWfbvmpdLpP VfU4rNmi1qaFYnY6vcRk+PNqOigQm0P55+drWoPOIJBTR4LiMga3kQgDceJBFe9LavCZC0hF 8MEX1hgrDmgKUYAIM/lfBXJp2GqqzsbGxHxLw1wc+nrC4jZjMmf3OGp8JqVaAJN13KxZLpoJ 0CupB7K/okO1JJ/I7w4zAfIpHYAd+VNkGVvI1/S1xqp7car95kl+CNV088=
IronPort-Data: A9a23:wLfvh6qNsZfdkKdNA0wCvCpPIndeBmIlZRIvgKrLsJaIsI4StFCzt garIBmGPvaKajSje9x0aoi29h5Sv5KGyt81SwBvqCFmRiMV9+PIVI+TRqvS04x+DSFioGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILas1htZG0k8EU/NtTo5w7Ri2tEw34Dga++wk YqaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvY12O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQXlylCSSh9do9 MdA5ZqMai4KLr3hivtIBnG0EwkmVUFH0KXMLX76usuJwgifNXDt2P5pSkoxOOX0+M4uXjoIr qNeeWtLN03Z7w616OrTpu1Ei9oyKsLoMasUu2prynfSCvNOrZXrE/6QtIIDgWlYasZmRe3AO pc8RGpUaE77O0NvAFIXGpQng7L97pX4W2QI9A3KzUYt2EDU1Bd825DsPcbbPNuQSq19mV6Dq 2mD9GTwAwsBHN2S1TTD9Wij7sfDhyr1RMcTGaG2s/lym1CYg3QJDxcbEFKnveO4gFOiWtVZA 00Z5iRoqrI9nGSqQ8Lydxy1vHDCuQQTM+e8CMUg4w2Lj6HT+QvcXy4PTyVKb5ots8peqSEWO kGhofb2FCd3t6SpW3/N8Iu3hBCiKQUHMjpXDcMbdjct797mqYA1qxvASNd/DaK45uEZ/xmtn VhmSwBj2d0uYd43O7aTpg+Y3mr9znTdZktkuVWNBzPNAhZRPdb9P+SVBU7nAeGsxbt1o3Gbt 3QC3sOZ9u1LVNeGlTeGR6MGG7TBCxe53N/03wcH83oJrmTFF5ufkWZ4u2EWyKBBaZdsRNMRS BWP0T69HbcKVJdQUYd5YpiqF+MhxrX6GNLuW5j8N4QeMsUhLV/brH4yNSZ8OlwBdmByycnT3 r/FKa6R4YoyUsyLMRLvHb5GiO93rszA7TKMGPgXMChLIZLHNCLKFt/pwXOFb/sy6+ufsR7J/ tNEX/ZmOD0BONASlhL/qNZJRXhTdCBTLcmv96R/KLXZSiI4Qz5JNhMk6e57E2CTt/4Lxr6gE 7DUchIw9WcTclWecVzVOiw5Ne+0NXu9xFpiVRER0Z+T8yFLSa6k7bwUcN08erxPyQCp5aQco yUtEylYPslydw==
IronPort-HdrOrdr: A9a23:U/fkeatzQETwd1unnrpHbB/Q7skC0IMji2hC6mlwRA09TyXGra GTdaUguyMc1gx/ZJh5o6H+BEDhexnhHZ4c2/h3AV87NDOW91dAX7sSk7cKpAeQVREWl9QtmZ uIFpIfNDSeNykAsS+X2njcLz9k+qj6zEnKv5ae854Od3ARV0gI1W4QYWrrcTwVeOAFP+tFKH P23Lsgm9PUQwVuUi3NPAh9YwGsnayuqHvhW3M7Li9izDPLoSKj6bb8HRTd9AwZSSlzzbAr9n WAuxDl54242svLiSP05iv21dB7idHhwtxMCIinkc4OMAjhjQ6uecBIR6CChjYou+uigWxa0u Uk4i1Qevib2UmhOV1dkiGdnTUIFwxeskMK/GXoxUcLZ/aJHA7SRfAx3r6xOSGpmnbI9OsMoJ 6jmVjp96a+yXj77XnADx+ibWAxqqL/y0BS4tI7njhRV5ATZ6RWqpFa9ERJEI0YFCa/84w/Fv JyZfusr8q+XGnqJkwxhFMfiOCETzA2BFOLU0ICssua33xfm2141VIRwIgakm0b/JwwRpFY76 CcW54Y2Y1mX4sTd+ZwFe0BScy4BijERg/NKnubJRDiGLscM3zAppbr6PE+5f2sepYP0Jwu8a 6xGm9wpCo3YQbjGMeO1JpE/lTER3i8Ry3kzoVE651wqtTHNczW2O24OScTeueb0oEi65fgKo SO0bptcoreEVc=
X-Talos-CUID: 9a23:/+P0y2td+HdkTdAzalJowzcV6IsbV2LM12/XOnOqBDZvdJ68ak+A1bF7xp8=
X-Talos-MUID: 9a23:NlSELg+D0XkYYolBVhvS81SQf59z/fnzLW1dqpFcgJHaFRZ1OyWblSviFw==
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 06 Jul 2023 09:46:27 +0000
Received: from rcdn-opgw-2.cisco.com (rcdn-opgw-2.cisco.com [72.163.7.163]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 3669kQj1004097 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 6 Jul 2023 09:46:27 GMT
Authentication-Results: rcdn-opgw-2.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,185,1684800000"; d="scan'208";a="3870498"
Received: from mail-dm6nam10lp2103.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.103]) by rcdn-opgw-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jul 2023 09:46:26 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SqfKVVLZDaiwyGuPjRuh6WSJbRBxAfDYoiLGQyYdWHOHAC9MlMEjXoX4TDdks7ij2rRjk+y33ZO6EHi74c7ncIjCHZo+DD6esf+hFnQoP2PFpsPNIFmOUkJfceklt2JoLSTBFg41IXuXBOpWRsq8qixUQ7q80+BTLhWjHNZkBR2jrI88EcYMa49hFBMEfzp/PJrcvOPY5ARHyFnOUH14hozIQNZq//hfDl4wINC8anrmRWNkgjYOoJea6gipTOK/6P9ujHa1ztc2JLBMvI/d1Wcm1X0ksyRhxxAtXi7XwuzA7gtlpdfgp8+IqHEjCuIRXqz8YxLClCrZbKw5hePs/A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sBABf1CrdlInR4+ij1Nb2ZMja1OvOGZKxlvJ/3uwc58=; b=VoYvwGwqzp5g0dhbvo4mJGZaxexXPqhqBj9HCQ0iR5a4GDtLaeRnvJFvGRuJbZG1ggBdjp/0t0LoWPdvMPj+KNL6gCZSDbquhqYc9PO/S6kypWLUJ+nPJ2yohw9U+W/ldYZ5xdNKksrRrspYJxHYfWn/x+Osu9OwASP7AbLmB1xD54uEzEYYripR23EOjOP+KwMPvl2ADHSpj76eqcppM3f0Rs3hH2TLt/rNnxxe9HCsicJGHjj1952MFMxY47tKQFnzMT0JZ8lIiGKSakJDmRdZaiwWVPUv5Dcf3cuu2cQT0fzwrciFuZRY6ytHkaoPJGMLTIX4X5xW/FUknjLcLA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sBABf1CrdlInR4+ij1Nb2ZMja1OvOGZKxlvJ/3uwc58=; b=nvsSa9vWSXXqW8t2Af25jd2ml9bC/TzU1nCxfSF4DVlfNEiNBeCBoPEycrRF1OrR1CzliRRNG9LPGKWT26GKd0Cal3uxtLm91qgN3E2gOn5hmicguobwA0yxQWJZsepFt1MthZEw4yVguMdKjNByQ5ktAY0wVVzX321HncPWjzQ=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by DM6PR11MB4563.namprd11.prod.outlook.com (2603:10b6:5:28e::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6565.24; Thu, 6 Jul 2023 09:46:25 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6098:a11f:49e5:c244]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6098:a11f:49e5:c244%4]) with mapi id 15.20.6565.016; Thu, 6 Jul 2023 09:46:25 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Paul Wouters <paul.wouters@aiven.io>, The IESG <iesg@ietf.org>
CC: "draft-ietf-opsec-probe-attribution@ietf.org" <draft-ietf-opsec-probe-attribution@ietf.org>, "opsec-chairs@ietf.org" <opsec-chairs@ietf.org>, "opsec@ietf.org" <opsec@ietf.org>, "furry13@gmail.com" <furry13@gmail.com>
Thread-Topic: Paul Wouters' Discuss on draft-ietf-opsec-probe-attribution-07: (with DISCUSS and COMMENT)
Thread-Index: AQHZrqtHLrqrNBr7806D3wu5wuQUjq+soaQA
Date: Thu, 06 Jul 2023 09:46:25 +0000
Message-ID: <BA098B31-1C73-45CB-BC03-832157D7A691@cisco.com>
References: <168849786048.14908.6362795499792421666@ietfa.amsl.com>
In-Reply-To: <168849786048.14908.6362795499792421666@ietfa.amsl.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.74.23061800
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|DM6PR11MB4563:EE_
x-ms-office365-filtering-correlation-id: e20e9dcf-8b53-4b4d-37f5-08db7e05dd03
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(376002)(39860400002)(346002)(136003)(396003)(366004)(84040400005)(451199021)(5660300002)(8936002)(8676002)(76116006)(66946007)(66556008)(66476007)(316002)(64756008)(66446008)(4326008)(41300700001)(2906002)(91956017)(54906003)(110136005)(6486002)(71200400001)(6512007)(966005)(2616005)(66899021)(6506007)(186003)(478600001)(122000001)(83380400001)(66574015)(33656002)(36756003)(86362001)(38070700005)(38100700002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: B2YfbZBD11RNnvklD6rHwO3hltmToQW8rxTOpWkqULM7DTLVeHI5X7xdwIfgUrfZIakENMw4RY1sZdltI7lkOnMBHCi2XslnBj9OifnhuFfwWYYBKhVGdD9qstZFAxqftaaAGWj6Wu5hDMZRXfLHbIL1CEcnN3oekvvjUOxCZIKYDQN1uNnQsYO+E/Rv9RTCqihhpsdq5b3PN9AAqebRtg4LSkQPbXUpK4YjJe+LOqoxVRWTw+5sE51LsckaDIXBzdDBoOI7QTVxpG8IW8b5khAO6rGPqvlEwXe3HuEgjUKbuoHd5i4pthP7m5cqag8QXn5X2oqhk/+dRJZNNhByidhcYaYn9YCbTz9k9J6mXhySV//JmatX+bNS64ZjUvsTdZ+2Rhc2KiFJJz2fT5iAtJSnOa+omzk4zBnmw1AcZuIUDaA7fLghnk5ddStPc5HlSWPd+ACC96FlhVqKf34Y1VtSPSjv+OAdGydAyxE5F1o+t6Ooesv1mT8udTFWWlT+Sw7xNWGf3Voj8c3w7gh5wRk7YqL/lPhCh/C1+2RukZKRM3SFN+yB7Lzxm6PQXbx3VxBzq9ghDNO/J9W+DvNNQbKdb+RmkBRrIr3OZ4QExNTGV9gPDoAWg942b+4B+Piw8Olm+w7ySZrgOocKownrtChKbuPJyZ1xYiHllJkp2EzqevqHj+sTt4dGehLrYwKhcoafE4dm5XVrQnyNZpktcVLrERwwHV1NJza6t+KCLHZY0ZxiDt4hLmDwNanXcgTHHng9KDouYh6qbCFs6QgLhd+W7kcr6xpfn2kmxkM4RQyCWQjkW0/fzhWI9A84+Km6QPGX+QIEanN5vUEuPpHzjstqIVdmpAx/zJQKjZuf5mruhzvaYAOUAdYIwRl07Uww4q7QYB1DxVgr9E9v6iNaWuOPVdJKUgwknFca4NhMHN+T1DSeYosjwtQwQMvvxx5l6OhPQAYOfYXeQLfOaWao+kDddnKzYRnXK/ht+qtmiNoX4bqfi/5bIowuScTW9DZTYomOWzZ/CYjnOKmcQtTi4EdrRo8uMrIzKhW/zlRFbjvBzSFyF1MOPYrGLU5w5BhvBgqmBdEZkro4N5W1RX+MBwDgrQNlZtoR/MvXC36vxUjjTORmyu1P7kAKFogD+YxMKi2S+CggbagbLp9pqV/q+YSFuGobd1pzm3dVQ9SsjRXrJI0O/jSDOiouxEEYcWl9l8TQDHbUT+lDxcQh8r52sPjCKDJAzxSTZiw422/tOxcJxgfvrOXlVLPmLgBQU/V4Tv/QbbEPZ+pd6/U3vghAx6BAm4kdOp2TZ1vwQy8WCqY0/0uDxUilLq9/BHzhBjGLeTyOW1m1KBIKrZ/5xXjyV1lumlnyjqBnj6W2A/aScPP1HpU5s9I4pTxjgM2NGOShzswu9m/j7dTk2fzUPg4zbl9K3TrzFHEoKEYqoPLZNKPK/AAF12MjUXm6Zp/Whns7sa+9Vrsm2HDSyvTiX4j1u0NgQ3q4tgm7GluSEwJyE6yqXPbA0rsumH648Duj/1+D421/jrWJw6POiVc5kc1HJiOoIUF9N+Fj5xIdp3j0r1k7MyS7yxAfvXN6JUBFIxTI7IgHdgqqPwFTsRfUNUnb/IJyZD2YYkPGCDdyeV8lYmi4INyFE7EYJmrnUOj1aMCU
Content-Type: text/plain; charset="utf-8"
Content-ID: <01C3537B1DC6BB4EA9524176C08ABCAD@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e20e9dcf-8b53-4b4d-37f5-08db7e05dd03
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jul 2023 09:46:25.0564 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: x0rByQmQd3jwtxByYLCR6zf1dWnpwjzNIEs2p+DgfWX9GnjiRlx8dlaG/jzn/i7IXw9NLO8C1wS6IpVC6sLtuQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4563
X-Outbound-SMTP-Client: 72.163.7.163, rcdn-opgw-2.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/WXJMxFkAMiRDBXM5vomJsmNkzfk>
Subject: Re: [OPSEC] Paul Wouters' Discuss on draft-ietf-opsec-probe-attribution-07: (with DISCUSS and COMMENT)
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2023 09:46:34 -0000

Hello Paul,

Thanks for your review: it is always nice to see another point of view on your work.

Let me repeat the top part of my reply to Roman's DISCUSS (in case you have not read it) as it provides more context and explanations about what is meant by 'probe' in this case.

Then, please in-line some answers for your own points prefixed by EV>

---- start of copy -----
My understanding of your DISCUSS ballot is that this I-D is worse than the cure.

If the above statement is correct, then there is probably a disconnect between your view and the actual purpose of this I-D, which is more like "if you bumped into another car on a parking lot, then please leave a message on the damaged car windshield with your contact information". I.e., propose a reasonably sensible way to contact the researcher(s) sending those probes.

Those probe research are not common; I know about 5 teams doing (and counting me twice) such probing over the public Internet over a period of 10 years... And a vast majority of them (if not all) have applied similar mechanisms, so let's document them in an *informational* document that starts with "This document suggests some simple techniques".

More background: I was contacted only *once* in those 2 measurement campaigns of mine, and it proved really useful as it allowed a forensic analyst to contact me in a matter of hours (more information in a private / confidential discussion if you want). This was really critical and valuable in that case, therefore the suggestions in this I-D, while not perfect, are rather useful.

We could provide more context of course based on the above if it helps the IETF community.

---- end of copy ----

Regards

-éric (with -justin)

On 04/07/2023, 21:11, "Paul Wouters via Datatracker" <noreply@ietf.org <mailto:noreply@ietf.org>> wrote:


Paul Wouters has entered the following ballot position for
draft-ietf-opsec-probe-attribution-07: Discuss


When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)




Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ <https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/> 
for more information about how to handle DISCUSS and COMMENT positions.




The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/ <https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/>






----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------


I have a few issues I would like to further discuss.


This document suggests the best method for getting probe information is to use
the content of the PTR record to fire of a web request. Unfortunately, anyone
who controls their own in-addr.arpa zone can but whatever they want in their
PTR record. Eg I could probe using 193.110.157.66 and give it the PTR of
victim.com. Then I start scanning the internet, causing lots of queries to
victim.com. This can be abused as both an amplification factor and as a method
to hide my IP from victim.com's webserver. If you have the resources to run a
large scale probe from your own IP address, you can run a webserver on that IP
address (and/or portforward/NAT it your favourite CDN). I suggest removing the
suggestion of looking up the PTR record and explicitly state to MUST NOT use
the PTR record for anything but logging purposes.

EV> FYI, there is no expectation in the I-D that probed 'targets' will automatically reach to the reverse DNS server and the associated web page. The intent (and the use of it in real cases) is that a forensic security analyst looks at the packet trace dump manually, apply their common sense, then use the contact information if required. I.e., the amplification is vastly reduced to nearly zero as nothing is automated. The measurement campaign using probing are not relying on this I-D to get a reply.
EV> Moreover, in the case of out-of-band attribution relying on the source address, there is nothing in the probes themselves, i.e., even without this I-D, the probed targets (or even a real DoS attack) could also do reverse DNS and/or visiting the home page.

Section 4 is missing guidance on HTTP based probes, which can (SHOULD?) use
HTTP headers to share their information. I also feel the rest of Section 4
might not work well in practice. Inlining the probe data is usually not
possible if probing for specific TCP or UDP based protocols - and surely not
"must start at the first octet". But even if it is, and for ICMP/ICMPv6 and
HTTP based probes as well, it would reveal who is sending the probe. That could
influence the results. Eg one might want to block any probes from commercial
entities that don't reimburse, competitors, unfriendly nation states, etc. So
in practice, I doubt this is a feasible suggestion. Not even with "If the Probe
Description URI cannot be placed at the beginning of the payload, then it must
be preceded by an octet of 0x00". And lastly:

EV> About HTTP, we tried in the I-D to specify the use case to layer-3 measurements. I.e., similar technique could be used for HTTP probing indeed (e.g., by using a HTTP header), but this is out of scope for this I-D.


Note: using a magic string (i.e., a unique special opaque marker) to
signal the presence of the Probe Description URI is not recommended as
some transit nodes could apply a different processing for packets
containing this magic string.


But the probe URI is already a "magic string".

EV> I would not consider the occurrence of 'https://' in a packet as a magic string (too many false positives), but you are correct: it makes them a little more recognizable and could influence the measurement

It is expected that only researchers with good intentions will use these
techniques


No. Attackers will also use it to appear as good researchers, even point
specifically at those researchers to try and blend in. This is the exact same
problem as security.txt. It is just never really trustable. The only thing that
can be trusted is the IP address, combined with WHOIS information (and
specifically not in-addr.arpa zone content)

EV> I am afraid that our I-D is not clear enough about what the 'probing' is, hence a similar disconnect as with Roman. Probing is usually done in one packet, so hard time for an attacker to hide behind a research (the 'ping of death' excluded of course).
EV> Personally, I would not even trust an IP address as long as BCP 38 is not enforced everywhere ;-)

If a recipient cannot confirm the information or does not wish to do so,
it should treat the flows as if there were no probe attribution.


This would basically cover every single probe case except the
http://probe.ip.address/.well-known/probing.txt <http://probe.ip.address/.well-known/probing.txt> case. And even that one could
be questionable since a compromised network used for probing could pretend to
be Honest Achmed Security Research

EV> Sure, but please note that this is the opposite of the E-bit, i.e., it allows attribution to ethical researchers, these techniques are not a 'blessing' that the traffic is trusted. 

As the Probe Description URI is transmitted in the clear and as the Probe
Description File is publicly readable, Personally Identifiable
Information (PII) should not be used for email address and phone number;
a generic / group email address and phone number should be preferred.


Why does this matter? The published probing.txt contains the information
already, so it should be considered publicly leaked already. (Ironically,
scanners will indeed go looking for /.well-known/probing.txt and use the
contact info for fishing attacks etc.)

EV> Correct, it is more or less trivial to scan for probing.txt and collect the information.
EV> But, you can do this as well by scanning the home page of many sites to fetch for the 'contact' information (like our own https://www.ietf.org/contact/)

The Security Considerations also does not contain a warning that the Probe URI
might in fact be a honeypot / malicious target, trying to cause any browser
visiting it to be compromised. Or be otherwise malicious (eg hooked to
/dev/random)

EV> We could add a 'caution' in the I-D about the probing.txt could contain bad things and should not be trusted. Would it address your concerns ?


As I said about security.txt, I think probing.txt is also a bad idea. Let's
have a discussion on this. If I am in the minority, I will not block the
document from publication but will abstain.

EV> On a semi-serious note, I would love to have an ABSTAIN to have all the colors on the ballot ;-)
EV> More seriously, similar techniques have been used and are still used. Let's document them: better than nothing. I appreciate your concerns, but in the absence of another feasible solution, ABSTAIN sounds more logical to mark your opposition. Up to you obviously



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


The "one line description without a line break" seems to have its own line
break in the document. Using a .txt format suggests "human readable" which also
kind of implies 80 character width :P (similar to the security.txt discussion
not wanting to use json but kinda not wanting free flow text either)

EV> Oups, we forgot to use the \ notation of RFC 8792. Good catch, thanks
EV> a side effect of using .MD as the main file...