Re: [OSPF] OSPF - Owning the Routing Table Attack

Michael Barnes <mjbarnes@cisco.com> Fri, 02 August 2013 19:05 UTC

Return-Path: <mjbarnes@cisco.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9043211E8136 for <ospf@ietfa.amsl.com>; Fri, 2 Aug 2013 12:05:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EqUK87BAb+BL for <ospf@ietfa.amsl.com>; Fri, 2 Aug 2013 12:05:40 -0700 (PDT)
Received: from mtv-iport-2.cisco.com (mtv-iport-2.cisco.com [173.36.130.13]) by ietfa.amsl.com (Postfix) with ESMTP id 8BEBF11E80EC for <ospf@ietf.org>; Fri, 2 Aug 2013 12:05:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=803; q=dns/txt; s=iport; t=1375470340; x=1376679940; h=message-id:date:from:mime-version:to:cc:subject: references:in-reply-to:content-transfer-encoding; bh=zRG97VFt8pPPZUY3D1PQ/xKHK4c2bQf1zYk3kRgcXW0=; b=D6MwrZSSu3XQNN00X1Zobl+WWRJ4MiMeRLfczaJiQ8m+IP0OrZpSvg1A cXE/fNGPD03sxVNyOCtlaogAMkyc6tUrUYEnqxUpxiVfhkqfZyb8N5yzQ +TMx+z3feKshfhkSJEAe7Px7b6SCaL2j4xCG8VNsyH7wjvQULQHmjrbph Q=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AjIFAAIC/FGrRDoG/2dsb2JhbABagwY2vGKCcIEeFnSCJAEBAQQ4QRALGAklDwJGBg0BBwEBiAu5GJAYB4QNA4kqjjWGJIsqgzcc
X-IronPort-AV: E=Sophos;i="4.89,803,1367971200"; d="scan'208";a="88287030"
Received: from mtv-core-1.cisco.com ([171.68.58.6]) by mtv-iport-2.cisco.com with ESMTP; 02 Aug 2013 19:05:38 +0000
Received: from [10.21.84.168] (sjc-vpn4-1193.cisco.com [10.21.84.168]) by mtv-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id r72J5YUF023970; Fri, 2 Aug 2013 19:05:36 GMT
Message-ID: <51FC02FD.90109@cisco.com>
Date: Fri, 02 Aug 2013 12:05:33 -0700
From: Michael Barnes <mjbarnes@cisco.com>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130110 Thunderbird/17.0.2
MIME-Version: 1.0
To: Uma Chunduri <uma.chunduri@ericsson.com>
References: <CAPLq3UNWoff2pSe9fkWsBmfW3b-CfKe9iUiPMWBNZKe=jXn0KQ@mail.gmail.com> <51FBF2C7.2080706@cisco.com> <1B502206DFA0C544B7A604691520086317449920@eusaamb105.ericsson.se>
In-Reply-To: <1B502206DFA0C544B7A604691520086317449920@eusaamb105.ericsson.se>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: "ospf@ietf.org" <ospf@ietf.org>
Subject: Re: [OSPF] OSPF - Owning the Routing Table Attack
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Aug 2013 19:05:45 -0000

On 08/02/2013 11:06 AM, Uma Chunduri wrote:
>>> What would be interesting to me, would be a way to attack OSPF when
>>> SHA-256 authentication is deployed, beyond the known replay attacks.
>
> Doesn't matter what auth algo is used for their work; if same key is used
> on all interfaces and it is compromised/got access some how (insider)
> - It's not hard to create the issues the posting documented.

If the key is compromised then what's the difference if no key is used? 
The reason I mentioned SHA-256 is that it is currently recommended 
algorithm to use. But you're right, it really doesn't matter what the 
algorithm is. I should have stated it differently.

Anyway, I think we agree that a new insider attack is not interesting 
because it's just one more of a known list.

-M