Re: [OSPF] Dropping malformed LSAs (was: OSPF - Owning the Routing Table Attack)

"Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com> Thu, 12 September 2013 14:40 UTC

Return-Path: <manav.bhatia@alcatel-lucent.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7712011E81A0 for <ospf@ietfa.amsl.com>; Thu, 12 Sep 2013 07:40:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QELO2BYECEzA for <ospf@ietfa.amsl.com>; Thu, 12 Sep 2013 07:40:22 -0700 (PDT)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by ietfa.amsl.com (Postfix) with ESMTP id B6D0A11E81AB for <ospf@ietf.org>; Thu, 12 Sep 2013 07:40:22 -0700 (PDT)
Received: from us70uusmtp4.zam.alcatel-lucent.com (h135-5-2-66.lucent.com [135.5.2.66]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id r8CEeF7F022535 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Thu, 12 Sep 2013 09:40:16 -0500 (CDT)
Received: from US70UWXCHHUB01.zam.alcatel-lucent.com (us70uwxchhub01.zam.alcatel-lucent.com [135.5.2.48]) by us70uusmtp4.zam.alcatel-lucent.com (GMO) with ESMTP id r8CEeEtN021722 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 12 Sep 2013 10:40:14 -0400
Received: from SG70YWXCHHUB04.zap.alcatel-lucent.com (135.253.2.38) by US70UWXCHHUB01.zam.alcatel-lucent.com (135.5.2.48) with Microsoft SMTP Server (TLS) id 14.2.247.3; Thu, 12 Sep 2013 10:40:14 -0400
Received: from SG70YWXCHMBA05.zap.alcatel-lucent.com ([169.254.5.83]) by SG70YWXCHHUB04.zap.alcatel-lucent.com ([135.253.2.38]) with mapi id 14.02.0247.003; Thu, 12 Sep 2013 22:40:11 +0800
From: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
To: Anton Smirnov <asmirnov@cisco.com>
Thread-Topic: [OSPF] Dropping malformed LSAs (was: OSPF - Owning the Routing Table Attack)
Thread-Index: AQHOr6mG0FQ/Zi+/Tk+kM9fPB35RJJnCKoRQ
Date: Thu, 12 Sep 2013 14:40:10 +0000
Message-ID: <20211F91F544D247976D84C5D778A4C32E4B4924@SG70YWXCHMBA05.zap.alcatel-lucent.com>
References: <1375736635.93585.YahooMailNeo@web165005.mail.bf1.yahoo.com> <DC74E46E9699A84EB0E1183B90FD160928F2C192@xmb-aln-x11.cisco.com> <1376248961.41754.YahooMailNeo@web165004.mail.bf1.yahoo.com> <20211F91F544D247976D84C5D778A4C32E4B3B43@SG70YWXCHMBA05.zap.alcatel-lucent.com> <5231A28C.5030102@cisco.com>
In-Reply-To: <5231A28C.5030102@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.253.19.16]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
Cc: "ospf@ietf.org" <ospf@ietf.org>
Subject: Re: [OSPF] Dropping malformed LSAs (was: OSPF - Owning the Routing Table Attack)
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Sep 2013 14:40:28 -0000

Anton,

I understand that once the attacker can insert LSAs in the flooding domain then there are several things that can be done. However, in most cases the attacks can be easily identified and a corrective action can be easily taken. In this particular case, the attack is a little more insidious and its not straight forward catching the erring LSA.

Since its something that's missing in rfc 2328 we will keep having newer implementations that will carry this bug. A short one page RFC that updates 2328 imo would do no harm. Do you see any issue in publishing such an RFC?

I have written a short post on what the issue in 2328 is and how it can be exploited to launch an attack.
http://routingfreak.wordpress.com/2013/09/09/how-bad-is-the-ospf-vulnerability-exposed-by-black-hat/

Cheers, Manav

> -----Original Message-----
> From: Anton Smirnov [mailto:asmirnov@cisco.com] 
> Sent: Thursday, September 12, 2013 4:46 PM
> To: Bhatia, Manav (Manav)
> Cc: Gabi Nakibly; Acee Lindem; ospf@ietf.org
> Subject: Re: [OSPF] Dropping malformed LSAs (was: OSPF - 
> Owning the Routing Table Attack)
> 
>     If attacker has joined flooding domain and can inject an 
> LSA into LSDB then it can screw up routing in the domain. 
> Methods such as pretending being an ABR/ASBR and advertise 
> destinations with good metric are almost impossible to combat 
> once authentication barrier is penetrated.
>     This particular vulnerability allows attacker to bring 
> network down in style but if this vulnerability is not 
> present in the particular network then attacker will simply 
> resort to other numerous possibilities to affect routing via 
> LSA injection. If attacker can inject LSA into LSDB then your 
> network is at his mercy. Give or take one particular method 
> is a detail.
>     So IMO we don't need a draft on this particular 
> vulnerability. It might be of some limited interest to 
> document all known methods to exploit LSA injection which 
> would include this vulnerability but what value would this 
> RFC bring? Such methods are regularly published in academic 
> literature since 90-th.
> 
>     IMO we need good (reliable, secure, manageable etc) 
> methods of authenticating adjacencies. KARP group is working 
> on that. We *might* benefit from a work on mechanism to 
> prevent any router to originate reachable LSA on behalf of 
> any other router (kind of LSA signing). But work on what will 
> go wrong when intended security barriers are broken IMO is not needed.
> 
> Anton
> 
> 
> 
> On 09/12/2013 05:42 AM, Bhatia, Manav (Manav) wrote:
> > Hi Gabi,
> >
> > [clipped]
> >
> >> Nonetheless, I am sure that there are more OSPF vendors out there 
> >> that are still vulnerable to the attack and do not check for this. 
> >> Moreover, since this check is not part of the standard, in most 
> >> likelihood future OSPF implementations will also be vulnerable.
> >>
> > [clipped]
> >
> >> I am willing to write a draft describing this mitigation 
> measure. I 
> >> would appreciate the list's thoughts on this.
> > I think it's a good idea to write a draft that describes 
> the attack and what implementations MUST do to avoid it.
> >
> > Cheers, Manav
> >
> 
>