Re: [secdir] SECDIR review of draft-ietf-manet-nhdp-sec-threats-04

Matthew Lepinski <mlepinski.ietf@gmail.com> Tue, 11 June 2013 17:38 UTC

Return-Path: <mlepinski.ietf@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 682FC21F9702; Tue, 11 Jun 2013 10:38:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7I8s4F9v51IM; Tue, 11 Jun 2013 10:38:28 -0700 (PDT)
Received: from mail-qe0-f46.google.com (mail-qe0-f46.google.com [209.85.128.46]) by ietfa.amsl.com (Postfix) with ESMTP id EBFB721F8ADF; Tue, 11 Jun 2013 10:38:27 -0700 (PDT)
Received: by mail-qe0-f46.google.com with SMTP id nd7so2445224qeb.5 for <multiple recipients>; Tue, 11 Jun 2013 10:38:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=ib8Hz7NolrPF8B8/uQT2iOfiEpC8O9MVMyv4Wq07z8o=; b=PvcPtdt/cl9FyAyuVFLChwKFX9KzCbQwBd5XxL2PMi7aR/ZYIPhicQo+VlajQwEPqO 5CMBo9wMt+j4GZ27Tgt7svgx67D7N9rw35mu8ugdL+GVpXwRk861VcPyeoPDYaD4vw0Z MevPYjlI8IAUshuxhcLcKseQzLUGfzs4GXCQlcRdCXsy1DuiklhqkxacfJzjkHVv8iQA h94PhimI6EAdsiL5002HrM8+wITS7irZiMTHt+TmWEiWupKweSXAm80HiGp5gePh9jBY wUhnCzkZdtVDtPsT/fleKJk1WzGUyXTKiadblO0wUbgphz8wgfndh85PAIvm4StEUfR9 OywQ==
MIME-Version: 1.0
X-Received: by 10.224.161.83 with SMTP id q19mr19857120qax.32.1370972307328; Tue, 11 Jun 2013 10:38:27 -0700 (PDT)
Received: by 10.49.1.43 with HTTP; Tue, 11 Jun 2013 10:38:27 -0700 (PDT)
In-Reply-To: <5BB5E033-6EBD-4218-9022-20245E60EDE0@gmail.com>
References: <CANTg3aBH6T5Hqg84Me_-J9K0rfg9zZh+GHY_yVzNv66DKV7w+A@mail.gmail.com> <5BB5E033-6EBD-4218-9022-20245E60EDE0@gmail.com>
Date: Tue, 11 Jun 2013 13:38:27 -0400
Message-ID: <CANTg3aBuFaj=KXn4t_77Q2NPP6xaG1ZaViKrLEKQQyqO9FHnZQ@mail.gmail.com>
From: Matthew Lepinski <mlepinski.ietf@gmail.com>
To: Jiazi Yi <yi.jiazi@gmail.com>
Content-Type: multipart/alternative; boundary="089e0149ccde601bb604dee45d6b"
Cc: draft-ietf-manet-nhdp-sec-threats@tools.ietf.org, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] SECDIR review of draft-ietf-manet-nhdp-sec-threats-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jun 2013 17:38:33 -0000

Thank you, I found that clarification helpful.

Also, as I indicated, I think the document is quite good. I think it
valuable to document the attacks that can be preformed by a compromised
device in a manet and the impact on the network. (Although, I am mostly
left thinking ... Wow, compromising a routing in an ad hoc network is just
really, really bad :-< )


On Tue, Jun 11, 2013 at 4:52 AM, Jiazi Yi <yi.jiazi@gmail.com> wrote:

> Dear Matthew,
>
> Thanks for your review of the draft. Please check the reply inline:
>
> On Jun 10, 2013, at 06:13 , Matthew Lepinski <mlepinski.ietf@gmail.com>
> wrote:
>
> > I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the IESG.
>  These comments were written primarily for the benefit of the security area
> directors.  Document editors and WG chairs should treat these comments just
> like any other last call comments.
> >
> > This document provides a taxonomy of attacks against the Mobile Ad Hoc
> Network Neighborhood Discovery Protocol (NHDP) [RFC 6130]. The document
> also contains a discussion of the impact of these attacks on running on top
> of NHDP (in particular, OLSRv2 and SMF)
> >
> > Having reviewed the document, I do not see substantial issues in the
> document. I believe it is reasonable to publish as an informational RFC.
> >
> > One minor issue: The replay attack described in Section 4.5 did not seem
> substantially different than the attacks described in Section 4.4. It is
> not clear to me how replaying a message from another part of the network is
> any worse (or substantially different) than just fabricating a message
> claiming connectivity that does not exist (i.e., like what is described in
> 4.4.2). I would recommend either deleting 4.5 or else clarifying how these
> attacks are substantially different.
>
> The main difference between 4.4 and 4.5 is that reply attack is based on
> manipulating the transmission channel, while Incorrect HELLO message
> generation is based on wrong HELLO message.
> We proposed more text to describe the difference in the end of section 4.5:
>
> ==
> Compared to Incorrect HELLO Message attacks described in Section 4.4, the
> messages used in Replay attack are legitimate messages sent out by
> (non-malicious) NHDP routers and replayed at a later time or different
> locality by malicious routers. This makes this kind of attack harder to be
> detect and to counteract: integrity checks cannot help in this case as the
> original message ICV was correctly calculated.
> ====
>
> If you are OK with the text, we will add it to the next revision.
>
>
> >
> > Trivial nit: In Section 5, "a Compromised NHDP router will seek to
> manipulate" -- substitute "may seek" instead of "will seek". We don't know
> for certain what a compromised router will do (unless one assigns clear
> motivation to the adversary, which this document does not).
>
> Yes, will be corrected in the next revision :)
>
> thanks again
>
> best
>
> Jiazi