Re: [secdir] SecDir review of draft-ietf-manet-dlep

"Christian Huitema" <huitema@huitema.net> Wed, 30 November 2016 00:29 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E56C129509 for <secdir@ietfa.amsl.com>; Tue, 29 Nov 2016 16:29:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level:
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2S-3ussgUWUA for <secdir@ietfa.amsl.com>; Tue, 29 Nov 2016 16:29:13 -0800 (PST)
Received: from mx36-42.antispamcloud.com (mx36-42.antispamcloud.com [209.126.121.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AF97129D03 for <secdir@ietf.org>; Tue, 29 Nov 2016 16:28:53 -0800 (PST)
Received: from xsmtp01.mail2web.com ([168.144.250.230]) by mx36.antispamcloud.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.86) (envelope-from <huitema@huitema.net>) id 1cBslX-0004AI-K8 for secdir@ietf.org; Wed, 30 Nov 2016 01:28:52 +0100
Received: from [10.5.2.14] (helo=xmail04.myhosting.com) by xsmtp01.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1cBslV-0000Vl-1R for secdir@ietf.org; Tue, 29 Nov 2016 19:28:50 -0500
Received: (qmail 24781 invoked from network); 30 Nov 2016 00:28:43 -0000
Received: from unknown (HELO icebox) (Authenticated-user:_huitema@huitema.net@[72.235.151.78]) (envelope-sender <huitema@huitema.net>) by xmail04.myhosting.com (qmail-ldap-1.03) with ESMTPA for <draft-ietf-manet-dlep.all@ietf.org>; 30 Nov 2016 00:28:43 -0000
From: Christian Huitema <huitema@huitema.net>
To: "'Taylor, Rick (External)'" <rick.taylor.external@airbus.com>, 'Paul Hoffman' <paul.hoffman@vpnc.org>
References: <30706_1479279750_582C0485_30706_8297_7_C7F1D029-C067-4AF6-9F40-436F7BA54311@vpnc.org> <B177F831FB91F242972D0C35F6A0733163AD92C3@SUCNPTEXM01.com.ad.uk.ds.corp> <0AE7C2DE-B316-4675-B7BE-EB9AC50ED955@vpnc.org> <4035_1480388659_583CF032_4035_1030_1_003b01d249ed$3f003260$bd009720$@huitema.net> <B177F831FB91F242972D0C35F6A0733163AE0516@SUCNPTEXM01.com.ad.uk.ds.corp>
In-Reply-To: <B177F831FB91F242972D0C35F6A0733163AE0516@SUCNPTEXM01.com.ad.uk.ds.corp>
Date: Tue, 29 Nov 2016 14:28:38 -1000
Message-ID: <033801d24aa0$b34f09d0$19ed1d70$@huitema.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQJO58gflm7yviVf6/Cfvo0tY/H6ngJp8YIyAbfck2kBjD7axAMpmdv2n7CtZdA=
Content-Language: en-us
X-Filter-ID: s0sct1PQhAABKnZB5plbIVbU93hg6Kq00BjAzYBqWlUcW8ntawmIBRrYFzUH2lbvx1wTMkEUUoeb KIhkyzl2dHEJL963yvZzofOAehTafloeD9ey9972JZ1Xcr1RWHu8UvfgoE7Tx8PYIcekOty5V3Vn Qqb7YZk4tcfqG9LHSqQVYkZQj3sVWNPd6Zqvf7YgUV8ShebT8U8Xw9HTDfreWQUhw0NOE6GJ4h1S yx3SVxxTMqX0PJmjOEykuntPB0mTf015vFX3Mr/p2bub/7pcobsBNjjE5Aa2bYPF/Ljub7D1nvJs XtU2nZ7nPOLF/Wn1ZymEi4ZQojpeZ03k33R0rsoAtgTaADGmLikT3swaYT40dKFOE3BfZETw255u BppYPVOv5BtNTjcagkYTbQLRBa8CWlWJ/Z52Y2lK4wxs0NlmM8dmYMoX9zl4nXWYGnFn3yzO1sNI xVAhudRU4os+nEeuHaHQ+7nQfs3MfDo0rdXACQIHPYrCd4PY+G/nx7QL+MTObVKxHy/dols381l9 ryOIyTwXkV5v9rYnjJeS/R+I6BZ65nwq5J5jOi1sCFUVVgW9/bktU41htiJ8fk7NkHtzJzDXtW19 p+oSJq/sPNS7pOEbN+JMueFd2wBL5ko+03rd0MueqeqFzadSbJ8EWv48M3dEN/L6l2KS1xSjSzJ8 mVtlmHTW6t+XF13aDiVUE2hrO9QGiyz48bSlEFaPeA==
X-Report-Abuse-To: spam@quarantine5.antispamcloud.com
X-Originating-IP: 168.144.250.230
X-SpamExperts-Domain: xsmtpout.mail2web.com
X-SpamExperts-Username: 168.144.250.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=168.144.250.0/24@xsmtpout.mail2web.com
X-SpamExperts-Outgoing-Class: ham
X-SpamExperts-Outgoing-Evidence: Combined (0.07)
X-Classification: not-spam/combined
X-Recommended-Action: accept
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/BKXMC5MlwgdDwFLyTAf7Qs6xxXI>
Cc: draft-ietf-manet-dlep.all@ietf.org, 'secdir' <secdir@ietf.org>
Subject: Re: [secdir] SecDir review of draft-ietf-manet-dlep
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Nov 2016 00:29:14 -0000

On Tuesday, November 29, 2016 2:09 AM, Rick Taylor wrote:

>> This layer 2 security model is effectively an implementation of
"perimeter
>> security", and has all the known issues with perimeter security. Two
classic
>> attacks are "finding a way to send packets through the perimeter" and
>> "subvert a node already installed inside the perimeter". The draft
attempts
>> to mitigate the first class of attacks by using the mechanism of RFC
5082,
>> although it does not actually use it correctly. There is no mitigation
for the
>> "subverted node" attack.
>
> There has been extensive discussion within the WG on this topic, and we do
> fully understand the concerns.  The security of DLEP has always been a
major 
> worry for the authors/WG as we are being pulled in two directions:  The
sticking 
> point is the situation where an implementer has the modem and router as
two
> separate modules in a single chassis (or secured perimeter), and wants to
avoid
> the perceived complexity/annoyance of implementing TLS.   The authors have

> received off-the-record comment from major radio vendors stating that they
will 
> not adopt DLEP if it requires TLS.  However, I agree that both your
comments are 
> absolutely valid.  The question is how to reconcile the difference?

There may be different deployment scenarios. As is, I would not recommend
deploying DLEP if the Lan provides access to anything else than the router
and the modem. For the other scenarios, you really want to use something
like TLS with appropriate credentials.

> We are searching for some mechanism that would allow the protocol to:
>
> a) Specify how to secure the session correctly.
> b) Secure the session by default.
> c) Allow either peer to waive the requirement for security in a way that
cannot be maliciously 
> downgraded.
>
> Is a STARTTLS style approach acceptable? Or is an http/https style two
port approach 
> preferred?  I'm not asking for the solution, but trying to avoid wasting
your and our time.

Of course, I have no idea of the operational constraints, but at a high
level you seem to have the same problem as various small appliances and
devices. My gut feeling is that the same solutions apply, e.g., a one time
"pairing" to establish trust between router and modem, and then using TLS
and verifying the appropriate credentials, e.g., some shared secret. You
could make that optional when the perimeter is really tightly controlled.

>> >> One area we have worked hard on addressing is mandating use of
>> >> RFC5082 (Generalized TTL Security) on the link between router and
>> >> modem (See Section 3.1).
>>
>> Not quite. RFC5082 suggests setting the TTL to 255 and checking the value
on
>> the received message. Your draft suggests setting the TTL value to 1, and
>> checking the received value in the message. You need to fix that.
>
> TTL 1 is required for the discovery mechanism (UDP mcast) in an attempt to
restrict 
> packets to a single hop (particularly for IPv4), but the TCP connection
for the session
> must use TTL 255 as per RFC5082 (The paragraph above).  We might consider
re-ordering
> the paragraphs if you think it is unclear.

TTL 255 prevents nodes from receiving packets from outside the LAN, TTL 1
prevents nodes from leaking packets outside the LAN. An attacker can format
an UDP packet with a TTL just right, so that it arrives on the LAN with
TTL=1. At a minimum, this allows the attacker to trigger multicast UDP
replies, i.e., a form of DOS attack. Lucky attackers might be able to send a
complex packet and trigger a code fault. That's why "prevent packets from
the outside in" is generally better than "prevent packets from the inside
out" -- multicast routing normally stops transmission outside the LAN
anyhow. 

If you decide to stick to TTL=1 for UDP, then you should definitely make the
text explicit, explain the difference of treatment between TCP and UDP.

-- Christian Huitema