Re: [secdir] secdir review of draft-ietf-ospf-encapsulation-cap-06
Robert Raszuk <robert@raszuk.net> Tue, 19 September 2017 07:51 UTC
Return-Path: <rraszuk@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFA7F1342C8; Tue, 19 Sep 2017 00:51:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.698
X-Spam-Level:
X-Spam-Status: No, score=-1.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G7puUJotRXgb; Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
Received: from mail-wr0-x232.google.com (mail-wr0-x232.google.com [IPv6:2a00:1450:400c:c0c::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B08413306A; Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
Received: by mail-wr0-x232.google.com with SMTP id c23so2288281wrg.9; Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=nhk9QoEa7ezjLSmjV0LbQVaIsF/QbnqYzDcN0j8PiM8=; b=u98nDLQ957ERDq2nu4oO+y7BxByR1puyp60K7bVaf25Bt96FvFIToHZ1i6kA+EC3oS ro6GnYRoRKPNyfoNiKzBUKx9FtuMkLhNO2vGQW7av0HzcFCnfoDhSmWgxvxxPG2z1dk8 C7sUAtLUjTpTQImFgtkgYiu70hOUacId5apeMRC4lOZYjw+Vyc5X81q5Im3d+a6FQ0FE HZQ677rCdjfK70BIxf8WRSwnegTeFQKWjx7e8CNJa731ATuAgmuvYe6LtfrL1iKX2xh5 ejom9XNHYMB+2wiesN9GSAwKk95U7tJfPVT0adaQJvlcvdZlT30nzKTXvQIV8jIAV7yy OkDQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=nhk9QoEa7ezjLSmjV0LbQVaIsF/QbnqYzDcN0j8PiM8=; b=o/XEKMwpRkVzbBnD8FU/PMt79bI99t33CM8yot2n5us5qbljdWpJAD5eSiEkDQBM4Z HomHtGHKWXN/mFP97k97mKI7RdeY+TV9mqnmfkAUJ1CDzDSlCWZ9qGqDzbjNDSg8PVjZ fUzgTTezdS0qJ+ZGPwxIGzmQrbZ2N3UuPATGpMTaFZe6cCHPeo9oFW5EsYmEn5PtIMwf vBO62c2Vju0fFPHMm4RiQqOc7yywApEo6i0MDjTpYZSiZDFiFF1XIHkBwL+qC8jl1BZF 1mKB4JxKG4pr+UOWXaCxZS2sblfdSyD8o2hGTVZ5sAsNGrMlVlRqxukqCn+6PS/sGvG5 f49A==
X-Gm-Message-State: AHPjjUjdhLOoVotVdmQxYAL4GmS9DFKE+JKgDHrrZK03pirc9dJUoXU6 SfrfJfgVNN/7s7TDKSCFPyYC+D1Eob4a8fHpJ/g=
X-Google-Smtp-Source: AOwi7QBT2BQ8TIP78z4z98VhVT5Z9IgmPI71gV+WAMlbGT1QCK6w5XsLZJyIYcxcMixxKpy/76LX/OELQ3HoVe4RrlI=
X-Received: by 10.223.164.206 with SMTP id h14mr519110wrb.25.1505807507411; Tue, 19 Sep 2017 00:51:47 -0700 (PDT)
MIME-Version: 1.0
Sender: rraszuk@gmail.com
Received: by 10.28.151.75 with HTTP; Tue, 19 Sep 2017 00:51:46 -0700 (PDT)
Received: by 10.28.151.75 with HTTP; Tue, 19 Sep 2017 00:51:46 -0700 (PDT)
In-Reply-To: <11040_1505805523_59C0C4D3_11040_226_4_53C29892C857584299CBF5D05346208A4787AC94@OPEXCLILM21.corporate.adroot.infra.ftgroup>
References: <475c78dc-c872-8795-2d99-81b28df97aed@mandelberg.org> <3691_1505412243_59BAC493_3691_229_1_53C29892C857584299CBF5D05346208A47872C5B@OPEXCLILM21.corporate.adroot.infra.ftgroup> <ae79dc6a-488a-2772-eca4-c325ea462a5f@mandelberg.org> <2597_1505460712_59BB81E8_2597_399_1_53C29892C857584299CBF5D05346208A4787384B@OPEXCLILM21.corporate.adroot.infra.ftgroup> <656e7eb8-1bbe-5f9c-e3b6-f0bbc23737db@mandelberg.org> <12465_1505725711_59BF8D0F_12465_296_1_53C29892C857584299CBF5D05346208A478787B1@OPEXCLILM21.corporate.adroot.infra.ftgroup> <5ee2e3cf-4034-f9e6-4fca-92ceb57a65c5@mandelberg.org> <11040_1505805523_59C0C4D3_11040_226_4_53C29892C857584299CBF5D05346208A4787AC94@OPEXCLILM21.corporate.adroot.infra.ftgroup>
From: Robert Raszuk <robert@raszuk.net>
Date: Tue, 19 Sep 2017 09:51:46 +0200
X-Google-Sender-Auth: JKb6aDY-O8d8RLLzGV--zBEgRDw
Message-ID: <CA+b+ERneJBn_jJgDYZ+dQbb6CaLP_3xy14w4hhBWYKHkSBHnGA@mail.gmail.com>
To: bruno.decraene@orange.com
Cc: iesg@ietf.org, David Mandelberg <david@mandelberg.org>, "draft-ietf-ospf-encapsulation-cap.all@ietf.org" <draft-ietf-ospf-encapsulation-cap.all@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Content-Type: multipart/alternative; boundary="f403045f16a2945acf05598621de"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/CAqMY3tlcbnlKNuJcHalAtFPjII>
Subject: Re: [secdir] secdir review of draft-ietf-ospf-encapsulation-cap-06
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Sep 2017 07:51:52 -0000
Please replace AS with Administrative Domain. If I have three ASes there should be no artificial limits prohibiting encap to my central collector. Thx R On Sep 19, 2017 08:18, <bruno.decraene@orange.com> wrote: > > From: David Mandelberg [mailto:david@mandelberg.org] > > Sent: Monday, September 18, 2017 9:30 PM > > > > On 09/18/2017 05:08 AM, bruno.decraene@orange.com wrote: > > > > (c) is the one that I think is worth looking into. E.g., does > this new > > > > extension make it easier for an attacker to route a packet across > AS > > > > boundaries, by setting a tunnel endpoint outside of the > OSPF-routed network? > > > > > > No. The following text already prohibits even more than this: > > > > > > " A tunnel MUST NOT be > > > used if there is no route toward the IP address specified in > the > > > Endpoint Sub-TLV (See <xref target="EndpointTLV"/>) or if the > route is > > > not advertised by the router advertising this Tunnel Sub-TLV." > > > > > > - By definition, this Tunnel Sub-TLV is advertised in OSPF i.e. from > within the AS. > > > - The text also prohibits setting a tunnel endpoint to another router > within the AS. > > > > > > > > > That being said, within the AS, the point "c" still applies. > > > However, thinking twice, the probability is even more limited. > Indeed, one can only advertise a > > tunnel to itself. Assuming that the third party can't control the whole > routing topology (i.e. routing > > advertisement from most core routers), it cannot control the path > followed by the tunnel. Hence it > > would need to have monitoring capabilities on specific links that it > cannot choose. (the link on > > the path to itself). > > > Plus this risk is not new, as the third party could already advertise > the destination IP address of > > the packets (or of the BGP Next-hop of the BGP route matching the > packet destination), without > > using any tunnel. > > > In conclusion, although I could be wrong, I'm not seeing such new > risk. (again, assuming that > > a third party can modify the OSPF routing is a big assumption). > > > > > > But the discussion was useful, thanks for the comments. > > > > That explanation is great, thank you. I hadn't realized the implications > > of the paragraph you quoted, when I initially read it. I'm convinced > > that there isn't a security issue here, but it would be nice to see your > > explanation in the document itself, if it's not already obvious to > > anybody who knows OSPF better than I do. > > I've just added the following text in the security section of my local > version: > "We note that the last paragraph of <xref target="Operation"/> forbid the > establishment of a tunnel toward arbitrary destinations. It prohibits a > destination outside of the Autonomous System and also to other routers > within the AS. This avoid that a third-party gaining access to an OSPF > router be able to send the traffic to other destinations, for e.g. > inspection purposes. " > > Feel free to comment/propose other text. > > Since I've just published -08 a few hours ago, I'll probably delay the > upload of this new update. > > --Bruno > > > > -- > > Freelance cyber security consultant, software developer, and more > > https://david.mandelberg.org/ > > ____________________________________________________________ > _____________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations > confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez > recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages > electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou > falsifie. Merci. > > This message and its attachments may contain confidential or privileged > information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and > delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have been > modified, changed or falsified. > Thank you. > >
- [secdir] secdir review of draft-ietf-ospf-encapsu… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… Robert Raszuk
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… Robert Raszuk
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… Robert Raszuk
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… Acee Lindem (acee)
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg