Re: [secdir] secdir review of draft-ietf-ospf-encapsulation-cap-06

Robert Raszuk <robert@raszuk.net> Tue, 19 September 2017 07:51 UTC

Return-Path: <rraszuk@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFA7F1342C8; Tue, 19 Sep 2017 00:51:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.698
X-Spam-Level:
X-Spam-Status: No, score=-1.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G7puUJotRXgb; Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
Received: from mail-wr0-x232.google.com (mail-wr0-x232.google.com [IPv6:2a00:1450:400c:c0c::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B08413306A; Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
Received: by mail-wr0-x232.google.com with SMTP id c23so2288281wrg.9; Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=nhk9QoEa7ezjLSmjV0LbQVaIsF/QbnqYzDcN0j8PiM8=; b=u98nDLQ957ERDq2nu4oO+y7BxByR1puyp60K7bVaf25Bt96FvFIToHZ1i6kA+EC3oS ro6GnYRoRKPNyfoNiKzBUKx9FtuMkLhNO2vGQW7av0HzcFCnfoDhSmWgxvxxPG2z1dk8 C7sUAtLUjTpTQImFgtkgYiu70hOUacId5apeMRC4lOZYjw+Vyc5X81q5Im3d+a6FQ0FE HZQ677rCdjfK70BIxf8WRSwnegTeFQKWjx7e8CNJa731ATuAgmuvYe6LtfrL1iKX2xh5 ejom9XNHYMB+2wiesN9GSAwKk95U7tJfPVT0adaQJvlcvdZlT30nzKTXvQIV8jIAV7yy OkDQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=nhk9QoEa7ezjLSmjV0LbQVaIsF/QbnqYzDcN0j8PiM8=; b=o/XEKMwpRkVzbBnD8FU/PMt79bI99t33CM8yot2n5us5qbljdWpJAD5eSiEkDQBM4Z HomHtGHKWXN/mFP97k97mKI7RdeY+TV9mqnmfkAUJ1CDzDSlCWZ9qGqDzbjNDSg8PVjZ fUzgTTezdS0qJ+ZGPwxIGzmQrbZ2N3UuPATGpMTaFZe6cCHPeo9oFW5EsYmEn5PtIMwf vBO62c2Vju0fFPHMm4RiQqOc7yywApEo6i0MDjTpYZSiZDFiFF1XIHkBwL+qC8jl1BZF 1mKB4JxKG4pr+UOWXaCxZS2sblfdSyD8o2hGTVZ5sAsNGrMlVlRqxukqCn+6PS/sGvG5 f49A==
X-Gm-Message-State: AHPjjUjdhLOoVotVdmQxYAL4GmS9DFKE+JKgDHrrZK03pirc9dJUoXU6 SfrfJfgVNN/7s7TDKSCFPyYC+D1Eob4a8fHpJ/g=
X-Google-Smtp-Source: AOwi7QBT2BQ8TIP78z4z98VhVT5Z9IgmPI71gV+WAMlbGT1QCK6w5XsLZJyIYcxcMixxKpy/76LX/OELQ3HoVe4RrlI=
X-Received: by 10.223.164.206 with SMTP id h14mr519110wrb.25.1505807507411; Tue, 19 Sep 2017 00:51:47 -0700 (PDT)
MIME-Version: 1.0
Sender: rraszuk@gmail.com
Received: by 10.28.151.75 with HTTP; Tue, 19 Sep 2017 00:51:46 -0700 (PDT)
Received: by 10.28.151.75 with HTTP; Tue, 19 Sep 2017 00:51:46 -0700 (PDT)
In-Reply-To: <11040_1505805523_59C0C4D3_11040_226_4_53C29892C857584299CBF5D05346208A4787AC94@OPEXCLILM21.corporate.adroot.infra.ftgroup>
References: <475c78dc-c872-8795-2d99-81b28df97aed@mandelberg.org> <3691_1505412243_59BAC493_3691_229_1_53C29892C857584299CBF5D05346208A47872C5B@OPEXCLILM21.corporate.adroot.infra.ftgroup> <ae79dc6a-488a-2772-eca4-c325ea462a5f@mandelberg.org> <2597_1505460712_59BB81E8_2597_399_1_53C29892C857584299CBF5D05346208A4787384B@OPEXCLILM21.corporate.adroot.infra.ftgroup> <656e7eb8-1bbe-5f9c-e3b6-f0bbc23737db@mandelberg.org> <12465_1505725711_59BF8D0F_12465_296_1_53C29892C857584299CBF5D05346208A478787B1@OPEXCLILM21.corporate.adroot.infra.ftgroup> <5ee2e3cf-4034-f9e6-4fca-92ceb57a65c5@mandelberg.org> <11040_1505805523_59C0C4D3_11040_226_4_53C29892C857584299CBF5D05346208A4787AC94@OPEXCLILM21.corporate.adroot.infra.ftgroup>
From: Robert Raszuk <robert@raszuk.net>
Date: Tue, 19 Sep 2017 09:51:46 +0200
X-Google-Sender-Auth: JKb6aDY-O8d8RLLzGV--zBEgRDw
Message-ID: <CA+b+ERneJBn_jJgDYZ+dQbb6CaLP_3xy14w4hhBWYKHkSBHnGA@mail.gmail.com>
To: bruno.decraene@orange.com
Cc: iesg@ietf.org, David Mandelberg <david@mandelberg.org>, "draft-ietf-ospf-encapsulation-cap.all@ietf.org" <draft-ietf-ospf-encapsulation-cap.all@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Content-Type: multipart/alternative; boundary="f403045f16a2945acf05598621de"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/CAqMY3tlcbnlKNuJcHalAtFPjII>
Subject: Re: [secdir] secdir review of draft-ietf-ospf-encapsulation-cap-06
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Sep 2017 07:51:52 -0000

Please replace AS with Administrative Domain.

If I have three ASes there should be no artificial limits prohibiting encap
to my central collector.

Thx
R

On Sep 19, 2017 08:18, <bruno.decraene@orange.com> wrote:

> > From: David Mandelberg [mailto:david@mandelberg.org]
>  > Sent: Monday, September 18, 2017 9:30 PM
> >
>  > On 09/18/2017 05:08 AM, bruno.decraene@orange.com wrote:
>  > >   > (c) is the one that I think is worth looking into. E.g., does
> this new
>  > >   > extension make it easier for an attacker to route a packet across
> AS
>  > >   > boundaries, by setting a tunnel endpoint outside of the
> OSPF-routed network?
>  > >
>  > > No. The following text already prohibits even more than this:
>  > >
>  > > "  A tunnel MUST NOT be
>  > >        used if there is no route toward the IP address specified in
> the
>  > >        Endpoint Sub-TLV (See <xref target="EndpointTLV"/>) or if the
> route is
>  > >        not advertised by the router advertising this Tunnel Sub-TLV."
>  > >
>  > > - By definition, this Tunnel Sub-TLV is advertised in OSPF i.e. from
> within the AS.
>  > > - The text also prohibits setting a tunnel endpoint to another router
> within the AS.
>  > >
>  > >
>  > > That being said, within the AS, the point "c" still applies.
>  > > However, thinking twice, the probability is even more limited.
> Indeed, one can only advertise a
>  > tunnel to itself. Assuming that the third party can't control the whole
> routing topology (i.e. routing
>  > advertisement from most core routers), it cannot control the path
> followed by the tunnel. Hence it
>  > would need to have monitoring capabilities on specific links that it
> cannot choose. (the link on
>  > the path to itself).
>  > > Plus this risk is not new, as the third party could already advertise
> the destination IP address of
>  > the packets (or of the BGP Next-hop of the BGP route matching the
> packet destination), without
>  > using any tunnel.
>  > > In conclusion, although I could be wrong, I'm not seeing such new
> risk. (again, assuming that
>  > a third party can modify the OSPF routing is a big assumption).
>  > >
>  > > But the discussion was useful, thanks for the comments.
>  >
>  > That explanation is great, thank you. I hadn't realized the implications
>  > of the paragraph you quoted, when I initially read it. I'm convinced
>  > that there isn't a security issue here, but it would be nice to see your
>  > explanation in the document itself, if it's not already obvious to
>  > anybody who knows OSPF better than I do.
>
> I've just added the following text in the security section of my local
> version:
> "We note that the last paragraph of <xref target="Operation"/> forbid the
> establishment of a tunnel toward arbitrary destinations. It prohibits a
> destination outside of the Autonomous System and also to other routers
> within the AS. This avoid that a third-party gaining access to an OSPF
> router be able to send the traffic to other destinations, for e.g.
> inspection purposes. "
>
> Feel free to comment/propose other text.
>
> Since I've just published -08 a few hours ago, I'll probably delay the
> upload of this new update.
>
> --Bruno
>
>
>  > --
>  > Freelance cyber security consultant, software developer, and more
>  > https://david.mandelberg.org/
>
> ____________________________________________________________
> _____________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez
> recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou
> falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and
> delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.
>
>