Re: [secdir] secdir review of draft-ietf-ospf-encapsulation-cap-06
Robert Raszuk <robert@raszuk.net> Tue, 19 September 2017 07:51 UTC
Return-Path: <rraszuk@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id AFA7F1342C8;
Tue, 19 Sep 2017 00:51:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.698
X-Spam-Level:
X-Spam-Status: No, score=-1.698 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001,
HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001,
RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id G7puUJotRXgb; Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
Received: from mail-wr0-x232.google.com (mail-wr0-x232.google.com
[IPv6:2a00:1450:400c:c0c::232])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 3B08413306A;
Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
Received: by mail-wr0-x232.google.com with SMTP id c23so2288281wrg.9;
Tue, 19 Sep 2017 00:51:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=mime-version:sender:in-reply-to:references:from:date:message-id
:subject:to:cc;
bh=nhk9QoEa7ezjLSmjV0LbQVaIsF/QbnqYzDcN0j8PiM8=;
b=u98nDLQ957ERDq2nu4oO+y7BxByR1puyp60K7bVaf25Bt96FvFIToHZ1i6kA+EC3oS
ro6GnYRoRKPNyfoNiKzBUKx9FtuMkLhNO2vGQW7av0HzcFCnfoDhSmWgxvxxPG2z1dk8
C7sUAtLUjTpTQImFgtkgYiu70hOUacId5apeMRC4lOZYjw+Vyc5X81q5Im3d+a6FQ0FE
HZQ677rCdjfK70BIxf8WRSwnegTeFQKWjx7e8CNJa731ATuAgmuvYe6LtfrL1iKX2xh5
ejom9XNHYMB+2wiesN9GSAwKk95U7tJfPVT0adaQJvlcvdZlT30nzKTXvQIV8jIAV7yy
OkDQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:mime-version:sender:in-reply-to:references:from
:date:message-id:subject:to:cc;
bh=nhk9QoEa7ezjLSmjV0LbQVaIsF/QbnqYzDcN0j8PiM8=;
b=o/XEKMwpRkVzbBnD8FU/PMt79bI99t33CM8yot2n5us5qbljdWpJAD5eSiEkDQBM4Z
HomHtGHKWXN/mFP97k97mKI7RdeY+TV9mqnmfkAUJ1CDzDSlCWZ9qGqDzbjNDSg8PVjZ
fUzgTTezdS0qJ+ZGPwxIGzmQrbZ2N3UuPATGpMTaFZe6cCHPeo9oFW5EsYmEn5PtIMwf
vBO62c2Vju0fFPHMm4RiQqOc7yywApEo6i0MDjTpYZSiZDFiFF1XIHkBwL+qC8jl1BZF
1mKB4JxKG4pr+UOWXaCxZS2sblfdSyD8o2hGTVZ5sAsNGrMlVlRqxukqCn+6PS/sGvG5
f49A==
X-Gm-Message-State: AHPjjUjdhLOoVotVdmQxYAL4GmS9DFKE+JKgDHrrZK03pirc9dJUoXU6
SfrfJfgVNN/7s7TDKSCFPyYC+D1Eob4a8fHpJ/g=
X-Google-Smtp-Source: AOwi7QBT2BQ8TIP78z4z98VhVT5Z9IgmPI71gV+WAMlbGT1QCK6w5XsLZJyIYcxcMixxKpy/76LX/OELQ3HoVe4RrlI=
X-Received: by 10.223.164.206 with SMTP id h14mr519110wrb.25.1505807507411;
Tue, 19 Sep 2017 00:51:47 -0700 (PDT)
MIME-Version: 1.0
Sender: rraszuk@gmail.com
Received: by 10.28.151.75 with HTTP; Tue, 19 Sep 2017 00:51:46 -0700 (PDT)
Received: by 10.28.151.75 with HTTP; Tue, 19 Sep 2017 00:51:46 -0700 (PDT)
In-Reply-To: <11040_1505805523_59C0C4D3_11040_226_4_53C29892C857584299CBF5D05346208A4787AC94@OPEXCLILM21.corporate.adroot.infra.ftgroup>
References: <475c78dc-c872-8795-2d99-81b28df97aed@mandelberg.org>
<3691_1505412243_59BAC493_3691_229_1_53C29892C857584299CBF5D05346208A47872C5B@OPEXCLILM21.corporate.adroot.infra.ftgroup>
<ae79dc6a-488a-2772-eca4-c325ea462a5f@mandelberg.org>
<2597_1505460712_59BB81E8_2597_399_1_53C29892C857584299CBF5D05346208A4787384B@OPEXCLILM21.corporate.adroot.infra.ftgroup>
<656e7eb8-1bbe-5f9c-e3b6-f0bbc23737db@mandelberg.org>
<12465_1505725711_59BF8D0F_12465_296_1_53C29892C857584299CBF5D05346208A478787B1@OPEXCLILM21.corporate.adroot.infra.ftgroup>
<5ee2e3cf-4034-f9e6-4fca-92ceb57a65c5@mandelberg.org>
<11040_1505805523_59C0C4D3_11040_226_4_53C29892C857584299CBF5D05346208A4787AC94@OPEXCLILM21.corporate.adroot.infra.ftgroup>
From: Robert Raszuk <robert@raszuk.net>
Date: Tue, 19 Sep 2017 09:51:46 +0200
X-Google-Sender-Auth: JKb6aDY-O8d8RLLzGV--zBEgRDw
Message-ID: <CA+b+ERneJBn_jJgDYZ+dQbb6CaLP_3xy14w4hhBWYKHkSBHnGA@mail.gmail.com>
To: bruno.decraene@orange.com
Cc: iesg@ietf.org, David Mandelberg <david@mandelberg.org>,
"draft-ietf-ospf-encapsulation-cap.all@ietf.org"
<draft-ietf-ospf-encapsulation-cap.all@ietf.org>,
"secdir@ietf.org" <secdir@ietf.org>
Content-Type: multipart/alternative; boundary="f403045f16a2945acf05598621de"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/CAqMY3tlcbnlKNuJcHalAtFPjII>
Subject: Re: [secdir] secdir review of draft-ietf-ospf-encapsulation-cap-06
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>,
<mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>,
<mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Sep 2017 07:51:52 -0000
Please replace AS with Administrative Domain. If I have three ASes there should be no artificial limits prohibiting encap to my central collector. Thx R On Sep 19, 2017 08:18, <bruno.decraene@orange.com> wrote: > > From: David Mandelberg [mailto:david@mandelberg.org] > > Sent: Monday, September 18, 2017 9:30 PM > > > > On 09/18/2017 05:08 AM, bruno.decraene@orange.com wrote: > > > > (c) is the one that I think is worth looking into. E.g., does > this new > > > > extension make it easier for an attacker to route a packet across > AS > > > > boundaries, by setting a tunnel endpoint outside of the > OSPF-routed network? > > > > > > No. The following text already prohibits even more than this: > > > > > > " A tunnel MUST NOT be > > > used if there is no route toward the IP address specified in > the > > > Endpoint Sub-TLV (See <xref target="EndpointTLV"/>) or if the > route is > > > not advertised by the router advertising this Tunnel Sub-TLV." > > > > > > - By definition, this Tunnel Sub-TLV is advertised in OSPF i.e. from > within the AS. > > > - The text also prohibits setting a tunnel endpoint to another router > within the AS. > > > > > > > > > That being said, within the AS, the point "c" still applies. > > > However, thinking twice, the probability is even more limited. > Indeed, one can only advertise a > > tunnel to itself. Assuming that the third party can't control the whole > routing topology (i.e. routing > > advertisement from most core routers), it cannot control the path > followed by the tunnel. Hence it > > would need to have monitoring capabilities on specific links that it > cannot choose. (the link on > > the path to itself). > > > Plus this risk is not new, as the third party could already advertise > the destination IP address of > > the packets (or of the BGP Next-hop of the BGP route matching the > packet destination), without > > using any tunnel. > > > In conclusion, although I could be wrong, I'm not seeing such new > risk. (again, assuming that > > a third party can modify the OSPF routing is a big assumption). > > > > > > But the discussion was useful, thanks for the comments. > > > > That explanation is great, thank you. I hadn't realized the implications > > of the paragraph you quoted, when I initially read it. I'm convinced > > that there isn't a security issue here, but it would be nice to see your > > explanation in the document itself, if it's not already obvious to > > anybody who knows OSPF better than I do. > > I've just added the following text in the security section of my local > version: > "We note that the last paragraph of <xref target="Operation"/> forbid the > establishment of a tunnel toward arbitrary destinations. It prohibits a > destination outside of the Autonomous System and also to other routers > within the AS. This avoid that a third-party gaining access to an OSPF > router be able to send the traffic to other destinations, for e.g. > inspection purposes. " > > Feel free to comment/propose other text. > > Since I've just published -08 a few hours ago, I'll probably delay the > upload of this new update. > > --Bruno > > > > -- > > Freelance cyber security consultant, software developer, and more > > https://david.mandelberg.org/ > > ____________________________________________________________ > _____________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations > confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez > recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages > electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou > falsifie. Merci. > > This message and its attachments may contain confidential or privileged > information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and > delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have been > modified, changed or falsified. > Thank you. > >
- [secdir] secdir review of draft-ietf-ospf-encapsu… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… Robert Raszuk
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… Robert Raszuk
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… Robert Raszuk
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… Acee Lindem (acee)
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg
- Re: [secdir] secdir review of draft-ietf-ospf-enc… bruno.decraene
- Re: [secdir] secdir review of draft-ietf-ospf-enc… David Mandelberg