[secdir] draft-ash-gcac-algorithm-spec-03

Rob Austein <sra@hactrn.net> Wed, 18 January 2012 18:27 UTC

Return-Path: <sra@hactrn.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B84221F870A; Wed, 18 Jan 2012 10:27:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level:
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yjT-ofe95sFF; Wed, 18 Jan 2012 10:27:28 -0800 (PST)
Received: from cyteen.hactrn.net (cyteen.hactrn.net [IPv6:2002:425c:4242:0:210:5aff:fe86:1f54]) by ietfa.amsl.com (Postfix) with ESMTP id 2B0B921F8714; Wed, 18 Jan 2012 10:27:28 -0800 (PST)
Received: from thrintun.hactrn.net (thrintun.hactrn.net [IPv6:2002:425c:4242:0:219:d1ff:fe12:5d30]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "thrintun.hactrn.net", Issuer "Grunchweather Associates" (verified OK)) by cyteen.hactrn.net (Postfix) with ESMTPS id 2A82E2845C; Wed, 18 Jan 2012 18:27:26 +0000 (UTC)
Received: from thrintun.hactrn.net (localhost [IPv6:::1]) by thrintun.hactrn.net (Postfix) with ESMTP id F280817C86; Wed, 18 Jan 2012 13:27:25 -0500 (EST)
Date: Wed, 18 Jan 2012 13:27:25 -0500
From: Rob Austein <sra@hactrn.net>
To: iesg@ietf.org, secdir@ietf.org, draft-ash-gcac-algorithm-spec.all@tools.ietf.org
User-Agent: Wanderlust/2.14.0 (Africa) Emacs/23.3 Mule/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Content-Type: text/plain; charset="US-ASCII"
Message-Id: <20120118182725.F280817C86@thrintun.hactrn.net>
Subject: [secdir] draft-ash-gcac-algorithm-spec-03
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jan 2012 18:27:29 -0000

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors.  Document editors and WG chairs should treat
these comments just like any other last call comments.

This document describes an experimental "connection admission control"
algorithm, that is, an algorithm by which an IP/MPLS service
provider's equipment might decide whether or not to allow a new
connection such as a new VoIP call, given various constraints such as
quality of service issues.  The draft is slated for experimental
status and cautions against indiscriminate deployment on operational
networks.

I am sorry to have to say at this late date that I found the Security
Considerations of this draft woefully inadequate.  The IESG will have
to decide to what extent (if any) this matters for document on the
experimental track.

The algorithm is not a protocol, rather it is layered on top of a
barrel full of existing protocols, and appears to be an attempt to
provide a uniform and generic decision layer on top of all that.  As
such, it depends on various parameters carried by the underlying
protocols.  Nowhere do I see any discussion of the extent to which
this makes the algorithm's decisions vulnerable to attacks on any of
the underlying protocols (or, more likely, to attacks on whichever
happens to be the weakest of the underlying protocols this week).  To
reader who is not an MPLS expert, it's unclear where one would even
begin such an analysis, which is one of the reasons why such things
are supposed to be discussed in the Security Considerations.

Furthermore, there is very little discussion of threats that might
derive from gaming the algorithm itself.  The entirety of the Security
Considerations section consists of a brief discussion of one threat
("theft-of-service attacks" due to users claiming emergency priority
for their flows) with a somewhat opaque claim that RSVP-TE signalling
policy can be used to defeat the attack.  I see no discussion of other
results of gaming the algorithm, such as DoS attacks by allowing new
flows when the algorithm should have prevented them, denying resources
to legitimate flows by rejecting new flows when the algorithm should
have allowed them, tinkering with the bandwidth parameters, etc.

In view of the lateness of this review and the experimental status
requested, I will understand if the IESG passes this document in spite
of these issues.

Caveat: As may be obvious from the above, I am not an MPLS expert.