Re: [secdir] Topic for our SecDir lunch: The PTB-PTS ICMP-based Attack against IPsec Gateways

Vincent Roca <vincent.roca@inria.fr> Mon, 10 November 2014 23:40 UTC

Return-Path: <vincent.roca@inria.fr>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D09891AD087 for <secdir@ietfa.amsl.com>; Mon, 10 Nov 2014 15:40:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.143
X-Spam-Level:
X-Spam-Status: No, score=-7.143 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.594] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D4SZP9w2blER for <secdir@ietfa.amsl.com>; Mon, 10 Nov 2014 15:40:26 -0800 (PST)
Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A8FF1AD084 for <secdir@ietf.org>; Mon, 10 Nov 2014 15:40:10 -0800 (PST)
X-IronPort-AV: E=Sophos;i="5.07,355,1413237600"; d="scan'208,217";a="106040898"
Received: from ral033r.vpn.inria.fr ([128.93.178.33]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/AES128-SHA; 11 Nov 2014 00:40:06 +0100
Content-Type: multipart/alternative; boundary="Apple-Mail=_9526ACEC-DC42-4691-9081-38EE78475CDB"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Vincent Roca <vincent.roca@inria.fr>
In-Reply-To: <85C3C2D1-7185-48CD-91A9-5D89B75101BF@gmail.com>
Date: Mon, 10 Nov 2014 13:40:06 -1000
Message-Id: <428B3579-AB82-49D3-A854-293ECBA8FEDD@inria.fr>
References: <38936223-5F53-4EC4-AA7B-15AF5F7F7AF6@inria.fr> <85C3C2D1-7185-48CD-91A9-5D89B75101BF@gmail.com>
To: Yoav Nir <ynir.ietf@gmail.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: http://mailarchive.ietf.org/arch/msg/secdir/Ljui6cEjz4psdVSlz457XPDRlCo
Cc: ludovic.jacquin@hp.com, secdir@ietf.org
Subject: Re: [secdir] Topic for our SecDir lunch: The PTB-PTS ICMP-based Attack against IPsec Gateways
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Nov 2014 23:40:30 -0000

Thanks Yoav. Yes, having this discussion on IPsec related mailing lists is needed, but I think SecDir
can also be appropriate if the problem applies to other tunneling techniques as well (which we didn’t test).
Honestly speaking, I’m trying to figure out how to proceed the best and advices like yours are welcome.
Cheers,

  Vincent

Le 10 nov. 2014 à 13:20, Yoav Nir <ynir.ietf@gmail.com> a écrit :
> Hi, Vincent.
> 
> Not at all opposed to bringing this up at SecDir lunch, but wouldn’t the IPsecME working group session and the ipsec mailing list be the more appropriate venue?
> 
> The SecDir is made up of people with (hopefully) enough knowledge about security to review an arbitrary draft and check that security has been considered and appropriate considerations documented. 
> 
> The attack described in that paper is not even specifically related to IPsec. It could plague any tunneling mechanism such as L2TP, GRE, PPTP, IP-in-IP. Although this is an attack, it might be appropriate for the transport area.
> 
> Yoav
> 
>> On Nov 10, 2014, at 11:13 AM, Vincent Roca <vincent.roca@inria.fr> wrote:
>> 
>> Hi everybody,
>> 
>> There’s a subject I’d like to discuss with you tomorrow during our SecDir lunch if we have time for that.
>> It’s about a DoS on IPsec we have found with my previous PhD student, Ludovic. It’s described here:
>> 
>> 	« Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways », GLOBECOM’14.
>> 	PDF is freely available at:	https://hal.inria.fr/hal-01052994/en/
>> 
>> The study has limits since it only focusses on IPv4 and a single OS (stable Squeeze Debian distribution).
>> That being said, we have an exploit using default IPsec configuration, either preventing end-hosts to open
>> new TCP connections (when relying on PMTUd) or creating large initial delay/performance penalties
>> (when relying on PLPMTUd). And UDP connexions will be affected too…
>> The only thing an attacker needs is to be on the IPsec tunnel path with the ability to eavesdrop encrypted
>> traffic and send back a forged packet (e.g., a non encrypted Wifi network should be sufficient, I see many
>> of them available at IETF ;-)
>> 
>> So we’d like to have your feedback in particular on the following two points:
>> 
>> - Is there an appropriate way to manage Path MTUs in presence of IPsec tunnels when we are already
>> at the minimum PMTU size?
>> 
>> - Is there an appropriate way to make the end-host (in the « red » protected LAN) and its IPsec gateway
>> understand each other when we are already at the minimum PMTU?
>> 
>> This is clearly a tricky situation that may not be well addressed today. Is it described somewhere in an RFC
>> so that implementers have clear guidelines? We didn’t find anything, but it does not mean there’s nothing.
>> And may the problem be extended to other tunneling technologies that perform encapsulation?
>> 
>> Your feedback is welcome.
>> Thanks,
>> 
>>   Ludovic and Vincent
>> 
>> --
>>    Vincent Roca, PhD/HDR, Inria research institute, France
>>    http://privatics.inrialpes.fr/~roca
>> _______________________________________________
>> secdir mailing list
>> secdir@ietf.org
>> https://www.ietf.org/mailman/listinfo/secdir
>> wiki: http://tools.ietf.org/area/sec/trac/wiki/SecDirReview
>