Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04
Sandra Murphy <Sandra.Murphy@sparta.com> Fri, 28 May 2010 16:14 UTC
Return-Path: <Sandra.Murphy@cobham.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2B3763A6A3E for <secdir@core3.amsl.com>; Fri, 28 May 2010 09:14:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.647
X-Spam-Level:
X-Spam-Status: No, score=-1.647 tagged_above=-999 required=5 tests=[AWL=0.952, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N+h6yaz5Tw51 for <secdir@core3.amsl.com>; Fri, 28 May 2010 09:14:03 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by core3.amsl.com (Postfix) with ESMTP id 1441C3A6960 for <secdir@ietf.org>; Fri, 28 May 2010 09:14:02 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id o4SFMWrN018099; Fri, 28 May 2010 10:22:32 -0500
Received: from nemo.columbia.ads.sparta.com (nemo.columbia.sparta.com [157.185.80.75]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id o4SFMUhw018807; Fri, 28 May 2010 10:22:31 -0500
Received: from SMURPHY-LT.columbia.ads.sparta.com ([157.185.81.107]) by nemo.columbia.ads.sparta.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675); Fri, 28 May 2010 11:22:30 -0400
Date: Fri, 28 May 2010 11:22:30 -0400
From: Sandra Murphy <Sandra.Murphy@sparta.com>
To: Vishwas Manral <vishwas@ipinfusion.com>
In-Reply-To: <DBEEA96634FE47BB848EBFBCBA8D85C9@vishwasd520>
Message-ID: <Pine.WNT.4.64.1005281102450.2996@SMURPHY-LT.columbia.ads.sparta.com>
References: <20100520172310.GQ9605@oracle.com> <tsl632918s3.fsf@mit.edu> <Pine.WNT.4.64.1005271452060.2996@SMURPHY-LT.columbia.ads.sparta.com> <7539F1875DE542E7803619C575355E02@vishwasd520> <Pine.WNT.4.64.1005271527260.2996@SMURPHY-LT.columbia.ads.sparta.com> <DBEEA96634FE47BB848EBFBCBA8D85C9@vishwasd520>
X-X-Sender: sandy@nemo.columbia.sparta.com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-OriginalArrivalTime: 28 May 2010 15:22:30.0735 (UTC) FILETIME=[96C325F0:01CAFE79]
Cc: manav.bhatia@alcatel-lucent.com, secdir@ietf.org, shares@nexthop.com, jjaeggli@checkpoint.com, 'Sam Hartman' <hartmans-ietf@mit.edu>
Subject: Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 May 2010 16:14:05 -0000
On Thu, 27 May 2010, Vishwas Manral wrote: > Hi Sandra, > >> I really did mean what I said - if you can think of cases where >> routing protocols could be damaged by a collision attack, speak up. > I am sorry if you anywhere felt that I did not feel you really meant what > you said. Here I was, trying to be reassuring that there really was no sly subtext to what I said, and you seem to have taken it as a complaint, so I further confused things. Sorry. > > What you seem to be saying is pretty well known. I have given you an example > where if we can get a changed valid packet with a different topology, we can > cause blackholes, loops and redirection. > > Are you trying to figure out how a wrong topology description packet can > cause problems? Certainly wrong topology descriptions are a bad thing. I'm trying to distinguish damage that can be caused by collision attacks only. To be a collision attack, the attacker must be able to produce two packets that have the same hash. Since the use here is a keyed crypto hash, the hash also has to be validatable by the recipient - or there's no problem. Since we are NOT discussing failures in keyed MD5 that would permit someone who did not know the key to produce a valid digest, it must be the case that the attacker is someone who knows the key - in other words a valid participant. So. What would a collision attack allow a valid participant to do that a valid participant could not already do? We know for sure that valid participants can transmit "wrong topology descriptions" without resorting to the trouble of finding a hash collision between packets. I'm not taking potshots. I'm genuinely interested in the answer. Do you see any new damage that could be done only with a collision attack? --Sandy > > Thanks, > Vishwas > > -----Original Message----- > From: Sandra Murphy [mailto:Sandra.Murphy@sparta.com] > Sent: Thursday, May 27, 2010 12:30 PM > To: Vishwas Manral > Cc: 'Sam Hartman'; 'Nicolas Williams'; shares@nexthop.com; > jjaeggli@checkpoint.com; manav.bhatia@alcatel-lucent.com; secdir@ietf.org > Subject: RE: [secdir] Review of > draft-ietf-opsec-routing-protocols-crypto-issues-04 > > > > On Thu, 27 May 2010, Vishwas Manral wrote: > >> Hi Sam/ Sandra, >> >> I agree with what you guys have said, we can work to refine the wording to >> make it clear that there are no known attacks. >> >> There may not be known attacks based on collision, but that does not >> preclude future issues that may result. One thing I can see is if we can >> change the topology field and still have the right/ same hash, it could > lead >> to basic issues like traffic redirection, black holes and routing loops. I >> agree the fact that the packet needs to be a valid format packet makes the >> attack considerably harder. > > I really did mean what I said - if you can think of cases where routing > protocols could be damaged by a collision attack, speak up. > > Most of the things I could think of were attacks that resulted from a > legitimate participant behaving badly, and we all know just how much > risk routing protocols face from legitimate participants behaving badly > anyway - collisions would be no more risk. > > --Sandy > > >> >> Thanks, >> Vishwas >> >> -----Original Message----- >> From: Sandra Murphy [mailto:Sandra.Murphy@sparta.com] >> Sent: Thursday, May 27, 2010 11:56 AM >> To: Sam Hartman >> Cc: Nicolas Williams; shares@nexthop.com; jjaeggli@checkpoint.com; >> manav.bhatia@alcatel-lucent.com; vishwas@ipinfusion.com; secdir@ietf.org >> Subject: Re: [secdir] Review of >> draft-ietf-opsec-routing-protocols-crypto-issues-04 >> >> I was discussing this just this morning with a colleague. >> >> The discussion of pre-image and collision points out that using collisions >> as an attack on a routing protocol is not that easy since routing >> protocols have format requirements - the attacker would have to find a >> collision that is also a validly formatted protocol packet. >> >> Even beyond that, if the authors can point to some damage an attacker >> could do in a routing protocol using a collision, that would be very >> interesting. >> >> >> --Sandy >> >> On Thu, 27 May 2010, Sam Hartman wrote: >> >>>>>>>> "Nicolas" == Nicolas Williams <Nicolas.Williams@oracle.com> writes: >>> >>> Nicolas> I have reviewed this document as part of the security >>> Nicolas> directorate's ongoing effort to review all IETF documents >>> Nicolas> being processed by the IESG. Document editors and WG chairs >>> Nicolas> should treat these comments just like any other last call >>> Nicolas> comments. >>> >>> Nicolas> This document aims to be an Informational RFC describing >>> Nicolas> security problems with various routing protocols. >>> >>> Nicolas> Aside from various spelling and other nits that the >>> Nicolas> RFC-Editor can easily handle, I have no issues with this >>> Nicolas> document and it is ready for publication. >>> >>> This document talks a lot about collision attacks against MD5 and then >>> draws the conclusion that MD5 should not be used as part of a MAC. I >>> agree that it is prudent to provide alternatives to MD5. However, I >>> think the current text implies that collision attacks against MD5 are >>> applicable to attacks against the use of MD5 in routing protocols. >>> >>> There is an introductory section that describes the difference between >>> pre image and collision attacks, but the rest of the document seems to >>> ignore the advice of that section. >>> _______________________________________________ >>> secdir mailing list >>> secdir@ietf.org >>> https://www.ietf.org/mailman/listinfo/secdir >>> >> >> > >
- [secdir] Review of draft-ietf-opsec-routing-proto… Nicolas Williams
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sam Hartman
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sandra Murphy
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Nicolas Williams
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sandra Murphy
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sandra Murphy
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Nicolas Williams
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sam Hartman
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sam Hartman
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sam Hartman
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sandra Murphy
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sam Hartman
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Sam Hartman
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Bhatia, Manav (Manav)
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Bhatia, Manav (Manav)
- Re: [secdir] Review of draft-ietf-opsec-routing-p… Bhatia, Manav (Manav)