Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04

Sandra Murphy <Sandra.Murphy@sparta.com> Fri, 28 May 2010 16:14 UTC

Return-Path: <Sandra.Murphy@cobham.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2B3763A6A3E for <secdir@core3.amsl.com>; Fri, 28 May 2010 09:14:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.647
X-Spam-Level:
X-Spam-Status: No, score=-1.647 tagged_above=-999 required=5 tests=[AWL=0.952, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N+h6yaz5Tw51 for <secdir@core3.amsl.com>; Fri, 28 May 2010 09:14:03 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by core3.amsl.com (Postfix) with ESMTP id 1441C3A6960 for <secdir@ietf.org>; Fri, 28 May 2010 09:14:02 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id o4SFMWrN018099; Fri, 28 May 2010 10:22:32 -0500
Received: from nemo.columbia.ads.sparta.com (nemo.columbia.sparta.com [157.185.80.75]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id o4SFMUhw018807; Fri, 28 May 2010 10:22:31 -0500
Received: from SMURPHY-LT.columbia.ads.sparta.com ([157.185.81.107]) by nemo.columbia.ads.sparta.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675); Fri, 28 May 2010 11:22:30 -0400
Date: Fri, 28 May 2010 11:22:30 -0400
From: Sandra Murphy <Sandra.Murphy@sparta.com>
To: Vishwas Manral <vishwas@ipinfusion.com>
In-Reply-To: <DBEEA96634FE47BB848EBFBCBA8D85C9@vishwasd520>
Message-ID: <Pine.WNT.4.64.1005281102450.2996@SMURPHY-LT.columbia.ads.sparta.com>
References: <20100520172310.GQ9605@oracle.com> <tsl632918s3.fsf@mit.edu> <Pine.WNT.4.64.1005271452060.2996@SMURPHY-LT.columbia.ads.sparta.com> <7539F1875DE542E7803619C575355E02@vishwasd520> <Pine.WNT.4.64.1005271527260.2996@SMURPHY-LT.columbia.ads.sparta.com> <DBEEA96634FE47BB848EBFBCBA8D85C9@vishwasd520>
X-X-Sender: sandy@nemo.columbia.sparta.com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-OriginalArrivalTime: 28 May 2010 15:22:30.0735 (UTC) FILETIME=[96C325F0:01CAFE79]
Cc: manav.bhatia@alcatel-lucent.com, secdir@ietf.org, shares@nexthop.com, jjaeggli@checkpoint.com, 'Sam Hartman' <hartmans-ietf@mit.edu>
Subject: Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 May 2010 16:14:05 -0000

On Thu, 27 May 2010, Vishwas Manral wrote:

> Hi Sandra,
>
>> I really did mean what I said - if you can think of cases where
>> routing protocols could be damaged by a collision attack, speak up.
> I am sorry if you anywhere felt that I did not feel you really meant what
> you said.

Here I was, trying to be reassuring that there really was no sly subtext 
to what I said, and you seem to have taken it as a complaint, so I 
further confused things.  Sorry.


>
> What you seem to be saying is pretty well known. I have given you an example
> where if we can get a changed valid packet with a different topology, we can
> cause blackholes, loops and redirection.
>
> Are you trying to figure out how a wrong topology description packet can
> cause problems?

Certainly wrong topology descriptions are a bad thing.

I'm trying to distinguish damage that can be caused by collision attacks 
only.

To be a collision attack, the attacker must be able to produce two packets 
that have the same hash.  Since the use here is a keyed crypto hash, the 
hash also has to be validatable by the recipient - or there's no problem.

Since we are NOT discussing failures in keyed MD5 that would permit 
someone who did not know the key to produce a valid digest, it must be the 
case that the attacker is someone who knows the key - in other words a 
valid participant.

So.  What would a collision attack allow a valid participant to do that a 
valid participant could not already do?  We know for sure that valid 
participants can transmit "wrong topology descriptions" without resorting 
to the trouble of finding a hash collision between packets.

I'm not taking potshots.  I'm genuinely interested in the answer.  Do you 
see any new damage that could be done only with a collision attack?

--Sandy

>
> Thanks,
> Vishwas
>
> -----Original Message-----
> From: Sandra Murphy [mailto:Sandra.Murphy@sparta.com]
> Sent: Thursday, May 27, 2010 12:30 PM
> To: Vishwas Manral
> Cc: 'Sam Hartman'; 'Nicolas Williams'; shares@nexthop.com;
> jjaeggli@checkpoint.com; manav.bhatia@alcatel-lucent.com; secdir@ietf.org
> Subject: RE: [secdir] Review of
> draft-ietf-opsec-routing-protocols-crypto-issues-04
>
>
>
> On Thu, 27 May 2010, Vishwas Manral wrote:
>
>> Hi Sam/ Sandra,
>>
>> I agree with what you guys have said, we can work to refine the wording to
>> make it clear that there are no known attacks.
>>
>> There may not be known attacks based on collision, but that does not
>> preclude future issues that may result. One thing I can see is if we can
>> change the topology field and still have the right/ same hash, it could
> lead
>> to basic issues like traffic redirection, black holes and routing loops. I
>> agree the fact that the packet needs to be a valid format packet makes the
>> attack considerably harder.
>
> I really did mean what I said - if you can think of cases where routing
> protocols could be damaged by a collision attack, speak up.
>
> Most of the things I could think of were attacks that resulted from a
> legitimate participant behaving badly, and we all know just how much
> risk routing protocols face from legitimate participants behaving badly
> anyway - collisions would be no more risk.
>
> --Sandy
>
>
>>
>> Thanks,
>> Vishwas
>>
>> -----Original Message-----
>> From: Sandra Murphy [mailto:Sandra.Murphy@sparta.com]
>> Sent: Thursday, May 27, 2010 11:56 AM
>> To: Sam Hartman
>> Cc: Nicolas Williams; shares@nexthop.com; jjaeggli@checkpoint.com;
>> manav.bhatia@alcatel-lucent.com; vishwas@ipinfusion.com; secdir@ietf.org
>> Subject: Re: [secdir] Review of
>> draft-ietf-opsec-routing-protocols-crypto-issues-04
>>
>> I was discussing this just this morning with a colleague.
>>
>> The discussion of pre-image and collision points out that using collisions
>> as an attack on a routing protocol is not that easy since routing
>> protocols have format requirements - the attacker would have to find a
>> collision that is also a validly formatted protocol packet.
>>
>> Even beyond that, if the authors can point to some damage an attacker
>> could do in a routing protocol using a collision, that would be very
>> interesting.
>>
>>
>> --Sandy
>>
>> On Thu, 27 May 2010, Sam Hartman wrote:
>>
>>>>>>>> "Nicolas" == Nicolas Williams <Nicolas.Williams@oracle.com> writes:
>>>
>>>    Nicolas> I have reviewed this document as part of the security
>>>    Nicolas> directorate's ongoing effort to review all IETF documents
>>>    Nicolas> being processed by the IESG. Document editors and WG chairs
>>>    Nicolas> should treat these comments just like any other last call
>>>    Nicolas> comments.
>>>
>>>    Nicolas> This document aims to be an Informational RFC describing
>>>    Nicolas> security problems with various routing protocols.
>>>
>>>    Nicolas> Aside from various spelling and other nits that the
>>>    Nicolas> RFC-Editor can easily handle, I have no issues with this
>>>    Nicolas> document and it is ready for publication.
>>>
>>> This document talks a lot about collision attacks against MD5 and then
>>> draws the conclusion that MD5 should not be used as part of a MAC.  I
>>> agree that it is prudent to provide alternatives to MD5.  However, I
>>> think the current text implies that collision attacks against MD5 are
>>> applicable to attacks against the use of MD5 in routing protocols.
>>>
>>> There is an introductory section that describes the difference between
>>> pre image and collision attacks, but the rest of the document seems to
>>> ignore the advice of that section.
>>> _______________________________________________
>>> secdir mailing list
>>> secdir@ietf.org
>>> https://www.ietf.org/mailman/listinfo/secdir
>>>
>>
>>
>
>