Re: [secdir] Review of draft-ietf-dots-signal-filter-control-04

Benjamin Kaduk <kaduk@mit.edu> Sun, 07 June 2020 00:05 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31E263A07BB; Sat, 6 Jun 2020 17:05:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VGT7YdxZfQzf; Sat, 6 Jun 2020 17:05:35 -0700 (PDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BFB8C3A07B6; Sat, 6 Jun 2020 17:05:34 -0700 (PDT)
Received: from mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 05705SYm023376 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 6 Jun 2020 20:05:31 -0400
Date: Sat, 06 Jun 2020 17:05:28 -0700
From: Benjamin Kaduk <kaduk@mit.edu>
To: Shawn Emery <shawn.emery@gmail.com>
Cc: secdir <secdir@ietf.org>, draft-ietf-dots-signal-filter-control.all@ietf.org, last-call@ietf.org, Shawn Emery <semery@uccs.edu>
Message-ID: <20200607000528.GR58497@mit.edu>
References: <CAChzXmZZEGy3J=UqiFvN51Q5dniNZ4aJcjwO2ARpR688ph1dmA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CAChzXmZZEGy3J=UqiFvN51Q5dniNZ4aJcjwO2ARpR688ph1dmA@mail.gmail.com>
User-Agent: Mutt/1.12.1 (2019-06-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/ZByFg1Z0WMNGox_UR-4-5sZiL0k>
Subject: Re: [secdir] Review of draft-ietf-dots-signal-filter-control-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Jun 2020 00:05:36 -0000

Hi Shawn,

Thanks for the review.
I believe you're correct that any filter that filters monitoring agents
would have to have been confiugred previously over the data channel, yes.

-Ben

On Fri, Jun 05, 2020 at 04:14:02PM -0600, Shawn Emery wrote:
> Reviewer: Shawn M. Emery
> Review result: Ready with nits
> 
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the IESG.
> These comments were written primarily for the benefit of the security
> area directors. Document editors and WG chairs should treat these
> comments just like any other last call comments.
> 
> This draft specifies a filter control through the Distributed
> Denial-of-Service Open Threat
> Signaling (DOTS) signal channel rather than through the data channel, given
> that an active
> DDoS attack would essentially disable the data channel.  The assumption is
> that the filter
> rules would have been constructed and distributed during idle time, before
> the attack.
> 
> The security considerations section does exist and the defers to the base
> RFCs, 8782 and 8783, for confidentiality and integrity requirements.  The
> draft
> continues that the filtering rules should be constructed before any attack
> through
> the data channel.  The section finishes with an attack by using the control
> filter to
> make a DDoS worse and recommends mitigation through operators monitoring
> and countering malicious behavior.  They describe this as only a variation
> of the
> attacks outlined in 8782 and 8783, though I wonder if a new attack vector is
> introduced through an attacker enabling a filter that filters monitoring
> agents?
> However this would have had to have been configured through the data channel
> priori, no?
> 
> General comments:
> 
> Thank you for the examples, this makes the concepts behind the draft more
> clear.
> 
> Editorial comments:
> 
> ietf-dots-signal-channel and ietf-dots-data-channel are now RFCs.
> 
> Shawn.
> --