Re: [secdir] Secdir last call review of draft-ietf-6lo-fragment-recovery-08

"Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> Mon, 10 February 2020 12:25 UTC

Return-Path: <tirumaleswarreddy_konda@mcafee.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52C941200C7 for <secdir@ietfa.amsl.com>; Mon, 10 Feb 2020 04:25:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mcafee.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yy62MQzPkuS1 for <secdir@ietfa.amsl.com>; Mon, 10 Feb 2020 04:25:35 -0800 (PST)
Received: from us-smtp-delivery-140.mimecast.com (us-smtp-delivery-140.mimecast.com [63.128.21.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA7461200E5 for <secdir@ietf.org>; Mon, 10 Feb 2020 04:25:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mcafee.com; s=mimecast20190606; t=1581337533; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=KQ8Q8kB3fK41g4SjYpJSBYdy25jzWea+dV4pOb4sB58=; b=Tl83t7drUuRe8JpWdHOpGAC35ceA2gIgS2UPxgthNYCiZTDTI2iDTipu4G1xaaT55hB7gG Rp20ASZ3AqB21LBsaxdrQ1ArYEIvXFmi2is+/heC7Ay2W8MZNtz37Bhk8v6yNtYEvafSuN tg7kcbqVYo92e2d53KbYaJrZgO5swS0=
Received: from NAM04-CO1-obe.outbound.protection.outlook.com (mail-co1nam04lp2055.outbound.protection.outlook.com [104.47.45.55]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-418-IzTuDsOrN4u-kGI-A999rw-1; Mon, 10 Feb 2020 07:25:25 -0500
Received: from CY4PR1601MB1254.namprd16.prod.outlook.com (10.172.118.12) by CY4PR1601MB1301.namprd16.prod.outlook.com (10.172.118.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.27; Mon, 10 Feb 2020 12:25:22 +0000
Received: from CY4PR1601MB1254.namprd16.prod.outlook.com ([fe80::e851:20e8:57bd:fedd]) by CY4PR1601MB1254.namprd16.prod.outlook.com ([fe80::e851:20e8:57bd:fedd%12]) with mapi id 15.20.2707.028; Mon, 10 Feb 2020 12:25:22 +0000
From: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>, "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-6lo-fragment-recovery.all@ietf.org" <draft-ietf-6lo-fragment-recovery.all@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-6lo-fragment-recovery-08
Thread-Index: AdXalCLFRlrAAOY/RCW/KaF9W1FCvAFSSLMwAAIQbvAABa7EcAAENPAg
Date: Mon, 10 Feb 2020 12:25:21 +0000
Message-ID: <CY4PR1601MB1254C5AF8FE1543EAAEC55F9EA190@CY4PR1601MB1254.namprd16.prod.outlook.com>
References: <CY4PR1601MB1254AAB128CD71BB283BDA72EA000@CY4PR1601MB1254.namprd16.prod.outlook.com> <MN2PR11MB35652608BABFC6B1EB0B1A9FD8190@MN2PR11MB3565.namprd11.prod.outlook.com> <CY4PR1601MB1254EEDFF6B78FC0BC2BF3D0EA190@CY4PR1601MB1254.namprd16.prod.outlook.com> <MN2PR11MB35654B2E68BAE8C6B3BF46BBD8190@MN2PR11MB3565.namprd11.prod.outlook.com>
In-Reply-To: <MN2PR11MB35654B2E68BAE8C6B3BF46BBD8190@MN2PR11MB3565.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.4.0.45
dlp-reaction: no-action
x-originating-ip: [49.37.206.28]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 45e53939-137c-4e67-d5e7-08d7ae244c81
x-ms-traffictypediagnostic: CY4PR1601MB1301:
x-microsoft-antispam-prvs: <CY4PR1601MB1301D0F0AC778020B6FD6C1BEA190@CY4PR1601MB1301.namprd16.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03094A4065
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(376002)(346002)(136003)(39860400002)(366004)(199004)(32952001)(189003)(2906002)(26005)(55016002)(8936002)(53546011)(86362001)(8676002)(71200400001)(478600001)(5660300002)(7696005)(52536014)(186003)(9686003)(66446008)(66556008)(81166006)(81156014)(110136005)(64756008)(6506007)(966005)(66946007)(33656002)(76116006)(66476007)(316002)(85282002); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR1601MB1301; H:CY4PR1601MB1254.namprd16.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: qFyInyp25tj533NjKiUKQ1hMUYsfdmHfZWI3RuVHeeaKVM35u0RXAOMQYsUCabN53x3YHyJrEowCKYd7fTzLU+MhoDwE0cfcKItOP5Ya5oG985zm281ClkoqYVsZa5ZJGJIizEhleCcpcEORr0OEWw==
x-ms-exchange-transport-forked: True
MIME-Version: 1.0
X-OriginatorOrg: mcafee.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 45e53939-137c-4e67-d5e7-08d7ae244c81
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Feb 2020 12:25:21.9418 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4943e38c-6dd4-428c-886d-24932bc2d5de
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: a8mvx0U8G4987hb8nmZuCYvHMM13yX0ZvxbaIwTma7Y+SHr/KmKVdOJjLyAxSk9HDdBaWLxFKrWbK2dZI+GmkWjjdvdAMbc7owHxh+nKyCrDUecdKchWiBbAG0mw3OvU
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1601MB1301
X-MC-Unique: IzTuDsOrN4u-kGI-A999rw-1
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: mcafee.com
Content-Type: multipart/alternative; boundary="_000_CY4PR1601MB1254C5AF8FE1543EAAEC55F9EA190CY4PR1601MB1254_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/_vaEYMiw2BWoVvM4S6Ij4hkq9v4>
Subject: Re: [secdir] Secdir last call review of draft-ietf-6lo-fragment-recovery-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Feb 2020 12:25:39 -0000

Thanks Pascal. Updated text looks good.

Cheers,
-Tiru

From: Pascal Thubert (pthubert) <pthubert@cisco.com>
Sent: Monday, February 10, 2020 5:48 PM
To: Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com>; secdir@ietf.org; draft-ietf-6lo-fragment-recovery.all@ietf.org
Subject: RE: Secdir last call review of draft-ietf-6lo-fragment-recovery-08


CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.

________________________________
Hello Tiru


>>>[1] It is not clear to me how the Security sections of I-D.ietf-core-cocoa apply to this specification ?

>> The specification depends on a Retransmission TimeOut (RTO) estimation that can be attacked. Adding the reference to cocoa was a earlier review comment that we got. Cocoa computes an RTO in a similar type of network. I agreed that the recommendation made sense but still, I can probably dig that email and start a thread with the reviewer if you think it is irrelevant.

> If coca is relevant, please add more details on how it is relevant. The security considerations in cocao is only discussing network access control to prevent an attacker from dropping packets to eventually increase the RTO.

Makes sense. I checked the status of cocoa and it appears stuck(
IESG state<https://datatracker.ietf.org/help/state/draft/iesg>
Expired (IESG: Dead)
).
Maybe the safest is to import the idea that we wanted to cover and avoid the reference.

What about schanging the first 3 paragraphs as follows:
"
   This document specifies an instantiation of a 6LoWPAN Fragment
   Forwarding technique.  "On Forwarding 6LoWPAN Fragments over a
   Multihop IPv6 Network" [I-D.ietf-6lo-minimal-fragment] provides the
   generic description of Fragment Forwarding and this specification
   inherits from it.  The generic considerations in the Security
   sections of [I-D.ietf-6lo-minimal-fragment] apply equally to this
   document.

   This specification does not recommend a particular algorithm for the
   estimation of the duration of the RTO that covers the detection of
   the loss of a fragment with the 'X' flag set; regardless, an attacker
   on the path may slow down or discard packets, which in turn can
   affect the throughput of fragmented packets.

   Compared to "Transmission of IPv6 Packets over IEEE 802.15.4
   Networks" [RFC4944], this specification reduces the datagram_tag to 8
   bits and the tag wraps faster than with [RFC4944].  But for a
   constrained network where a node is expected to be able to hold only
   one or a few large packets in memory, 256 is still a large number.
   Also, the acknowledgement mechanism allows cleaning up the state
   rapidly once the packet is fully transmitted or aborted.


"

Many thanks again, Tiru.

Pascal



From: Pascal Thubert (pthubert) <pthubert@cisco.com<mailto:pthubert@cisco.com>>
Sent: Monday, February 10, 2020 1:06 PM
To: Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com<mailto:TirumaleswarReddy_Konda@McAfee.com>>; secdir@ietf.org<mailto:secdir@ietf.org>; draft-ietf-6lo-fragment-recovery.all@ietf.org<mailto:draft-ietf-6lo-fragment-recovery.all@ietf.org>
Subject: RE: Secdir last call review of draft-ietf-6lo-fragment-recovery-08


CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.

________________________________
Hello Tiru;

Many thanks for your review!

Please see below

> [1] It is not clear to me how the Security sections of I-D.ietf-core-cocoa apply to this specification ?

The specification depends on a Retransmission TimeOut (RTO) estimation that can be attacked. Adding the reference to cocoa was a earlier review comment that we got. Cocoa computes an RTO in a similar type of network. I agreed that the recommendation made sense but still, I can probably dig that email and start a thread with the reviewer if you think it is irrelevant.

If coca is relevant, please add more details on how it is relevant. The security considerations in cocao is only discussing network access control to prevent an attacker from dropping packets to eventually increase the RTO.

> [2] The security considerations section discusses I-D.ietf-lwig-6lowpan-virtual-reassembly but that document does not discuss any security considerations yet.

Correct. When it does I hope it describes the issue that this specification discusses. In any fashion we use it to explain a difference: "here's a traditional drawback of fragments and here's why it does not hurt us", as opposed to an inheritance.
If you think that the text is not helpful, we can open another thread on that.

Thanks for the clarification.

> [3] It is not clear how the DoS attack of bogus first fragments is handled and other attacks discussed in https://tools.ietf.org/html/draft-ietf-intarea-frag-fragile-17#section-3.7 are tackled ?

They are not, apart from whatever protection we get from the requirement in L2 security (we are talking about an homogeneous mesh). This section is highly relevant. This is all detailed in section 7 of draft-ietf-6lo-minimal-fragment that this specification inherits.

Okay.

> [4] How does the document align with the recommendations given in https://tools.ietf.org/html/draft-ietf-intarea-frag-fragile-17#section-6 ?

Section 6 says that IP fragmentation should be avoided by new protocols. This Is not IP fragmentation, it is lower layer. We cannot avoid it if we are to support IPv6 that has a MIN MTU of 1280 bytes and the 6LoWPAN MTU is lower than that, see RFC 4944.

Got it.

Cheers,
-Tiru

Please let me know if you have a recommendation for a change, I saw questions but not real hiunt on how to act on them.


Many thanks again!

Pascal