Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04

"Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com> Sat, 29 May 2010 00:00 UTC

Return-Path: <manav.bhatia@alcatel-lucent.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C5FE3A6924 for <secdir@core3.amsl.com>; Fri, 28 May 2010 17:00:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.104
X-Spam-Level:
X-Spam-Status: No, score=0.104 tagged_above=-999 required=5 tests=[AWL=0.103, BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XPWb1sFY2OdZ for <secdir@core3.amsl.com>; Fri, 28 May 2010 17:00:16 -0700 (PDT)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by core3.amsl.com (Postfix) with ESMTP id 5CE5B3A6897 for <secdir@ietf.org>; Fri, 28 May 2010 17:00:16 -0700 (PDT)
Received: from inbansmailrelay1.in.alcatel-lucent.com (h135-250-11-31.lucent.com [135.250.11.31]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id o4SNxw1P022936 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Fri, 28 May 2010 19:00:00 -0500 (CDT)
Received: from INBANSXCHHUB03.in.alcatel-lucent.com (inbansxchhub03.in.alcatel-lucent.com [135.250.12.80]) by inbansmailrelay1.in.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id o4SNxueA018377 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Sat, 29 May 2010 05:29:57 +0530
Received: from INBANSXCHMBSA1.in.alcatel-lucent.com ([135.250.12.59]) by INBANSXCHHUB03.in.alcatel-lucent.com ([135.250.12.80]) with mapi; Sat, 29 May 2010 05:29:56 +0530
From: "Bhatia, Manav (Manav)" <manav.bhatia@alcatel-lucent.com>
To: Sam Hartman <hartmans-ietf@mit.edu>
Date: Sat, 29 May 2010 05:29:55 +0530
Thread-Topic: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04
Thread-Index: Acr9/Wk3BXNW2r8oTPSV2Q8txowtrAAwslHg
Message-ID: <7C362EEF9C7896468B36C9B79200D8350CCEB21B40@INBANSXCHMBSA1.in.alcatel-lucent.com>
References: <20100520172310.GQ9605@oracle.com> <tsl632918s3.fsf@mit.edu> <7C362EEF9C7896468B36C9B79200D8350CCEB21839@INBANSXCHMBSA1.in.alcatel-lucent.com> <tsl7hmozwzn.fsf@mit.edu>
In-Reply-To: <tsl7hmozwzn.fsf@mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
X-Scanned-By: MIMEDefang 2.64 on 135.250.11.31
X-Mailman-Approved-At: Mon, 31 May 2010 08:13:49 -0700
Cc: "secdir@ietf.org" <secdir@ietf.org>, "vishwas@ipinfusion.com" <vishwas@ipinfusion.com>, "jjaeggli@checkpoint.com" <jjaeggli@checkpoint.com>
Subject: Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 May 2010 00:00:17 -0000

 
> 
> For other keyed md5 varients more analysis is required, but I 
> would not
> at all be surprised if the conclusion were the same: the class of md5
> attacks we know about do not apply to md5 in these MAC constructions.
> 
> I think the best we can say for discouraging the use of md5 
> is something
> like "There have been attacks against the use of md5 as a hash; while
> these attacks do not directly apply to the use of MD5 in routing
> protocols, it is prudent to have other options available."
> 
> The current text implies that the format of the routing 
> packets, rather
> than the format of the MAC construction is what provides protection.
> Based on what we've learned about attacking certificates and based on
> the fact that all our routing protocols have some extension 
> mechanisms,
> I'd find a defense based on the structure of the packets incredibly
> weak.

Though I agree that the current attacks on MD5 do not currently apply to MD5 as used in routing protocols, I still think very strongly about our point that for an attack to happen we would need a completely acceptable packet format which may not happen and thereby reducing the probability of an attack. In cryptography one can never be sure of what all has already been broken (It was several years till it became common public knowledge about "enigma" cipher being broken) and its precisely the routing protocol packet format that provides an additional level of security. Assume a 64 byte OSPF HELLO packet using keyed MD5 as described in 2328. Assume that we have been able to find collisions with MD5 as used by OSPF. Even if we are able to find collisions, the probability of an attacker doing something meaningful is in the order of 1/2^64 for a given source and a dest IP.

Thus this really is the clincher in my opinion.

Thanks, Manav