Re: [secdir] [Last-Call] Secdir last call review of draft-ietf-dhc-dhcpv6-pd-relay-requirements-04

Christian Huitema <huitema@huitema.net> Tue, 08 December 2020 03:17 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 341063A0DCD for <secdir@ietfa.amsl.com>; Mon, 7 Dec 2020 19:17:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.886
X-Spam-Level:
X-Spam-Status: No, score=-1.886 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id okjf1QRqL6r0 for <secdir@ietfa.amsl.com>; Mon, 7 Dec 2020 19:17:24 -0800 (PST)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 614A33A0DC6 for <secdir@ietf.org>; Mon, 7 Dec 2020 19:17:24 -0800 (PST)
Received: from xse150.mail2web.com ([66.113.196.150] helo=xse.mail2web.com) by mx105.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1kmTV8-0006NQ-OT for secdir@ietf.org; Tue, 08 Dec 2020 04:17:21 +0100
Received: from xsmtp21.mail2web.com (unknown [10.100.68.60]) by xse.mail2web.com (Postfix) with ESMTPS id 4Cqlj85HVdz3JYb for <secdir@ietf.org>; Mon, 7 Dec 2020 19:17:16 -0800 (PST)
Received: from [10.5.2.13] (helo=xmail03.myhosting.com) by xsmtp21.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1kmTV6-0006Xg-KM for secdir@ietf.org; Mon, 07 Dec 2020 19:17:16 -0800
Received: (qmail 26677 invoked from network); 8 Dec 2020 03:17:16 -0000
Received: from unknown (HELO [192.168.1.103]) (Authenticated-user:_huitema@huitema.net@[172.58.43.42]) (envelope-sender <huitema@huitema.net>) by xmail03.myhosting.com (qmail-ldap-1.03) with ESMTPA for <secdir@ietf.org>; 8 Dec 2020 03:17:15 -0000
Content-Type: multipart/alternative; boundary="Apple-Mail-C3F89CC6-C8D2-4AF0-B20A-C20744FB42A4"
Content-Transfer-Encoding: 7bit
From: Christian Huitema <huitema@huitema.net>
Mime-Version: 1.0 (1.0)
Date: Mon, 07 Dec 2020 19:17:14 -0800
Message-Id: <81C397F9-70EF-4917-8481-B0CC540ECC6E@huitema.net>
References: <D384486E-9FBF-42FB-AA11-3558DEC28B63@cisco.com>
Cc: Naveen Kottapalli <naveen.sarma@gmail.com>, secdir@ietf.org, last-call@ietf.org, draft-ietf-dhc-dhcpv6-pd-relay-requirements.all@ietf.org, dhcwg@ietf.org
In-Reply-To: <D384486E-9FBF-42FB-AA11-3558DEC28B63@cisco.com>
To: "Bernie Volz (volz)" <volz@cisco.com>
X-Mailer: iPhone Mail (18B92)
X-Originating-IP: 66.113.196.150
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.196.150/32
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.196.150/32@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: ham
X-Spampanel-Outgoing-Evidence: Combined (0.09)
X-Recommended-Action: accept
X-Filter-ID: Pt3MvcO5N4iKaDQ5O6lkdGlMVN6RH8bjRMzItlySaT/JbZr0IC4hsUrS+H+jGiiCPUtbdvnXkggZ 3YnVId/Y5jcf0yeVQAvfjHznO7+bT5yACVCDlSNkcmtpadwF3M9U42UuDhyzVYcwl2RB+0Aaeoxp lx3/bwptnWFuplp1ZMkh55uqY3MhMgFAHq5BxPxP0EaxlviJjKFkdKXQPdRxvKbhl3nfFY6HnhCo Ll8na5G1V+rHkl7eagOI9ppTAQm7XGHuGjIyhYcySph9ARoCa9cam2SxBi2gl3tHFIoPtzulu3db eB82e4qSoY/T1kosmTmYf9felIf8Q0lvYJANyzomXENRHopjv7Jf3ak8aEV9arI3e954UgwnP++6 ZyoDzRnNodUbpoMB9AcZ6NR6iHGu1ES901EyL1XQM+GcAHbdY4ZzPzG72tly1fyyBM2iF9sTerfA FyVZIC7nAfR6A12PHznFCr1UPjZRtNG50GjfX8TdqEXkwxwMjsp2mNAp23iZ8TJTdK5H0dgUOB1h 85nckpWaLvahyBjmQxBKOzuhP7r/qeCcLfNPkwm2lNnsvr3LBR8rUYXJ4jh62pfHaKqsknzQ1WVE SSlbgJ6e928BIkUL/j1Y48GvmeURQjjEfcUqMHbG9QeVKzLyZepldZwvj4Qr8b52uenKr+jPf+Ug ZVKmtDBZtsfa+ya9I6gYZHpggkrPKGDlJby2oZZbHUXriM6seijiXKL+PVkapvnzg1zcjVdIhfBo dOedlBBe92PNDpgLsd6Ddd/s7VM53mdi34McnyDMbWYIwERBRHsOtp+q3yU+z72+fnpodgpDk7pQ f3BggXYLhsrAgAzwhY0ThEH6RRy5XJEEOQoLQ5NmMRr+w2X69ygMahiTQMBdZNmURwQxqnV47ewr SUMJ2PoPFZIShBSdpVJW5HbjQTCUIzbw71BPKv8cPtVshTSLr6YHJu91A3avrF49rf9JcoEpejCA XczArXyV+OFXiMtbLPp9n350Mbemie5JWWm/MpxAyl4q1x5O0+PBD/gPmWjXVA9S7TnWXDlmMpVd cwCFwrnT0GQK/7labXRdXAB+MS+4ayUpOtEhdxekWDmK9g==
X-Report-Abuse-To: spam@quarantine11.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/lO1xmZFYTSLXqT6OUg7D3qkYUs0>
Subject: Re: [secdir] [Last-Call] Secdir last call review of draft-ietf-dhc-dhcpv6-pd-relay-requirements-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Dec 2020 03:17:26 -0000

I do not think this is a new issue that should be fixed in this document. I have written that a couple times already. I do think that it would be nice to work on another document describing best practices to secure DHCP services.

-- Christian Huitema 

> On Dec 7, 2020, at 6:01 PM, Bernie Volz (volz) <volz@cisco.com> wrote:
> 
>  There really aren’t any. Clients can generate different client-id and request prefix after prefix. 
> 
> However, as this document points out these relays usually have limits to what it may track (and likely it would drop those packets from reaching client).
> 
> In some deployments, the number of prefixes allowed behind a particular relay is limited (at server or relay). Other mitigations may be shorter leases as then it comes down to how many can be requested during that time.
> 
> The main question is what does this benefit anyone? It is a DoS but in general it has limited impact as prefixes tend to be topological, so it isn’t like you could assign all of the prefixes an ISP has — just what is allowed on that link.
> 
> Why do you think this is a new issue that needs to be fixed in this document?
> 
> In my experience we have not seen these kinds of attacks as they aren’t very useful. And it has been a dhcp issue since dhcpv4 (addresses were much more scarce).
> 
> We tried securing dhcpv6...but it isn’t an easy problem to solve.
> 
> - Bernie
> 
>>> On Dec 7, 2020, at 8:06 PM, Christian Huitema <huitema@huitema.net> wrote:
>>> 
>> 
>> 
>> 
>>> On 12/7/2020 4:31 AM, Bernie Volz (volz) wrote:
>>> FYI:
>>> 
>>>>> I understand that solutions like RA
>>>>> Guard will in practice provide some protection, but the use of these solutions are
>>>>> not discussed in RFC 8213. The DHCP WG might want to address that.
>>> 
>>> RFC8415’s security considerations is rather extensive and includes reference to many techniques to reduce the issues. 8213 was written while 8415 was under development.
>> In the context of the draft, I am concerned in particular with the "resource-exhaustion" DoS attack, through exhaustion of delegatable prefixes. The attack is mentioned in the security section of 8415, but I have not seen the proposed mitigation.
>> 
>> -- Christian Huitema
>> 
>>