Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04

Sandra Murphy <Sandra.Murphy@sparta.com> Thu, 27 May 2010 18:56 UTC

Return-Path: <Sandra.Murphy@cobham.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 85B9C3A695E for <secdir@core3.amsl.com>; Thu, 27 May 2010 11:56:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level:
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KdqyrBz41EWD for <secdir@core3.amsl.com>; Thu, 27 May 2010 11:56:47 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by core3.amsl.com (Postfix) with ESMTP id 7D2A73A692E for <secdir@ietf.org>; Thu, 27 May 2010 11:56:47 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id o4RIuRmv007887; Thu, 27 May 2010 13:56:27 -0500
Received: from nemo.columbia.ads.sparta.com (nemo.columbia.sparta.com [157.185.80.75]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id o4RIuQIn020425; Thu, 27 May 2010 13:56:26 -0500
Received: from SMURPHY-LT.columbia.ads.sparta.com ([157.185.81.107]) by nemo.columbia.ads.sparta.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675); Thu, 27 May 2010 14:56:26 -0400
Date: Thu, 27 May 2010 14:56:26 -0400
From: Sandra Murphy <Sandra.Murphy@sparta.com>
To: Sam Hartman <hartmans-ietf@mit.edu>
In-Reply-To: <tsl632918s3.fsf@mit.edu>
Message-ID: <Pine.WNT.4.64.1005271452060.2996@SMURPHY-LT.columbia.ads.sparta.com>
References: <20100520172310.GQ9605@oracle.com> <tsl632918s3.fsf@mit.edu>
X-X-Sender: sandy@nemo.columbia.sparta.com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-OriginalArrivalTime: 27 May 2010 18:56:26.0182 (UTC) FILETIME=[4EDF2E60:01CAFDCE]
Cc: manav.bhatia@alcatel-lucent.com, vishwas@ipinfusion.com, secdir@ietf.org, shares@nexthop.com, jjaeggli@checkpoint.com
Subject: Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 May 2010 18:56:48 -0000

I was discussing this just this morning with a colleague.

The discussion of pre-image and collision points out that using collisions 
as an attack on a routing protocol is not that easy since routing 
protocols have format requirements - the attacker would have to find a 
collision that is also a validly formatted protocol packet.

Even beyond that, if the authors can point to some damage an attacker 
could do in a routing protocol using a collision, that would be very 
interesting.


--Sandy

On Thu, 27 May 2010, Sam Hartman wrote:

>>>>>> "Nicolas" == Nicolas Williams <Nicolas.Williams@oracle.com> writes:
>
>    Nicolas> I have reviewed this document as part of the security
>    Nicolas> directorate's ongoing effort to review all IETF documents
>    Nicolas> being processed by the IESG. Document editors and WG chairs
>    Nicolas> should treat these comments just like any other last call
>    Nicolas> comments.
>
>    Nicolas> This document aims to be an Informational RFC describing
>    Nicolas> security problems with various routing protocols.
>
>    Nicolas> Aside from various spelling and other nits that the
>    Nicolas> RFC-Editor can easily handle, I have no issues with this
>    Nicolas> document and it is ready for publication.
>
> This document talks a lot about collision attacks against MD5 and then
> draws the conclusion that MD5 should not be used as part of a MAC.  I
> agree that it is prudent to provide alternatives to MD5.  However, I
> think the current text implies that collision attacks against MD5 are
> applicable to attacks against the use of MD5 in routing protocols.
>
> There is an introductory section that describes the difference between
> pre image and collision attacks, but the rest of the document seems to
> ignore the advice of that section.
> _______________________________________________
> secdir mailing list
> secdir@ietf.org
> https://www.ietf.org/mailman/listinfo/secdir
>