Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04

Sandra Murphy <Sandra.Murphy@sparta.com> Thu, 27 May 2010 19:36 UTC

Return-Path: <Sandra.Murphy@cobham.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F2FC13A6DAA for <secdir@core3.amsl.com>; Thu, 27 May 2010 12:36:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.092
X-Spam-Level:
X-Spam-Status: No, score=-0.092 tagged_above=-999 required=5 tests=[AWL=0.093, BAYES_40=-0.185]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id broqHeML8e3y for <secdir@core3.amsl.com>; Thu, 27 May 2010 12:36:03 -0700 (PDT)
Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by core3.amsl.com (Postfix) with ESMTP id 328F43A6F7B for <secdir@ietf.org>; Thu, 27 May 2010 12:30:42 -0700 (PDT)
Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id o4RJU4GZ008437; Thu, 27 May 2010 14:30:04 -0500
Received: from nemo.columbia.ads.sparta.com (nemo.columbia.sparta.com [157.185.80.75]) by Beta5.sparta.com (8.13.8/8.13.8) with ESMTP id o4RJU3l4022010; Thu, 27 May 2010 14:30:04 -0500
Received: from SMURPHY-LT.columbia.ads.sparta.com ([157.185.81.107]) by nemo.columbia.ads.sparta.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675); Thu, 27 May 2010 15:30:03 -0400
Date: Thu, 27 May 2010 15:30:03 -0400
From: Sandra Murphy <Sandra.Murphy@sparta.com>
To: Vishwas Manral <vishwas@ipinfusion.com>
In-Reply-To: <7539F1875DE542E7803619C575355E02@vishwasd520>
Message-ID: <Pine.WNT.4.64.1005271527260.2996@SMURPHY-LT.columbia.ads.sparta.com>
References: <20100520172310.GQ9605@oracle.com> <tsl632918s3.fsf@mit.edu> <Pine.WNT.4.64.1005271452060.2996@SMURPHY-LT.columbia.ads.sparta.com> <7539F1875DE542E7803619C575355E02@vishwasd520>
X-X-Sender: sandy@nemo.columbia.sparta.com
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-OriginalArrivalTime: 27 May 2010 19:30:03.0400 (UTC) FILETIME=[013A3880:01CAFDD3]
Cc: manav.bhatia@alcatel-lucent.com, secdir@ietf.org, shares@nexthop.com, jjaeggli@checkpoint.com, 'Sam Hartman' <hartmans-ietf@mit.edu>
Subject: Re: [secdir] Review of draft-ietf-opsec-routing-protocols-crypto-issues-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 May 2010 19:36:04 -0000

On Thu, 27 May 2010, Vishwas Manral wrote:

> Hi Sam/ Sandra,
>
> I agree with what you guys have said, we can work to refine the wording to
> make it clear that there are no known attacks.
>
> There may not be known attacks based on collision, but that does not
> preclude future issues that may result. One thing I can see is if we can
> change the topology field and still have the right/ same hash, it could lead
> to basic issues like traffic redirection, black holes and routing loops. I
> agree the fact that the packet needs to be a valid format packet makes the
> attack considerably harder.

I really did mean what I said - if you can think of cases where routing 
protocols could be damaged by a collision attack, speak up.

Most of the things I could think of were attacks that resulted from a 
legitimate participant behaving badly, and we all know just how much 
risk routing protocols face from legitimate participants behaving badly 
anyway - collisions would be no more risk.

--Sandy


>
> Thanks,
> Vishwas
>
> -----Original Message-----
> From: Sandra Murphy [mailto:Sandra.Murphy@sparta.com]
> Sent: Thursday, May 27, 2010 11:56 AM
> To: Sam Hartman
> Cc: Nicolas Williams; shares@nexthop.com; jjaeggli@checkpoint.com;
> manav.bhatia@alcatel-lucent.com; vishwas@ipinfusion.com; secdir@ietf.org
> Subject: Re: [secdir] Review of
> draft-ietf-opsec-routing-protocols-crypto-issues-04
>
> I was discussing this just this morning with a colleague.
>
> The discussion of pre-image and collision points out that using collisions
> as an attack on a routing protocol is not that easy since routing
> protocols have format requirements - the attacker would have to find a
> collision that is also a validly formatted protocol packet.
>
> Even beyond that, if the authors can point to some damage an attacker
> could do in a routing protocol using a collision, that would be very
> interesting.
>
>
> --Sandy
>
> On Thu, 27 May 2010, Sam Hartman wrote:
>
>>>>>>> "Nicolas" == Nicolas Williams <Nicolas.Williams@oracle.com> writes:
>>
>>    Nicolas> I have reviewed this document as part of the security
>>    Nicolas> directorate's ongoing effort to review all IETF documents
>>    Nicolas> being processed by the IESG. Document editors and WG chairs
>>    Nicolas> should treat these comments just like any other last call
>>    Nicolas> comments.
>>
>>    Nicolas> This document aims to be an Informational RFC describing
>>    Nicolas> security problems with various routing protocols.
>>
>>    Nicolas> Aside from various spelling and other nits that the
>>    Nicolas> RFC-Editor can easily handle, I have no issues with this
>>    Nicolas> document and it is ready for publication.
>>
>> This document talks a lot about collision attacks against MD5 and then
>> draws the conclusion that MD5 should not be used as part of a MAC.  I
>> agree that it is prudent to provide alternatives to MD5.  However, I
>> think the current text implies that collision attacks against MD5 are
>> applicable to attacks against the use of MD5 in routing protocols.
>>
>> There is an introductory section that describes the difference between
>> pre image and collision attacks, but the rest of the document seems to
>> ignore the advice of that section.
>> _______________________________________________
>> secdir mailing list
>> secdir@ietf.org
>> https://www.ietf.org/mailman/listinfo/secdir
>>
>
>