Re: [sfc] [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Tue, 28 September 2021 15:12 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17FC13A3141; Tue, 28 Sep 2021 08:12:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.595
X-Spam-Level:
X-Spam-Status: No, score=-4.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_SUMOF=5, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=erw63chw; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=HZirKEEq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mdmHkjYvCaIK; Tue, 28 Sep 2021 08:12:54 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E8FD23A1CF2; Tue, 28 Sep 2021 08:12:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=59880; q=dns/txt; s=iport; t=1632841974; x=1634051574; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=F3w4gQytmtlWfi3+mLpNl3GD+PmpZAug76I4zISLt0o=; b=erw63chwzxeTohc7+ddL50s1hu/KN3JOgRxXfc+ptX7uXIeB37H38Eud WadFgOcMoUeRmgB8TmJabbaPQMN+Z1u4/JT31CAxbLMLamhZ9b0WtV4jV qDZg+tkMM5yy0edEvLmYlDjTXEfr/9ptHmNPA2Sf/Pacz0AdjpcBGwfJk 0=;
IronPort-PHdr: A9a23:1NZT5h8NOqmzdf9uWMPoyV9kXcBvk7XpPxIY75Nhjb9SIeyv/JXnaUrY4/glzFrERp7S5P8Mje3K+7vhVmoN7dfk0jgCfZVAWgVDhZAQmAotU86YCFH2KfesaSEmT4xOUVZ/9CS9Nk5YUM/1e1zVpCi06jgfUhXyPAZ4PKL7AInX2s+2zOu1vZbUZlYguQ==
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.85,329,1624320000"; d="scan'208,217";a="846172271"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Sep 2021 15:12:51 +0000
Received: from mail.cisco.com (xbe-aln-003.cisco.com [173.36.7.18]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 18SFCpae002425 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 28 Sep 2021 15:12:51 GMT
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xbe-aln-003.cisco.com (173.36.7.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 28 Sep 2021 10:12:51 -0500
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 28 Sep 2021 10:12:50 -0500
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Tue, 28 Sep 2021 10:12:50 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Nh4nYpXmTunXsqnySJKd4twNcSCfz6/gYYM1nrg5Jheu9804FtBjYSb+HPf6Gu6/50WQduRU7iwiO4ftFxeT4CTg+148aMUsa5Ff8b+mEs9ZBhGfRYmuRDnuu5/lRtu8jFIuZY7kDEyvM2O6gckKfGEALD/Lbhq+pGSgq/IAWheKwdNCW9S2laF7yz2znbxDu1rohShYvZeB6MlEdF5XDVlHBJmCT60g7i79+vGAztEivd4dzkvlmKPlI3p4FduiQ3IdeGZtDQOsl6c0tlI0PO6Wo6jHAGV+PYzDnSkekDvZi/e3TEZDqX2DQ55XHhyxPniPyrlacakCEUsXuU9TlQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=F3w4gQytmtlWfi3+mLpNl3GD+PmpZAug76I4zISLt0o=; b=igKv1edlmSd7wbiy6+M3uaiCV9ntL/XTnRBf+b2Q3j42jrHDHJ7nEIyhNd7gljYfBNBwTajvOXiNt5U/7sDKRhfzny6wt3OLpqxFbzIAtGf2iDCp/DM3tnOeJt9MH2TrK8N20XKsJj1a9sJ/GJlo5zjWdWPufuAn9uUw2zLAji8bHk3XF+c6taKtuXsFQHE8yVNS6xQKvpng5w/l6lP866XAT4UE4OU9xaufJMq+haMAVFhfL9CcEWv2/+1llTeHCXJtN3ZVEDSB3gk2c9TxE70hsIdVloTbLJt34Lq9kwz/OOoJIlGTU1jLpiHO5rIXEEDruHX9wBRWjFoFgRhNYQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=F3w4gQytmtlWfi3+mLpNl3GD+PmpZAug76I4zISLt0o=; b=HZirKEEqzIKGNPkDACoCn6gcH6cezKKe4p4ZXgMQ78uYT4dgY4vR/Wh/naP+Xk4nJL1GO11p+cH2VutGqJT/LgoHz4gthOD6Un+/ezSMMY9hidsjOvK/W8tDiYQHR0/dYHxCKUEBUPmvx2NZR5NUu1RwuvFa4TwycjgthuEwh4I=
Received: from DM8PR11MB5606.namprd11.prod.outlook.com (2603:10b6:8:3c::23) by DM8PR11MB5671.namprd11.prod.outlook.com (2603:10b6:8:3c::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4566.13; Tue, 28 Sep 2021 15:12:49 +0000
Received: from DM8PR11MB5606.namprd11.prod.outlook.com ([fe80::2544:292:4ad5:dd65]) by DM8PR11MB5606.namprd11.prod.outlook.com ([fe80::2544:292:4ad5:dd65%3]) with mapi id 15.20.4544.022; Tue, 28 Sep 2021 15:12:49 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Christian Huitema <huitema@huitema.net>, "secdir@ietf.org" <secdir@ietf.org>, Martin Vigoureux <martin.vigoureux@nokia.com>
CC: "shwetha.bhandari@gmail.com" <shwetha.bhandari@gmail.com>, "last-call@ietf.org" <last-call@ietf.org>, "Youell, Stephen" <stephen.youell@jpmorgan.com>, "sfc@ietf.org" <sfc@ietf.org>, "draft-ietf-sfc-proof-of-transit.all@ietf.org" <draft-ietf-sfc-proof-of-transit.all@ietf.org>, "krishna.sashank@gmail.com" <krishna.sashank@gmail.com>
Thread-Topic: [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08
Thread-Index: AQHXrdJnjOHuO4fhnU+wPCtBTLa6aaux/B8wgAAXGgCAAMvnUIAAc3MAgAFE1nCAAEP3AIAEulAA
Date: Tue, 28 Sep 2021 15:12:48 +0000
Message-ID: <DM8PR11MB5606B4D10F2CE68734684248DAA89@DM8PR11MB5606.namprd11.prod.outlook.com>
References: <163210969860.31323.5718880916818308072@ietfa.amsl.com> <DM8PR11MB5606222AA0739CE8093A6777DAA39@DM8PR11MB5606.namprd11.prod.outlook.com> <7329d9eb-3597-0006-dbc5-892a4ada74ab@huitema.net> <DM8PR11MB56061C0D02BC169F39D41407DAA49@DM8PR11MB5606.namprd11.prod.outlook.com> <31b9ad77-1848-011c-9b3f-3787aee21e41@huitema.net> <DM8PR11MB5606D099B760809CB3DD8326DAA59@DM8PR11MB5606.namprd11.prod.outlook.com> <db45f7e3-3961-68fa-5e90-981756139b51@huitema.net>
In-Reply-To: <db45f7e3-3961-68fa-5e90-981756139b51@huitema.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: huitema.net; dkim=none (message not signed) header.d=none;huitema.net; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 07e2dfc3-eb61-4f33-e208-08d982926f21
x-ms-traffictypediagnostic: DM8PR11MB5671:
x-microsoft-antispam-prvs: <DM8PR11MB567142D4A2189B8234D4D046DAA89@DM8PR11MB5671.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM8PR11MB5606.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(38070700005)(52536014)(66946007)(7696005)(2906002)(6506007)(64756008)(66556008)(38100700002)(8936002)(66476007)(4326008)(66446008)(5660300002)(76116006)(33656002)(122000001)(186003)(55016002)(53546011)(9686003)(86362001)(30864003)(71200400001)(8676002)(83380400001)(26005)(54906003)(966005)(110136005)(508600001)(316002)(166002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM8PR11MB5606B4D10F2CE68734684248DAA89DM8PR11MB5606namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM8PR11MB5606.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 07e2dfc3-eb61-4f33-e208-08d982926f21
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Sep 2021 15:12:49.0336 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vfkibXxx9VOdc3DD9dN8O39yjGJiEN4Xo82g59htEDP6x/+im7U9YzMWNqLwP+Xnvp+zdJzdKI/AdmmSyimDfg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR11MB5671
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.18, xbe-aln-003.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/7nVRFe5xm216h77phEGkto00BR4>
Subject: Re: [sfc] [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Sep 2021 15:13:00 -0000

Hi Christian,
Thanks for the follow up – and the suggestion of an alternate approach. IMHO – and I checked with other authors, who voiced similar views – it would be best to follow your guidance and have the working group crispen up the requirements as well as assumptions for the operational environment and only then discuss and evaluate solution approaches.
Depending on the target set of requirements and the operational environment, the WG can choose an appropriate approach with guidance from CFRG. That could be, per what you suggest below, something much simpler from a control plane perspective - avoiding the complexities of SSS  – with a data-plane as simple as what the draft currently suggests. That could also be another, yet to be determined approach, such as the approach based on nested encryption that the WG discussed before, or an SSS based approach with a polynomial per packet, etc. Hopefully we’ll get it right the next time.

Martin, Jim, Joel – any thoughts and guidance from your end, on whether the document should be handed back to the working group?

Thanks again, Frank


From: Christian Huitema <huitema@huitema.net>
Sent: Saturday, 25 September 2021 16:42
To: Frank Brockners (fbrockne) <fbrockne@cisco.com>; secdir@ietf.org
Cc: shwetha.bhandari@gmail.com; last-call@ietf.org; Youell, Stephen <stephen.youell@jpmorgan.com>; sfc@ietf.org; draft-ietf-sfc-proof-of-transit.all@ietf.org; krishna.sashank@gmail.com
Subject: Re: [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08



On 9/25/2021 4:20 AM, Frank Brockners (fbrockne) wrote:

Hi Christian,



Thanks for the follow-up. Please see below.



-----Original Message-----

From: Christian Huitema <huitema@huitema.net><mailto:huitema@huitema.net>

Sent: Friday, 24 September 2021 17:16

To: Frank Brockners (fbrockne) <fbrockne@cisco.com><mailto:fbrockne@cisco.com>; secdir@ietf.org<mailto:secdir@ietf.org>

Cc: shwetha.bhandari@gmail.com<mailto:shwetha.bhandari@gmail.com>; last-call@ietf.org<mailto:last-call@ietf.org>; Youell, Stephen

<stephen.youell@jpmorgan.com><mailto:stephen.youell@jpmorgan.com>; sfc@ietf.org<mailto:sfc@ietf.org>; draft-ietf-sfc-proof-of-

transit.all@ietf.org<mailto:transit.all@ietf.org>; krishna.sashank@gmail.com<mailto:krishna.sashank@gmail.com>

Subject: Re: [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-

08





On 9/24/2021 1:39 AM, Frank Brockners (fbrockne) wrote:

Hi Christian,



Thanks a lot for the detailed follow-up. Please see inline.



-----Original Message-----

From: Christian Huitema <huitema@huitema.net><mailto:huitema@huitema.net>

Sent: Thursday, 23 September 2021 22:13

To: Frank Brockners (fbrockne) <fbrockne@cisco.com><mailto:fbrockne@cisco.com>; secdir@ietf.org<mailto:secdir@ietf.org>

Cc: shwetha.bhandari@gmail.com<mailto:shwetha.bhandari@gmail.com>; last-call@ietf.org<mailto:last-call@ietf.org>; Youell, Stephen

<stephen.youell@jpmorgan.com><mailto:stephen.youell@jpmorgan.com>; sfc@ietf.org<mailto:sfc@ietf.org>; draft-ietf-sfc-proof-of-

transit.all@ietf.org<mailto:transit.all@ietf.org>

Subject: Re: [Last-Call] Secdir last call review of

draft-ietf-sfc-proof-of-transit-

08





On 9/23/2021 12:31 PM, Frank Brockners (fbrockne) wrote:

Hi Christian,



Thanks a lot for your detailed review. Please see inline.



-----Original Message-----

From: Christian Huitema via Datatracker <noreply@ietf.org><mailto:noreply@ietf.org>

Sent: Monday, 20 September 2021 05:48

To: secdir@ietf.org<mailto:secdir@ietf.org>

Cc: draft-ietf-sfc-proof-of-transit.all@ietf.org<mailto:draft-ietf-sfc-proof-of-transit.all@ietf.org>;

last-call@ietf.org<mailto:last-call@ietf.org>; sfc@ietf.org<mailto:sfc@ietf.org>

Subject: Secdir last call review of

draft-ietf-sfc-proof-of-transit-08



Reviewer: Christian Huitema

Review result: Serious Issues



I have reviewed this document as part of the security directorate's

ongoing effort to review all IETF documents being processed by the

IESG.  These comments were written primarily for the benefit of the

security

area directors.

Document editors and WG chairs should treat these comments just

like any other last call comments.



This document proposes a security mechanism to prove that traffic

transited through all specified nodes in a path. The mechanism

works by adding a short option to each packet for which transit

shall be verified. The option consists of a random number set by

the originator of the packet, and a sum field to which each transit

node adds a value depending on public parameters, on the random

number and on secrets held by the node. The destination has access

to all the secrets held by the nodes on the path, and can verify

whether or not the final sum corresponds to the sum of expected

values. The proposed size

of the random number and the sum field is 64 bits.

In the paragraph above, I described the mechanism without

mentioning the algorithm used to compute these 64 bit numbers. The

64 bit size is obviously a

concern: for cryptographic applications, 64 bits is not a large

number, and that might be a weakness whatever the proposed algorithm.

The actual algorithm appears to be a bespoke derivation of Shamir's

Secret Sharing algorithm (SSS). In other word, it is a case of

"inventing your

own crypto".

...FB: SSS is a well know algorithm and

draft-ietf-sfc-proof-of-transit does not

modify it.

All draft-ietf-sfc-proof-of-transit does is to operationalize the

SSS algorithm

for the proof of transit use case.

Also note that the draft does not require the use of 64 bit numbers.

Nor does draft require a minimum time between changing the secrets.

What particular attack are you concerned about where 64 bit numbers

are a

concern?

SSS relies on the representation of polynomials as a sum of

Lagrange Basis Polynomials. Each of the participating nodes holds a

share of the secret represented by a point on the polynomial curve.

A polynomial of degree K on the field of integers modulo a prime

number N can only be revealed if at list K+1 participants reveal

the value of their point. The safety of the algorithm relies on the

size of the number N and on the fact that the secret shall be revealed only

once.

But the algorithm does not use SSS directly, so it deserves its own

security

analysis instead of relying simply on Shamir's work.

The proposed algorithm uses two polynomials of degree K for a path

containing

K+1 nodes, on a field defined by a prime number N of 64 bits. One

K+of the

polynomial, POLY-1, is secret, and only fully known by the verifying node.

The other, POLY-2 is public, with the constant coefficient set at a

random value RND for each packet.



For each packet, the goal is compute the value of POLY-1 plus

POLY-2 at the point 0 -- that is, the constant coefficient of

POLY-3 = POLY-1 + POLY-

2.

Without going in too much details, one can observe that the

constant coefficient of POLY-3 is equal to the sum of the constant

coefficients of POLY-1 and POLY-2, and that the constant

coefficient of POLY-2 is the value RND present in each packet. In

the example given in section 3.3.2, the numbers are computed modulo

53, the constant coefficient of POLY-1 is 10, and the value RND is

45. The final sum  CML is indeed

10 + 45 = 2 mod 53.



To me, this appears as a serious weakness in the algorithm. If an

adversary can observe the value RND and CML for a first packet, it

can retrieve the constant coefficient of POLY-1, and thus can

predict the value of CML for any other packet. That does not seem very

secure.

...FB: There seems to be a bit of confusion or misreading of how the

method

works. In the above statement you seem to assume that the verifier

would not be part of the proof-chain, so that the final CML value

would be somehow exposed to an external entity along with RND. This

is not the case. The verifier is the last node (k+1) in the proof-chain.

At concept level, the method reconstructs the polynomial hop by hop,

picking

up a point on the curve at every hop. Only final node in the

proof-chain, which is also the verifier, acts on the information of

all the k+1 points and as such is able to reconstruct the polynomial.

In section 3.2.1, the draft explicitly states that the verifier *is*

part of the

proof-chain: "Each of the k+1 nodes (including verifier) are assigned

a point on the polynomial i.e., shares of the SECRET." The fact that

the verifier, i.e., the last node in the proof-chain ("k+1"),  can

retrieve the secret, is desired and intentional, because the verifier

needs to compare the result of the iterative construction of the secret with

the secret value it received from the controller.

This is how the system is designed, and the calculation of (10+45)

mod 53 = 2 is part of the verification.



OK. That's slightly less bad. But it is still very bad crypto,

because you are effectively doing a linear combination.



You are evaluating POLY-3 = POLY-1 + POLY-2



POLY-2 can be written as POLY-2 = RND + POLY-2-NC, in which POLY2-NC

only contains the non constant terms -- that is, POLY-2-NC(0) = 0



Then for any point X, we get POLY-3(X) = POLY-1(X) + POLY2-NC(X) +

RND For a given value Xj of X, this means we can express : POLY-3(Xj)

= Vj + RND In which Vj is a constant term = POLY-1(Xj) + POLY2-NC(Xj)



Each node will increment the cumul by the value LPCj * POLY-3(Xj) =

LPCj

* (Vj + RND)



Suppose that an adversary can observe the value of CML before and

after being incremented by node Xj. Suppose that it could do that

twice. Then it has the

values:



CML1-before-j = C1b

CML1-after-j = C1a

D1 = C1a - C1b = LPCj * (Vj + RND1)



CML1-before-j = C2b

CML1-after-j = C2a

D2 = C2a - C2b = LPCj * (Vj + RND2)



D2-D1 = LPCj*(RND2-RND1)



LPCj = (RND2-RND1)/(D2-D1)

Vj = D2/LPCj - RND2



The inverse of numbers modulo a prime P is easily computed -- see

Fermat's little theorem.



Once the input and output of a node have been observed twice, it

becomes easy to update the cumulative sum CML while bypassing these

nodes.

...FB: This is great. Thanks for spelling out the details.  You raise a good point:

For the solution to make sense, we need to ensure that an attacker cannot

observe the input and output of a node.

To ensure this does not happen, we must require the communication to/from

the node to be encrypted, e.g., through link layer encryption of at least the

proof-of-transit data fields.

We'll add this requirement to the draft - and also detail the threat you describe

above in detail in the security considerations section.



That still will not be sufficient, because you also have to deal with the nodes

themselves. By definition, they see the intermediate results of other nodes. For

example, if the function chain is A->B->C->D->E, the node B sees the output of B

and the node D sees the input of D. If B and D  collude, they have access to the

input and output of C. They can easily find the secrets of C, and then execute a

chain A->B---->D->E in which the input of D is "corrected" to hide the absence of

C from the evaluator E.



Thanks much. You raise another valid point and we will add it to the security considerations section.

That said, IMHO we'd need to put the scenario you raise into perspective:

If the nodes B and D would be compromised by an attacker, the deployment would face a much more serious security issue than what any proof-of-transit method could protect against.





The linear combination scheme in the draft is not sound crypto. My

recommendation is to present the problem and the threat model clearly to the

crypto community, for example by presenting to the CFRG, and solicit advice on

better algorithms.



There has been quite a bit of discussion on proof of transit in several WGs, even before the SFC WG picked it up. And the SFC working group has considered different approaches early on in the solution specification, including e.g., using nested encryption, which is probably more in line with your preferences. See https://datatracker.ietf.org/doc/html/draft-ietf-sfc-proof-of-transit-01#section-3.5.1. From my recollection of the discussion - others please chime in - one main reason of why the current approach was chosen was its computational simplicity, i.e., hardware platforms which do not support native encryption capabilities like AES-NI can implement it without considerable impact on the computational latency. So in other words, the current method is the result of a trade-off decision.
We are discussing mathematics, not opinions. It is not a matter of preferences, it is a matter of threat model. The draft that I reviewed does not mention that the scheme should only be used in a benign environment in which no attacker can see the traffic and all nodes are fully trusted to not try gaming the system. The proposed scheme uses crypto vocabulary, with references to SSS and use of terms like "proof" or "cryptanalysis". Indeed, the header paragraph of the security considerations says:

   POT is a mechanism that is used for verifying the path through which

   a packet was forwarded.  The security considerations of IOAM in

   general are discussed in [I-D.ietf-ippm-ioam-data].  Specifically, it

   is assumed that POT is used in a confined network domain, and

   therefore the potential threats that POT is intended to mitigate

   should be viewed accordingly.  POT prevents spoofing and tampering;

   an attacker cannot maliciously create a bogus POT or modify a

   legitimate one.  Furthermore, a legitimate node that takes part in

   the POT protocol cannot masquerade as another node along the path.

   These considerations are discussed in detail in the rest of this

   section.

The previous discussions have shown that an attacker CAN  "maliciously create a bogus POT or modify a legitimate one", provided it is able to see the traffic, or some of the traffic. The discussions also show that "a legitimate node that takes part in the POT protocol" CAN "masquerade as another node along the path". Contrary to statements in the "cryptanalysis" section, "A passive attacker observing CML values across nodes (i.e., as the packets entering and leaving)" CAN  "perform differential analysis". The attack cannot "be mitigated using a good PRNG for generating RND".

If the system was only designed for operation in a "benign environment" and you were only concerned with detecting operation failures, I am pretty sure that you could come out with something less complicated. For example you could exploit the analysis that I made to radically simplify the implementation and describe the scheme as "CML = Sum (Xj*RNDp)", where Xj is a secret coefficient provisioned to node j, and RNPp is per packet random number. The verification by the evaluator will check that "RND == CML + Xe*RND", where "Xe = 1 - Sum Xj". That would get you an easy-to-implement checksum. But you would need to be very clear about the domain of application, and the failure mode if the traffic can be observed or nodes can be compromised, and the draft should probably drop the references to Shamir's SSS, because they just obfuscate the analysis.

-- Christian Huitema