Re: [sfc] [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08

Christian Huitema <huitema@huitema.net> Sat, 25 September 2021 14:42 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 060783A1599 for <sfc@ietfa.amsl.com>; Sat, 25 Sep 2021 07:42:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.112
X-Spam-Level: ***
X-Spam-Status: No, score=3.112 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_SUMOF=5, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KhUe6y33RhIj for <sfc@ietfa.amsl.com>; Sat, 25 Sep 2021 07:42:15 -0700 (PDT)
Received: from mx36-out20.antispamcloud.com (mx36-out20.antispamcloud.com [209.126.121.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEA423A1597 for <sfc@ietf.org>; Sat, 25 Sep 2021 07:42:14 -0700 (PDT)
Received: from xse459.mail2web.com ([66.113.197.205] helo=xse.mail2web.com) by mx135.antispamcloud.com with esmtp (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1mU8sU-0002Jt-LG for sfc@ietf.org; Sat, 25 Sep 2021 16:42:13 +0200
Received: from xsmtp21.mail2web.com (unknown [10.100.68.60]) by xse.mail2web.com (Postfix) with ESMTPS id 4HGs7375L9zLrL for <sfc@ietf.org>; Sat, 25 Sep 2021 07:42:07 -0700 (PDT)
Received: from [10.5.2.16] (helo=xmail06.myhosting.com) by xsmtp21.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1mU8sR-0000AV-RR for sfc@ietf.org; Sat, 25 Sep 2021 07:42:07 -0700
Received: (qmail 19567 invoked from network); 25 Sep 2021 14:42:07 -0000
Received: from unknown (HELO [192.168.1.103]) (Authenticated-user:_huitema@huitema.net@[172.58.43.0]) (envelope-sender <huitema@huitema.net>) by xmail06.myhosting.com (qmail-ldap-1.03) with ESMTPA for <krishna.sashank@gmail.com>; 25 Sep 2021 14:42:06 -0000
To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, "secdir@ietf.org" <secdir@ietf.org>
Cc: "shwetha.bhandari@gmail.com" <shwetha.bhandari@gmail.com>, "last-call@ietf.org" <last-call@ietf.org>, "Youell, Stephen" <stephen.youell@jpmorgan.com>, "sfc@ietf.org" <sfc@ietf.org>, "draft-ietf-sfc-proof-of-transit.all@ietf.org" <draft-ietf-sfc-proof-of-transit.all@ietf.org>, "krishna.sashank@gmail.com" <krishna.sashank@gmail.com>
References: <163210969860.31323.5718880916818308072@ietfa.amsl.com> <DM8PR11MB5606222AA0739CE8093A6777DAA39@DM8PR11MB5606.namprd11.prod.outlook.com> <7329d9eb-3597-0006-dbc5-892a4ada74ab@huitema.net> <DM8PR11MB56061C0D02BC169F39D41407DAA49@DM8PR11MB5606.namprd11.prod.outlook.com> <31b9ad77-1848-011c-9b3f-3787aee21e41@huitema.net> <DM8PR11MB5606D099B760809CB3DD8326DAA59@DM8PR11MB5606.namprd11.prod.outlook.com>
From: Christian Huitema <huitema@huitema.net>
Message-ID: <db45f7e3-3961-68fa-5e90-981756139b51@huitema.net>
Date: Sat, 25 Sep 2021 07:42:06 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0
MIME-Version: 1.0
In-Reply-To: <DM8PR11MB5606D099B760809CB3DD8326DAA59@DM8PR11MB5606.namprd11.prod.outlook.com>
Content-Type: multipart/alternative; boundary="------------0759671A8D2F84B2341AC638"
Content-Language: en-US
X-Originating-IP: 66.113.197.205
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.197.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.197.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.05)
X-Recommended-Action: accept
X-Filter-ID: Pt3MvcO5N4iKaDQ5O6lkdGlMVN6RH8bjRMzItlySaT9Yvgml6dq2baYSPS6J0Gz8PUtbdvnXkggZ 3YnVId/Y5jcf0yeVQAvfjHznO7+bT5wC9QKR8x3cqbo833Y5QPZUj3CSdYahsEhiizd3WfZtEcUU hzFfIXnuci56cUDrPyjlYLLlWSy3OGfGBNeqx2anHyJxjDLo4/ugN15VVJm4KWrxEaaKeSxe0Wrx 6M4G5/Wm4Zd53xWOh54QqC5fJ2uRp/HAJy4pHy/8uhgy9Mxqulxh7hoyMoWHMkqYfQEaAmvCty8B lkT4xtiHBxUBC1FFpbt3W3gfNnuKkqGP09ZKLP25Cgscc2Nqd9azmDa4ZbYxn04qRLKGrOrEzQDq o2Fe5e0H1p2YD3fIDgqE3F/hSENKwnAR2oVisY+bnEqWCKi5klmK1va3wJScg92pg//jdNpXP/ul EV6DIUDLc0Yd6iTlYE+Zcn8p1rPpG64P1y7nVrUQfxkYoV3jt7fqlPgR0kaOEXLuWd+6zLg4wp8u X1nsyWu8Q0HDoORE+fy5gr3LgKffTIgl7nuGO/IJU1342OUMeHyTpNN0eXybX/w7/4a+Zyc1sUYl ckMDbruAhxfaTSRjFdfhbaOt3LLrhebQAcHtoyCyGWZ8SUmHpFC5J6SNkTZ2eLc3mLvTEfZDjcWU yFvVQ+MmDZAZ0euzuAHrEnFzsC48bTEFY06/YbB87Ww8G0LoS8V3Mt1pta8qAcLtCB3G1CwpaI3Z 4ESkMWDVJEenxBoIht3V0nekAoxXAnOPvefzwraaIJ5D87aSQTOyuLfHqAnAj7rgKH7+eCmm3ViP ecxPckWaFCeAJFNtu1ShcA6Xvva2QAVEjpqzANbJ1UfXmet2cbFKoyT/OdZLqZz0GWF+/l6fuWj3 ccO2FG0AuXq0T17woJo3avKeADIsy647Mn0zwmGzAi3Zn+YdthRNgs7Ig4l/XErpYn3glZTKFuaT l19W3ISq9+1KiLsESGU+y+fjdgjudZxiTPi+MG1QP35nsYfP84c+RFK3KiZuZ5OAUoGBziSYFLZu u6zX3xxsmqT8l9ARlsTalAaf
X-Report-Abuse-To: spam@quarantine11.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/obPYp5bjTxl9maVcJw2neU7xFk4>
Subject: Re: [sfc] [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-08
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Sep 2021 14:42:21 -0000

On 9/25/2021 4:20 AM, Frank Brockners (fbrockne) wrote:
> Hi Christian,
>
> Thanks for the follow-up. Please see below.
>
>> -----Original Message-----
>> From: Christian Huitema <huitema@huitema.net>
>> Sent: Friday, 24 September 2021 17:16
>> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>; secdir@ietf.org
>> Cc: shwetha.bhandari@gmail.com; last-call@ietf.org; Youell, Stephen
>> <stephen.youell@jpmorgan.com>; sfc@ietf.org; draft-ietf-sfc-proof-of-
>> transit.all@ietf.org; krishna.sashank@gmail.com
>> Subject: Re: [Last-Call] Secdir last call review of draft-ietf-sfc-proof-of-transit-
>> 08
>>
>>
>> On 9/24/2021 1:39 AM, Frank Brockners (fbrockne) wrote:
>>> Hi Christian,
>>>
>>> Thanks a lot for the detailed follow-up. Please see inline.
>>>
>>>> -----Original Message-----
>>>> From: Christian Huitema <huitema@huitema.net>
>>>> Sent: Thursday, 23 September 2021 22:13
>>>> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>; secdir@ietf.org
>>>> Cc: shwetha.bhandari@gmail.com; last-call@ietf.org; Youell, Stephen
>>>> <stephen.youell@jpmorgan.com>; sfc@ietf.org; draft-ietf-sfc-proof-of-
>>>> transit.all@ietf.org
>>>> Subject: Re: [Last-Call] Secdir last call review of
>>>> draft-ietf-sfc-proof-of-transit-
>>>> 08
>>>>
>>>>
>>>> On 9/23/2021 12:31 PM, Frank Brockners (fbrockne) wrote:
>>>>> Hi Christian,
>>>>>
>>>>> Thanks a lot for your detailed review. Please see inline.
>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Christian Huitema via Datatracker <noreply@ietf.org>
>>>>>> Sent: Monday, 20 September 2021 05:48
>>>>>> To: secdir@ietf.org
>>>>>> Cc: draft-ietf-sfc-proof-of-transit.all@ietf.org;
>>>>>> last-call@ietf.org; sfc@ietf.org
>>>>>> Subject: Secdir last call review of
>>>>>> draft-ietf-sfc-proof-of-transit-08
>>>>>>
>>>>>> Reviewer: Christian Huitema
>>>>>> Review result: Serious Issues
>>>>>>
>>>>>> I have reviewed this document as part of the security directorate's
>>>>>> ongoing effort to review all IETF documents being processed by the
>>>>>> IESG.  These comments were written primarily for the benefit of the
>>>>>> security
>>>> area directors.
>>>>>> Document editors and WG chairs should treat these comments just
>>>>>> like any other last call comments.
>>>>>>
>>>>>> This document proposes a security mechanism to prove that traffic
>>>>>> transited through all specified nodes in a path. The mechanism
>>>>>> works by adding a short option to each packet for which transit
>>>>>> shall be verified. The option consists of a random number set by
>>>>>> the originator of the packet, and a sum field to which each transit
>>>>>> node adds a value depending on public parameters, on the random
>>>>>> number and on secrets held by the node. The destination has access
>>>>>> to all the secrets held by the nodes on the path, and can verify
>>>>>> whether or not the final sum corresponds to the sum of expected
>>>>>> values. The proposed size
>>>> of the random number and the sum field is 64 bits.
>>>>>> In the paragraph above, I described the mechanism without
>>>>>> mentioning the algorithm used to compute these 64 bit numbers. The
>>>>>> 64 bit size is obviously a
>>>>>> concern: for cryptographic applications, 64 bits is not a large
>>>>>> number, and that might be a weakness whatever the proposed algorithm.
>>>>>> The actual algorithm appears to be a bespoke derivation of Shamir's
>>>>>> Secret Sharing algorithm (SSS). In other word, it is a case of
>>>>>> "inventing your
>>>> own crypto".
>>>>> ...FB: SSS is a well know algorithm and
>>>>> draft-ietf-sfc-proof-of-transit does not
>>>> modify it.
>>>>> All draft-ietf-sfc-proof-of-transit does is to operationalize the
>>>>> SSS algorithm
>>>> for the proof of transit use case.
>>>>> Also note that the draft does not require the use of 64 bit numbers.
>>>>> Nor does draft require a minimum time between changing the secrets.
>>>>> What particular attack are you concerned about where 64 bit numbers
>>>>> are a
>>>> concern?
>>>>>> SSS relies on the representation of polynomials as a sum of
>>>>>> Lagrange Basis Polynomials. Each of the participating nodes holds a
>>>>>> share of the secret represented by a point on the polynomial curve.
>>>>>> A polynomial of degree K on the field of integers modulo a prime
>>>>>> number N can only be revealed if at list K+1 participants reveal
>>>>>> the value of their point. The safety of the algorithm relies on the
>>>>>> size of the number N and on the fact that the secret shall be revealed only
>> once.
>>>>>> But the algorithm does not use SSS directly, so it deserves its own
>>>>>> security
>>>> analysis instead of relying simply on Shamir's work.
>>>>>> The proposed algorithm uses two polynomials of degree K for a path
>>>>>> containing
>>>>>> K+1 nodes, on a field defined by a prime number N of 64 bits. One
>>>>>> K+of the
>>>>>> polynomial, POLY-1, is secret, and only fully known by the verifying node.
>>>>>> The other, POLY-2 is public, with the constant coefficient set at a
>>>>>> random value RND for each packet.
>>>>>>
>>>>>> For each packet, the goal is compute the value of POLY-1 plus
>>>>>> POLY-2 at the point 0 -- that is, the constant coefficient of
>>>>>> POLY-3 = POLY-1 + POLY-
>>>> 2.
>>>>>> Without going in too much details, one can observe that the
>>>>>> constant coefficient of POLY-3 is equal to the sum of the constant
>>>>>> coefficients of POLY-1 and POLY-2, and that the constant
>>>>>> coefficient of POLY-2 is the value RND present in each packet. In
>>>>>> the example given in section 3.3.2, the numbers are computed modulo
>>>>>> 53, the constant coefficient of POLY-1 is 10, and the value RND is
>>>>>> 45. The final sum  CML is indeed
>>>>>> 10 + 45 = 2 mod 53.
>>>>>>
>>>>>> To me, this appears as a serious weakness in the algorithm. If an
>>>>>> adversary can observe the value RND and CML for a first packet, it
>>>>>> can retrieve the constant coefficient of POLY-1, and thus can
>>>>>> predict the value of CML for any other packet. That does not seem very
>> secure.
>>>>> ...FB: There seems to be a bit of confusion or misreading of how the
>>>>> method
>>>> works. In the above statement you seem to assume that the verifier
>>>> would not be part of the proof-chain, so that the final CML value
>>>> would be somehow exposed to an external entity along with RND. This
>>>> is not the case. The verifier is the last node (k+1) in the proof-chain.
>>>>> At concept level, the method reconstructs the polynomial hop by hop,
>>>>> picking
>>>> up a point on the curve at every hop. Only final node in the
>>>> proof-chain, which is also the verifier, acts on the information of
>>>> all the k+1 points and as such is able to reconstruct the polynomial.
>>>>> In section 3.2.1, the draft explicitly states that the verifier *is*
>>>>> part of the
>>>> proof-chain: "Each of the k+1 nodes (including verifier) are assigned
>>>> a point on the polynomial i.e., shares of the SECRET." The fact that
>>>> the verifier, i.e., the last node in the proof-chain ("k+1"),  can
>>>> retrieve the secret, is desired and intentional, because the verifier
>>>> needs to compare the result of the iterative construction of the secret with
>> the secret value it received from the controller.
>>>> This is how the system is designed, and the calculation of (10+45)
>>>> mod 53 = 2 is part of the verification.
>>>>
>>>> OK. That's slightly less bad. But it is still very bad crypto,
>>>> because you are effectively doing a linear combination.
>>>>
>>>> You are evaluating POLY-3 = POLY-1 + POLY-2
>>>>
>>>> POLY-2 can be written as POLY-2 = RND + POLY-2-NC, in which POLY2-NC
>>>> only contains the non constant terms -- that is, POLY-2-NC(0) = 0
>>>>
>>>> Then for any point X, we get POLY-3(X) = POLY-1(X) + POLY2-NC(X) +
>>>> RND For a given value Xj of X, this means we can express : POLY-3(Xj)
>>>> = Vj + RND In which Vj is a constant term = POLY-1(Xj) + POLY2-NC(Xj)
>>>>
>>>> Each node will increment the cumul by the value LPCj * POLY-3(Xj) =
>>>> LPCj
>>>> * (Vj + RND)
>>>>
>>>> Suppose that an adversary can observe the value of CML before and
>>>> after being incremented by node Xj. Suppose that it could do that
>>>> twice. Then it has the
>>>> values:
>>>>
>>>> CML1-before-j = C1b
>>>> CML1-after-j = C1a
>>>> D1 = C1a - C1b = LPCj * (Vj + RND1)
>>>>
>>>> CML1-before-j = C2b
>>>> CML1-after-j = C2a
>>>> D2 = C2a - C2b = LPCj * (Vj + RND2)
>>>>
>>>> D2-D1 = LPCj*(RND2-RND1)
>>>>
>>>> LPCj = (RND2-RND1)/(D2-D1)
>>>> Vj = D2/LPCj - RND2
>>>>
>>>> The inverse of numbers modulo a prime P is easily computed -- see
>>>> Fermat's little theorem.
>>>>
>>>> Once the input and output of a node have been observed twice, it
>>>> becomes easy to update the cumulative sum CML while bypassing these
>> nodes.
>>> ...FB: This is great. Thanks for spelling out the details.  You raise a good point:
>> For the solution to make sense, we need to ensure that an attacker cannot
>> observe the input and output of a node.
>>> To ensure this does not happen, we must require the communication to/from
>> the node to be encrypted, e.g., through link layer encryption of at least the
>> proof-of-transit data fields.
>>> We'll add this requirement to the draft - and also detail the threat you describe
>> above in detail in the security considerations section.
>>
>> That still will not be sufficient, because you also have to deal with the nodes
>> themselves. By definition, they see the intermediate results of other nodes. For
>> example, if the function chain is A->B->C->D->E, the node B sees the output of B
>> and the node D sees the input of D. If B and D  collude, they have access to the
>> input and output of C. They can easily find the secrets of C, and then execute a
>> chain A->B---->D->E in which the input of D is "corrected" to hide the absence of
>> C from the evaluator E.
> Thanks much. You raise another valid point and we will add it to the security considerations section.
> That said, IMHO we'd need to put the scenario you raise into perspective:
> If the nodes B and D would be compromised by an attacker, the deployment would face a much more serious security issue than what any proof-of-transit method could protect against.
>
>> The linear combination scheme in the draft is not sound crypto. My
>> recommendation is to present the problem and the threat model clearly to the
>> crypto community, for example by presenting to the CFRG, and solicit advice on
>> better algorithms.
> There has been quite a bit of discussion on proof of transit in several WGs, even before the SFC WG picked it up. And the SFC working group has considered different approaches early on in the solution specification, including e.g., using nested encryption, which is probably more in line with your preferences. See https://datatracker.ietf.org/doc/html/draft-ietf-sfc-proof-of-transit-01#section-3.5.1. From my recollection of the discussion - others please chime in - one main reason of why the current approach was chosen was its computational simplicity, i.e., hardware platforms which do not support native encryption capabilities like AES-NI can implement it without considerable impact on the computational latency. So in other words, the current method is the result of a trade-off decision.
We are discussing mathematics, not opinions. It is not a matter of 
preferences, it is a matter of threat model. The draft that I reviewed 
does not mention that the scheme should only be used in a benign 
environment in which no attacker can see the traffic and all nodes are 
fully trusted to not try gaming the system. The proposed scheme uses 
crypto vocabulary, with references to SSS and use of terms like "proof" 
or "cryptanalysis". Indeed, the header paragraph of the security 
considerations says:

    POT is a mechanism that is used for verifying the path through which
    a packet was forwarded.  The security considerations of IOAM in
    general are discussed in [I-D.ietf-ippm-ioam-data].  Specifically, it
    is assumed that POT is used in a confined network domain, and
    therefore the potential threats that POT is intended to mitigate
    should be viewed accordingly.  POT prevents spoofing and tampering;
    an attacker cannot maliciously create a bogus POT or modify a
    legitimate one.  Furthermore, a legitimate node that takes part in
    the POT protocol cannot masquerade as another node along the path.
    These considerations are discussed in detail in the rest of this
    section.

The previous discussions have shown that an attacker CAN "maliciously 
create a bogus POT or modify a legitimate one", provided it is able to 
see the traffic, or some of the traffic. The discussions also show that 
"a legitimate node that takes part in the POT protocol" CAN "masquerade 
as another node along the path". Contrary to statements in the 
"cryptanalysis" section, "A passive attacker observing CML values across 
nodes (i.e., as the packets entering and leaving)" CAN  "perform 
differential analysis". The attack cannot "be mitigated using a good 
PRNG for generating RND".

If the system was only designed for operation in a "benign environment" 
and you were only concerned with detecting operation failures, I am 
pretty sure that you could come out with something less complicated. For 
example you could exploit the analysis that I made to radically simplify 
the implementation and describe the scheme as "CML = Sum (Xj*RNDp)", 
where Xj is a secret coefficient provisioned to node j, and RNPp is per 
packet random number. The verification by the evaluator will check that 
"RND == CML + Xe*RND", where "Xe = 1 - Sum Xj". That would get you an 
easy-to-implement checksum. But you would need to be very clear about 
the domain of application, and the failure mode if the traffic can be 
observed or nodes can be compromised, and the draft should probably drop 
the references to Shamir's SSS, because they just obfuscate the analysis.

-- Christian Huitema