Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protocol-11

"Montgomery, Douglas" <dougm@nist.gov> Sat, 14 February 2015 16:13 UTC

Return-Path: <dougm@nist.gov>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0ABB1A1B2F for <sidr@ietfa.amsl.com>; Sat, 14 Feb 2015 08:13:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id osK5dNV0INuy for <sidr@ietfa.amsl.com>; Sat, 14 Feb 2015 08:13:18 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0110.outbound.protection.outlook.com [207.46.100.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E5D31A6EE0 for <sidr@ietf.org>; Sat, 14 Feb 2015 08:13:18 -0800 (PST)
Received: from BLUPR09MB0168.namprd09.prod.outlook.com (10.255.216.22) by BLUPR09MB0168.namprd09.prod.outlook.com (10.255.216.22) with Microsoft SMTP Server (TLS) id 15.1.81.19; Sat, 14 Feb 2015 16:13:17 +0000
Received: from BLUPR09MB0168.namprd09.prod.outlook.com ([10.255.216.22]) by BLUPR09MB0168.namprd09.prod.outlook.com ([10.255.216.22]) with mapi id 15.01.0081.018; Sat, 14 Feb 2015 16:13:17 +0000
From: "Montgomery, Douglas" <dougm@nist.gov>
To: "Keyur Patel (keyupate)" <keyupate@cisco.com>, David Mandelberg <david@mandelberg.org>, "sidr@ietf.org" <sidr@ietf.org>
Thread-Topic: [sidr] wglc for draft-ietf-sidr-bgpsec-protocol-11
Thread-Index: AQHQObnOcPb8vAQ1J0e+p2o22yvlkpzjGf4AgAcb4fmAAE0wAIAE7aoAgACqQQA=
Importance: low
X-Priority: 5
Date: Sat, 14 Feb 2015 16:13:16 +0000
Message-ID: <D104DC36.3310E%dougm@nist.gov>
References: <54DA7C98.4040604@mandelberg.org> <D103DE3D.1041C%keyupate@cisco.com>
In-Reply-To: <D103DE3D.1041C%keyupate@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.7.141117
x-originating-ip: [129.6.219.148]
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;SRVR:BLUPR09MB0168;
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:;SRVR:BLUPR09MB0168;
x-forefront-prvs: 0487C0DB7E
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(377454003)(24454002)(51704005)(479174004)(54356999)(66066001)(81686999)(86362001)(122556002)(87936001)(107886001)(575784001)(15975445007)(36756003)(19580405001)(2656002)(77096005)(102836002)(106116001)(76176999)(50986999)(92566002)(99286002)(230783001)(19580395003)(77156002)(62966003)(40100003)(2950100001)(46102003)(2900100001)(83506001)(2501002)(7059030); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR09MB0168; H:BLUPR09MB0168.namprd09.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
Content-Type: text/plain; charset="utf-8"
Content-ID: <7AD173B844BC5047A3768957B463C40A@namprd09.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2015 16:13:16.1548 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR09MB0168
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/MEr9UCn5KlWt1d3ciFmU5qyFmt8>
Subject: Re: [sidr] wglc for draft-ietf-sidr-bgpsec-protocol-11
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Feb 2015 16:13:21 -0000

Since we agreed to decouple path validity from origin validity (and return
both as distinct validation results), we should probably clean this up.

That is, we now can’t rely on the origin being invalid, to invalidate this
path manipulation. 

And even if we had not decoupled those two, just because you might be
authorized to announce 102::/16 to a peer, that is different than saying
that you actually announced it.

I realize that the threat scenario here is getting diminishing small, but
still, we should clean this up to reduce it to zero.

dougm
— 
Doug Montgomery, Mgr Internet & Scalable Systems Research @  NIST/ITL/ANTD





On 2/13/15, 8:03 PM, "Keyur Patel (keyupate)" <keyupate@cisco.com> wrote:

>Hi David,
>
>
>On 2/10/15, 1:48 PM, "David Mandelberg" <david@mandelberg.org> wrote:
>
>>All, while coming up with the example below, I realized another issue.
>>The structure in 4.1 doesn't include an Address Family Identifier.
>>Unless I missed something, this means that a signature for 1.2.0.0/16
>>would be exactly the same as a signature for 102::/16. This would be a
>>much more practical attack than the one I originally though of.
>
>
>But, isn¹t this issue covered by origin-AS validation?
>
>Regards,
>Keyur
>
>
>
>>
>>Michael, response to your comment is below.
>>
>>On 02/10/2015 12:09 PM, Michael Baer wrote:
>>> I don't believe this is a problem.  The signature is calculated by
>>> creating a digest of the data and then creating a signature from that
>>> digest.  I'm definitely not a cryptography expert, but my understanding
>>> of digest functions generally is that with even slightly differing
>>> input, the resulting set of bits should be completely different.
>>> Assuming the digest function chosen is not flawed, there shouldn't be a
>>> set of bits from the digest of 4.1 that could be used to successfully
>>> replace the digest of 4.2, except by chance.
>>
>>You're right about digest algorithms being highly sensitive to changes
>>in the input, but the issue I described is when the two inputs are
>>equal, not just similar. For example, if a router signed the below
>>values in the structure from 4.2:
>>
>>Target AS Number = 0x01020304
>>Origin AS Number = 0x05060708
>>pCount = 0x01
>>Flags = 0x00
>>Most Recent Sig Field = 0x00700102030405060708090a0b0c0d0e (See Sriram's
>>email for why this would never actually happen with the current
>>algorithm suite's signature length.)
>>
>>Then the router signed the digest of the bytes
>>0x0102030405060708010000700102030405060708090a0b0c0d0e. However, these
>>exact same bytes could appear to have come from the structure in 4.1
>>with these values:
>>
>>Target AS Number = 0x01020304
>>Origin AS Number = 0x05060708
>>pCount = 0x01
>>Flags = 0x00
>>Algorithm Suite Id = 0x00
>>NLRI Length = 0x70 (112 bits = 14 bytes)
>>NLRI Prefix = 0x0102030405060708090a0b0c0d0e
>>
>>Note that the first 16 bits of 4.2's Most Recent Sig Field can't be any
>>values. The first 8 have to match the Algorithm Suite ID (1 possible
>>value). The next 8 have to be a valid number of bits for the number of
>>bytes in the prefix (8 possible values). This means that there's only a
>>2^-13 chance that a single random Most Recent Sig Field of the
>>appropriate length could be reinterpreted successfully. However, with
>>more than 2^13 signatures floating around the Internet, that's not good
>>odds.
>>
>>-- 
>>David Eric Mandelberg / dseomn
>>http://david.mandelberg.org/
>>
>
>_______________________________________________
>sidr mailing list
>sidr@ietf.org
>https://www.ietf.org/mailman/listinfo/sidr