Re: [sunset4] to summarize Lorzeno's "drive-by" attack on draft-ietf-sunset4-noipv4

Simon Perreault <sperreault@jive.com> Mon, 04 August 2014 12:47 UTC

Return-Path: <sperreault@jive.com>
X-Original-To: sunset4@ietfa.amsl.com
Delivered-To: sunset4@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17C9E1B2ABA for <sunset4@ietfa.amsl.com>; Mon, 4 Aug 2014 05:47:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level:
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k3222TiW-EIM for <sunset4@ietfa.amsl.com>; Mon, 4 Aug 2014 05:47:52 -0700 (PDT)
Received: from mail-oa0-f41.google.com (mail-oa0-f41.google.com [209.85.219.41]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B99CF1B2AAF for <sunset4@ietf.org>; Mon, 4 Aug 2014 05:47:52 -0700 (PDT)
Received: by mail-oa0-f41.google.com with SMTP id j17so4908612oag.14 for <sunset4@ietf.org>; Mon, 04 Aug 2014 05:47:50 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to :cc:subject:references:in-reply-to:content-type :content-transfer-encoding; bh=5pW/ZN6NqGDS46Ve/+gGzvIAfrW/YB/HAcxDX4uDIWY=; b=gFDWvsX9UOdMElZfMcz74M93BjNb8FZlcfpOksEqPmU7GAPGWgL9ZkaDYIouPJT8qt 6v6NRen5ka+lmYhA2ZRl1Hb/Kn1y1vOU1KCqJZTsKcxdE+h2Bh3YKKhsrwRRkfoXUCZt 4yR/CkZS4cjBG2cDidi7p9wlnfMbHu0PXpR1+CguMBlZScPqVi/MCZqD9J0slg60mZUe i/ZtkHqSFEDCvyQLQqSsUtuGGiaRbq4TEJHNLBNgbR7HJjOhyDkPaPkYWmSFS5dNlNK3 9scf92dCPQ0gi1WYaHUB7auiEHbROcDtqHpzaPQwTg0B+yvCyjAlfJ4EpXSh7iMz59O4 HALg==
X-Gm-Message-State: ALoCoQlb8vGKVsNuFK6ZiI0+9A7koFs5kIgmgVbCgDpBOcnOKees1yTgyENRe30zCv6KcfOwVTXc
X-Received: by 10.182.125.8 with SMTP id mm8mr31416243obb.11.1407156469563; Mon, 04 Aug 2014 05:47:49 -0700 (PDT)
Received: from [192.168.1.96] (modemcable233.42-178-173.mc.videotron.ca. [173.178.42.233]) by mx.google.com with ESMTPSA id s6sm38900869obf.4.2014.08.04.05.47.47 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 04 Aug 2014 05:47:48 -0700 (PDT)
Message-ID: <53DF80F2.2060503@jive.com>
Date: Mon, 04 Aug 2014 08:47:46 -0400
From: Simon Perreault <sperreault@jive.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.7.0
MIME-Version: 1.0
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <11190.1406240244@sandelman.ca> <C12A07EA-E27A-4EAF-A9DE-536FF22A0395@cisco.com> <3B647D53-0E22-43C3-892D-319C9109248C@nominum.com> <53D6559B.2090300@jive.com> <19625.1407011032@sandelman.ca>
In-Reply-To: <19625.1407011032@sandelman.ca>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/sunset4/4puIXj7Y_MLt76uiKkSoVTyEcR0
Cc: sunset4@ietf.org
Subject: Re: [sunset4] to summarize Lorzeno's "drive-by" attack on draft-ietf-sunset4-noipv4
X-BeenThere: sunset4@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: sunset4 working group discussion list <sunset4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sunset4>, <mailto:sunset4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sunset4/>
List-Post: <mailto:sunset4@ietf.org>
List-Help: <mailto:sunset4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sunset4>, <mailto:sunset4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Aug 2014 12:47:57 -0000

Le 2014-08-02 16:23, Michael Richardson a écrit :
> If the No-IPv4 is defined to mean: "reduce the frequency of your DISCOVER"
> it seems that the attacker has to retransmit regularly...  It seems to me
> that if the machine has *no* network connectivity at all yet (no IPv6
> either, which the IPv6 process listening to the No-IPV4 message would know),
> then the node should be skeptical about the NoIP4 flag anyway.

Note that the equivalent for DHCPv6 has been published recently: 
http://tools.ietf.org/html/rfc7083#section-4

That RFC's security considerations section says:

    This document introduces one security consideration beyond those
    described in RFC 3315.  A malicious DHCPv6 server might cause a
    client to set its SOL_MAX_RT and INF_MAX_RT parameters to an
    unreasonably high value with the SOL_MAX_RT and INF_MAX_RT options,
    which may cause an undue delay in a client completing its DHCPv6
    protocol transaction in the case no other valid response is received.
    Assuming the client also receives a response from a valid DHCPv6
    server, large values for SOL_MAX_RT and INF_MAX_RT will not have any
    effect.

I suppose that a SOL_MAX_RT for DHCPv4 would have the exact same 
considerations.

> My understanding of the goal is to reduce the amount of *broadcast* DHCPv4
> traffic that cloggs up some networks' infrastructure, because nodes that
> don't get IPv4, ask more and more often as they can't find it.

That's one of the goals. See here:

http://tools.ietf.org/html/draft-ietf-sunset4-noipv4-00#section-3

Simon