Re: [Syslog] Issue 15 - DoS measures

"Joseph Salowey (jsalowey)" <jsalowey@cisco.com> Mon, 21 June 2010 04:38 UTC

Return-Path: <jsalowey@cisco.com>
X-Original-To: syslog@core3.amsl.com
Delivered-To: syslog@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C1FFC3A6A16 for <syslog@core3.amsl.com>; Sun, 20 Jun 2010 21:38:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.365
X-Spam-Level:
X-Spam-Status: No, score=-10.365 tagged_above=-999 required=5 tests=[AWL=0.234, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0a+ZyN1HsrIo for <syslog@core3.amsl.com>; Sun, 20 Jun 2010 21:38:16 -0700 (PDT)
Received: from sj-iport-4.cisco.com (sj-iport-4.cisco.com [171.68.10.86]) by core3.amsl.com (Postfix) with ESMTP id 5C15E3A68CD for <syslog@ietf.org>; Sun, 20 Jun 2010 21:38:15 -0700 (PDT)
Authentication-Results: sj-iport-4.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAEqJHkyrR7Hu/2dsb2JhbACfBnGmW5k6hRsEg1Q
X-IronPort-AV: E=Sophos;i="4.53,450,1272844800"; d="scan'208";a="147292459"
Received: from sj-core-5.cisco.com ([171.71.177.238]) by sj-iport-4.cisco.com with ESMTP; 21 Jun 2010 04:38:22 +0000
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com [128.107.191.100]) by sj-core-5.cisco.com (8.13.8/8.14.3) with ESMTP id o5L4cMrS000754 for <syslog@ietf.org>; Mon, 21 Jun 2010 04:38:22 GMT
Received: from xmb-sjc-225.amer.cisco.com ([128.107.191.38]) by xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Sun, 20 Jun 2010 21:38:21 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Date: Sun, 20 Jun 2010 21:38:20 -0700
Message-ID: <AC1CFD94F59A264488DC2BEC3E890DE50AC624FD@xmb-sjc-225.amer.cisco.com>
In-Reply-To: <Pine.GSO.4.63.1006181711400.13308@sjc-cde-011.cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Syslog] Issue 15 - DoS measures
Thread-Index: AcsPYcG4Ma57ayVxS2eRluiN0N3SjQBmS3uQ
References: <Pine.GSO.4.63.1006181711400.13308@sjc-cde-011.cisco.com>
From: "Joseph Salowey (jsalowey)" <jsalowey@cisco.com>
To: "Chris Lonvick (clonvick)" <clonvick@cisco.com>, syslog@ietf.org
X-OriginalArrivalTime: 21 Jun 2010 04:38:21.0962 (UTC) FILETIME=[943666A0:01CB10FB]
Subject: Re: [Syslog] Issue 15 - DoS measures
X-BeenThere: syslog@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Issues in Network Event Logging <syslog.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/syslog>
List-Post: <mailto:syslog@ietf.org>
List-Help: <mailto:syslog-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jun 2010 04:38:18 -0000

> -----Original Message-----
> From: syslog-bounces@ietf.org [mailto:syslog-bounces@ietf.org] On
Behalf
> Of Chris Lonvick (clonvick)
> Sent: Friday, June 18, 2010 8:45 PM
> To: syslog@ietf.org
> Subject: [Syslog] Issue 15 - DoS measures
> 
> SECDIR reviewer said:
> 
> Section 5.3 says "Implementations MUST support the denial of service
> countermeasures defined by DTLS." That's good but it's not clear
> whether this means that these countermeasures MUST always be enabled.
> Since that is not explicitly stated, it seems that a server could
> have those countermeasures enabled by default and a client could
> have them disabled by default. That would result in a client and
> server that would not interoperate until the administrator tracked
> down the problem and changed their configuration. I suggest that
> the document be changed to require not only that implementations
> support these countermeasures but that they be enabled by default.
> 
[Joe] The countermeasures are always supported, it's up to the server
whether to invoke them or not, the client will always follow the
protocol.  I don't think there is an interoperability problem here.
This is probably a case where we discuss too much DTLS details in the
draft.  I would suggest changing:

OLD:
When these
   countermeasures are enabled, the transport receiver responds with a
   DTLS Hello Verify Request containing a cookie.

New:

When these
   countermeasures are used, the transport receiver responds with a
   DTLS Hello Verify Request containing a cookie.


Joe

> My response was:
> "Good catch."
> 
> ACTION:  Comments?
> 
> Thanks,
> Chris
> _______________________________________________
> Syslog mailing list
> Syslog@ietf.org
> https://www.ietf.org/mailman/listinfo/syslog