Re: [tcpm] draft-gont-tcp-security

Fernando Gont <fernando@gont.com.ar> Mon, 13 April 2009 19:22 UTC

Return-Path: <fernando.gont.netbook.win@gmail.com>
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B69113A68F3; Mon, 13 Apr 2009 12:22:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.434
X-Spam-Level:
X-Spam-Status: No, score=-2.434 tagged_above=-999 required=5 tests=[AWL=0.165, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XB0c-BM3U9Xq; Mon, 13 Apr 2009 12:22:21 -0700 (PDT)
Received: from mail-gx0-f163.google.com (mail-gx0-f163.google.com [209.85.217.163]) by core3.amsl.com (Postfix) with ESMTP id DB96D3A68D1; Mon, 13 Apr 2009 12:22:16 -0700 (PDT)
Received: by gxk7 with SMTP id 7so433315gxk.13 for <multiple recipients>; Mon, 13 Apr 2009 12:23:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:sender:message-id:date:from :user-agent:mime-version:to:cc:subject:references:in-reply-to :x-enigmail-version:openpgp:content-type:content-transfer-encoding; bh=yAi6IxUnt0bjyi7ie5/zh3Tc7neo7XV4qkrYVtULmzA=; b=KuBVCODLbazFQiaS6LFhulXACDzpRBEQVr8Hz+Y4XatjzclkoC42mfQC/0KCSTP2oy eOrARURh7F8e6456GiTrMzlPa0Ool8mpF89U5Dq0Vll2+CCLTbXuoQA93MR8zUozzHPl hT+PrT6x7pH8tejE93wxGfJErr3y4lRc4ZzwQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=sender:message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:x-enigmail-version:openpgp:content-type :content-transfer-encoding; b=HG2g3eQGAEtAqMx2+WCZkLUxDJEQ5en5yXFxIhDaJVwJBwqY9+enDqclg/E9K6YXVJ 3ON9OrXM5X1DBPHjrmozLbSi7OSuKz/Op96FQMM5n6zqY+TeYZ1YmJDm5sqWAWye2Kq9 LSO2tCOUPJa/6oiDDX6UlWj2DcyulYOi6ycXs=
Received: by 10.100.152.12 with SMTP id z12mr6046866and.96.1239650595208; Mon, 13 Apr 2009 12:23:15 -0700 (PDT)
Received: from ?192.168.0.151? (235-131-17-190.fibertel.com.ar [190.17.131.235]) by mx.google.com with ESMTPS id b14sm139539ana.18.2009.04.13.12.23.08 (version=TLSv1/SSLv3 cipher=RC4-MD5); Mon, 13 Apr 2009 12:23:14 -0700 (PDT)
Sender: Fernando Gont <fernando.gont.netbook.win@gmail.com>
Message-ID: <49E39119.1060902@gont.com.ar>
Date: Mon, 13 Apr 2009 16:23:05 -0300
From: Fernando Gont <fernando@gont.com.ar>
User-Agent: Thunderbird 2.0.0.21 (Windows/20090302)
MIME-Version: 1.0
To: Joe Touch <touch@ISI.EDU>
References: <C304DB494AC0C04C87C6A6E2FF5603DB221318F5E8@NDJSSCC01.ndc.nasa.gov> <49E36AB9.40507@isi.edu> <49E384E9.1050106@gont.com.ar> <49E3878C.9080200@isi.edu>
In-Reply-To: <49E3878C.9080200@isi.edu>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D076FFF1
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: Joel Jaeggli <joelja@bogus.com>, "tcpm@ietf.org" <tcpm@ietf.org>, ietf@ietf.org, Joe Abley <jabley@ca.afilias.info>, opsec@ietf.org
Subject: Re: [tcpm] draft-gont-tcp-security
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Apr 2009 19:22:22 -0000

Joe Touch wrote:

>> So we had tcp-secure in 2004, icmp-attacks in 2005, a claim for a
>> trivial attack in 2008 (Outpost24/CERT-FI), and we'll probably continue
>> in this line, because we do nothing about it.
> 
> Whether we have this document or not, we will continue to have people
> who incorrectly assume that TCP is secure.

That's correct. But we also have people that do know it is not mean to
be secure, but that it should be resilient enough so that it's still
usable. One way or another, most stacks implement counter-measures for
SYN-floods (on which tcpm did publish something), timers on the
FIN-WAIT-2 state, port randomization (on which tsvwg is working), ICP
ISN randomization, etc.

The reason for which they did that was to improve TCP's security/resiliency.

Would you argue in favour of predictable ISNs, predictable ports,
time-less FIN-WAIT-2 state, etc.? -- I hope you wouldn't.



>>> It summarizes issues already raised by the WG, 
>> I believe this statement is unfair with respect to our document. e.g.,
>> has the issues described in Section 4.3, Section 9.2, or Section 10 been
>> brought to tcpm before???
> 
> I didn't say that's all it does ;-) Agreed that it raises other issues,
> many of which are operational.

Many of which arise if you expect to use TCP in some other scenario that
just two computers in a LAN. If that makes those issues "operational", I
agree.



>>> TCP itself is not a secure protocol, nor is it intended to be.
>> Yeah. But that does not mean that we should not do our best to improve
>> it.
> 
> It means we should not try to give the incorrect impression that it
> *can* be secured. 

It's security/resiliency can be improved. After all, if that were not
the case, I guess you're wasting your time with TCP-AO. Or is it that
you believe the only way to improve a protocol is to throw crypto at it?



> Interpreting every unexpected event as an attack makes
> a protocol robust but also brittle; TCP is intended to trade flexibility
> for security, AFAICT, because it is agnostic about intent, and gives the
> benefit of doubt at all times. 

I would prefer that instead of making this type of broad statement, you
would argue against a particular recommendation in
draft-gont-tcp-security, and explain how it makes TCP more brittle.



> Consider packet drops. That can happen due to loss, non-malicious
> corruption, or jamming, e.g. In the last case, it makes sense to blast
> copies of packets in the hopes of getting something through, but that's
> NOT what we assume.

Wasn't this very behavior what lead to the Internet congestion collapse
in the 80's, or am I missing something?



>> Please talk to vendors. I don't want to reproduce here what seems to
>> be the consensus among vendors with respect to the current state of
>> affairs in terms of how up-to-date our specs are.
> 
> Vendors misapply our protocols then complain that they don't work. Yes,
> there are operational issues, but one severe operational issue is not
> using security for some policy, financial, or operation expense and then
> complaining that nonsecure TCP is being attacked.

Joe, we're talkng about a simple web server being taken down because of
a SYN flood, a FIN-WAIT-2 flood, or the like. Even the most stupid web
server should survive these types of attacks.

Kind regards,
-- 
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1