Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG

Hagen Paul Pfeifer <hagen@jauu.net> Tue, 19 August 2014 16:00 UTC

Return-Path: <hagen@jauu.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 335321A0468 for <tcpm@ietfa.amsl.com>; Tue, 19 Aug 2014 09:00:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.01
X-Spam-Level: **
X-Spam-Status: No, score=2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, FRT_STOCK2=3.988, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7dDS4ADk92HR for <tcpm@ietfa.amsl.com>; Tue, 19 Aug 2014 09:00:30 -0700 (PDT)
Received: from mail-la0-f41.google.com (mail-la0-f41.google.com [209.85.215.41]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3E6C1A03EE for <tcpm@ietf.org>; Tue, 19 Aug 2014 09:00:29 -0700 (PDT)
Received: by mail-la0-f41.google.com with SMTP id s18so6140213lam.0 for <tcpm@ietf.org>; Tue, 19 Aug 2014 09:00:26 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=3o+1W5jocMpoHM6412Gm5j3IZXTbiWahx4wce9QJIzY=; b=AoFk40rwjOozhQOLRxUuC2LA12+QgGmNRl0h6J0bbWouCaximwn6U26onhj2Fq7LY2 +JOpR2XIQb7vOHwvKUo0GJI8tEPy/BhUPFuhk6420VYCZ6In/E/qlQ1goNRoniEdWE1I inWDvvOQWFAhbwYiJIYryP812eZm7G0RyUUr7hOuF26KFBG5OHWPRErhIHl5D5I5tAuw SFFQUM43z/FidX7nZO3zCeqZS8+2qVo9M7YXdY4S4ecrMT4ZeE/3TaeLP8sV2Mir5Bbw jU92ZMjVYJPBRrjYdvTmSsKKG46s4Y1v2pN6Vxn1kX4ddWp3ly7/EoY/weONqGcZjQGX TF2g==
X-Gm-Message-State: ALoCoQkd0PKqejlwgG4pwWENqAtrAm+p2nuRombRez8F5MdY73AY7ehLpl/rzsQAjyWVfnZx6zdD
MIME-Version: 1.0
X-Received: by 10.152.87.97 with SMTP id w1mr10667817laz.92.1408464026689; Tue, 19 Aug 2014 09:00:26 -0700 (PDT)
Received: by 10.152.242.42 with HTTP; Tue, 19 Aug 2014 09:00:26 -0700 (PDT)
X-Originating-IP: [80.246.32.33]
In-Reply-To: <1408401991.317123.154137701.0A30F30C@webmail.messagingengine.com>
References: <ecdbe694b6964c159f64b1d3311c8cc6@hioexcmbx02-prd.hq.netapp.com> <CAFggDF2jhQPz0Eez=AU9M-k862wD_=VSyVpXtRAjT4zC6H4tgA@mail.gmail.com> <1408397675.299896.154112109.6F69043F@webmail.messagingengine.com> <8c5f6a1e9f2340e48e25dd151406b7d3@hioexcmbx05-prd.hq.netapp.com> <1408401991.317123.154137701.0A30F30C@webmail.messagingengine.com>
Date: Tue, 19 Aug 2014 18:00:26 +0200
Message-ID: <CAPh34meB=EtgNu=_eBS6ekB20fRccAqXFWydkCWG+6VKSa98rg@mail.gmail.com>
From: Hagen Paul Pfeifer <hagen@jauu.net>
To: alfiej@fastmail.fm
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/1YJyFplfVDJKLiY6ZNjhUopdc58
Cc: "tcpinc@ietf.org" <tcpinc@ietf.org>, "tcpm (tcpm@ietf.org)" <tcpm@ietf.org>, Joe Touch <touch@isi.edu>, Christian Grothoff <christian@grothoff.org>
Subject: Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Aug 2014 16:00:31 -0000

On 19 August 2014 00:46, Alfie John <alfiej@fastmail.fm> wrote:

>      Sure anyone listening on the wire can see that I've got a service
>      listening on port 80, but my main concern are the script kiddies
>      who try to find open services and then hammer my home server with
>      common exploits. This RFC completely protects my web server from
>      the script kiddies without me having to setup port knocking (off-
>      topic, but port knocking can sometimes be a pain).

For this use case it would be more secure to use TLS client certificates!?

I mean

a) TLS is strong crypto with all benefits (authentication, encryption,
integrity) and
b) a discovered, open TLS port do not open any security whole at all -
the only script kiddy conclusion is "a unknown service is running at a
specific port and that cipher suite 1,2,3 are supported". Nothing is
more secure then a protocol protected by strong underlying
cryptography.

Do I miss something? I mean the benefits of this draft are clear: the
proposed implementation effort is small, the application setup is one
additional setsockopt() line, etc. pp. But on the other hand the
mechanism smells: it address the problem of service discovery by
abusing TCP's ISN.

Another objection: the mechanism help only for a small fraction of use
cases. Especially when the server communicate with one or a few
clients where the "shared secret" is no problem. But especially in
these setups TLS client certificates could be used without any
problems.

Anyway, I am little bit ambivalent regarding this ID. It may help in
some situations and reduce the attack vector. Any effort to improve
the security should be reviewed! I mean if there are no negative
impacts: why not? ;-)


Hagen