Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG

Jacob Appelbaum <jacob@appelbaum.net> Tue, 19 August 2014 17:15 UTC

Return-Path: <jacob@appelbaum.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53C5F1A0584 for <tcpm@ietfa.amsl.com>; Tue, 19 Aug 2014 10:15:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.01
X-Spam-Level: **
X-Spam-Status: No, score=2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, FRT_STOCK2=3.988, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8aFwALajJ-7u for <tcpm@ietfa.amsl.com>; Tue, 19 Aug 2014 10:15:50 -0700 (PDT)
Received: from mail-qg0-f52.google.com (mail-qg0-f52.google.com [209.85.192.52]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E80A1A0650 for <tcpm@ietf.org>; Tue, 19 Aug 2014 10:15:49 -0700 (PDT)
Received: by mail-qg0-f52.google.com with SMTP id f51so6109685qge.25 for <tcpm@ietf.org>; Tue, 19 Aug 2014 10:15:43 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=F7zbRAiXMg+NKztioPiR4z6TnDCit5t3AfnRtcjaA9A=; b=NrzDau6HqHyT1hib29WF6RAqFWSFR6qhBL6cQL2MFYOBqTno+lTq/8PNfUAVDOe/Rw dvav2S09ybuDT1wszn+4sh0TvNQZe+UkcPWy4WTkbJtBpCmdKod4sEGiFzGwPZ51MBn3 ocxagMPESIlwICpNQ19AhUNt4rsQMskoNWPsNdW1Lxc4d7raac/HFakLIgo0z7lYVTZi bQgkgRkyCvWNVnWVVJEhyxD2jyk1oQTj4dwW6pcBaW/2X+AfeT/m5ccvzwC0sejaxKl+ 8j4GUE8da4OjOOqIxoTYnnohM+brEjAy7c3ac60yd8lItqmQksWEPpMZf5JLGV8jd12J VaEw==
X-Gm-Message-State: ALoCoQm/FEPAHZRh/srWG1WHSM37jCKDWR8pfqyR7UxWHL9lnUJRqKMj44+gDPvqX4xsLsXNYMe9
MIME-Version: 1.0
X-Received: by 10.229.212.194 with SMTP id gt2mr68851992qcb.6.1408468543359; Tue, 19 Aug 2014 10:15:43 -0700 (PDT)
Received: by 10.140.91.50 with HTTP; Tue, 19 Aug 2014 10:15:43 -0700 (PDT)
X-Originating-IP: [85.25.43.84]
In-Reply-To: <CAPh34meB=EtgNu=_eBS6ekB20fRccAqXFWydkCWG+6VKSa98rg@mail.gmail.com>
References: <ecdbe694b6964c159f64b1d3311c8cc6@hioexcmbx02-prd.hq.netapp.com> <CAFggDF2jhQPz0Eez=AU9M-k862wD_=VSyVpXtRAjT4zC6H4tgA@mail.gmail.com> <1408397675.299896.154112109.6F69043F@webmail.messagingengine.com> <8c5f6a1e9f2340e48e25dd151406b7d3@hioexcmbx05-prd.hq.netapp.com> <1408401991.317123.154137701.0A30F30C@webmail.messagingengine.com> <CAPh34meB=EtgNu=_eBS6ekB20fRccAqXFWydkCWG+6VKSa98rg@mail.gmail.com>
Date: Tue, 19 Aug 2014 17:15:43 +0000
Message-ID: <CAFggDF39L+kLQLmiWJR3q6suPOtYmKJiJUqp0kBv7GjUtNVOjA@mail.gmail.com>
From: Jacob Appelbaum <jacob@appelbaum.net>
To: Hagen Paul Pfeifer <hagen@jauu.net>
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/YEjOT49pDAuse4EWv0eATtjoJ1w
Cc: "tcpinc@ietf.org" <tcpinc@ietf.org>, "tcpm (tcpm@ietf.org)" <tcpm@ietf.org>, Joe Touch <touch@isi.edu>, Christian Grothoff <christian@grothoff.org>, alfiej@fastmail.fm
Subject: Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Aug 2014 17:15:51 -0000

On 8/19/14, Hagen Paul Pfeifer <hagen@jauu.net> wrote:
> On 19 August 2014 00:46, Alfie John <alfiej@fastmail.fm> wrote:
>
>>      Sure anyone listening on the wire can see that I've got a service
>>      listening on port 80, but my main concern are the script kiddies
>>      who try to find open services and then hammer my home server with
>>      common exploits. This RFC completely protects my web server from
>>      the script kiddies without me having to setup port knocking (off-
>>      topic, but port knocking can sometimes be a pain).
>
> For this use case it would be more secure to use TLS client certificates!?

No. I want to protect my TLS service from implementation exploitation.
You cannot probe my TLS service for the next heartbleed without a
shared secret.

>
> I mean
>
> a) TLS is strong crypto with all benefits (authentication, encryption,
> integrity) and
> b) a discovered, open TLS port do not open any security whole at all -
> the only script kiddy conclusion is "a unknown service is running at a
> specific port and that cipher suite 1,2,3 are supported". Nothing is
> more secure then a protocol protected by strong underlying
> cryptography.

This is false - see heartbleed for the most concrete example.

>
> Do I miss something? I mean the benefits of this draft are clear: the
> proposed implementation effort is small, the application setup is one
> additional setsockopt() line, etc. pp. But on the other hand the
> mechanism smells: it address the problem of service discovery by
> abusing TCP's ISN.

It isn't abuse - we're even trying to make it a standard to ensure
that it is well documented non-abusive behavior - rather different
than most other port knocking, I'd add.

>
> Another objection: the mechanism help only for a small fraction of use
> cases. Especially when the server communicate with one or a few
> clients where the "shared secret" is no problem. But especially in
> these setups TLS client certificates could be used without any
> problems.
>

What happens in your example when there is exploitable code in the
client certificate parsing code?

> Anyway, I am little bit ambivalent regarding this ID. It may help in
> some situations and reduce the attack vector. Any effort to improve
> the security should be reviewed! I mean if there are no negative
> impacts: why not? ;-)
>

That was one of our thoughts as well. This does no harm to anyone and
does help specific people who wish to use it. When combined with a
secure protocols, it is even better.

All the best,
Jacob