Re: [tcpm] feedcback on tcp-secure-05

Fernando Gont <fernando@gont.com.ar> Tue, 18 July 2006 21:15 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1G2wv0-0000SJ-4O; Tue, 18 Jul 2006 17:15:50 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G2wuz-0000SE-HF for tcpm@ietf.org; Tue, 18 Jul 2006 17:15:49 -0400
Received: from venus.xmundo.net ([201.216.232.56]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2wuw-0008Tj-TT for tcpm@ietf.org; Tue, 18 Jul 2006 17:15:49 -0400
Received: from fgont.gont.com.ar (171-180-231-201.fibertel.com.ar [201.231.180.171]) (authenticated bits=0) by venus.xmundo.net (8.12.11/8.12.11) with ESMTP id k6ILFiBF028597; Tue, 18 Jul 2006 18:15:46 -0300
Message-Id: <7.0.1.0.0.20060718160252.066880d8@gont.com.ar>
X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0
Date: Tue, 18 Jul 2006 17:45:07 -0300
To: Joe Touch <touch@ISI.EDU>
From: Fernando Gont <fernando@gont.com.ar>
Subject: Re: [tcpm] feedcback on tcp-secure-05
In-Reply-To: <44BCE4FA.1050602@isi.edu>
References: <0C53DCFB700D144284A584F54711EC5801D9592B@xmb-sjc-21c.amer.cisco.com> <7.0.1.0.0.20060715153423.08601b58@gont.com.ar> <44BB1882.6030904@isi.edu> <7.0.1.0.0.20060717052818.064b28b8@gont.com.ar> <44BCE4FA.1050602@isi.edu>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 7aafa0432175920a4b3e118e16c5cb64
Cc: tcpm@ietf.org, "Anantha Ramaiah (ananth)" <ananth@cisco.com>
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org

At 10:41 18/07/2006, Joe Touch wrote:

[Talking about the ICMP attacks draft]

>I've repeatedly said that the text below directly negates the
>requirement in RFC1122. That NEEDS to be directly highlighted in your
>doc (the text that says that 1122 allows this is incorrect):
>
>      "For security reasons,
>       it would be fair to treat ICMP port unreachable messages as soft
>       errors (or completely ignore them) when they are meant for
>       protocols that have their own mechanism for reporting this error
>       condition."

Joe, this already was in my list of changes. There are a bunch of 
comments from Mark, Pyda, Fred, you and others that I will 
(hopefully) address in the next revision of the draft.

Now, as per Anatha's e-mails, there's ambiguity in RFC 1122 respect 
to this issue. There's a MUST and a SHOULD on the issue of what is 
supposed to be the correct reaction to a port unreachable.

So, would you agree with the draft mentioning the ambiguity, and, as 
in the case of the other ICMP error codes, stating why it would make 
sense to treat them as soft errors, instead? (The "SHOULD" allows for 
that, after all).



> > It is clear that with the ICMP counter-measures in place, TCP-based
> > attacks are "the weakest link in the change". You don't need to "drop
> > them all".
>
>Even as soft errors, such ICMP errors could be interpreted by the
>application as indicating a legitimate error that causes the connection
>to be dropped, even though the only reason is attack.

This assumes that:
a) The system in question does not honor the "recommendation" in the 
ICMP attacks draft
b) ICMP error messages are passed to the application. In the Sockets 
API, they are passed only after a USER TIMEOUT.

Kindest regards,

--
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1






_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www1.ietf.org/mailman/listinfo/tcpm