Re: [tcpm] SECDIR REVIEW of draft-ietf-tcpm-icmp-attacks-10.txt

Lars Eggert <lars.eggert@nokia.com> Mon, 15 February 2010 08:18 UTC

Return-Path: <lars.eggert@nokia.com>
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 295A23A7AC4; Mon, 15 Feb 2010 00:18:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.568
X-Spam-Level:
X-Spam-Status: No, score=-6.568 tagged_above=-999 required=5 tests=[AWL=0.031, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pKbPBZIl-VNU; Mon, 15 Feb 2010 00:18:54 -0800 (PST)
Received: from mgw-mx09.nokia.com (smtp.nokia.com [192.100.105.134]) by core3.amsl.com (Postfix) with ESMTP id AACA43A7AC3; Mon, 15 Feb 2010 00:18:54 -0800 (PST)
Received: from vaebh105.NOE.Nokia.com (vaebh105.europe.nokia.com [10.160.244.31]) by mgw-mx09.nokia.com (Switch-3.3.3/Switch-3.3.3) with ESMTP id o1F8Isvr003423; Mon, 15 Feb 2010 02:19:28 -0600
Received: from vaebh104.NOE.Nokia.com ([10.160.244.30]) by vaebh105.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.3959); Mon, 15 Feb 2010 10:18:57 +0200
Received: from mgw-sa02.ext.nokia.com ([147.243.1.48]) by vaebh104.NOE.Nokia.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Mon, 15 Feb 2010 10:18:48 +0200
Received: from mail.fit.nokia.com (esdhcp030222.research.nokia.com [172.21.30.222]) by mgw-sa02.ext.nokia.com (Switch-3.3.3/Switch-3.3.3) with ESMTP id o1F8IkJf002840 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Feb 2010 10:18:47 +0200
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.95.3 at fit.nokia.com
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: multipart/signed; boundary="Apple-Mail-1-151906251"; protocol="application/pkcs7-signature"; micalg="sha1"
From: Lars Eggert <lars.eggert@nokia.com>
In-Reply-To: <a123a5d61002121827y2f2b0256u5859790c06819a92@mail.gmail.com>
Date: Mon, 15 Feb 2010 10:18:34 +0200
Message-Id: <B599B65F-5037-44DD-AC7E-627CE1D51F08@nokia.com>
References: <a123a5d61002121827y2f2b0256u5859790c06819a92@mail.gmail.com>
To: Phillip Hallam-Baker <hallam@gmail.com>
X-Mailer: Apple Mail (2.1077)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.3 (mail.fit.nokia.com [0.0.0.0]); Mon, 15 Feb 2010 10:18:36 +0200 (EET)
X-OriginalArrivalTime: 15 Feb 2010 08:18:48.0662 (UTC) FILETIME=[7FE42760:01CAAE17]
X-Nokia-AV: Clean
Cc: "tcpm@ietf.org" <tcpm@ietf.org>, "fernando@gont.com.ar" <fernando@gont.com.ar>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [tcpm] SECDIR REVIEW of draft-ietf-tcpm-icmp-attacks-10.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Feb 2010 08:18:56 -0000

Hi, authors/WG,

please discuss the secdir review. I'll leave the document on the IESG agenda for Thursday for now.

Lars

On 2010-2-13, at 4:27, Phillip Hallam-Baker wrote:

> Hi,
> 
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.
> 
> ICMP is one of those IP layer protocols that we all have some idea
> exist even if only the network level people understand what they do.
> This document is designed to describe security issues arising from the
> ICMP protocol and commonly implemented counter-measures.
> 
> The principal security risks considered are service risks. ICMP may be
> used to perform certain denial of service and performance downgrade
> attacks. As such it probably needs rather more justification than 'we
> have always done this' when building critical infrastructures.
> 
> 
> Overall,
> 
> Given that TCP streams will eventually time-out, I have something of a
> hard time seeing why we would be using a non-authenticated control
> protocol at all. Yes, I know the legacy reasons etc. etc. But this is
> not the way we would approach this problem today. This argument is
> almost made on page 15. Some statement giving the case for taking
> notice of ICMP messages at all is in order. It might well be that an
> appropriate control in certain cases would be to turn off ICMP hard
> errors and rely on timeouts, I am thinking here of critical
> infrastructure applications and communications between hosts running
> BGP functions.
> 
> In particular I note that the draft says "It is interesting to note
> that, as ICMP error messages are transmitted unreliably, transport
> protocols should not depend on them for correct functioning."
> 
> Given the extreme approach to security of starting from nothing and
> only adding systems that are essential, this would seem to suggest
> ICMP is not necessary and could be eliminated. There may be a case to
> the contrary but it needs to be made before page 15.
> 
> 
> Page 15/16
> 
> The following phrase repeats in a way that suggests an editing oversight:
> aborting the
>   connection would be to ignore the valuable feature of the Internet
>   that for many internal failures it reconstructs its function without
>   any disruption of the end points
> 
> Page 24-26
> 
> A more general way of describing the mitigation strategy would be to
> point out the general principle that error messages may be ignored
> whenever a packet indicating success is received within the timeout
> window. In other words no final processing decisions should be made on
> an unauthenticated ICMP packet until after the timeout window expires.
> 
> 
> -- 
> -- 
> New Website: http://hallambaker.com/
> View Quantum of Stupid podcasts, Tuesday and Thursday each week,
> http://quantumofstupid.com/
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm