Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG

Jacob Appelbaum <jacob@appelbaum.net> Tue, 19 August 2014 18:21 UTC

Return-Path: <jacob@appelbaum.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCAC21A0690 for <tcpm@ietfa.amsl.com>; Tue, 19 Aug 2014 11:21:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.378
X-Spam-Level:
X-Spam-Status: No, score=-1.378 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, J_CHICKENPOX_14=0.6, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WaHL-9OrH-1X for <tcpm@ietfa.amsl.com>; Tue, 19 Aug 2014 11:21:55 -0700 (PDT)
Received: from mail-qc0-f178.google.com (mail-qc0-f178.google.com [209.85.216.178]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CBCBE1A0691 for <tcpm@ietf.org>; Tue, 19 Aug 2014 11:21:54 -0700 (PDT)
Received: by mail-qc0-f178.google.com with SMTP id x3so6519770qcv.23 for <tcpm@ietf.org>; Tue, 19 Aug 2014 11:21:53 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=J4r8TORtB2HPOD4IDVrrQ96vEQz66MP/wekmlodPW40=; b=eD5VbQRbU/Lc6ZK9EFEUki5qF2t1LKYVLcTP+pN9L285en0IL5naWtiVT3einqiVW9 vXV7mDavnBpEETHJFX0fnm53/0hqpZpqCUS43rFM2nk5Lx6lnB7Yz+kW8uuDMGAGgNL2 1Bf9AYvsZ8QAQWCqVKqVFvVKeYMBD/bwsZ/5j3VNjmFh1GwbzHXLftdCE+qPSqbpAAP0 X0uRy7nsb+uFVukZE0h0mjUANF13xWA9Upv//hmnavxCxWSd1iO3a3/q2x27RPHv/kJe oChJajsKa7T6LymtAHBBjGK3sPmvfMH4RpJb2UfA6V6XZENO4ZZVrq3deCV1rYVY+DzD W1tQ==
X-Gm-Message-State: ALoCoQlCKscvvDRencgLbMOvFvWxlHMyIMoXRbDogZjSldL/F7mvVRPMbHf6bjZsRA3XZ5dxJnru
MIME-Version: 1.0
X-Received: by 10.229.74.3 with SMTP id s3mr8521005qcj.2.1408472512019; Tue, 19 Aug 2014 11:21:52 -0700 (PDT)
Received: by 10.140.91.50 with HTTP; Tue, 19 Aug 2014 11:21:51 -0700 (PDT)
X-Originating-IP: [89.207.128.241]
In-Reply-To: <CAPh34mdPtKvVJ2FfshPFwrwRDOw9CxxHT4ZTFYZZEVSoKOEq0A@mail.gmail.com>
References: <ecdbe694b6964c159f64b1d3311c8cc6@hioexcmbx02-prd.hq.netapp.com> <CAFggDF2jhQPz0Eez=AU9M-k862wD_=VSyVpXtRAjT4zC6H4tgA@mail.gmail.com> <1408397675.299896.154112109.6F69043F@webmail.messagingengine.com> <8c5f6a1e9f2340e48e25dd151406b7d3@hioexcmbx05-prd.hq.netapp.com> <1408401991.317123.154137701.0A30F30C@webmail.messagingengine.com> <CAPh34meB=EtgNu=_eBS6ekB20fRccAqXFWydkCWG+6VKSa98rg@mail.gmail.com> <CAFggDF39L+kLQLmiWJR3q6suPOtYmKJiJUqp0kBv7GjUtNVOjA@mail.gmail.com> <CAPh34mdPtKvVJ2FfshPFwrwRDOw9CxxHT4ZTFYZZEVSoKOEq0A@mail.gmail.com>
Date: Tue, 19 Aug 2014 18:21:51 +0000
Message-ID: <CAFggDF25gskXSDiKjuMMvpnP=wn4YQ0HawM1YtNmt40_5by-dg@mail.gmail.com>
From: Jacob Appelbaum <jacob@appelbaum.net>
To: Hagen Paul Pfeifer <hagen@jauu.net>
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/hJdjwpgxujbvMpOMsTFMGhUhFm8
Cc: "tcpinc@ietf.org" <tcpinc@ietf.org>, "tcpm (tcpm@ietf.org)" <tcpm@ietf.org>, Joe Touch <touch@isi.edu>, Christian Grothoff <christian@grothoff.org>, alfiej@fastmail.fm
Subject: Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Aug 2014 18:21:56 -0000

On 8/19/14, Hagen Paul Pfeifer <hagen@jauu.net> wrote:
> On 19 August 2014 19:15, Jacob Appelbaum <jacob@appelbaum.net> wrote:
>
>> No. I want to protect my TLS service from implementation exploitation.
>> You cannot probe my TLS service for the next heartbleed without a
>> shared secret.
>
> C'mon Jacob, this smells fishy! Let's assume you protect *your*
> service from one potential TLS bugs, this is (partly) possible with
> the mechanism described in the ID. But what happens in the meantime
> with your https:// browsing, openvpn, ... communications? If you
> assume bugs in TLS you must stop all your communications! TLS and
> strong cryptography is the fundamental building block - when it is
> broken the whole communication system is b0rken.

No, it isn't. It isn't a zero sum game. We are trying to protect
against people port scanning - that an authorized user may abuse a
service is another issue - we do not protect against it, except that
you may revoke that user's ability to exploit the service, of course.

>
> The other way, if you trust TLS you can also trust the TLS client
> certificates mechanism as well.

This is false. I use heartbleed as the example.

>
> I understand your objection but the "fix" feels wrong. We should do
> everything we can to make TLS fast, clean and strong. But to repeat
> myself: I see advantages and benefits and _if_ there are no major
> disadvantages we can push things forward. Well, no need to answer
> here, I got your point in detail and I want to make sure we discuss
> all possibilities, using TLS client certificates is one alternative.
>

We should do both. It would be nice if TCP helped us with this
realistic issue - services are exploitable, let us mitigate the
problem with authentication for specific services at a different
layer. We can authenticate the use of a service in a forward
compatible manner and that is what the draft seeks to standardize.

>> It isn't abuse - we're even trying to make it a standard to ensure
>> that it is well documented non-abusive behavior - rather different
>> than most other port knocking, I'd add.
>
> The ISN has 32 bits, reduce this space leads to problems in the past.
> We must do everything to not open any other attack vectors regarding
> TCP by mistake. If you *prove* that this will not lead to problems, I
> will never ever mention the word "abuse" in an email to you! ;-)

The ISN is still 32bits. We do not reduce the space and the entropy of
the space does not change. There are corner cases where a passive
observer may replay a packet as if it was normal TCP. Thus in the
worst case, we're as bad as TCP is in every case, all the time.

All the best,
Jacob