Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG

"Scheffenegger, Richard" <rs@netapp.com> Wed, 20 August 2014 12:14 UTC

Return-Path: <rs@netapp.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3AFD1A02DB; Wed, 20 Aug 2014 05:14:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.97
X-Spam-Level:
X-Spam-Status: No, score=-6.97 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_35=0.6, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.668, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u3Spq51Off0A; Wed, 20 Aug 2014 05:14:18 -0700 (PDT)
Received: from mx11.netapp.com (mx11.netapp.com [216.240.18.76]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35AA41A02DD; Wed, 20 Aug 2014 05:14:18 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.01,901,1400050800"; d="scan'208";a="141171891"
Received: from vmwexceht06-prd.hq.netapp.com ([10.106.77.104]) by mx11-out.netapp.com with ESMTP; 20 Aug 2014 05:14:04 -0700
Received: from HIOEXCMBX07-PRD.hq.netapp.com (10.122.105.40) by vmwexceht06-prd.hq.netapp.com (10.106.77.104) with Microsoft SMTP Server (TLS) id 14.3.123.3; Wed, 20 Aug 2014 05:13:05 -0700
Received: from HIOEXCMBX05-PRD.hq.netapp.com (10.122.105.38) by hioexcmbx07-prd.hq.netapp.com (10.122.105.40) with Microsoft SMTP Server (TLS) id 15.0.913.22; Wed, 20 Aug 2014 05:13:04 -0700
Received: from HIOEXCMBX05-PRD.hq.netapp.com ([fe80::f0a5:80a1:86de:fa66]) by hioexcmbx05-prd.hq.netapp.com ([fe80::f0a5:80a1:86de:fa66%21]) with mapi id 15.00.0913.011; Wed, 20 Aug 2014 05:13:04 -0700
From: "Scheffenegger, Richard" <rs@netapp.com>
To: Christian Grothoff <christian@grothoff.org>, Jacob Appelbaum <jacob@appelbaum.net>
Thread-Topic: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG
Thread-Index: Ac+448Fsl9mI8tJfQO6l37mQPpygtgCOd38AABJQWoAADckrIP//pc+AgAEg4ACAABUIgIAADnKAgAAFl4CAAAkYAIAAAS8A//9okZCAAbIzAIAAct2g
Date: Wed, 20 Aug 2014 12:13:03 +0000
Message-ID: <566aa460cc4b48658337d94f41843db1@hioexcmbx05-prd.hq.netapp.com>
References: <ecdbe694b6964c159f64b1d3311c8cc6@hioexcmbx02-prd.hq.netapp.com> <CAFggDF2jhQPz0Eez=AU9M-k862wD_=VSyVpXtRAjT4zC6H4tgA@mail.gmail.com> <1408397675.299896.154112109.6F69043F@webmail.messagingengine.com> <8c5f6a1e9f2340e48e25dd151406b7d3@hioexcmbx05-prd.hq.netapp.com> <1408401991.317123.154137701.0A30F30C@webmail.messagingengine.com> <CAPh34meB=EtgNu=_eBS6ekB20fRccAqXFWydkCWG+6VKSa98rg@mail.gmail.com> <CAFggDF39L+kLQLmiWJR3q6suPOtYmKJiJUqp0kBv7GjUtNVOjA@mail.gmail.com> <CAPh34mdPtKvVJ2FfshPFwrwRDOw9CxxHT4ZTFYZZEVSoKOEq0A@mail.gmail.com> <53F3970D.5080906@grothoff.org> <CAPh34mf2rnNuM=YZ1uin1_PtkB8buOskMtf3NAJMOwdFeMe9MQ@mail.gmail.com> <53F39FAC.9070500@grothoff.org> <817214c2e5b444c7a780c1387e91da15@hioexcmbx05-prd.hq.netapp.com> <53F48CE0.1020507@grothoff.org>
In-Reply-To: <53F48CE0.1020507@grothoff.org>
Accept-Language: de-AT, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.120.60.34]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/rLBJA0LOmHi2IsuN9vSAhB6Q-_s
Cc: "tcpm (tcpm@ietf.org)" <tcpm@ietf.org>, "tcpinc@ietf.org" <tcpinc@ietf.org>, Joe Touch <touch@isi.edu>
Subject: Re: [tcpm] [tcpinc] TCP Stealth - possible interest to the WG
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Aug 2014 12:14:20 -0000

Hi Christian,

> > Also, you want to add some additional "randomness" by adding the TSval
> > into the hash, if available.
> 
> We do that, did you even read the draft?


I did, but my wording was unfortunate; Let me rephrase: The use of TSopt is optional in your draft. Why not make it mandatory?


> 
> > However, TSval is not random, it's in most implementations a pretty
> > accurate uptime indicator (that this in itself is a bad idea, is known
> > for a long time. That it would make sense to randomize the TSval in
> > the same way as the ISN is now much more prominently stated in
> > RFC7323).
> 
> We do agree that the TSval should be randomized.
> > 
> Right now, TSval is rarely chosen at random by implementations (see our
> measurement study in Julian's thesis).  So putting the authenticator into
> the TSval would have provided an easy distinguisher, which we wanted to
> avoid.  However, I would in principle support _also_ using the TSval, that
> way we could get 64 bits.  But, as said before, this is a trade-off with
> respect to how many middleboxes will work, as some fiddle with TSval but
> not the ISN (and vice versa).

Well, OpenBSD does proper randomization; also, when someone follows RFC7323, proper randomization of TSval should become the norm over time... And as you mentioned earlier, full protection against someone able to both sniff and selectively drop packets is not intended, if I read the draft correctly.

 
> Right, but the SYN is what matters most IMO.  We could use 32 bits of the
> ISN for the content integrity protector, and another 32 bits of the
> timestamp for the authenticator part, that would be fine.  But, as I said,
> the problem is that this means that handshakes doing so would stand out
> from current traffic.  So really this is a bit of a trade-off between
> passive detection of the knock in the current environment and getting a
> few more bits of security.

Nothing really prevents you from mandating a SYN+TSOPT as basis for TCP Stealth. When putting the authenticator into TSval (with ISN as additional bits of randomness), all those sessions don't look any different from an OpenBSD box connecting - except for some passive TCP option fingerprinting perhaps. But again, all you want to do is not react to SYNs from people that can not observe and meddle with functioning sessions between two third parties...


> Another issue maybe that some current OSes don't use TSval at all, so I
> figured just changing the ISN calculation might be the more conservative
> suggestion, but again, this is clearly a trade-off and if IETF decided to
> instead to ISN+TSval or even just TSval, I would still consider this a big
> progress.

I'd be in full support for your proposal, when ISN is kept unmodified, and the authenticator bits put into TSval or TSecr of a SYN. Again, putting bits in TSecr would make your traffic stand out, not that those implementations that were broken in that respect, have vanished.

Best regards,
   Richard