Re: [tcpm] WGLC: draft-ietf-tcpm-tcpsecure-10.txt

Fernando Gont <fernando@gont.com.ar> Fri, 29 August 2008 19:48 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ACBE128C13E; Fri, 29 Aug 2008 12:48:45 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A6E4C28C13E for <tcpm@core3.amsl.com>; Fri, 29 Aug 2008 12:48:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.444
X-Spam-Level:
X-Spam-Status: No, score=-3.444 tagged_above=-999 required=5 tests=[AWL=0.155, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dvtnLdfLr1Dt for <tcpm@core3.amsl.com>; Fri, 29 Aug 2008 12:48:43 -0700 (PDT)
Received: from smtp1.xmundo.net (smtp1.xmundo.net [201.216.232.80]) by core3.amsl.com (Postfix) with ESMTP id 4BD1828C13D for <tcpm@ietf.org>; Fri, 29 Aug 2008 12:48:42 -0700 (PDT)
Received: from venus.xmundo.net (venus.xmundo.net [201.216.232.56]) by smtp1.xmundo.net (Postfix) with ESMTP id 172876B661F; Fri, 29 Aug 2008 16:48:49 -0300 (ART)
Received: from notebook.gont.com.ar (host62.190-139-184.telecom.net.ar [190.139.184.62]) (authenticated bits=0) by venus.xmundo.net (8.14.1/8.13.8) with ESMTP id m7TJmWUS006817; Fri, 29 Aug 2008 16:48:36 -0300
Message-Id: <200808291948.m7TJmWUS006817@venus.xmundo.net>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Fri, 29 Aug 2008 16:44:21 -0300
To: "Anantha Ramaiah (ananth)" <ananth@cisco.com>, "David Borman" <david.borman@windriver.com>, <tcpm@ietf.org>
From: Fernando Gont <fernando@gont.com.ar>
In-Reply-To: <0C53DCFB700D144284A584F54711EC5805B5019B@xmb-sjc-21c.amer. cisco.com>
References: <FE34F27F-8DDF-4C94-BC6E-E2ABF6000309@windriver.com> <B5A5E01F9387F4409E67604C0257C71E409513@NDJSEVS25A.ndc.nasa.gov> <24D2F5D3-93E7-4B64-BA96-2086F3E5754E@windriver.com> <200808282159.m7SLx23E013917@venus.xmundo.net> <0C53DCFB700D144284A584F54711EC5805B5019B@xmb-sjc-21c.amer.cisco.com>
Mime-Version: 1.0
X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by milter-greylist-3.0 (venus.xmundo.net [201.216.232.56]); Fri, 29 Aug 2008 16:48:48 -0300 (ART)
Cc: rrs@cisco.com, "Mitesh Dalal \(mdalal\)" <mdalal@cisco.com>, Joe Touch <touch@ISI.EDU>
Subject: Re: [tcpm] WGLC: draft-ietf-tcpm-tcpsecure-10.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

At 08:55 p.m. 28/08/2008, Anantha Ramaiah (ananth) wrote:

>    It was mentioned earlier that a reference in the security
>consideration section to ICMP attacks draft is needed. This was done in
>the latest version (ver 10). I am not sure about the port randomization
>though, but I can add it if the WG feels so.

The whole debate of RST attacks had to do with Paul Watson coming to 
the conclusion that these attacks were much more feasible than 
previously assumed (e.g., by some presentation that had been made at NANOG).

Paul's presentation assumed a global and linear ephemeral-port 
selection function. IMO, the most obvious and trivial way to mitigate 
these blind attacks is to randomize the ephemeral port numbers.

And this is even more so when there's a BCP-candidate document that 
has been adopted by a related WG.



>    IMO, all the recent TCP connection robustness related drafts (port
>randomization, ICMP attacks etc.,) should have a reference to TCP secure
>since most of these drafts were inspired by TCP secure!

I don't quite understand this comment. My motivation for suggesting 
references to these documents are:

* It does not make sense to address the most difficult attack vector 
for reset attacks if you leave a much more trivial one open (that's 
the reason for the reference to the ICMP attacks draft).
* tcpsecure aims at mitigating blind in-window attacks. With an 
incremental ephemeral-port selection function, these attacks are not 
as "blind" as they "should" be. If you randomize ephemeral-ports, 
then the attack will require many more packets. (this is the reason 
for the reference to the port randomization draft).

That said, the ICMP attack draft does reference tcpsecure. However, 
it was inspired by the discussions we had while writing the "Security 
Considerations" section of the soft errors draft. The non-wg -00 
version of the port randomization I-D was written by M. Larsen... so 
I have no idea what inspired him to write that document. Maybe 
tcpsecure, maybe Paul Watson's presentation.... maybe he had already 
been working on that.

Thanks!

Kind regards,

--
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1




_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm