Re: [Tsv-art] [OPSEC] Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06

Christopher Morrow <morrowc.lists@gmail.com> Wed, 05 December 2018 04:12 UTC

Return-Path: <christopher.morrow@gmail.com>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBBD6130DCC; Tue, 4 Dec 2018 20:12:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OLPySL3IBrX1; Tue, 4 Dec 2018 20:12:07 -0800 (PST)
Received: from mail-it1-x133.google.com (mail-it1-x133.google.com [IPv6:2607:f8b0:4864:20::133]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E67F9130DDF; Tue, 4 Dec 2018 20:12:06 -0800 (PST)
Received: by mail-it1-x133.google.com with SMTP id x19so19234519itl.1; Tue, 04 Dec 2018 20:12:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qaNs/5aEsKulmQ0YYv9B7lu00O4Ym5uR4LOlquJb81A=; b=kKkUpQKZQxlRAdzd5seP0KEtHvYXY0hvSamAnUQ/vOtbksXy1Vy5mARbvnwWWFGJAk pHuTJl/fF0d90F3ap2apqtEi/cFShYp/YORT4nLWi/7T+iZy58UJLrfo1DUVWwTDBjFN fVUaEgcla/9kZ5z0MxYpgKtvCxViFoqdmmfU/8OlaSoKoururZYNgHc7FiY2jDIdFNlk vkiD5WTugpsOJy8H41FIjujMFOakuD0NOjtkmIAfW/Q4aSlgf47BhOc+TCjaB6k0VmWM m3IVT++LpzaJ6bydfQVZrH8C4nns5ecNz/exlYuBZyX4N2g6RxXyK0A4YUV2NPeeHNFF ESAw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qaNs/5aEsKulmQ0YYv9B7lu00O4Ym5uR4LOlquJb81A=; b=LVMWn9Gd3dGw675FXRHMMreJrH75hWFFQcDwUNL8UuFAroRBNtnx+u5Vab2yBssTlA mZm0SMbNcqtlsPP505bIR8I6USAtbrFRwrRn0ycJ/P8k8+KxMYsKzXUitigESGaxvdtv Jw03FsERVEMsfxetu63o05mdWpsRpOyRfIXgvr57hQ1sa45EyuoLD6iEtUNLC3YM6LCi cMPin4D3AQNsORcJSJsE6vFI5KYXP+q8qBrpZJ2W4IpfoxdD/SQ5Xf4Ij7FIRXJoKvHC tbmIgLtYqW48JRTjnR4a+ukwELUwVYREQnhjiBPzxZmvsnDXvkZpTZkxWhxZBFlSkIUB yW6A==
X-Gm-Message-State: AA+aEWY4TF71/rE8wFbbqDOAzrCFuYEh65P/m9NAp75gcVcZQ41IHr8T 8r54nccSaMo8K47OIthUsuEXKPNcs1T35YSISHg=
X-Google-Smtp-Source: AFSGD/XTkWt0m+zcdVvoK3QWPnT/jkg/O8XeGYRddia/A3d0ivwbxl0+XCoOyCb+kUEoxYXKCrhJxdudiDGk5OW+I7I=
X-Received: by 2002:a24:32c5:: with SMTP id j188mr13719479ita.139.1543983125987; Tue, 04 Dec 2018 20:12:05 -0800 (PST)
MIME-Version: 1.0
References: <977CA53D-7F72-4443-9DE2-F75F7A7C1569@strayalpha.com> <d6deb7af-99dd-9013-2722-8ebbe00c0b37@si6networks.com> <1CB13135-D87A-4100-8668-D761058E1388@strayalpha.com> <0f56c25d-7ac7-e534-4e2c-cc09f5154e77@foobar.org> <28EDE667-457E-4AED-8480-F27ECAA8E985@strayalpha.com> <6bd1ec94-f420-1f4c-9254-941814704dbb@gmail.com> <6be84ccf-9a72-2694-e19d-fa19043a0cb1@huitema.net> <4C249487-BD58-41BB-B8B6-081323E29F6C@strayalpha.com> <20181126075746.GO72840@Space.Net> <6C50775C-EB67-4236-93B8-DF0259E04167@strayalpha.com> <20181126175336.GW72840@Space.Net> <c959d8cb6f6a04a8da8318cfa89da341@strayalpha.com> <2425355d-e7cc-69dd-5b5d-78966056fea7@foobar.org> <C4D47788-0F3D-4512-A4E3-11F3E6EC230B@strayalpha.com> <8d3d3b05-ecc3-ad54-cb86-ffe6dc4b4f16@gmail.com> <C929A8B9-D65C-4EF7-9707-2238AE389BE3@strayalpha.com> <CAL9jLaY4h75KK4Bh-kZC6-5fJupaNdUfm1gK2Dg99jBntMCEyQ@mail.gmail.com> <C47149DC-CAF2-449F-8E18-A0572BBF4746@strayalpha.com>
In-Reply-To: <C47149DC-CAF2-449F-8E18-A0572BBF4746@strayalpha.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
Date: Tue, 04 Dec 2018 23:11:54 -0500
Message-ID: <CAL9jLaYfysKm7qrG=+jq7zV=5ODnSX-tAhBAiTU7SzYF-YmcGw@mail.gmail.com>
To: Joe Touch <touch@strayalpha.com>
Cc: Stewart Bryant <stewart.bryant@gmail.com>, tsv-art@ietf.org, opsec wg mailing list <opsec@ietf.org>, ietf <ietf@ietf.org>, draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org, Nick Hilliard <nick@foobar.org>
Content-Type: multipart/alternative; boundary="000000000000c38669057c3e95d5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/9NyeFtptNe681hq6Sa0RraEOJeU>
Subject: Re: [Tsv-art] [OPSEC] Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Dec 2018 04:12:11 -0000

On Tue, Dec 4, 2018 at 8:10 PM Joe Touch <touch@strayalpha.com> wrote:

>
>
> On Dec 4, 2018, at 12:17 PM, Christopher Morrow <morrowc.lists@gmail.com>
> wrote:
>
>
>
>
>
> On Tue, Nov 27, 2018 at 5:40 AM Joe Touch <touch@strayalpha.com> wrote:
>
>> Take that to the standards wg. Don’t stick your head in the sand and try
>> to do an end run in ops. And don’t call any of this a security issue that
>> it isn’t.
>>
>>
>>
> Joe, I think one of the 3 pillars of security is: "Availability" (the
> other two are 'Confidentiality' and 'Integrity’)
>
>
> It is...
>
>
> I think the point that Nick and Gert are outlining is that if the case is
> that the hardware available will have no fast-path processing for packets
> with obtuse patterns or sets of extension headers those packets will get
> sent to the control-plane (slow-path). That slow-path being congested will
> cause availability problems.
>
>
> If that happens, the packets with these headers can easily be throttled -
> thus avoiding a security issue.
>
>
So, perhaps I'm not expressing my point properly... I'll try again in a
different way.
I don't think that they can be meaningfully throttled, no. I think that
they will 'always' be throttled if they can not go on the fast-path,
because the difference between 'fast-path' and 'not fast-path' is ~9 orders
of magnitude. There's not a sane "welp, 50% of bandwidth" or anything like
that possible in this scenario. Except: "meh, just pass along all packets
unchecked, no HBH checking/evaluation nothing".


> However, what you’re basically saying is that “it is a security risk to
> send packets to a router because it might have to do work”.
>

I don't think that's what I said, what i said is that loss of control-plane
functionality is a security risk, because you lose availability.
Yes, that's not a 'big surprise', it's just a fact of life on the public
network, to operate a network connected to the public you don't let things
poke at your control-plane.


> Yeah, big surprise. Either do the work or limit the impact. But that’s not
> the kind of security risk we associate with availability - a good example
> of which would be that sending a single packet would cause the work of 1000.
>
>
'you' (the royal, not you in particular) may not consider loss of
availability to be a security concern, but I expect all network operations
folk to consider it such.
I expect that, by and large, folk who operate networks aren't trying to
make 'your' (royal again) life hard here, 'we' (royal) are just saying:
"there's a tradeoff, let's be sure we agree what the costs are going to be"


But none of that is happening here.
>
>
> Actually, whether or not the control-plane fails under such load may not
> even matter, if the rate-limiting of the packets here is such that (as gert
> said) all but a trickle of the interesting packets are forwarded.
>
>
> But then that’s not a security problem.
>
>
it's a loss of availability for the users of the expected packets. It's not
really "my" concern, unless I'm trying to do some new protocol thingy.


>
> A solution might be to have a mode where  a router may just ignore all
> headers except the src/dst-ip and simply forward all packets, trusting that
> the conversing adults will sort out problems with unknown/new/experimental
> headers or with a tortured ordering of headers (for instance). This will
> also cause some operational headaches: "Please drop all traffic toward ipX
> with protoY and dst-port Z" but perhaps it's still acceptable to some folk
> to operate like this?
>
>
> That works only for HBH options of type 00. Others require particular
> actions when not supported.
>
>
can you expand on this some?


> Joe
>