Re: [Tsv-art] Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06

Christian Huitema <huitema@huitema.net> Sun, 25 November 2018 20:40 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADEB71288EB for <tsv-art@ietfa.amsl.com>; Sun, 25 Nov 2018 12:40:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KzDoUHxRHVha for <tsv-art@ietfa.amsl.com>; Sun, 25 Nov 2018 12:40:19 -0800 (PST)
Received: from mx43-out1.antispamcloud.com (mx43-out1.antispamcloud.com [138.201.61.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99FD91277C8 for <tsv-art@ietf.org>; Sun, 25 Nov 2018 12:40:18 -0800 (PST)
Received: from xsmtp04.mail2web.com ([168.144.250.231]) by mx66.antispamcloud.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1gR1CQ-0005qL-DL for tsv-art@ietf.org; Sun, 25 Nov 2018 21:40:17 +0100
Received: from [10.5.2.35] (helo=xmail10.myhosting.com) by xsmtp04.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1gR1CJ-0008Dl-1D for tsv-art@ietf.org; Sun, 25 Nov 2018 15:40:10 -0500
Received: (qmail 4314 invoked from network); 25 Nov 2018 20:40:03 -0000
Received: from unknown (HELO [192.168.1.100]) (Authenticated-user:_huitema@huitema.net@[172.56.42.25]) (envelope-sender <huitema@huitema.net>) by xmail10.myhosting.com (qmail-ldap-1.03) with ESMTPA for <draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org>; 25 Nov 2018 20:40:03 -0000
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Joe Touch <touch@strayalpha.com>, Nick Hilliard <nick@foobar.org>
Cc: tsv-art <tsv-art@ietf.org>, OPSEC <opsec@ietf.org>, ietf <ietf@ietf.org>, draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org
References: <154300282321.9639.11604402305352742547@ietfa.amsl.com> <C4886ABA-3BBE-46AE-B2D9-9A6836D7A8BB@strayalpha.com> <2c28d4ac-87de-bcaf-54e8-4e745235c800@gmail.com> <977CA53D-7F72-4443-9DE2-F75F7A7C1569@strayalpha.com> <d6deb7af-99dd-9013-2722-8ebbe00c0b37@si6networks.com> <1CB13135-D87A-4100-8668-D761058E1388@strayalpha.com> <0f56c25d-7ac7-e534-4e2c-cc09f5154e77@foobar.org> <28EDE667-457E-4AED-8480-F27ECAA8E985@strayalpha.com> <6bd1ec94-f420-1f4c-9254-941814704dbb@gmail.com>
From: Christian Huitema <huitema@huitema.net>
Openpgp: preference=signencrypt
Autocrypt: addr=huitema@huitema.net; prefer-encrypt=mutual; keydata= xsBNBFIRX8gBCAC26usy/Ya38IqaLBSu33vKD6hP5Yw390XsWLaAZTeQR64OJEkoOdXpvcOS HWfMIlD5s5+oHfLe8jjmErFAXYJ8yytPj1fD2OdSKAe1TccUBiOXT8wdVxSr5d0alExVv/LO I/vA2aU1TwOkVHKSapD7j8/HZBrqIWRrXUSj2f5n9tY2nJzG9KRzSG0giaJWBfUFiGb4lvsy IaCaIU0YpfkDDk6PtK5YYzuCeF0B+O7N9LhDu/foUUc4MNq4K3EKDPb2FL1Hrv0XHpkXeMRZ olpH8SUFUJbmi+zYRuUgcXgMZRmZFL1tu6z9h6gY4/KPyF9aYot6zG28Qk/BFQRtj7V1ABEB AAHNJ0NocmlzdGlhbiBIdWl0ZW1hIDxodWl0ZW1hQGh1aXRlbWEubmV0PsLAeQQTAQIAIwUC UhFfyAIbLwcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEJNDCbJVyA1yhbYH/1ud6x6m VqGIp0JcZUfSQO8w+TjugqxCyGNn+w/6Qb5O/xENxNQ4HaMQ5uSRK9n8WKKDDRSzwZ4syKKf wbkfj05vgFxrjCynVbm1zs2X2aGXh+PxPL/WHUaxzEP7KjYbLtCUZDRzOOrm+0LMktngT/k3 6+EZoLEM52hwwpIAzJoscyEz7QfqMOZtFm6xQnlvDQeIrHx0KUvwo/vgDLK3SuruG1CSHcR0 D24kEEUa044AIUKBS3b0b8AR7f6mP2NcnLpdsibtpabi9BzqAidcY/EjTaoea46HXALk/eJd 6OLkLE6UQe1PPzQC4jB7rErX2BxnSkHDw50xMgLRcl5/b1bOwE0EUhFfyAEIAKp7Cp8lqKTV CC9QiAf6QTIjW+lie5J44Ad++0k8gRgANZVWubQuCQ71gxDWLtxYfFkEXjG4TXV/MUtnOliG 5rc2E+ih6Dg61Y5PQakm9OwPIsOx+2R+iSW325ngln2UQrVPgloO83QiUoi7mBJPbcHlxkhZ bd3+EjFxSLIQogt29sTcg2oSh4oljUpz5niTt69IOfZx21kf29NfDE+Iw56gfrxI2ywZbu5o G+d0ZSp0lsovygpk4jK04fDTq0vxjEU5HjPcsXC4CSZdq5E2DrF4nOh1UHkHzeaXdYR2Bn1Y wTePfaHBFlvQzI+Li/Q6AD/uxbTM0vIcsUxrv3MNHCUAEQEAAcLBfgQYAQIACQUCUhFfyAIb LgEpCRCTQwmyVcgNcsBdIAQZAQIABgUCUhFfyAAKCRC22tOSFDh1UOlBB/94RsCJepNvmi/c YiNmMnm0mKb6vjv43OsHkqrrCqJSfo95KHyl5Up4JEp8tiJMyYT2mp4IsirZHxz/5lqkw9Az tcGAF3GlFsj++xTyD07DXlNeddwTKlqPRi/b8sppjtWur6Pm+wnAHp0mQ7GidhxHccFCl65w uT7S/ocb1MjrTgnAMiz+x87d48n1UJ7yIdI41Wpg2XFZiA9xPBiDuuoPwFj14/nK0elV5Dvq 4/HVgfurb4+fd74PV/CC/dmd7hg0ZRlgnB5rFUcFO7ywb7/TvICIIaLWcI42OJDSZjZ/MAzz BeXm263lHh+kFxkh2LxEHnQGHCHGpTYyi4Z3dv03HtkH/1SI8joQMQq00Bv+RdEbJXfEExrT u4gtdZAihwvy97OPA2nCdTAHm/phkzryMeOaOztI4PS8u2Ce5lUB6P/HcGtK/038KdX5MYST Fn8KUDt4o29bkv0CUXwDzS3oTzPNtGdryBkRMc9b+yn9+AdwFEH4auhiTQXPMnl0+G3nhKr7 jvzVFJCRif3OAhEm4vmBNDE3uuaXFQnbK56GJrnqVN+KX5Z3M7X3fA8UcVCGOEHXRP/aubiw Ngawj0V9x+43kUapFp+nF69R53UI65YtJ95ec4PTO/Edvap8h1UbdEOc4+TiYwY1TBuIKltY 1cnrjgAWUh/Ucvr++/KbD9tD6C8=
Message-ID: <6be84ccf-9a72-2694-e19d-fa19043a0cb1@huitema.net>
Date: Sun, 25 Nov 2018 12:40:03 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
In-Reply-To: <6bd1ec94-f420-1f4c-9254-941814704dbb@gmail.com>
Content-Type: multipart/alternative; boundary="------------D59ADFBAB31468BBF2A117B1"
Content-Language: en-US
X-Originating-IP: 168.144.250.231
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 168.144.250.0/24
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=168.144.250.0/24@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.29)
X-Recommended-Action: accept
X-Filter-ID: EX5BVjFpneJeBchSMxfU5rB4yPWYUCSdtdMqNq5uX95602E9L7XzfQH6nu9C/Fh9KJzpNe6xgvOx q3u0UDjvO7EiGoWuidqebgKXGM72YxOIbg6INTucL51iwLVw9Lt6PSqkIJtRvD+/z+xB7jJIPJ8j cRWGrGPw27W+gUvIvJNVr8eP+Wmp/y/AB2KysgGDp/4g0jRXdoyAEKa+PmdzvLUJ8oN+d2/1YClf NOnZIS+k7MxK87c44TynDTcugpM/Duruc2IfTwtKc1hTWTrQglpgLxqZUFZdwbOLffZB9SIbeA2G NaAif0QyGEAJd8kel+zffa+S3paXsykGResyE7dAzbZabvf4+eAvvSn0D5YzxzA4C4+ILjmdkQoL 6F7cCSavQBrPoagEXfZ210Cx8bwqyT5p50x81ZKcmzCu2U1l0pLLr6Q2GfeLeJGF+80DrsibCyBr x+YtCB8oetqRijWKtLT9WR57oxUvRixjadcobnduoQv5Sp6y3SmK1n5SK/lIPtlUiBhTzlv5XU8Y E2iH1Wgh6RAenBR+licROGYpdSSwoNX/JQLuoQOg/Yb9zrQYrb8D2DW+FmTFNdXGYMW7PZbQr3Ng 1WIIq6ERPIrFVfV8YwbQTud2ndj194c9/49qryIYbFFBOkVCXXzvNuW3bv1nPfn3AWXq7M22DtZ0 Dg9K+vwGh2YhLXUzLTJYs7W549ydvqZDiFMXDyPJeJLaHCnfs3i0UtPne0vcKpXozswVgmo2tH4W 8yU3FuMq8AeOaRVwfAe6noaPrEteNbfAStLjtBSWV13/2j9QGXA8CVsONrMJuGzuoGnKTKcyyDl+ Iey4xwZiQVVdRpyDl/r0x/hxBKQivuGmC/m7GOCf3MLbn7l3g+Lh7r9C5nLMhK7unSGReaJhoESb MmiSIky2ZS50wJ+lQ+LaxBNJUp6t2ykfuEOAy+YBuZa3mFPXkVWClPVvbW5lVyQanRxw5p2JYH/6 BohvTRmOq56pXi2xVeaE7wHMAOKzNxZH1vP9C0T1BLTNamueI0y1oJZKcQ==
X-Report-Abuse-To: spam@quarantine9.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/RPSacoSY8Px2SWHulrF07vxthnk>
Subject: Re: [Tsv-art] Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Nov 2018 20:40:23 -0000

On 11/25/2018 11:40 AM, Brian E Carpenter wrote:
> On 2018-11-26 04:53, Joe Touch wrote:
>> A reasoned discussion of the pros and cons would be useful.
>>
>> What we have is the perspective, often heavily represented by vendors and operators, of the driving reality that:
>>
>> a) implementing extended features is an attack on profits
>> b) properly configuring and monitoring extended features is an attack on effort
>>
>> A reasoned argument would be useful. That is not what has been repeatedly presented, IMO.
> I don't think that's entirely fair to RFC7045. But the fact is that
> there's a tussle here between the desire for the ability to deploy
> new protocols freely, and the desire for the ability to block
> potentially harmful or malicious traffic. The definition of "harmful
> or malicious" is not universally agreed. "Harmful to my business model"
> is certainly one possible interpretation. But then, we decided to
> implement the Internet as a largely unregulated competitive system,
> so we got tussles.

I am concerned that this draft is attempting to weight the scales and
favor one side of this ongoing tussle, which leads to something like
"ossification in the name of security". I think that's a huge overreach.
I would like to have a very general caveat at the beginning of the
draft, explaining that it is perfectly fine to deploy routers that do
not perform any such filtering and simply forward the packets. We need
something significantly more forceful than merely saying that the short
statement in section 2.3.

The policies that it describes are plausible for specialized filtering
devices such as firewalls, but the draft proposes adopting these
policies for "transit routers", an ill defined term that could cover
pretty much every router in the the Internet. There is a big difference
there. Security devices are engineered to implement specific policies,
and come with management systems to update these policies over time.

Nick made that point, probably unintentionally, when he wrote that
"transit operators would generally take the view that any data-plane
packet which needs to be put through a slow path will be rate limited up
to 100% loss". Last I checked, data plane processing is implemented in
specialized components that are designed for speed. I am quite concerned
that filtering recommendations made by the IETF will end up deeply
embedded in the hardware of at least some routers, and that changing
them in the future would be quite hard. That's pretty much the recipe
for ossification.

I am also concerned that the filtering is justified by "security
considerations", but that with the exception of the HBH header these
considerations apply to end points, not to transit router. Take the
example of the experimental options, described in section 3.4.10. The
consideration says that "implications of these EHs will depend on their
specific use." It fails to mention any security consequence for the
transit router that would fail to filter these options. In the absence
of filtering, the packets will arrive at the end system, where they will
be processed if the end system is part of the experiment, or treated as
unwanted traffic if the end system is not part of that experiment. There
definitely will not be any harmful effect for the router that passed the
traffic.

I understand that unwanted traffic can be used in denial of service
attacks. But then, any traffic profile can be used in such attacks. The
attacker who can inject packets with EH=253 can also, for example,
inject arbitrary TCP segments, or spoofed EH packets. I also understand
the desire to protect end systems from unwanted traffic. There is a
history of attacks performed by various kind of "magic packets" that
cause a catastrophic failure in some target systems. But it does not
follow that such protection should be implement by coarse policies
hardwired in every router on the Internet. The definition of these
attacks changes over time, and it would be folly to implement these
rules in systems that lack management capabilities. The proper place for
that is specialized security functions, not in general purpose routers.

I am also concerned that the draft does not define the difference
between EH options and IPv6 payload types. The IPv6 header contains a
"payload type" field, that may legitimately contain any of the payload
types defined in the IANA registry of protocol numbers
(https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml).
Some of those payload types are flagged as IPv6 extension header types
and listed in the corresponding registry
(https://www.iana.org/assignments/ipv6-parameters/ipv6-parameters.xhtml).
Discussing EH without discussing the other payload types seems bizarre.
Do the reasons for blocking for the experimental payload type 253 also
apply to, for example, the UDP Lite payload type? What about discussing
ESP and not discussing L2TP or MANET?

-- Christian Huitema


-- Christian Huitema