Re: [tsvwg] Updated draft LS to 3GPP regarding SCTP-AUTH and DTLS

"Black, David" <David.Black@dell.com> Tue, 06 December 2022 01:04 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FC6CC14F75F; Mon, 5 Dec 2022 17:04:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.995
X-Spam-Level:
X-Spam-Status: No, score=-6.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ed1M8tyV6Stu; Mon, 5 Dec 2022 17:04:26 -0800 (PST)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DEA69C14F74B; Mon, 5 Dec 2022 17:04:25 -0800 (PST)
Received: from pps.filterd (m0170397.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2B60Pcjk026590; Mon, 5 Dec 2022 20:04:24 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=smtpout1; bh=KpqKBEKcjdw1GAexaymlgqvje4/sgm5bYAUJrxlZMw8=; b=N3KA7PN3th38+Qex9ir6r7tXJ1V4QYqb+Rb1WHd8A1+k5qhO9Gnnx66KaB3hgglSAZQq ZW5wLs5SSx3IwQb+rD7P1srBvtRllj8k/KP75Wn8kXEsqs0UqkOiQ6zRl/Wr+CRVaYXs mzALmJXe+uCX3ZkkWVOK09Z9DIRiLZUroPyFYmNZAq8lBGa2CgtqwaK/FEXQFOHGN5gE 9qhSj8sNKMsvg++0orK6HbrIbkDrusPYAjHFxBN/kO/lKS/F/izdb0j1X2jUOivwarrM mYyN2OMGbbfI7s9PLzGMu1uvxlAo9ZEO2FFmifrmOwyTbL3YWq3YdZ4UcjmcvDh61iRQ Fg==
Received: from mx0a-00154901.pphosted.com (mx0b-00154901.pphosted.com [67.231.157.37]) by mx0b-00154904.pphosted.com (PPS) with ESMTPS id 3m8xcmgfuw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 05 Dec 2022 20:04:24 -0500
Received: from pps.filterd (m0089484.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2B60opIW030886; Mon, 5 Dec 2022 20:04:24 -0500
Received: from nam12-bn8-obe.outbound.protection.outlook.com (mail-bn8nam12lp2175.outbound.protection.outlook.com [104.47.55.175]) by mx0b-00154901.pphosted.com (PPS) with ESMTPS id 3m9u8frepg-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 05 Dec 2022 20:04:23 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dR1RzxraYbABiVXe340hMX/L+keuBJDy6SDk2WPJWlGunX1Qs5AnagiB+0eb18Gn8GfeObP60vM3gLRkV3YxTbZNnRlDJT4+gUzZTofp60wpDyuZLztTfM7M16g4VG7AVyhBOpBCzyT9D7G6JlUmutcQTCsvjw6O+pQAqixUuxcX2mt6ufWQR+64e1ta97mNjN1FOI8mDMbIo+hFazwKOaAgDQv4B4GbeuR2PZUXQKeznCYzVyspBVcNij/BUegPp53K2nLz+Es5CCXjoMSIcgq4b7TfmeEqvh5c99o1Mh+btz/h+Ngwx8r9h2bh0oJXz2RPf/Tx5D/1GnUohvM9fg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KpqKBEKcjdw1GAexaymlgqvje4/sgm5bYAUJrxlZMw8=; b=CQanlctV0igi2NZzJwT2VM+uE0wQgd9GBBMy9hai8JBd0QEAQcqHZ496UAwWYd3ZKWj+dci5JibTlDXFoPgAGDLlorY+UCHX+3GxJVnMOX2v45Hxq6yXExrbWvcqWywP4tKrgIivcrYjyJMUwQ6Q2D+1x83BKOUje69kXEEeB/w6RWqP/x8Vi19nlelkCALwmfjVt6dzdIKtybS2cQT7gcOnMFATbN0PlrZZ61ZnKJoPD6piw5VF6ORcjyJTnjFYu/jwJX5brPfU+HBPou5NBlF2Su8pJt+3YuAXvOaNOcjpSLQxImBwxxerPeNsIDqRChFlzwLWkwohKVgzdSh/eg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by DM4PR19MB6365.namprd19.prod.outlook.com (2603:10b6:8:a6::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5880.14; Tue, 6 Dec 2022 01:04:20 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::93ca:fb68:6d81:7653]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::93ca:fb68:6d81:7653%6]) with mapi id 15.20.5880.014; Tue, 6 Dec 2022 01:04:19 +0000
From: "Black, David" <David.Black@dell.com>
To: Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org>, tsvwg IETF list <tsvwg@ietf.org>
CC: Michael Tuexen <michael.tuexen@lurchi.franken.de>, "Black, David" <David.Black@dell.com>
Thread-Topic: Updated draft LS to 3GPP regarding SCTP-AUTH and DTLS
Thread-Index: AQHZA9YenokRMoQfoUawq7jcUGWwuK5gDG3A
Date: Tue, 06 Dec 2022 01:04:19 +0000
Message-ID: <MN2PR19MB40458F590BE3017E5246B527831B9@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <PA4PR07MB84149532DCC9DF9F035A478D95129@PA4PR07MB8414.eurprd07.prod.outlook.com>
In-Reply-To: <PA4PR07MB84149532DCC9DF9F035A478D95129@PA4PR07MB8414.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-12-06T00:34:36Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=5dff640d-dfe0-4c31-a108-bad548a20bec; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR19MB4045:EE_|DM4PR19MB6365:EE_
x-ms-office365-filtering-correlation-id: 332a7df0-f1eb-4cc0-3993-08dad725cdc6
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: N2sOK/SO/QFGSbEcsZ4QQZlWpuXCi9wfYSVoOzf2aoE8fu6BFyZIci1hN0/754o9pCd+jQAO9tfQ5KnKrqBUv1sRpaJVQvpi8hKeGSLuiVxN6VyC6UdKu+W+F2c7COBdP9vF2wa1tbOhzkStqBYaJN0TZL2FfxD7q+fc+cvVEL20cSpKRRYaArTT9DThLnfeW5PaleHA8l4gTglzrZv/o4BeinYNcoj76/FZXobTq9Cg/ZrgcHwIoE7lAu7OlhjDNbbS+omz6ULpmhB5qXLRHbWfgjejMI6eoWe/Rgs5LsJ1Rj4ya0xJzLuaKSLkY6naezYIms1pgZlR11Y0ZbOZXju6BaQHTfwory3wRVyJ9rFLxEjF9sPzgBLFm8mNlzl3EQlMwED7GeDDbiQtj1LpX1Dqx+bdj9r3QOg3QqEFEuExoSRCfk567fnJP4t/H5AFnX9WUFpCQo9g3Zm8dyE9clXq31vnrwIdwxYclimLvHFlJdT368D8FmHTQ9i0VINwx5GdeVqLJBpQ9kMbSWhzwAMEJ3naK1cYAes0QK/oj2EIqCeJK85r89/tu0iivCITKubs/sqcScygADFvgNyJls1hAnlxI16O2MCUvp/SuLb0OF+H/ZBMXbznrypg0LRD+0AIF+zEjRkFBbs+2SOHUT1UMMK0RXNXhR1n0ICkRJ+oxicFVXTys4CISBm8+/iVSu7PtdKmi90sFBZMmYE8T49mpd6BKSMU7a8D3rjqTCniHb/gdRAPAhL4CXvARJMj4FwFpgPtSFhj0aMV83q9ag==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(136003)(376002)(346002)(39860400002)(366004)(396003)(451199015)(82960400001)(38100700002)(166002)(86362001)(8936002)(41300700001)(2906002)(4326008)(5660300002)(38070700005)(15650500001)(83380400001)(122000001)(33656002)(478600001)(66446008)(66946007)(66476007)(66556008)(316002)(110136005)(786003)(71200400001)(54906003)(76116006)(55016003)(52536014)(966005)(8676002)(107886003)(53546011)(64756008)(6506007)(186003)(9686003)(7696005)(26005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR19MB40458F590BE3017E5246B527831B9MN2PR19MB4045namp_"
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 332a7df0-f1eb-4cc0-3993-08dad725cdc6
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Dec 2022 01:04:19.1959 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 95ij3V3dKVqDTNNJngDdKz3W3S6XTRVIK9q5JJ0fyk4G3sO3i3CdFqYGjv+sKoKQ1RYAU+WEFdh683aVMkI+kw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR19MB6365
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-12-05_01,2022-12-05_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 spamscore=0 bulkscore=0 clxscore=1011 lowpriorityscore=0 adultscore=0 suspectscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 priorityscore=1501 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2212060003
X-Proofpoint-ORIG-GUID: a3In9ltURK-MTetYGNNeC5krC7i4ZfqV
X-Proofpoint-GUID: a3In9ltURK-MTetYGNNeC5krC7i4ZfqV
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 bulkscore=0 suspectscore=0 phishscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2212060003
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/__T28EFniQyg_NVqmmrr_4AFXNw>
Subject: Re: [tsvwg] Updated draft LS to 3GPP regarding SCTP-AUTH and DTLS
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Dec 2022 01:04:30 -0000

Edits inline (need to view as HTML), mostly editorial cleanup.

Thanks, --David

From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Magnus Westerlund
Sent: Tuesday, November 29, 2022 4:40 AM
To: tsvwg IETF list
Cc: Michael Tuexen
Subject: [tsvwg] Updated draft LS to 3GPP regarding SCTP-AUTH and DTLS


[EXTERNAL EMAIL]
Hi,

I have now updated the draft text for the LS. So please review and provide any feedback.

/Magnus Westerlund


Subject: Security concerns with SCTP-AUTH and impact on progress of DTLS over SCTP
From: TSVWG
To Group: 3GPP RAN3, 3GPP SA3
To Contact: <3GPPLiaison@etsi.org<mailto:3GPPLiaison@etsi.org>>

BODY:
The IETF Transport Area Working Group (TSVWG) has been working on an updated specification for DTLS over SCTP (RFC6083) that removes the user message size limitation as previously acknowledged in the earlier liaison statement [1] to 3GPP RAN3. As part of this work security issues with SCTP-AUTH (RFC 4895) was were found, as well as along with a better understanding of the actual security properties provided by SCTP-AUTH. These impact DTLS over SCTP, because both RFC 6083 and the current working draft [2] for an updated solution rely on SCTP-AUTH.

The security issues identified in SCTP-AUTH, can be summarized as:

  *   First: packets from host A can be reflected by an attacker back to host A to make it believe that these packets are coming from its SCTP peer (B). Thus, reflection of DATA chunk can be accomplished if the SCTP transport sequence number (TSN) and Stream Sequence Number (SSN) can be matched to an acceptable range in host A.
  *   Secondly,: its current key provisioning can result in the same key being used for multiple authentication algorithms. This situation can theoretically be created by an attacker capable of rewriting the INIT or INIT-ACK AUTH chunk to change the preference order, and could result in that HMAC-SHA-1 and HMAC-SHA-2 being used with the same key.

A better understanding of the replay protection that SCPT combined with SCPT-AUTH provides and its interaction with DTLS over SCTP has also been realized. SCTP-AUTH does not provide better replay protection than what SCTP itself provides unless additional measures are taken. This means that replay of DATA chunks may be possible after 2^32 DATA chunks have been sent and the TSN has wrapped. To be accepted by the endpoint the TSN and SSN would needs to have acceptable values acceptable to for the receiver. For other chunk types with sequence numbers, similar risks exist if their sequence numbers are wrapped. However, that is fairly unlikely due to these chunk types having a low frequency of usage. Chunk types without sequence numbers can be replayed at any time, what although the impact of this may have is normally usually limited as because SCTP-AUTH prevents forging of those chunks that could have significant effects. However, it is uncertain what implementation-specific impacts on a specific implementation would be generated by replay of chunks out of its their original state context can result in. The SACK chunk replay can have significant effect after the TSN has wrapped as a replay can could (if timed correctly) move the cumulative ACK TSN forward for a sender and potentially result in that the receiver waiting for a missing a data chunk that it will never receive, it thus dead locking the SCTP association.

The resulting impact on DTLS over SCTP is the following:

  1.  Reflection of a DATA chunk that matches the currently acceptable TSN and SSN currently acceptable can result in delivery of the data in the DATA chunk to DTLS over SCTP. This data will be either a complete DTLS record or be inserted as part of a DTLS record. This injection is then expected to be detected by DTLS integrity protection as DTLS keying is directional, resulting in the whole DTLS record being discarded. Such a failure is expected to result in an SCTP association termination as it represents a non-recoverable transport protocol failure.
  2.  Unless sufficiently frequent enough rekeying of SCTP-AUTH is performed occurring, DATA chunks sent from A to B (and/or from B to A) can be replayed to B (or A) after at least 2^32 DATA chunks have been sent. The same constraint on matching the currently acceptable TSN and SSN applies for a successful replay. If the data in the DATA chunk is a complete DTLS record, then it depends on DTLS rekeying frequency determines whether if this that old DTLS record will be accepted as new user message. If a successfully replayed's data includes part of a DTLS record, then it is expected to fail the DTLS integrity check is expected to fail and thus result in SCTP association termination.
  3.  Reflection or replay of SCTP control chunks could result in termination or dead lock of the SCTP association, thereby i.e., attacking the availability of the SCTP association.

We note that these attacks will require the attacker to have the capability of capturinge packets on the path between the endpoints, as well as sending packets with forged source addresses that reach the targeted endpoint, or alternatively also to send packets from an on-path location. For more details on these security issues, please review the presentation to the TSVWG [3]. An identified mitigation that protects against the replay of DATA and SACK chunks is to ensure that the any SCTP-AUTH key has been is replaced and discarded before 2^32 TSN values have been used since the first SCTP packet protected by this key. Note that this mitigation does not appear to satisfactory mitigate be effective against the reflection attack.

TSVWG is willing to start working on addressing these security issues in SCTP-AUTH immediately. However, it is unclear how long it will take to finalize a resolution that addresses these issues. DTLS over SCTP [2] will also have to be updated to address the resulting replay resistance properties of SCTP-AUTH.

We wanted to inform SA3 of these security issues and the potential for observation about replay potential as they impact the security properties of the usage of RFC 6083 that is already defined in "Security architecture and procedures for 5G system" 3GPP TS 33.501 Rel 16 and forward.

We want to inform RAN3 that, due to the discovery of the security issues and the need to address them these, there will be additional delay before an updated DTLS over SCTP specification will be done. It's currently uncertain how long it this will take, but it will likely take until at least to the later part of 2023 before a complete solution can would be available.

References:
[1] https://datatracker.ietf.org/liaison/1744/ [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/liaison/1744/__;!!LpKI!ifnHIpwjFdIwpb8b_BCtibRre955cmxvDVnJAZgG9bf5mk0OIdGsVs9qMe9jfK8verHxj3_R8BRBeUAGTX-2MqECeRgy42Ht$>
[2] https://datatracker.ietf.org/doc/draft-ietf-tsvwg-dtls-over-sctp-bis/ [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-ietf-tsvwg-dtls-over-sctp-bis/__;!!LpKI!ifnHIpwjFdIwpb8b_BCtibRre955cmxvDVnJAZgG9bf5mk0OIdGsVs9qMe9jfK8verHxj3_R8BRBeUAGTX-2MqECecmPlCgp$>
[3] https://datatracker.ietf.org/meeting/115/materials/slides-115-tsvwg-sctp-auth-security-issues-00 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/meeting/115/materials/slides-115-tsvwg-sctp-auth-security-issues-00__;!!LpKI!ifnHIpwjFdIwpb8b_BCtibRre955cmxvDVnJAZgG9bf5mk0OIdGsVs9qMe9jfK8verHxj3_R8BRBeUAGTX-2MqECeXOGQ4h4$>