Re: [v6ops] Security issues in RFC8754 and related/subsequent drafts?

Andrew Alston <Andrew.Alston@liquidtelecom.com> Mon, 25 October 2021 22:32 UTC

Return-Path: <andrew.alston@liquidtelecom.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78B843A096C for <v6ops@ietfa.amsl.com>; Mon, 25 Oct 2021 15:32:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.875
X-Spam-Level:
X-Spam-Status: No, score=-0.875 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, NUMERIC_HTTP_ADDR=1.242, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=liquidtelecom.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8SzkdJxWN9yN for <v6ops@ietfa.amsl.com>; Mon, 25 Oct 2021 15:31:56 -0700 (PDT)
Received: from eu-smtp-delivery-182.mimecast.com (eu-smtp-delivery-182.mimecast.com [185.58.85.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96C5E3A0944 for <v6ops@ietf.org>; Mon, 25 Oct 2021 15:31:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=liquidtelecom.com; s=mimecast20210406; t=1635201111; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=KsWT7EG1O49C3MUGdqlIEQncKnP2awQs0aN33mq52Xg=; b=GkrrCZm9Ueoi7uh5bICa8pK7EnnDLtFaxHjDm/AF75+/wSFCZfsjJ6/X27C5OopijFc5Nz dJDeT8Y5JAOQU6sfmcacb2Anuy4U1hIrZc1cxgv8yRlZmDFXiw1YU5lJBNuAk+XDHpUXri nIVXyk9KjUnFZ7l2RWh+F6KG+c5JDmk=
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-he1eur02lp2054.outbound.protection.outlook.com [104.47.5.54]) (Using TLS) by relay.mimecast.com with ESMTP id uk-mta-160-s9oQkhhfPxyqhgODL_U7NQ-1; Mon, 25 Oct 2021 23:31:48 +0100
X-MC-Unique: s9oQkhhfPxyqhgODL_U7NQ-1
Received: from AS8PR03MB7622.eurprd03.prod.outlook.com (2603:10a6:20b:346::6) by AS8PR03MB7735.eurprd03.prod.outlook.com (2603:10a6:20b:405::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.18; Mon, 25 Oct 2021 22:31:46 +0000
Received: from AS8PR03MB7622.eurprd03.prod.outlook.com ([fe80::90ec:90d5:59c4:fef9]) by AS8PR03MB7622.eurprd03.prod.outlook.com ([fe80::90ec:90d5:59c4:fef9%6]) with mapi id 15.20.4628.020; Mon, 25 Oct 2021 22:31:46 +0000
From: Andrew Alston <Andrew.Alston@liquidtelecom.com>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, Gert Doering <gert@space.net>
CC: "v6ops@ietf.org" <v6ops@ietf.org>
Thread-Topic: [v6ops] Security issues in RFC8754 and related/subsequent drafts?
Thread-Index: AQHXxp4zP+qugBEUYEKpNlrZT9uUPqvfT9WAgAQhrYCAAM2ggIAAAuGAgAADvQCAAAC4AIAAOW6A///P+ACAADVegA==
Date: Mon, 25 Oct 2021 22:31:46 +0000
Message-ID: <F8ABB54E-A1DC-4D10-9464-58250FF30BC5@liquidtelecom.com>
References: <CB45220A-ECE6-492A-8A37-D189A71CDA2B@liquidtelecom.com> <CAHw9_iJy_OjSwRDRx5cbB6yhau7XzNUKTi49sHhi0CnmRARQUA@mail.gmail.com> <1F31CC6F-8471-4B50-AE3F-9E5FC76BB447@employees.org> <CAHw9_iKU5--mFq3swhSbGJHV9Y5H52cKcgeF=nBf1rqZeBMRJQ@mail.gmail.com> <YXciHYMNa6KJUohp@Space.Net> <ff55bdc4-9274-adc5-ef09-0d398b52342a@gmail.com> <YXcl2iQMvZe8ggLs@Space.Net> <0C1C8148-3D59-4C2A-A834-5B11854B3E7C@liquidtelecom.com> <64203a14-efb0-22f0-6026-3a88a2142854@gmail.com>
In-Reply-To: <64203a14-efb0-22f0-6026-3a88a2142854@gmail.com>
Accept-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.53.21091200
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4a78d7d5-19f4-4eb2-e884-08d998073a85
x-ms-traffictypediagnostic: AS8PR03MB7735:
x-microsoft-antispam-prvs: <AS8PR03MB773582C73210DFE6FA73E38CEE839@AS8PR03MB7735.eurprd03.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR03MB7622.eurprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(83380400001)(8676002)(110136005)(6512007)(166002)(66446008)(33656002)(2616005)(38070700005)(36756003)(71200400001)(498600001)(4326008)(186003)(53546011)(66574015)(122000001)(66476007)(66556008)(38100700002)(6506007)(66946007)(8936002)(91956017)(86362001)(15650500001)(2906002)(64756008)(6486002)(76116006)(5660300002)(45980500001); DIR:OUT; SFP:1102
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: Uqy9AJKun2WlsyNWxNFR5FvAQI6Y+4/5gr9BFiKQ6dPGRda/HpOs3oHJcMUtR4z0kw0DbNqpv8daF3qXUItUqik2MqhzDVMsL2Tdxsp4CO8R7XD64wtf2M3kZYyN/T5kux3/UK3uv/rDSOCXo+7ugSjHyIfJ0XD5bg2QNchgYvThLZAZpGkhEa3Q/7GNGllb6kXNBRgj7HpmeV6YPpNTFjkMZt4i+sUBCpfxR7AA2VtFsj4c/YpadV2s1PybAMYbH/6x77A7xlrkIYjENM4IT+OF+xELWZGOUbuzwa7evnExuDwDf/6+9WPC9Pemq9ng0V2JoRTlBXEc/yGoBVjt8AQpBndQMZbyprNNLKZpxXNrQKAiT3y/vd8nYszu/Lb1avDSezRKXfTfVyrzM2vPlcJwdavd9ml/Dfwqa8EzaIX+78qrFVftRoHWb1Wo/Vh76VJ0GJQ6NFYyGkN5kRRoNb83XxzRe3tXp6EK5pl5EFJMJKrVXnzi6NGqjHbCThPO7uxTBORwuGOV99MadBvgxcM76m4crAvo/BZdlplSf0JcTA2Kz7nzFr+/6w7IsS3IV5d5a3b28pleapwkG+HvtKikL7ujxbhpPJ5P5Kj+6o9vGktIRoc3V+3Z+s7I+NtXEmzGOZuznWjUoO6OJ1vSOm3qK+ul0XTtGBtiCJIVjfTOvSSJAguUxa/XpCe3xw1dzkQ5XeAfzy0Jqy7yxtbUvDylJ1pWwIQsYyOosZPDRjbFuplFzCzPFyjpuSAlaHDHosVQuKzwM0mIld3tm3m11x81Cu6sXlYNIqHzl667WyNLPcBfbdo0DS2ijE5cqiv7Ti5HG1x1YguBH1e+vc8oNhvNVqQKA58xt6GYiTJYxkiT1snlbNwEM7JKo7aJosZ1qIecIxW5B+gj/UC43lUy//wYlMfGchwhE7/YL4D/hGGFCY/KY1i78g6eiCsUS000EVMym1wzFmVed2IJ0dbbuOj9JYaBPNOAphsjYuLqdf/8ewnWMNl7D64BHirA6n2cumLpJ9k/ekFawOe/fzB1GGXb04xv4LYvzPcUFp7qmhTXEEUNVWSPE0dC8rLJ1BWAftA5T43DDcimOCpniNkOHb4/eb8Ds//jELR9gbgUDZAAVpeZC3NxfFS1jecZ1GA+ChF/gKEl2crY8RoaLMG+OcA71hMFwTLSHWY76xiFo8F8pO3eTYyNimsNaiQ1gk/VDYZk6a5rRE2aNQPrgfT4DBree8B5WBAWl7GJAr7BpNh1Six20UCPQpKMfg5HTjmtE9SE1+uCv8VWkKoRXxET9rbuUtb/LCjxDQ3Dk6R8GwhP6sKU7PEmt66xKBrnPvhvM35FgzGMVU2kDGt+dXfzkXqtpMUIC8a3Rui5fLmD5H1bam8TSnm3RE5Zv8Y3p3q4W1W4jzXm8WAL7YR9JhlAHaLykQAN0Jj80rD86uq5cDjcEUn8goYb13Rt57/IU90bOAG0BAEtoVnGIixg/lLt5dsZT+s28ftmXX1sM42vdEw5ULMwif5VSM3vD/S+o+vtwBEZOtqiKnm+xpw052IT5C7gN17SyFLL8yLJUIHweHBS6qy0/GpXyBML50LxCLLKNmMYLiJ1HEHOrLamBCf4NRw1GNT+kdsgb15cacS+T8ot4gxqzz89mbpq8HrvCHTtiFmEh3JNt64LBiY0A7uEOzm2bO0DY9LH48nuVFBRHl0iURzGLgH0tUQXRlbOmfKmU+XVLj5eEamW2Eh/X6r50g==
MIME-Version: 1.0
X-OriginatorOrg: liquidtelecom.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AS8PR03MB7622.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4a78d7d5-19f4-4eb2-e884-08d998073a85
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Oct 2021 22:31:46.3195 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 68792612-0f0e-46cb-b16a-fcb82fd80cb1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dz4n/jM8YSD/5enfWp7/IDK4m3+p1w78tcYpkylwWFR0WvXegux1mtbc+bRJ9A5+NOdPjh+URifCXKtPZVEGdZKXOT5wxtDsNerw/l5r5dE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB7735
Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=C82A168 smtp.mailfrom=andrew.alston@liquidtelecom.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: liquidtelecom.com
Content-Language: en-GB
Content-Type: multipart/alternative; boundary="_000_F8ABB54EA1DC4D10946458250FF30BC5liquidtelecomcom_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/5yx0n1GIiOwCtTKssC9KCXc2cHE>
Subject: Re: [v6ops] Security issues in RFC8754 and related/subsequent drafts?
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Oct 2021 22:32:02 -0000

Except Brian,

Normally – a single rogue host because of other protections can’t do near this level of damage – because they can’t send packets that can get decapped in the middle of the network with no way to define what happens post decap with the inner packet.  Normally you could apply a whole range of measures to ensure that a single host may be able to send a stream of packets to some host – at that point – it gets found and stopped.  In this case – that rogue host now has the abiity to inject packets practically anywhere on the network that cause attacks to happen against external hosts – and good luck tracing it.

The ”magic” prefix lets you filter which hosts can send to SRH SID’s – but as I said – it’s far from perfect – because there are still a host of issues with that.  But – lets also be serious – the level of damage a single rogue host could do in these scenarios is wayyyyyy beyond what it could do if it couldn’t cause the decap and act on <insert random router anywhere in the domain>

Andrew


From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Date: Tuesday, 26 October 2021 at 01:20
To: Andrew Alston <Andrew.Alston@liquidtelecom.com>, Gert Doering <gert@space.net>
Cc: "v6ops@ietf.org" <v6ops@ietf.org>
Subject: Re: [v6ops] Security issues in RFC8754 and related/subsequent drafts?

Yes. Rogue hosts *inside* the domain are always going to be a problem.
I don't see how a magic prefix can ever help with that.

Regards
Brian

On 26-Oct-21 11:12, Andrew Alston wrote:
> It would help to have a dedicated prefix - as a start - does it really solve the issue though.
>
> Imagine a device with a stack of cloud servers behind it - each server terminates on a separate sub-interface - and now you're trying to apply what is in effect an LPM filter to each and every interface (as compared to host based firewalling or other security mechanisms) - my question is then - how far will your tcam go - how practical is this in reality.
>
> This is as opposed to if there is a separate ether-type where an interface is either configured to process it or drop it on the floor. So yes -
the prefix filtering will help - but I suspect that you're gonna find many many scenarios where this actually doesn’t work - and all you need is *one* filter miss that has a compromised server behind it to have real problems.
>
> Something I haven't got around to fully testing yet - but let me throw out an interesting scenario on my list of tests to do.
>
> Rogue host A takes an IPv4 packet and encapsulates it in an SRH - the First sid in there is any v6 router you like on the path - the packet gets
there - it get de-encapped - same as everything I've said before. Now - the inner packet is a v4 packet - it has a source set to random host attacker doesn’t like - and its destination is 255.255.255.255<http://255.255.255.255> - which thanks to rfc919 will not forward - when that deencap happens - does the packet get dropped because it can't be forwarded - or does it get treated as a local broadcast. This is a rather undefined scenario - if however it DOES get treated as a local broadcast - well - then we have a really big problem - that’s called smurf-v2 (and even if 255.255.255.255<http://255.255.255.255> doesn’t work - more specific broadcasts that are attached may well work). At this point - when the broadcast packet hits the hosts behind those broadcasts - they will reply to the spoofed source - this will follow stock standard routing outbound - and the protections we would normally use aren’t gonna work (the source of replies to the broadcast packets would be the hosts - they are permitted to send packets to the internet)
>
> Another scenario - sending to multicast addresses post de-encap - do we
have a potential attack vector to poison ND? Again - haven't had the time to test this.
>
> Same thing applies to a whole long list of other things - effectively -
if you get one compromised host on the network that can inject a packet that will de-encap and act on the inner packet - with absolutely zero mechanisms for verification of what is in that inner packet or how to handle it - the list of possible problems is - extensive to say the last. All I
am saying is - we need to really step back and think - and I think this needs a veryyyyy close look - because in initial tests I have done - and without the above additional tests - I can tell you my results are looking positively scary (and once I complete the full set I'll publish some scenarios and results with more detail)
>
> Andrew
>
>
> On 26/10/2021, 00:48, "v6ops on behalf of Gert Doering" <v6ops-bounces@ietf.org on behalf of gert@space.net> wrote:
>
> Hi,
>
> On Tue, Oct 26, 2021 at 10:44:32AM +1300, Brian E Carpenter wrote:
> > On 26-Oct-21 10:31, Gert Doering wrote:
> > > On Mon, Oct 25, 2021 at 05:20:51PM -0400, Warren Kumari wrote:
> > >> I somewhat like the idea of having a well known prefix for "limited
> > >> domains"
> >
> > fc00::/7 works well. RFC8994 is a worked example.
>
> So how would that work for an ISP network trying to run SR6, protecting
> its network from rogue hosts inside? Without having GUAs on the SR6
> routers that would happily decapsulate incoming SR6 packets, and
> without violating lots of rules about "do not leak ULAs outside
> your network" (traceroute and other ICMP errors)?
>
> I lack imagination today...
>
> Gert Doering
> -- NetMaster
> --
> have you enabled IPv6 on something today...?
>
> SpaceNet AG Vorstand: Sebastian v. Bomhard, Michael Emmer
> Joseph-Dollinger-Bogen 14 Aufsichtsratsvors.: A. Grundner-Culemann
> D-80807 Muenchen HRB: 136055 (AG Muenchen)
> Tel: +49 (0)89/32356-444 USt-IdNr.: DE813185279
>