Re: [v6ops] [EXTERNAL] Re: Improving ND security

Fernando Gont <fernando@gont.com.ar> Tue, 04 August 2020 23:41 UTC

Return-Path: <fernando@gont.com.ar>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 046E63A11F4; Tue, 4 Aug 2020 16:41:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.497
X-Spam-Level:
X-Spam-Status: No, score=-1.497 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DATE_IN_PAST_24_48=1.34, NICE_REPLY_A=-0.949, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pWVx-040ZKeK; Tue, 4 Aug 2020 16:41:20 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3FB0A3A1230; Tue, 4 Aug 2020 16:41:18 -0700 (PDT)
Received: from [IPv6:2800:810:464:1f7:9de6:20d9:b1b0:ef5] (unknown [IPv6:2800:810:464:1f7:9de6:20d9:b1b0:ef5]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 6AF07280204; Tue, 4 Aug 2020 23:41:13 +0000 (UTC)
To: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>, "Pascal Thubert (pthubert)" <pthubert@cisco.com>
Cc: v6ops list <v6ops@ietf.org>, 6man <ipv6@ietf.org>
References: <d5c245f216c3409f826f8132e532a882@boeing.com> <860E06E2-2650-4AAE-AD33-D4D12B0290DC@fugue.com> <b66ce3d9c75d4a39b5336dcdf9929411@boeing.com> <0DDEBA6C-3933-40FC-BB9C-33FA59DC9D76@cisco.com> <4907a159683346789bef5c495f03f95d@boeing.com> <b5043a5446914cb5b12ed76401359c7e@boeing.com> <3978163f-8815-1bd4-0fda-d84df9cbe684@gont.com.ar> <6b0d6c0a790b46c893b0ff3051599fb4@boeing.com> <85d89256-a495-d779-2c7c-2573bfae36c5@gont.com.ar> <da17a88b1886451796e45331a2fd75d4@boeing.com>
From: Fernando Gont <fernando@gont.com.ar>
Message-ID: <a3d8ba55-52f1-f1dc-f75d-ee71a39dd9e3@gont.com.ar>
Date: Mon, 3 Aug 2020 19:32:10 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <da17a88b1886451796e45331a2fd75d4@boeing.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/_rwkiaIB-RkJLDsFomfdthq60VE>
Subject: Re: [v6ops] [EXTERNAL] Re: Improving ND security
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Aug 2020 23:41:24 -0000

Hi, Fred,

On 3/8/20 16:55, Templin (US), Fred L wrote:
[....]
>>>
>>> That is fine; we can accommodate CGAs in OMNI, cumbersome as they are.
>>> I have this on my TODO list for after the adoption call.
>>
>> Why "cumbersome"?
> 
> I realize the addresses are cryptographically-generated, which implies a security property
> which is good. But, they would not be the primary link-local addresses that neighbor
> nodes will know each other by - the CGAs will be found in the IPv6 ND message source
> and destination addresses, while the primary addresses will be carried in an additional
> IPv6 encapsulation header and would be the addresses that the NCEs are indexed by.

Not sure what you mean...



> So, all the CGAs really are is placeholders in the IPv6 header to run security checks over.
> They need not even be checked for uniqueness on the link, because it is the primary
> addresses and not the CGAs which need to be maintained as unique.

The point of CGAs is that in order for you to ND-answer for PREFIX:IID, 
you need to have the key identified by "IID". So, assuming /64s, you'd 
need to be lucky to, given a CGA (PREFIX:IID), generate a key-pair where 
the public key is identified by "IID".



>>>>> But then, RFC4380 offers a “poor-man’s” alternative to SEND/CGA. It
>>>>> places a message authentication code in the encapsulation headers of IPv6 ND messages so
>>>>> that the messages can pass a rudimentary authentication check.
>>>>
>>>> You mean the Teredo spec? If so, I don't think it includes any sort of
>>>> poor-man's SEND-CGA.
>>>
>>> It provides for message authentication,
>>
>> But what's special about SEND/CGAs is that they tie the address to a key...
> 
> OK, that sounds good. So, we like that property but AFAICT that is about all the
> CGA is good for in my application.

The thing is that, while in theory you could *theoretically* extend the 
use of CGAs as a spoofing mitigation, in the context of SEND CGAs are 
just employed for mitigating ND attacks... and that's kind a lot of 
effort for mitigating something that we have learned to 
live_with/mitigate in IPv4 in simpler ways.

i.e., I find SEND smart... but, in the bigger picture, not very 
compelling to deploy.


[...]
> The usage we have for OMNI is that of an Internet-based Client sending an
> authenticated, encapsulated, unicast RS message to an Internet-based Server
> which then must authenticate the message. 

Depends on what you mean by "authenticated". CGAs prove that the node 
that sends the packet is the owner of the address. Not more than that.

That's different than authenticating the client.

Similarly, you could authenticate the client, but that wouldn't mean 
that a client is the owner of a given address.




>>>>> So someone with
>>>>> security experience please help me out here – is RFC4380 authentication an acceptably
>>>>> secure  replacement for SEND/CGA that might be easier to work with and less
>>>>> cumbersome?
>>>>
>>>> Nope. Tee point of CGAs is that they allow you to prove address
>>>> ownership. There's nothing in RFC4380 that provides the same or similar
>>>> functionality.
>>>
>>> Why do we have to prove address ownership
>>
>> Well, that's one of the goals of SEND/CGAs. :-)
>>
>>
>>> and use a whacky address format like CGA?
>>
>> The *address format* is not really whacky. At the end of the day, it's a
>> random number, with the specific property that it's part of the hash of
>> a public key.
>>
>> looking at a CGA, you probably wouldn't be able to tell CGA from RFC7217.
[...]
> 
> I think if you look inside the IPv6 ND message and find a CG option you can
> infer that the address in the IPv6 header is a CGA.

Yep... but CGA != CGA option.

Thanks,
-- 
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@si6networks.com
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1