Re: [v6ops] Question regarding RA-Guard evasion (ND and extension headers)
David Farmer <farmer@umn.edu> Fri, 24 June 2011 01:30 UTC
Return-Path: <farmer@umn.edu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CCBE11E8084; Thu, 23 Jun 2011 18:30:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wob4i98digjP; Thu, 23 Jun 2011 18:30:16 -0700 (PDT)
Received: from vs-w.tc.umn.edu (vs-w.tc.umn.edu [134.84.135.88]) by ietfa.amsl.com (Postfix) with ESMTP id 2A8F411E807C; Thu, 23 Jun 2011 18:30:16 -0700 (PDT)
Received: from mail-iy0-f171.google.com (mail-iy0-f171.google.com [209.85.210.171]) by vs-w.tc.umn.edu (UMN smtpd) with ESMTP Thu, 23 Jun 2011 20:30:08 -0500 (CDT)
X-Umn-Remote-Mta: [N] mail-iy0-f171.google.com [209.85.210.171] #+LO+TR
X-Umn-Classification: local
Received: by mail-iy0-f171.google.com with SMTP id 12so3134063iyi.16 for <multiple recipients>; Thu, 23 Jun 2011 18:30:08 -0700 (PDT)
Received: by 10.43.132.196 with SMTP id hv4mr624887icc.105.1308879007836; Thu, 23 Jun 2011 18:30:07 -0700 (PDT)
Received: from x-128-101-232-243.uofm-secure.wireless.umn.edu (x-128-101-232-243.uofm-secure.wireless.umn.edu [128.101.232.243]) by mx.google.com with ESMTPS id f19sm1187427ibl.49.2011.06.23.18.30.06 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 23 Jun 2011 18:30:07 -0700 (PDT)
Message-ID: <4E03E89D.3010603@umn.edu>
Date: Thu, 23 Jun 2011 20:30:05 -0500
From: David Farmer <farmer@umn.edu>
Organization: University of Minnesota
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.18) Gecko/20110616 Thunderbird/3.1.11
MIME-Version: 1.0
To: Ted Lemon <Ted.Lemon@nominum.com>
References: <282787FA-C418-430C-B473-152B4FFE900C@gmail.com> <m1QZLSP-0001h8C@stereo.hq.phicoh.net> <20110622210451.60ad8bce@opy.nosense.org> <alpine.DEB.2.00.1106221337411.19581@uplift.swm.pp.se> <CF7C688F-9262-4A6C-9B57-CFDDF94D246D@nominum.com> <20110623095548.24d89d7f@opy.nosense.org> <B5FBA399-6AAC-4036-A0D3-CAA546190B92@nominum.com> <alpine.DEB.2.00.1106230834580.19581@uplift.swm.pp.se> <63524B72-6890-48E4-926F-030744B415A2@nominum.com>
In-Reply-To: <63524B72-6890-48E4-926F-030744B415A2@nominum.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: v6ops@ietf.org, ipv6@ietf.org
Subject: Re: [v6ops] Question regarding RA-Guard evasion (ND and extension headers)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: David Farmer <farmer@umn.edu>
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jun 2011 01:30:17 -0000
On 6/23/11 15:30 CDT, Ted Lemon wrote: > On Jun 23, 2011, at 2:36 AM, Mikael Abrahamsson wrote: >> I don't see how it can be fixed. Short of encrypting all traffic >> and pre-distributing keys, ethernet can't be fixed without the >> "bandaids" you seem to call the measures being used widely to >> assure ethernet can in fact be used securely. > > There probably is no single solution. But let's consider the > solution Mark proposed: use the fact that you control the > infrastructure to control the flow of packets on the network in such > a way that rogue RAs cannot reach leaf nodes. The reason I object > to this solution, in addition to the fact that it breaks multicast, > is that it's a firewall solution: the client doesn't know it's safe, > and as soon as it connects to a network that's not protected in this > way, it's vulnerable. But the model of using infrastructure control > as a credential is interesting. I don't think of RA-Guard and DHCP-Guard filters as security measures, they are simply network management and operations techniques. They don't make the network more secure, but they can make operating some networks much easier. They probably also can make some networks more reliable and usable too. But, calling them more secure is probably a stretch. A quick story; 6 years ago we replaced our network and implemented IPv4 DHCP-Guard filters on all access ports on our network, doing this eliminated about 300 trouble tickets a year from rogue IPv4 DHCP servers showing up on our network, home routers used as cheep switches without disabling DHCP, Internet connection sharing software on laptops, etc... Between staff time to track down the offending devices and lost productivity of the effected users, lets use a conservative average cost of $500 an incident, that is $150K a year of cost savings to the University. This didn't make our network one bit more secure, it is still a wide open network that anyone can use, but it is now cheaper to run and provides a more reliable and usable service to our users. This draft is need, if nothing else to let people know about this issue, and if we can find an acceptable way to mitigate the issue great, but classic RA-Guard is still a very effective network management and operations technique, with or without mitigation of this issue. Unintentional rogue RAs are big issues in a LAN environment of any substantial size. However, without mitigation of this issue, RA-Guard is not an effective network security technique. It can't deal with malicious rouge RAs that are a security threat. > Is there a way that someone who is not running 802.1x can demonstrate > that they control layer 2? It seems to me that for most examples of > Layer 2 that we care about, the answer is probably yes. So then if > the secure link to the router can be used to communicate a secret, > and the network can provide that secret back to the user in a way > that a rogue RA agent could not do, then the end node can > discriminate between rogue RAs and legitimate RAs. > > E.g., suppose we have a WiFi network secured with WPA. WPA uses an > X.509 cert to establish the identity of the WPA server. If the > private key authenticated by the cert is used to sign the secret the > client provides, then the client can be sure that the router it is > talking to is controlled by the same entity that controls WPA. > Since WPA is tied directly to the infrastructure, that's proof that > the router is managed by the infrastructure provider. OH... That's an intriguing idea, use 802.1x to securely feed SEND. That might even make using SEND practical in an open network environment like a University. Its a massing protocol layering violation, but most things in the security realm are. > Another solution that would work well in the case of > frequently-visited networks would be the model that ssh uses: keep a > list of good routers. When you connect to a wire, prefer routers on > the "good" list to new routers. If no RAs come from routers on the > "good" list, then you need a heuristic to decide whether or not a new > router is good. The mechanism I described in the previous paragraph > could be used to handle some exceptional cases; other heuristics > could be used to handle cases where the link is not secured in any > way: if I try to establish secure connections, and those connections > turn out to be exposed to MITM attacks, then the router (and hence, > the RA from that router) are not trustworthy. > > The problem with this stuff is not that it's impossible. It's that > it's not simple. If you want your communications to be secure, you > have to secure them. If all your communications are secure, then a > rogue RA can only do two things: deny service, or allow an attacker > to do traffic analysis and/or cryptanalysis that would not otherwise > be possible. Yep, if you secure your communications then these issues are only network management and operational issues, not security issues. However, depending on the network, you still might want to use RA-Guard to prevent such operational issues. -- =============================================== David Farmer Email:farmer@umn.edu Networking & Telecommunication Services Office of Information Technology University of Minnesota 2218 University Ave SE Phone: 612-626-0815 Minneapolis, MN 55414-3029 Cell: 612-812-9952 ===============================================
- Re: [v6ops] Question regarding RA-Guard evasion (… RJ Atkinson
- Re: [v6ops] Question regarding RA-Guard evasion (… RJ Atkinson
- Re: [v6ops] Question regarding RA-Guard evasion (… Mikael Abrahamsson
- Re: [v6ops] Question regarding RA-Guard evasion (… Philip Homburg
- Re: [v6ops] Question regarding RA-Guard evasion (… RJ Atkinson
- Re: [v6ops] Question regarding RA-Guard evasion (… Mark Smith
- Re: [v6ops] Question regarding RA-Guard evasion (… Mikael Abrahamsson
- Re: [v6ops] Question regarding RA-Guard evasion (… RJ Atkinson
- Re: [v6ops] Question regarding RA-Guard evasion (… Joel Jaeggli
- Re: [v6ops] Question regarding RA-Guard evasion (… Templin, Fred L
- Re: [v6ops] Question regarding RA-Guard evasion (… Fred Baker
- Re: [v6ops] Question regarding RA-Guard evasion (… Ted Lemon
- Re: [v6ops] Question regarding RA-Guard evasion (… Mark Smith
- Re: [v6ops] Question regarding RA-Guard evasion (… Mark Smith
- Re: [v6ops] Question regarding RA-Guard evasion (… Ted Lemon
- Re: [v6ops] Question regarding RA-Guard evasion (… Mikael Abrahamsson
- Re: [v6ops] Question regarding RA-Guard evasion (… Mikael Abrahamsson
- Re: [v6ops] Question regarding RA-Guard evasion (… Mikael Abrahamsson
- Re: [v6ops] Question regarding RA-Guard evasion (… Ray Hunter
- Re: [v6ops] Question regarding RA-Guard evasion (… Mikael Abrahamsson
- Re: [v6ops] Question regarding RA-Guard evasion (… Tim Chown
- Re: [v6ops] Question regarding RA-Guard evasion (… Ray Hunter
- Re: [v6ops] Question regarding RA-Guard evasion (… Ted Lemon
- Re: [v6ops] Question regarding RA-Guard evasion (… Manfredi, Albert E
- Re: [v6ops] Question regarding RA-Guard evasion (… Ted Lemon
- Re: [v6ops] Question regarding RA-Guard evasion (… Manfredi, Albert E
- Re: [v6ops] Question regarding RA-Guard evasion (… Ted Lemon
- Re: [v6ops] Question regarding RA-Guard evasion (… Philip Homburg
- Re: [v6ops] Question regarding RA-Guard evasion (… Ted Lemon
- Re: [v6ops] Question regarding RA-Guard evasion (… Mark Andrews
- Re: [v6ops] Question regarding RA-Guard evasion (… Mark Smith
- Re: [v6ops] Question regarding RA-Guard evasion (… David Farmer
- Re: [v6ops] Question regarding RA-Guard evasion (… Fernando Gont
- Re: [v6ops] Question regarding RA-Guard evasion (… Mark Smith
- Re: [v6ops] Question regarding RA-Guard evasion (… Mikael Abrahamsson
- Re: [v6ops] Question regarding RA-Guard evasion (… Mikael Abrahamsson
- Re: [v6ops] Question regarding RA-Guard evasion (… Mark Smith
- Re: [v6ops] Question regarding RA-Guard evasion (… Philip Homburg
- Re: [v6ops] Question regarding RA-Guard evasion (… Philip Homburg
- Re: [v6ops] Question regarding RA-Guard evasion (… Fernando Gont
- Re: [v6ops] Question regarding RA-Guard evasion (… David Farmer
- Re: [v6ops] Question regarding RA-Guard evasion (… Fernando Gont
- Re: [v6ops] Question regarding RA-Guard evasion (… Mark Smith
- Re: [v6ops] Question regarding RA-Guard evasion (… Fernando Gont
- Re: [v6ops] Question regarding RA-Guard evasion (… Joel Jaeggli