Re: [v6ops] Question regarding RA-Guard evasion (ND and extension headers)

David Farmer <farmer@umn.edu> Fri, 24 June 2011 01:30 UTC

Return-Path: <farmer@umn.edu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CCBE11E8084; Thu, 23 Jun 2011 18:30:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wob4i98digjP; Thu, 23 Jun 2011 18:30:16 -0700 (PDT)
Received: from vs-w.tc.umn.edu (vs-w.tc.umn.edu [134.84.135.88]) by ietfa.amsl.com (Postfix) with ESMTP id 2A8F411E807C; Thu, 23 Jun 2011 18:30:16 -0700 (PDT)
Received: from mail-iy0-f171.google.com (mail-iy0-f171.google.com [209.85.210.171]) by vs-w.tc.umn.edu (UMN smtpd) with ESMTP Thu, 23 Jun 2011 20:30:08 -0500 (CDT)
X-Umn-Remote-Mta: [N] mail-iy0-f171.google.com [209.85.210.171] #+LO+TR
X-Umn-Classification: local
Received: by mail-iy0-f171.google.com with SMTP id 12so3134063iyi.16 for <multiple recipients>; Thu, 23 Jun 2011 18:30:08 -0700 (PDT)
Received: by 10.43.132.196 with SMTP id hv4mr624887icc.105.1308879007836; Thu, 23 Jun 2011 18:30:07 -0700 (PDT)
Received: from x-128-101-232-243.uofm-secure.wireless.umn.edu (x-128-101-232-243.uofm-secure.wireless.umn.edu [128.101.232.243]) by mx.google.com with ESMTPS id f19sm1187427ibl.49.2011.06.23.18.30.06 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 23 Jun 2011 18:30:07 -0700 (PDT)
Message-ID: <4E03E89D.3010603@umn.edu>
Date: Thu, 23 Jun 2011 20:30:05 -0500
From: David Farmer <farmer@umn.edu>
Organization: University of Minnesota
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.18) Gecko/20110616 Thunderbird/3.1.11
MIME-Version: 1.0
To: Ted Lemon <Ted.Lemon@nominum.com>
References: <282787FA-C418-430C-B473-152B4FFE900C@gmail.com> <m1QZLSP-0001h8C@stereo.hq.phicoh.net> <20110622210451.60ad8bce@opy.nosense.org> <alpine.DEB.2.00.1106221337411.19581@uplift.swm.pp.se> <CF7C688F-9262-4A6C-9B57-CFDDF94D246D@nominum.com> <20110623095548.24d89d7f@opy.nosense.org> <B5FBA399-6AAC-4036-A0D3-CAA546190B92@nominum.com> <alpine.DEB.2.00.1106230834580.19581@uplift.swm.pp.se> <63524B72-6890-48E4-926F-030744B415A2@nominum.com>
In-Reply-To: <63524B72-6890-48E4-926F-030744B415A2@nominum.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: v6ops@ietf.org, ipv6@ietf.org
Subject: Re: [v6ops] Question regarding RA-Guard evasion (ND and extension headers)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: David Farmer <farmer@umn.edu>
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jun 2011 01:30:17 -0000

On 6/23/11 15:30 CDT, Ted Lemon wrote:
> On Jun 23, 2011, at 2:36 AM, Mikael Abrahamsson wrote:
>> I don't see how it can be fixed. Short of encrypting all traffic
>> and pre-distributing keys, ethernet can't be fixed without the
>> "bandaids" you seem to call the measures being used widely to
>> assure ethernet can in fact be used securely.
>
> There probably is no single solution.   But let's consider the
> solution Mark proposed: use the fact that you control the
> infrastructure to control the flow of packets on the network in such
> a way that rogue RAs cannot reach leaf nodes.   The reason I object
> to this solution, in addition to the fact that it breaks multicast,
> is that it's a firewall solution: the client doesn't know it's safe,
> and as soon as it connects to a network that's not protected in this
> way, it's vulnerable.   But the model of using infrastructure control
> as a credential is interesting.

I don't think of RA-Guard and DHCP-Guard filters as security measures, 
they are simply network management and operations techniques.  They 
don't make the network more secure, but they can make operating some 
networks much easier.  They probably also can make some networks more 
reliable and usable too.  But, calling them more secure is probably a 
stretch.

A quick story; 6 years ago we replaced our network and implemented IPv4 
DHCP-Guard filters on all access ports on our network, doing this 
eliminated about 300 trouble tickets a year from rogue IPv4 DHCP servers 
showing up on our network, home routers used as cheep switches without 
disabling DHCP, Internet connection sharing software on laptops, etc... 
  Between staff time to track down the offending devices and lost 
productivity of the effected users, lets use a conservative average cost 
of $500 an incident, that is $150K a year of cost savings to the 
University.  This didn't make our network one bit more secure, it is 
still a wide open network that anyone can use, but it is now cheaper to 
run and provides a more reliable and usable service to our users.

This draft is need, if nothing else to let people know about this issue, 
and if we can find an acceptable way to mitigate the issue great, but 
classic RA-Guard is still a very effective network management and 
operations technique, with or without mitigation of this issue. 
Unintentional rogue RAs are big issues in a LAN environment of any 
substantial size.  However, without mitigation of this issue, RA-Guard 
is not an effective network security technique. It can't deal with 
malicious rouge RAs that are a security threat.

> Is there a way that someone who is not running 802.1x can demonstrate
> that they control layer 2?   It seems to me that for most examples of
> Layer 2 that we care about, the answer is probably yes.   So then if
> the secure link to the router can be used to communicate a secret,
> and the network can provide that secret back to the user in a way
> that a rogue RA agent could not do, then the end node can
> discriminate between rogue RAs and legitimate RAs.
>
> E.g., suppose we have a WiFi network secured with WPA.   WPA uses an
> X.509 cert to establish the identity of the WPA server.   If the
> private key authenticated by the cert is used to sign the secret the
> client provides, then the client can be sure that the router it is
> talking to is controlled by the same entity that controls WPA.
> Since WPA is tied directly to the infrastructure, that's proof that
> the router is managed by the infrastructure provider.

OH... That's an intriguing idea, use 802.1x to securely feed SEND.  That 
might even make using SEND practical in an open network environment like 
a University.  Its a massing protocol layering violation, but most 
things in the security realm are.

> Another solution that would work well in the case of
> frequently-visited networks would be the model that ssh uses: keep a
> list of good routers.   When you connect to a wire, prefer routers on
> the "good" list to new routers.   If no RAs come from routers on the
> "good" list, then you need a heuristic to decide whether or not a new
> router is good.   The mechanism I described in the previous paragraph
> could be used to handle some exceptional cases; other heuristics
> could be used to handle cases where the link is not secured in any
> way: if I try to establish secure connections, and those connections
> turn out to be exposed to MITM attacks, then the router (and hence,
> the RA from that router) are not trustworthy.
>
> The problem with this stuff is not that it's impossible.   It's that
> it's not simple.   If you want your communications to be secure, you
> have to secure them.   If all your communications are secure, then a
> rogue RA can only do two things: deny service, or allow an attacker
> to do traffic analysis and/or cryptanalysis that would not otherwise
> be possible.

Yep, if you secure your communications then these issues are only 
network management and operational issues, not security issues. However, 
depending on the network, you still might want to use RA-Guard to 
prevent such operational issues.

-- 
===============================================
David Farmer               Email:farmer@umn.edu
Networking & Telecommunication Services
Office of Information Technology
University of Minnesota	
2218 University Ave SE	    Phone: 612-626-0815
Minneapolis, MN 55414-3029   Cell: 612-812-9952
===============================================