[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Pls review documents on IESG agenda
Wijnen, Bert (Bert) wrote:
Documents that may need specific attention from AA docutors:
draft-arkko-pppext-eap-aka-13.txt (Informational)
This document looked very good to me ;-)
But in the interest of reviewing someone else's document
too, I looked at
o draft-ietf-multi6-multihoming-threats-02.txt
Threats relating to IPv6 multihoming solutions (Informational) - 2 of 3
Token: David Kessens
There aren't any AAA issues around this document. Other
comments:
Overall:
This an excellent and well written document. I had no major
problems with it. However, a few smaller nits or questions
were found here and there. Nothing worth a DISCUSS, but you
could pass the comments along.
Substantial:
2) Does multicast make matters worse? It usually does.
Not sure if the multicast angle relates to a specific solution
like the start of the list implies or if its a more general issue
with multihoming. I suspect the latter. Suggestion: if you haven't
dealt with multicast in this document, say so.
Hence there is a different way to describe the same thing. If the
peer can somehow prove that it is the owner of the identifier, then
the peer can control the locators that are used with the identifier.
This way to describe the problem is used in [OWNER].
Hmm... I think there's a step here that seems a bit vague (may become
clear when you read the rest of the document, but not yet here). This
assumes that all communications are bound to the identifier, not the
locator. Perhaps you want to say this explicitly.
in the routing system
delivering packets to that address. Applications that use mutually
authenticating security mechanisms, such as IPSEC or TLS, have the
ability to bind an address or FQDN to cryptographic keying material.
Nit: TLS most often does not do mutual authentication. Suggestion:
s/use mutually authenticating security mechanisms/use security
mechanisms/
The third, and final concern, is that if an attacker only need a few
packets to convince one host to flood a third party, then it wouldn't
be hard for the attacker to convince lots of hosts to flood the same
third party. Thus this could be used for Distributed
Denial-of-Service attacks.
Perhaps you want to explicitly say something about the amplification
here. I believe amplification is the key issue here, and contrast
this to the 1:1 amplification in the spoofed TCP SYN attack.
For instance, in the case of TCP it
would help if TCP slow-start was triggered when the destination
locator changes. (Folks might argue that, separately from security,
this would be the correct action for congestion control since TCP
might not have any congestion-relation information about the new path
implied by the new locator).
I'm not completely convinced that it would help. Seems like TCP slow
start still involves a number of messages when the sender retransmits
after not getting a response. Depending on the number of retransmits
vs. the number of packets needed to get the attack going, this might or
might not be useful. The key is again amplification. How many packets
you put in as an attacker, and how many does the victim get? Suggestion:
s/it would help if/a partial defense would be given if/
Discussion: Perhaps the key issue is not about the granularity,
but about the lifetime of the state that is created? In a
transport-layer approach the multihoming state would presumably be
destroyed when the transport state is deleted as part of closing
the connection. But an IP-layer approach would have to rely on
some timeout or garbage collection mechanisms perhaps combined
with some new explicit signaling to remove the multihoming state.
The coupling between the connection state and multihoming state in
the transport-layer approach might make it more expensive for the
attacker, since it needs to keep the connections open. Is this
the case?
I think there's both a space (granularity) and time (lifetime)
component in the results of either legitimate or fraudulent
multihoming requests. Clearly there needs to be some limits
on the effect of the requests.
There is a potential chicken-and-egg problem here, because
potentially one would want to avoid doing work or creating state
until the peer has been verified, but verification will probably need
some state and some work to be done.
Stateless design in verification protocols is well known today,
so I don't think is much of an issue. Suggestion: Add "Avoiding
any work does not seem possible, but good protocol design can often
delay state creation until verification has been completed."
Editorial:
of the endpoints) and I think those would allow blocking as well.
Maybe s/I think//
Given that there isn't address privacy in site multihoming setups
- English is not my native language but I tend to
replace "isn't"=>"is not" etc. (Multiple places
and multiple cases with don't/can't etc.)
However, when a *host* is multi-homed to several ISP, e.g. through a
s/*host* is/host (not site) is directly/
Such an attack might be against the resources of a particular host
i.e., C in the example above, or it might be against the network
infrastructure towards a particular IP address prefix, by overloading
the routers or links even though there is no host at the address
being targeted.
Move this paragraph to the end of Section 4.3, otherwise the "there are
a few aspects" ... "the first is ..." are hard to understand when this
paragraph is in the middle.
--Jari