[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [BEHAVE] Re: CPE equipments and stateful filters



On Tue, 31 Jul 2007, Dan Wing wrote:
Neither of these two
forms of traffic could reasonably be described as "unsolicited" in
this case.

We have different definitions of 'solicited traffic' and
'unsolicited traffic'.  Other than opening a listener on UDP/500
for IKE (and telling the upstream firewall to please open a
permission for incoming traffic), the host didn't do anything to
solicit an incoming IKE packet.  I call that incoming traffic
'unsolicited', because the host (and its firewall) are unaware
of when a client will send a packet to establish a connection.
An HTTP server or SMTP server fall into this category, for
example.

This differs from the SIP model and the RTSP 2.0 model.  In
both SIP and RTSP 2.0, an offer/answer exchange allows the
server to learn the client desires a new session.  With that
knowledge, the server can communicate more specific information
to its firewall about the client's IP address; in this way, the
firewall doens't need to necessarily permit incoming IKE packets
from arbitrary remote addresses, unless those are first signaled
with SIP or RTSP.  This model is also used by HIP and EME, two
working groups in the IRTF (www.irtf.org).  This is what I would
consider 'solicited traffic'.

I'm not sure if this distinction matters that much from the security perspective. IMHO the main point is the attack vector and effect. Even though SIP and RTSP 2.0 were offer/answer protocols, the main point is that there needs to be a service listening (to the whole world) on some ports, the same as with IKE. You're just shifting the attack vector from IKE to SIP/RTSP 2.0 which in and of itself doesn't help anything; in fact it could make the situation worse, given that (AFAIK) the SIP/RTSP 2.0 protocol suite is more complicated than IKE.

The critical question then is, how much (and how complex) code in the listening service is required to make a decision whether to drop the new session or allow it to be established. In other words, if a vulnerability is found in the listening service software, can it be exploited by unauthenticated/unauthorized attackers and can it be used for compromise (e.g., remote code execution)? (I exclude DoS vulnerabilities from the interesting ones in this context.)

This also affects protocol design, i.e., the protocols should be designed so that the amount and complexity of code needed to drop uninteresting connection requests can be minimal.

There have been security vulnerabilities in both IKE and SIP protocol suites, but I do not recall outright whether such have enabled unauthenticated remote code execution exploits. If such were to be the case, or such vulnerabilities would have a high likelihood of succeeding, I'd think that most security administrators would want to filter out both IKE and SIP/RTSP 2.0.

--
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings