[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [BEHAVE] Re: CPE equipments and stateful filters
Your email and Christian's email are both concerned with end-host
protection. I am concerned with protecting the access link from
unwanted traffic to save bandwidth and, for battery-powered devices,
to save their batteries. If the device isn't listening on UDP/500
and would merely throw away or ICMP the incoming packet, there are
advantages with bandwidth-constrained access links and with wireless
devices, to discard the packet in the network (in a firewall device).
-d
> -----Original Message-----
> From: Pekka Savola [mailto:pekkas@netcore.fi]
> Sent: Tuesday, July 31, 2007 10:05 PM
> To: Dan Wing
> Cc: 'james woodyatt'; 'IPv6 Operations'; 'Behave WG'
> Subject: RE: [BEHAVE] Re: CPE equipments and stateful filters
>
> On Tue, 31 Jul 2007, Dan Wing wrote:
> >> Neither of these two
> >> forms of traffic could reasonably be described as "unsolicited" in
> >> this case.
> >
> > We have different definitions of 'solicited traffic' and
> > 'unsolicited traffic'. Other than opening a listener on UDP/500
> > for IKE (and telling the upstream firewall to please open a
> > permission for incoming traffic), the host didn't do anything to
> > solicit an incoming IKE packet. I call that incoming traffic
> > 'unsolicited', because the host (and its firewall) are unaware
> > of when a client will send a packet to establish a connection.
> > An HTTP server or SMTP server fall into this category, for
> > example.
> >
> > This differs from the SIP model and the RTSP 2.0 model. In
> > both SIP and RTSP 2.0, an offer/answer exchange allows the
> > server to learn the client desires a new session. With that
> > knowledge, the server can communicate more specific information
> > to its firewall about the client's IP address; in this way, the
> > firewall doens't need to necessarily permit incoming IKE packets
> > from arbitrary remote addresses, unless those are first signaled
> > with SIP or RTSP. This model is also used by HIP and EME, two
> > working groups in the IRTF (www.irtf.org). This is what I would
> > consider 'solicited traffic'.
>
> I'm not sure if this distinction matters that much from the security
> perspective. IMHO the main point is the attack vector and effect.
> Even though SIP and RTSP 2.0 were offer/answer protocols, the main
> point is that there needs to be a service listening (to the whole
> world) on some ports, the same as with IKE. You're just shifting the
> attack vector from IKE to SIP/RTSP 2.0 which in and of itself doesn't
> help anything; in fact it could make the situation worse, given that
> (AFAIK) the SIP/RTSP 2.0 protocol suite is more complicated than IKE.
>
> The critical question then is, how much (and how complex) code in the
> listening service is required to make a decision whether to drop the
> new session or allow it to be established. In other words, if a
> vulnerability is found in the listening service software, can it be
> exploited by unauthenticated/unauthorized attackers and can
> it be used
> for compromise (e.g., remote code execution)? (I exclude DoS
> vulnerabilities from the interesting ones in this context.)
>
> This also affects protocol design, i.e., the protocols should be
> designed so that the amount and complexity of code needed to drop
> uninteresting connection requests can be minimal.
>
> There have been security vulnerabilities in both IKE and SIP protocol
> suites, but I do not recall outright whether such have enabled
> unauthenticated remote code execution exploits. If such were to be
> the case, or such vulnerabilities would have a high likelihood of
> succeeding, I'd think that most security administrators would want to
> filter out both IKE and SIP/RTSP 2.0.
>
> --
> Pekka Savola "You each name yourselves king, yet the
> Netcore Oy kingdom bleeds."
> Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings