Re: [Tsv-art] Tsvart last call review of draft-ietf-lisp-rfc6830bis-15

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> I'd suggest inserting a new paragraph after paragraph 2 of section 5, something like:
> 
> 
> NEW:
> 
> As LISP uses UDP encapsulation to carry traffic between ITRs and ETRs across the Internet, implementors should be aware of the provisions of [RFC8085], especially those given in section 3.1.11 on congestion control for UDP tunneling.

Consider it added to Section 5 “LISP Encapsulation Details”, last paragraph.

> 
>>>>>>> (2) This is not transport-specific. Reading the document, it struck me that the
>>>>>>> design of the protocol has a few inherently unsafe features related to the fact
>>>>>>> that its wire image is neither confidentiality- nor integrity-protected. I
>>>>>>> think that all of the potential DDoS and traffic focusing attacks I could come
>>>>>>> up with in the hour I spent reviewing the document are indeed mentioned in the
>>>>>>> security considerations section, but as the security considerations section
>>>>>>> does not give any practical mitigation for dataplane overload attacks, it seems
>>>>>>> to be saying that RLOC addresses shouldn't be Internet-accessible, which as I
>>>>>>> understand it is not the point of LISP. I haven't seen a secdir review on this
>>>>>>> document yet, but I'd encourage the authors to do everything it asks.
>>>>>> 
>>>>>> RFC 8061 goes along with RFC6830bis. It addresses data-plane confidentiality.
>>>>> 
>>>>> I haven’t read 8061 yet, but I probably should before continuing this thread.
>>>>> 
>>>>> I will say that I’m far less concerned about LISP header confidentiality than I am about LISP header integrity, given the opportunities for on-path meddling and off-path spoofing. If the common solution to both is something like sticking everything on the ITR-ETR path in IPSec then this is less of a concern.
>>>> 
>>>> Well RFC8061 does AEAD on the payload. All data *after* the LISP header.
>>>> The encryption is a more integrated model than IPsec, so we can be more efficient by not using extra IP headers and extra control/key exchange protocols.
>>> 
>>> Okay, that's all well and good. The LISP header itself isn't integrity protected, though?
>> 
>> It is not, unless the outer UDP checksum is used. Which we suggest to be 0 and when NATs make it non-zero, ETRs ignore it.
> 
> Ah. Okay, so two things:
> 
> (1) By "integrity protection" I mean "cryptographic integrity protection", in the sense of "preventing on-path attackers or off-path spoofers from being able to influence ITR/ETR state through crafted LISP headers to the detriment of the traffic of others". Looking over 8061, it seems to only cover confidentiality of the data-plane payload, which is extremely useful but not sufficient to prevent these attacks.

Well at this point in the generation of LISP, the only text I think to mitigate LISP header corruption is to indicate that a LISP ITR can use an outer IPsec header if protection of the UDP and LISP headers need protection. Or is that not a strong enough statement?

> The attacks seem to be well enumerated in 6830bis, but the lack of a stated mitigation beyond "be careful" seems to suggest that the mitigation is "don't use LISP", which is of course less than desirable. I'm trying to understand whether the deployment scenarios envisioned for LISP make these attacks less likely (for instance, because the ITR/ETR path itself is generally cryptographically protected with its own outer tunnel), or whether this is something that this document (or a future companion to 8061) needs to worry about.

I think so because of 8061.

> (2) Checksums provide what I'd call "corruption protection". On "setting the outer UDP checksum to zero", please be aware that this may have undesirable interactions with IPv6 headers; see also section 3.4 (Checksum Guidelines) of 8085.

If we don’t go IPsec route, we go with the checksum route. What do you think? Meaning, that if LISP header protection is desiriable, use UDP checksums. 

> Thanks, cheers,
> 
> Brian

Thanks for the commentary and discussion,
Dino






[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux