Thanks, Esko

inline

On Wed, Sep 21, 2022 at 10:52:47AM +0000, Esko Dijk wrote:
> Thanks,
> 
> One item I forgot to include which was also on my mind - a security 
> consideration. If an autonomous bootstrap method like BRSKI is left 
> "always-on" in a mesh network, it means that at any time an off-mesh attacker 
> can contact its nearby Join Proxies and flood them with traffic. E.g. using 
> different LL addresses to pretend it is multiple Pledges.
> This will cause relayed traffic on the mesh, potentially overloading it.
> 
> * One solution component is clearly rate-limiting of relayed traffic. But, 
> this is not even mentioned in the security considerations. And not in 8995 as 
> far as I can tell.

For the stateful proxy, the pull request from my review i sent last friday 
suggests the
following text:

   To protect itself and the Registrar against malfunctioning Pledges
   and or denial of service attacks, the join proxy SHOULD limit the
   number of simultaneous mapping states for each IP_p%IF to 2 and the
   number of simultaneous mapping states per interface to 10.  When
   mapping state can not be built, the proxy SHOULD return an ICMP error
   (1), "Destination Port Unreachable" message with code (1),
   "Communication with destination administratively prohibited".

Do you think these are useful numbers ?

The whole idea of the stateless proxy is of course to remove the need for 
intellegence
from the proxy and only have it on the registrar. The best DoS protection i 
could
think of on the proxy is therefore just a total packet rate limiter. Is it 
possible
to come up with good recommendations on such packet rate limiters ? For example
1% of the "uplink" bitrate ? Can you think of mesh networks where this would not
be a good enough number ? If this (or another number)  makes sense we could 
suggest
to add it to the stateless proxy section.

> * Another solution component is being able (by an admin) to "turn on" and 
> "turn off" the entire option of BRSKI bootstrapping.  This could also be 
> mentioned as a security advice: turn it off when not needed i.e. when the 
> operator knows for sure there are no new Pledges to be bootstrapped.  The 
> method of "turning on/off" could be implementation-specific as we don't 
> define any APIs for control of Join Proxies.  The intended behavior of any 
> Join Proxy is then as follows:
>    1. If BRSKI is "on", respond to discovery requests by Pledges as usual and 
> do relay any (DTLS) records they may send to the join-port.
>    2. If BRSKI is "off" , don't respond to discovery requests by Pledges and 
> don't relay any data sent to the join-port. (Effectively, close it.)

If the proxy does not discover a registrar, then of course it can not forward 
enrolment
requests. We should at least specify that proxies need to correctly support that
registrar (announcemenets) are switched on/off. What do you think ?

> Some networks may have a "BRSKI always on" policy because it's needed for 
> their application and for convenience, but for a majority of networks I 
> expect that isn't needed.


I can already see a BRSKI scenario in the USA, where the manager of the 
east-coast NOC went home at
5PM and some IT folks on the west coast still want enroll new equipment in an 
installation and
wonder what happens.

But if this is what customers want (and i think you say some of them likely 
will want this), then i would
like to see appropriate disagnostics for the local installer:

Instead of stopping service announcements (registrar and proxy), i would then 
love to see the service
announcements witth some "service status" flag/field. For example "off hours" 
or the like. Workflow:
Device to be enrolled has single color LED. You connect it (west coast) to the 
network, and it would
indicate "off hours" through eg.: repeating three short blinks. This validates 
that network connectivity
works, and that enrolment will proceed once someone switches "BRSKI on" (next 
morning).

Does that make sense ?

> Maybe such practical security related solutions are already described in 
> other documents e.g. 6TiSCH joining or GRASP documents but unfortunately I 
> didn't read enough of those documents to know this. If so we can also refer 
> to it as security consideration.
> For a mesh network, avoiding an outsider to be able to "load" the mesh links 
> with random data is especially important.

Indeed. Hopefully the #state and rate limiters proposed above would be 
sufficient to get past
this point ?

Cheers
    Toerless
> 
> Regards
> Esko
> 
> -----Original Message-----
> From: Michael Richardson <m...@sandelman.ca> 
> Sent: Wednesday, September 21, 2022 12:31
> To: Esko Dijk <esko.d...@iotconsultancy.nl>
> Cc: Anima WG <anima@ietf.org>; anima-cha...@ietf.org; stokcons 
> <stokc...@bbhmail.nl>
> Subject: Re: [Anima] 2nd WGLC for draft-ietf-anima-constrained-join-proxy-12, 
> ends September 20th 2022
> 
> Okay, thank you. I'll crunch through your comments on Friday.

-- 
---
t...@cs.fau.de

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to