Some notes below...

> On May 31, 2022, at 4:14 AM, Valery Smyslov <s...@elvis.ru> wrote:
> 
> Hi Joe,
>  
> From: to...@strayalpha.com [mailto:to...@strayalpha.com] 
> Sent: Monday, May 30, 2022 10:57 PM
> To: Tero Kivinen
> Cc: Valery Smyslov; Christian Huitema; sec...@ietf.org; 
> draft-ietf-ipsecme-rfc8229bis....@ietf.org; ipsec@ietf.org; last-c...@ietf.org
> Subject: Re: [Last-Call] Secdir last call review of 
> draft-ietf-ipsecme-rfc8229bis-06
>  
> On May 30, 2022, at 12:25 PM, Tero Kivinen <kivi...@iki.fi 
> <mailto:kivi...@iki.fi>> wrote:
>>  
>> I think we need to add text explaining how to detect when the TCP
>> length framing gets messed up by attacks, and how to recover (i.e.,
>> close down the TCP channel and recreate the TCP channel). 
>  
> The impact of RSTs can be limited for this purpose by recommending RFC5961 
> for these connections.
>  
>           I’ve added a reference to RFC 5961.
>  
>           Currently the new text in the Security considerations looks like:
>  
>    TCP connections are also susceptible to RST and other spoofing
>    attacks [RFC4953].  This specification makes IPsec tolerant of sudden
>    TCP connection drops, but if an attacker is able to tear down TCP
>    connections, IPsec connection's performance can suffer, effectively
>    making this a DoS attack.
>  
>    TCP data injection attacks have no effect on application data since
>    IPsec provides data integrity.  However, they can have some effect,
>    mostly as a DoS attack:
>  
>    o  if an attacker alters the content of the Length field that
>       separates packets, then the receiver will incorrectly identify the
>       margins of the following packets and will drop all of them or even
>       tear down the TCP connection if the content of the Length field
>       happens to be 0 or 1 (see Section 3)
>  
>    o  if the content of an IKE message is altered, then it will be
>       dropped by the receiver; if the dropped message is the IKE request
>       message, then the initiator will tear down the IKE SA after some
>       timeout, since in most cases the request message will not be
>       retransmitted (as advised in Section 6.2) and thus the response
>       will never be received
>  
>    o  if an attacker alters the non-ESP marker then IKE packets will be
>       dispatched to ESP and sometimes visa versa, those packets will be
>       dropped
>  
>    o  if an attacker modifies TCP-Encapsulated stream prefix or
>       unencrypted IKE messages before IKE SA is established, then in
>       most cases this will result in failure to establish IKE SA, often
>       with false "authentication failed" diagnostics
>  
>    [RFC5961] discusses how TCP injection attacks can be mitigated.
>  
>    Note, that data injection attacks are also possible on IP level (e.g.
>    when IP fragmentation is used) resulting in DoS attack even if TCP
>    encapsulation is not used.  On the other hand, TCP injection attacks
>    are easier to mount than the IP fragmentation injection attacks, because
>    TCP keeps a long receive window open that's a sitting target for such
>    attacks.
>  
>    An attacker capable of blocking UDP traffic can force peers to use
>    TCP encapsulation, thus degrading the performance and making the
>    connection more vulnerable to DoS attacks.  Note, that attacker
>    capable to modify packets on the wire or to block them can prevent
>    peers to communicate regardless of the transport being used.


Overall, that’s good, but….

>  
>  
> But if even data injection has the same impact, it’d be much better to see if 
> there’s a way to recover “sync” in the byte stream rather than expecting a 
> new connection.
>  
>           TCP connections can be closed and re-open – I don’t think this is a 
> big problem if IKE SA survives.

Not huge, but a lot bigger than native IPsec - and that’s the issue. See my 
other note about re-sync.

>           The real problem is when IKE SA (and all Child SAs) is teared down 
> as result of attack.
>           This can happen when IKE message is corrupted or incorrectly parsed 
> as a result of data injection attack.
>  
>           Currently the draft says that there is no need to retransmit the 
> request message in case of TCP (with SHOULD NOT).
>           We can add a note that implementations MAY retransmit messages to 
> mitigate a possibility of data injection attacks.
>  
>           Regards,
>           Valery.
>  
>  
>  
> Joe
>  
> -- 
> last-call mailing list
> last-c...@ietf.org
> https://www.ietf.org/mailman/listinfo/last-call

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to