Hello Roman, Thank you for your review.
My understanding of your DISCUSS ballot is that this I-D is worse than the cure. If the above statement is correct, then there is probably a disconnect between your view and the actual purpose of this I-D, which is more like "if you bumped into another car on a parking lot, then please leave a message on the damaged car windshield with your contact information". I.e., propose a reasonably sensible way to contact the researcher(s) sending those probes. Those probe research are not common; I know about 5 teams doing (and counting me twice) such probing over the public Internet over a period of 10 years... And a vast majority of them (if not all) have applied similar mechanisms, so let's document them in an *informational* document that starts with "This document suggests some simple techniques". More background: I was contacted only *once* in those 2 measurement campaigns of mine, and it proved really useful as it allowed a forensic analyst to contact me in a matter of hours (more information in a private / confidential discussion if you want). This was really critical and valuable in that case, therefore the suggestions in this I-D, while not perfect, are rather useful. We could provide more context of course based on the above if it helps the IETF community. Please below some answers prefixed by EV> Regards -éric (with -justin) On 04/07/2023, 15:13, "Roman Danyliw via Datatracker" <nore...@ietf.org <mailto:nore...@ietf.org>> wrote: Roman Danyliw has entered the following ballot position for draft-ietf-opsec-probe-attribution-07: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ <https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/> for more information about how to handle DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/ <https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/> ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- It isn’t clear how the safest practice is not to always ignore this attribution information? ** The text notes in numerous places that this is only intended for “researchers with good intentions” (Section 1 and 7) but it isn’t clear how this intention translates into the workflow of the probe recipient (i.e., how does a recipient know it came from someone with good intentions?). Specifically: EV> better than nothing... -- Per the out-of-band attribution (Section 3), the suggested workflow is directing a network defender to visit an arbitrary location of the attackers choosing (i.e., by spoofing the probe source address) or by redirecting the defender to an infrastructure controlled by the attacker. This seems risky as this location could be serving malware or the connection itself could be facilitating a DDOS reflector-style attack. EV> as written above, the probes are not an attack but could look suspicious enough to the eyes of a network security analyst. And the download by the security analyst is just a plain ASCII file pointing to another page. Let's hope that forensic analysts do not click on any link... EV> Usure how it could become a dDoS attack as it would require multiple sites receiving this probe, doing the off-line analysis, and contacting phone/email the research team. There are many other and more efficient ways to distribute 3rd party contact information in the hope that they will be called / sent email messages. -- Per the in-path attribution (Section 4), there are no integrity guarantees so any on-path attacker could also modify legitimate attribution information to information of their choosing. See out-of-band attribution. EV> sure, and they can be spoofed, ... ** Section 7. If a recipient cannot confirm the information or does not wish to do so, it should treat the flows as if there were no probe attribution. What does confirmation mean in this case? How is that realized? Per the URI-based attribution, there is no strong binding between the sender and the information. As the Section 7 text notes, nothing prevents false attribution (i.e., attributing the traffic to someone else to cover my own behavior) or a false flag (e.g., attributing the traffic to someone else so as to blame them)? Additionally, nothing prevents an attacker from staffing a response to an email or telephone provided in the URI. If the network defender makes contact via provided mechanisms, why should there be any confidence in that communication? EV> we (the authors but also some other measurement teams) have considered this issue and were unable to find something 'really secure', probes are atomic packets with often size constraints (for the measurements) to non-collaborative parties. EV> I would be glad to accept any suggestion of yours to do it correctly. ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Thank you to Tiru Reddy for the SECDIR review. ** Section 3. What is the procedure for handling multiple reverse DNS records being returned? EV> if you do it well, there will be only one (again assuming that the sender is a well-behaved sender) ** Section 3 * else (or in addition), the Probe Description URI is "https://[2001:db8:dead::1]/.well-known/probing.txt". If there is no certificate associated to this address (e.g., via [RFC8738]), then there will be a certificate verification issue. -- RF8738 is cited as an example. Can its relationship to the described workflow be explained -- What is the implication of there being a certificate verification issue? Does the information get discarded? EV> suggest then to remove the last sentence ** Section 4. * For a UDP datagram [RFC768], include it in the data payload if its content has no structure; * For a TCP segment [RFC9293], include it in the data payload if its content has no structure; What does “… has no structure mean”? EV> what about s/if its content has no structure/if there is no upper-layer protocol after the transport layer/ ** Section 4. * For an IPv6 packet [RFC8200], include it in a PadN option either inside a Hop-by-Hop or Destination Options header. Doesn’t Section 3.5.1.1 of RFC9288 guide transit routers to drop hop-by-hop traffic? EV> Please note that RFC 9288 is informational and is not so assertive on dropping HbH extension headers EV> Finally, even if RFC 9288 was standard track and with a MUST discard, then doing the measurement is still valuable if only to check how many routers are implementing this putative RFC 9288-bis _______________________________________________ OPSEC mailing list OPSEC@ietf.org https://www.ietf.org/mailman/listinfo/opsec