backbone threats [Re: key change for TCP-MD5]

2006-06-26 Thread Pekka Savola
On Wed, 21 Jun 2006, Richard A Steenbergen wrote: There is a fine line between being dilligent about security, and wasting your time trying to solve problems that don't exist, which I think has been crossed in the discussion. While TCP-MD5 could be useful in some cases (mainly in Internet Exc

Re: key change for TCP-MD5

2006-06-26 Thread Steven M. Bellovin
On Tue, 20 Jun 2006 17:06:27 -0400, Ross Callon <[EMAIL PROTECTED]> wrote: > > At 12:12 PM 6/20/2006 -0700, Bora Akyol wrote: > > >The draft allows you to have a set of keys in your keychain and > >the implementation tries all of them before declaring the segment > >as invalid. > > DoS against

Re: key change for TCP-MD5

2006-06-26 Thread Iljitsch van Beijnum
On 26-jun-2006, at 2:06, Niels Bakker wrote: The reason IPsec helps against a DoS against the CPU is that it has an anti replay counter. IPsec implementations are supposed to maintain a window, not unlike a TCP window, that allows them to reject packets with an anti replay counter that's t

Re: key change for TCP-MD5

2006-06-25 Thread Niels Bakker
* [EMAIL PROTECTED] (Iljitsch van Beijnum) [Wed 21 Jun 2006, 19:05 CEST]: The reason IPsec helps against a DoS against the CPU is that it has an anti replay counter. IPsec implementations are supposed to maintain a window, not unlike a TCP window, that allows them to reject packets with an ant

Re: key change for TCP-MD5

2006-06-24 Thread Richard A Steenbergen
On Sat, Jun 24, 2006 at 02:51:57AM -0700, Barry Greene (bgreene) wrote: > > At the same time, you are not going to find the SP core swapping out > their equipment for hardware with crypto chips. SPs do not seem to want > to pay for this sort of addition. So even new equipment is not getting > ha

Re: key change for TCP-MD5

2006-06-24 Thread Iljitsch van Beijnum
On 24-jun-2006, at 1:34, Patrick W. Gilmore wrote: If you care that much, why don't you just add an extra loopback address, give it an RFC 1918 address, have your peer talk BGP towards that address and filter all packets towards the actual interface address of the router? The chance of a

RE: key change for TCP-MD5

2006-06-24 Thread Barry Greene (bgreene)
> Why couldn't the network device do an AH check in hardware > before passing the packet to the receive path? If you can > get to a point where all connections or traffic TO the router > should be AH, then, that will help with DOS. There is no push from the operators to look at AH check or t

RE: key change for TCP-MD5

2006-06-24 Thread Barry Greene (bgreene)
essage- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > > Sent: Friday, June 23, 2006 1:46 PM > > To: Bora Akyol > > Cc: Barry Greene (bgreene); Ross Callon; nanog@merit.edu > > Subject: Re: key change for TCP-MD5 > > > > On Fri, 23 Jun 2006 13:35:

RE: key change for TCP-MD5

2006-06-24 Thread Barry Greene (bgreene)
; To: nanog@merit.edu > Subject: Re: key change for TCP-MD5 > > > > > On Fri, Jun 23, 2006 at 11:49:33AM -0700, Barry Greene > (bgreene) wrote: > > > > Yes Jared - our software does the TTL after the MD5, but > the hardware > > implementations does the

RE: key change for TCP-MD5

2006-06-24 Thread Barry Greene (bgreene)
nal Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of Iljitsch van Beijnum > Sent: Friday, June 23, 2006 4:18 PM > To: Owen DeLong > Cc: NANOG list > Subject: Re: key change for TCP-MD5 > > > On 24-jun-2006, at 0:43, Owen DeLong wrote: >

Re: key change for TCP-MD5

2006-06-23 Thread Patrick W. Gilmore
On Jun 23, 2006, at 7:17 PM, Iljitsch van Beijnum wrote: On 24-jun-2006, at 0:43, Owen DeLong wrote: Why couldn't the network device do an AH check in hardware before passing the packet to the receive path? If you can get to a point where all connections or traffic TO the router should b

Re: key change for TCP-MD5

2006-06-23 Thread Iljitsch van Beijnum
On 24-jun-2006, at 0:43, Owen DeLong wrote: Why couldn't the network device do an AH check in hardware before passing the packet to the receive path? If you can get to a point where all connections or traffic TO the router should be AH, then, that will help with DOS. If you care that mu

RE: key change for TCP-MD5

2006-06-23 Thread Owen DeLong
Why couldn't the network device do an AH check in hardware before passing the packet to the receive path? If you can get to a point where all connections or traffic TO the router should be AH, then, that will help with DOS. If you can limit what devices _SHOULD_ talk to the router and at least de

Re: key change for TCP-MD5

2006-06-23 Thread Roland Dobbins
On Jun 23, 2006, at 2:02 PM, Bora Akyol wrote: If your IPSEC is being done in hardware and you have appropriate QoS mechanisms in your network, you will probably not be able to pass your best effort traffic but the rest should be OK. Unless the DoS is within the IPSEC tunnel and crowds ou

Re: key change for TCP-MD5

2006-06-23 Thread Richard A Steenbergen
On Fri, Jun 23, 2006 at 05:01:00PM -0400, Richard A Steenbergen wrote: > > Obviously in a perfect world, you don't want to do the expensive MD5 check > anywhere sooner than the last possible moment before you declare the data > valid and add it to the socket buffer. I assume that the reason the

RE: key change for TCP-MD5

2006-06-23 Thread Bora Akyol
merit.edu > Subject: Re: key change for TCP-MD5 > > On Fri, 23 Jun 2006 13:35:20 PDT, Bora Akyol said: > > > The validity of your statement depends tremendously on how IPSEC is > > implemented. > > If 113 million packets all show up at once, you're going to > get DoS'ed, whether or not you have IPSEC enabled. >

Re: key change for TCP-MD5

2006-06-23 Thread Richard A Steenbergen
On Fri, Jun 23, 2006 at 04:43:29PM -0400, Todd Underwood wrote: > > On Fri, Jun 23, 2006 at 11:49:33AM -0700, Barry Greene (bgreene) wrote: > > > > Yes Jared - our software does the TTL after the MD5, but the hardware > > implementations does the check in hardware before the packet gets punted >

Re: key change for TCP-MD5

2006-06-23 Thread Valdis . Kletnieks
On Fri, 23 Jun 2006 13:35:20 PDT, Bora Akyol said: > The validity of your statement depends tremendously on how IPSEC is > implemented. If 113 million packets all show up at once, you're going to get DoS'ed, whether or not you have IPSEC enabled. pgpRRK8AbWIKX.pgp Description: PGP signature

Re: key change for TCP-MD5

2006-06-23 Thread Todd Underwood
On Fri, Jun 23, 2006 at 11:49:33AM -0700, Barry Greene (bgreene) wrote: > > Yes Jared - our software does the TTL after the MD5, but the hardware > implementations does the check in hardware before the packet gets punted > to the receive path. That is exactly where you need to do the > classific

RE: key change for TCP-MD5

2006-06-23 Thread Bora Akyol
> -Original Message- > From: Barry Greene (bgreene) [mailto:[EMAIL PROTECTED] > Sent: Friday, June 23, 2006 11:50 AM > To: Bora Akyol; Ross Callon; nanog@merit.edu > Subject: RE: key change for TCP-MD5 > > > > > If DOS is such a large concern, IPS

RE: key change for TCP-MD5

2006-06-23 Thread Barry Greene (bgreene)
> If DOS is such a large concern, IPSEC to an extent can be > used to mitigate against it. And IKEv1/v2 with IPSEC is not > the horribly inefficient mechanism it is made out to be. In > practice, it is quite easy to use. IPSEC does nothing to protect a network device from a DOS attack. You

RE: key change for TCP-MD5

2006-06-22 Thread David Schwartz
> How often do you think keys should change? Arguably, any time someone who had access to the key is no longer supposed to have such access. > I've never had anyone ask > to change keys for about 50 session-years. I guess the question the question is whether that's because the

Re: key change for TCP-MD5

2006-06-22 Thread Iljitsch van Beijnum
On 22-jun-2006, at 23:17, Steven M. Bellovin wrote: Why not correct the protocol deficiency by introducing a new option that includes a KeyID? Wouldn't that approach provide a more comprehensive solution to the problem? That's a much better long-term strategy, though the exact mechanism s

Re: key change for TCP-MD5

2006-06-22 Thread Steven M. Bellovin
On Thu, 22 Jun 2006 13:18:35 -0400, Ron Bonica <[EMAIL PROTECTED]> wrote: > Steve, > > In Section 1 of your draft, you say: > >"The proper solution involves some sort of key management protocol. >Apart from the complexity of such things, RFC 2385 was not written >with key changes in

Re: key change for TCP-MD5

2006-06-21 Thread Richard A Steenbergen
On Wed, Jun 21, 2006 at 05:55:21PM -0700, Randy Bush wrote: > > when low-hanging fruit is unavailable, or when they see a > really cool way to exploit the higher fruit, it would be > prudent to have done something about it. who cares about > openly recursive dns servers? there are easier ways t

RE: key change for TCP-MD5

2006-06-21 Thread Randy Bush
> This one is hard to pull off. I think the general conclusion > a couple years ago in the study that Sean Convery and Matt Franz > did was that it was less work to try to own the router or buy your > own AS ;) this is the "you don't have to run faster than the lion, you just have to run faster t

RE: key change for TCP-MD5

2006-06-21 Thread Bora Akyol
> > Another potential attack is an attempt to insert information > into a BGP session, such as to introduce bogus routes, or to > even become a "man in the middle" of a BGP session. One issue > that worries me about this is that if this allows routing to > be compromised, then I can figure o

Re: key change for TCP-MD5

2006-06-21 Thread Iljitsch van Beijnum
On 21-jun-2006, at 16:24, Ross Callon wrote: If DOS is such a large concern, IPSEC to an extent can be used to mitigate against it. Well, this one comment is the one that I don't understand. I don't see how IPSEC mitigates against DOS attacks. In fact, it seems to make things worse, since it

Re: key change for TCP-MD5

2006-06-21 Thread David Barak
--- Ross Callon <[EMAIL PROTECTED]> wrote: > Another potential attack is an attempt to insert > information > into a BGP session, such as to introduce bogus > routes, or > to even become a "man in the middle" of a BGP > session. One > issue that worries me about this is that if this > allows ro

RE: key change for TCP-MD5

2006-06-21 Thread Randy Bush
>> All the multiple keys do is to decrease the cost of the DOS. > Yes let's try to remember that, in reality, this is all about allowing two bgp peers to move to a new key without having the operators on the phone to keep the bgp session from resetting. i.e., o it will be uncommon that there

Re: key change for TCP-MD5

2006-06-21 Thread Ross Callon
At 07:29 PM 6/20/2006 -0400, Richard A Steenbergen wrote: On Tue, Jun 20, 2006 at 05:06:27PM -0400, Ross Callon wrote: ...I'd still like someone to explain why we're wasting man hours, CPU time, filling up our router logs, and potentially making DoS easier, for an attack that doesn't exist

RE: key change for TCP-MD5

2006-06-21 Thread Ross Callon
At 04:23 PM 6/20/2006 -0700, Bora Akyol wrote: ...The DOS is a concern whether you have a valid key or not, correct? Yes, People who do NOT have a valid key can certainly launch DOS attacks. I can DOS the router with fake packets that it needs to verify as long as I want. Yes, but the atta

Re: key change for TCP-MD5

2006-06-21 Thread Randy Bush
The added cost for CPU-bound systems is that they have to try (potentially) multiple keys before getting the **right** key but in real life this can be easily mitigated by having a rating system on the key based on the frequency of success. >>> This mitigates the effect of auth

Re: key change for TCP-MD5

2006-06-21 Thread Jared Mauch
On Tue, Jun 20, 2006 at 05:18:20PM -0700, Randy Bush wrote: > > >> The added cost for CPU-bound systems is that they have to try > >> (potentially) multiple keys before getting the **right** key > >> but in real life this can be easily mitigated by having a rating > >> system on the key based on

Re: key change for TCP-MD5

2006-06-20 Thread Randy Bush
> I'd still like someone to explain why we're wasting man hours, CPU time, > filling up our router logs, and potentially making DoS easier, for an > attack that doesn't exist. because the non-existent attack(s) have occurred. and keys have been compomised. randy

Re: key change for TCP-MD5

2006-06-20 Thread Warren Kumari
On Jun 20, 2006, at 4:29 PM, Richard A Steenbergen wrote: We already collectively wasted our time deploying MD5 passwords over a big scare that turned out to be nothing more than someone cracking open the manual and rediscovering how stuff worked all along Bwahahahhahaha. I work with t

RE: key change for TCP-MD5

2006-06-20 Thread Randy Bush
>> The added cost for CPU-bound systems is that they have to try >> (potentially) multiple keys before getting the **right** key >> but in real life this can be easily mitigated by having a rating >> system on the key based on the frequency of success. > > This mitigates the effect of authenticat

Re: key change for TCP-MD5

2006-06-20 Thread Richard A Steenbergen
On Tue, Jun 20, 2006 at 05:06:27PM -0400, Ross Callon wrote: > > DoS against routers is of course a major concern. Using > encryption has the potential of making DoS worse, in the > sense that the amount of processing that a bogus packet > can cause is increased by the amount of processing > need

RE: key change for TCP-MD5

2006-06-20 Thread Bora Akyol
Good comments, please see inline: > -Original Message- > From: Ross Callon [mailto:[EMAIL PROTECTED] > Sent: Tuesday, June 20, 2006 2:06 PM > To: Bora Akyol; nanog@merit.edu > Subject: RE: key change for TCP-MD5 > > At 12:12 PM 6/20/2006 -0700, Bora Akyol wrote: &

RE: key change for TCP-MD5

2006-06-20 Thread Ross Callon
keys the intended damage of the attack). Ross > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of Iljitsch van Beijnum > Sent: Monday, June 19, 2006 10:22 AM > To: Randy Bush > Cc: NANOG list > Subject: Re: key change for TCP-MD5

Re: key change for TCP-MD5

2006-06-20 Thread Crist Clark
>>> On 6/20/2006 at 12:33 PM, Iljitsch van Beijnum <[EMAIL PROTECTED]> wrote: > On 20-jun-2006, at 21:23, Randy Bush wrote: > >>> What if we agree to change the key on our BGP session, I add the new >>> key on my side and start sending packets using the new key, while you >>> don't have the new

Re: key change for TCP-MD5

2006-06-20 Thread Valdis . Kletnieks
On Tue, 20 Jun 2006 21:16:05 +0200, Iljitsch van Beijnum said: > What if we agree to change the key on our BGP session, I add the new > key on my side and start sending packets using the new key, while you > don't have the new key in your configuration yet? How is that *any* different than yo

Re: key change for TCP-MD5

2006-06-20 Thread Iljitsch van Beijnum
On 20-jun-2006, at 21:23, Randy Bush wrote: What if we agree to change the key on our BGP session, I add the new key on my side and start sending packets using the new key, while you don't have the new key in your configuration yet? again: try reading the draft I've read the draft and it "

Re: key change for TCP-MD5

2006-06-20 Thread Randy Bush
> What if we agree to change the key on our BGP session, I add the new > key on my side and start sending packets using the new key, while you > don't have the new key in your configuration yet? again: try reading the draft

RE: key change for TCP-MD5

2006-06-20 Thread Randy Bush
> The added cost for CPU-bound systems is that they have to try > (potentially) multiple keys before getting the **right** key once

Re: key change for TCP-MD5

2006-06-20 Thread Iljitsch van Beijnum
On 20-jun-2006, at 21:12, Bora Akyol wrote: The draft allows you to have a set of keys in your keychain and the implementation tries all of them before declaring the segment as invalid. No time synchronization required. No BGP message required. What if we agree to change the key on our BGP

RE: key change for TCP-MD5

2006-06-20 Thread Bora Akyol
Sent: Monday, June 19, 2006 10:22 AM > To: Randy Bush > Cc: NANOG list > Subject: Re: key change for TCP-MD5 > > > On 19-jun-2006, at 19:10, Randy Bush wrote: > > >>> try reading more carefully > > >> Didn't help... > > > how sad, as th

Re: key change for TCP-MD5

2006-06-19 Thread Edward B. DREGER
IvB> Date: Mon, 19 Jun 2006 15:40:50 +0200 IvB> From: Iljitsch van Beijnum IvB> And is NANOG now officially an IETF working group...? More interaction between IETF and NANOG is good. Kudos to SMB for trying to inspire more of it. Eddy -- Everquick Internet - http://www.everquick.net/ A divisi

Re: key change for TCP-MD5

2006-06-19 Thread Iljitsch van Beijnum
On 19-jun-2006, at 19:10, Randy Bush wrote: try reading more carefully Didn't help... how sad, as the whole document is about how to usefully be able to introduce and roll to new keys without agreeing on a narrow time. Well, as you can tell from my message just now, I don't think going

Re: key change for TCP-MD5

2006-06-19 Thread Randy Bush
>>> There doesn't really seem to be a way to introduce a new key other >>> than to just to agree on a time. I'm not sure this is good enough. >> try reading more carefully > Didn't help... how sad, as the whole document is about how to usefully be able to introduce and roll to new keys without ag

Re: key change for TCP-MD5

2006-06-19 Thread Iljitsch van Beijnum
On 19-jun-2006, at 16:54, Randy Bush wrote: There doesn't really seem to be a way to introduce a new key other than to just to agree on a time. I'm not sure this is good enough. try reading more carefully Didn't help...

Re: key change for TCP-MD5

2006-06-19 Thread Iljitsch van Beijnum
On 19-jun-2006, at 16:18, Steven M. Bellovin wrote: Comments welcome. I wonder how long that policy will hold. (-: I'm not certain what you mean by that, but since it sounds insulting to someone I'll ignore it. I see that my attempts at levity (this one by referring to the infamous

Re: key change for TCP-MD5

2006-06-19 Thread Randy Bush
> There doesn't really seem to be a way to introduce a new key other > than to just to agree on a time. I'm not sure this is good enough. try reading more carefully

Re: key change for TCP-MD5

2006-06-19 Thread Steven M. Bellovin
On Mon, 19 Jun 2006 15:40:50 +0200, Iljitsch van Beijnum <[EMAIL PROTECTED]> wrote: > On 19-jun-2006, at 14:32, Steven M. Bellovin wrote: > > > I just submitted an I-D on TCP-MD5 key change. Until it shows up > > in the > > official repository, see > > http://www.cs.columbia.edu/~smb/papers/d

Re: key change for TCP-MD5

2006-06-19 Thread Jared Mauch
On Mon, Jun 19, 2006 at 03:40:50PM +0200, Iljitsch van Beijnum wrote: > > On 19-jun-2006, at 14:32, Steven M. Bellovin wrote: > > >I just submitted an I-D on TCP-MD5 key change. Until it shows up > >in the > >official repository, see > >http://www.cs.columbia.edu/~smb/papers/draft-bellovin-

Re: key change for TCP-MD5

2006-06-19 Thread Steven M. Bellovin
On Mon, 19 Jun 2006 08:59:45 -0400, Joe Maimon <[EMAIL PROTECTED]> wrote: > > > Steven M. Bellovin wrote: > > > I just submitted an I-D on TCP-MD5 key change. Until it shows up in the > > official repository, see > > http://www.cs.columbia.edu/~smb/papers/draft-bellovin-keyroll2385-00.txt > >

Re: key change for TCP-MD5

2006-06-19 Thread Iljitsch van Beijnum
On 19-jun-2006, at 14:32, Steven M. Bellovin wrote: I just submitted an I-D on TCP-MD5 key change. Until it shows up in the official repository, see http://www.cs.columbia.edu/~smb/papers/draft-bellovin- keyroll2385-00.txt Here's the abstract: The TCP-MD5 option is most

Re: key change for TCP-MD5

2006-06-19 Thread Joe Maimon
Steven M. Bellovin wrote: I just submitted an I-D on TCP-MD5 key change. Until it shows up in the official repository, see http://www.cs.columbia.edu/~smb/papers/draft-bellovin-keyroll2385-00.txt Here's the abstract: The TCP-MD5 option is most commonly used to secure

key change for TCP-MD5

2006-06-19 Thread Steven M. Bellovin
I just submitted an I-D on TCP-MD5 key change. Until it shows up in the official repository, see http://www.cs.columbia.edu/~smb/papers/draft-bellovin-keyroll2385-00.txt Here's the abstract: The TCP-MD5 option is most commonly used to secure BGP sessions between r