On Sat, Dec 1, 2018 at 12:34 PM Juliusz Chroboczek <[email protected]> wrote: > > > as keys (currently) protect each interface, not each router association... > > Correct. Babel uses both unicast and multicast, and Babel-HMAC is > designed so that it can protect multicast traffic while remaining immune > to replay, even in the absence of persistent state or hardware clocks. > > > consider, instead a case where you are dropping a bunch of networks > > into an information interchange (call it "BIX"[1]), where a bunch of > > networks have agreed to interconnect, over a single "wire", much like > > how BGP network interchanges work today. Key exchange here, in the BGP > > world, is on a per-router, not per-interface, basis. > > BGP is a unicast-only protocol, hence it can easily use per-peer keys. > > > It is unwise to share one key with all interchangers. Co-ordinating a > > key rollover with that many different entities on that wire is hard. > > > Using specific keys instead for each of the A-F, A-G, A-B, etc, > > associations limits the geometric growth and security vulnerabilities. > > The clean solution would be to use a bunch of point-to-point interfaces, > either by replacing your switch with direct router-to-router links, or by
Would be a rather big switch to replace, so, no, not in this model... > putting up a bunch of VLANs or GRE tunnels. Then you can use Babel-HMAC > unmodified. Well, an even cleaner solution for that wire would be to be using one veth per link (or in the case of vms, dockers, snaps, etc, the virtual interface they present), bridged to the wire, which is a common deployment model. A vm is often migrated between machines, and it would just pick up in one place and resume in another. Incidentally, "multiple vms bridged to a wire" was my mental model for setting up a bunch of vms to test interop, simulating various conditions. I have a standard veth model for simulating delay and multiple routers for the wifi work also (using namespaces). Anyway: The "one interface per key" rule adds complexity but I think it also brings benefits by requiring such. In such an environment you'd want to rate limit and observe how much bandwidth is being used for each interconnect anyway. Other stats and abstractions fall out of it. In the case of bridging veths like this, we'd still end up with mcast hellos hitting the wire, but using unicast then for everything else, and I'd judge hmacing and discarding those extra hellos as pretty cheap, although noisy in the log file. About the only issue I see for an interchange like this is that you'd also need one ipv4 address per veth, which are kind of scarce. unless there was a way to do the obscure extended nexthop idea in https://tools.ietf.org/rfc/rfc5549.txt in babel and linux? https://www.oreilly.com/library/view/bgp-in-the/9781491983416/ch04.html goes into it. It makes my brain hurt. > > > A) while we can append quite a few HMACs in a hello, at some point, > > when an interchange's hmacs grows past the size of a packet, we run > > out of space. What happens? Can we resend that hello with even more > > HMAC's attached, and win? > > Sort of. However, if there are any plaintext routers on the same link, > they will parse both packets. Definitely would not allow any plaintext routers on that wire. > I think that Babel should deal fairly well > with packet duplication, but I'm not sure. Yea! More things for me to try blowing up! Has anyone here ever futzed with a fuzzer, btw? This looks good: http://lcamtuf.coredump.cx/afl/ > But at that point, you might as well use DTLS. Heh. I would like hmac to stabilize first. > > > So if the code (in addition to protecting interfaces) could also (or > > instead of interfaces) associate keys to routerids, we scale to this > > scenario. > > I'm not going to do that, unless there are any good reasons why you don't > want to use DTLS in that case. Look forward to trying it. > > > 1) Use BGP instead at large interchanges > > Yep. If your routing tables are relatively stable, BGP is the right choice. There are many, many, reasons to not want to use another routing protocol as complicated and difficult to use and configure as BGP in any scenario smaller than the global scale internet. There's also source specific routing, which I think is still problematic in any BGP protocol? I see ISIS in FRR has got it now. > > > 2) Use DTLS > > Yep. It supports per-peer keying out of the box. K. > > > 3) Use a minimal number for all associations on an interface scaled to > > the max size of hello + ihu + hmacs > > Not so keen on that -- while the protocol does in principle support > multiple HMACs, both the amount of overhead and the amount of computation > go up linearly with the number of HMACs. It's really not designed for that. The HMAC benchmarks were promising yesterday. (compared to DTLS!!!!???? ) I guess my mental model about key rollover was pretty different - where everyone was assuming at most 2 keys, I was assuming potentially many and key rollovers taking weeks. "dang, I really need to ask joe to retire that old key, and when does mary get back from vacation?" The optimization I had in mind was to enthusiastically sign hellos with every active key you have, but only sign unicast with the keys you know are working. > > Of course, you could envision using the unicast variant of the protocol > (the one that rejects all multicast packets except Hellos) and protect > unicast packets with HMAC instead of DTLS. That is what works, theoretically, right now, with the existing codebase. > But at that point, you might > just as well use DTLS. > > Quite frankly -- just use DTLS, or run HMAC over point-to-point links. > > -- Juliusz -- Dave Täht CTO, TekLibre, LLC http://www.teklibre.com Tel: 1-831-205-9740 _______________________________________________ Babel-users mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/babel-users
