Hi Valery / Paul

Paul - does your implementation send the INFORMATIONAL + other messages
(Private Use Error) to a single SA_INIT? Just to clarify the issue
observed seemed to be SA_INIT is sent by Initiator, Responder sends an
SA_INIT reply plus numerous INFORMATIONAL messages separately to this
single SA_INIT message containing Private Use Errors.

GB> I’ve made some comments inline for clarity.

cheers

On 20/03/2016 06:43, "Valery Smyslov" <sva...@gmail.com> wrote:

>Hi Graham,
>
>thank you for the updated text.
>
>> I¹ve made some amendments to the proposed text based on Valerys
>>comments.
>>
>> I¹ve also added text around the correct sending of INFORMATIONAL
>>messages
>> due to a Responder receiving an SA_INIT, this is a known problem today
>> with a number of implementations. (seen by Tero and myself).
>
>Sorry, your text is wrong (or at least is not accurate). The responder
>must never reply to an IKE_SA_INIT with INFORMATIONAL message.
>See section 1.5 of RFC 7296:
>
>   In the second and third cases, the message is always sent without
>   cryptographic protection (outside of an IKE SA), and includes either
>   an INVALID_IKE_SPI or an INVALID_MAJOR_VERSION notification (with no
>   notification data).  The message is a response message, and thus it
>   is sent to the IP address and port from whence it came with the same
>   IKE SPIs and the Message ID and Exchange Type are copied from the
>   request.  The Response flag is set to 1, and the version flags are
>   set in the normal fashion.
>
>Note, thet Exchange Type is copied from the request, so if some
>IKE_SA_INIT
>request has unsupported major version the responder will send
>INVALID_MAJOR_VERSION in the IKE_SA_INIT (not INFORMATIONAL) response.

GB> Thanks Valery - this is now clear. However not only was I confused, as
Paul confirms there’s other implementations that are also confused. Seeing
as there’s confusion with regards to this wording and it can lead to an
amplification attack I personally feel we should include the following
text for clarification?

"RFC7296 Section 1.5 describes the generating of informational messages a
Responder will send. Only a single instance of the generated message
should ever be sent for a received request and under no circumstances
should a received request cause the generation of more than a single
message in reply."



 

>
>The only case unprotected INFORMATIONAL message is sent is when
>the host receives AH/ESP packet with unknown SPI. And all these cases
>are covered in Section 1.5 of RFC 7296 in sufficient detail, including
>DoS attacks prevention measures (rate limiting).
>I don't think we should repeat all this in the draft.
>
>> I have also moved text to section 11. Security Consideration.
>>
>> I¹ve added some words around the checking of the IDi/IDr. I¹ve
>>personally
>> seen some issues when misconfigured clients have presented an identical
>> IDi, resulting in INITIAL_CONTACT deleting the Œother¹ clients SA.
>
>Since INITIAL_CONTACT is processed after peer authentication,
>malicious user cannot use it to perform DoS attack
>(unless he/she is able to impersonate legitimate user, but in this case
>he/she can do much worse things). And what about misconfiguration -
>Section 2.4 of RFC 7296 already has all due warnings:
>
>   This notification MUST NOT be sent by an entity that may be
>   replicated (e.g., a roaming user's credentials where the user is
>   allowed to connect to the corporate firewall from two remote systems
>   at the same time).
>
>Again, I don't think we should copy all the requirements concerning
>INITIAL_CONTACT from RFC7296.



GB> For this example I’ve personally seen misconfigured clients, this
isn’t exactly the 'entity being replicated' (or not intentionally). As an
example VPN architecture, the authentication use Digital Signatures, but
send the ID as FQDN. Your laptop is provisioned with ID of
FQDN=valery.example.com, mine should be FQDN=graham.example.com, however
due to an IT engineer provision error I have the same ID as you in my VPN
profile. When I connect, if the VPN gateway does not check the presented
FQDN is in the certificate (where a mismatch would occur), I pass
authentication and INITIAL_CONTACT deletes your session. The strict check
of ensuring that the ID is contained within the certificate will mitigate
the mis-configuration and also malicious intent.

For the malicious example, it’s easy to spoof an ID, but it’s
computationally impossible to spoof a certificate, hence the
ID-Certificate check will mitigate any mis-conftguation or malicious
intention. The behaviour of INITIAL_CONTACT is really being exploited in
this case (IMO).



GB> Hi Paul - this (IMO) is an issue with any authentication mechanism,
not just RFC7619, so if someone is looking to protect RFC7296 against
DDOS, would they read RFC7619? I know it's more apparent in RFC7619, but
there’s still cases (and seem to be common) where it can happen.



>
>> I did think about exhaustion of IP addresses when using configuration
>> payload to allocate clients IPs, if a malicious or misconfigured client
>> could exhaust the pool. But I feel the wording in section 8 covers this.
>> Unless others think otherwise?
>
>Again, allocation of IP addresses takes place after user authentication,
>so it cannot be used as DoS attack by malicious user.

GB> Think of mischievous users or misconfigured, as anyone who CAN pass
authentication. Let me give you this example. I’m granted access to a VPN
gateway for 24 hours, where a security policy is applied so that I only
access read access to a single file. I’m an ‘untrusted’ user, this gateway
also serves ’trusted’ users. I am granted very limited access. I exhaust
the pool of IP addresses so that no other (legitimate) users can connect.
This is similar to DHCP exhaustion on a LAN. We can mitigate against that
(DHCP snooping etc), I feel that we should protect IKE from a similar
attack.

GB> I’m seeing a lot of cases (IoT), where IKE is used, however the
devices aren’t secured and are not really trusted. Examples are; Sensor on
a pole in the middle of no-where, or unsecured in a lift shaft. For the
IoT case although the authentication exchange passes, the client still
isn’t fully trusted, so we should protect the control-plane (IKE) as best
we can.

GB> FWIW - I feel that the text in section 8 does sort of cover this, but
wanted to describe the issue and if others feel the text doesn’t
adequately mitigate the issue of IP address exhaustion I can add some
words.


>> cheers
>
>Regards,
>Valery. 
>

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to