Remember that with LISP, the mapping system is somewhat insulated due to
the fact that queries are only accepted from MR, not directly from
anything claiming to be an ITR. And it is normally expected that the
association between mapping system internals and MR/MS is authenticated
(otherwise there are lots of other issues.)
This does not provide complete protection, as there are many situations
where the MR does not have an authentication relationship with the
querying ITR. Having said that, it can be noted that in many cases
there is such a relationship. Such a relationship prevents a random
outside attack.
Even when there is no such relationship, and even if the MR does not
rate limit, an effective DoS attack would have to target multiple MR to
cause significant difficulty.
Also, it seems to me that if all you want to do is break a single MR,
then rate limiting is irrelevant. In the absence of limits on who can
query a specific MR, you can bombard it with more queries than it can
handle and you will take it out of service. So a rate limit helps the
system while harming the MR capability only slightly.
Trying to infer whether an entity is allowed to undertake specific
operations without authentication, using information such as the IP
address, seems fraught with failure. Trying to classify all entities
into types (onotology?) seems unlikely to produce correct results, as
classes are not cleanly defined.
As I said, I look forward to the technical presentation at the IETF
meeting to see if they have any ideas that can help. Yes, there is work
to be done. Putting authorization into the identity seems to be asking
for trouble.
Yours,
Joel
On 10/29/16 11:40 AM, Padma Pillay-Esnault wrote:
Hi Joel
The security section has the following recommendations for overload issues
1. Rate limit the sending of messages to the mapping system.
2.To improve resiliency and reduce the overall number of
messagesexchanged, LISP offers the possibility to leak information, such
as reachabilty of locators, directly into data plane packets
3. Using trustable Map-Servers that strictly respect [RFC6833] and the
lightweight authentication mechanism proposed byLISP-Sec
[I-D.ietf-lisp-sec] reduces the risk of attacks
Here are the potential problems I see with these
1. Rate limiting messages has the same result the DDOS attack was aiming at.
2. Leaking the information may have consequences for the privacy unless
we are using ephemeral EIDs
3. We can trick the system to legitimately make a lot of updates. For
example a large number of IDs distributed that keep on registering that
they have changed locations frequently and an equally large number of
devices trying to access them.
There has been a lot of digital ink about IoT devices being vulnerable
to be compromised and that the sheer number of devices (several
billions) to be the easy target for bonnets. Discussions about use of
rfc2728 or how ISP could handle these attacks. It is a difficult problem
to solve and in the end we are pushing the responsibility to other
entities to do the right thing ...
In section 5 of draft-padma-ideas-problem-statement, there is a section
in the table which specifically discuss about the structure of IDs and
whether we should used them for specific classes or as the Network
Mapping system is proposing to attach metadata to ID.
I am inclined to think if we can give ID some inherent class which can
restrict what these devices can do. Why would a fridge ever try to
access a bank account unless something is seriously wrong? In the case
of IoT, it would have been possible to drop request from a camera or
sensor requesting to map netflix or twitter.
With IP addresses, it is difficult to differentiate who is what.
Structured IDs allocations or metadata in the NMS may be an opportunity
to simplify some of this operational complexity.
Thoughts?
Padma
On Fri, Oct 28, 2016 at 8:15 PM, Joel M. Halpern <[email protected]
<mailto:[email protected]>> wrote:
There are some preliminary thoughts on overload issues in the
security considerations of draft-ietf-lisp-introduction.
I will also be curious to see what the presentations at the
technical plenary in Seoul have to suggest on the issue, if anything.
There probably is more with considering.
Yours,
Joel
On 10/28/16 7:39 PM, Padmadevi Pillay Esnault wrote:
The recent Denial-of-service attacks is a scenario we should
have in mind when building robustness in the network mapping system.
In draft-padma-ideas-problem-statement-00.txt, there is a
section on mapping system security requirements that
specifically cover
this case.
One of the questions that comes to mind is whether the
robustness of such a mapping system should drop/throttle
responses when it is
Overloaded or should we expect it always to handle the load no
matter what?
While we do propose to rate-limit the messages in the problem
statement, isn't this playing into the hands of the attackers?
Requesting feedback from the list and ccing wg with expertise in
the area or interest in mapping system technology.
Thanks in advance
Padma
Below an excerpt from the draft
6.4. Mapping System Security
The secure mapping system must have the following requirements:
1. The components of the mapping system need to be robust
against
direct and indirect attacks. If any component is
attacked, the
rest of the system should act with integrity and scale
and only
the information associated with the compromised component
is made
unavailable.
2. The addition and removal of components of the mapping
system must
be performed in a secure matter so as to not violate the
integrity and operation of the system and service it
provides.
3. The information returned by components of the mapping system
needs to be authenticated as to detect spoofing from
masqueraders.
4. Information registered (by publishers) to the mapping
system must
be authenticated so the registering entity or the
information is
not spoofed.
5. The mapping system must allow request access (for
subscribers) to
be open and public. However, it is optional to provide
confidentiality and authentication of the requesters and the
information they are requesting.
6. Any information provided by components of the mapping
system must
be cryptographically signed by the provider and verified
by the
consumer.
7. Message rate-limiting and other heuristics must be part
of the
foundational support of the mapping system to protect the
system
from invalid overloaded conditions.
8. The mapping system should support some form of provisioned
policy. Either internal to the system or via mechanisms for
users of the system to describe policy rules. Access control
should not use traditional granular-based access lists
since they
do not scale and are hard to manage. By the use of token- or
key- based authentication methods as well as deploying
multiple
instances of the mapping system will allow acceptable policy
profiles. Machine learning techniques could automate these
mechanisms.
-----Original Message-----
From: IETF-Announce [mailto:[email protected]
<mailto:[email protected]>] On Behalf Of IETF Chair
Sent: Friday, October 28, 2016 9:21 AM
To: IETF Announcement List
Cc: [email protected] <mailto:[email protected]>
Subject: Technical plenary: Attacks against the architecture
The technical plenary in Seoul will be about the recent
Denial-of-Service
attacks involving the use of compromised or misconfigured nodes or
“things”, and the architectural issues associated with the network
being vulnerable to these attacks.
See
https://www.ietf.org/blog/2016/10/attack-against-the-architecture/
<https://www.ietf.org/blog/2016/10/attack-against-the-architecture/>
and join us for the discussion on Wednesday 16:40-19:10,
November 16,
2016 either in person or remotely. You can register for the
meeting here:
https://www.ietf.org/meeting/97/index.html
<https://www.ietf.org/meeting/97/index.html>
Jari Arkko, IETF Chair
_______________________________________________
lisp mailing list
[email protected] <mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/lisp
<https://www.ietf.org/mailman/listinfo/lisp>
_______________________________________________
Ideas mailing list
[email protected] <mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/ideas
<https://www.ietf.org/mailman/listinfo/ideas>
_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp