Hello Paul,

Thanks for your review: it is always nice to see another point of view on your 
work.

Let me repeat the top part of my reply to Roman's DISCUSS (in case you have not 
read it) as it provides more context and explanations about what is meant by 
'probe' in this case.

Then, please in-line some answers for your own points prefixed by EV>

---- start of copy -----
My understanding of your DISCUSS ballot is that this I-D is worse than the cure.

If the above statement is correct, then there is probably a disconnect between 
your view and the actual purpose of this I-D, which is more like "if you bumped 
into another car on a parking lot, then please leave a message on the damaged 
car windshield with your contact information". I.e., propose a reasonably 
sensible way to contact the researcher(s) sending those probes.

Those probe research are not common; I know about 5 teams doing (and counting 
me twice) such probing over the public Internet over a period of 10 years... 
And a vast majority of them (if not all) have applied similar mechanisms, so 
let's document them in an *informational* document that starts with "This 
document suggests some simple techniques".

More background: I was contacted only *once* in those 2 measurement campaigns 
of mine, and it proved really useful as it allowed a forensic analyst to 
contact me in a matter of hours (more information in a private / confidential 
discussion if you want). This was really critical and valuable in that case, 
therefore the suggestions in this I-D, while not perfect, are rather useful.

We could provide more context of course based on the above if it helps the IETF 
community.

---- end of copy ----

Regards

-éric (with -justin)

On 04/07/2023, 21:11, "Paul Wouters via Datatracker" <[email protected] 
<mailto:[email protected]>> wrote:


Paul Wouters has entered the following ballot position for
draft-ietf-opsec-probe-attribution-07: Discuss


When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)




Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
<https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/> 
for more information about how to handle DISCUSS and COMMENT positions.




The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/ 
<https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/>






----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------


I have a few issues I would like to further discuss.


This document suggests the best method for getting probe information is to use
the content of the PTR record to fire of a web request. Unfortunately, anyone
who controls their own in-addr.arpa zone can but whatever they want in their
PTR record. Eg I could probe using 193.110.157.66 and give it the PTR of
victim.com. Then I start scanning the internet, causing lots of queries to
victim.com. This can be abused as both an amplification factor and as a method
to hide my IP from victim.com's webserver. If you have the resources to run a
large scale probe from your own IP address, you can run a webserver on that IP
address (and/or portforward/NAT it your favourite CDN). I suggest removing the
suggestion of looking up the PTR record and explicitly state to MUST NOT use
the PTR record for anything but logging purposes.

EV> FYI, there is no expectation in the I-D that probed 'targets' will 
automatically reach to the reverse DNS server and the associated web page. The 
intent (and the use of it in real cases) is that a forensic security analyst 
looks at the packet trace dump manually, apply their common sense, then use the 
contact information if required. I.e., the amplification is vastly reduced to 
nearly zero as nothing is automated. The measurement campaign using probing are 
not relying on this I-D to get a reply.
EV> Moreover, in the case of out-of-band attribution relying on the source 
address, there is nothing in the probes themselves, i.e., even without this 
I-D, the probed targets (or even a real DoS attack) could also do reverse DNS 
and/or visiting the home page.

Section 4 is missing guidance on HTTP based probes, which can (SHOULD?) use
HTTP headers to share their information. I also feel the rest of Section 4
might not work well in practice. Inlining the probe data is usually not
possible if probing for specific TCP or UDP based protocols - and surely not
"must start at the first octet". But even if it is, and for ICMP/ICMPv6 and
HTTP based probes as well, it would reveal who is sending the probe. That could
influence the results. Eg one might want to block any probes from commercial
entities that don't reimburse, competitors, unfriendly nation states, etc. So
in practice, I doubt this is a feasible suggestion. Not even with "If the Probe
Description URI cannot be placed at the beginning of the payload, then it must
be preceded by an octet of 0x00". And lastly:

EV> About HTTP, we tried in the I-D to specify the use case to layer-3 
measurements. I.e., similar technique could be used for HTTP probing indeed 
(e.g., by using a HTTP header), but this is out of scope for this I-D.


Note: using a magic string (i.e., a unique special opaque marker) to
signal the presence of the Probe Description URI is not recommended as
some transit nodes could apply a different processing for packets
containing this magic string.


But the probe URI is already a "magic string".

EV> I would not consider the occurrence of 'https://' in a packet as a magic 
string (too many false positives), but you are correct: it makes them a little 
more recognizable and could influence the measurement

It is expected that only researchers with good intentions will use these
techniques


No. Attackers will also use it to appear as good researchers, even point
specifically at those researchers to try and blend in. This is the exact same
problem as security.txt. It is just never really trustable. The only thing that
can be trusted is the IP address, combined with WHOIS information (and
specifically not in-addr.arpa zone content)

EV> I am afraid that our I-D is not clear enough about what the 'probing' is, 
hence a similar disconnect as with Roman. Probing is usually done in one 
packet, so hard time for an attacker to hide behind a research (the 'ping of 
death' excluded of course).
EV> Personally, I would not even trust an IP address as long as BCP 38 is not 
enforced everywhere ;-)

If a recipient cannot confirm the information or does not wish to do so,
it should treat the flows as if there were no probe attribution.


This would basically cover every single probe case except the
http://probe.ip.address/.well-known/probing.txt 
<http://probe.ip.address/.well-known/probing.txt> case. And even that one could
be questionable since a compromised network used for probing could pretend to
be Honest Achmed Security Research

EV> Sure, but please note that this is the opposite of the E-bit, i.e., it 
allows attribution to ethical researchers, these techniques are not a 
'blessing' that the traffic is trusted. 

As the Probe Description URI is transmitted in the clear and as the Probe
Description File is publicly readable, Personally Identifiable
Information (PII) should not be used for email address and phone number;
a generic / group email address and phone number should be preferred.


Why does this matter? The published probing.txt contains the information
already, so it should be considered publicly leaked already. (Ironically,
scanners will indeed go looking for /.well-known/probing.txt and use the
contact info for fishing attacks etc.)

EV> Correct, it is more or less trivial to scan for probing.txt and collect the 
information.
EV> But, you can do this as well by scanning the home page of many sites to 
fetch for the 'contact' information (like our own https://www.ietf.org/contact/)

The Security Considerations also does not contain a warning that the Probe URI
might in fact be a honeypot / malicious target, trying to cause any browser
visiting it to be compromised. Or be otherwise malicious (eg hooked to
/dev/random)

EV> We could add a 'caution' in the I-D about the probing.txt could contain bad 
things and should not be trusted. Would it address your concerns ?


As I said about security.txt, I think probing.txt is also a bad idea. Let's
have a discussion on this. If I am in the minority, I will not block the
document from publication but will abstain.

EV> On a semi-serious note, I would love to have an ABSTAIN to have all the 
colors on the ballot ;-)
EV> More seriously, similar techniques have been used and are still used. Let's 
document them: better than nothing. I appreciate your concerns, but in the 
absence of another feasible solution, ABSTAIN sounds more logical to mark your 
opposition. Up to you obviously



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


The "one line description without a line break" seems to have its own line
break in the document. Using a .txt format suggests "human readable" which also
kind of implies 80 character width :P (similar to the security.txt discussion
not wanting to use json but kinda not wanting free flow text either)

EV> Oups, we forgot to use the \ notation of RFC 8792. Good catch, thanks
EV> a side effect of using .MD as the main file...







_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to