Hi Joel,
 
[clipped]

> It seems 
> to me that 
> if an attacker is present on enough links for this to be a 
> problem, then 
> one has a lot more issues than just the preservation of 
> adjacencies.  In 
> fact, using this attack calls immediate attention to the 
> presence of the 
> attacker.  (It is not like a remote DoS or DDoS where the attack can 
> continue once the victim is aware.  network operators will be able to 
> track this VERY fast.)

Yup, I agree. However, it is a cheap solution to a vulnerability that exists 
and which has been mentioned in multiple documents.

This attack vector also appears to be in scope as per 
draft-ietf-karp-threats-reqs-01.txt (sec 2.1).

Additionally you could also look at the section 3 of the above document which 
says the following:

20.  In most routing protocols (OSPF, ISIS, BFD, RIP, etc), all
     speakers share the same key on a broadcast segment.  Possession
     of the key itself is used for identity validation and no other
     identity check is used.  This opens a window for an attack where
     the sender can masquerade as some other neighbor.  Routing
     protocols SHOULD thus use some other information besides the key
     to validate a neighbor.  One could look at
     [I-D.ietf-opsec-routing-protocols-crypto-issues] for details on
     such attacks.

21.  Routing protocols that rely on the IP header (or information
     beyond the routing protocol payload) to identify the neighbor
     which originated the packet must either protect the IP header or
     provide some other means to identify the neighbor.
     [I-D.ietf-opsec-routing-protocols-crypto-issues] describes some
     attacks that are based on this.

This solution attempts to fix the above mentioned issues. If we think that such 
attacks are NOT in scope of KARP then we need to remove them from the document 
lest folks spend time working on them.

> 
> Second, how would this be deployed?  It requests a 

This is an easy part and can be trivially taken care of once we decide that its 
indeed a problem that we need work on.

> modification in the 
> sender and receiver behavior for authentication.  Is your assumption 
> that this would be handled like a key change?  First you 
> upgrade every 
> router on the LAN to be able to receive this, then you turn 
> on sending 
> it on the LAN?  It seems to me that in terms of diagnosing 
> communication 
> failures one needs to be able to tell from packet traces 
> which behavior 
> is actually being used.

We could define a new authentication type, say 3, which would indicate that the 
new mechanism (i.e. where Apad is not a constant but derived from source IP of 
the packet) is being used.

> 
> The third question is actually the most important.  Given 
> that operators 
> would ahve to choose to enable this new behavior, is there any 
> indication that they would do so?  I have heard reports that some 
> operators have started turning off IGP authentication, or 
> using it only 
> as a stronger packet checksum.  In either case, this does not 
> add value 
> for those operators.

While I agree that some operators use authentication only for stronger checksum 
there are some that care for security. I also agree that its not very simple to 
launch these attacks, however, the idea behind this draft was as I had 
explained earlier - it fixes a potential issue at zero (implementation, 
computational and operational) cost that exists. My assumption was that if we 
are repeatedly citing a vulnerability then there is a willingness to fix it 
(see above).

Cheers, Manav

_______________________________________________
OSPF mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to