Re: Security Assessment of the Transmission Control Protocol (TCP)

2009-02-21 Thread Fernando Gont
2009/2/14 Lars Eggert lars.egg...@nokia.com


> during the discussions around the TCP implementation deficiencies
> publicized by the Outpost24 last fall, we discussed with CERT-FI and others
> in that community that the IETF would offer to be the venue for publishing
> such a document.
>

It has always been in our mind to bring the results of our project
("Security Assessment of the Transmission Control Protocol (TCP)" to the
IETF.

We have already done this for another document ("Security Assessment of the
Internet Protocol") that was part of the same project. In July 2008, the UK
CPNI  released that document, and the next week after the release we publish
an IETF I-D version of the same document.

We have done the same thing with this new TCP document. I have already
submitted an IETF I-D version of the document, in the hope that the IETF
will work on this stuff. The document is entitled "Security Assessment of
the Transmission Control Protocol (TCP)", and the filename is
draft-gont-tcp-security-00.txt.




> The goal would be to document techniques that stack vendors are employing
> to harden their stacks.
>

This is sort of what we have done. However, not only have we documented
techniques that stack vendors have implemented to harden their stack, but
have also performed an assessment of the IETF specs themselves, and have
also proposed mitigation techniques for known issues (on which there had
never been advise on how to deal with them). We had a preliminar version of
our paper sometime in 2006, but then it went through a throrough review
process. That's why it ended up being published this
month.




> They asked us to wait until vendors had a chance to deploy patches to the
> latest round of vulnerabilities, and we haven't heard back from them since
> late last year. (Which reminds me to shoot them an email.)
>

I have been in the loop (for some time, at least), and have also been in
very close contact with a number of vendors. For instance, an excerpt of our
large TCP document (that discussed the specific issues that had been
publicized by Outpost24) was made available to vendors in the hope of
providing vendors with advice on how to deal with those issues.
I don't really know how the "patching" work is going on... but at least a
few months ago, I would say that many (most?) vendors were not really
working in patches. And to some extent it might make sense, as some of the
issues have more to do with having the applications controlling the amount
of resources that they are using, than with TCP trying to limit the amount
of resources per app at the TCP level.




> I believe such a document would be fully in scope for TCPM,
>

I believe both tcpm and opsec could be possible candidates for this
document.




> but obviously the involvement of the stack vendors is critical to ensure
> this is a document that has practical relevance.
>

To the extent that was possible, vendors *have* been involved in the review
process of our TCP security document. However, at times it gets hard to get
vendors involved in the IETF process. For the most part, they feel they are
not heard, and that participating in the IETF has a low ROI (Return Of
Investment).

We have had some experience in this arena with the document "ICMP attacks
against TCP" that we are still pursuing within tcpm. I was able to get
involved from the following "vendors":

* NetBSD
* OpenBSD
* FreeBSD
* Linux
* Cisco
* Sun
* HP
* ExtremeNetworks (IIRC)
* ... and others

but we nitpicked on the document for ages. Virtually everybody in the vendor
community couldn't believe that we were having such discussions about that
stuff. So at some point most people argued that "they had already voiced
their opinion, but they felt that it didn't made a difference". After all,
they had already implemented the stuff discussed in the document (and so had
others), so they really didn't have much of a reason to get involved in the
process.

I'd be glad to discuss a plan to pursue this work within the IETF.

Thanks!

Kind regards,
--
Fernando Gont
e-mail: fernando at gont.com.ar || fgont at acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Security Assessment of the Transmission Control Protocol (TCP)

2009-02-21 Thread Fernando Gont
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hello, folks,

I have just seen that there has been a thread about this document in
this list, so here's a related "announcement":

Last week the UK CPNI (United Kingdom's Centre for the Protection of
National Infrastructure) released the document "Security Assessment of
the Transmission Control Protocol (TCP)". The document analyzes the
relevant specifications from a security point of view, and also analyzes
  the implications of some implementation strategies taken by popular
TCP implementations. This document is available at:
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf

As part of the same project, we have produced an IETF I-D version of the
UK CPNI document, in the hope that the IETF works on this stuff and
hopefully publishes some version of the aforementioned document. The
resulting IETF I-D is entitled "Security Assessment of the Transmission
Control Protocol (TCP)" (draft-gont-tcp-security-00.txt) and is
available at: http://tools.ietf.org/id/draft-gont-tcp-security-00.txt

Any comments will be more than welcome.

Thanks!

Kind regards,
- --
Fernando Gont
e-mail: ferna...@gont.com.ar || fg...@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1





-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBCAAGBQJJoJJ8AAoJEJbuqe/Qdv/xQ1gH/RYY8imAcxLInFgMoVAR0OLR
UuTtYXxclpieRWNjEkJTpyiAA/q8czubkuP4kupp11CiL6nQxYZwV2mexG2/lQ91
Y1TWh9H1ofroWyU9ZMrYcz1PPOSeAY929Sn3U2yHKrm4QSVhH1NSBAVodTu2zKV6
jvhzny+IDtCrTIeRDZBZYKrFgkxA74vvzasXgj/A8JiPjbhN4zGABWxpsWV+d9Ti
ceZBz8Ny+Mld/AQpag51OqFAVg4Xtzb9omDbxyc43B/YFzT+bTKMSLr3u68tH2xR
xBFYJ50AZxuiayHxDZVHCAf4XrTFyCiD+iXpzlVWiSGcXBcLd6pziYBWdHVEbUo=
=ftHE
-END PGP SIGNATURE-
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Comments requested on recent appeal to the IESG

2009-02-21 Thread Douglas Otis


On Feb 19, 2009, at 6:04 PM, Dave CROCKER wrote:


The IESG wrote:
The IESG has received an appeal regarding the previously approved  
draft-kucherawy-sender-auth-header-20.  The appeal text can be  
found here:

  http://www.ietf.org/IESG/APPEALS/appeal-otis-2009-02-16.txt


This note offers comments on the appeal, draft-otis-auth-header- 
appeal-00, which has been lodged against standardization of draft- 
kucherawy-sender-auth-header-20.


This appeal lacks merit on basic points.

As a technical criticism, the appeal is confused and lacks  
substance.  The conclusions appear to be based on fundamentally mis- 
reading of basic technical details of the specification.  At best,  
the appeal makes the mistake of wanting to kill the messenger,  
rather than  the message's author. That is, the appeal's authors  
appear to have concerns with certain types of report content, rather  
than with the mechanism of doing reporting.  Yet auth-res is merely  
the mechanism, a common conduit for reporting a class of related  
information.


Dave,

Section 4.1 of this draft places the onus of checking associated  
reputations of "authenticated origin identifiers" on the MUA prior to  
revealing the content of the Authentication-Results header, but then  
fails to offer the necessary information for satisfying this  
requirement.  Unfortunately, this draft's many confusing references to  
authorization mechanisms as authentication still does not offer, with  
any reasonable certainty, that an authorizing domain originated a  
message.  The only weakly "authenticated origin identity" for either  
SPF or Sender-ID is the IP address of the SMTP client being authorized  
by an SPF record.  When the SPF-SMTP-client authorization schemes were  
introduced, a client's failure to be authorized was to provide a basis  
for not accepting the message.


Indeed, the appeal is dominated by criticisms of SPF and Sender-ID.  
The appeal's authors should express their concerns with those  
communities of interest, rather than with a mechanism that merely  
carries information that is generated by other mechanisms.


The appeal attempts to clarify that *authorization* does not represent  
*authentication*.   An authenticated SMTP client does not imply that  
it is authorized to issue a domain's message, neither does an  
authorized SMTP client imply that a domain offering authorization has  
therefore originated the message.   It is the origin of the message  
and its role in protecting originating identifiers that is being  
trusted.  The reputation of the "authenticated origin identity"  
ensuring this protection is what MUAs should depend upon.  Look-alike  
attacks should not be accepted by border MTAs, but can still be  
thwarted proactively by the MUA with folder placement.


As a statement of preference, the appeal lacks support.  Contrary to  
the appeal authors' perspective, the bulk of the email reporting  
operations community find this mechanism helpful, in its current  
form.  Whatever possible downsides the appeal's authors envision, it  
has not yet come to pass, over a long period of use.


A desire to exclude the IP address of the SMTP client is likely aimed  
at avoiding repercussions that occur when issuing abusive messages.   
Rather than the reputation of a provider's ability to protect the use  
of a domain, the domain instead is expected to accrue the negative  
reputations.  Unfairly assigning negative reputations to a domain not  
originating abusive messages can be disruptive and may invite  
litigations.



Detailed comments follow:

For such use, it is crucial to include within an "authenticated- 
results"  header, a truly authenticated identity.


Auth-res is specified as operating within a trust domain.  It  
explicitly asserts the need for trusting the source of the report  
and the path from the report generator to the report consumer.  As  
such, there is no obvious basis for claiming that further  
authentication of the report is needed.


Section 4.1 correctly provides a basis for needing the "authenticated  
origin identifier".  *Authorization* is not *authentication*.


The draft acknowledges that it confuses authorization with  
authentication in section 1.5.2.


No it does not. There is no language in 1.5.2 that describes or  
acknowledges any confusion.  The only relevant text in that section  
is "this proposal groups them both into a single header field".


Please review section 1.5.2 and then the many places where  
*authorization* is then referred to as *authentication*.  The draft  
places all results into a header labeled "Authentication-Results"  
where the only identifier offered is that of the authorizing domain,  
and not that of the authenticated IP address of the SMTP client for  
Sender-ID or SPF.


Consequently it appears that the real confusion is with the authors  
of the appeal, who confuse an explicit decision to allow two types  
of information to cohabit, with inability to dist

Re: Comments requested on recent appeal to the IESG

2009-02-21 Thread Stephen Kent

At 7:06 PM -0800 2/20/09, Dave CROCKER wrote:

Stephen Kent wrote:

At 9:00 PM -0800 2/19/09, Hallam-Baker, Phillip wrote:

Just as a matter of observation, ...

...

   I have not read the doc in
question,...



Hey guys.  As someone who is frequently faced with trying to parse 
out what are and are not the commonly held views among the security 
community, I'm actually interested in this type of exchange.


But as you both note, this exchange isn't critical to resolution of 
the the appeal.


For those of who want to see this appeal dispatched as quickly and 
as painlessly as possible, is there a chance that you can continue 
the exchange under a different guise, at a minimum under an entirely 
independent thread?


d/


Dave,

My belief is that IF the doc conflates authentication and 
authorization, then some intelligent editing probably can fix that 
problem quickly.  Since, as you and other have noted, the WG is n 
board with this doc, the issue Phil raised, and to which I responded, 
ought not affect approval of the document.


Steve
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


unsubscribe me from the ie mailing list

2009-02-21 Thread upendra bhanja
e mailin



  Add more friends to your messenger and enjoy! Go to 
http://messenger.yahoo.com/invite/___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Comments requested on recent appeal to the IESG

2009-02-21 Thread SM

At 10:57 20-02-2009, Murray S. Kucherawy wrote:

All of the issues Mr. Otis raises have been given substantially more than a
normal amount of consideration, yet they have failed to attract any detectable
consensus.  Disagreement with both his concerns and his proposed remedies is
ample and well-documented.


As a participant to the discussions that lead to 
draft-kucherawy-sender-auth-header-20, I can confirm that the issues 
raised by Mr Otis were discussed on the mailing list - see


http://mipassoc.org/pipermail/mail-vet-discuss/2008q4/000390.html
http://mipassoc.org/pipermail/mail-vet-discuss/2008q4/000398.html
http://mipassoc.org/pipermail/mail-vet-discuss/2008q4/000409.html
http://mipassoc.org/pipermail/mail-vet-discuss/2008q4/000504.html
http://mipassoc.org/pipermail/mail-vet-discuss/2008q4/000507.html
http://mipassoc.org/pipermail/mail-vet-discuss/2009q1/000549.html
http://mipassoc.org/pipermail/mail-vet-discuss/2009q1/000550.html
http://mipassoc.org/pipermail/mail-vet-discuss/2009q1/000552.html
http://mipassoc.org/pipermail/mail-vet-discuss/2009q1/000558.html

During the IESG evaluation, a secdir review of 
draft-otis-auth-sender-sec-issues-00, which raises alleged security 
issues was requested.


The appeal mentions that:

  'In the case of Sender-ID or SPF, the deceptive nature of this header
   could have been remedied by including the "authenticated" IP address
   of the SMTP client, in addition to the authorizing domain.'

That is at odds with the second paragraph of the appeal where the 
authors of the appeal point to the downside in the era of carrier 
grade  NATs, virtual servers, aggregated services, and other 
techniques that overload the IP address.


The appeal states that the its goal is to ensure adequate information 
is available when annotating email.  The last paragraph mentions that 
an MTA adding this header field SHOULD NOT include any data which has 
not  been authenticated by the method(s) being applied.  It then 
proposes an exception for an Authorizing domain only when it 
accompanies the authenticated IP address of the SMTP client.


Assigning a negative rating to an affected SMTP client IP addresses 
mitigates the security breach problem while completely blocking all 
messages from the domain and other domains hosted in a virtual server 
environment.  Furthermore, basing MUA annotations on the rating of an 
IP address is questionable as messages are not always retrieved 
immediately after delivery.


The appeal gets into a discussion about IPv6, SPF macros, and 
local-parts.  draft-kucherawy-sender-auth-header-20 defines a header 
to capture email verification results.  It is not about the internals of SPF.


There is a recommended modification that the "pvalue" reported along 
with results for these mechanisms SHOULD NOT include the local-part.


Quoting the draft under appeal, the value:

  For Sender ID: value of header field used by PRA after removing comments
and parts not authenticated

  For SPF: envelope sender after removing parts not authenticated

That cannot be interpreted as the local-part should be included.

As for the confusion about authorization with authentication in 
section 1.5.2 of draft-kucherawy-sender-auth-header-20, there is a 
reference to BCP 72 and it quotes Section 4.4 which describes 
authorization and authentication.  Authentication simply identifies a 
party, authorization defines whether they can perform a certain 
action.  Authorization necessarily relies on authentication, but 
authentication alone does not imply authorization.


draft-kucherawy-sender-auth-header-20 describes SPF and Sender ID as 
authorization mechanisms in that they express a result that shows 
whether or not the ADMD that apparently sent the message has 
explicitly authorized the connecting SMTP client to relay messages on 
its behalf but do not actually validate any property of the message 
itself.  The author of the draft mentions that rather than create a 
separate header field for each class of solution, this proposal 
groups them both into a single header field.


Regards,
-sm 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf