Hi Demian,
On Jan 23, 2014, at 1:46 PM, Demian Rosenkranz <[email protected]>
wrote:
> Hi,
>
> I'm thinking about another potential DoS attack. An entity which owns a CA
> certificate has the possibility to generate a huge hierarchy of further CA
> certificates without any limitation (as far as I know).
>
As far as I remember there are no formal restrictions regarding either the
number of child CA certificates issued by a CA, or the length of the chain.
> In contrast to the generation of a huge amount of ROAs, this attack isn't
> limited regarding the number of objects/certificates.
>
> I.e. a compromised/bad entity owns a /16 prefix and generates 10000 CA
> certificates and hand down this prefix until the lowest CA certificate and
> generates 2^8 ROAs, a relying party software would be forced to check this
> hierarchy 2^8 times.
Some say that the same resource 'should' not appear on multiple child CA
certificates, however in practice this can happen in case of a child key roll,
and a make-before-break resource transfer. There is no notification about the
reason, so RPs have a hard time guessing. In short: our RP doesn't care about
resources appearing on multiple child CA certs. If the certificates are valid,
the duplicate resource is valid for both branches.. if the parent disagrees,
they should revoke / re-issue as needed.
That said, if one wants avoid duplicating resources in an attack like this
there is always IPv6.. And then it's of course possible that it wasn't intended
as an attack at all, but some over zealous CA goes granular way beyond present
day BGP --- eg. giving ghostbusters to all their v6 end users ;)
> Of course, this is kind of a blunt attack but without making any provisions,
> this "local cache flooding" could lead to a disturbance of all (worst case)
> local caches for a certain time. Some smaller RP could be slower in remedying
> this.
While I don't think we have formal restrictions, I can imagine certain
mitigations if this would become a serious threat:
= Parent of the offending CA could revoke the certificate (if abuse is defined
in terms of use, talking doesn't help, etc.., reactive by nature though)
= RPs could limit the maximum length of the cert chain, or even number of CA
certs issued by CA certs they are willing to accept
- e.g. pro-actively quarantine 'spam-CAs' like this, and allow the
end-user to override
- or re-actively.. proceed, but warn and allow user to disregard
- or a mix of both of course with some thresholds, prob. allowing the
RIRs to issue a bit more
= RPs should probably employ strategies to ensure that a lot of work in one
part of the tree does not block validation of the remaining tree (if resources
don't overlap).
> Are there any restriction to this attack I've missed? Any feedback is very
> welcome!
I would say that been though it's entirely possible to attack the rpki by
producing many objects, it's not feasible to do this *covertly*. This will get
get you noticed, quickly.
So while I see the value of thinking about these scenarios and possible ways to
mitigate them - thank you :) - I am not convinced that we should go overboard
in terms of best practices for RPs, or general restrictions for CAs, at this
time. I would consider possible *covert* attack vectors on the rpki
infrastructure to be much more serious though.
Cheers
Tim
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr