[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006



I dont accept the threats in 4218 so that is a problem right there but I will do that but that is more than just a quick response on email and need to go do proper analysis.  I will respond to where we disagree too later ok.  As I said email is not good for me now I keep changing my location :--).

thx
/jim 

> -----Original Message-----
> From: marcelo bagnulo braun [mailto:marcelo@it.uc3m.es] 
> Sent: Wednesday, July 19, 2006 3:27 PM
> To: Bound, Jim
> Cc: Francis Dupont; shim6@psg.com; Pekka Savola; Iljitsch van Beijnum
> Subject: Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006 
> 
> 
> El 19/07/2006, a las 20:10, Bound, Jim escribió:
> 
> > Global PKI is not required for certificates that can be done with 
> > pre-shared keys too or as we are doing with shim6 out-of-band 
> > signaling.  If any here believe IPsec will not be used end-to-end 
> > think again please it will.  Ipsec is totally possible and 
> I will not 
> > repeat my mail on enclaves for end-to-end PKI as that is a 
> deployment 
> > and systems integration implementation issue.
> >
> 
> ok at this point it seems to me that we may start to 
> repeating ourselves, so at least let's try to identify where 
> do we disagree...
> 
> What i am saying is that:
> 
> - In order to use IPSec to protect the shim6 protocol (in 
> particular for providing a secure binding between identifier 
> and locators), there are two options: a) we use certificates 
> issued by a global PKI are needed in all shim6 peers or b) we 
> have preshared keys in all shim6 nodes
> 
> do you disagree with this statement?
> 
> I assume you do
> 
> if you disagree could you explain to me how would you protect 
> the shim6 protocol from the threats described in RFC4218?
> 
> in particular could you explain to me how would you protect 
> from the following attack:
> 
> Suppose that Alice and Bob work in the same office and that 
> Alice reads the local newspaper web page every morning at 
> www.localpress.com Now, suppose that tomorrow is Alice 
> birthday and since Bob has a crush on Alice, Bob wants to 
> make Alice believe that tomorrow local newspaper headline is 
> "Happy Birthday Alice".
> 
> In order to do that, Bob's plan is to hijack any future 
> communication that Alice initiates from her machine to Bob's 
> laptop, so Bob can substitute the local newspaper web page by 
> his own fake happy birthday greetings home page.
> 
> So, in the DNS www.localpress.com has a single IP address IPlp.
> 
> To launch the attack, the night before, Bob creates a shim6 
> state in alice machine. In order to do that, Bob initiates 
> the shim6 context establishment exchange.
> 
> The created context, has IPlp as ULID and it has IPB (i.e. 
> Bob's laptop
> IP) as preferred locator.
> 
> In order to keep the context alive, Bob sends periodic packets (e.g. 
> ping or UDP) to Alice machine. Note that the goal of these 
> packets is just to prevent the shim6 state at Alice machine 
> to be garbage collected, so there is no need to have a actual 
> application receiving those packets above the shim (i.e. 
> these packets can be perfectly discarded once they passed 
> above the shim, and they would still be fulfilling their goal 
> from the attack p.o.v.)
> 
> The next morning (Alice birthday!!!) Alice arrives to the 
> office and she tries to connect to the local newspaper as 
> everyday. The only difference is that today, there is a shim6 
> state in Alice machine for IPlp.
> Alice browser asks the resolver for www.localpress.com. the 
> resolver returns IPlp. The browser initiates a TCP connection 
> with IPlp, but the SYN packet is intercepted by the shim 
> layer (at Alice's machine) and the address is translated to 
> IPB. the result, the communication is redirected to Bob's 
> machine and Alice will be accessing Bob's web server while 
> she thinks that she is reaching the local newspaper web page
> 
> Bob has managed to steal the local newspaper IP identity from 
> Alice p.o.v.
> 
> This type of attack cannot be prevented by simply using 
> IPSec, because it is launched before the keys have been exchanged.
> 
> In order to prevent these attacks, we need additional tools, 
> like global certificates, pre shared keys or crypto identities.
> 
> reagrds, marcelo
> 
> 
> 
> 
> 
> > thanks
> > /jim
> >
> >> -----Original Message-----
> >> From: marcelo bagnulo braun [mailto:marcelo@it.uc3m.es]
> >> Sent: Wednesday, July 19, 2006 11:32 AM
> >> To: Bound, Jim
> >> Cc: Francis Dupont; shim6@psg.com; Pekka Savola; Iljitsch 
> van Beijnum
> >> Subject: Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006
> >>
> >>
> >> El 19/07/2006, a las 16:55, Bound, Jim escribió:
> >>
> >>> I was assuming the node regardless will use IPsec as
> >> required.  Thus
> >>> it really is not shime6 concern.  But I do not believe no
> >> one will not
> >>> deploy IPsec because of PKI that is simply not true.
> >>
> >> i agree with this
> >>
> >>
> >> but the problem is that if you want to use IPSEc to secure 
> the shim, 
> >> you need to use certificates, if not the security is not 
> acceptable.
> >>
> >> You need to provide a secure binding between the identifer and the 
> >> locators. IPSec wihtout certificates does not provides 
> this feature. 
> >> If you want to use IPSec to secure the
> >> shim6 protocol, you need the certificates hence you need 
> the global 
> >> PKI.
> >>
> >> So in order to evaluate a solution based on IPSec for securing the 
> >> shim6, you need to consider the fact that a global PKI is required 
> >> for this.
> >>
> >> Hence, the alternative solution for securing the shim at 
> this point 
> >> would be IPSec+PKI, agree?
> >>
> >> regards, marcelo
> >>
> >>
> >>
> >>>   IPsec is deployed today with PKI.
> >>>
> >>
> >>
> >>> /jim
> >>>
> >>>> -----Original Message-----
> >>>> From: marcelo bagnulo braun [mailto:marcelo@it.uc3m.es]
> >>>> Sent: Wednesday, July 19, 2006 8:04 AM
> >>>> To: Francis Dupont
> >>>> Cc: shim6@psg.com; Bound, Jim; Pekka Savola; Iljitsch van Beijnum
> >>>> Subject: Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006
> >>>>
> >>>>
> >>>> El 19/07/2006, a las 14:38, Francis Dupont escribió:
> >>>>
> >>>>> I can't see where Jim proposed to base the Shim6 security
> >>>> on IPsec...
> >>>>
> >>>> in message http://ops.ietf.org/lists/shim6/msg01511.html
> >>>>
> >>>> it is stated that:
> >>>>
> >>>> Suggestion is to simply embed ULIDs within the data
> >> payload with new
> >>>> option and secure all communications at least for now 
> for IP layer 
> >>>> communcatiions with IPsec encryption based on locator pair.
> >>>>
> >>>> meaning to use IPSec as an alternative to HBA security
> >>>>
> >>>>> (something which is known to require the impossible and 
> even not 
> >>>>> desirable global PKI :-)
> >>>>>
> >>>>
> >>>> exactly
> >>>>
> >>>> Regards, marcelo
> >>>>
> >>>>
> >>>>> Regards
> >>>>>
> >>>>> Francis.Dupont@point6.net
> >>>>>
> >>>>
> >>>>
> >>>
> >>
> >>
> >
> 
>