
From fernando.gont.netbook.win@gmail.com  Fri Dec 16 18:38:43 2011
Return-Path: <fernando.gont.netbook.win@gmail.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D4951F0C4D for <opsec@ietfa.amsl.com>; Fri, 16 Dec 2011 18:38:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.511
X-Spam-Level: 
X-Spam-Status: No, score=-2.511 tagged_above=-999 required=5 tests=[AWL=-1.066, BAYES_00=-2.599, FRT_BELOW2=2.154, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WfQIp64uUifW for <opsec@ietfa.amsl.com>; Fri, 16 Dec 2011 18:38:42 -0800 (PST)
Received: from mail-gx0-f172.google.com (mail-gx0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id 4510F1F0C48 for <opsec@ietf.org>; Fri, 16 Dec 2011 18:38:42 -0800 (PST)
Received: by ggnk5 with SMTP id k5so3657225ggn.31 for <opsec@ietf.org>; Fri, 16 Dec 2011 18:38:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=sender:message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; bh=PXyDSYtnjsHs7W50/PkitkJXPFPVu0SpeRn2naxCN2o=; b=Ril+vgMjX3olZnxyxY1VKYGWX+rn3wUrUIEOGHKtTvFwhnoMPHYQ3YY9gURpeiVvlc RaMPHu07y30ZEE2FcVnl2ntN4UZQufm/8F2cyV+WhjDF2axxyvSe9ZAgbmeSDMPy/qIn qbtsYPcL0yP3p4e3H0roq8x0wYiL2ehkNZsDs=
Received: by 10.101.61.8 with SMTP id o8mr4826280ank.79.1324089521904; Fri, 16 Dec 2011 18:38:41 -0800 (PST)
Received: from [192.168.123.102] ([190.48.203.52]) by mx.google.com with ESMTPS id s12sm10388739anl.9.2011.12.16.18.38.39 (version=SSLv3 cipher=OTHER); Fri, 16 Dec 2011 18:38:41 -0800 (PST)
Sender: Fernando Gont <fernando.gont.netbook.win@gmail.com>
Message-ID: <4EEC00AD.8020702@gont.com.ar>
Date: Fri, 16 Dec 2011 23:38:37 -0300
From: Fernando Gont <fernando@gont.com.ar>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.23) Gecko/20110922 Thunderbird/3.1.15
MIME-Version: 1.0
To: Carlos Pignataro <cpignata@cisco.com>
References: <4DB74CBD.2050003@gont.com.ar> <4DCCA138.2000908@cisco.com> <4DD5F510.5060405@gont.com.ar> <4DF8D73F.7020803@cisco.com>
In-Reply-To: <4DF8D73F.7020803@cisco.com>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "'opsec@ietf.org'" <opsec@ietf.org>
Subject: Re: [OPSEC] Fwd: New Version Notification	for	draft-gont-opsec-ip-options-filtering-01
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/opsec>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 17 Dec 2011 02:38:43 -0000

Hi, Carlos,

My apologies for the delay in my response. Please find my comments inline...

On 06/15/2011 01:01 PM, Carlos Pignataro wrote:
> In a way, the comment behind my comment was that if today optioned
> packets are already mostly blocked/filtered out, the value of a
> per-option analysis decreases.
> 
> Dan Wing was kind enough to run his experiment with existing options (as
> opposed to unknown options), with these results:
> 
> Without any IP options:
> # grep open normal-nop.out | wc
>      486    2430   29901

Sorry, what does each of the columns stand for?



> I am not aware of papers with more scientific analysis of success rates
> with existing options. But:
> 
> --->8---
> 	Data seems to indicate that there is a current widespread
> 	practice of blocking IPv4 optioned packets. There are various
> 	plausible approaches to minimize the potential negative effects
> 	of IPv4 optioned packets while allowing some options semantics.
> 	One approach is to allow for specific options that are expected
> 	or needed, and a default deny. A different approach is to deny
> 	unneeded options and a default allow. Yet a third option is to
> 	allow for end-to-end semantics by ignoring options and treating
> 	packets as unoptioned while in transit. The current state tends
> 	to support the first or third approaches as more realistic.
> --->8---

I've added this (verbatim) to the intro, and have also added a pointer
to Medina's paper.


>>> 2. It assumes that devices (i.e., routers) have the capability to filter
>>> IP optioned packets with the per-option-value granularity. This might
>>> not generally be the case.
> 
> I think this point should also be clarified.

Done in the intro (right bellow the text you suggested above):

--- cut here ---
We also note that while this document provides advice on a "per IP
option type", not all devices may provide functionality to filter IP
packets on a "per IP option type". Additionally, even in cases in which
such functionality is provided, the operator might want to specify a
filtering policy with a coarser granularity (rather than on a "per IP
option type" granularity), as indicated above.
---- cut here ---


>> I disagree with this assessment. The document assesses the impact of
>> filtering different options. If you're fine with the impact of filtering
>> all ip-optioned packets, then you don't need to filter at the
>> granularity of per-option-type.
> 
> I guess what I was thinking is that an operator could think "what do I
> lose if I block this option" and do that exercise for every option, or
> "what do I gain by allowing", and this is where the (apparent) current
> practice has a role in deciding this.

I think this is addressed by the text that you've provided?


>>> Additionally,
>>>
>>> 4. There may be more than "filter" versus "not-filter" options. Some
>>> platforms support ignoring IP options (i.e., acting as if an IP Optioned
>>> packet did not have options), and that is a potential recommendation.
>>
>> IIRC, this is already mentioned in the document.
>>
> 
> I could not find it. Could you please point to the specific para?
> 
> I think this is quite important because I think this is another practice
> often seen as the best option.

You were right -- it wasn't there. I have added this to the intro:

---- cut here ----
Finally, in scenarios in which processing of IP options by intermediate
systems is not required, a widespread approach is to simply ignore IP
options, and processs the corresponding packets as if they do not
contain any IP options.
--- cut here ---


>>> The first sentence of Section 3, "Router manufacturers tend to do IP
>>> option processing on the main processor, rather than on line cards",
>>> speaks to specific router distributed architecture, and I think it might
>>> be oversimplifying the current state.
>>
>> Proposed change?
> 
> http://tools.ietf.org/html/rfc6192#section-1
> 
>    Modern router architecture design maintains a strict separation of
>    forwarding and router control plane hardware and software.  The
> 
> There are possible things like ICMP generation and IP option processing
> on general use processors in Line Cards, as opposed to LC forwarding
> ASICs. It is a punt to a slower path. But not necessarily a punt to the
> RP -- there may not be "main processor" but "main processors" depending
> on the context, and abstracting from actual architectures helps the
> document be more time invariant.

How about changing the text to:
"Router manufacturers tend to do IP option processing in slower path.
Unless special care is taken, this represents Denial of Service (DoS)
risk, as there is potential for overwhelming the router with option
processing."
?


>>> For EOO and NOOP, the advise is to:
>>>
>>>    No security issues are known for this option, other than the general
>>>    security implications of IP options discussed in Section 2.
>>>
>>> But I think that the general implications are the most important part of
>>> this document but are minimal.
>>
>> hence?
> 
> Well, Section 2 is the default gateway for general implications
> applicable to all options but IMHO inadequately covers that subject. To
> be more precise, it does not cover it.

Can you specify what (exactly) you're referring to, so that I can
improve the document in this respect?



> Section 2 does not have general security implications of IP options. It
> seems to contain a guide as to what options are (semantics and syntax)
> but not security implications.

I've changed the ref to the one about the processing requirements.
Things can be improved from there.

P.S.: I've submitted a rev of the document, since it had expired. It is
available at:
<http://www.ietf.org/id/draft-gont-opsec-ip-options-filtering-02.txt>.
Please take a look and see if any of the issues raised in this e-mail
still needs to be addressed. (It still need to work on other feedback
you provided in other e-mails).

Thanks!

Best regards,
-- 
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@si6networks.com
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1



