I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments.
Overall, I found this document to be fairly straightforward and easy to
understand, even without a deep background in HIP. It does introduce
new security considerations associated with the ability to cause traffic
destined for a host to be redirected to a new location. However, these
are discussed and, provided HIP itself behaves as advertised, they are
adequately addressed. I have a few comments and questions, but nothing
to indicate this document should not be published as Experimental.
Section 3.1.2: Mobility Overview
This UPDATE packet is acknowledged by the peer, and is
protected by retransmission.
What does "protected by retransmission" mean here?
=====
Section 3.3.2: Credit-Based Authorization
2. An attacker can always cause unamplified flooding by sending
packets to its victim directly.
This is frequently untrue. The network may be configured such that the
attacker does not have direct connectivity to a victim, such as when the
victim is inside a firewall and the attack is carried out via a host within
within a "DMZ". Or, an attacker may attempt to create congestion on the
link between two victims, where the attacher has better connectivity to
both victims than they do to each other.
IMHO this is not a show-stopper -- the hypothesis quoted above is true in a
large number of cases, and it does appear to me that the credit-based
authorization scheme described here will have a positive erffect in those
cases without otherwise being harmful. However, it is worth pointing out
that this is not a cure-all.
=====
Section 4.2: Locator Type and Locator
Are locator types critical? What happens when a host tries to add or move
to a locator which is not supported by its peer?
=====
Section 5.2: Sending LOCATORs
The announcement of link-local addresses is a policy decision; such
addresses used as Preferred locators will create reachability
problems when the host moves to another link.
In fact, even a host which is not mobile should be careful to avoid
advertising link-local addresses to peers not on the same link.
=====
6. Security Considerations
The HIP mobility mechanism provides a secure means of updating a
host's IP address via HIP UPDATE packets. Upon receipt, a HIP host
cryptographically verifies the sender of an UPDATE, so forging or
replaying a HIP UPDATE packet is very difficult (see [2]).
Therefore, security issues reside in other attack domains.
I believe this is an accurate assessment.
-- Jeffrey T. Hutzelman (N3NHS) <jhutz+(_at_)cmu(_dot_)edu>
Sr. Research Systems Programmer
School of Computer Science - Research Computing Facility
Carnegie Mellon University - Pittsburgh, PA
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf