MPTCP Threat analysis draft-bagnulo-mptcp-threat-00 marcelo bagnulo IETF76 – MPTCP WG.

Slides:



Advertisements
Similar presentations
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen
Advertisements

1 Address Selection, Failure Detection and Recovery in MULTI6 draft-arkko-multi6dt-failure-detection-00.txt Multi6 Design Team -- Jari Arkko, Marcelo Bagnulo,
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
2005 Stanford Computer Systems Lab Flow Cookies Bandwidth Amplification as Flooding Defense Martin Casado, Pei Cao Niels Provos.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
Routing of Outgoing Packets with MP-TCP draft-handley-mptcp-routing-00 Mark Handley Costin Raiciu Marcelo Bagnulo.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
NAT64 marcelo bagnulo, Philip Matthews, Iljitsch van Beijnum IETF 72 - Dublin.
Made with OpenOffice.org 1 TCP Multi-Home Options Arifumi Matsumoto Graduate School of Informatics, Kyoto University, Japan
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Draft-campbell-dime-load- considerations-01 IETF 92 DIME Working Group Meeting Dallas, Texas.
– Chapter 5 – Secure LAN Switching
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CSE 461 Section. Let’s learn things first! Joke Later!
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
Problems in using HIP for P2PSIP Philip Matthews Avaya
Multipath TCP Security Issues: A Request for Assistance Alan Ford (MPTCP WG)
TCP Security Vulnerabilities Phil Cayton CSE
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
DoS/DDoS attack and defense
MPTCP Protocol draft-ietf-mptcp-multiaddressed-02 Update and Open Issues Alan Ford IETF79 – Beijing 1.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Teacher:Quincy Wu Presented by: Ying-Neng Hseih
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
MPTCP proxy mechanisms (draft-wei-mptcp-proxy-mechanism-00)
Transport Layer1 TCP Connection Management Recall: TCP sender, receiver establish “connection” before exchanging data segments r initialize TCP variables:
K. Salah1 Security Protocols in the Internet IPSec.
Multi-addressed Multipath TCP draft-ford-mptcp-multiaddressed-02 Alan Ford Costin Raiciu, Mark Handley.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials draft-bajko-nsis-fw-reqs-01 Gábor Bajkó IETF Interim May 2005.
Presentation on ip spoofing BY
1 Protecting SIP Against DoS An Architectural Approach.
HIP-Based NAT Traversal in P2P-Environments
IPv6 Flow Label Specification
draft-bagnulo-tcpm-generalized-ecn-00 M. Bagnulo & B. Briscoe IETF97
Who should be responsible for risks to basic Internet infrastructure?
CS 5565 Network Architecture and Protocols
Multi-addressed Multipath TCP
CSCI-1680 Transport Layer I
* Essential Network Security Book Slides.
CS 5565 Network Architecture and Protocols
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Chapter 5 TCP Control Flow
TCP Connection Management
Presentation transcript:

MPTCP Threat analysis draft-bagnulo-mptcp-threat-00 marcelo bagnulo IETF76 – MPTCP WG

Scope Understand what additional vulnerabilities are added by the MPTCP extensions i.e. What attacks are possible in MPTCP that are NOT possible in current TCP It is out of the scope of the current analysis to identify and attempt to prevent threats that already exist in current TCP

Scope: Types of attackers On-path vs. Off-path On-path attackers – Full time on the path – Passive (man on the side) – Active: Blocking packets Changing packets

Previous work Threat analysis for: – MIPv6 RO (see RFC 4225) – Shim6 threat analysis (see RFC4218) – SCTP security analysis (see RFC5062) Relevant differences – In MIPv6/Shim6 what is a stake is the whole identity of the host, while in MPTCP/SCTP, only one connection is at stake… So, we may want to be less conservative It is very important to keep in mind that re-using ID/loc/crypto state can change what it is at stake

Basic MPTCP In order to understnad all possible threats, we will use a very basic MPTCP MPTCP will use the TCP 3 way handshake for the first flow – Will have a data seq number that is synch in that exchange – The address pair used in this 3 way handshake are the application identifiers (maybe learnt through DNS or DNSSEC, passed through a referral) May have some level of trust embedded

Basic MPTCP (cont) Once the first flow is established, MPTCP will use extensions for adding addresses – Implict: the address is convey in the source IP address field – Explicit: an option carrying an address list. We assume that MPTCP will distribute the load accross all address pairs, based on congestion.

Scenario IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn

Scenario IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…, LAn IDB LB1,…, LBn

Redirection attacks IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…, LAn IDB LB1,…, LBn

Flooding IDA LA1,…, LAn IDX LX1,…, LXn IDX LX1,…, LXn

Flooding IDA LA1,…, LAn IDX LX1,…, LXn IDX LX1,…LAi,…, LXn Attacker adds Lai Implicit mode: only works if no ingress fitlering Explicit mode always works

Flooding IDA LA1,…, LAn IDX LX1,…, LXn IDX LX1,…LAi,…, LXn Server sends traffic to target Attacker closes other addresses or pretends there is congestion Attacker send ACKs for data sent to target How is data acked? Only from acks containing the crrect src and dst? Target will issue a RST How does the server reacts upon reception of both ACKs and RST for the same data? Is the flight size enough to achieve a pulse attack?

Additional threat In TCP, an on path attacker can launch a flooding attack to the infrastructure along the path, but off path attackers can’t. MPTCP security must prevent off path attackers to launch flooding attacks.

Flooding Standard protection against flooding attack is a reachability test. – Before start sending packets to a new locator, a reachability test is perform, exchanging some connection identifier. – If the identifier does not correspond to any existing connection, the victim/target/receiver will reject the connection and the attack will be prevented

Flooding and MPTCP If MPTCP performs a 3-way handshake per new flow and they identify the connection This provides the reachability check required to prevent flooding attacks It is very important to NOT send data without a prior reachability check

Connection Hijacking IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…,…, LAn IDB LB1,…, LBn

Connection Hijacking IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…,LXi,…, LAn IDB LB1,…, LBn The attacker needs to discover the 4-tuple for that connection -The src port may be challenging

Connection Hijacking IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…,LXi,…, LAn Packets flowing from B to the attacker. Node B will distribute the load based on congestion, so some packet will flow to A -Node A won’t receive all packets In order to do a full hijacking, the attacker should remove LAi from the connection -- change on implicit or explicit mode

Connection Hijacking IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…,LXi,…, LAn Packets flowing from attacker to node B The attacker will be able to inject data (as long as the seq# is valid Node A will still be able to inject data Attacker can try to remove IP address es from A

Additional Threat In current TCP, an on-path attacker can launch a hijacking attack, but an off-path attacker can’t. – It may be able to inject some packets (depending on the seq# and ingress filtering), but certainly cannot receive packets So, MPTCP security must prevent off path atackers to perform hijacking attacks

Hijacking and MPTCP with cookie based security MPTCP can use a combination of seq# and cookie for security. (as in draft-ford-mptcp- multiaddressed)draft-ford-mptcp- multiaddressed – By Seq# i refer to the data seq# (not the one per flow, but the one of the data) – They are both exchanged in the first 3 way exchange, when the ULID pair is defined for the connection. So what residual hijacking attacks can be performed with this protection?

Time-shifted/future attacks A time-shifted attack is an attack where: – The attacker is on-path during a period of time and obtains information (e.g. The cookie and the seq#) or even installs state if needed. – Then the attacker leaves the on path location – The attakcs continues even after the attacker left the on path position Current TCP is not vulnerable to time-shifted attacks – i.e. When the attacker leaves the position, it no longer receives the packets of the TCP connection

Time shifted attack in MPTCP Flavour 1 IDA LA1,…, LAn Attacker on path learns cookie and seq# IDB LB1,…, LBn IDB LB1,…, LBn IDA LA1,…, LAn Any side initiates the connection

Time shifted attack in MPTCP Flavour 1 IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…,LXi,…, LAn IDB LB1,…, LBn Attacker leaves the location to a more comfortable one and adds new flow

Time shifted attack in MPTCP Flavour 2 IDA LA1,…, LAn Attacker on path learns cookie and seq# Then it closes this flow IDB LB1,…, LBn IDB LB1,…, LBn IDA LA1,…, LAn Any side initiates the connection

Time shifted attack in MPTCP Flavour 2 IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…,LXi,…, LAn IDB LB1,…, LBn Attacker leaves the location to a more comfortable one and adds new flow Impact: Complete hijacking of the connection

Time shifted attack in MPTCP Flavour 3 IDA LA1,…, LAn Attacker initiates the connection from the topologically correct location IDB LB1,…, LBn IDB LB1,…, LBn IDA LA1,…, LAn

Time shifted attack in MPTCP Flavour 3 IDA LA1,…, LAn IDX LX1,…, LXn IDB LB1,…, LBn IDA LA1,…,LXi,…, LAn IDB LB1,…, LBn Attacker leaves the location to a more comfortable one and adds new flow Impact: Complete impersonation of the victim