MPTCP threat analysis: an update

23
MPTCP threat analysis: an update marcelo bagnulo IETF77 – MPTCP WG

description

MPTCP threat analysis: an update. marcelo bagnulo IETF77 – MPTCP WG. Scope: Types of attackers. On-path vs. Off-path On-path attackers Full time on the path Passive (man on the side) Active: Blocking packets Changing packets. Scenario. IDB LB1,…, LBn. IDA LA1,…, LAn. IDX - PowerPoint PPT Presentation

Transcript of MPTCP threat analysis: an update

Page 1: MPTCP threat analysis: an update

MPTCP threat analysis:an update

marcelo bagnuloIETF77 – MPTCP WG

Page 2: MPTCP threat analysis: an update

Scope: Types of attackers

• On-path vs. Off-path• On-path attackers– Full time on the path– Passive (man on the side)– Active:• Blocking packets• Changing packets

Page 3: MPTCP threat analysis: an update

Scenario

IDA LA1,…, LAn

IDX LX1,…, LXn

IDB LB1,…, LBn

Page 4: MPTCP threat analysis: an update

Scenario

IDA LA1,…, LAn

IDX LX1,…, LXn

IDB LB1,…, LBn

IDA LA1,…, LAn

IDB LB1,…, LBn

Page 5: MPTCP threat analysis: an update

Redirection attacks

IDA LA1,…, LAn

IDX LX1,…, LXn

IDB LB1,…, LBn

IDA LA1,…, LAn

IDB LB1,…, LBn

Page 6: MPTCP threat analysis: an update

Flooding

IDA LA1,…, LAn

IDX LX1,…, LXn

IDX LX1,…, LXn

Page 7: MPTCP threat analysis: an update

Flooding

IDA LA1,…, LAn

IDX LX1,…, LXn

IDX LX1,…LAi,…, LXn

Page 8: MPTCP threat analysis: an update

Flooding

IDA LA1,…, LAn

IDX LX1,…, LXn

IDX LX1,…LAi,…, LXn

Page 9: MPTCP threat analysis: an update

Flooding and MPTCP

• If MPTCP performs a 3-way handshake per new flow and they identify the connection

• This provides the reachability check required to prevent flooding attacks

• It is very important to NOT send data without a prior reachability check

Page 10: MPTCP threat analysis: an update

Connection Hijacking

IDA LA1,…, LAn

IDX LX1,…, LXn

IDB LB1,…, LBn

IDA LA1,…,…, LAn

IDB LB1,…, LBn

Page 11: MPTCP threat analysis: an update

Connection Hijacking

IDA LA1,…, LAn

IDX LX1,…, LXn

IDB LB1,…, LBn

IDA LA1,…,LXi,…, LAn

IDB LB1,…, LBn

Page 12: MPTCP threat analysis: an update

Connection Hijacking

IDA LA1,…, LAn

IDX LX1,…, LXn

IDB LB1,…, LBn

IDA LA1,…,LXi,…, LAn

Page 13: MPTCP threat analysis: an update

Additional Threat

• In current TCP, an on-path attacker can launch a hijacking attack, but an off-path attacker can’t.

• So, MPTCP security must prevent off path atackers to perform hijacking attacks

Page 14: MPTCP threat analysis: an update

Hijacking and MPTCP with cookie based security

• MPTCP can use a combination of seq# and cookie for security. (as in draft-ford-mptcp-multiaddressed)– By Seq# i refer to the data seq# (not the one per

flow, but the one of the data)– They are both exchanged in the first 3 way exchange,

when the ULID pair is defined for the connection.

• So what residual hijacking attacks can be performed with this protection?

Page 15: MPTCP threat analysis: an update

Time-shifted/future attacks• A time-shifted attack is an attack where:– The attacker is on-path during a period of time and

obtains information (e.g. The cookie and the seq#) or even installs state if needed.

– Then the attacker leaves the on path location– The attakcs continues even after the attacker left the

on path position• Current TCP is not vulnerable to time-shifted

attacks – i.e. When the attacker leaves the position, it no longer

receives the packets of the TCP connection

Page 16: MPTCP threat analysis: an update

Time shifted attack in MPTCP

IDA LA1,…, LAn Attacker on path learns

cookie and seq#

IDB LB1,…, LBn

IDB LB1,…, LBn

IDA LA1,…, LAn

Any side initiates the connection

Page 17: MPTCP threat analysis: an update

Time shifted attack in MPTCP

IDA LA1,…, LAn

IDX LX1,…, LXn

IDB LB1,…, LBn

IDA LA1,…,LXi,…, LAn

IDB LB1,…, LBn

Attacker leaves the location to a more comfortable one and adds new flow

Page 18: MPTCP threat analysis: an update

Taxonomy of time shofted attacks

• Type of attacker: Passive vs. Active• Vulnerability window to take over:– Only the initial handshake– Every subflow addition handshake

• Integrity attacks• Replay attacks• Detectable vs. Undetactable attacks

Page 19: MPTCP threat analysis: an update

Cookie based solution

• Type of attacker: Passive• Vulnerability window to take over: both the

initial and the every next subflow• Vulnerable to Integrity attacks• Vulnerable to Replay attacks• Undetactable attacks

Page 20: MPTCP threat analysis: an update

Plain text key exchange + keyed HMAC

• Type of attacker: Passive• Vulnerability window to take over: Only the

initial handshake• Vulnerable to Integrity attacks• Vulnerable to Replay attacks• Undetactable attacks

Page 21: MPTCP threat analysis: an update

Leap of faith/ssh type of security

• Type of attacker: Active• Vulnerability window to take over: Only the

initial handshake• Vulnerable to Integrity attacks• Replay attacks: possible to protect• Detectable attacks

Page 22: MPTCP threat analysis: an update

NAT considerations

• NAT compatibility implies that the endpoints do not know the IP address pair, which is exactly what we need to protect

• Implies that integrity protection is very hard to achieve

Page 23: MPTCP threat analysis: an update

Next steps

• It would be possible to craft a solution with different pieces that mitigates most of the threats?