Last Call Review of draft-ietf-6man-flow-ecmp-

Request Review of draft-ietf-6man-flow-ecmp
Requested rev. no specific revision (document currently at 05)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2011-07-12
Requested 2011-06-23
Authors Shane Amante, Brian Carpenter
Draft last updated 2011-07-09
Completed reviews Secdir Last Call review of -?? by Brian Weis
Assignment Reviewer Brian Weis 
State Completed
Review review-ietf-6man-flow-ecmp-secdir-lc-weis-2011-07-09
Review completed: 2011-07-09


I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments.

Intermediate systems in a routing system perform load balancing of packets between a pair of nodes based on values in the packet. This I-D defines a safe method by which the IPv6 flow label can be one of those values. A necessary condition is that flow labels that have a uniform distribution, and the method is restricting to use by IPv6 tunnel endpoints that are more trusted to apply this method to packets they encapsulate.

The Security Considerations section describes a single availability attack, which is an attacker able to "selectively overload a particular path". I assume that this can happen if the hash calculation of the intermediate systems will send too many packets down one path and overload it rather than properly load balancing across the paths. The values used by the intermediate system come from packet headers, and the calculation is deterministic. If the flow label computed by the tunnel endpoint is included in the calculation, and it is also deterministic, then it seems that an attacker knowing the method used by the tunnel endpoint to create flow labels can engage in this attack. That is, the attacker crafting packets that will result in the tunnel end point computing one or more flow labels that cause the intermediate system to include in its hash calculation, which results in it routing over the same path. This may be feasible for an informed attacker controlling a suitable size botnet. So making the tunnel endpoint flow label calculation unpredictable would be important to stop this attack. 

The I-D recommends computing the flow label according to [I-D.ietf-6man-flow-3697bis], and also states in Section 3 that the result "will be hard for a malicious third party to predict". If so, then this attack seems mitigated when the recommendation is taken. But it would be helpful if the Security Considerations could also mention the need for unpredictability, and perhaps also mention how the unpredictability is added. As far as I can tell, the recommendation in [I-D.ietf-6man-flow-3697bis] is to build the flow label from values in the packet being encapsulated, which the attacker itself may have generated. If the attacker can provide all of the inputs, and it knows the tunnel endpoint flow label calculation, then there doesn't seem to be any unpredictability. (The I-D says to see [I-D.ietf-6man-flow-3697bis] for further discussion of this threat. I can't seem to find it, but if it's there simply pointing to that discussion would be fine too.)

Other than clarifying how that attack is mitigated I do not see the need for any changes.