Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses
RFC 6181
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2020-03-05
|
08 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
|
2016-11-10
|
08 | (System) | Received changes through RFC Editor sync (added Errata tag) |
|
2015-10-14
|
08 | (System) | Notify list changed from mptcp-chairs@ietf.org, draft-ietf-mptcp-threat@ietf.org to (None) |
|
2011-03-16
|
08 | Amy Vezza | State changed to RFC Published from RFC Ed Queue. |
|
2011-03-15
|
08 | (System) | RFC published |
|
2011-01-27
|
08 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent. |
|
2011-01-26
|
08 | (System) | IANA Action state changed to No IC from In Progress |
|
2011-01-26
|
08 | (System) | IANA Action state changed to In Progress |
|
2011-01-26
|
08 | Cindy Morgan | IESG state changed to Approved-announcement sent |
|
2011-01-26
|
08 | Cindy Morgan | IESG has approved the document |
|
2011-01-26
|
08 | Cindy Morgan | Closed "Approve" ballot |
|
2011-01-26
|
08 | Cindy Morgan | Approval announcement text regenerated |
|
2011-01-26
|
08 | Lars Eggert | State changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed. |
|
2011-01-26
|
08 | (System) | New version available: draft-ietf-mptcp-threat-08.txt |
|
2011-01-21
|
08 | (System) | Removed from agenda for telechat - 2011-01-20 |
|
2011-01-20
|
08 | Cindy Morgan | State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation. |
|
2011-01-20
|
08 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-20
|
08 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-20
|
08 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-20
|
08 | Dan Romascanu | [Ballot comment] In the OPS-DIR review Lionel Morand raised the issue that it is recommended to allow the support of multiple security mechanisms but there … [Ballot comment] In the OPS-DIR review Lionel Morand raised the issue that it is recommended to allow the support of multiple security mechanisms but there is nothing about potential related mechanism negotiation issues. I suggest that this be addressed before the publication of the document, even if it is not a blocking issue. |
|
2011-01-20
|
08 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-19
|
08 | David Harrington | [Ballot Position Update] Position for David Harrington has been changed to Yes from No Objection |
|
2011-01-19
|
08 | David Harrington | [Ballot comment] This document does a good job of analyzing the threats for MPTCP. Thanks you. While fully understandable, I found the text a bit … [Ballot comment] This document does a good job of analyzing the threats for MPTCP. Thanks you. While fully understandable, I found the text a bit wordy, with extra phrases and clauses thrown in where they really weren't needed. This document could be much more concise, and if you are doing a new revision, you might want to consider tightening up the text. But this is purely a style issue, and the authors are free to ignore this comment if they so choose. Some examples of things that can be tightened: "It should be noted that yada yada yada" - this implies that somebody should sometime in the future note this, but you are noting it now, so all you need is the yada yada yada without "It should be noted that". I recommend you check any "Note that" usages; they are almost always unnecessary. "Similarly to the MPTCP case, the Shim6 protocol is a layer 3 protocol so all the communications involving the target address are at stake, as opposed to the MPTCP case, where the impact can be limited to a single TCP connection." would be much more concise as simply "The Shim6 protocol is a layer 3 protocol so all the communications involving the target address are at stake; in MPTCP, the impact can be limited to a single TCP connection." s/behaviour of SCTP as defined/behaviour of SCTP/ I recommend checking to see if removing some of these phrases actually changes the meaning of the sentence: s/as such//g s/So,//g s/As we stated earlier,// s/In order to do that,// s/This means that// s/In particular//g s/We assume that//g s/So, at least,// s/In addition,// s/the so called// s/It should be noted that/ s/In other words,// s/namely// s/In this case,// s/basically// s/This implies that// s/It seems that/ s/It seems reasonable to assume that// s/This per se,/This/ s/The result is that/ s/This means that// s/This basically means that// and some specific places: s/In addition, we have the target of the flooding attack, target T which has an IP address IPT./ Target T has an IP address IPT./ s/In the first step of this attack (depicted as step 1 in the figure), the attacker A/ The attacker A/ s/the second step of the attack (depicted as step 2 in the figure)/ the second step of the attack/ or /step 2 of the attack/ (to align it with the figure labels) s/The actual details of this/The details/ s/somehow more secure/more secure/ s/Similarly to the previous case,// s/As opposed to the previous one,// s/As we have described earlier,// |
|
2011-01-19
|
08 | David Harrington | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-19
|
08 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-19
|
08 | David Harrington | Request for Last Call review by TSVDIR Completed. Reviewer: Allison Mankin. |
|
2011-01-19
|
08 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-19
|
08 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-19
|
08 | Jari Arkko | [Ballot comment] This is an excellent document and I can warmly recommend its approval. Thank you for writing it, Marcelo. Some small comments: In Section … [Ballot comment] This is an excellent document and I can warmly recommend its approval. Thank you for writing it, Marcelo. Some small comments: In Section 3, where the document discusses differences between MIPv6 RO and MPTCP situation I had a couple of comments. First, I'm not sure I understand what you mean with the bullet about MIPv6 relying on the original path always being available. MIPv6 certainly assumes that the path that we are using at that moment is working, and if it is not, the system will attempt to move to some other address or network attachment point. Secondly, I think you are missing one additional difference: in MIPv6 we assume that there's always a trusted third party (the home agent) that can help us with some of the security problems. In MPTCP there is no such entity. You might also be missing the difference that MPTCP intends to be able to use multiple paths simultaneously, which was not an original design goal of the MIPv6 work. In Section 6.3, the text discusses the effects of NAT on securing the implicitly reported new address. The text fails to explain that while explicit mode would allow better protection of the reported new address, such protection would be pointless because it would protect an address that is no longer relevant on the outside of the NAT. You actually *need* to report the address as changed by the NAT. And by the way, I see nothing wrong with that... that's is how current TCP works, too. I like the basic recommendations in Section 7. But I am unsure if the analysis in the document actually supports the advanced recommendation to have optional support for HMAC. Why would that needed? Also, should the conclusions say something about how MPTCP design should deal with sequence number spaces -- it seems that different choices here would result in different impacts. |
|
2011-01-19
|
08 | Jari Arkko | [Ballot comment] This is an excellent document and can warmly recommend its approval. Thank you for writing it, Marcelo. Some small comments: In Section 3, … [Ballot comment] This is an excellent document and can warmly recommend its approval. Thank you for writing it, Marcelo. Some small comments: In Section 3, where the document discusses differences between MIPv6 RO and MPTCP situation I had a couple of comments. First, I'm not sure I understand what you mean with the bullet about MIPv6 relying on the original path always being available. MIPv6 certainly assumes that the path that we are using at that moment is working, and if it is not, the system will attempt to move to some other address or network attachment point. Secondly, I think you are missing one additional difference: in MIPv6 we assume that there's always a trusted third party (the home agent) that can help us with some of the security problems. In MPTCP there is no such entity. You might also be missing the difference that MPTCP intends to be able to use multiple paths simultaneously, which was not an original design goal of the MIPv6 work. In Section 6.3, the text discusses the effects of NAT on securing the implicitly reported new address. The text fails to explain that while explicit mode would allow better protection of the reported new address, such protection would be pointless because it would protect an address that is no longer relevant on the outside of the NAT. You actually *need* to report the address as changed by the NAT. And by the way, I see nothing wrong with that... that's is how current TCP works, too. I like the basic recommendations in Section 7. But I am unsure if the analysis in the document actually supports the advanced recommendation to have optional support for HMAC. Why would that needed? Also, should the conclusions say something about how MPTCP design should deal with sequence number spaces -- it seems that different choices here would result in different impacts. |
|
2011-01-19
|
08 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded |
|
2011-01-19
|
08 | Jari Arkko | [Ballot comment] This is an excellent document and can warmly recommend its approval. Thank you for writing it, Marcelo. Some small comments: In Section 3, … [Ballot comment] This is an excellent document and can warmly recommend its approval. Thank you for writing it, Marcelo. Some small comments: In Section 3, where the document discusses differences between MIPv6 RO and MPTCP situation I had a couple of comments. First, I'm not sure I understand what you mean with the bullet about MIPv6 relying on the original path always being available. MIPv6 certainly assumes that the path that we are using at that moment is working, and if it is not, the system will attempt to move to some other address or network attachment point. Secondly, I think you are missing one additional difference: in MIPv6 we assume that there's always a trusted third party (the home agent) that can help us with some of the security problems. In MPTCP there is no such entity. You might also be missing the difference that MPTCP intends to be able to use multiple paths simultaneously, which was not an original design goal of the MIPv6 work. In Section 6.3, the text discusses the effects of NAT on securing the implicitly reported new address. The text fails to explain that while explicit mode would allow better protection of the reported new address, such protection would be pointless because it would protect an address that is no longer relevant on the outside of the NAT. You actually *need* to report the address as changed by the NAT. And by the way, I see nothing wrong with that... that's is how current TCP works, too. |
|
2011-01-19
|
08 | Jari Arkko | [Ballot comment] This is an excellent document and can warmly recommend its approval. Thank you writing it, Marcelo. Some small comments: In Section 3, where … [Ballot comment] This is an excellent document and can warmly recommend its approval. Thank you writing it, Marcelo. Some small comments: In Section 3, where the document discusses differences between MIPv6 RO and MPTCP situation I had a couple of comments. First, I'm not sure I understand what you mean with the bullet about MIPv6 relying on the original path always being available. MIPv6 certainly assumes that the path that we are using at that moment is working, and if it is not, the system will attempt to move to some other address or network attachment point. Secondly, I think you are missing one additional difference: in MIPv6 we assume that there's always a trusted third party (the home agent) that can help us with some of the security problems. In MPTCP there is no such entity. You might also be missing the difference that MPTCP intends to be able to use multiple paths simultaneously, which was not an original design goal of the MIPv6 work. |
|
2011-01-19
|
08 | Jari Arkko | [Ballot comment] In Section 3, where the document discusses differences between MIPv6 RO and MPTCP situation I had a couple of comments. First, I'm not … [Ballot comment] In Section 3, where the document discusses differences between MIPv6 RO and MPTCP situation I had a couple of comments. First, I'm not sure I understand what you mean with the bullet about MIPv6 relying on the original path always being available. MIPv6 certainly assumes that the path that we are using at that moment is working, and if it is not, the system will attempt to move to some other address or network attachment point. Secondly, I think you are missing one additional difference: in MIPv6 we assume that there's always a trusted third party (the home agent) that can help us with some of the security problems. In MPTCP there is no such entity. You might also be missing the difference that MPTCP intends to be able to use multiple paths simultaneously, which was not an original design goal of the MIPv6 work. |
|
2011-01-18
|
08 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-15
|
08 | Alexey Melnikov | [Ballot comment] In Section 1: This note includes a threat analysis for MPTCP. It should be noted that there are there may … [Ballot comment] In Section 1: This note includes a threat analysis for MPTCP. It should be noted that there are there may other ways to provide multiple paths for a TCP This doesn't read well connection other than the usage of multiple addresses. The threat analysis performed in this document is limited to the specific case of using multiple addresses per endpoint. In Section 3: o Similarly to the MPTCP case, Did you mean "MIPv6 RO" here? the Shim6 protocol is a layer 3 protocol so all the communications involving the target address are at stake, as opposed to the MPTCP case, where the impact can be limited to a single TCP connection. |
|
2011-01-15
|
08 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded |
|
2011-01-11
|
07 | (System) | New version available: draft-ietf-mptcp-threat-07.txt |
|
2011-01-11
|
08 | Lars Eggert | Placed on agenda for telechat - 2011-01-20 |
|
2011-01-11
|
08 | Lars Eggert | [Ballot Position Update] New position, Yes, has been recorded for Lars Eggert |
|
2011-01-11
|
08 | Lars Eggert | Ballot has been issued |
|
2011-01-11
|
08 | Lars Eggert | Created "Approve" ballot |
|
2011-01-11
|
08 | Lars Eggert | State changed to IESG Evaluation from Waiting for AD Go-Ahead. |
|
2011-01-11
|
08 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
|
2011-01-04
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker |
|
2011-01-04
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker |
|
2010-12-21
|
08 | Amanda Baber | We understand that this document does not require any IANA actions. |
|
2010-12-20
|
08 | David Harrington | Request for Last Call review by TSVDIR is assigned to Allison Mankin |
|
2010-12-20
|
08 | David Harrington | Request for Last Call review by TSVDIR is assigned to Allison Mankin |
|
2010-12-17
|
08 | Cindy Morgan | Last call sent |
|
2010-12-17
|
08 | Cindy Morgan | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG <iesg-secretary@ietf.org> To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG <iesg-secretary@ietf.org> To: IETF-Announce <ietf-announce@ietf.org> CC: <multipathtcp@ietf.org> Reply-To: ietf@ietf.org Subject: Last Call: <draft-ietf-mptcp-threat-06.txt> (Threat Analysis for Multi-addressed/Multi-path TCP) to Informational RFC The IESG has received a request from the Multipath TCP WG (mptcp) to consider the following document: - 'Threat Analysis for Multi-addressed/Multi-path TCP' <draft-ietf-mptcp-threat-06.txt> as an Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2011-1-11. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-mptcp-threat/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-mptcp-threat/ |
|
2010-12-17
|
08 | Lars Eggert | Last Call was requested |
|
2010-12-17
|
08 | Lars Eggert | State changed to Last Call Requested from Publication Requested. |
|
2010-12-17
|
08 | Lars Eggert | Last Call text changed |
|
2010-12-17
|
08 | (System) | Ballot writeup text was added |
|
2010-12-17
|
08 | (System) | Last call text was added |
|
2010-12-17
|
08 | (System) | Ballot approval text was added |
|
2010-12-08
|
08 | Cindy Morgan | [Note]: 'Yoshifumi Nishida (nishida@sfc.wide.ad.jp) is the document shepherd.' added by Cindy Morgan |
|
2010-12-08
|
08 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Yoshifumi Nishida is the document shepherd. I have personally reviewed the document and believe it is ready for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has been reviewed by both key WG members and Key non-WG members. There is no concern about the reviews. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? None. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. None. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is strong consensus on this document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) None. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? This document is verified with idnits 2.12.05. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document splits the references. There is no downward reference in the normative reference. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? Yes. IANA consideration section exists in the document, but no action is required. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The document contains no formal language. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. This document describes the threat analysis for Multi-path TCP which allows an endpoint to use multiple IP addresses to exchange data. The goal of this document is to provide the information of possible threats in Multi-path TCP and recommendable solutions to make MPTCP as secure as the current TCP. The information on this document is important for the basic design of MPTCP protocol. Additional strong secure mechanisms are out-of-scope of this document and will be addressed by other documents. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? This draft has been discussed in all IETF meetings since the creation of the WG. There is a strong consensus in the WG for publication as an informational RFC. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This document was reviewed by various people and has been through WGLC successfully. The MPTCP protocol has been designed based on the recommendations in this document. Personnel Yoshifumi Nishida is the Document Shepherd for this document. The Responsible Area Director is Lars Eggert. |
|
2010-12-08
|
08 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
|
2010-12-07
|
06 | (System) | New version available: draft-ietf-mptcp-threat-06.txt |
|
2010-12-06
|
05 | (System) | New version available: draft-ietf-mptcp-threat-05.txt |
|
2010-11-26
|
04 | (System) | New version available: draft-ietf-mptcp-threat-04.txt |
|
2010-10-06
|
03 | (System) | New version available: draft-ietf-mptcp-threat-03.txt |
|
2010-09-30
|
08 | (System) | Document has expired |
|
2010-03-29
|
02 | (System) | New version available: draft-ietf-mptcp-threat-02.txt |
|
2010-03-08
|
01 | (System) | New version available: draft-ietf-mptcp-threat-01.txt |
|
2010-02-18
|
00 | (System) | New version available: draft-ietf-mptcp-threat-00.txt |