Ben Kaduk (SEC AD) was wondering about the appropriateness of a hardening 
suggestion
in draft-ietf-anima-autonomic-control-plane-29. Let me translate this into
mDNS, even though its about GRASP, but IMHO for the purpose of this issue
its equivalent:

Node wants to discover on a LAN a particular service and unfortunately, 
attackers
on the LAN want to spam it.  For example by sending out a significant number
of false mDNS messages claiming the service is available on a variety of 
of ports (lets keep attacks against other serive parts like the I address
out of this). And in effect, the node will attempt a lot of service 
instantiations
to bogus ports.

Now, in one case, the service may have an IANA registered well-known TCP or UDP
port number. So the hardening recommendation in our draft text is that if a lot
of answers are received AND the node knows that there is a well-known port, then
it should prioritize trying the service over that well known port.

Any reason why this would not be a good obvious heuristic ?
Has this been considered for mDNS alreay anywhere (rfc ?).

Of course, if there is no well known port, this does not help. And if
the non-attacker can only offer a service with a well-known port number only
on a non-well-known port number, than it actually hurts, but i think those
are unavoidable limitations. And it easily spells out that one of the
key benefits of getting a well-known port number for something is to
be able to avoid having to guess in the face of such attacks, when discovery
of port number can not be secured.

Aka: In our case we have one potential upcoming service over DTLS, and
this text could help decide later on if we wanted to apply for a
well-known port number for this service if we get operational experience
that that could help in conjunction with this hardening recommendation.

Cheers
    Toerless

P.S.: for original text in subject draft look for "Attackers on a subnet may be 
able to inject malicious"

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to