Network Working Group H. Tschofenig Request for Comments: 4081 D. Kroeselberg Category: Informational Siemens

                                                             June 2005
        Security Threats for Next Steps in Signaling (NSIS)

Status of This Memo

 This memo provides information for the Internet community.  It does
 not specify an Internet standard of any kind.  Distribution of this
 memo is unlimited.

Copyright Notice

 Copyright (C) The Internet Society (2005).

Abstract

 This threats document provides a detailed analysis of the security
 threats relevant to the Next Steps in Signaling (NSIS) protocol
 suite.  It calls attention to, and helps with the understanding of,
 various security considerations in the NSIS Requirements, Framework,
 and Protocol proposals.  This document does not describe
 vulnerabilities of specific parts of the NSIS protocol suite.

Table of Contents

 1. Introduction ....................................................2
 2. Communications Models ...........................................3
 3. Generic Threats .................................................7
    3.1. Man-in-the-Middle Attacks ..................................8
    3.2. Replay of Signaling Messages ..............................11
    3.3. Injecting or Modifying Messages ...........................11
    3.4. Insecure Parameter Exchange and Negotiation ...............12
 4. NSIS-Specific Threat Scenarios .................................12
    4.1. Threats during NSIS SA Usage ..............................13
    4.2. Flooding ..................................................13
    4.3. Eavesdropping and Traffic Analysis ........................15
    4.4. Identity Spoofing .........................................15
    4.5. Unprotected Authorization Information .....................17
    4.6. Missing Non-Repudiation ...................................18
    4.7. Malicious NSIS Entity .....................................19
    4.8. Denial of Service Attacks .................................20
    4.9. Disclosing the Network Topology ...........................21
    4.10. Unprotected Session or Reservation Ownership .............21
    4.11. Attacks against the NTLP .................................23

Tschofenig & Kroeselberg Informational [Page 1] RFC 4081 Security Threats for NSIS June 2005

 5. Security Considerations ........................................23
 6. Contributors ...................................................24
 7. Acknowledgements ...............................................24
 8. References .....................................................25
    8.1. Normative References ......................................25
    8.2. Informative References ....................................25

1. Introduction

 Whenever a new protocol is developed or existing protocols are
 modified, threats to their security should be evaluated.  To address
 security in the NSIS working group, a number of steps have been
 taken:
    NSIS Analysis Activities (see [RSVP-SEC] and [SIG-ANAL])
    Security Threats for NSIS
    NSIS Requirements (see [RFC3726])
    NSIS Framework (see [RFC4080])
    NSIS Protocol Suite (see GIMPS [GIMPS], NAT/Firewall NSLP
    [NATFW-NSLP] and QoS NSLP [QOS-NSLP])
 This document identifies the basic security threats that need to be
 addressed during the design of the NSIS protocol suite.  Even if the
 base protocol is secure, certain extensions may cause problems when
 used in a particular environment.
 This document cannot provide detailed threats for all possible NSIS
 Signaling Layer Protocols (NSLPs).  QoS [QOS-NSLP], NAT/Firewall
 [NATFW-NSLP], and other NSLP documents need to provide a description
 of their trust models and a threat assessment for their specific
 application domain.  This document aims to provide some help for the
 subsequent design of the NSIS protocol suite.  Investigations of
 security threats in a specific architecture or context are outside
 the scope of this document.
 We use the NSIS terms defined in [RFC3726] and in [RFC4080].

Tschofenig & Kroeselberg Informational [Page 2] RFC 4081 Security Threats for NSIS June 2005

2. Communications Models

 The NSIS suite of protocols is envisioned to support various
 signaling applications that need to install and/or manipulate state
 at nodes along the data flow path through the network.  As such, the
 NSIS protocol suite involves the communication between different
 entities.
 This section offers terminology for common communication models that
 are relevant to securing the NSIS protocol suite.
 An abstract network topology with its administrative domains is shown
 in Figure 1, and in Figure 2 the relationship between NSIS entities
 along the path is shown.  For illustrative reasons, only end-to-end
 NSIS signaling is depicted, yet it might be used in other variations
 as well.  Signaling can start at any place and might terminate at any
 other place within the network.  Depending on the trust relationship
 between NSIS entities and the traversed network parts, different
 security problems arise.
 The notion of trust and trust relationship used in this document is
 informal and can best be captured by the definition provided in
 Section 1.1 of [RFC3756].  For completeness we include the definition
 of a trust relationship, which denotes a mutual a priori relationship
 between the involved organizations or parties wherein the parties
 believe that the other parties will behave correctly even in the
 future.
 An important observation for NSIS is that a certain degree of trust
 has to be placed into intermediate NSIS nodes along the path between
 an NSIS Initiator and an NSIS Responder, specifically so that they
 perform message processing and take the necessary actions.  A
 complete lack of trust between any of the participating entities will
 cause NSIS signaling to fail.
 Note that it is not possible to describe a trust model completely
 without considering the details and behavior of the NTLP, the NSLP
 (e.g., QoS NSLP), and the deployment environment.  For example,
 securing the communication between an end host (which acts as the
 NSIS Initiator) and the first NSIS node (which might be in the
 attached network or even a number of networks away) is impacted by
 the trust relationships between these entities.  In a corporate
 network environment, a stronger degree of trust typically exists than
 in an unmanaged network.
 Figure 1 introduces convenient abbreviations for network parts with
 similar properties: first-peer, last-peer, intra-domain, or
 inter-domain.

Tschofenig & Kroeselberg Informational [Page 3] RFC 4081 Security Threats for NSIS June 2005

   +------------------+   +---------------+   +------------------+
   |                  |   |               |   |                  |
   |  Administrative  |   | Intermediate  |   |  Administrative  |
   |     Domain A     |   |   Domains     |   |     Domain B     |
   |                  |   |               |   |                  |
   |                 (Inter-domain Communication)                |
   |        +-------->+---+<------------->+---+<--------+        |
   |  (Intra-domain   |   |               |   | (Intra-domain    |
   |   Communication) |   |               |   |  Communication)  |
   |        |         |   |               |   |         |        |
   |        v         |   |               |   |         v        |
   +--------+---------+   +---------------+   +---------+--------+
            ^                                           ^
            |                                           |
   First Peer Communication               Last Peer Communication
            |                                           |
            v                                           v
      +-----+-----+                               +-----+-----+
      |   NSIS    |                               |   NSIS    |
      | Initiator |                               | Responder |
      +-----------+                               +-----------+
               Figure 1: Communication patterns in NSIS
 First-Peer/Last-Peer Communication:
    The end-to-end communication scenario depicted in Figure 1
    includes the communication between the end hosts and their nearest
    NSIS hops.  "First-peer communications" refers to the peer-to-peer
    interaction between a signaling message originator, the NSIS
    Initiator (NI), and the first NSIS-aware entity along the path.
    This "first-peer communications" commonly comes with specific
    security requirements that are especially important for addressing
    security issues between the end host (and a user) and the network
    it is attached to.
    To illustrate this, in roaming environments, it is difficult to
    assume the existence of a pre-established security association
    directly available for NSIS peers involved in first-peer
    communications, because these peers cannot be assumed to have any
    pre-existing relationship with each other.  In contrast, in
    enterprise networks usually there is a fairly strong
    (pre-established) trust relationship between the peers.
    Enterprise network administrators usually have some degree of
    freedom to select the appropriate security protection and to
    enforce it.  The choice of selecting a security mechanism is
    therefore often influenced by the infrastructure already

Tschofenig & Kroeselberg Informational [Page 4] RFC 4081 Security Threats for NSIS June 2005

    available, and per-session negotiation of security mechanisms is
    often not required (although, in contrast, it is required in a
    roaming environment).
    Last-Peer communication is a variation of First-Peer communication
    in which the roles are reversed.
 Intra-Domain Communication:
    After verification of the NSIS signaling message at the border of
    an administrative domain, an NSIS signaling message traverses the
    network within the same administrative domain to which the first
    peer belongs.  It might not be necessary to repeat the
    authorization procedure of the NSIS initiator again at every NSIS
    node within this domain.  Key management within the administrative
    domain might also be simpler.
    Security protection is still required to prevent threats by
    non-NSIS nodes in this network.
 Inter-Domain Communication:
    Inter-Domain communication deals with the interaction between
    administrative domains.  For some NSLPs (for example, QoS NSLP),
    this interaction is likely to take place between neighboring
    domains, whereas in other NSLPs (such as the NAT/Firewall NSLP),
    the core network is usually not involved.
    If signaling messages are conveyed transparently in the core
    network (i.e., if they are neither intercepted nor processed in
    the core network), then the signaling message communications
    effectively takes place between access networks.  This might place
    a burden on authorization handling and on the key management
    infrastructure required between these access networks, which might
    not know of each other in advance.
 To refine the above differentiation based on the network parts that
 NSIS signaling may traverse, we subsequently consider relationships
 between involved entities.  Because a number of NSIS nodes might
 actively participate in a specific protocol exchange, a larger number
 of possible relationships need to be analyzed than in other
 protocols.  Figure 2 illustrates possible relationships between the
 entities involved in the NSIS protocol suite.

Tschofenig & Kroeselberg Informational [Page 5] RFC 4081 Security Threats for NSIS June 2005