summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7186.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc7186.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc7186.txt')
-rw-r--r--doc/rfc/rfc7186.txt1123
1 files changed, 1123 insertions, 0 deletions
diff --git a/doc/rfc/rfc7186.txt b/doc/rfc/rfc7186.txt
new file mode 100644
index 0000000..619a33b
--- /dev/null
+++ b/doc/rfc/rfc7186.txt
@@ -0,0 +1,1123 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) J. Yi
+Request for Comments: 7186 LIX, Ecole Polytechnique
+Category: Informational U. Herberg
+ISSN: 2070-1721 Fujitsu Laboratories of America
+ T. Clausen
+ LIX, Ecole Polytechnique
+ April 2014
+
+
+ Security Threats for the Neighborhood Discovery Protocol (NHDP)
+
+Abstract
+
+ This document analyzes common security threats of the Neighborhood
+ Discovery Protocol (NHDP) and describes their potential impacts on
+ Mobile Ad Hoc Network (MANET) routing protocols using NHDP. This
+ document is not intended to propose solutions to the threats
+ described.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7186.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Yi, et al. Informational [Page 1]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+Copyright Notice
+
+ Copyright (c) 2014 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 3. NHDP Threat Overview . . . . . . . . . . . . . . . . . . . . 4
+ 4. Detailed Threat Description . . . . . . . . . . . . . . . . . 5
+ 4.1. Jamming . . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 4.2. Denial-of-Service Attack . . . . . . . . . . . . . . . . 5
+ 4.3. Eavesdropping and Traffic Analysis . . . . . . . . . . . 6
+ 4.4. Incorrect HELLO Message Generation . . . . . . . . . . . 7
+ 4.4.1. Identity Spoofing . . . . . . . . . . . . . . . . . . 7
+ 4.4.2. Link Spoofing . . . . . . . . . . . . . . . . . . . . 8
+ 4.5. Replay Attack . . . . . . . . . . . . . . . . . . . . . . 9
+ 4.6. Message Timing Attacks . . . . . . . . . . . . . . . . . 9
+ 4.6.1. Interval Time Attack . . . . . . . . . . . . . . . . 10
+ 4.6.2. Validity Time Attack . . . . . . . . . . . . . . . . 10
+ 4.7. Indirect Channel Overloading . . . . . . . . . . . . . . 10
+ 4.8. Attack on Link Quality Update . . . . . . . . . . . . . . 11
+ 5. Impact of Inconsistent Information Bases on Protocols using
+ NHDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
+ 5.1. MPR Calculation . . . . . . . . . . . . . . . . . . . . . 12
+ 5.1.1. Flooding Disruption due to Identity Spoofing . . . . 12
+ 5.1.2. Flooding Disruption due to Link Spoofing . . . . . . 13
+ 5.1.3. Broadcast Storm . . . . . . . . . . . . . . . . . . . 14
+ 5.2. Routing Loops . . . . . . . . . . . . . . . . . . . . . . 15
+ 5.3. Invalid or Nonexistent Paths to Destinations . . . . . . 16
+ 5.4. Data Sinkhole . . . . . . . . . . . . . . . . . . . . . . 16
+ 6. Future Work . . . . . . . . . . . . . . . . . . . . . . . . . 16
+ 7. Security Considerations . . . . . . . . . . . . . . . . . . . 17
+ 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 18
+ 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 18
+ 9.1. Normative References . . . . . . . . . . . . . . . . . . 18
+ 9.2. Informative References . . . . . . . . . . . . . . . . . 18
+
+
+
+Yi, et al. Informational [Page 2]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+1. Introduction
+
+ The Neighborhood Discovery Protocol (NHDP) [RFC6130] allows routers
+ to acquire topological information up to two hops away from
+ themselves, by way of periodic HELLO message exchanges. The
+ information acquired by NHDP is used by other protocols, such as the
+ Optimized Link State Routing Protocol version 2 (OLSRv2) [RFC7181]
+ and Simplified Multicast Forwarding (SMF) [RFC6621]. The topology
+ information, acquired by way of NHDP, serves these routing protocols
+ by detecting and maintaining local 1-hop and 2-hop neighborhood
+ information.
+
+ As NHDP is typically used in wireless environments, it is potentially
+ exposed to different kinds of security threats, some of which are of
+ particular significance as compared to wired networks. As radio
+ signals can be received as well as transmitted by any compatible
+ wireless device within radio range, there is commonly no physical
+ protection as otherwise known for wired networks. NHDP does not
+ define any explicit security measures for protecting the integrity of
+ the information it acquires; however, it suggests that the integrity
+ protection be addressed in a fashion appropriate to the deployment of
+ the network.
+
+ This document is based on the assumption that no additional security
+ mechanism such as IPsec is used in the IP layer, as not all MANET
+ deployments may be able to accommodate such common IP protection
+ mechanisms (e.g., because of limited resources of MANET routers).
+ The document analyzes possible attacks on and misconfigurations of
+ NHDP and outlines the consequences of such attacks/misconfigurations
+ to the state maintained by NHDP in each router (and, thus, made
+ available to protocols using this state).
+
+ This document is not intended to propose solutions to the threats
+ described. [RFC7185] provides further information on how to enable
+ integrity protection to NHDP, which can help mitigating the threats
+ described related to identity spoofing.
+
+ It should be noted that many NHDP implementations are configurable,
+ and so an attack on the configuration system (such as [RFC6779]) can
+ be used to adversely affect the operation of an NHDP implementation.
+
+ The NHDP MIB module [RFC6779] might help monitoring some of the
+ security attacks mentioned in this document. [MGMT-SNAP] provides a
+ snapshot of OLSRv2-routed MANET management as currently deployed,
+ while [MANET-MGMT] is intended to provide specific guidelines on
+ MANET network management considering the various MIB modules that
+ have been written.
+
+
+
+
+Yi, et al. Informational [Page 3]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+2. Terminology
+
+ This document uses the terminology and notation defined in
+ "Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format"
+ [RFC5444], "Mobile Ad Hoc Network (MANET) Neighborhood Discovery
+ Protocol (NHDP)" [RFC6130], and "Internet Security Glossary, Version
+ 2" [RFC4949].
+
+ Additionally, this document introduces the following terminology:
+
+ NHDP router: A MANET router, running NHDP as specified in [RFC6130].
+
+ Attacker: A device that is present in the network and intentionally
+ seeks to compromise the information bases in NHDP routers.
+
+ Compromised NHDP router: An attacker that is present in the network
+ and generates syntactically correct NHDP control messages.
+ Control messages emitted by a compromised NHDP router may contain
+ additional information, or omit information, as compared to a
+ control message generated by a non-compromised NHDP router located
+ in the same topological position in the network.
+
+ Legitimate NHDP router: An NHDP router that is not a compromised
+ NHDP router.
+
+3. NHDP Threat Overview
+
+ NHDP defines a HELLO messages exchange, enabling each NHDP router to
+ acquire topological information describing its 1-hop and 2-hop
+ neighbors, and specifies information bases for recording this
+ information.
+
+ An NHDP router periodically transmits HELLO messages using a link-
+ local multicast on each of its interfaces with a hop-limit of 1
+ (i.e., HELLOs are never forwarded). In these HELLO messages, an NHDP
+ router announces the IP addresses as heard, symmetric, or lost
+ neighbor interface addresses.
+
+ An Attacker has several ways of harming this neighbor discovery
+ process: it can announce "wrong" information about its identity,
+ postulate nonexistent links, and replay HELLO messages. These
+ attacks are presented in detail in Section 4.
+
+ The different ways of attacking an NHDP deployment may eventually
+ lead to inconsistent information bases, not accurately reflecting the
+ correct topology of the MANET. The consequence is that protocols
+ using NHDP will base their operation on incorrect information,
+ causing routing protocols to not be able to calculate correct (or
+
+
+
+Yi, et al. Informational [Page 4]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ any) paths, degrade the performance of flooding operations based on
+ reduced relay sets, etc. These consequences to protocols using NHDP
+ are described in detail in Section 5.
+
+4. Detailed Threat Description
+
+ For each threat, a description of the mechanism of the corresponding
+ attack is given, followed by a description of how the attack affects
+ NHDP. The impacts from each attack on protocols using NHDP are given
+ in Section 5.
+
+ For simplicity in the description, the examples given assume that
+ NHDP routers have a single interface with a single IP address
+ configured. All the attacks apply, however, for NHDP routers with
+ multiple interfaces and multiple addresses as well.
+
+4.1. Jamming
+
+ One vulnerability, common for all protocols operating a wireless ad
+ hoc network, is that of "jamming", i.e., that a device generates
+ massive amounts of interfering radio transmissions, which will
+ prevent legitimate traffic (e.g., control traffic as well as data
+ traffic) on part of a network. Jamming is a form of interference and
+ overload with the threat consequence of disruption [RFC4593].
+
+ Depending on lower layers, this may not affect transmissions: HELLO
+ messages from an NHDP router with "jammed" interfaces may be received
+ by other NHDP routers. As NHDP identifies whether a link to a
+ neighbor is unidirectional or bidirectional, a routing protocol that
+ uses NHDP for neighborhood discovery may ignore a link from a jammed
+ NHDP router to a non-jammed NHDP router. The jammed router (a router
+ with jammed carrier) would appear simply as "disconnected" for the
+ unjammed part of the network, which is able to maintain accurate
+ topology maps.
+
+ If a considerable amount of HELLO messages are lost or corrupted due
+ to collisions caused by a jamming attack, neighbor NHDP routers are
+ not able to establish links between themselves any more. Thus, NHDP
+ will present empty information bases to the protocols using it.
+
+4.2. Denial-of-Service Attack
+
+ A denial-of-service (DoS) attack can be a result of misconfiguration
+ of legitimate NHDP routers (e.g., very short HELLO transmission
+ interval) or malicious behavior of compromised NHDP routers
+ [ACCT2012], so-called Byzantine routers [RFC4593]. DoS is a form of
+ interference and overload with the threat consequence of disruption
+ [RFC4593].
+
+
+
+Yi, et al. Informational [Page 5]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ By transmitting a huge amount of HELLO messages in a short period of
+ time, NHDP routers can increase channel occupation as described in
+ Section 4.1. Furthermore, a compromised NHDP router can spoof a
+ large amount of different IP addresses and send HELLOs to its
+ neighbors to fill their Link/Neighbor Sets. This may result in
+ memory overflow, and it makes the processing of legitimate HELLO
+ messages impossible. A compromised NHDP router can also use link
+ spoofing in its HELLO messages, generating huge 2-hop Sets in
+ adjacent NHDP routers and therefore potentially a memory overflow.
+ Moreover, protocols such as SMF and OLSRv2, using the 2-hop
+ information for multipoint relay (MPR) calculation, may exhaust the
+ available computational resources of the router if the Neighbor Set
+ and 2-hop Sets have too many entries.
+
+ By exhausting the memory, CPU, and/or channel resources of a router
+ in a DoS attack or a misconfiguration, NHDP routers may not be able
+ to accomplish their specified tasks of exchanging 1-hop and 2-hop
+ neighborhood information, and thereby disturbing the operation of
+ routing protocols using NHDP.
+
+ In some MANETs, the routers are powered by battery. Another
+ consequence of a DoS attack in such networks is that the power will
+ be drained quickly by unnecessary processing, transmitting, and
+ receiving of messages.
+
+4.3. Eavesdropping and Traffic Analysis
+
+ Eavesdropping, sometimes referred to as sniffing, is a common and
+ easy passive attack in a wireless environment. Once a packet is
+ transmitted, any adjacent NHDP router can potentially obtain a copy,
+ for immediate or later processing. Neither the source nor the
+ intended destination can detect this. A malicious NHDP router can
+ eavesdrop on the NHDP message exchange and thus learn the local
+ topology. It may also eavesdrop on data traffic to learn source and
+ destination addresses of data packets, or other header information,
+ as well as the packet payload.
+
+ Eavesdropping does not pose a direct threat to the network or to
+ NHDP, in as much as that it does not alter the information recorded
+ by NHDP in its information bases and presented to other protocols.
+ However, eavesdropping can provide network information required for
+ enabling other attacks, such as the identity of communicating NHDP
+ routers, detection of link characteristics, and NHDP router
+ configuration. The compromised NHDP routers may use the obtained
+ information to launch subsequent attacks, and they may also share
+ NHDP routing information with other NHDP or non-NHDP entities.
+ [RFC4593] would categorize the threat consequence as disclosure.
+
+
+
+
+Yi, et al. Informational [Page 6]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ Traffic analysis normally follows eavesdropping, which is the process
+ of intercepting messages in order to deduce information from
+ communication patterns. It can be performed even when HELLO messages
+ are encrypted (encryption is not a part of NHDP), for example:
+
+ o Triggered HELLO messages: an attacker could figure out that
+ messages are triggered and determine that there was a change of
+ symmetric neighbors of an NHDP router sending the HELLO (as well
+ get the frequency).
+
+ o Message size: the message grows exactly by x bytes per neighbor.
+ Depending on which cipher is used for the encryption, some
+ information about the size could be inferred, and thus the number
+ of neighbors could be guessed.
+
+ [RFC4593] would categorize the threat consequence as disclosure.
+
+4.4. Incorrect HELLO Message Generation
+
+ An NHDP router performs two distinct tasks: it periodically generates
+ HELLO messages, and it processes incoming HELLO messages from
+ neighbor NHDP routers. This section describes security attacks
+ involving the HELLO generation.
+
+4.4.1. Identity Spoofing
+
+ Identity spoofing implies that a compromised NHDP router sends HELLO
+ messages, pretending to have the identity of another NHDP router, or
+ even a router that does not exist in the networks. A compromised
+ NHDP router can accomplish this by using an IP address, which is not
+ its own, in an address block of a HELLO message, and associating this
+ address with a LOCAL_IF Address Block TLV [IJNSIA2010].
+
+ An NHDP router receiving that HELLO message from a neighbor will
+ assume that it originated from the NHDP router with the spoofed
+ interface address. As a consequence, it will add a Link Tuple to
+ that neighbor with the spoofed address, and include it in its next
+ HELLO messages as a heard neighbor (and possibly as a symmetric
+ neighbor after another HELLO exchange).
+
+ Identity spoofing is particularly harmful if a compromised NHDP
+ router spoofs the identity of another NHDP router that exists in the
+ same routing domain. With respect to NHDP, such a duplicated,
+ spoofed address can lead to an inconsistent state up to two hops from
+ an NHDP router. [RFC4593] would categorize the threat consequences
+ as disclosure and deception.
+
+
+
+
+
+Yi, et al. Informational [Page 7]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ Figure 1 depicts a simple example. In that example, NHDP router A is
+ in radio range of NHDP router C, but not of the compromised NHDP
+ router X. If X spoofs the address of A, that can lead to conflicts
+ for a routing protocol that uses NHDP, and therefore for wrong path
+ calculations as well as incorrect data traffic forwarding.
+
+ .---. .---. .---.
+ | A |----| C |----| X |
+ '---' '---' '---'
+
+ Figure 1
+
+ Figure 2 depicts another example. In this example, NHDP router A is
+ two hops away from NHDP router C, reachable through NHDP router B.
+ If the compromised NHDP router X spoofs the address of A, NHDP router
+ D will take A as its 1-hop neighbor, and C may think that A is indeed
+ reachable through D.
+
+ .---. .---. .---. .---. .---.
+ | A |----| B |----| C |----| D |----| X |
+ '---' '---' '---' '---' '---'
+
+ Figure 2
+
+4.4.2. Link Spoofing
+
+ Similar to identity spoofing, link spoofing implies that a
+ compromised NHDP router sends HELLO messages, signaling an incorrect
+ set of neighbors. This is sometimes referred to as falsification
+ [RFC4593], and in NHDP it may take either of two forms:
+
+ o A compromised NHDP router can postulate addresses of non-present
+ neighbor NHDP routers in an address block of a HELLO, associated
+ with LINK_STATUS TLVs.
+
+ o A compromised NHDP router can "ignore" otherwise existing
+ neighbors by not advertising them in its HELLO messages.
+
+ The effect of link spoofing with respect to NHDP are twofold,
+ depending on the two cases mentioned above:
+
+ o If the compromised NHDP router ignores existing neighbors in its
+ advertisements, links will be missing in the information bases
+ maintained by other routers, and there may not be any connectivity
+ for these NHDP routers to or from other NHDP routers in the MANET.
+
+
+
+
+
+
+Yi, et al. Informational [Page 8]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ o On the other hand, if the compromised NHDP router advertises
+ nonexistent links, this will lead to inclusion of topological
+ information in the information base, describing nonexistent links
+ in the network (which, then, may be used by other protocols using
+ NHDP in place of other, existing, links).
+
+ [RFC4593] would categorize the threat consequences as usurpation,
+ deception, and disruption.
+
+4.5. Replay Attack
+
+ A replay attack implies that control traffic from one region of the
+ network is recorded and replayed in a different region at (almost)
+ the same time, or in the same region at a different time. This may,
+ for example, happen when two compromised NHDP routers collaborate on
+ an attack, one recording traffic in its proximity and tunneling it to
+ the other compromised NHDP router, which replays the traffic. In a
+ protocol where links are discovered by testing reception, this will
+ result in extraneous link creation (basically, a "virtual" link
+ between the two compromised NHDP routers will appear in the
+ information bases of neighboring NHDP routers). [RFC4593] would
+ categorize this as a falsification and interference threat with
+ threat consequences of usurpation, deception, and disruption.
+
+ While this situation may result from an attack, it may also be
+ intentional: if data traffic is also relayed over the "virtual" link,
+ the link being detected is indeed valid for use. This is, for
+ instance, used in wireless repeaters. If data traffic is not carried
+ over the virtual link, an imaginary, useless link between the two
+ compromised NHDP routers has been advertised and is being recorded in
+ the information bases of their neighboring NHDP routers.
+
+ Compared to incorrect HELLO message attacks described in Section 4.4,
+ the messages used in replay attacks are legitimate messages sent out
+ by (non-malicious) NHDP routers and replayed at a later time or
+ different locality by malicious routers. This makes this kind of
+ attack harder to be detect and to counteract; integrity checks cannot
+ help in this case, as the original message's Integrity Check Value
+ (ICV) was correctly calculated.
+
+4.6. Message Timing Attacks
+
+ In NHDP, each HELLO message contains a "validity time" (the amount of
+ time that information in that control message should be considered
+ valid before being discarded) and may contain an "interval time"
+ field (the amount of time until the next control message of the same
+ type should be expected) [RFC5497].
+
+
+
+
+Yi, et al. Informational [Page 9]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+4.6.1. Interval Time Attack
+
+ A use of the expected interval between two successive HELLO messages
+ is for determining the link quality in NHDP: if messages are not
+ received within the expected intervals (e.g., a certain fraction of
+ messages are missing), then this may be used to exclude a link from
+ being considered as useful, even if (some) bidirectional
+ communication has been verified. If a compromised NHDP router X
+ spoofs the identity of an existing NHDP router A and sends HELLOs
+ indicating a low interval time, an NHDP router B receiving this HELLO
+ will expect the following HELLO to arrive within the interval time
+ indicated. If that expectation is not met, the link quality for the
+ link A-B will be decreased. Thus, X may cause NHDP router B's
+ estimate of the link quality for the link A-B to fall below the
+ minimum considered useful, so the link would not be used
+ [CPSCOM2011]. [RFC4593] would categorize the threat consequence as
+ usurpation.
+
+4.6.2. Validity Time Attack
+
+ A compromised NHDP router X can spoof the identity of an NHDP router
+ A and send a HELLO using a low validity time (e.g., 1 ms). A
+ receiving NHDP router B will discard the information upon expiration
+ of that interval, i.e., a link between NHDP router A and B will be
+ "torn down" by X. The sending of a low validity time can be caused
+ by intended malicious behaviors or simply misconfiguration in the
+ NHDP routers. [RFC4593] would categorize the threat consequence as
+ usurpation.
+
+4.7. Indirect Channel Overloading
+
+ Indirect Channel Overloading is when a compromised NHDP router X by
+ its actions causes other legitimate NHDP routers to generate
+ inordinate amounts of control traffic. This increases channel
+ occupation and the overhead in each receiving NHDP router that
+ processes this control traffic. With this traffic originating from
+ legitimate NHDP routers, the malicious device may remain undetected
+ in the wider network. It is a form of interference and overload with
+ the threat consequence of disruption [RFC4593].
+
+ Figure 3 illustrates Indirect Channel Overloading with NHDP. A
+ compromised NHDP router X advertises a symmetric spoofed link to the
+ nonexistent NHDP router B (at time t0). Router A selects X as MPR
+ upon reception of the HELLO then triggers a HELLO at t1. Overhearing
+ this triggered HELLO, the attacker sends another HELLO at t2,
+ advertising the link to B as lost; this causes NHDP router A to
+
+
+
+
+
+Yi, et al. Informational [Page 10]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ deselect the attacker as MPR, and to send another triggered message
+ at t3. The cycle may be repeated, where the link X-B is advertised
+ alternately as LOST and SYM.
+
+ MPRs(X) MPRs()
+ .---. .---. .---. .---.
+ | A | | A | | A | | A |
+ '---' '---' '---' '---'
+ | | | |
+ | SYM(B) | | LOST(B) |
+ | | | |
+ .---. .---. .---. .---.
+ | X | | X | | X | | X |
+ '---' '---' '---' '---'
+ . .
+ . .
+ . .
+ ..... .....
+ . B . . B .
+ ..... .....
+
+ t0 t1 t2 t3
+
+ Figure 3
+
+4.8. Attack on Link Quality Update
+
+ According to NHDP [RFC6130]:
+
+ Link quality is a mechanism whereby a router MAY take
+ considerations other than message exchange into account for
+ determining when a link is and is not a candidate for being
+ considered as HEARD or SYMMETRIC. As such, it is a "link
+ admission" mechanism.
+
+ Section 14.4 of NHDP [RFC6130] then lists several examples of which
+ information can be used to update link quality. One of the listed
+ examples uses packet exchanges between neighbor routers (as described
+ in [RFC5444]), e.g., an NHDP router may update the link quality of a
+ neighbor based on receipt or loss of packets if they include a
+ sequential packet sequence number.
+
+ NHDP does not specify how to acquire link quality updates
+ normatively; however, attack vectors may be introduced if an
+ implementation chooses to calculate link quality based on packet
+ sequence numbers. The consequences of such threats would depend on
+ specific implementations. For example, if the link quality update is
+ based on a sequential packet sequence number from neighbor routers, a
+
+
+
+Yi, et al. Informational [Page 11]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ compromised NHDP router can spoof packets appearing to be from
+ another legitimate NHDP router that skips some packet sequence
+ numbers. The NHDP router receiving the spoofed packets may degrade
+ the link quality as it appears that several packets have been
+ dropped. Eventually, the router may remove the neighbor when the
+ link quality drops below HYST_REJECT.
+
+5. Impact of Inconsistent Information Bases on Protocols using NHDP
+
+ This section describes the impact on protocols that use NHDP when
+ NHDP fails to obtain and represent accurate information, possibly as
+ a consequence of the attacks described in Section 4. This
+ description emphasizes the impacts on the MANET protocols OLSRv2
+ [RFC7181] and SMF [RFC6621].
+
+5.1. MPR Calculation
+
+ MPR selection (as used in [RFC7181] and [RFC6621], for example) uses
+ information about a router's 1-hop and 2-hop neighborhood, assuming
+ that (i) this information is accurate, and (ii) each 1-hop neighbor
+ is apt to act as MPR, depending on the willingness it reports. Thus,
+ a compromised NHDP router may seek to manipulate the 1-hop and 2-hop
+ neighborhood information in a router so as to cause the MPR selection
+ to fail, leading to a flooding disruption of traffic control
+ messages. This can result in incomplete topology advertisement or
+ can degrade the optimized flooding to classical flooding.
+
+5.1.1. Flooding Disruption due to Identity Spoofing
+
+ A compromised NHDP router can spoof the identify of other routers in
+ order to disrupt the MPR selection, so as to prevent certain parts of
+ the network from receiving flooded traffic [IJNSIA2010].
+
+ In Figure 4, a compromised NHDP router X spoofs the identity of B.
+ The link between X and C is correctly detected and listed in X's
+ HELLOs. Router A will receive HELLOs indicating links from B:{B-E},
+ X:{X-C, X-E}, and D:{D-E, D-C}, respectively. For router A, X and D
+ are equal candidates for MPR selection. To make sure the X can be
+ selected as MPR for router A, X can set its willingness to the
+ maximum value.
+
+
+
+
+
+
+
+
+
+
+
+Yi, et al. Informational [Page 12]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ .---. .---. .---.
+ | E |----| D |----| C |
+ '---' '---' '---'
+ | | .
+ | | .
+ .---. .---. .---.
+ | B |----| A |----| X |
+ '---' '---' '---'
+ spoofs B
+
+ Figure 4
+
+ If B and X (i) accept MPR selection and (ii) forward flooded traffic
+ as if they were both B, identity spoofing by X is harmless. However,
+ if X does not forward flooded traffic (i.e., does not accept MPR
+ selection), its presence entails flooding disruption: selecting B
+ over D renders C unreachable by flooded traffic.
+
+ .---.
+ | D |
+ '---'
+ |
+ |
+ .---. .---. .---. .---. .---.
+ | X |----| A |----| B |----| C |----| E |...
+ '---' '---' '---' '---' '---'
+ spoofs E
+
+ Figure 5
+
+ In Figure 5, the compromised NHDP router X spoofs the identity of E,
+ i.e., routers A and C both receive HELLOs from a router identifying
+ itself as E. For router B, routers A and C present the same neighbor
+ sets and are equal candidates for MPR selection. If router B selects
+ only router A as MPR, C will not relay flooded traffic from B or
+ transiting via B, and router X (and routers to the "right" of it)
+ will not receive flooded traffic.
+
+5.1.2. Flooding Disruption due to Link Spoofing
+
+ A compromised NHDP router can also spoof links to other NHDP routers,
+ thereby making itself appear as the most appealing candidate to be
+ MPR for its neighbors, possibly to the exclusion of other NHDP
+ routers in the neighborhood. (In particular, this can occur if the
+ compromised NHDP router spoofs links to all other NHDP routers in the
+ neighborhood, plus to one NHDP router outside the neighborhood.) By
+ thus excluding other legitimate NHDP routers from being selected as
+ MPR, the compromised NHDP router will receive and be expected to
+
+
+
+Yi, et al. Informational [Page 13]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ relay all flooded traffic (e.g., traffic control messages in OLSRv2
+ or data traffic in SMF) that it can then drop or otherwise
+ manipulate.
+
+ In the network in Figure 6, the compromised NHDP router X spoofs
+ links to the existing router C, as well as to a fictitious W. Router
+ A receives HELLOs from X and B, reporting X: {X-C, X-W}, B: {B-C}.
+ All else being equal, X appears a better choice for MPR than B, as X
+ appears to cover all neighbors of B, plus W.
+
+ ,---. .....
+ | S | . C .
+ '---' .....
+ | .
+ | .
+ .---. .---. .---. .---. .---.
+ | D |----| C |----| B |----| A |----| X |
+ '---' '---' '---' '---' '---'
+ .
+ .
+ .....
+ . W .
+ .....
+
+ Figure 6
+
+ As router A will not select B as MPR, B will not relay flooded
+ messages received from router A. The NHDP routers on the left of B
+ (starting with C) will, thus, not receive any flooded messages from
+ router A or transiting router A (e.g., a message originating from S).
+
+5.1.3. Broadcast Storm
+
+ A compromised NHDP router may attack the network by attempting to
+ degrade the performance of optimized flooding algorithms so as to be
+ equivalent to classic flooding. This can be achieved by forcing an
+ NHDP router into choosing all its 1-hop neighbors as MPRs. In
+ MANETs, a broadcast storm caused by classic flooding is a serious
+ problem that can result in redundancy, contention, and collisions
+ [MOBICOM99].
+
+ As shown in Figure 7, the compromised NHDP router X spoofs the
+ identity of NHDP router B and, spoofs a link to router Y {B-Y} (Y
+ does not have to exist). By doing so, the legitimate NHDP router A
+ has to select the legitimate NHDP router B as its MPR in order for it
+ to reach all its 2-hop neighbors. The compromised NHDP router Y can
+
+
+
+
+
+Yi, et al. Informational [Page 14]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ perform this identity-and-link spoofing for all of NHDP router A's
+ 1-hop neighbors, thereby forcing NHDP router A to select all its
+ neighbors as MPR and disabling the optimization sought by the MPR
+ mechanism.
+
+ .---.
+ | B |
+ '---'
+ |
+ |
+ .---. .---. .....
+ | A |----| X | . . . Y .
+ '---' '---' .....
+ spoofs B
+
+ Figure 7
+
+5.2. Routing Loops
+
+ Inconsistent information bases, provided by NHDP to other protocols,
+ can also cause routing loops. In Figure 8, the compromised NHDP
+ router X spoofs the identity of NHDP router E. NHDP router D has
+ data traffic to send to NHDP router A. The topology recorded in the
+ information base of router D indicates that the shortest path to
+ router A is {D->E->A}, because of the link {A-E} reported by X.
+ Therefore, the data traffic will be routed to NHDP router E. As the
+ link {A-E} does not exist in NHDP router E's information bases, it
+ will identify the next hop for data traffic to NHDP router A as being
+ NHDP router D. A loop between the NHDP routers D and E is thus
+ created.
+
+ .---. .---. .---. .---. .---.
+ | A |----| B |----| C |----| D |----| E |
+ '---' '---' '---' '---' '---'
+ |
+ |
+ .---.
+ | X |
+ '---'
+ spoofs E
+
+ Figure 8
+
+
+
+
+
+
+
+
+
+Yi, et al. Informational [Page 15]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+5.3. Invalid or Nonexistent Paths to Destinations
+
+ By reporting inconsistent topology information in NHDP, the invalid
+ links and routers can be propagated as link state information with
+ traffic control messages and results in route failure. As
+ illustrated in Figure 8, if NHDP router B tries to send data packets
+ to NHDP router E, it will choose router A as its next hop, based on
+ the information about the nonexistent link {A-E} reported by the
+ compromised NHDP router X.
+
+5.4. Data Sinkhole
+
+ With the ability to spoof multiple identities of legitimate NHDP
+ routers (by eavesdropping, for example), the compromised NHDP router
+ can represent a "data sinkhole" for its 1-hop and 2-hop neighbors.
+ Data packets that come across its neighbors may be forwarded to the
+ compromised NHDP router instead of to the real destination. The
+ packet can then be dropped, manipulated, duplicated, etc., by the
+ compromised NHDP router. As shown in Figure 8, if the compromised
+ NHDP router X spoofs the identity of NHDP router E, all the data
+ packets to E that cross NHDP routers A and B will be sent to NHDP
+ router X, instead of to E.
+
+6. Future Work
+
+ This document does not propose solutions to mitigate the security
+ threats described in Section 4. However, this section aims at
+ driving new work by suggesting which threats discussed in Section 4
+ could be addressed by deployments or applications.
+
+ o Section 4.1: Jamming - If a single router or a small area of the
+ MANET is jammed, protocols could be specified that increase link
+ metrics in NHDP for the jammed links. When a routing protocol
+ such as OLSRv2 uses NHDP for neighborhood discovery, other paths
+ leading "around" the jammed area would be preferred, and therefore
+ would mitigate the threat to some extent.
+
+ o Section 4.2: DoS - A DoS attack using a massive amount of HELLO
+ messages can be mitigated by admitting only trusted routers to the
+ network. [RFC7185] specifies a mechanism for adding Integrity
+ Check Values (ICVs) to HELLO messages and therefore providing an
+ admittance mechanism for NHDP routers to a MANET. (Note that
+ adding ICVs creates a new DoS attack vector, as ICV verification
+ requires CPU and memory resources.) However, using ICVs does not
+ address the problem of compromised routers. Detecting compromised
+ routers could be addressed in new work. [RFC7185] mandates
+ implementation of a security mechanism that is based on shared
+ keys and makes excluding single compromised routers difficult;
+
+
+
+Yi, et al. Informational [Page 16]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ work could be done to facilitate revocation mechanisms in certain
+ MANET use cases where routers have sufficient capabilities to
+ support asymmetric keys.
+
+ o Section 4.3: Eavesdropping - [RFC7185] adds ICVs to HELLO messages
+ but does not encrypt them. Therefore, eavesdropping of control
+ traffic is not mitigated. Future work could provide encryption of
+ control traffic for sensitive MANET topologies. Note that, other
+ than using a single shared secret key, providing encryption of
+ traffic among a set of neighbors (when that set is potentially
+ undetermined) is nontrivial, especially without multiplying
+ overheads. With traffic analysis, attackers could still deduce
+ the network information like HELLO message triggering and HELLO
+ message size, even though the HELLO messages are encrypted.
+
+ o Section 4.4.2: Link spoofing - [RFC7185] provides certain
+ protection against link spoofing, but an NHDP router has to
+ "trust" the originator of a HELLO that the advertised links are
+ correct. For example, if a router A reports a link to B, routers
+ receiving HELLOs from A have to trust that B is actually a
+ (symmetric) neighbor of A. New protocol work could address
+ protection of links without overly increasing the space and time
+ overheads. An immediate suggestion for deployments is to protect
+ routers against being compromised and to distribute keys only to
+ trusted routers.
+
+ o Section 4.5: Replay Attacks - [RFC7185] uses ICVs and timestamps
+ to provide some protection against replay attacks. It is still
+ feasible to replay control messages within a limited time. A
+ suggestion for deployments is to provide time synchronization
+ between routers. New work could provide time synchronization
+ mechanisms for certain MANET use cases or specify a mechanism
+ using nonces instead of timestamps in HELLO messages.
+
+ o Section 4.4.1: Identity spoofing; Section 4.6: Message timing
+ attacks; Section 4.7: Indirect channel overloading; and
+ Section 4.8: Attack on link quality update - [RFC7185] provides
+ protection against these attacks, assuming the routers are not
+ compromised.
+
+7. Security Considerations
+
+ This document does not specify a protocol or a procedure. The
+ document, however, reflects on security considerations for NHDP and
+ MANET routing protocols using NHDP for neighborhood discovery.
+
+
+
+
+
+
+Yi, et al. Informational [Page 17]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+8. Acknowledgments
+
+ The authors would like to gratefully acknowledge the following people
+ for valuable comments and technical discussions: Teco Boot, Henning
+ Rogge, Christopher Dearlove, John Dowdell, Joseph Macker, and all the
+ other participants of the IETF MANET working group.
+
+9. References
+
+9.1. Normative References
+
+ [RFC5444] Clausen, T., Dearlove, C., Dean, J., and C. Adjih,
+ "Generalized Mobile Ad Hoc Network (MANET) Packet/Message
+ Format", RFC 5444, February 2009.
+
+ [RFC5497] Clausen, T. and C. Dearlove, "Representing Multi-Value
+ Time in Mobile Ad Hoc Networks (MANETs)", RFC 5497, March
+ 2009.
+
+ [RFC6130] Clausen, T., Dearlove, C., and J. Dean, "Mobile Ad Hoc
+ Network (MANET) Neighborhood Discovery Protocol (NHDP)",
+ RFC 6130, April 2011.
+
+9.2. Informative References
+
+ [ACCT2012] Jhaveri, R. and S. Patel, "DoS Attacks in Mobile Ad Hoc
+ Networks: A Survey", Second International Conference on
+ Advanced Computing & Communication Technologies (ACCT),
+ January 2012.
+
+ [CPSCOM2011]
+ Yi, J., Clausen, T., and U. Herberg, "Vulnerability
+ Analysis of the Simple Multicast Forwarding (SMF) Protocol
+ for Mobile Ad Hoc Networks", Proceedings of the IEEE
+ International Conference on Cyber, Physical, and Social
+ Computing (CPSCom), October 2011.
+
+ [IJNSIA2010]
+ Herberg, U. and T. Clausen, "Security Issues in the
+ Optimized Link State Routing Protocol version 2",
+ International Journal of Network Security & Its
+ Applications, April 2010.
+
+ [MANET-MGMT]
+ Nguyen, J., Cole, R., Herberg, U., Yi, J., and J. Dean,
+ "Network Management of Mobile Ad hoc Networks (MANET):
+ Architecture, Use Cases, and Applicability", Work in
+ Progress, February 2013.
+
+
+
+Yi, et al. Informational [Page 18]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+ [MGMT-SNAP]
+ Clausen, T. and U. Herberg, "Snapshot of OLSRv2-Routed
+ MANET Management", Work in Progress, February 2014.
+
+ [MOBICOM99]
+ Ni, S., Tseng, Y., Chen, Y., and J. Sheu, "The Broadcast
+ Storm Problem in a Mobile Ad Hoc Network", Proceedings of
+ the 5th annual ACM/IEEE international conference on Mobile
+ computing and networking, 1999.
+
+ [RFC4593] Barbir, A., Murphy, S., and Y. Yang, "Generic Threats to
+ Routing Protocols", RFC 4593, October 2006.
+
+ [RFC4949] Shirey, R., "Internet Security Glossary, Version 2", RFC
+ 4949, August 2007.
+
+ [RFC6621] Macker, J., "Simplified Multicast Forwarding", RFC 6621,
+ May 2012.
+
+ [RFC6779] Herberg, U., Cole, R., and I. Chakeres, "Definition of
+ Managed Objects for the Neighborhood Discovery Protocol",
+ RFC 6779, October 2012.
+
+ [RFC7181] Clausen, T., Dearlove, C., Jacquet, P., and U. Herberg,
+ "The Optimized Link State Routing Protocol Version 2", RFC
+ 7181, April 2014.
+
+ [RFC7185] Herberg, U., Dearlove, C., and T. Clausen, "Integrity
+ Protection for the Neighborhood Discovery Protocol (NHDP)
+ and Optimized Link State Routing Protocol Version 2
+ (OLSRv2)", RFC 7185, April 2014.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Yi, et al. Informational [Page 19]
+
+RFC 7186 Security Threats for NHDP April 2014
+
+
+Authors' Addresses
+
+ Jiazi Yi
+ LIX, Ecole Polytechnique
+ 91128 Palaiseau Cedex
+ France
+
+ Phone: +33 1 77 57 80 85
+ EMail: jiazi@jiaziyi.com
+ URI: http://www.jiaziyi.com/
+
+
+ Ulrich Herberg
+ Fujitsu Laboratories of America
+ 1240 E Arques Ave
+ Sunnyvale, CA 94085
+ USA
+
+ EMail: ulrich@herberg.name
+ URI: http://www.herberg.name/
+
+
+ Thomas Heide Clausen
+ LIX, Ecole Polytechnique
+ 91128 Palaiseau Cedex
+ France
+
+ Phone: +33 6 6058 9349
+ EMail: T.Clausen@computer.org
+ URI: http://www.thomasclausen.org/
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Yi, et al. Informational [Page 20]
+