diff options
Diffstat (limited to 'doc/rfc/rfc5713.txt')
-rw-r--r-- | doc/rfc/rfc5713.txt | 1011 |
1 files changed, 1011 insertions, 0 deletions
diff --git a/doc/rfc/rfc5713.txt b/doc/rfc/rfc5713.txt new file mode 100644 index 0000000..a76a4c1 --- /dev/null +++ b/doc/rfc/rfc5713.txt @@ -0,0 +1,1011 @@ + + + + + + +Internet Engineering Task Force (IETF) H. Moustafa +Request for Comments: 5713 France Telecom +Category: Informational H. Tschofenig +ISSN: 2070-1721 Nokia Siemens Networks + S. De Cnodder + Alcatel-Lucent + January 2010 + + + Security Threats and Security Requirements for the + Access Node Control Protocol (ANCP) + +Abstract + + The Access Node Control Protocol (ANCP) aims to communicate Quality + of Service (QoS)-related, service-related, and subscriber-related + configurations and operations between a Network Access Server (NAS) + and an Access Node (e.g., a Digital Subscriber Line Access + Multiplexer (DSLAM)). The main goal of this protocol is to allow the + NAS to configure, manage, and control access equipment, including the + ability for the Access Nodes to report information to the NAS. + + This present document investigates security threats that all ANCP + nodes could encounter. This document develops a threat model for + ANCP security, with the aim of deciding which security functions are + required. Based on this, security requirements regarding the Access + Node Control Protocol are defined. + + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc5713. + + + + + + + +Moustafa, et al. Informational [Page 1] + +RFC 5713 ANCP Threats January 2010 + + +Copyright Notice + + Copyright (c) 2010 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + + 1. Introduction ....................................................3 + 2. Specification Requirements ......................................3 + 3. System Overview and Threat Model ................................4 + 4. Objectives of Attackers .........................................7 + 5. Potential Attacks ...............................................7 + 5.1. Denial of Service (DoS) ....................................7 + 5.2. Integrity Violation ........................................8 + 5.3. Downgrading ................................................8 + 5.4. Traffic Analysis ...........................................8 + 5.5. Management Attacks .........................................8 + 6. Attack Forms ....................................................9 + 7. Attacks against ANCP ...........................................10 + 7.1. Dynamic Access-Loop Attributes ............................11 + 7.2. Access-Loop Configuration .................................12 + 7.3. Remote Connectivity Test ..................................14 + 7.4. Multicast .................................................14 + 8. Security Requirements ..........................................16 + 9. Security Considerations ........................................16 + 10. Acknowledgments ...............................................17 + 11. References ....................................................17 + 11.1. Normative References .....................................17 + 11.2. Informative References ...................................17 + + + + + + + + + + + +Moustafa, et al. Informational [Page 2] + +RFC 5713 ANCP Threats January 2010 + + +1. Introduction + + The Access Node Control Protocol (ANCP) aims to communicate QoS- + related, service-related, and subscriber-related configurations and + operations between a Network Access Server (NAS) and an Access Node + (e.g., a Digital Subscriber Line Access Multiplexer (DSLAM)). + + [ANCP-FRAME] illustrates the framework, usage scenarios, and general + requirements for ANCP. This document focuses on describing security + threats and deriving security requirements for the Access Node + Control Protocol, considering the ANCP use cases defined in + [ANCP-FRAME] as well as the guidelines for IETF protocols' security + requirements given in [RFC3365]. Section 5 and Section 6, + respectively, describe the potential attacks and the different attack + forms that are liable to take place within ANCP, while Section 7 + applies the described potential attacks to ANCP and its different use + cases. Security policy negotiation, including authentication and + authorization to define the per-subscriber policy at the policy/AAA + (Authentication, Authorization, and Accounting) server, is out of the + scope of this work. As a high-level summary, the following aspects + need to be considered: + + Message Protection: + + Signaling message content can be protected against eavesdropping, + modification, injection, and replay while in transit. This + applies to both ANCP headers and payloads. + + Prevention against Impersonation: + + It is important that protection be available against a device + impersonating an ANCP node (i.e., an unauthorized device + generating an ANCP message and pretending it was generated by a + valid ANCP node). + + Prevention of Denial-of-Service Attacks: + + ANCP nodes and the network have finite resources (state storage, + processing power, bandwidth). It is important to protect against + exhaustion attacks on these resources and to prevent ANCP nodes + from being used to launch attacks on other network elements. + +2. Specification Requirements + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119], with the + + + + +Moustafa, et al. Informational [Page 3] + +RFC 5713 ANCP Threats January 2010 + + + qualification that, unless otherwise stated, they apply to the design + of the Access Node Control Protocol (ANCP), not its implementation or + application. + + The relevant components are described in Section 3. + +3. System Overview and Threat Model + + As described in [ANCP-FRAME] and schematically shown in Figure 1, the + Access Node Control system consists of the following components: + + Network Access Server (NAS): + + A NAS provides access to a service (e.g., network access) and + operates as a client of the AAA protocol. The AAA client is + responsible for passing authentication information to designated + AAA servers and then acting on the response that is returned. + + Authentication, Authorization, and Accounting (AAA) server: + + A AAA server is responsible for authenticating users, authorizing + access to services, and returning authorization information + (including configuration parameters) back to the AAA client to + deliver service to the user. As a consequence, service usage + accounting might be enabled and information about the user's + resource usage will be sent to the AAA server. + + Access Node (AN): + + The AN is a network device, usually located at a service provider + central office or street cabinet, that terminates access-loop + connections from subscribers. In case the access loop is a + Digital Subscriber Line (DSL), this is often referred to as a DSL + Access Multiplexer (DSLAM). + + Customer Premises Equipment (CPE): + + A CPE is a device located inside a subscriber's premise that is + connected at the LAN side of the Home Gateway (HGW). + + Home Gateway (HGW): + + The HGW connects the different Customer Premises Equipments (CPEs) + to the Access Node and the access network. In case of DSL, the + HGW is a DSL Network Termination (NT) that could either operate as + a layer 2 bridge or as a layer 3 router. In the latter case, such + a device is also referred to as a Routing Gateway (RG). + + + + +Moustafa, et al. Informational [Page 4] + +RFC 5713 ANCP Threats January 2010 + + + Aggregation Network: + + The aggregation network provides traffic aggregation from multiple + ANs towards the NAS. ATM or Ethernet transport technologies can + be used. + + For the threat analysis, this document focuses on the ANCP + communication between the Access Node and the NAS. However, + communications with the other components (such as HGW, CPE, and the + AAA server) play a role in the understanding of the system + architecture and of what triggers ANCP communications. Note that the + NAS and the AN might belong to two different administrative realms. + The threat model and the security requirements in this document + consider this latter case. + + + +--------+ + | AAA | + | Server | + +--------+ + | + | + +---+ +---+ +------+ +-----------+ +-----+ +--------+ + |CPE|---|HGW|---| | |Aggregation| | | | | + +---+ +---+ |Access| | Network | | | |Internet| + | Node |----| |----| NAS |---| / | + +---+ +---+ | (AN) | | | | | |Regional| + |CPE|---|HGW|---| | | | | | |Network | + +---+ +---+ +------+ +-----------+ +-----+ +--------+ + + Figure 1: System Overview + + In the absence of an attack, the NAS receives configuration + information from the AAA server related to a CPE attempting to access + the network. A number of parameters, including Quality of Service + information, need to be conveyed to the Access Node in order to + become effective. The Access Node Control Protocol is executed + between the NAS and the AN to initiate control requests. The AN + returns responses to these control requests and provides information + reports. + + For this to happen, the following individual steps must occur: + + o The AN discovers the NAS. + + o The AN needs to start the protocol communication with the NAS to + announce its presence. + + + + +Moustafa, et al. Informational [Page 5] + +RFC 5713 ANCP Threats January 2010 + + + o The AN and the NAS perform a capability exchange. + + o The NAS sends requests to the AN. + + o The AN processes these requests, authorizes the actions, and + responds with the appropriate answer. In order to fulfill the + commands, it might be necessary for the AN to communicate with the + HGW or other nodes, for example, as part of a keep-alive + mechanism. + + o The AN provides status reports to the NAS. + + Attackers can be: + + o off-path, i.e., they cannot see the messages exchanged between the + AN and the NAS; + + o on-path, i.e., they can see the messages exchanged between the AN + and the NAS. + + Both off-path and on-path attackers can be: + + o passive, i.e., they do not participate in the network operation + but rather listen to all transfers to obtain the maximum possible + information; + + o active, i.e., they participate in the network operation and can + inject falsified packets. + + We assume the following threat model: + + o An off-path adversary located at the CPE or the HGW. + + o An off-path adversary located on the Internet or a regional + network that connects one or more NASes and associated access + networks to Network Service Providers (NSPs) and Application + Service Providers (ASPs). + + o An on-path adversary located at network elements between the AN + and the NAS. + + o An on-path adversary taking control over the NAS. + + o An on-path adversary taking control over the AN. + + + + + + + +Moustafa, et al. Informational [Page 6] + +RFC 5713 ANCP Threats January 2010 + + +4. Objectives of Attackers + + Attackers may direct their efforts either against an individual + entity or against a large portion of the access network. Attacks + fall into three classes: + + o Attacks to disrupt the communication for individual customers. + + o Attacks to disrupt the communication of a large fraction of + customers in an access network. These also include attacks to the + network itself or a portion of it, such as attacks to disrupt the + network services or attacks to destruct the network functioning. + + o Attacks to gain profit for the attacker through modifying the QoS + settings. Also, through replaying old packets (of another + privileged client, for instance), an attacker can attempt to + configure a better QoS profile on its own DSL line, increasing its + own benefit. + +5. Potential Attacks + + This section discusses the different types of attacks against ANCP, + while Section 6 describes the possible means of their occurrence. + + ANCP is mainly susceptible to the following types of attacks: + +5.1. Denial of Service (DoS) + + A number of denial-of-service (DoS) attacks can cause ANCP nodes to + malfunction. When state is established or certain functions are + performed without requiring prior authorization, there is a chance to + mount denial-of-service attacks. An adversary can utilize this fact + to transmit a large number of signaling messages to allocate state at + nodes and to cause consumption of resources. Also, an adversary, + through DoS, can prevent certain subscribers from accessing certain + services. Moreover, DoS can take place at the AN or the NAS + themselves, where it is possible for the NAS (or the AN) to + intentionally ignore the requests received from the AN (or the NAS) + through not replying to them. This causes the sender of the request + to retransmit the request, which might allocate additional state at + the sender side to process the reply. Allocating more state may + result in memory depletion. + + + + + + + + + +Moustafa, et al. Informational [Page 7] + +RFC 5713 ANCP Threats January 2010 + + +5.2. Integrity Violation + + Adversaries gaining illegitimate access on the transferred messages + can act on these messages, causing integrity violation. Integrity + violation can cause unexpected network behavior, leading to a + disturbance in the network services as well as in the network + functioning. + +5.3. Downgrading + + Protocols may be useful in a variety of scenarios with different + security and functional requirements. Different parts of a network + (e.g., within a building, across a public carrier's network, or over + a private microwave link) may need different levels of protection. + It is often difficult to meet these (sometimes conflicting) + requirements with a single mechanism or fixed set of parameters; + thus, often a selection of mechanisms and parameters is offered. A + protocol is required to agree on certain (security) mechanisms and + parameters. An insecure parameter exchange or security negotiation + protocol can give an adversary the opportunity to mount a downgrading + attack to force selection of mechanisms weaker than those mutually + desired. Thus, without binding the negotiation process to the + legitimate parties and protecting it, ANCP might only be as secure as + the weakest mechanism provided (e.g., weak authentication) and the + benefits of defining configuration parameters and a negotiation + protocol are lost. + +5.4. Traffic Analysis + + An adversary can be placed at the NAS, the AN, or any other network + element capturing all traversing packets. Adversaries can thus have + unauthorized information access. As well, they can gather + information relevant to the network and then use this information in + gaining later unauthorized access. This attack can also help + adversaries in other malicious purposes -- for example, capturing + messages sent from the AN to the NAS announcing that a DSL line is up + and containing some information related to the connected client. + This could be any form of information about the client and could also + be an indicator of whether or not the DSL subscriber is at home at a + particular moment. + +5.5. Management Attacks + + Since the ANCP sessions are configured in the AN and not in the NAS + [ANCP-FRAME], most configurations of ANCP are done in the AN. + Consequently, the management attacks to ANCP mainly concern the AN + configuration phase. In this context, the AN MIB module could create + disclosure- and misconfiguration-related attacks. [ANCP-MIB] defines + + + +Moustafa, et al. Informational [Page 8] + +RFC 5713 ANCP Threats January 2010 + + + the vulnerabilities on the management objects within the AN MIB + module. These attacks mainly concern the unauthorized changes of the + management objects, leading to a number of attacks such as session + deletion, a session using an undesired/unsupported protocol, + disabling certain ANCP capabilities or enabling undesired + capabilities, ANCP packets being sent out to the wrong interface (and + thus being received by an unintended receiver), harming the + synchronization between the AN and the NAS, and impacting traffic in + the network other than ANCP. + +6. Attack Forms + + The attacks mentioned above in Section 5 can be carried out through + the following means: + + Message Replay: + + This threat scenario covers the case in which an adversary + eavesdrops, collects signaling messages, and replays them at a + later time (or at a different place or in a different way; e.g., + cut-and-paste attacks). Through replaying signaling messages, an + adversary might mount denial-of-service and theft-of-service + attacks. + + Faked Message Injection: + + An adversary may be able to inject false error or response + messages, causing unexpected protocol behavior and succeeding with + a DoS attack. This could be achieved at the signaling-protocol + level, at the level of specific signaling parameters (e.g., QoS + information), or at the transport layer. An adversary might, for + example, inject a signaling message to request allocation of QoS + resources. As a consequence, other users' traffic might be + impacted. The discovery protocol, especially, exhibits + vulnerabilities with regard to this threat scenario. + + Messages Modification: + + This involves integrity violation, where an adversary can modify + signaling messages in order to cause unexpected network behavior. + Possible related actions an adversary might consider for its + attack are the reordering and delaying of messages, causing a + protocol's process failure. + + + + + + + + +Moustafa, et al. Informational [Page 9] + +RFC 5713 ANCP Threats January 2010 + + + Man-in-the-Middle: + + An adversary might claim to be a NAS or an AN, acting as a man-in- + the-middle to later cause communication and services disruption. + The consequence can range from DoS to fraud. An adversary acting + as a man-in-the-middle could modify the intercepted messages, + causing integrity violation, or could drop or truncate the + intercepted messages, causing DoS and a protocol's process + failure. In addition, a man-in-the-middle adversary can signal + information to an illegitimate entity in place of the right + destination. In this case, the protocol could appear to continue + working correctly. This may result in an AN contacting a wrong + NAS. For the AN, this could mean that the protocol failed for + unknown reasons. A man-in-the-middle adversary can also cause + downgrading attacks through initiating faked configuration + parameters and through forcing selection of weak security + parameters or mechanisms. + + Eavesdropping: + + This is related to adversaries that are able to eavesdrop on + transferred messages. The collection of the transferred packets + by an adversary may allow traffic analysis or be used later to + mount replay attacks. The eavesdropper might learn QoS + parameters, communication patterns, policy rules for firewall + traversal, policy information, application identifiers, user + identities, NAT bindings, authorization objects, network + configuration, performance information, and more. + +7. Attacks against ANCP + + ANCP is susceptible to security threats, causing disruption/ + unauthorized access to network services, manipulation of the + transferred data, and interference with network functions. Based on + the threat model given in Section 3 and the potential attacks + presented in Section 5, this section describes the possible attacks + against ANCP, considering the four use cases defined in [ANCP-FRAME]. + + Although ANCP is not involved in the communication between the NAS + and the AAA/policy server, the secure communication between the NAS + and the AAA/policy server is important for ANCP security. + Consequently, this document considers the attacks that are related to + the ANCP operation associated with the communication between the NAS + and the AAA/Policy server. In other words, the threat model and + security requirements in this document take into consideration the + data transfer between the NAS and the AAA server, when this data is + used within the ANCP operation. + + + + +Moustafa, et al. Informational [Page 10] + +RFC 5713 ANCP Threats January 2010 + + + Besides the attacks against the four ANCP use cases described in the + following subsections, ANCP is susceptible to a number of attacks + that can take place during the protocol-establishment phase. These + attacks are mainly on-path attacks, taking the form of DoS or man-in- + the-middle attacks, which could be as follows: + + o Attacks during the session initiation from the AN to the NAS: + DoS attacks could take place affecting the session-establishment + process. Also, man-in-the-middle attacks could take place, + causing message truncation or message modification and leading to + session-establishment failure. + + o Attacks during the peering establishment: + DoS attacks could take place during state synchronization between + the AN and the NAS. Also, man-in-the-middle attacks could take + place through message modification during identity discovery, + which may lead to loss of contact between the AN and the NAS. + + o Attacks during capabilities negotiation: + Message replay could take place, leading to DoS. Also, man-in- + the-middle attacks could take place, leading to message + modification, message truncation, or downgrading through + advertising lesser capabilities. + +7.1. Dynamic Access-Loop Attributes + + This use case concerns the communication of access-loop attributes + for dynamic, access-line topology discovery. Since the access-loop + rate may change over time, advertisement is beneficial to the NAS to + gain knowledge about the topology of the access network for QoS + scheduling. Besides data rates and access-loop links identification, + other information may also be transferred from the AN to the NAS + (examples in case of a DSL access loop are DSL type, maximum + achievable data rate, and maximum data rate configured for the access + loop). This use case is thus vulnerable to a number of on-path and + off-path attacks that can be either active or passive. + + On-path attacks can take place between the AN and the NAS, on the AN + or on the NAS, during the access-loop attributes transfer. These + attacks may be: + + o Active, acting on the transferred attributes and injecting + falsified packets. The main attacks here are: + + * Man-in-the-middle attacks can cause access-loop attributes + transfer between the AN and a forged NAS or a forged AN and the + NAS, which can directly cause faked attributes and message + modification or truncation. + + + +Moustafa, et al. Informational [Page 11] + +RFC 5713 ANCP Threats January 2010 + + + * Signaling replay, by an attacker between the AN and the NAS, on + the AN or on the NAS itself, causing DoS. + + * An adversary acting as man-in-the-middle can cause downgrading + through changing the actual data rate of the access loop, which + impacts the downstream shaping from the NAS. + + o Passive, only learning these attributes. The main attacks here + are caused by: + + * Eavesdropping through learning access-loop attributes and + information about the clients' connection state, and thus + impacting their privacy protection. + + * Traffic analysis allowing unauthorized information access, + which could allow later unauthorized access to the NAS. + + Off-path attacks can take place on the Internet, affecting the + access-loop attribute sharing between the NAS and the AAA/policy + server. These attacks may be: + + o Active attacks, which are mainly concerning: + + * DoS through flooding the communication links to the AAA/policy + server, causing service disruption. + + * Man-in-the-middle, causing access-loop configuration retrieval + by an illegitimate NAS. + + o Passive attacks, gaining information on the access-loop + attributes. The main attacks in this case are: + + * Eavesdropping through learning access-loop attributes and + learning information about the clients' connection states, and + thus impacting their privacy protection. + + * Traffic analysis allowing unauthorized information access, + which could allow later unauthorized access to the NAS. + +7.2. Access-Loop Configuration + + This use case concerns the dynamic, local-loop line configuration + through allowing the NAS to change the access-loop parameters (e.g., + rate) in a dynamic fashion. This allows for centralized, subscriber- + related service data. This dynamic configuration can be achieved, + for instance, through profiles that are pre-configured on ANs. This + use case is vulnerable to a number of on-path and off-path attacks. + + + + +Moustafa, et al. Informational [Page 12] + +RFC 5713 ANCP Threats January 2010 + + + On-path attacks can take place where the attacker is between the AN + and the NAS, is on the AN, or is on the NAS. These can be as + follows: + + o Active attacks, taking the following forms: + + * DoS attacks of the AN can take place by an attacker, through + replaying the Configure Request messages. + + * An attacker on the AN can prevent the AN from reacting on the + NAS request for the access-loop configuration, leading to the + NAS continually sending the Configure Request message and, + hence, allocating additional states. + + * Damaging clients' profiles at ANs can take place by adversaries + that gained control on the network through discovery of users' + information from a previous traffic analysis. + + * An adversary can replay old packets, modify messages, or inject + faked messages. Such adversary can also be a man-in-the- + middle. These attack forms can be related to a privileged + client profile (having more services) in order to configure + this profile on the adversary's own DSL line, which is less + privileged. In order that the attacker does not expose its + identity, he may also use these attack forms related to the + privileged client profile to configure a number of illegitimate + DSL lines. The adversary can also force configuration + parameters other than the selected ones, leading to, for + instance, downgrading the service for a privileged client. + + o Passive attacks, where the attacker listens to the ANCP messages. + This can take place as follows: + + * Learning configuration attributes is possible during the update + of the access-loop configuration. An adversary might profit to + see the configuration that someone else gets (e.g., one ISP + might be interested to know what the customers of another ISP + get and therefore might break into the AN to see this). + + Off-path attacks can take place as follows: + + o An off-path passive adversary on the Internet can exert + eavesdropping during the access-loop configuration retrieval by + the NAS from the AAA/policy server. + + + + + + + +Moustafa, et al. Informational [Page 13] + +RFC 5713 ANCP Threats January 2010 + + + o An off-path active adversary on the Internet can threaten the + centralized subscribers-related service data in the AAA/policy + server through, for instance, making subscribers' records + inaccessible. + +7.3. Remote Connectivity Test + + In this use case, the NAS can carry out a Remote Connectivity Test + using ANCP to initiate an access-loop test between the AN and the + HGW. Thus, multiple access-loop technologies can be supported. This + use case is vulnerable to a number of active attacks. Most of the + attacks in this use case concern the network operation. + + On-path active attacks can take place in the following forms: + + o Man-in-the-middle attack during the NAS's triggering to the AN to + carry out the test, where an adversary can inject falsified + signals or can truncate the triggering. + + o Message modification can take place during the Subscriber Response + message transfer from the AN to the NAS announcing the test + results, causing failure of the test operation. + + o An adversary on the AN can prevent the AN from sending the + Subscriber Response message to the NAS announcing the test + results, and hence the NAS will continue triggering the AN to + carry out the test, which results in more state being allocated at + the NAS. This may result in unavailability of the NAS to the ANs. + + Off-path active attacks can take place as follows: + + o An adversary can cause DoS during the access-loop test, in case of + an ATM-based access loop, when the AN generates loopback cells. + This can take place through signal replaying. + + o Message truncating can take place by an adversary during the + access-loop test, which can lead to service disruption due to + assumption of test failures. + +7.4. Multicast + + In this use case, ANCP could be used in exchanging information + between the AN and the NAS, allowing the AN to perform replication + inline with the policy and configuration of the subscriber. Also, + this allows the NAS to follow subscribers' multicast (source, group) + membership and control replication performed by the AN. Four + multicast use cases are expected to take place, making use of ANCP; + these are typically multicast conditional access, multicast admission + + + +Moustafa, et al. Informational [Page 14] + +RFC 5713 ANCP Threats January 2010 + + + control, multicast accounting, and spontaneous admission response. + This section gives a high-level description of the possible attacks + that can take place in these cases. Attacks that can occur are + mostly active attacks. + + On-path active attacks can be as follows: + + o DoS attacks, causing inability for certain subscribers to access + particular multicast streams or only access the multicast stream + at a reduced bandwidth, impacting the quality of the possible + video stream. This can take place through message replay by an + attacker between the AN and the NAS, on the AN or on the NAS. + Such DoS attacks can also be done by tempering, for instance, with + white/black list configuration or by placing attacks to the + bandwidth-admission-control mechanism. + + o An adversary on the NAS can prevent the NAS from reacting on the + AN requests for white/black/grey lists or for admission control + for the access line. The AN in this case would not receive a + reply and would continue sending its requests, resulting in more + states being allocated at the AN. A similar case happens for + admission control when the NAS can also send requests to the AN. + When the NAS does not receive a response, it could also retransmit + requests, resulting in more state being allocated at the NAS side + to process responses. This may result in the unavailability of + the NAS to the ANs. + + o Man-in-the-middle, causing the exchange of messages between the AN + and a forged NAS or a forged AN and the NAS. This can lead to the + following: + + * Message modification, which can cause service downgrading for + legitimate subscribers -- for instance, an illegitimate change + of a subscriber's policy. + + * Message truncation between the AN and the NAS, which can result + in the non-continuity of services. + + * Message replay between the AN and the NAS, on the AN or on the + NAS, leading to a DoS or services fraud. + + * Message modification to temper with accounting information, for + example, in order to avoid service charges or, conversely, in + order to artificially increase service charges on other users. + + + + + + + +Moustafa, et al. Informational [Page 15] + +RFC 5713 ANCP Threats January 2010 + + + An off-path active attack is as follows: + + o DoS could take place through message replay of join/leave requests + by the HGW or CPE, frequently triggering the ANCP activity between + the AN and the NAS. DoS could also result from generating heaps + of IGMP join/leaves by the HGW or CPE, leading to very high rate + of ANCP query/response. + +8. Security Requirements + + This section presents a number of requirements motivated by the + different types of attacks defined in the previous section. These + requirements are as follows: + + o The protocol solution MUST offer authentication of the AN to the + NAS. + + o The protocol solution MUST offer authentication of the NAS to the + AN. + + o The protocol solution MUST allow authorization to take place at + the NAS and the AN. + + o The protocol solution MUST offer replay protection. + + o The protocol solution MUST provide data-origin authentication. + + o The protocol solution MUST be robust against denial-of-service + (DoS) attacks. In this context, the protocol solution MUST + consider a specific mechanism for the DoS that the user might + create by sending many IGMP messages. + + o The protocol solution SHOULD offer confidentiality protection. + + o The protocol solution SHOULD ensure that operations in default + configuration guarantees a low number of AN/NAS protocol + interactions. + + o The protocol solution SHOULD ensure the access control of the + management objects and possibly encrypt the values of these + objects when sending them over the networks. + +9. Security Considerations + + This document focuses on security threats, deriving a threat model + for ANCP and presenting the security requirements to be considered + for the design of ANCP. + + + + +Moustafa, et al. Informational [Page 16] + +RFC 5713 ANCP Threats January 2010 + + +10. Acknowledgments + + Many thanks go to Francois Le Faucher for reviewing this document and + for all his useful comments. The authors would also like to thank + Philippe Niger, Curtis Sherbo, and Michael Busser for reviewing this + document. Other thanks go to Bharat Joshi, Mark Townsley, Wojciech + Dec, and Kim Hylgaard who have had valuable comments during the + development of this work. + +11. References + +11.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC3365] Schiller, J., "Strong Security Requirements for + Internet Engineering Task Force Standard Protocols", + BCP 61, RFC 3365, August 2002. + +11.2. Informative References + + [ANCP-FRAME] Ooghe, S., Voigt, N., Platnic, M., Haag, T., and S. + Wadhwa, "Framework and Requirements for an Access Node + Control Mechanism in Broadband Multi-Service + Networks", Work in Progress, October 2009. + + [ANCP-MIB] De Cnodder, S. and M. Morgenstern, "Access Node Control + Protocol (ANCP) MIB module for Access Nodes", Work + in Progress, July 2009. + + + + + + + + + + + + + + + + + + + + + +Moustafa, et al. Informational [Page 17] + +RFC 5713 ANCP Threats January 2010 + + +Authors' Addresses + + Hassnaa Moustafa + France Telecom + 38-40 rue du General Leclerc + Issy Les Moulineaux, 92794 Cedex 9 + France + + EMail: hassnaa.moustafa@orange-ftgroup.com + + + Hannes Tschofenig + Nokia Siemens Networks + Linnoitustie 6 + Espoo 02600 + Finland + + Phone: +358 (50) 4871445 + EMail: Hannes.Tschofenig@gmx.net + URI: http://www.tschofenig.priv.at + + + Stefaan De Cnodder + Alcatel-Lucent + Copernicuslaan 50 + B-2018 Antwerp, + Belgium + + Phone: +32 3 240 85 15 + EMail: stefaan.de_cnodder@alcatel-lucent.com + + + + + + + + + + + + + + + + + + + + + +Moustafa, et al. Informational [Page 18] + |