Mobile Ad hoc Networking (MANET)Internet Engineering Task Force (IETF) J. YiInternet-DraftRequest for Comments: 7186 LIX, Ecole PolytechniqueIntended status:Category: Informational U. HerbergExpires: December 19, 2013ISSN: 2070-1721 Fujitsu Laboratories of America T. Clausen LIX, Ecole PolytechniqueJune 17, 2013April 2014 Security Threats forNHDP draft-ietf-manet-nhdp-sec-threats-06the Neighborhood Discovery Protocol (NHDP) Abstract This document analyzes common security threats of the Neighborhood Discovery Protocol(NHDP),(NHDP) and describes their potential impacts onMANETMobile Ad Hoc Network (MANET) routing protocols using NHDP. This document is not intended to propose solutions to the threats described. Status ofthisThis Memo ThisInternet-Draftdocument issubmitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsnot an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are amaximumcandidate for any level ofsix monthsInternet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on December 19, 2013.http://www.rfc-editor.org/info/rfc7186. Copyright Notice Copyright (c)20132014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . ..3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. NHDP Threat Overview . . . . . . . . . . . . . . . . . . . ..4 4. Detailed Threat Description . . . . . . . . . . . . . . . . . 5 4.1. Jamming . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2.Denial of ServiceDenial-of-Service Attack . . . . . . . . . . . . . . . ..5 4.3. Eavesdropping and Traffic Analysis . . . . . . . . . . ..6 4.4. Incorrect HELLO Message Generation . . . . . . . . . . ..7 4.4.1. Identity Spoofing . . . . . . . . . . . . . . . . . . 7 4.4.2. Link Spoofing . . . . . . . . . . . . . . . . . . . . 8 4.5. Replay Attack . . . . . . . . . . . . . . . . . . . . . . 9 4.6. Message Timing Attacks . . . . . . . . . . . . . . . . ..9 4.6.1. Interval Time Attack . . . . . . . . . . . . . . . .. 910 4.6.2. Validity Time Attack . . . . . . . . . . . . . . . ..10 4.7. Indirect Channel Overloading . . . . . . . . . . . . . ..10 4.8. Attack on Link Quality Update . . . . . . . . . . . . . . 11 5. Impact ofinconsistentInconsistent Information Bases on Protocols using NHDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 5.1. MPR Calculation . . . . . . . . . . . . . . . . . . . . . 12 5.1.1. Flooding Disruption due to Identity Spoofing . . . ..12 5.1.2. Flooding Disruption due to Link Spoofing . . . . . ..13 5.1.3. Broadcast Storm . . . . . . . . . . . . . . . . . . . 14 5.2. Routing Loops . . . . . . . . . . . . . . . . . . . . . . 15 5.3. Invalid orNon-ExistingNonexistent Paths to Destinations . . . . . .1516 5.4. Data Sinkhole . . . . . . . . . . . . . . . . . . . . . . 16 6. Future Work . . . . . . . . . . . . . . . . . . . . . . . . . 16 7. Security Considerations . . . . . . . . . . . . . . . . . . . 17 8.IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 9.Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .17 10.18 9. References . . . . . . . . . . . . . . . . . . . . . . . . ..1810.1.9.1. Normative References . . . . . . . . . . . . . . . . . ..1810.2.9.2. Informative References . . . . . . . . . . . . . . . . ..18Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 191. Introduction The Neighborhood Discovery Protocol (NHDP) [RFC6130] allows routers to acquire topological information up to two hops away from themselves, by way of periodic HELLO message exchanges. The information acquired by NHDP is used by other protocols, such asOLSRv2 [I-D.ietf-manet-olsrv2]the Optimized Link State Routing Protocol version 2 (OLSRv2) [RFC7181] andSMFSimplified Multicast Forwarding (SMF) [RFC6621]. The topology information, acquired by way of NHDP, serves these routing protocols by detecting and maintaining local 1-hop and 2-hop neighborhood information. As NHDP is typically used in wireless environments, it is potentially exposed to different kinds of security threats, some of which are of particular significance as compared to wired networks. As radio signals can be received as well as transmitted by any compatible wireless device within radio range, there is commonly no physical protection as otherwise known for wired networks. NHDP does not define any explicit security measures for protecting the integrity of the information itacquires, howeveracquires; however, it suggests that the integrity protection be addressed in a fashion appropriate to the deployment of the network. This document is based on the assumption that no additional security mechanism such as IPsec is used in the IP layer, as not all MANET deployments may besuitableable todeployaccommodate such common IP protection mechanisms (e.g., because of limited resources of MANETrouters to support the IPsec stack).routers). The document analyzes possible attacks on andmis- configurationsmisconfigurations of NHDP and outlines the consequences of suchattacks/ mis-configurationsattacks/misconfigurations to the state maintained by NHDP in each router (and, thus, made available to protocols using this state). This document is not intended to propose solutions to the threats described.[I-D.ietf-manet-nhdp-olsrv2-sec][RFC7185] provides further information on how to enable integrity protection to NHDP, which can help mitigating the threats described related to identity spoofing. It should be noted that many NHDP implementations areconfigurableconfigurable, and so an attack on the configuration system (such as [RFC6779]) can be used to adversely affect the operation of an NHDP implementation. The NHDP MIB module [RFC6779] might help monitoring some of the security attacks mentioned in this document.Note that, [I-D.nguyen-manet-management] contains[MGMT-SNAP] provides a snapshot of OLSRv2-routed MANET management as currently deployed, while [MANET-MGMT] is intended to provide specific guidelines on MANET networkmanagement, taking into accountmanagement considering thespecific nature of MANETs.various MIB modules that have been written. 2. Terminology This document uses the terminology and notation defined in "Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format" [RFC5444],NHDP [RFC6130]"Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)" [RFC6130], and "Internet Security Glossary, Version 2" [RFC4949]. Additionally, this document introduces the following terminology: NHDPRouter:router: A MANET router, running NHDP as specified in [RFC6130]. Attacker: Adevice,device that is present in the network andwhichintentionally seeks to compromise the information bases in NHDP routers. Compromised NHDPRouter:router: Anattacker,attacker that is present in the network andwhichgenerates syntactically correct NHDP control messages. Control messages emitted by aCompromisedcompromised NHDP router may contain additional information, or omit information, as compared to a control message generated by anon-compromizednon-compromised NHDP router located in the same topological position in the network. Legitimate NHDPRouter:router: An NHDProuter, whichrouter that is not aCompromisedcompromised NHDPRouter.router. 3. NHDP Threat Overview NHDP defines a HELLO messages exchange, enabling each NHDPRouterrouter to acquire topological information describing its 1-hop and 2-hop neighbors, and specifies information bases for recording this information. An NHDPRouterrouter periodically transmits HELLO messages using a link- local multicast on each of its interfaces with a hop-limit of 1 (i.e., HELLOs are never forwarded). In these HELLO messages, an NHDPRouterrouter announces the IP addresses as heard,symmetricsymmetric, or lost neighbor interface addresses. An Attacker has several ways of harming this neighbor discovery process:Itit can announce "wrong" information about its identity, postulatenon-existentnonexistent links, and replay HELLO messages. These attacks are presented in detail in Section 4. The different ways of attacking an NHDP deployment may eventually lead to inconsistent information bases, not accurately reflecting the correct topology of the MANET. The consequencehereofis that protocols using NHDP will base their operation on incorrect information, causing routing protocols to not be able to calculate correct (or any) paths, degrade the performance of flooding operations based on reduced relay sets, etc. These consequences to protocols using NHDP are described in detail in Section 5. 4. Detailed Threat Description For each threat,described in the below,a description of the mechanism of the corresponding attack is given, followed by a description of how the attack affects NHDP. The impacts from each attack on protocols using NHDP are given in Section 5. For simplicity in the description, the examples given assume that NHDPRoutersrouters have a single interface with a single IP address configured. All the attacks apply, however, for NHDPRoutersrouters with multiple interfaces and multiple addresses as well. 4.1. Jamming One vulnerability, common for all protocols operating a wireless ad hoc network, is that of "jamming", i.e., that a device generates massive amounts of interfering radio transmissions, which will prevent legitimate traffic(e.g.,control(e.g., control traffic as well as data traffic) on part of a network. Jamming is a form ofInterferenceinterference andOverloadoverload with the threatconsequencesconsequence ofDisruptiondisruption [RFC4593]. Depending on lower layers, this may not affect transmissions: HELLO messages from an NHDPRouterrouter with "jammed" interfaces may be received by other NHDPRouters.routers. As NHDP identifies whether a link to a neighbor isuni-directionalunidirectional orbi-directional,bidirectional, a routing protocol that uses NHDP for neighborhood discovery may ignore a link from a jammed NHDPRouterrouter to a non-jammed NHDPRouter.router. The jammed router (a router with jammed carrier) would appear simply as "disconnected" for theun-jammedunjammed part of thenetwork -network, which is able to maintain accurate topology maps.If, due to a jamming attack,If a considerable amount of HELLO messages are lost or corrupted due tocollisions,collisions caused by a jamming attack, neighbor NHDPRoutersrouters are not able to establish links between themselves any more. Thus, NHDP will present empty information bases to the protocols using it. 4.2.Denial of ServiceDenial-of-Service Attack ADenial of Servicedenial-of-service (DoS) attack can be a result of misconfiguration ofLegitimatelegitimate NHDPRoutersrouters (e.g., very short HELLO transmission interval) or malicious behavior ofCompromisedcompromised NHDPRoutersrouters [ACCT2012],so called byzantineso-called Byzantine routers [RFC4593]. DoS is a form ofInterferenceinterference andOverloadoverload with the threatconsequencesconsequence ofDisruptiondisruption [RFC4593]. By transmitting a huge amount of HELLO messages in a short period of time, NHDPRoutersrouters can increase channel occupation asintroduceddescribed in Section 4.1. Furthermore, aCompromisedcompromised NHDPRouterrouter can spoof a large amount of different IPaddresses,addresses and send HELLOs to its neighbors to fill their Link/Neighbor Sets. This may result in memory overflow, and it makes the processing of legitimate HELLO messages impossible. ACompromisedcompromised NHDPRouterrouter can also use link spoofing in its HELLO messages, generating huge 2-hop Sets in adjacent NHDPRoutersrouters and therefore potentially a memory overflow. Moreover, protocols such as SMF and OLSRv2, using the 2-hop information forMPRmultipoint relay (MPR) calculation, may exhaust the available computational resources of the router if the Neighbor Set and 2-hop Sets have too many entries. By exhausting the memory, CPU,or (and)and/or channel resources of a router in a DoS attack or a misconfiguration, NHDPRoutersrouters may not be able to accomplish their specified tasks of exchanging 1-hop and 2-hop neighborhood information, and thereby disturbing the operation of routing protocols using NHDP. In some MANETs, the routers are powered by battery. Another consequence of a DoS attack in such networks is that the power will be drained quickly by unnecessarymessageprocessing,transmissiontransmitting, andreceiving.receiving of messages. 4.3. Eavesdropping and Traffic Analysis Eavesdropping, sometimes referred to as sniffing, is a common and easy passive attack in a wireless environment. Once a packet is transmitted, any adjacent NHDPRouterrouter can potentially obtain a copy, for immediate or later processing. Neither the source nor the intended destination can detect this. A malicious NHDPRouterrouter can eavesdrop on the NHDP message exchange and thus learn the local topology. It may also eavesdrop on data traffic to learn source and destination addresses of data packets, or other header information, as well as the packet payload. Eavesdropping does not pose a direct threat to the networknoror to NHDP, in as much as that it does not alter the information recorded by NHDP in its information bases and presented to otherprotocols using it, but itprotocols. However, eavesdropping can provide network information required for enabling other attacks, such as the identity of communicating NHDPRouters,routers, detection of linkcharacteristic,characteristics, and NHDPRouterrouter configuration. The compromised NHDPRoutersrouters may use the obtained information to launch subsequent attacks, and they may also share NHDP routing information with other NHDP or non-NHDP entities. [RFC4593] would categorize the threat consequence asDisclosure.disclosure. Traffic analysis normallycomes along withfollows eavesdropping, which is the process of intercepting messages in order to deduce information from communication patterns. It can be performed even when HELLO messages are encrypted (encryption is not a part of NHDP), for example: o Triggered HELLO messages: an attacker could figure out that messages are triggered and determine that there was a change of symmetric neighbors of an NHDPRouterrouter sending the HELLO (as well get the frequency). o Message size: the message grows exactly by x bytes per neighbor. Depending on which cipher is used for the encryption, some information about the size could beinferredinferred, and thus the number of neighbors could be guessed. [RFC4593] would categorize the threat consequence asDisclosure.disclosure. 4.4. Incorrect HELLO Message Generation An NHDPRouterrouter performs two distinct tasks: it periodically generates HELLO messages, and it processes incoming HELLO messages from neighbor NHDPRouters.routers. This section describes security attacks involving the HELLO generation. 4.4.1. Identity Spoofing Identity spoofing implies that aCompromisedcompromised NHDPRouterrouter sends HELLO messages, pretending to have the identity of another NHDPRouter,router, or even a router that does not exist in the networks. ACompromisedcompromised NHDPRouterrouter can accomplish this by usinganotheran IPaddressaddress, which is not its own, in an address block of a HELLO message, and associating this address with a LOCAL_IF Address Block TLV [IJNSIA2010]. An NHDPRouterrouter receivingthethat HELLO message from aneighbor,neighbor will assume that it originated from the NHDPRouterrouter with the spoofed interface address. As a consequence, it will add a Link Tuple to that neighbor with the spoofed address, and include it in its next HELLO messages as a heard neighbor (and possibly as a symmetric neighbor after another HELLO exchange). Identity spoofing isparticularparticularly harmful if aCompromisedcompromised NHDPRouterrouter spoofs the identity of another NHDPRouterrouter that exists in the same routing domain. With respect to NHDP, such a duplicated, spoofed address can lead to an inconsistent state up to two hops from an NHDPRouter.router. [RFC4593] would categorize the threatconsequenceconsequences asDisclosuredisclosure andDeception.deception. Figure 1 depicts a simple example. In that example, NHDPRouterrouter A is in radio range of NHDP router C, but not of theCompromisedcompromised NHDPRouterrouter X. If X spoofs the address of A, that can lead to conflicts for a routing protocol that uses NHDP, and therefore for wrong path calculations as well as incorrect data traffic forwarding. .---. .---. .---. | A |----| C |----| X | '---' '---' '---' Figure 1 Figure 2 depicts another example. In this example, NHDP router A is two hops away from NHDPRouterrouter C, reachable through NHDPRouterrouter B. If theCompromisedcompromised NHDPRouterrouter X spoofs the address of A, NHDP router D will take A as itsone hop1-hop neighbor, and C may think that A is indeed reachable throughNHDP RouterD. .---. .---. .---. .---. .---. | A |----| B |----| C |----| D |----| X | '---' '---' '---' '---' '---' Figure 2 4.4.2. Link Spoofing Similar to identity spoofing, link spoofing implies that aCompromisedcompromised NHDPRouterrouter sends HELLO messages, signaling an incorrect set ofneighbors,neighbors. This is sometimes referred to asFalsification [RFC4593]. Thisfalsification [RFC4593], and in NHDP it may take either of two forms: o ACompromisedcompromised NHDPRouterrouter can postulate addresses of non-present neighbor NHDPRoutersrouters in an address block of a HELLO, associated with LINK_STATUS TLVs. o ACompromisedcompromised NHDPRouterrouter can "ignore" otherwise existing neighbors by not advertising them in its HELLO messages. The effect of link spoofing with respect to NHDP are twofold, depending on the two cases mentioned above: o If theCompromisedcompromised NHDPRouterrouter ignores existing neighbors in its advertisements, links will be missing in the information bases maintained by other routers, and there may not be any connectivityto or fromfor these NHDPRoutersrouters toothersor from other NHDPRoutersrouters in the MANET.If, ono On the other hand, if theCompromisedcompromised NHDPRouterrouter advertisesnon-existingnonexistent links, this will lead to inclusion of topological information in the information base, describingnon-existingnonexistent links in the network (which, then, may be used by other protocols using NHDP in place of other, existing, links). [RFC4593] would categorize the threatconsequenceconsequences asUsurpation, Deceptionusurpation, deception, andDisruption.disruption. 4.5. Replay Attack A replay attack implies that control traffic from one region of the network is recorded and replayed in a different region at (almost) the same time, or in the same region at a different time. This may, for example, happen when twoCompromisedcompromised NHDPRoutersrouters collaborate on an attack, one recording traffic in its proximity and tunneling it to the otherCompromisedcompromised NHDPRouter,router, which replays the traffic. In a protocol where links are discovered by testing reception, this will result in extraneous link creation (basically, a "virtual" link between the twoCompromisedcompromised NHDPRoutersrouters will appear in the information bases of neighboring NHDPRouters).routers). [RFC4593] would categorize this as aFalsificationfalsification andInterferenceinterference threat withathreatconsequenceconsequences ofUsurpation, Deception,usurpation, deception, andDisruption.disruption. While this situation may result from an attack, it may also be intentional: ifdata-traffic alsodata traffic is also relayed over the "virtual" link, the link being detected is indeed valid for use. This is, for instance, used in wireless repeaters. If data traffic is not carried over the virtual link, an imaginary,useless,useless link between the twoCompromisedcompromised NHDPRouters,routers has beenadvertised,advertised and is being recorded in the information bases of their neighboring NHDPRouters.routers. Compared toIncorrectincorrect HELLOMessagemessage attacks described in Section 4.4, the messages used inReplay attackreplay attacks are legitimate messages sent out by (non-malicious) NHDPRoutersrouters and replayed at a later time or different locality by malicious routers. This makes this kind of attack harder to be detect and tocounteract:counteract; integrity checks cannot help in thiscasecase, as the originalmessage ICV (Integritymessage's Integrity CheckValues)Value (ICV) was correctly calculated. 4.6. Message Timing Attacks In NHDP, each HELLO message contains a "validity time"and may contain an "interval time" field, identifying the(the amount of timefor whichthat information in that control message should be considered validuntil discarded,before being discarded) andthemay contain an "interval time" field (the amount of time until the next control message of the same type should beexpectedexpected) [RFC5497]. 4.6.1. Interval Time Attack A use of the expected interval between two successive HELLO messages is for determining the link quality in NHDP: if messages are not received within the expected intervals (e.g., a certain fraction of messages are missing), then this may be used to exclude a link from being considered as useful, even if (some)bi-directionalbidirectional communication has been verified. If aCompromisedcompromised NHDPRouterrouter X spoofs the identity of an existing NHDPRouter A,router A and sends HELLOs indicating a low interval time, an NHDPRouterrouter B receiving this HELLO will expect the following HELLO to arrive within the interval timeindicated - or otherwise, decreaseindicated. If that expectation is not met, the link quality for the linkA-B.A-B will be decreased. Thus, X may cause NHDPRouterrouter B's estimate of the link quality for the link A-B to fall below thelimit, where it is no longerminimum consideredas useful and, thus,useful, so the link would not be used [CPSCOM2011]. [RFC4593] would categorize the threat consequence asUsurpation.usurpation. 4.6.2. Validity Time Attack ACompromisedcompromised NHDPRouterrouter X can spoof the identity of an NHDPRouterrouter A and send a HELLO using a low validity time(e.g.,1(e.g., 1 ms). A receiving NHDPRouterrouter B will discard the information upon expiration of that interval, i.e., a link between NHDPRouterrouter A and B will be "torn down" by X.ItThe sending of a low validity time can be caused by intended maliciousbehaviors,behaviors or simplymis-configurationmisconfiguration in the NHDPRouters.routers. [RFC4593] would categorize the threat consequence asUsurpation.usurpation. 4.7. Indirect Channel Overloading Indirect Channel Overloading is when aCompromisedcompromised NHDPRouterrouter X by its actions causes other legitimate NHDPRoutersrouters to generate inordinate amounts of control traffic. This increases channeloccupation,occupation and the overhead in each receiving NHDPRouter processingrouter that processes this control traffic. With this traffic originating fromLegitimatelegitimate NHDPRouters,routers, the malicious device may remain undetectedtoin the wider network. It is a form ofInterferenceinterference andOverloadoverload with the threatconsequencesconsequence ofDisruptiondisruption [RFC4593]. Figure 3 illustrates Indirect Channel Overloading with NHDP. ACompromisedcompromised NHDPRouterrouter X advertises a symmetric spoofed link to thenon-existingnonexistent NHDPRouterrouter B (at time t0). Router A selects X as MPR upon reception of theHELLO, and will triggerHELLO then triggers a HELLO at t1. Overhearing this triggered HELLO, the attacker sends another HELLO at t2, advertising the link to B aslost, which leads tolost; this causes NHDPRouterrouter Adeselectingto deselect the attacker as MPR, and to send another triggered message at t3. The cycle may be repeated,alternating advertisingwhere the link X-B is advertised alternately as LOST and SYM. MPRs(X) MPRs() .---. .---. .---. .---. | A | | A | | A | | A | '---' '---' '---' '---' | | | | | SYM(B) | | LOST(B) | | | | | .---. .---. .---. .---. | X | | X | | X | | X | '---' '---' '---' '---' . . . . . . ..... ..... . B . . B . ..... ..... t0 t1 t2 t3 Figure 3 4.8. Attack on Link Quality Update According toNHDP, "LinkNHDP [RFC6130]: Link quality is a mechanism whereby a router MAY take considerations other than message exchange into account for determining when a link is and is not a candidate for being considered as HEARD or SYMMETRIC. As such, it is alink admission mechanism."."link admission" mechanism. Section 14.4 of NHDP [RFC6130] then lists several examples of which information can be used to update link quality. One of the listed examplesis to update link quality based on [RFC5444]uses packet exchanges between neighborrouters,routers (as described in [RFC5444]), e.g., an NHDPRouterrouter may update the link quality of a neighbor based on receipt or loss of packets if they include a sequential packet sequence number. NHDP does not specify how to acquire link quality updatesnormatively,normatively; however, attack vectors may be introduced if an implementation chooses to calculate link quality based on packet sequence numbers. The consequences of such threats would depend on specific implementations. For example, if the link quality update is based on a sequential packet sequence number from neighbor routers, aComprised NDHP Routercompromised NHDP router can spoof packets appearing to be from anotherLegitimatelegitimate NHDPRouterrouter that skips some packet sequence numbers. The NHDPRouterrouter receiving the spoofed packets may degrade the link quality as it appears that several packets have been dropped. Eventually, the router may remove the neighbor when the link quality drops below HYST_REJECT. 5. Impact ofinconsistentInconsistent Information Bases on Protocols using NHDP This section describes the impact onprotocols, using NHDP, ofprotocols that use NHDP when NHDPfailingfails to obtain and represent accurate information, possibly as a consequence of the attacks described in Section 4. This description emphasizes the impacts on the MANET protocols OLSRv2[I-D.ietf-manet-olsrv2],[RFC7181] and SMF [RFC6621]. 5.1. MPR Calculation MPR selection (as used ine.g., [I-D.ietf-manet-olsrv2][RFC7181] and[RFC6621])[RFC6621], for example) uses information about a router's 1-hop and 2-hop neighborhood, assuming that (i) this information is accurate, and (ii)alleach 1-hopneighbors areneighbor is apt to act asasMPR, depending on the willingnessthey report.it reports. Thus, aCompromisedcompromised NHDP router may seek to manipulate the 1-hop and 2-hop neighborhood information in a routersuchso as to cause the MPR selection to fail, leading to a flooding disruption ofTC messages, whichtraffic control messages. This can result in incomplete topologyadvertisement,advertisement or can degrade the optimized flooding to classical flooding. 5.1.1. Flooding Disruption due to Identity Spoofing ACompromisedcompromised NHDP router can spoof the identify of otherrouters,routers in order to disrupt the MPR selection, so as tocacheprevent certain parts of the network fromthe floodingreceiving flooded traffic [IJNSIA2010]. In Figure 4, aCompromisedcompromised NHDP router X spoofs the identity of B. The link between X and C is correctly detected and listed in X's HELLOs. Router A will receive HELLOs indicating linksfrom, respectivelyfrom B:{B-E}, X:{X-C, X-E}, and D:{D-E,D-C}.D-C}, respectively. For router A, X and D are equal candidates for MPR selection. To make sure the X can be selected as MPR for router A, X can set its willingness to the maximum value. .---. .---. .---. | E |----| D |----| C | '---' '---' '---' | | . | | . .---. .---. .---. | B |----| A |----| X | '---' '---' '---' spoofs B Figure 4 If B and X (i) accept MPR selection and (ii) forward flooded trafficas-ifas if they were both B, identity spoofing by X is harmless. However, if X does not forward flooded traffic (i.e., does not accept MPR selection), its presence entails flooding disruption: selecting B over D renders C unreachable by flooded traffic. .---. | D | '---' | | .---. .---. .---. .---. .---. | X |----| A |----| B |----| C |----| E |... '---' '---' '---' '---' '---' spoofs E Figure 5 In Figure 5, theCompromisedcompromised NHDP router X spoofs the identity of E,i.e.,routeri.e., routers A and C both receive HELLOs from a router identifying itself as E. For router B, routers A and C present the same neighborsets,sets and are equal candidates for MPR selection. If router B selects only router A as MPR, C will not relay flooded traffic from B or transiting via B, and router X (and routers to the "right" of it) will not receive flooded traffic. 5.1.2. Flooding Disruption due to Link Spoofing ACompromisedcompromised NHDP router can also spoof links to other NHDP routers,andtherebymakesmaking itself appear as the most appealing candidateofto be MPR for its neighbors, possibly to the exclusion of other NHDP routers in theneighborhood (this, inneighborhood. (In particular, this can occur if theCompromisedcompromised NHDP routerspoofspoofs links to all other NHDP routers in the neighborhood, plus to oneotherNHDProuter).router outside the neighborhood.) By thus excluding other legitimate NHDP routers from being selected as MPR, theCompromisedcompromised NHDP router will receive and be expected to relay all flooded traffic (e.g.,TCtraffic control messages in OLSRv2 or data traffic in SMF)- whichthat it can then drop or otherwise manipulate. In the network in Figure 6, theCompromisedcompromised NHDP router X spoofs links to the existing router C, as well as to a fictitious W. Router A receives HELLOs from X and B, reporting X: {X-C, X-W},b:B: {B-C}. All else being equal, X appears a better choiceasfor MPR than B, as X appears to cover all neighbors of B, plus W. ,---. ..... | S | . C . '---' ..... | . | . .---. .---. .---. .---. .---. | D |----| C |----| B |----| A |----| X | '---' '---' '---' '---' '---' . . ..... .wW . ..... Figure 6 As router A will not select B as MPR, B will not relay flooded messages received from router A. The NHDP routers on the left of B (starting with C) will, thus, not receive any flooded messages from router A or transitingNHDProuter A (e.g., a message originating from S). 5.1.3. Broadcast StormCompromisedA compromised NHDP router may attack the network by attempting to degrade the performance of optimized flooding algorithms so as to be equivalent to classic flooding. This can be achieved by forcing an NHDP router into choosing all its 1-hop neighbors as MPRs. In MANETs, a broadcast storm caused by classic flooding is a serious problemwhichthat can result in redundancy,contentioncontention, and collisions [MOBICOM99]. As shown in Figure 7, theCompromisedcompromised NHDP router X spoofs the identity of NHDP router B and, spoofs a link to router Y {B-Y} (Y does not have tobeexist). By doing so, the legitimate NHDP router A has to select the legitimate NHDP router B as itsMPR,MPR in order for it to reach all its 2-hop neighbors. TheCompromisedcompromised NHDP router Y can perform thisidentity+linkidentity-and-link spoofing for all of NHDP router A's 1-hop neighbors, thereby forcing NHDP router A to select all its neighbors as MPR-and disabling the optimization sought by the MPR mechanism. .---. | B | '---' | | .---. .---. ..... | A |----| X | . . . Y . '---' '---' ..... spoofs B Figure 7 5.2. Routing Loops Inconsistent information bases, provided by NHDP to other protocols, can also cause routing loops. In Figure 8, theCompromisedcompromised NHDP router X spoofs the identity of NHDP router E. NHDP router D has data traffic to send to NHDP router A. The topology recorded in the information base of router D indicates that the shortest path to router A is {D->E->A}, because of the link {A-E} reported by X. Therefore, the data traffic will be routed totheNHDP router E. As the link {A-E} does not exist in NHDP router E's information bases, it will identify the next hop for data traffic to NHDP router A as being NHDP router D. A loop between the NHDP routers D and E is thus created. .---. .---. .---. .---. .---. | A |----| B |----| C |----| D |----| E | '---' '---' '---' '---' '---' | | .---. | X | '---' spoofs E Figure 8 5.3. Invalid orNon-ExistingNonexistent Paths to Destinations By reporting inconsistent topology information in NHDP, the invalidlinks/routerslinks and routers can be propagated as link state information withTCtraffic control messages and results in route failure. As illustrated in Figure 8, if NHDP router B tries to send data packets to NHDP router E, it will choose router A as its next hop, based on the informationof non- existingabout the nonexistent link {A-E} reported by theCompromisedcompromised NHDP router X. 5.4. Data Sinkhole With the ability to spoof multiple identities of legitimate NHDP routers (by eavesdropping, for example), theCompromisedcompromised NHDP router can represent a "data sinkhole" for its 1-hop and 2-hop neighbors. Data packets that come across its neighbors may be forwarded to theCompromisedcompromised NHDP router instead of to the real destination. The packet can then be dropped, manipulated, duplicated, etc., by theCompromisedcompromised NHDP router. As shown in Figure 8, if theCompromisedcompromised NHDP router X spoofs the identity of NHDP router E, all the data packets to E that cross NHDP routers A and B will be sent to NHDP router X, instead of to E. 6. Future Work This document does not propose solutions to mitigate the security threats described in Section 4. However, this section aims at driving new work by suggesting which threats discussed in Section 4 could be addressedin new protocol work, which in deployment, and whichbyapplications:deployments or applications. o Section 4.1: Jamming - If a single router or a small area of the MANET is jammed, protocols could be specified that increase link metrics in NHDP for the jammed links. When a routingprotocol,protocol such asOLSRv2,OLSRv2 uses NHDP for neighborhood discovery, other paths leading "around" the jammed area would be preferred, and therefore would mitigate the threat to some extent. o Section 4.2: DoS - A DoS attack using a massive amount of HELLO messages can be mitigated by admitting only trusted routers to the network.[I-D.ietf-manet-nhdp-olsrv2-sec][RFC7185] specifies a mechanism for adding Integrity Check Values (ICVs) to HELLO messages and therefore providing an admittance mechanism for NHDPRoutersrouters to a MANET. (Note that adding ICVsadds itselfcreates a new DoS attack vector, as ICV verification requires CPU and memory resources.)UsingHowever, using ICVs doeshowevernot address the problem of compromised routers. Detecting compromised routers could be addressed in new work.[I-D.ietf-manet-nhdp-olsrv2-sec][RFC7185] mandatesto implementimplementation of a security mechanism that is based on sharedkeys, whichkeys and makes excluding single compromised routers difficult; work could be done to facilitate revocation mechanisms in certain MANET use cases where routers have sufficient capabilities to support asymmetric keys. o Section 4.3: Eavesdropping -[I-D.ietf-manet-nhdp-olsrv2-sec][RFC7185] adds ICVs to HELLOmessages,messages but does not encrypt them. Therefore, eavesdropping of control traffic is not mitigated. Future work could provide encryption of control traffic for sensitive MANET topologies. Note that, other than using a single shared secret key, providing encryptionto a potentiallyof traffic among apriori unknownset ofneighbors,neighbors (when that set is potentially undetermined) is nontrivial, especially without multiplyingoverheads, is non- trivial. Byoverheads. With trafficanalyzing,analysis, attackers could still deduce the network information like HELLO messagetriggering,triggering and HELLO message size, even though the HELLO messages are encrypted. o Section 4.4.2: Link spoofing -[I-D.ietf-manet-nhdp-olsrv2-sec][RFC7185] provides certain protection against link spoofing, but an NHDPRouterrouter has to "trust" the originator of a HELLO that theadvertizedadvertised links are correct. For example, if a router A reports a link to B, routers receiving HELLOs from A have to trust that B is actually a (symmetric) neighbor of A. New protocol work could address protection of links without overly increasing the space and time overheads. An immediate suggestion for deployments is to protect routers against being compromised anddistributingto distribute keys only to trusted routers. o Section 4.5: Replay Attacks -[I-D.ietf-manet-nhdp-olsrv2-sec] provides certain[RFC7185] uses ICVs and timestamps to provide some protection against replayattacks, using ICVs and timestamps.attacks. It is still feasible to replay control messages within a limited time. A suggestion for deployments is to provide time synchronization between routers. New work could provide time synchronization mechanisms for certain MANET usecases,cases or specify a mechanism using nonces instead oftime stampstimestamps in HELLO messages. o Section 4.4.1: Identityspoofing,spoofing; Section 4.6: Message timingattacks,attacks; Section 4.7: Indirect channeloverloading,overloading; and Section 4.8: Attack on link quality update -[I-D.ietf-manet-nhdp-olsrv2-sec][RFC7185] provides protection against these attacks, assumingthatthe routers are not compromised. 7. Security Considerations This document does not specify a protocol or a procedure. The document, however, reflects on security considerations for NHDP and MANET routing protocols using NHDP for neighborhood discovery. 8.IANA Considerations This document contains no actions for IANA. 9.Acknowledgments The authors would like to gratefully acknowledge the following people for valuable comments and technical discussions: Teco Boot, Henning Rogge, Christopher Dearlove, John Dowdell, Joseph Macker, andtheall the other participants of the IETF MANET working group.10.9. References10.1.9.1. Normative References [RFC5444] Clausen, T., Dearlove, C., Dean, J., and C. Adjih, "Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format", RFC 5444, February 2009. [RFC5497] Clausen, T. and C. Dearlove, "Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs)", RFC 5497, March 2009. [RFC6130] Clausen, T., Dearlove, C., and J. Dean, "Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)", RFC 6130, April 2011.10.2.9.2. Informative References [ACCT2012] Jhaveri, R. and S. Patel, "DoS Attacks in Mobile Ad Hoc Networks: A Survey", Second International Conference on Advanced Computing & Communication Technologies (ACCT),JanJanuary 2012. [CPSCOM2011] Yi, J., Clausen, T., and U. Herberg, "Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks", Proceedings of the IEEE International Conference on Cyber, Physical, and Social Computing (CPSCom), October 2011.[I-D.ietf-manet-nhdp-olsrv2-sec][IJNSIA2010] Herberg,U., Dearlove, C.,U. and T. Clausen,"Integrity Protection for Control Messages in NHDP and OLSRv2", draft-ietf-manet-nhdp-olsrv2-sec-02 (work"Security Issues inprogress), April 2013. [I-D.ietf-manet-olsrv2] Clausen, T., Dearlove, C., Jacquet, P., and U. Herberg, "Thethe Optimized Link State Routing Protocol version 2",draft-ietf-manet-olsrv2-19 (work in progress), March 2013. [I-D.nguyen-manet-management]International Journal of Network Security & Its Applications, April 2010. [MANET-MGMT] Nguyen, J., Cole, R., Herberg, U., Yi, J., and J. Dean, "Network Management of Mobile Ad hoc Networks (MANET): Architecture, Use Cases, and Applicability",draft-nguyen-manet-management-00 (workWork inprogress),Progress, February 2013.[IJNSIA2010] Herberg, U. and T.[MGMT-SNAP] Clausen,"Security Issues in the Optimized Link State Routing Protocol version 2", International JournalT. and U. Herberg, "Snapshot ofNetwork Security & Its Applications, April 2010.OLSRv2-Routed MANET Management", Work in Progress, February 2014. [MOBICOM99] Ni, S., Tseng, Y., Chen, Y., and J. Sheu, "The Broadcast Storm Problem in a Mobile Ad Hoc Network", Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, 1999. [RFC4593] Barbir, A., Murphy, S., and Y. Yang, "Generic Threats to Routing Protocols", RFC 4593, October 2006. [RFC4949] Shirey, R., "Internet Security Glossary, Version 2", RFC 4949, August 2007. [RFC6621] Macker, J., "Simplified Multicast Forwarding", RFC 6621, May 2012. [RFC6779] Herberg, U., Cole, R., and I. Chakeres, "Definition of Managed Objects for the Neighborhood Discovery Protocol", RFC 6779, October 2012. [RFC7181] Clausen, T., Dearlove, C., Jacquet, P., and U. Herberg, "The Optimized Link State Routing Protocol Version 2", RFC 7181, April 2014. [RFC7185] Herberg, U., Dearlove, C., and T. Clausen, "Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)", RFC 7185, April 2014. Authors' Addresses Jiazi Yi LIX, Ecole Polytechnique 91128 PalaiseauCedex,Cedex France Phone: +33 1 77 57 80 85Email:EMail: jiazi@jiaziyi.com URI: http://www.jiaziyi.com/ Ulrich Herberg Fujitsu Laboratories of America 1240 E Arques Ave Sunnyvale, CA 94085 USAEmail:EMail: ulrich@herberg.name URI: http://www.herberg.name/ Thomas Heide Clausen LIX, Ecole Polytechnique 91128 PalaiseauCedex,Cedex France Phone: +33 6 6058 9349Email:EMail: T.Clausen@computer.org URI: http://www.thomasclausen.org/