Internet DRAFT - draft-mcfadden-threat-model
draft-mcfadden-threat-model
Independent Submission M. McFadden
Internet Draft internet policy advisors
Intended status: Informational Jim Reid
Expires: April 22, 2023 RTFM, llp
October 23, 2022
Internet Threat Model - A Reconsideration
draft-mcfadden-threat-model-00.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 22, 2023.
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
McFadden, Reid Expires April 22, 2023 [Page 1]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
Abstract
RFC3552/BCP72 describes an Internet Threat model that has been used
in Internet protocol design. More than twenty years have passed
since RFC3552 was written and the structure and topology of the
Internet have changed dramatically. With those changes comes a
question: has the Internet Threat Model changed? Or, is the model
described in RFC3552 still mostly accurate? This draft attempts to
describe a non-exhaustive list of the most likely updates and
changes in the current threat environment. This paper has the goal
of suggesting a way forward for describing the contemporary threat
model and how it might inform security aspects of protocol design.
Table of Contents
1.Introduction....................................................2
1.1.Scope......................................................2
2.The Established Model in BCP72..................................3
2.1.BCP72 Passive Attacks......................................3
2.2.BCP72 Active Attacks.......................................3
3.Changes to the Attack Landscape.................................4
3.1.Quantifiable Changes.......................................4
3.2.Qualitative Changes........................................5
3.3.Data at Rest and Intermediaries............................6
3.4.The Evolution of Endpoints and Applications................7
4.Path Forward....................................................7
5.Security Considerations.........................................8
6.Privacy Considerations..........................................8
7.IANA Considerations.............................................8
8.References......................................................9
8.1.Informative References.....................................9
9.Acknowledgments.................................................9
1.Introduction
[RFC3552] describes an Internet threat model. According to that RFC,
the threat model "describes the capabilities that an attacker is
assumed to be able to deploy against a resource. It should contain
such information as the resources available to an attacker in terms
of information, computing capability, and control of a system."
Has the Internet Threat Model really changed; or, is the model
described in RFC3552 still mostly accurate?
1.1.Scope
The purpose of this draft is to examine the threat landscape of the
contemporary Internet and answer those questions. If the answer is
McFadden, Reid Expires April 22, 2023 [Page 2]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
clearly that the threat model has changed, then the draft will
suggest a way forward toward documenting those changes.
Reconsideration of the guidelines for writing Security
Considerations sections of RFCs is not in scope for this memo.
2.The Established Model in BCP72
BCP72's threat model divides attacks based on the capabilities
required to mount the attack. In particular, it divides attacks
into two groups: passive attacks where an attacker has only limited,
or read-only, access to the network; and active attacks where the
attacker has the resources available to write to the network. BCP72
is careful not to locate the attack. The attacks can come from
arbitrary endpoints. Dividing the threat model in this way also
allows for the model to incorporate attacks that come from resources
not at endpoints. In fact, an entire subsection of the BCP discusses
on-path versus off-path attacks.
2.1.BCP72 Passive Attacks
BCP72 describes passive attacks as those in which an attacker "reads
packets off the network but does not write them." It then gives
some specific examples including password sniffing, attacks on
routing infrastructure, and unprotected wireless channels.
The description in BCP72 tacitly assumes that the attacker is in
control of a single resource. For example, the first type of
passive attack considered is one in which an attacker uses read-only
access to packets to extract otherwise private information. BCP72
discusses the problems encountered when packets are transported
without some form of transport or application layer security.
BCP72 also describes offline cryptographic attacks in which an
attacker has made offline copies of packets that have been read off
the network. The attacker then mounts a cryptographic attack on
those packets in order to extract confidential information from them
offline.
2.2.BCP72 Active Attacks
BCP72 says, "when an attack involves writing data to the network, we
refer to this as an active attack." In this case, the BCP discusses
spoofing packet replay attacks, message insertion, deletion and
insertion, man-in-the-middle, as well as a Denial-of-Service attack.
In each of these cases, the BCP suggests either mitigations or
descriptions of what technologies could have been used to avoid the
weakness.
McFadden, Reid Expires April 22, 2023 [Page 3]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
3.Changes to the Attack Landscape
3.1.Quantifiable Changes
In the period since 2003, one dramatic change is the number of
attacks seen. Published studies show orders of magnitude increases
in the number of devices compromised, scale of privacy breach, and
the number of attacks taking place. Recent studies show that the
vast majority of attacks come from attackers using automated,
distributed tools. This makes a threat model that is built around
the notion of a single attacker inapplicable in the current
Internet. BCP72 does reference the concept of distributed denial of
service (DDoS), however its focus is on single attackers either on
or off-path.
Studies also show that certain well-known ports [IANA-WKP] are the
primary targets for this large jump in automated attacks. Ports
445, 22, 23, 53 and 1433 make up 99% of the targets.
The growth in the attacks has in part resulted from endpoints that
are not capable of supporting endpoint protection software, lack
effective encryption, or proper authentication. These have
proliferated on the public Internet. That many of these devices do
not have facilities for either self-protection or protecting
against becoming a threat on their own has been documented in an IAB
Workshop [IAB-IOT]. The greater number of improperly protected
devices has the potential to amplify attacks that use them as
sources for attacks on the rest of the Internet ecosystem.
Since 2003, there have been a variety of studies examining the
growth in the number of devices connected to the Internet. At the
time of writing, one estimate is that the difference between the
number of devices connected in 2003 and 2021 is in the region of 22
billion. The sheer quantity of devices means that the Internet's
attack surface is significantly expanded. Quantitative surveys also
indicate that the greatest growth is in so-called enterprise IoT and
household automation. The security properties of these endpoints
are substantially different from hosts that made up the majority of
the Internet in 2003.
Another important quantitative change to the structure of the
Internet is the consolidation of its infrastructure. While BCP72 is
certainly correct in its focus on the technologies and protocols
that can be exploited by attackers, it is hard to ignore the fact
that the threat landscape has been affected by the emergence of
consolidation. One example of this would be commercial or
governmental surveillance capabilities. In an environment where
there are a small number of very large entities that control the
fabric of connectivity and content, the threat landscape is affected
McFadden, Reid Expires April 22, 2023 [Page 4]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
by the fact that it may be easier to exert control and implement
attacks on a small number of organizations.
3.2.Qualitative Changes
The Internet in 2003 had a relatively small number of types of
hosts. The client/server model of computing was dominant at that
time and endpoints were relatively homogeneous.
The diversity of deployment is an important part of the contemporary
Internet landscape. Not only is there a measurable and huge
increase in the number of endpoints (greatly increasing the attack
surface), but there is a rich diversity in the capacity and purpose
of those endpoints. As a result, while the number of protocols may
not have increased exponentially, the kinds and quantities of
devices that can be sources or targets of exploits has increased
significantly.
The threat landscape is also affected by the balance between
convenience versus protection from threats. Applications and
services fight for market and mind share by being the easiest to
adopt, install and use. Many users treat security and protection in
the same way that they treat personal health - they ignore it until
there is a serious problem and then expect the problem to be
mitigated quickly. There are also market incentives which discourage
the deployment and adoption of security features, for instance
support costs, ease of use, hardware constraints, key management,
algorthim agility and so on.
The class of attackers has changed as well. In 2003, advanced
persistent attacks hadn't yet been given that name and the estimated
monetary loss to attackers was estimated to be less than $1 billion
USD. The emergence of scripted and other automated tools has
changed the landscape dramatically. In 2019, one estimate of losses
due to network-based attacks was in excess of $315 billion. This is
the direct result of the speed, financing and flexibility of those
doing the attacking.
It is true that, since BCP 72 was published there have been
significant improvements to communications security. This includes
securing the transport layer through protocols such as TLS 1.3,
HTTP/2 and secure SMTP. However, secure transport does not prevent
rogue applications from executing attacks, even when secure
transport is in place. An example of this happens when VPNs
themselves examine or exploit traffic rather than do what they are
advertised to do.
Recent experience tells us that the Internet has evolved from
primarily supporting unidirectional, two-party data flows to
supporting both two-party and multi-endpoint communications. This
trend is especially seen in the move toward large-scale, work from
McFadden, Reid Expires April 22, 2023 [Page 5]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
home models where multiparty communication is taken as a fundamental
use case. The implications of this evolution on the threat model
should be a part of any reconsideration of BCP72.
One of the other crucial changes to the Internet is the rise of the
application. Apps do everything for themselves that they can so they
do, for example, DoH [RFC8484], encrypt on their own and make
changes to the way the application interfaces with the Internet. It
used to be that applications simply relied on lower layers of the
stack for their services. This is no longer always the case, and the
implications of this on the threat model may be that the nature and
platforms for attacks has significantly changed.
3.3.Data at Rest and Intermediaries
The Internet Threat model in BCP72 primarily speaks to data being
transmitted, transited or received over the network. More recent
approaches to providing services over the Internet involve
intermediate nodes that may redirect, manipulate or store traffic.
While technologies such as exchange points may be seen to simply
part of the fabric between senders and receivers, the insertion of
content networks, caches and traffic analyzers has become
ubiquitous.
These middleboxes play an important role in content provision,
analysis and security in today's Internet. They were in limited use
when BCP72 was published. The importance of middleboxes is such
that, when protocols are developed that effectively route around
them, operators and content providers sometimes object.
One view of these intermediaries is that they are on the path
between source and destination and receive and forward information
for the benefit of one (or, both) of the endpoints. This is
different from network resources that facilitate on connection, such
as shared recursive DNS servers.
A helpful example of an intermediary has been provided by Martin
Thomson. He says, "in WebRTC there are signaling servers, who
intermediate the signaling stuff (control plane if you will), but do
not intermediate the media (data plane). Media is intermediated in
different ways by selective forwarding units (SFUs) or bridges or
mixers or focuses (there are lots of names for these and lots of
ways to build them). There are also relays, which are intermediaries
that help with NAT and sometimes firewall traversal."
It is important to see that intermediaries, and their security
properties are also a matter of perspective. Support for end-to-end,
human-to-human communications is one aspect of the threat model.
Today's internet also supports large-scale deployment of objects and
"things" which have different intermediaries - and different threat
models.
McFadden, Reid Expires April 22, 2023 [Page 6]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
Any contemporary Internet threat model must go beyond the threats to
traffic as it moves from Alice to Bob. Beyond intermediaries, the
more personal digital devices there are, the more difficult it is to
control and protect them. The threat model should also include
attacks that take place when the data is at rest or being
manipulated for operational reasons. Observations
It seems that there are significant changes in the architecture and
service model of the Internet. Those significant changes suggest the
threat model documented in RFC3552 may need to be reassessed.
3.4.The Evolution of Endpoints and Applications
BCP72's concentration on the communication channel fails to account
for two of the central developments of the Internet in the last ten
years: the rise of the application as the endpoint and the diversity
of endpoints that are publicly connected.
It might also be observed that there have already been limited
attempts to reconsider BCP72's threat model. As an example, the
Same-Origin Policy detailed in [RFC6454] shows how an application-
layer protocol can protect itself against certain kinds of attacks
based on the concept of origin (the determination and use of an
origin URI).
Another change is the emergence of state-sponsored attacks on both
endpoints and infrastructure. These attacks are quite different in
both capability and intensity compared to the threats seen in 2003.
Finally, protection from phishing attacks in the presence of certain
implementations of IDNA means that applications themselves are
implementing their own protections against certain types of attacks.
This is another example of how the application layer imposes
controls on an otherwise secure communication channel.
These are intended as only examples of how the landscape has
changed. It seems clear that many more changes exist and need to be
researched and documented.
4.Path Forward
BCP72 is an accurate reflection of the security threat landscape at
the time which it was written. It is also clear that protocol work
since the development of BCP72 has not been impacted by the fact
that there has been no update to that RFC.
Still, it seems clear that the existing model does not reflect
current operational reality. The IETF could choose to continue to
not update BCP72. This memo accepts that is a possible option.
McFadden, Reid Expires April 22, 2023 [Page 7]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
However, this memo suggests that a fresh approach to documenting the
Internet's threat model would be valuable to protocol designers,
network operators and application implementers. This memo does not
suggest replacing BCP72. Instead, it suggests supplementing that RFC
with new, more current information. It's worth emphasizing that this
work is clearly in the remit of the IETF.
BCP72 represents a too narrow view of the Internet's threat
landscape as it exists today. It should be complimented by a new
document that would:
- Reflect the diversity of endpoint deployment on the Internet;
- Document the impact of application-based security on the more
narrow communication channel model (possibly: consideration of
data in use in addition to data in motion);
- Account for data at rest as part of the model as well as data
in motion;
- Reflect on the how the growth of the number of devices
connected affects the attack surface for the Internet at large;
- Research how a new, contemporary threat model might be
described and communicated to protocol designers and others;
and,
- Make constructive suggestions for an approach (or, methodology)
for the IETF to supplement the threat model BCP72.
5.Security Considerations
This document is entirely about security on the Internet. An earlier
version of this draft was intended as input into the IAB's Model-T
activity which has since closed.
6.Privacy Considerations
This document does not discuss how RFC3552 might be revised or
replaced with an additional emphasis on privacy or trust issues.
Taking on privacy and trust seems out of scope for a discussion that
is focused on the Internet's treat model.
This memo is not intended to address privacy or related issues in
relation to protocol design.
7.IANA Considerations
This memo contains no instructions or requests for IANA.
McFadden, Reid Expires April 22, 2023 [Page 8]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
8. References
8.1.Informative References
[RFC3552] Rescorla E., Korver, B., IAB, Guidelines for Writing RFC
Text on Security Considerations, BCP 72, RFC 3552,
https://tools.ietf.org/html/rfc3552
[RFC6454] Barth, A., "The Web Origin Concept," ISSN: 2070-1721, RFC
6454, https://tools.ietf.org/html/rfc6454
[RFC8484] Hoffman, P., McManus, P., "DNS Queries over HTTPS (DoH),"
ISSN: 2070-1721, RFC 8484, https://tools.ietf.org/html/rfc8484
[IAB-IOT] Jimenez, J., Tschofenig, H., Thaler, D., "Report from the
Internet of Things (IoT) Semantic Interoperability (IOTSI) Workshop
2016," https://tools.ietf.org/html/draft-iab-iotsi-workshop-02 (work
in progress), July 2018.
[IANA-WKP] "Service Name and Transport Protocol Port Number
Registry," https://www.iana.org/assignments/service-names-port-
numbers/service-names-port-numbers.xhtml
9.Acknowledgments
This document was prepared using 2-Word-v2.0.template.dot.
The authors are happy to acknowledge the comments of participants in
the IAB's Model-T program. In particular, the comments of Martin
Thomson, Dominique Lazanski and Jari Arkko have been helpful in
building a first version of this draft.
McFadden, Reid Expires April 22, 2023 [Page 9]
Internet-Draft Internet Threat Model - A Reconsideration October 2022
Authors' Addresses
Mark McFadden
Internet policy advisors llc
513 Elmside Blvd
Madison WI 53704 US
Phone: +1 608 504 7776
Email: mark@internetpolicyadvisors.com
Jim Reid
RTFM llp
395 Hillington Road
Glasgow G51 4BL
Scotland
Email: jim@rfc1035.com
McFadden, Reid Expires April 22, 2023 [Page 10]