Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <df84809c-8192-2855-c0ea-2b609d176aa8@sect.tu-berlin.de>
Date: Wed, 9 May 2018 11:48:40 +0200
From: Kashyap Thimmaraju <kashyap.thimmaraju@...t.tu-berlin.de>
To: oss-security@...ts.openwall.com
Cc: Stefan Schmid <schmiste@...il.com>, Liron Schiff
 <schiff.liron@...il.com>, Brian O'Connor <bocon@...nnetworking.org>
Subject: CVE-2018-1000155: Denial of Service, Improper Authentication and
 Authorization, and Covert Channel in the OpenFlow 1.0+ handshake

Hello Everybody,

We have identified issues with a popular Software-Defined Networking
protocol, OpenFlow. Below are the details of the vulnerabilities.
OpenFlow controller implementations should strongly consider addressing
these issues, and OpenFlow adopters should be aware of such security risks.

CVE-2018-1000155: Denial of Service, Improper Authentication and
Authorization, and Covert Channel in the OpenFlow handshake

Severity: Important

Vendor: Open Networking Foundation (ONF), OpenFlow controllers

Versions Affected: OpenFlow specification 1.0 onwards

Description:
The OpenFlow handshake does not require the controller to authenticate
switches during the OpenFlow handshake. Furthermore, the controller is
not required to authorize switches access to the controller. The absence
of authentication and authorization in the OpenFlow handshake allows one
or more malicious switches connected to an OpenFlow controller to cause
Denial of Service attacks in certain OpenFlow controllers by spoofing
OpenFlow switch identifiers known as DataPath Identifiers (DPIDs).
Additionally, the lack of authentication and authorization in the
OpenFlow handshake can be exploited by malicious switches for covert
communications, bypassing data plane (and potentially control plane)
security mechanisms. In particular, the OpenFlow "Features Reply"
message sent by the switch is inherently trusted by the controller. Note
that for the attacker to launch an attack, the OpenFlow switch must
first establish a (secure) transport connection with the OpenFlow
controller (e.g., TLS and TCP), and the switch must be controlled by the
attacker.

Mitigation:
The attack can be deterred if OpenFlow connections are secured via the
following hardened authentication scheme: Unique TLS certificates for
switches, white-list of switch DPIDs at controllers which also includes
the switches’ respective public-key certificate identifier, and lastly a
controller mechanism that verifies the DPID announced in the OpenFlow
handshake is over the TLS connection with the associated (DPID) certificate.

Credit:
Kashyap Thimmaraju (Technische Universität Berlin), Robert Krösche
(Technische Universität Berlin), Liron Schiff (GuardiCore Labs) and
Stefan Schmid (University of Vienna)

-- 
Thanks,

Kashyap Thimmaraju <kashyap.thimmaraju@...t.tu-berlin.de>
Security in Telecommunications <sect.tu-berlin.de>
Technische Universität Berlin
Ernst-Reuter-Platz 7, Sekr TEL 17
10587 Berlin, Germany
Phone: +49 30 8353 58351


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.