Bug 1578652 (CVE-2018-1000155) - CVE-2018-1000155 openflow: Denial of Service, Improper Authentication and Authorization, and Covert Channel in the OpenFlow handshake
Summary: CVE-2018-1000155 openflow: Denial of Service, Improper Authentication and Aut...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2018-1000155
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1579653 1579654 1579655 1579656 1579657 1579658
Blocks: 1578654
TreeView+ depends on / blocked
 
Reported: 2018-05-16 05:41 UTC by Sam Fowler
Modified: 2021-02-17 00:18 UTC (History)
14 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2019-06-10 10:23:04 UTC
Embargoed:


Attachments (Terms of Use)

Description Sam Fowler 2018-05-16 05:41:18 UTC
The OpenFlow handshake does not require the controller to authenticate switches during the OpenFlow handshake. Furthermore, the controller is not required to authorize switches access to the controller. The absence of authentication and authorization in the OpenFlow handshake allows one or more malicious switches connected to an OpenFlow controller to cause Denial of Service attacks in certain OpenFlow controllers by spoofing OpenFlow switch identifiers known as DataPath Identifiers (DPIDs). Additionally, the lack of authentication and authorization in the OpenFlow handshake can be exploited by malicious switches for covert communications, bypassing data plane (and potentially control plane) security mechanisms. In particular, the OpenFlow "Features Reply" message sent by the switch is inherently trusted by the controller. Note that for the attacker to launch an attack, the OpenFlow switch must first establish a (secure) transport connection with the OpenFlow controller (e.g., TLS and TCP), and the switch must be controlled by the attacker.


External Reference:

http://seclists.org/oss-sec/2018/q2/99

Comment 1 James Hebden 2018-05-17 05:28:31 UTC
Review of ODL packaging and OpenFlow plugin show that we are impacted by the vulnerability described in the CVE, given we package and enable the OpenFlow plugin, and by default - no encryption or authentication is required for the initial controller handshake. A malicious OpenFlow client could handshake with the controller, as described in the CVE. The mitigation available is to enable TLS, which is supported by the OpenDayLight OpenFlow plugin, and would require registered switches and new switches to have correct TLS certificates before a session could be opened with the controller, mitigating the potential attack. The reference configuration should enable this TLS support to mitigate this CVE.

Comment 2 James Hebden 2018-05-18 05:20:14 UTC
Mitigation:

Enable TLS in OpenFlow plugin. Upstream documentation is a useful resource.
https://wiki.opendaylight.org/view/OpenDaylight_OpenFlow_Plugin:_TLS_Support


Note You need to log in before you can comment on or make changes to this bug.