Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ixia controller security risk (TLS 1.1 enabled) #357

Closed
Pterosaur opened this issue Mar 30, 2023 · 8 comments · Fixed by opencomputeproject/SAI-Challenger#131
Closed

Ixia controller security risk (TLS 1.1 enabled) #357

Pterosaur opened this issue Mar 30, 2023 · 8 comments · Fixed by opencomputeproject/SAI-Challenger#131
Assignees

Comments

@Pterosaur
Copy link
Collaborator

Pterosaur commented Mar 30, 2023

Some test cases depend on the Ixia controller(CONTROLLER_VERSION=0.0.1-3587) platform as the traffic generator which is deployed at:

docker-compose -f deployment/ixia-c-deployment.yml up -d

But the controller service support TLS 1.0 and TLS1.1 which are unsafe to downgrade attacks since they rely on SHA-1 hash for the integrity of exchanged messages.

We should upgrade the controller or disable the TLS 1.0 and 1.1 support in this controller.

image

@Pterosaur
Copy link
Collaborator Author

Pterosaur commented Mar 30, 2023

@lguohan Please help to assign this issue to a proper person.

@chrispsommers
Copy link
Collaborator

@Pterosaur This controller is used for CI/CD testing in the test pipeline, in a very controlled environment. Why is this deemed a security risk? It is not a production component. I will investigate your claims but I don't see how this is a "risk."

@chrispsommers chrispsommers self-assigned this Mar 30, 2023
@lguohan
Copy link
Contributor

lguohan commented Mar 30, 2023

@chrispsommers , unfortunately we are treating test environment the same way as production, so it is a secuirty risk for us. we can not run it till TLS 1.0 AND 1.1 are disabled.

@Pterosaur
Copy link
Collaborator Author

Pterosaur commented Mar 30, 2023

We can check whether a service support TLS 1.1 by the command openssl s_client -connect 127.0.0.1:443 -tls1_1 -cipher DEFAULT@SECLEVEL=1

@chrispsommers
Copy link
Collaborator

I've logged issue open-traffic-generator/ixia-c#125 and our team will look into it ASAP. Thanks for bringing this to our attention!

@Pterosaur
Copy link
Collaborator Author

The issue version we are using is 0.0.1-3587. But I tried some controllers with newer versions from(https://github.com/orgs/open-traffic-generator/packages/container/package/ixia-c-controller) that cannot pass all test cases of DASH. I guess the interfaces has been modified.

@chrispsommers
Copy link
Collaborator

chrispsommers commented Mar 30, 2023

Hi @Pterosaur, the controller and traffic engines are released as a compatible set (see here), so you can't just upgrade one and get a predictable result. AFAIK all controllers have same issue. We are treating it seriously and will address it ASAP.

Depending upon which commit of DASH you used, you might have picked up a version which had a CI failure due to a sequence of MRs which caused a regression, since fixed in #355. If the failures you saw look similar to https://github.com/sonic-net/DASH/actions/runs/4555886865/jobs/8036577440#step:22:1394 this would explain it. If not, perhaps it was the controller/traffic-engine pairing.

@chrispsommers
Copy link
Collaborator

New version of ixia-c resolves this issue https://github.com/open-traffic-generator/ixia-c/releases/tag/v0.0.1-4064, I will upgrade the DASH test infra to use it soon.

chrispsommers added a commit to chrispsommers/DASH that referenced this issue May 24, 2023
…d 1.1 security risk in ixiac Controller.

This requires changes to various dockerfiles. Added long-overdue dependencies to Makefile to rebuild Docker base images as needed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants