Comment at the end..
On 07/04/2017 09:31, Michael Richardson wrote:
>
> Brian E Carpenter <[email protected]> wrote:
> >> Unless RPL for the ACP or any future ACP mechanism do require
> reception and processing
> >> of IPv6-in-IPv6 packets, ACP routers SHOULD filter/drop IPv6-to-IPv6
> packet targeted
> >> to their ACP address.
>
> > I'm still not clear what the attack is. This rule seems to be saying
> "don't act as a
> > protocol 41 tunnel end point by default." But who would do that anyway?
> If you aren't
> > configured as a tunnel end point, protocol 41 is /dev/null. If you are
> configured
> > as a tunnel end point, you know what to do with the packet by
> definition. Don't act
> > as a GRE end point by default either. In fact, if you get any packet
> you don't understand,
> > drop it.
>
> Because we have to insert RPI header with an IPIP header, that means that
> every RPL router node needs to be will to accept IPIP packets addressed to
> it. It should find IPouter.dst = ME, and IPinner.dst = ME.
> (with IPouter.src being the device that inserted the IPIP header,
> and IPinner.src being the original source of the packet).
>
> *IF* the ACP router has some "clients" (i.e. VMs inside it), it may want
> to do IPIP encap/decap for the client machines.
>
> >> When reception/processing of IPv6-in-IPv6 packets is required for RPL,
> only
> >> IPv6-in-IPv6 packets with an ACP address from the same autonomic
> domain should be
> >> accepted.
>
> > Yes. But it does seem a bit obvious, frankly. Also, I can't imagine a
> use case.
> > I can imagine a use case where packets addressed from and to an ACP
> address arrive
> > encapsulated in a non-ACP packet, because we are connecting two ACP
> clouds
> > over a non-ACP tunnel, but in that case the tunnel end point will not
> be visible
> > in the ACP VRF anyway.
>
> Agreed.
> The point in the security considerations is to make it really clear that
> traffic should not pass via the ACP to the Internet.
>
> Imagine a compromised machine (a desktop in the NOC!!!) that can send IPIP
> traffic via the ACP to a backbone router, which will then decapsulate it
> (ignoring our words), and sending it out to the Internet at 100Gb/s speeds?
> This is the issue that I want to make sure the "considerations" point out.
Absolutely. And it could be a BYOD in the NOC that manages to join the ACP,
even. We really do need to tackle node and ASA authorization in Phase 2.
Brian
_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima