Jun-ichiro itojun Hagino wrote:
> 
> >>         I heard the presentation differently.  in IETF51 presentation Alex
> >>         Conta made the following proposals, at least:
> >>         - putting PHB value
> >>                 not trustworthy.
> >The PHB is as trustworthy as anything else, including the pseudo-random
> >value. If a user can set values as pleases, it can do that with the
> >pseudo-random number as well.
> 
>         but if you look at the number as PHB, you are trusting that the
>         originating system have put a meaningful, and correct, PHB.
>         how can you be sure that the originating system is not cheating?

As I said, you don't care: they will pay the appropriate tariff for the
PHB they request. It isn't the ISP's problem. 

For the other points, I agree with Itjun and perhaps disagree with Alex -
there are some scary issues in playing with header length etc.

    Brian

> 
> >>         - putting total extension header length
> >>                 if the originator lies about the value, intermediate routers
> >>                 can go panic.
> >
> >I disagree.
> >
> >"less than the size of the packet" is a simple, cheap, straight forward
> >validation test of the headers length, that would ensure that nothing
> >wrong can happen, regardless of memory being partioned and protected.
> 
>         I guess you are too optimistic.  if you are using align-picky
>         architecture CPU for your router, I can panic your router by putting
>         some value that is not align-friendly into flow label field as the
>         extension header length.
> 
> >Even without the validation, the reduced number of bits available for
> >the length is forcing a reasonable limit on the length. The TCP/UDP
> >ports are accessed for "read", and the values are not used as pointers
> >or offsets. Assuming an implementation that enforces memory
> >partitioning, the "kernel" has most likely "read" access anywhere in
> >memory, so "memory access violation" is unlikely.
> 
>         I don't understand what you are trying to mean.  regardless from
>         read access or write access, your kernel can be tricked into:
>         - accessing bits on a wrong boundary
>         - accessing bits that are not a real port number
>         I can trick the intermediate routers to believe that I'm using
>         TCP port 80, while I'm actually using TCP port 22.
> 
> >Also please note that the use of a total header length would not be
> >conceptually, and practically
> >different than IPv4. The IHL field in the IPv4 header includes the
> >length of the main header fields, and the IPv4 options. Some of the IPv4
> >options are of a variable length. A variable size IPv4 option
> >carries a field indicating the length. We knew how to implement this
> >back many years ago, right?, so we should be able to implement this
> >carefully for IPv6, if need be.
> 
>         it is very different from IPv4 case.  in IPv4 case, IHL field is the
>         one and only field trustable, and there was no ambiguity.  for IPv6
>         extension header length, the actual value is detected only by chasing
>         header chain.  your addition (of extension header length into flow
>         label field) is a non-trustworthy copy of the real value.  if your
>         router believes that the value in flow label field, your router will
>         get tricked.
> 
> >>         - putting port/addr/whatever encoded
> >>                 if the originator lies about the value, theft-of-service
> >>                 happens.
> >As said above, the security risk is not higher than with the
> >pseudo-random number.
> 
>         I don't believe so.
> 
> itojun

-- 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Brian E Carpenter 
Distinguished Engineer, Internet Standards & Technology, IBM 
On assignment for IBM at http://www.iCAIR.org 
Board Chairman, Internet Society http://www.isoc.org

"We shall need a number of efficient librarian types 
 to keep us in order." - Alan Turing, 1947.
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to