I have a question about source address spoofing by a
node in the Internet pretending to be an ITR. The
document says that the ETR: "MAY compare the inner
header source EID address and the outer header source
RLOC address with the mapping that exists in the
mapping database". But a few questions arise from that.

First, what if the ETR does not observe the MAY, and
simply lets anonymous nodes pretend to be ITRs that
send inner packets with spoofed EID source addresses?
Those packets could result in a target node in the
ETR's site sending replies to a victim node in the
Internet. Is it OK to just let that happen?

Second, what if the ETR does observe the MAY, but
the ITR's RLOC source addresses change dynamically;
perhaps due to mobility. Would the ETR be able to
keep up with all of the RLOC address changes in real
time?

Third, I'm also wondering whether it is just end nodes
that could pretend to be ITRs, or whether there is also
a concern for middleboxes that can examine LISP exchanges
and then pretend to be ITRs based on what they observe?

I'm not trying to poke holes in the proposal; I'm just
trying to understand if the LISP ITR/ETR relationship
increases the attack surface for source address spoofing
beyond the current state of affairs for the non-LISP
Internet. Thanks in advance for any insights.
 
Fred
[email protected]
_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to