Hi Fred,

On Sep 19, 2011, at 23:22 , Templin, Fred L wrote:

[snip]
> 
>> The hidden idea behind the threat draft is "if we do not manage to
>> make a system more secured than the current Internet, at least we
>> must have a system that is not less secure."
> 
> That's why I said: "But, perhaps a case can be made that
> on-path attacks are no more a matter for concern for LISP
> than they are for the non-LISP public Internet?".
> 
> Still, if an off-path attacker can spoof the EID source
> address even if it cannot spoof the RLOC source address,
> the end result is a system that is less secure than the
> current Internet - right?

Can you explain why? 

I would say the contrary. If an attacker cannot spoof RLOC it means that the 
DFZ is more robust - right?


> 
>>>> One "funny" attack is by spoofing at the same time the EID and
>>>> the RLOC.
>>>> 
>>>> Without cryptography, there is no perfect solution to avoid
>>>> spoofing. Your example with dynamic RLOC is interesting.
>>>> If everything goes well, you should never have a TTL
>>>> longer than the RLOC lease time. However, in the case
>>>> the RLOC changes before the expiration, you will need
>>>> SMR or version change implying the retrieval of the new
>>>> mapping. But in this particular case, you also have a
>>>> security threat that is a DoS...
>>> 
>>> Do you see a clear way past these and other threats?
>>> Will it be the case that LISP and its ilk will be
>>> hard to secure and thus difficult to deploy?
>> 
>> I think that by taking care of how LISP is deployed and how
>> the features are used, it is possible to achieve the same level
>> of security than today. Doing more is possible, but I am not sure
>> that people are ready to have to deal with cryptography. For
>> example, if you want to protect against spoofing, you can sign
>> the packets (or part of) but then you need a way to know the key
>> used to sign.
>> 
>> Do you really want to go to that direction?
> 
> Do I really want to go in the direction of requiring
> cryptography? I can't answer that unless you first
> tell me the intended domain of applicability. I don't
> think I have yet seen a use case analysis of the
> various scenarios where LISP xTRs and mapping systems
> would be deployed and used. There seems to be an
> unspoken assumption of deployment "in the public
> Internet", but what about Enterprise networks?
> What about MANETs? What about aviation networks?
> What about tactical military networks? What about
> cellular networks? What about home networks?
> 

That is the purpose of the deployment document.

http://tools.ietf.org/html/draft-ietf-lisp-deployment-01

Luigi

_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to