Technical:
Overall, the security considerations section is a bit thin. I don't think we
need a lot of additional text, but there are some additional pieces of
information that need to be added. Some suggested text below.
The nonce, coupled
with the ITR accepting only solicited Map-Replies goes a long way
toward providing decent authentication.
Hmm. This is not really descriptive. How about this instead:
The nonce, coupled with the ITR accepting only solicited Map-Replies provides a
basic level of security, in many ways similar to the security experienced in
the current Internet routing system. It is hard for off-path attackers to
launch attacks against these Lisp mechanisms, as they do not have the nonce
values. Sending a large number of packets to accidentally find the right nonce
value is possible, but would already by itself be a denial-of-service attack.
On-path attackers can perform far more serious attacks, but on-path attackers
can launch serious attacks in the current Internet as well, including
eavesdropping, blocking or redirecting traffic. Lisp relies on the correct
operation of a BGP-based routing system [LISP-ALT], but so do the current
Internet routing mechanisms.
It is a good idea to have instrumentation in place
to detect thrashing of the cache. Implementation experimentation
will be used to determine which cache management strategies work
best.
Yes, but I think we should also acknowledge that defending against cache
trashing attacks is hard:
It is a good idea to have instrumentation in place
to detect thrashing of the cache. Implementation experimentation
will be used to determine which cache management strategies work
best. In general, it is difficult to defend against cache trashing attacks.
(Unless, of course, I'm missing some obvious schemes that show promise of
avoiding some of these issues against determined attackers. It is also possible
that if we described the situation in more detail, we'd be able to describe the
threats in a more rational way. E.g., outsiders can cause some (limited)
problems, insiders could cause big trouble but are generally a bit more
trusted, etc.)
This experimental specification does not address automated key
management (AKM).BCP 107 <http://tools.ietf.org/html/bcp107> provides
guidance in this area.
Yes, but I think we should include two additional important pieces of
information. 1. you need to acknowledge that you are not following BCP 107 in
this case, as it requires AKM under certain conditions (we are within those
conditions, right?). And 2) more importantly, you need to document the
implications of not providing AKM. Personally, I do not necessarily consider it
a panacea, and often the nonce etc. mechanisms are far more important. In any
case, the reader needs to understand what we are losing without AKM.
13. Network Management Considerations
Considerations for Network Management tools exist so the LISP
protocol suite can be operationally managed. The mechanisms can be
found in [LISP-MIB] and [LISP-LIG].
It is good that you point to these specifications. I wonder if there are
additional things you should say in this spec, however. Are there parameters
that Lisp needs to operate? Are they and their default values described in
LISP-MIB? There are many good pieces of advice about the management of a Lisp
network in previous sections, should there be some kind of summary/pointers for
these here as well?
Editorial:
Return- Routability
s/- /-/
datragram. If a LISP encapsulated packet arrives at an ETR, it MAY
datagram
system [KARP <http://tools.ietf.org/html/draft-ietf-lisp-15#ref-KARP>], [RPKI
<http://tools.ietf.org/html/draft-ietf-lisp-15#ref-RPKI>],
[BGP-SEC <http://tools.ietf.org/html/draft-ietf-lisp-15#ref-BGP-SEC>], [LISP-SEC
<http://tools.ietf.org/html/draft-ietf-lisp-15#ref-LISP-SEC>],
s/[LISP-SEC],/[LISP-SEC]./
Jari
_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp