Dino,

Technical:

Overall, the security considerations section is a bit thin. I don't think we 
need a lot of additional text, but there are some additional pieces of 
information that need to be added. Some suggested text below.

The nonce, coupled
with the ITR accepting only solicited Map-Replies goes a long way
toward providing decent authentication.
Hmm. This is not really descriptive. How about this instead:

The nonce, coupled with the ITR accepting only solicited Map-Replies provides a 
basic level of security, in many ways similar to the security experienced in 
the current Internet routing system. It is hard for off-path attackers to 
launch attacks against these Lisp mechanisms, as they do not have the nonce 
values. Sending a large number of packets to accidentally find the right nonce 
value is possible, but would already by itself be a denial-of-service attack. 
On-path attackers can perform far more serious attacks, but on-path attackers 
can launch serious attacks in the current Internet as well, including 
eavesdropping, blocking or redirecting traffic. Lisp relies on the correct 
operation of a BGP-based routing system [LISP-ALT], but so do the current 
Internet routing mechanisms.
I will add this text modulo the last sentence. I don't understand how ALT plays 
into this. So I felt it was a random statement.

OK

  Did you mean LISP relies on a secure mapping database system?

I just wanted to highlight that while LISP does need its mapping system to work 
correctly, so does the current Internet need BGP to run correctly. So there is 
no big difference in the security of these two as far as that part goes.

But it is not important. If you don't want to include it, feel free to use the 
text that you like.


It is a good idea to have instrumentation in place
to detect thrashing of the cache.  Implementation experimentation
will be used to determine which cache management strategies work
best.
Yes, but I think we should also acknowledge that defending against cache 
trashing attacks is hard:

   It is a good idea to have instrumentation in place
   to detect thrashing of the cache.  Implementation experimentation
   will be used to determine which cache management strategies work
   best. In general, it is difficult to defend against cache trashing attacks.

(Unless, of course, I'm missing some obvious schemes that show promise of 
avoiding some of these issues against determined attackers. It is also possible 
that if we described the situation in more detail, we'd be able to describe the 
threats in a more rational way. E.g., outsiders can cause some (limited) 
problems, insiders could cause big trouble but are generally a bit more 
trusted, etc.)
Schemes are work in progress and hence why we don't want to list them. We had 
mentioned this before from the Nanog-triggered thread which we moved over to 
the [email protected] list.

I agree that we should not mention any schemes. But I do want to add the last 
sentence, because I think it is a true statement and more importantly, it 
provides IMO a fair assessment of the potential difficulties.


    This experimental specification does not address automated key
    management (AKM).BCP 107<http://tools.ietf.org/html/bcp107>   provides 
guidance in this area.
Yes, but I think we should include two additional important pieces of 
information. 1. you need to acknowledge that you are not following BCP 107 in 
this case, as it requires AKM under certain conditions (we are within those 
conditions, right?). And 2) more importantly, you need to document the 
implications of not providing AKM. Personally, I do not necessarily consider it 
a panacea, and often the nonce etc. mechanisms are far more important. In any 
case, the reader needs to understand what we are losing without AKM.
This text was created, accepted, and agreed upon from the security ADs. So I 
dare not to touch it.

Grumble. I think it would be better with a text that describes the 
implications. And I think we could actually do a better job than the security 
ADs are apparently telling you to do. It is not unheard to have a discuss 
waiting for us anyway even if some text was agreed, if we haven't done our 
homework. But I'll let this go in the interest of expediency, and because I 
happen to believe AKM in this case is an almost complete non-issue. But I do 
not want to take this approach in the other issues.


13.  Network Management Considerations

   Considerations for Network Management tools exist so the LISP
   protocol suite can be operationally managed.  The mechanisms can be
   found in [LISP-MIB] and [LISP-LIG].
It is good that you point to these specifications. I wonder if there are 
additional things you should say in this spec, however. Are there parameters 
that Lisp needs to operate? Are they and their default values described in 
LISP-MIB? There are many good pieces of advice about the management of a Lisp 
network in previous sections, should there be some kind of summary/pointers for 
these here as well?
All described in the LISP-MIB, which is still ongoing. I will make sure we put 
any configuration guidelines in there.

OK

Jari

_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to