Hi Sharon,

We may be talking about an XTR that is sick due to a bug or attack. We may also 
be talking about an attacker that isn't an XTR at all, just impersonating one.

                                                                              
Ron


> -----Original Message-----
> From: Sharon [mailto:[email protected]]
> Sent: Monday, May 26, 2014 12:06 PM
> To: Joel M. Halpern
> Cc: Ronald Bonica; Damien Saucez; Roger Jorgensen; LISP mailing list list
> Subject: Re: [lisp] Restarting last call on LISP threats
> 
> Joel, thanks for clearing.
> It was hard to follow.
> 
> If the challenge is for a distributed mapping system to keep track and protect
> itself from a "sick" xTR, sick because of a bug or an attack..
> Then perhaps we could maintain mapping lookup per sec counters per xTR in
> the mapping. It adds some overhead to the mapping, but doesn't slow down
> forwarding. Can be aggregated by map servers for efficiency.
> 
> --szb
> 
> On May 26, 2014, at 8:46 AM, "Joel M. Halpern" <[email protected]>
> wrote:
> 
> Top posting to make sure I am understanding:
> 
> You asssert that any xTR is subject to a DoS attack.  And that such a DoS
> attack can render the mapping system unusable.
> 
> It targeting an ITR, this would need to be from within ths cope the ITR 
> serves.
> I believe that is discussed.
> 
> If I have connected the dots correctly, the attack you are contemplating is
> sending a large stream of packets with different inner source addresses to an
> ETR.  This would prompt the ETR to check with the mapping system about
> each and every address.
> 
> If I have understood this properly, while there are several very effective
> mitigations, that does not change the basic message that this is an attack, 
> and
> as such ought to be described in the threats document.  There are clealry a
> number of variations on this attack.  For example, using the same outer
> source address makes mitigation easier, while using different outer source
> addresses either requires a bot-net or a large unchecked BCP38 hole (and
> those can be used for MANY attacks on many systems.)  Both presumably
> should be described.
> 
> Have I captured your request accurately?
> 
> Yours,
> Joel
> 
> > On 5/26/14, 1:06 AM, Ronald Bonica wrote:
> > *From:*Damien Saucez [mailto:[email protected]]
> > *Sent:* Friday, May 23, 2014 9:07 AM
> > *To:* Ronald Bonica
> > *Cc:* Dino Farinacci; Roger Jorgensen; LISP mailing list list
> > *Subject:* Re: [lisp] Restarting last call on LISP threats
> >
> > Hello Ronald,
> >
> > On 22 May 2014, at 22:57, Ronald Bonica <[email protected]
> > <mailto:[email protected]>> wrote:
> >
> >
> >
> >    Dino,
> >
> >    Today's Internet is not as fragile as you think. This mail traversed
> >    many routers between my house and yours. If those routers are
> >    well-managed, there is nothing that I can do from my house that will
> >    cause any of those routers to consume control plane resources.
> >    Therefore, there is nothing that I can do from my house that will
> >    cause a DoS attack against those routers' control planes.
> >
> > We tend to disagree with that, for example you have ICMP today...
> >
> > */[RPB] Because ICMP is susceptible to DoS attacks, it wouldn’t make a
> > very good routing protocol. That’s why we don’t use it for routing. By
> > contrast, LISP map-request messages are susceptible to DoS attacks and
> > they do carry routing information./*
> >
> >
> >
> >    In LISP, separation between the forwarding and control plane is
> >    lost. As a matter of course, forwarding plane activity causes
> >    control plane activity. Since forwarding plane bandwidth exceeds
> >    control plane bandwidth, DoS attacks against the control plane are
> >    possible.
> >
> >    In order to be complete, the threats document must describe the DoS
> >    threat. It should also describe mitigations, if any exist.
> >
> > DoS is already explained and the definition given:
> >
> > " A Denial of Service (DoS) attack aims at disrupting a specific
> >
> >    targeted service either by exhausting the resources of the victim
> > up
> >
> >    to the point that it is not able to provide a reliable service to
> >
> >    legit traffic and/or systems or by exploiting vulnerabilities to
> > make
> >
> >    the targeted service unable to operate properly.
> >
> > "
> >
> > is covering the case you mention.
> >
> > */[RPB] /*
> >
> > */You might want to add the following details to section 5.2:/*
> >
> > *//*
> >
> > -A DoS attack can be launched by anybody who can send a packet to the
> > XTR’s LOC
> >
> > -DoS attacks can render an XTR inoperable
> >
> > -DDoS attacks can render the mapping system inoperable.
> >
> > This is what differentiates LISP from today’s routing system.
> >
> >                                       Ron
> >
> > Damien Saucez
> >
> >
> >
> >
> > Ron
> >
> >
> >
> >        -----Original Message-----
> >        From: Dino Farinacci [mailto:[email protected]]
> >        Sent: Wednesday, May 21, 2014 6:58 PM
> >        To: Ronald Bonica
> >        Cc: Roger Jorgensen; [email protected] <mailto:[email protected]>
> >        Subject: Re: [lisp] Restarting last call on LISP threats
> >
> >
> >            The attacker sends a flow of crafted packets to the victim
> >            XTR. Each packet
> >
> >        is a well-formed LISP data packet. It contains:
> >
> >
> >            - an outer IP header (LOC->LOC)
> >            - a UDP header
> >            - a LISP Header
> >            - an IP header (EID->EID)
> >            - payload
> >
> >
> >        Just like a regular packet I can send to your home router today.
> >        So yes okay.
> >        So let's continue. See comments below.
> >
> >
> >            Each packet contains control plane information that is new
> >            to the victim
> >
> >
> >        Be more specific about what control information are in these
> >        encapsulated
> >        packets.
> >
> >
> >            XTR. For example, the victim XTR has no mapping information
> >            regarding
> >
> >        either the source LOC or source EID prefix. Rather than gleaning
> >        this mapping
> >        information from the crafted packet, the victim XTR sends a
> >        verifying MAP-
> >        REQUEST to the mapping system.
> >
> >
> >            Assume that the attack flow is large (N packets per second).
> >            Assume also
> >
> >        that the XTRs rate limit for MAP-REQUEST messages is less than N
> >        packets
> >        per second. Has the attack not effectively DoS'd the victim XTR?
> >
> >        It caches the rate the rate the packets are coming in and
> >        eventually stops
> >        sending Map-Requests completely.
> >
> >        It cannot stop the incoming rate of packets today just like a
> >        roque BGP
> >        attacker can send millions of packets per second to a peer
> >        regardless if it
> >        does or does not have the peer authentication key.
> >
> >
> >            To make this attack work, every packet in the attack flow
> >            may need to have
> >
> >        a unique, spoofed, source LOC.
> >
> >        An implementation can detect that after rate limiting 1000s of
> >        such requests
> >        are happening that it just stops operation.
> >
> >        What if I sent a Juniper 20 million routes today?
> >
> >        The Internet is very fragile and LISP IS NOT making it worse.
> >        And in some
> >        cases it is making it better with integrated techniques.
> >
> >        Dino
> >
> >
> >    _______________________________________________
> >    lisp mailing list
> >    [email protected] <mailto:[email protected]>
> >    https://www.ietf.org/mailman/listinfo/lisp
> >
> >
> >
> > _______________________________________________
> > lisp mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/lisp
> >
> 
> _______________________________________________
> lisp mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/lisp
_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to