Hi Peter,
All good, I figured it was something like that. Two residual nits —
1. One “datapalne” got left in. I guess you need something to seed version 11
after all…
2. It looks like this one got omitted:
@@ -579,8 +592,18 @@
receiver.
The metric value in the parent TLV is RECOMMENDED to be set to
- LSInfinity [RFC2328]. This recommendation only servers for debugging
+ LSInfinity [RFC2328]. This recommendation only serves for debugging
purposes and does not impact the functionality.
+---
+jgs: Thanks for adding the additional explanation. I made a minor editing
+correction in-line, but I also have a slightly more extensive revision to
+suggest:
+
+NEW:
+ This recommendation is provided as a network troubleshooting
+ convenience; if it is not followed the protocol will still
+ function correctly.
+—
Obviously, I don’t insist on the proposed rewrite. But even if you don’t use it
you presumably should take the s/servers/serves/ proofreading correction.
I’m going to go ahead and request IETF Last Call, but feel free to push a
revision with corrections if you want.
—John
> On May 2, 2023, at 6:06 AM, Peter Psenak <[email protected]>
> wrote:
>
>
> Hi John,
>
> I apologize for the misses, likely the result of multiple editors
> updating the draft in parallel.
>
> I also fixed the nits and updated the security sections as you proposed.
>
> Version 10 has been published.
>
> thanks,
> Peter
>
>
>
>
>
> On 01/05/2023 20:54, John Scudder wrote:
>> Hi Peter (and Shraddha),
>>
>>> On Apr 28, 2023, at 9:13 AM, Peter Psenak
>>> <[email protected]> wrote:
>>>
>>> Shradha and I have worked to address your comments.
>>> The new version of the draft has been published.
>>
>> Thanks for that. I’ve reviewed the diffs in 09. I’ve attached a short review
>> of it; there are some minor proofreading changes, but also one place a
>> substantive edit was overlooked that I’ve flagged in Section 6.2. I also
>> made a further suggestion on your Security Considerations.
>>
>> I think one more revision and we will be ready for IETF Last Call.
>>
>> Thanks,
>>
>> —John
>>
>> --- draft-ietf-lsr-ip-flexalgo-09.txt 2023-05-01 13:21:34.000000000 -0400
>> +++ draft-ietf-lsr-ip-flexalgo-09-jgs-comments.txt 2023-05-01
>> 14:47:16.000000000 -0400
>> @@ -138,9 +138,9 @@
>> result, traffic for different sessions is destined to a different
>> destination IP address.
>>
>> - IP address allocated to the UPF can be associated with an algoritm.
>> + The IP address allocated to the UPF can be associated with an algorithm.
>> The mobile user traffic is then forwarded along the path based on the
>> - algorithm specific metric and constraints. As a result, traffic can
>> + algorithm-specific metric and constraints. As a result, traffic can
>> be sent over a path that is optimized for minimal latency or highest
>> bandwidth. This mechanism is used to achieve SLA (Service Level
>> Agreement) appropriate for a user session.
>> @@ -186,9 +186,9 @@
>>
>> Advertisement of participation in IP Flex-Algorithm does not impact
>> the router participation signaled for other data-planes. For
>> - Example, it is possible that a router participates in a particular
>> - flex-algo for IP datapalne but does not participate in the same flex-
>> - algo for SR dataplane.
>> + example, it is possible that a router participates in a particular
>> + flex-algo for the IP dataplane but does not participate in the same flex-
>> + algo for the SR dataplane.
>>
>> The following sections describe how the IP Flex-Algorithm
>> participation is advertised in IGP protocols.
>> @@ -196,6 +196,11 @@
>> 5.1. The IS-IS IP Algorithm Sub-TLV
>>
>> The ISIS [ISO10589] IP Algorithm Sub-TLV is a sub-TLV of the IS-IS
>> +---
>> +jgs: Was it deliberate that you didn't accept the suggestion to
>> +hyphenate "ISIS" above, or an oversight? If deliberate, how come?
>> +If accidental, please change in next rev.
>> +---
>> Router Capability TLV [RFC7981] and has the following format:
>>
>> 0 1 2 3
>> @@ -302,9 +307,9 @@
>> 6. Advertising IP Flex-Algorithm Reachability
>>
>> To be able to associate the prefix with the Flex-Algorithm, the
>> - existing prefix reachability advertisements can not be used, because
>> + existing prefix reachability advertisements cannot be used, because
>> they advertise the prefix reachability in default algorithm 0.
>> - Instead, a new IP Flex-Algorithm reachability advertisements are
>> + Instead, new IP Flex-Algorithm reachability advertisements are
>> defined in IS-IS and OSPF.
>>
>> The M-flag in the FAD is not applicable to IP Algorithm Prefixes.
>> @@ -410,6 +415,11 @@
>> all of them do not advertise the same algorithm, it MUST ignore all
>> of them and MUST NOT install any forwarding entries based on these
>> advertisements. This situation SHOULD be logged as an error.
>> +---
>> +jgs: Thanks for these rewrites. Unfortunately there is a similar case
>> +later (Section 6.2) which was missed. It needs a similar rewrite,
>> +I will flag it below, please refer back to this section.
>> +---
>>
>> In cases where a prefix advertisement is received in both a IPv4
>> Prefix Reachability TLV and an IPv4 Algorithm Prefix Reachability
>> @@ -434,6 +444,9 @@
>> with a different Algorithm, MUST ignore all of them and MUST NOT
>> install any forwarding entries based on these advertisements. This
>> situation SHOULD be logged as an error.
>> +---
>> +jgs: These two paragraphs need a rewrite similar to Section 6.1.
>> +---
>>
>> In cases where a prefix advertisement is received in both an IPv6
>> Prefix Reachability TLV and an IPv6 Algorithm Prefix Reachability
>> @@ -579,8 +592,18 @@
>> receiver.
>>
>> The metric value in the parent TLV is RECOMMENDED to be set to
>> - LSInfinity [RFC2328]. This recommendation only servers for debugging
>> + LSInfinity [RFC2328]. This recommendation only serves for debugging
>> purposes and does not impact the functionality.
>> +---
>> +jgs: Thanks for adding the additional explanation. I made a minor editing
>> +correction in-line, but I also have a slightly more extensive revision to
>> +suggest:
>> +
>> +NEW:
>> + This recommendation is provided as a network troubleshooting
>> + convenience; if it is not followed the protocol will still
>> + function correctly.
>> +---
>>
>> An OSPFv3 router receiving multiple OSPFv3 IP Algorithm Prefix
>> Reachability Sub-TLVs in the same parent TLV, MUST select the first
>> @@ -932,13 +955,47 @@
>> This document inherits security considerations from [RFC9350].
>>
>> This document introduces one additional way to disrupt Flexible
>> - algorithm based networks. If the node that is authenticated is taken
>> - over by an attacker, such rogue node can advertise a prefix
>> + Algorithm based networks. If a node that is authenticated is taken
>> + over by an attacker, such a rogue node can advertise a prefix
>> reachability for a particular IP Flexible-algorithm X while that
>> prefix has been advertised in algorithm Y. This kind of attack makes
>> - the prefix unreachable. Such attack is not preventable through
>> + the prefix unreachable. Such an attack is not preventable through
>> authentication, and it is not different from advertising any other
>> incorrect information through IS-IS or OSPF.
>> +---
>> +jgs: Thanks for this. I think you should provide a reference to
>> +illustrate what you're talking about, e.g. "This kind of attack makes
>> +the prefix unreachable (to see why this is, consider, for example, the
>> +rule given in the second-last paragraph of Section 6.1)".
>> +
>> +I see you cribbed the text from RFC 9350, which is not a bad idea
>> +considering that was recently approved by the IESG so presumably they
>> +like the look of it. But in that case, I think it would be a good idea
>> +to copy the 9350 section more comprehensively. Something like this:
>> +
>> + This document adds one new way to disrupt IGP networks that are using
>> + Flex-Algorithm: an attacker can suppress reachability for a given
>> + prefix whose reachability is advertised by a legitimate node for a
>> + particular IP Flex-Algorithm X, by advertising the same prefix in
>> + Flex-Algorithm Y from another, malicious node. (To see why this is,
>> + consider, for example, the rule given in the second-last paragraph of
>> + Section 6.1.)
>> +
>> + This attack can be addressed by the existing security extensions, as
>> + described in [RFC5304] and [RFC5310] for IS-IS, in [RFC2328] and
>> + [RFC7474] for OSPFv2, and in [RFC4552] and [RFC5340] for OSPFv3.
>> +
>> + If a node that is authenticated is taken over by an attacker, such a
>> + rogue node can perform the attack described above. Such an attack is
>> + not preventable through authentication, and it is not different from
>> + advertising any other incorrect information through IS-IS or OSPF.
>> +
>> +I was tempted to rewrite further (I was bugged that "node that is
>> +authenticated" isn't a well-defined term) but I think the argument that
>> +this text already passed IESG review recently, is pretty compelling, so
>> +the above is just a minimal substitution into the RFC 9350 security
>> +considerations.
>> +---
>>
>> 13. Acknowledgements
>>
>>
>>
>>
>>
>
_______________________________________________
Lsr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lsr