Sigh

Yours Irrespectively,

John

> -----Original Message-----
> From: Acee Lindem [mailto:acee.lin...@gmail.com]
> Sent: Monday, January 05, 2015 10:20 AM
> To: John E Drake
> Cc: Acee Lindem (acee); adr...@olddog.co.uk; Stephen Farrell; The IESG;
> OSPF List; ospf-cha...@tools.ietf.org; draft-ietf-ospf-te-metric-
> extensions....@tools.ietf.org
> Subject: Re: [OSPF] Stephen Farrell's No Objection on draft-ietf-ospf-te-
> metric-extensions-09: (with COMMENT)
> 
> Hi John,
> I realized now I have one more comment that is better late than never. Can
> you add a reference to RFC 5329 in the abstract, section 3, section 10, and
> section 11? There is no reason why these metric extensions shouldn't apply
> equally to the OSPFv3 TE.
> Thanks,
> Acee
> On Jan 5, 2015, at 10:00 AM, John E Drake <jdr...@juniper.net> wrote:
> 
> > Acee,
> >
> > I will take care of Stephen's nits and add the references you mention to the
> Security Considerations.
> >
> > Yours Irrespectively,
> >
> > John
> >
> >> -----Original Message-----
> >> From: OSPF [mailto:ospf-boun...@ietf.org] On Behalf Of Acee Lindem
> >> (acee)
> >> Sent: Monday, January 05, 2015 9:51 AM
> >> To: adr...@olddog.co.uk; 'Stephen Farrell'; 'The IESG'
> >> Cc: ospf@ietf.org; ospf-cha...@tools.ietf.org;
> >> draft-ietf-ospf-te-metric- extensions....@tools.ietf.org
> >> Subject: Re: [OSPF] Stephen Farrell's No Objection on
> >> draft-ietf-ospf-te-
> >> metric-extensions-09: (with COMMENT)
> >>
> >> Hi Stephen, Adrian,
> >>
> >> On 1/4/15, 4:39 AM, "Adrian Farrel" <adr...@olddog.co.uk> wrote:
> >>
> >>> Hi Stephen,
> >>>
> >>> I'd like the authors and shepherd to pitch in, but...
> >>>
> >>>> - I'd have thought that these TLVs would be sent more often than
> >>>> others, and that (if enormous amounts of money are in play) then
> >>>> use of OSPF authentication might be more likely needed (or some
> >>>> equivalent security mechanisms). I'd even speculate that if
> >>>> enormous amounts of money are in play, then confidentiality may
> >>>> become a requirement (since if I can observe say A bit settings
> >>>> then that might give me insight into traffic levels - sort of a
> >>>> lights burning at night in central bank implies interest-rate
> >>>> change attack). Can you say why none of that needs to be mentioned
> >>>> at all? Was any of that considered by the WG? (Can you send a
> >>>> relevant link to the
> >>>> archive?)
> >>>
> >>> I think you are raising two points:
> >>> 1. Are the TLVs sent more often than others and what are the
> implications?
> >>> 2. What can be learned from sniffing these TLVs?
> >>>
> >>> To the first point, I don't think they are sent more often than
> >>> other TE TLVs. Indeed metrics for loss and delay may be more stable
> >>> than others, and Section 5 addresses measurement intervals and
> >>> projects that on to announcement thresholds.
> >>>
> >>> So the risk is that changes in bandwidth availability will cause
> >>> rapid or frequent announcement of those metrics.  However, just like
> >>> the original bandwidth metrics, implementations apply thresholds so
> >>> that small changes don't trigger re-announcement in order to avoid
> >>> stressing the
> >> network.
> >>> Section 6 discusses this.
> >>>
> >>> Thus, I think we can discard 1.
> >>
> >>
> >> Agreed. This is covered in sections 5 and 6.
> >>
> >>>
> >>> The second point is important: you can find out a lot about a
> >>> network by sniffing the IGP, and if your plan is to understand the
> >>> state of your competitor's network or to find the week spots to
> >>> attack, then this is a powerful tool. But in this matter I would
> >>> argue that these no TLVs are no more sensitive than other,
> >>> pre-existing TLVs, although (of
> >>> course) the more TLVs, the more information is available to be sniffed.
> >>>
> >>> So, the question is how do we protect IGP information as it is
> >>> advertised within a network. There are four elements:
> >>> - IGP information is retained within an administrative domain.
> >>> - If a router is compromised it has access to all of the information
> >>> and there is nothing we can do.
> >>> - If a node attempts to join a network to access the information it
> >>> will be unknown and will not be able to peer.
> >>> - If a link is sniffed (which is a somewhat more sophisticated
> >>> attack) protection relies on encryption of the messages most
> >>> probably at layer 2, but potentially at IP (which is an option for
> >>> OSPF) or within the OSPF messages themselves.
> >>>
> >>> I think all of this is just "IGP security as normal", was discussed
> >>> by KARP, and is everyday business for network operators.
> >>
> >>
> >> I agree. I can¹t see that delay/loss would be more sensitive than
> >> reachability information. I guess the premise is that one might want
> >> to target better for links for DDoS attacks? I do not recall this
> >> coming up in the discussions on either the OSPF or ISIS lists (there is an
> ISIS draft advertising the same TLVs).
> >>
> >>
> >>>
> >>> [snip]
> >>>
> >>>> - The security considerations of RFC 3630, from 2003, is
> >>>> 11 lines long. Has nothing affected OSPF security in the last
> >>>> decade+ that would be worth noting here?
> >>>
> >>> That is a good point. There is plenty of newer security work.
> >>
> >> This should include RFC 6863 for analysis, RFC 5709 for protection,
> >> and
> >> draft-ietf-ospf-security-extension-manual-keying-11 for protection.
> >> John?
> >>
> >> Thanks,
> >> Acee
> >>
> >>
> >>>
> >>> Adrian
> >>>
> >>
> >> _______________________________________________
> >> OSPF mailing list
> >> OSPF@ietf.org
> >> https://www.ietf.org/mailman/listinfo/ospf
> >
> > _______________________________________________
> > OSPF mailing list
> > OSPF@ietf.org
> > https://www.ietf.org/mailman/listinfo/ospf

_______________________________________________
OSPF mailing list
OSPF@ietf.org
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to