Hi Kathleen, 
Here are the updated "Security Considerations” after addressing Alvaro’s
comments.

6.  Security Considerations

   In general, new LSAs defined in this document are subject to the same
   security concerns as those described in [OSPFV2] and [OPAQUE].

   OSPFv2 applications utilizing these OSPFv2 extensions must define the
   security considerations relating to those applications in the
   the specifications corresponding to those applications.

   Additionally, implementations must assure that malformed TLV and Sub-
   TLV permutations are detected and do not provide a vulnerability for
   attackers to crash the OSPFv2 router or routing process.  Malformed
   LSAs MUST NOT be stored in the Link State Database (LSDB),
   acknowledged, or reflooded.  Reception of malformed LSAs SHOULD be
   counted or logged for further analysis.


Thanks,
Acee

On 8/17/15, 4:06 PM, "Kathleen Moriarty"
<kathleen.moriarty.i...@gmail.com> wrote:

>Kathleen Moriarty has entered the following ballot position for
>draft-ietf-ospf-prefix-link-attr-10: Discuss
>
>When responding, please keep the subject line intact and reply to all
>email addresses included in the To and CC lines. (Feel free to cut this
>introductory paragraph, however.)
>
>
>Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>for more information about IESG DISCUSS and COMMENT positions.
>
>
>The document, along with other ballot positions, can be found here:
>https://datatracker.ietf.org/doc/draft-ietf-ospf-prefix-link-attr/
>
>
>
>----------------------------------------------------------------------
>DISCUSS:
>----------------------------------------------------------------------
>
>Thanks for your work on this draft.
>
>I have questions along the lines that Alvaro raised on the last sentence
>of the Security Considerations section, but in context of security, this
>is something that should be discussed.
>
>  "Additionally,
>   implementations must assure that malformed TLV and Sub-TLV
>   permutations do not result in errors that cause hard OSPF failures."
>
>It would be very helpful to expand upon this statement.  Are there
>exploits that could result as well?  Should this instead be scoped in
>terms of what is valid so that the appropriate actions occur consistently
>when an invalid or malformed TLV or sub-TLV are received?  I would think
>the answer to the last question would clarify this enough for this
>security consideration and if that's not possible, can you explain what
>I'm missing?
>
>Thank you.
>
>
>

_______________________________________________
OSPF mailing list
OSPF@ietf.org
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to