Hi Kathleen,
The -13 version includes the clarifying text.

http://www.ietf.org/id/draft-ietf-ospf-prefix-link-attr-13.txt

Thanks,
Acee

On 8/19/15, 3:34 PM, "Kathleen Moriarty"
<kathleen.moriarty.i...@gmail.com> wrote:

>Hi Acee,
>
>On Wed, Aug 19, 2015 at 3:31 PM, Acee Lindem (acee) <a...@cisco.com>
>wrote:
>> Hi Kathleen,
>>
>> On 8/19/15, 3:24 PM, "Kathleen Moriarty"
>> <kathleen.moriarty.i...@gmail.com> wrote:
>>
>>>Hi Acee,
>>>
>>>On Wed, Aug 19, 2015 at 3:16 PM, Acee Lindem (acee) <a...@cisco.com>
>>>wrote:
>>>>
>>>>
>>>> On 8/19/15, 2:58 PM, "Kathleen Moriarty"
>>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>
>>>>>Hi Acee,
>>>>>
>>>>>On Wed, Aug 19, 2015 at 2:44 PM, Acee Lindem (acee) <a...@cisco.com>
>>>>>wrote:
>>>>>> Hi Kathleen,
>>>>>>
>>>>>> On 8/19/15, 2:14 PM, "Kathleen Moriarty"
>>>>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>>>
>>>>>>>Hi Acee,
>>>>>>>
>>>>>>>On Wed, Aug 19, 2015 at 2:07 PM, Acee Lindem (acee) <a...@cisco.com>
>>>>>>>wrote:
>>>>>>>> Hi Kathleen,
>>>>>>>>
>>>>>>>> On 8/19/15, 2:00 PM, "Kathleen Moriarty"
>>>>>>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>>>>>
>>>>>>>>>Hi Alia,
>>>>>>>>>
>>>>>>>>>Thanks for the write up.  I have a couple of questions in-line.
>>>>>>>>>
>>>>>>>>>On Wed, Aug 19, 2015 at 11:57 AM, Alia Atlas <akat...@gmail.com>
>>>>>>>>>wrote:
>>>>>>>>>> Hi Kathleen,
>>>>>>>>>>
>>>>>>>>>> As discussed, the type field in the TLVs and sub-TLVs are
>>>>>>>>>>limited
>>>>>>>>>>to
>>>>>>>>>>their
>>>>>>>>>> range.
>>>>>>>>>> This draft in the IANA considerations specifies what the range
>>>>>>>>>>for
>>>>>>>>>>those
>>>>>>>>>> values are.
>>>>>>>>>> This is just as has been done with other OSPF TLVs ( for example
>>>>>>>>>>
>>>>>>>>>>http://www.iana.org/assignments/ospf-traffic-eng-tlvs/ospf-traffi
>>>>>>>>>>c-
>>>>>>>>>>en
>>>>>>>>>>g-
>>>>>>>>>>tl
>>>>>>>>>>vs.xhtml#top-level
>>>>>>>>>> )
>>>>>>>>>> For future extensibility, it is important to be able to
>>>>>>>>>>distribute
>>>>>>>>>>unknown
>>>>>>>>>> TLVs
>>>>>>>>>> throughout the IGP; sometimes, only routers in particular roles
>>>>>>>>>>will
>>>>>>>>>>care
>>>>>>>>>> about the information.
>>>>>>>>>>
>>>>>>>>>> However, the length field constrains how big the value can be
>>>>>>>>>>and
>>>>>>>>>>any
>>>>>>>>>> problems
>>>>>>>>>> with parsing it into an opaque value would cause the LSA to be
>>>>>>>>>>considered
>>>>>>>>>> malformed.
>>>>>>>>>
>>>>>>>>>But there are no restrictions on values that have not been defined
>>>>>>>>>and
>>>>>>>>>they are stored and forwarded anyway?  This is the main concern in
>>>>>>>>>that there are no checks on these values (and I'm assuming there
>>>>>>>>>are
>>>>>>>>>programming checks on the defined values whose length can vary in
>>>>>>>>>terms of the # of octets for any value and could be 4 to 32 or
>>>>>>>>>more
>>>>>>>>>octets).  Because of the range of acceptable length values for
>>>>>>>>>defined
>>>>>>>>>TLVs, it would be hard to know if you have something malformed or
>>>>>>>>>containing an exploit on undefined values, right?
>>>>>>>>
>>>>>>>> If it is malformed, it would be highly unlikely that all the
>>>>>>>>length
>>>>>>>> parsing would come out correctly. The key is that you NEVER want
>>>>>>>>to
>>>>>>>> reference beyond the end of the LSA and the LSA should never
>>>>>>>>overflow
>>>>>>>>the
>>>>>>>> end of the OSPF packet.
>>>>>>>
>>>>>>>I can appreciate your point on malformed, but checking in the
>>>>>>>positive
>>>>>>>direction (what is allowed) is more useful than checking for a
>>>>>>>number
>>>>>>>of conditions that would make it malformed as it is easier to miss
>>>>>>>something if you don't test for all conditions that make it
>>>>>>>malformed.
>>>>>>>
>>>>>>>Is there a way to rephrase the wording so that the check is to
>>>>>>>ensure
>>>>>>>expected conditions are met as opposed to it 'not being malformed'.
>>>>>>> I
>>>>>>>tried previously and you didn't like the suggestion, could you
>>>>>>>propose
>>>>>>>something?
>>>>>>>
>>>>>>>>
>>>>>>>>>What if a code
>>>>>>>>>condition was reached because an undefined value is stored and
>>>>>>>>>'reflooded' to all the peers?
>>>>>>>>
>>>>>>>> If, by chance, the parsing came out correctly, the malformed
>>>>>>>>information
>>>>>>>> in the LSA would simply be interpreted as unknown TLVs.
>>>>>>>
>>>>>>>How would you know it is malformed?  What conditions are checked?
>>>>>>
>>>>>> The TLV is almost as old as networking itself. You simply want to
>>>>>>assure
>>>>>> that none of the nested pieces overrun the subsuming pieces with the
>>>>>>LSA
>>>>>> being at the top level.
>>>>>
>>>>>If this is what is meant by not malformed, I think the explanation is
>>>>>clearer.
>>>>
>>>> There are other cases as well. This would be a better topic for an
>>>> informational draft than here.
>>>>
>>>>>
>>>>>
>>>>>I don’t think I need to tell people how to
>>>>>> implement it in the security considerations of this draft when there
>>>>>>are
>>>>>> probably hundreds that utilize TLVs (or the AVP variation from AAA
>>>>>> specifications).
>>>>>
>>>>>It's the same point, but written more clearly for developers of code
>>>>>than what you have proposed.  I think this is helpful as companies
>>>>>hire new people to code all the time.
>>>>
>>>> The “Security Considerations” of this draft is not the place for a
>>>> treatise on TLV parsing.
>>>
>>>I don't agree with the proposed text in the way it is written that you
>>>provided in response to Alvaro's questions.  You are adding text that
>>>does almost what I am asking, but says malformed are rejected.  There
>>>is just no way to know what to accept/reject from this language.  If
>>>there was a pointer to another draft, that would be great.
>>
>> How about this:
>>
>>   In this context, a malformed LSA is one which cannot be parsed due to
>>a
>> TLV or Sub-TLV overrunning the end of the subsuming LSA, TLV, or sub-TLV
>> or where there is data remaining to be parsed but the length of the
>> remaining data is less than the size of a TLV header.
>>
>> These are the situations that can cause a routing process to crash.
>
>Thank you, I think that text is much more helpful.
>
>Best regards,
>Kathleen
>
>>
>> Acee
>>
>>
>>>
>>>Thanks,
>>>Kathleen
>>>
>>>>
>>>> Acee
>>>>
>>>>
>>>>>
>>>>>Thanks,
>>>>>Kathleen
>>>>>
>>>>>>
>>>>>> Thanks,
>>>>>> Acee
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>>
>>>>>>>Thank you,
>>>>>>>Kathleen
>>>>>>>
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>> Acee
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> I hope this clarifies?
>>>>>>>>>
>>>>>>>>>Yes, thank you, but I'm still a little concerned.
>>>>>>>>>
>>>>>>>>>Thanks,
>>>>>>>>>Kathleen
>>>>>>>>>>
>>>>>>>>>> Thanks,
>>>>>>>>>> Alia
>>>>>>>>>>
>>>>>>>>>> On Wed, Aug 19, 2015 at 10:44 AM, Kathleen Moriarty
>>>>>>>>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>>>>>>>>
>>>>>>>>>>> Hi Acee,
>>>>>>>>>>>
>>>>>>>>>>> Alia and I talked about this yesterday and she will be
>>>>>>>>>>>following
>>>>>>>>>>>up
>>>>>>>>>>> from that discussion.  It may just point back to previous RFCs
>>>>>>>>>>>that
>>>>>>>>>>> cover my concern or may result in a change to text.
>>>>>>>>>>>
>>>>>>>>>>> Stand by...
>>>>>>>>>>>
>>>>>>>>>>> Thank you.
>>>>>>>>>>>
>>>>>>>>>>> On Tue, Aug 18, 2015 at 3:42 PM, Acee Lindem (acee)
>>>>>>>>>>><a...@cisco.com>
>>>>>>>>>>> wrote:
>>>>>>>>>>> >
>>>>>>>>>>> >
>>>>>>>>>>> > On 8/18/15, 3:38 PM, "Kathleen Moriarty"
>>>>>>>>>>> > <kathleen.moriarty.i...@gmail.com> wrote:
>>>>>>>>>>> >
>>>>>>>>>>> >>On Tue, Aug 18, 2015 at 3:35 PM, Acee Lindem (acee)
>>>>>>>>>>><a...@cisco.com>
>>>>>>>>>>> >>wrote:
>>>>>>>>>>> >>> Hi Kathleen,
>>>>>>>>>>> >>>
>>>>>>>>>>> >>> On 8/18/15, 1:54 PM, "Kathleen Moriarty"
>>>>>>>>>>> >>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>>>>>>>> >>>
>>>>>>>>>>> >>>>Acee,
>>>>>>>>>>> >>>>
>>>>>>>>>>> >>>>On Tue, Aug 18, 2015 at 1:20 PM, Acee Lindem (acee)
>>>>>>>>>>><a...@cisco.com>
>>>>>>>>>>> >>>>wrote:
>>>>>>>>>>> >>>>> Hi Kathleen,
>>>>>>>>>>> >>>>>
>>>>>>>>>>> >>>>> On 8/18/15, 10:57 AM, "Kathleen Moriarty"
>>>>>>>>>>> >>>>> <kathleen.moriarty.i...@gmail.com> wrote:
>>>>>>>>>>> >>>>>
>>>>>>>>>>> >>>>>>Thank you for your quick response, Acee.  I just have one
>>>>>>>>>>>tweak
>>>>>>>>>>> >>>>>> inline
>>>>>>>>>>> >>>>>>that is usually important from a security standpoint.
>>>>>>>>>>> >>>>>>
>>>>>>>>>>> >>>>>>On Mon, Aug 17, 2015 at 6:46 PM, Acee Lindem (acee)
>>>>>>>>>>><a...@cisco.com>
>>>>>>>>>>> >>>>>>wrote:
>>>>>>>>>>> >>>>>>> Hi Kathleen,
>>>>>>>>>>> >>>>>>> Here are the updated "Security Considerations” after
>>>>>>>>>>>addressing
>>>>>>>>>>> >>>>>>>Alvaro’s
>>>>>>>>>>> >>>>>>> comments.
>>>>>>>>>>> >>>>>>>
>>>>>>>>>>> >>>>>>> 6.  Security Considerations
>>>>>>>>>>> >>>>>>>
>>>>>>>>>>> >>>>>>>    In general, new LSAs defined in this document are
>>>>>>>>>>>subject
>>>>>>>>>>>to
>>>>>>>>>>> >>>>>>> the
>>>>>>>>>>> >>>>>>>same
>>>>>>>>>>> >>>>>>>    security concerns as those described in [OSPFV2] and
>>>>>>>>>>>[OPAQUE]
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>--
>>>>>>>
>>>>>>>Best regards,
>>>>>>>Kathleen
>>>>>>
>>>>>
>>>>>
>>>>>
>>>>>--
>>>>>
>>>>>Best regards,
>>>>>Kathleen
>>>>
>>>
>>>
>>>
>>>--
>>>
>>>Best regards,
>>>Kathleen
>>
>
>
>
>-- 
>
>Best regards,
>Kathleen

_______________________________________________
OSPF mailing list
OSPF@ietf.org
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to