Hi Adam,

Thanks for your review and comments.
Please see inline [Bruno]

> From: Adam Roach [mailto:a...@nostrum.com]
 > Sent: Thursday, August 31, 2017 3:26 AM
> 
 > Adam Roach has entered the following ballot position for
 > draft-ietf-ospf-encapsulation-cap-06: No Objection
 > 
 > When responding, please keep the subject line intact and reply to all
 > email addresses included in the To and CC lines. (Feel free to cut this
 > introductory paragraph, however.)
 > 
 > 
 > Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
 > for more information about IESG DISCUSS and COMMENT positions.
 > 
 > 
 > The document, along with other ballot positions, can be found here:
 > https://datatracker.ietf.org/doc/draft-ietf-ospf-encapsulation-cap/
 > 
 > 
 > 
 > ----------------------------------------------------------------------
 > COMMENT:
 > ----------------------------------------------------------------------
 > 
 > Section 5 specifies that unknown Sub-TLVs are ignored, but that
 > known-and-invalid Sub-TLVs ruin the whole TLV.

[Bruno] 
"Any unknown Sub-TLVs MUST be ignored and skipped upon receipt."

Looks good to me and preserve the TLV properties.

"If a Sub-TLV is invalid, its Tunnel Encapsulation TLV MUST be ignored
   and skipped.  However, other Tunnel Encapsulation TLVs MUST be
   considered."

Means that if a tunnel parameter is known to be invalid, the sender has made a 
syntax or semantic error and the whole tunnel must not be used (as some 
parameters are known to be wrong, hence the whole tunnel can't be trusted.)
I don't see how this behavior ruins the whole TLV. Could you please elaborate?
OTOH, I can imagine that the wording is not good enough. I've tried a more 
detail text:
Proposed NEW:
Any unknown Tunnel Parameter Sub-Type MUST be ignored and skipped upon receipt. 
When a reserved
      value (See <xref target="ParametersRegistry"/>) is seen in an LSA, it
      MUST be treated as an invalid Tunnel Parameter Sub-TLV. When a Tunnel 
Parameter Value has an incorrect syntax of semantic, it MUST be treated as an 
invalid Tunnel Parameter Sub-TLV. If a Tunnel Parameter Sub-TLV is invalid, its
      Tunnel Sub-TLV MUST be ignored and skipped. However,
      other Tunnel Sub-TLVs MUST be considered.


 > It seems a bit odd that a less
 > capable implementation would be able to act on an announcement of a tunnel, 
 > yet
 > a more capable one would not -- and that's the exact consequence of this
 > arrangement. It would seem to make more sense to allow implementations to
 > ignore invalid Sub-TLVs as if they didn't know them.
 
[Bruno] That's another possible option, but it also has drawbacks. For example 
the invalid parameter may be a mandatory one (e.g. as the decapsulator, I 
require encryption) and ignoring this parameter but keeping the tunnel without 
this parameter may be a policy violation, or lead to technical errors dropping 
all packets from this tunnel, or sending packet to a wrong destination/tenant 
if the tunnel is used for overlay....
One option would be to add flags to define the behavior in this case. But that 
is additional complexity.
 
 > Section 7.2 allocates the value 65535 twice (once as "Experimental", once as
 > "Reserved").
 
[Bruno] Corrected. Thanks

 
 > I believe that this mechanism introduces an attack vector that is not 
 > discussed
 > in the Security Considerations section. Specifically: because this allows
 > routers to send OSPF announcements containing arbitrary tunnel termination
 > addresses, it can cause other routers to attempt to connect to arbitrary 
 > third
 > parties;

[Bruno] I believe this point is already covered (i.e. explicitly forbidden) by 
the specification:
"   A tunnel MUST NOT be used if there is no route toward the IP address
   specified in the Endpoint Sub-TLV or if the route is not advertised
   by the router advertising the Tunnel Encapsulation attribute for the
   tunnel."



 >  and, since (by my admittedly shaky understanding of OSPF), I can
 > distribute this information to a large community of routers with a single
 > message by sending it to an RR, I can easily cause a *lot* of routers to
 > potentially send such traffic. For example, if I were able to inject an
 > announcement that has (a) a tunnel type of 13 ("MPLS in UDP Encapsulation"),
 > (b) an "Endpoint Sub-TLV" of a victim web server that I know runs QUIC, and 
 > (c)
 > a "UDP Destination Port" of 443, wouldn't this result in a potential DDoS of
 > that web server?
 
[Bruno] the text cited specifically forbid this example.
 
 > I don't know what the security model of OSPF is or how difficult it would be 
 > to
 > mount this attack (or even how bad it would be compared to other attacks one
 > might mount in OSPF), but it seems that a brief treatment of this -- along 
 > with
 > any operational mitigation techniques that might be employed against it --
 > should be part of the Security Considerations.
 > 


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

_______________________________________________
OSPF mailing list
OSPF@ietf.org
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to