Brian,

> On Oct 16, 2024, at 1:39 PM, Brian Trammell (IETF) <[email protected]> wrote:
>> On 16 Oct 2024, at 18:54, Erik Auerswald <[email protected]> wrote:
>> On Wed, Oct 16, 2024 at 12:28:46PM -0400, Jeffrey Haas wrote:
>> Every described abuse scenario that works with Unaffiliated BFD Echo also
>> works without it.  The abuse is possible already.  It is built into the
>> very foundation of the Internet.
> 
> Generalizing Greg Mirsky’s potentially-in-the-rough assessment (I’m not 
> equipped to evaluate it in depth, nor do I have the time right now to devote 
> to becoming so), the question here is a fairly simple one: are there 
> deployment scenarios for this protocol by which a nonparticipant may send UDP 
> packets to a Unaffiliated BFD Echo endpoint in order to cause those packets 
> to be echoed elsewhere by which this protocol becomes a vector for 
> nonamplifying reflection attacks.

This is IP forwarding.

> 
> If the assertion is instead that “this echo protocol is okay to define and 
> expose to the Internet because other nonamplifying UDP protocols that can be 
> used for echo spoofing exist”, that is a philosophical discussion that I’m 
> not sure is in scope for this review: it’s my job as a TSV reviewer to make 
> sure that these concerns are aired, and for the IESG to make decisions about 
> the publication of the draft based on those concerns.

What I believe this thread is asking us to write is "IP forwarding is a 
possible attack on the Internet and you need to secure everything that can do 
forwarding against every possible application that wants to use it".

This seems broadly out of scope for the BFD working group.

-- Jeff (next 1 April RFC candidate: Home Internet users can send traffic to 
whomever they want to and they should be stopped!)

Reply via email to