Hi Acee and Martin!

Thanks for the quick edits and additional explanation.  This text addressed all 
of my IESG review feedback.  I've cleared my ballot.

Regards,
Roman

> -----Original Message-----
> From: Acee Lindem (acee) <a...@cisco.com>
> Sent: Monday, January 25, 2021 2:28 PM
> To: Roman Danyliw <r...@cert.org>; The IESG <i...@ietf.org>
> Cc: draft-ietf-spring-sr-y...@ietf.org; spring-cha...@ietf.org; 
> spring@ietf.org;
> Joel Halpern <j...@joelhalpern.com>
> Subject: Re: Roman Danyliw's Discuss on draft-ietf-spring-sr-yang-29: (with
> DISCUSS and COMMENT)
> 
> Hi Roman,
> 
> Please see inline.
> 
> 
> On 1/20/21, 10:13 PM, "Roman Danyliw via Datatracker" <nore...@ietf.org>
> wrote:
> 
>     Roman Danyliw has entered the following ballot position for
>     draft-ietf-spring-sr-yang-29: Discuss
> 
>     When responding, please keep the subject line intact and reply to all
>     email addresses included in the To and CC lines. (Feel free to cut this
>     introductory paragraph, however.)
> 
> 
>     Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>     for more information about IESG DISCUSS and COMMENT positions.
> 
> 
>     The document, along with other ballot positions, can be found here:
>     https://datatracker.ietf.org/doc/draft-ietf-spring-sr-yang/
> 
> 
> 
>     ----------------------------------------------------------------------
>     DISCUSS:
>     ----------------------------------------------------------------------
> 
>     Section 9.  The primary impact of the manipulating writable nodes appears
> to be
>     characterized as DoS.  Don’t the possible consequences also include the
> ability
>     to leak traffic outside the trusted domain or to route traffic through
>     arbitrary paths of the attackers choosing potentially enable on-path
> inspection
>     or manipulation of traffic; or avoidance of security controls?
> 
> We have revised the writable nodes in the -30 version:
> 
>       /segment-routing/mpls/bindings - Modification to the local
>       bindings could result in a Denial of Service (DoS) attack.  An
>       attacker may also try to create segment conflicts (using the same
>       segment identifier for different purposes) to redirect traffic
>       within the trusted domain.  However, the traffic will remain
>       within the trusted domain.  Redirection could be used to route the
>       traffic to compromised nodes within the trusted domain or to avoid
>       certain security functions (e.g., firewall).  Refer to section 8.1
>       [RFC8402] for a discussion of the SR-MPLS trusted domain.
> 
>       /segment-routing/mpls/srgb - Modification of the Segment Routing
>       Global Block (SRGB) could be used to mount a DoS attack.  For
>       example, if the SRGB size is reduced to a very small value, a lot
>       of existing segments could no longer be installed leading to a
>       traffic disruption.
> 
>       /segment-routing/mpls/srlb - Modification of the Segment Routing
>       Local Block (SRLB) could be used to mount a DoS attacks similar to
>       those applicable to the SRGB.
> 
>       /segment-routing/mpls/label-blocks - Modification of the Segment
>       Routing label blocks could be used to mount a DoS attack.
> 
> 
>     ----------------------------------------------------------------------
>     COMMENT:
>     ----------------------------------------------------------------------
> 
>     ** Section 9.  Thanks for using the templated YANG Security 
> Considerations.
> A
>     nit on the references s/[RFC6536]/[RFC8341]/
> 
>     ** Section 9.  The following caution around readable nodes didn’t parse 
> for
> me.
>      Was the intent as follows:
> 
>     OLD
>     The exposure of both local
>        bindings and SID database will exposure segment routing paths that
>        may be attacked.
> 
>     NEW
>     The exposure of either the local bindings or SID database would provide an
>     attacker the segment routing paths and related topology information.
> 
>     ** Section 9.  Typo. s/a a/a/
> 
>     ** Section 9.  Typo. s/rediection/redirection/
> 
> We've incorporated all your comments into the -30 version.
> 
> Thanks,
> Acee
> 
> 
> 

_______________________________________________
spring mailing list
spring@ietf.org
https://www.ietf.org/mailman/listinfo/spring

Reply via email to