Re: [Last-Call] Review of draft-ietf-dots-signal-filter-control-04

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Shawn,

Thank you for the review. 

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De : Benjamin Kaduk [mailto:kaduk@xxxxxxx]
> Envoyé : dimanche 7 juin 2020 02:05
> À : Shawn Emery
> Cc : secdir; draft-ietf-dots-signal-filter-control.all@xxxxxxxx; last-
> call@xxxxxxxx; Shawn Emery
> Objet : Re: Review of draft-ietf-dots-signal-filter-control-04
> 
> Hi Shawn,
> 
> Thanks for the review.
> I believe you're correct that any filter that filters monitoring
> agents
> would have to have been confiugred previously over the data channel,
> yes.
> 
> -Ben
> 
> On Fri, Jun 05, 2020 at 04:14:02PM -0600, Shawn Emery wrote:
> > Reviewer: Shawn M. Emery
> > Review result: Ready with nits
> >
> > I have reviewed this document as part of the security directorate's
> > ongoing effort to review all IETF documents being processed by the
> IESG.
> > These comments were written primarily for the benefit of the
> security
> > area directors. Document editors and WG chairs should treat these
> > comments just like any other last call comments.
> >
> > This draft specifies a filter control through the Distributed
> > Denial-of-Service Open Threat
> > Signaling (DOTS) signal channel rather than through the data
> channel, given
> > that an active
> > DDoS attack would essentially disable the data channel.  The
> assumption is
> > that the filter
> > rules would have been constructed and distributed during idle time,
> before
> > the attack.
> >
> > The security considerations section does exist and the defers to the
> base
> > RFCs, 8782 and 8783, for confidentiality and integrity requirements.
> The
> > draft
> > continues that the filtering rules should be constructed before any
> attack
> > through
> > the data channel.  The section finishes with an attack by using the
> control
> > filter to
> > make a DDoS worse and recommends mitigation through operators
> monitoring
> > and countering malicious behavior.  They describe this as only a
> variation
> > of the
> > attacks outlined in 8782 and 8783, though I wonder if a new attack
> vector is
> > introduced through an attacker enabling a filter that filters
> monitoring
> > agents?
> > However this would have had to have been configured through the data
> channel
> > priori, no?

[Med] I confirm.  

> >
> > General comments:
> >
> > Thank you for the examples, this makes the concepts behind the draft
> more
> > clear.
> >
> > Editorial comments:
> >
> > ietf-dots-signal-channel and ietf-dots-data-channel are now RFCs.
> >

[Med] Fixed in our local copy. Thanks. 

> > Shawn.
> > --

-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux