Re: Call for Community Feedback: Guidance on Reporting Protocol Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Oct 27, 2020 at 01:59:35PM +0000, Salz, Rich wrote:
> Having worked on OpenSSL for many years, the absolute worst thing you can do is not respond to reported vulnerabilities.  Even if it???s just an auto-reply that says ???thanks we got it.???
> 
> I also think it would be worth pointing out more strongly that we are interested in *protocol* errors, not *implementation* errors, and making that distinction clear.

Again, just to re-emphasize my desire that three should be an open discussion list for
vulnerabilities (vulnerability-discuss), because IMHO this is one of the likely repeatedly
 incurring points of contentions as to where to draw the line. Which IMHO needs to be explored.

One initial definition might be "implementation error is one that can be fixed without
changing the protocol spec text" (i guess, i have not seen a better definition).

So lets say i have seen enough cases where routers stopped forwarding any traffic because
they ran out of memory because someone attacked the router creating to much protocol
state. Lets pick your poison, in my case it was easily user generated multicast state,
others may prefer BGP or IGPs.

So... should the protcol spec have a requirement stating that implementations
MUST ensure this can not happen, and - oh, go figure out how to do that, not a
protocol issue ?

In patents, patent protection is only granted when the description is
sufficient to build a working model. So if you want to claim that a protocol
is not at fault for an attack, its description needs to be sufficient to
make it clear how to build a working model protecting against the attack.

If you apply that guideline to IETF protocol specs, you will draw blanks all
over the place. At least in routing.

Cheers
    Toerless




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux