Watson - Where are we with this discission? Have my responses clarified things sufficiently or do you still have unresolved issues? Thanx. Les > -----Original Message----- > From: Les Ginsberg (ginsberg) <ginsberg@xxxxxxxxx> > Sent: Friday, May 5, 2023 4:54 PM > To: Watson Ladd <watsonbladd@xxxxxxxxx> > Cc: secdir <secdir@xxxxxxxx>; draft-ietf-lsr-rfc8919bis.all@xxxxxxxx; last- > call@xxxxxxxx; lsr@xxxxxxxx > Subject: RE: Secdir last call review of draft-ietf-lsr-rfc8919bis-01 > > Watson - > > Please see LES2: inline. > > > -----Original Message----- > > From: Watson Ladd <watsonbladd@xxxxxxxxx> > > Sent: Friday, May 5, 2023 3:32 PM > > To: Les Ginsberg (ginsberg) <ginsberg@xxxxxxxxx> > > Cc: secdir <secdir@xxxxxxxx>; draft-ietf-lsr-rfc8919bis.all@xxxxxxxx; last- > > call@xxxxxxxx; lsr@xxxxxxxx > > Subject: Re: Secdir last call review of draft-ietf-lsr-rfc8919bis-01 > > > > On Thu, May 4, 2023, 9:20 PM Les Ginsberg (ginsberg) > <ginsberg@xxxxxxxxx> > > wrote: > > > > > > Watson - > > > > > > Before responding to your comments, I point out that this is a bis of RFC > > 8919 - and it makes no changes to the protocol extensions defined in RFC > > 8919 - it only provides some clarifications so that readers/implementors are > > more likely to have a common understanding. > > > The Security section is unchanged from RFC 8919. As it passed Security > > review at that time, there was no reason for the authors of the bis draft to > > think that any changes to the Security section would be required. > > > > > > Still, you are looking at this with a fresh set of eyes - let's see what can be > > gleaned from your comments. > > > > I think a lot of this stems from my lack of exposure to the underlying > > tech: it can make it difficult to see why certain claims in the > > security section are true. > > > [LES2:] Understood. > > > > > > > Inline... > > > > > > > -----Original Message----- > > > > From: Watson Ladd via Datatracker <noreply@xxxxxxxx> > > > > Sent: Thursday, May 4, 2023 4:19 PM > > > > To: secdir@xxxxxxxx > > > > Cc: draft-ietf-lsr-rfc8919bis.all@xxxxxxxx; last-call@xxxxxxxx; lsr@xxxxxxxx > > > > Subject: Secdir last call review of draft-ietf-lsr-rfc8919bis-01 > > > > > > > > Reviewer: Watson Ladd > > > > Review result: Has Issues > > > > > > > > Dear all, > > > > > > > > I have reviewed this document as part of the security directorate's > > > > ongoing effort to review all IETF documents being processed by the > > > > IESG. These comments were written primarily for the benefit of the > > > > security area directors. Document editors and WG chairs should treat > > > > these comments just like any other last call comments. > > > > > > > > The summary of my review is Has Issues. While this document is a > pretty > > > > concise and well written description of a problem and solution, the > > securities > > > > consideration section is pretty perfunctory. > > > > > > > > In particular this document seems to assert that the new extensions > can > > only > > > > be enabled when all routers support them, and not in a link-by-link > > manner. > > > > > > [LES:] The extensions define a new way to advertise per link attributes. > To > > guarantee that all nodes who utilize the link attribute information in a > > constrained SPF associated with a legacy application (RSVP-TE, SR Policy, > > and/or LFA) use the same set of link attribute information, it is necessary to > > utilize a form of advertisement that all nodes in the network supporting > that > > application understand. > > > > > > Why isn't that a link by link issue? > > [LES2:] Fundamental to a link state protocol like IS-IS is that the > advertisements generated by each and every node will be flooded to all > nodes in the same area. In this way all nodes operate on the same link state > database and have a complete picture of the topology. > Although the advertisements we are concerned with here are per link > attributes, they will be flooded to all nodes in the network and all nodes in > the network who support the application associated with those > advertisements need to understand the advertisements - whether they are > one hop away from the originator or multiple hops away. > > This differs from distance vector protocols (like RIP) where routing > calculations are hop-by-hop and exchange of routing information is only to > direct neighbors. > > > > > > If the new ASLA advertisements are sent in the presence of one or more > > legacy nodes, those nodes will not process the new ASLA advertisements - > > thereby introducing inconsistency with non-legacy nodes. That is why > Section > > 6.3.3 specifies that legacy advertisements MUST be sent in the presence of > > legacy routers. > > > This isn’t a security related matter - it is identifying a form of > > misconfiguration to be avoided. > > > > > > If an attacker were to introduce ASLA advertisements in the presence of > > legacy nodes, this would have no impact on legacy nodes as they would not > > process the ASLA advertisements. > > > More on this below. > > > > Could that discrepancy cause more issues than failure of a mode? If so > > there is a potential amplification of attacker access. > > [LES2:] For the advertisements introduced by this document, the only impact > will be on routing calculations which depend on those advertisements. Since > the new advertisements are scoped by the (set of) applications specified in > the advertisement, the impact is limited to those applications. > > > > > > > > > > If > > > > that's the case, then an attacker can enable the new advertisements on > a > > > > router > > > > and cause problems, while the securities consideration section seems > to > > say > > > > this is > > > > only per application. > > > > > > > [LES:] If an attacker were to advertise new ASLA advertisements, this > could > > affect the operation of nodes which support the protocol extensions. But > as > > the new ASLA advertisements only apply to the application(s) specified in > the > > Application Bit Mask(ABM) associated with those advertisements, the > > attacker's impact is limited to those applications. > > > This is what the text in the Securities section is stating. > > > > > > > IS-IS is normally within an adminstrative domain, which does minimize > > many > > > > of the impacts, > > > > but the impact of an attacker having access aren't completely solved by > > > > authentication, > > > > particularly if messages can have effect at large distances. > > > > > > [LES:] The Securities section in RFC 8570 speaks to the issue - specifically > > man-in-the-middle attacks - which is why we reference the RFC 8570 > > securities section. > > > I do not see that anything needs to be added. > > > > This is where I'm really confused. If all nodes are in same > > administrative domain authentication is about preventing physical > > layer injection. If not in same domain authentication isn't > > sufficient. > > [LES2:] IGPs typically only operate within a single administrative domain. It is > conceivable that two network operators could agree to interconnect their > networks and configure the IGP on their respective boxes to participate in a > common IGP area. > Clearly when doing so, they are introducing new vulnerabilities. This isn’t > recommended or commonplace - but it is conceivable. > If the link interconnecting the two domains is less secure than the "intra- > domain" links, then additional security vulnerabilities exist. This is what RFC > 8570 is speaking to. > > Les > > > > > > > > > > > > > > > > I think the security considerations section needs some revision in light > of > > this, > > > > either clarifying that IS-IS must be used within a domain, or more > > attention > > > > paid > > > > to thinking about what could go wrong. > > > > > > [LES:] At this point I do not know what to add as I believe the Security > > issues you raise have been addressed by the existing text. > > > Perhaps you could be more specific as to what you believe is required? > > > > > > Les > > > > > > > > > > > Sincerely, > > > > Watson Ladd > > > > > > > -- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call