Greg, I may be wrong, in which case fine. But I'll take each case in turn (there may not be security problems with all, but a problem with just one would still be of concern): Multicast: If there is an SSM tree from host A to multicast address G, I am not familiar enough with SSM to know what happens when host B sends a packet to G with source address A (i.e. spoofing A). I assume the IGMP messages build the tree back from each member to A, so usually there will be no route from B, even if it is spoofing A as the source. However, I would have thought that a host connected to the same router as A could spoof A and get onto the SSM tree. Or does SSM always check for this type of spoofing? Directly connected. As with multicast, even tho not every machine on the Internet could spoof the source address, surely if the link were a shared link (which is implied in this use-case) any machine on the shared link could spoof the genuine source. MPLS I think the MPLS case is safe, cos at each hop the label switched path is specific to each prior hop. As I said, I may be wrong. But, if either of the first two cases have a vulnerability in certain cases, it ought to be described in the draft, even if the vulnerability is confined to a specific set of circumstances. Bob On 11/06/18 19:14, Greg Mirsky wrote:
-- ________________________________________________________________ Bob Briscoe http://bobbriscoe.net/ |