Re: [Tsv-art] Tsvart last call review of draft-ietf-bfd-multipoint-16

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Bob,

Addressing these specific points.  (Note that I'm not a multicast expert.)

On Mon, Jun 11, 2018 at 10:47:28PM +0100, Bob Briscoe wrote:
> If there is an SSM tree from host A to multicast address G, I am not
> familiar enough with SSM to know what happens when host B sends a
> packet to G with source address A (i.e. spoofing A). I assume the
> IGMP messages build the tree back from each member to A, so usually
> there will be no route from B, even if it is spoofing A as the
> source. However, I would have thought that a host connected to the
> same router as A could spoof A and get onto the SSM tree. Or does
> SSM always check for this type of spoofing?

In general, when multicast traffic is forwarded, it is checked against the
incoming interface to see if it should be forwarded or not.  When it's
against a valid IIF, it may be distributed out the outbound interface list
for that tree.  Traffic that doesn't match the IIF is dropped, I believe.

A general problem with multicast is that hosts along the tree can inject
spoofed traffic.  BFD would have the same issue; it is not a new
consideration.

Your follow-up comment about MPLS is correct in that external injection is
even more difficult without some other way to tunnel the labeled traffic to
the tree.  But once it's there, the same issue applies.

-- Jeff

P.S. Thanks, Greg, for handling the followup discussion.




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux