Re: [Tsv-art] Tsvart last call review of draft-ietf-lisp-rfc6830bis-15

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Dino, all,

Sent from my iPhone

On 27 Aug 2018, at 19:36, Dino Farinacci <farinacci@xxxxxxxxx> wrote:

>> (1) Common advice to all UDP-using encapsulation designers and implementors:
>> please read RFC8085, especially section 3.1.11. As LISP's dataplane is
>> basically an application of UDP, I was surprised to see no reference to RFC8085
>> here. I believe that in the most common case LISP falls into case 1 here, but
>> implementors of LISP ITRs should at least be made aware of the other cases.
> 
> I don’t see a section 3.1.11 in RFC 8085.

Page 16, “UDP tunnels”.

> Rather than make references, can you say what you think the issue is?

LISP’s data plane is a UDP tunnel, and as such there are congestion control issues that must be considered. LISP inplementors and deployers using LISP to carry a mix of traffic that is not predominantly 

>> (2) This is not transport-specific. Reading the document, it struck me that the
>> design of the protocol has a few inherently unsafe features related to the fact
>> that its wire image is neither confidentiality- nor integrity-protected. I
>> think that all of the potential DDoS and traffic focusing attacks I could come
>> up with in the hour I spent reviewing the document are indeed mentioned in the
>> security considerations section, but as the security considerations section
>> does not give any practical mitigation for dataplane overload attacks, it seems
>> to be saying that RLOC addresses shouldn't be Internet-accessible, which as I
>> understand it is not the point of LISP. I haven't seen a secdir review on this
>> document yet, but I'd encourage the authors to do everything it asks.
> 
> RFC 8061 goes along with RFC6830bis. It addresses data-plane confidentiality.

I haven’t read 8061 yet, but I probably should before continuing this thread.

I will say that I’m far less concerned about LISP header confidentiality than I am about LISP header integrity, given the opportunities for on-path meddling and off-path spoofing. If the common solution to both is something like sticking everything on the ITR-ETR path in IPSec then this is less of a concern.

> 
>> nit: Section 7.1. para 7 should note that the ICMPv6 message sent is called
>> Packet Too Big, not Unreachable/Frag Needed.
> 
> We used “Packet Too Big” for all ICMP messages including IPv4 and hence we received comments about it on how it should change it to Network Unreachable. I will fix this for IPv6.

Yeah, this is the one place where i noticed a rough edge on supporting v4 and v6. Thanks.

Cheers,

Brian

> Dino
> 
> 
> _______________________________________________
> Tsv-art mailing list
> Tsv-art@xxxxxxxx
> https://www.ietf.org/mailman/listinfo/tsv-art





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux