RE: Genart last call review of draft-ietf-dots-data-channel-27

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Re-,

I hear you, 
 
Cheers,
Med

> -----Message d'origine-----
> De : Roni Even (A) [mailto:roni.even@xxxxxxxxxx]
> Envoyé : jeudi 7 mars 2019 13:29
> À : BOUCADAIR Mohamed TGI/OLN; Datatracker on behalf of Roni Even; gen-
> art@xxxxxxxx
> Cc : draft-ietf-dots-data-channel.all@xxxxxxxx; ietf@xxxxxxxx; dots@xxxxxxxx
> Objet : RE: Genart last call review of draft-ietf-dots-data-channel-27
> 
> Hi Med,
> Thanks I am OK with your response only open one
> 
> 
> > administrator even if rejected.
> 
> [Med] This is deployment-specific. For example, if conflict handling requires
> "notify an administrator for validation", there is no point to report again.
> [RE] Yes but for example "reject all" may cause an attack cancelling a valid
> filter, so it should also be notified to the administrator for validation.

[Med] The notification can be part of the local policy, see below: 

   DOTS servers SHOULD support a configuration parameter to indicate the
   behavior to follow when a conflict is detected (e.g., reject all,
   reject the new request, notify an administrator for validation).

 I
> did not see any discussion about this is the security section that will warn
> about such a possible attack that can happen for a specific policy.

[Med] IMHO, this is not a new attack vector. This is falling under this part: 

   this usage.  Appropriate security measures are recommended to prevent
   illegitimate users from invoking DOTS data channel primitives.
   Nevertheless, an attacker who can access a DOTS client is technically
                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
   capable of launching various attacks, such as:
   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

   o  Setting an arbitrarily low rate-limit, which may prevent
      legitimate traffic from being forwarded (rate-limit).

   o  ...

> Roni
> 
> -----Original Message-----
> From: Gen-art [mailto:gen-art-bounces@xxxxxxxx] On Behalf Of
> mohamed.boucadair@xxxxxxxxxx
> Sent: Thursday, March 07, 2019 1:57 PM
> To: Datatracker on behalf of Roni Even; gen-art@xxxxxxxx
> Cc: draft-ietf-dots-data-channel.all@xxxxxxxx; ietf@xxxxxxxx; dots@xxxxxxxx
> Subject: Re: [Gen-art] Genart last call review of draft-ietf-dots-data-
> channel-27
> 
> Hi Roni,
> 
> Thank you for the review.
> 
> Please see inline.
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : Datatracker on behalf of Roni Even [mailto:noreply@xxxxxxxx]
> > Envoyé : jeudi 7 mars 2019 11:21 À : gen-art@xxxxxxxx Cc :
> > draft-ietf-dots-data-channel.all@xxxxxxxx; ietf@xxxxxxxx;
> > dots@xxxxxxxx Objet : Genart last call review of
> > draft-ietf-dots-data-channel-27
> >
> > Reviewer: Roni Even
> > Review result: Ready with Nits
> >
> > I am the assigned Gen-ART reviewer for this draft. The General Area
> > Review Team (Gen-ART) reviews all IETF documents being processed by
> > the IESG for the IETF Chair.  Please treat these comments just like
> > any other last call comments.
> >
> > For more information, please see the FAQ at
> >
> > <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
> >
> > Document: draft-ietf-dots-data-channel-??
> > Reviewer: Roni Even
> > Review Date: 2019-03-07
> > IETF LC End Date: 2019-03-13
> > IESG Telechat date: Not scheduled for a telechat
> >
> > Summary:
> > The document is ready with nits and one minor issue for publication as
> > a standard track RFC
> >
> > Major issues:
> >
> > Minor issues:
> >
> > 1. In section 2 there is a discussion about conflicting filtering requests.
> 
> [Med] I guess you meant section 3.
> 
> I
> > think that this can be considered as an attack and should be mentioned
> > in the security section.
> 
> [Med] Conflicts may be caused by various "legitimate" actions. Of course, as
> discussed in the Security section, an attacker who access to a DOTS client
> can do a lot of things such as installing some filters including conflicting
> ones. This is already reported in the security section.
> 
> 
>  I also think that such a conflict must be reported to the
> > administrator even if rejected.
> 
> [Med] This is deployment-specific. For example, if conflict handling requires
> "notify an administrator for validation", there is no point to report again.
> 
> >
> > Nits/editorial comments:
> >
> > 1. In figure 2 missing HTTP layer?
> 
> [Med] No, that is on purpose. RESTCONF (which is an HTTP-based protocol)
> layer is sufficient.
> 
> > 2. In section 6.1 "If the request is missing a mandatory attribute or
> > its contains " should be "it" instead of "its" 3.
> 
> [Med] Thank you for catching this. Fixed.
> 
>  In section 7.3 "A DOTS client
> > periodically queries  ...".  I did not see any text about why this is
> > done is this a common behavior? how often? 4.
> 
> [Med] This is left to implementations. We don't have any solid argument to
> recommend a value.
> 
> 
> After figure 29 "bound to a given ACL
> > as
> > shown in Figure 28 " I think it should be 27?
> 
> [Med] This should be Figure 30. Fixed. Thanks.
> 
>  5. In figure 31
> > ""pending-lifetime": 8000 ," why 8000 and not 9080 as in figure 28?
> >
> 
> [Med] This is because pending-lifetime was decremented since the GET in
> Figure 28 was issued.
> _______________________________________________
> Gen-art mailing list
> Gen-art@xxxxxxxx
> https://www.ietf.org/mailman/listinfo/gen-art




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux