Re: [Idr] draft-uttaro-idr-bgp-persistence-00: Security Considerations

Jakob Heitz <jakob.heitz@ericsson.com> Wed, 02 November 2011 20:29 UTC

Return-Path: <jakob.heitz@ericsson.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6F2E1F0C9E for <idr@ietfa.amsl.com>; Wed, 2 Nov 2011 13:29:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.08
X-Spam-Level:
X-Spam-Status: No, score=-5.08 tagged_above=-999 required=5 tests=[AWL=1.519, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RhkYm8IMcwVa for <idr@ietfa.amsl.com>; Wed, 2 Nov 2011 13:29:27 -0700 (PDT)
Received: from imr4.ericy.com (imr4.ericy.com [198.24.6.9]) by ietfa.amsl.com (Postfix) with ESMTP id 4D95F1F0C59 for <idr@ietf.org>; Wed, 2 Nov 2011 13:29:27 -0700 (PDT)
Received: from eusaamw0707.eamcs.ericsson.se ([147.117.20.32]) by imr4.ericy.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id pA2KTOjY028796; Wed, 2 Nov 2011 15:29:25 -0500
Received: from EUSAACMS0701.eamcs.ericsson.se ([169.254.1.52]) by eusaamw0707.eamcs.ericsson.se ([147.117.20.32]) with mapi; Wed, 2 Nov 2011 16:29:19 -0400
From: Jakob Heitz <jakob.heitz@ericsson.com>
To: "UTTARO, JAMES" <ju1738@att.com>, Enke Chen <enkechen@cisco.com>
Date: Wed, 02 Nov 2011 16:29:18 -0400
Thread-Topic: [Idr] draft-uttaro-idr-bgp-persistence-00: Security Considerations
Thread-Index: AQHMmZzjYL6llAJn90+pSAwemYlI5ZWaBu/w
Message-ID: <7309FCBCAE981B43ABBE69B31C8D21391A447FB3A4@EUSAACMS0701.eamcs.ericsson.se>
References: <4EA1F0FB.3090100@raszuk.net> <4EA487E4.2040201@raszuk.net> <B17A6910EEDD1F45980687268941550FA20750@MISOUT7MSGUSR9I.ITServices.sbc.com> <4EA84254.9000400@raszuk.net> <4EA8A91C.4090305@cisco.com> <7309FCBCAE981B43ABBE69B31C8D21391A447FB381@EUSAACMS0701.eamcs.ericsson.se> <B17A6910EEDD1F45980687268941550FA226E0@MISOUT7MSGUSR9I.ITServices.sbc.com>
In-Reply-To: <B17A6910EEDD1F45980687268941550FA226E0@MISOUT7MSGUSR9I.ITServices.sbc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "idr@ietf.org List" <idr@ietf.org>, "robert@raszuk.net" <robert@raszuk.net>
Subject: Re: [Idr] draft-uttaro-idr-bgp-persistence-00: Security Considerations
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Nov 2011 20:29:28 -0000

On Wednesday, November 02, 2011 1:21 PM, UTTARO, JAMES <mailto:ju1738@att.com> wrote:

> Jakob,
> 
> 	See the security section of the draft.

I did, but it doesn't answer my questions.

It diverts the reader's attention with talk of
malicious disturbance.

Accidental disturbance seems much more real to me.
The chance of such an accidental disturbance seems to
me to be high enough to sink this proposal cold.

However, I don't actually know. Am I scared of ghosts
or is it real? Some credible research results might
relieve my anxiety.

> 
> Jim Uttaro
> 
> -----Original Message-----
> From: Jakob Heitz [mailto:jakob.heitz@ericsson.com]
> Sent: Wednesday, November 02, 2011 4:06 PM
> To: Enke Chen; UTTARO, JAMES
> Cc: idr@ietf.org List; robert@raszuk.net
> Subject: RE: [Idr] draft-uttaro-idr-bgp-persistence-00: Security
> Considerations 
> 
> On Wednesday, October 26, 2011 5:43 PM, Enke Chen <> wrote:
> 
>> Hi, folks:
>> 
>> I have a hard time in understanding what new problems (beyond the GR)
>> the draft try to solve :-(
> 
> Me too.
> 
> The persisting routers will persistently send labeled packets
> into the core. If the intended destination really has disappeared,
> and restarted, what is the chance that such labeled packets
> interfere with other unrelated services, just because of labels
> being reused?
> 
> Quote from 3.1 of the draft:
> The persist-timer
>       should be set to a large value on the order of days to infinity.
> 
> Customers rely on the separation between VPN's. The "P" means private.
> Anything that threatens that "P" should not be taken lightly.
> 
> I'm starting to imagine my video stream intrespersed with dzzt, zzt
> from random packets being injected into it. How real is that?