Re: [lisp] Restarting last call on LISP threats

Dino Farinacci <> Wed, 21 May 2014 22:57 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 270F61A00B1 for <>; Wed, 21 May 2014 15:57:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id paYqjWCT94w9 for <>; Wed, 21 May 2014 15:57:44 -0700 (PDT)
Received: from ( [IPv6:2607:f8b0:400d:c04::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 610821A03C7 for <>; Wed, 21 May 2014 15:57:44 -0700 (PDT)
Received: by with SMTP id q108so4228289qgd.19 for <>; Wed, 21 May 2014 15:57:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=7Y+M/WmdWJH+Uewl9JIhtT4J4va2kOSI5DrDWLA10OY=; b=e85p5tMY05/jBrIfip7A99AxDe6rPd22D90IoSN5NMZLyB6Q7swLWsKcRTFGlsCQzp PBHj1FrjBJl6ZyWpNAWcQ1GhMfV9JEBOSyc47F+Tq0nHaiqWzxzyFQnfV2RK/e7aNiJM Cax1Ue5NdfQLfkCkoZPMOy1oHhcRKotfEIlqLDN4m3P4UdfanbCWwVUU6SmNbCYg8Zb1 UrSjnHQHdRCw5uFi/n1SqSZFddWWmtS+ygTj3waLn9jFgzgaro7CHzA8cY+QfwKD5B2V EaVdj7l/iEZBAQJXuKhH/zVuL6pnFrlkvGezc/p9LFXpgd34fO1BdShStMJ0DKZwJEx2 KDLg==
X-Received: by with SMTP id l52mr71106883qge.19.1400713062946; Wed, 21 May 2014 15:57:42 -0700 (PDT)
Received: from [] ( []) by with ESMTPSA id r14sm1564074qga.4.2014. for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 21 May 2014 15:57:41 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (1.0)
From: Dino Farinacci <>
X-Mailer: iPhone Mail (11D167)
In-Reply-To: <>
Date: Wed, 21 May 2014 18:57:41 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <> <> <> <> <> <> <> <>
To: Ronald Bonica <>
Cc: Roger Jorgensen <>, "" <>
Subject: Re: [lisp] Restarting last call on LISP threats
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 21 May 2014 22:57:46 -0000

> The attacker sends a flow of crafted packets to the victim XTR. Each packet is a well-formed LISP data packet. It contains:
> - an outer IP header (LOC->LOC)
> - a UDP header
> - a LISP Header
> - an IP header (EID->EID)
> - payload

Just like a regular packet I can send to your home router today. So yes okay. So let's continue. See comments below. 

> Each packet contains control plane information that is new to the victim

Be more specific about what control information are in these encapsulated packets. 

> XTR. For example, the victim XTR has no mapping information regarding either the source LOC or source EID prefix. Rather than gleaning this mapping information from the crafted packet, the victim XTR sends a verifying MAP-REQUEST to the mapping system.
> Assume that the attack flow is large (N packets per second). Assume also that the XTRs rate limit for MAP-REQUEST messages is less than N packets per second. Has the attack not effectively DoS'd the victim XTR?

It caches the rate the rate the packets are coming in and eventually stops sending Map-Requests completely. 

It cannot stop the incoming rate of packets today just like a roque BGP attacker can send millions of packets per second to a peer regardless if it does or does not have the peer authentication key. 

> To make this attack work, every packet in the attack flow may need to have a unique, spoofed, source LOC.

An implementation can detect that after rate limiting 1000s of such requests are happening that it just stops operation. 

What if I sent a Juniper 20 million routes today?

The Internet is very fragile and LISP IS NOT making it worse. And in some cases it is making it better with integrated techniques.