Re: [mpls] MPLS-RT review of draft-pdutta-mpls-tldp-hello-reduce-03

Eric Rosen <erosen@cisco.com> Tue, 24 July 2012 16:36 UTC

Return-Path: <erosen@cisco.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B08B421F85F0 for <mpls@ietfa.amsl.com>; Tue, 24 Jul 2012 09:36:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dwMN7eZ3z2v6 for <mpls@ietfa.amsl.com>; Tue, 24 Jul 2012 09:36:42 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) by ietfa.amsl.com (Postfix) with ESMTP id EE80621F85CE for <mpls@ietf.org>; Tue, 24 Jul 2012 09:36:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=erosen@cisco.com; l=1810; q=dns/txt; s=iport; t=1343147802; x=1344357402; h=to:cc:subject:in-reply-to:reply-to:date:message-id:from; bh=+b7EhOtk5VhX4Ex/JeJJC1RrzHv6rs1UAsA/gAKnH24=; b=ja5Al7iS/sGNTdEn8+k5fSRFTKwSsNwGT1bC8gJ1945MCKYHQK0PVndN jaaunIQ3Xs/2o5X2CMAK4DdO4nPb/wToYr+rea5XEhG2NMXftoFL9ZgSC 2ulUFMGzPKm7y/TNltCFk9YcLLIpibqknuP/wUgQCZG6NkQdGppyQ8eQ1 Y=;
X-IronPort-AV: E=Sophos;i="4.77,647,1336348800"; d="scan'208";a="104842987"
Received: from rcdn-core2-3.cisco.com ([173.37.113.190]) by rcdn-iport-7.cisco.com with ESMTP; 24 Jul 2012 16:36:41 +0000
Received: from erosen-linux.cisco.com (erosen-linux.cisco.com [161.44.70.34]) by rcdn-core2-3.cisco.com (8.14.5/8.14.5) with ESMTP id q6OGaetr001300 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 24 Jul 2012 16:36:41 GMT
Received: from erosen-linux (localhost.localdomain [127.0.0.1]) by erosen-linux.cisco.com (8.13.8/8.13.8) with ESMTP id q6OGae3L003255; Tue, 24 Jul 2012 12:36:40 -0400
To: "Dutta, Pranjal K (Pranjal)" <pranjal.dutta@alcatel-lucent.com>
In-reply-to: Your message of Tue, 24 Jul 2012 04:15:45 +0530. <C584046466ED224CA92C1BC3313B963E09F2162845@INBANSXCHMBSA3.in.alcatel-lucent.com>
Date: Tue, 24 Jul 2012 12:36:40 -0400
Message-ID: <3254.1343147800@erosen-linux>
From: Eric Rosen <erosen@cisco.com>
Cc: "mpls@ietf.org" <mpls@ietf.org>, Giles Heron <giheron@cisco.com>, Thomas Nadeau <tnadeau@juniper.net>, "mpls-chairs@tools.ietf.org" <mpls-chairs@tools.ietf.org>
Subject: Re: [mpls] MPLS-RT review of draft-pdutta-mpls-tldp-hello-reduce-03
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: erosen@cisco.com
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2012 16:36:42 -0000

> Although the draft re-uses the Hello negotiation method as in RFC 5036, it
> does define procedures for reduction (section 4).

I think the only thing that is new is the idea of configuring two hold
times, one to be used before the session is established and one (infinite)
to be used after.

> If we read the section 4, it mentions that Hello Reduction starts only
> after a LDP session is ESTABLISHED. There are additional well known
> security methods to secure LDP session (e.g TCP MD5).

The fact that the session is established does not provide authentication or
integrity for the Hellos.  There is no way to know that any particular
received Hello originated from the trusted peer, or that it has not been
modified, or that it is not a replay of an earlier Hello.  That is, the
security problems with Targeted Hellos are not mitigated by the fact that
the LDP session is secured.  So even after the session is established,
spoofed Hellos can be used to trick the two peers into using different hold
times.

Bad parameters specified in a received spoofed Hello will eventually get
overwritten by the good parameters specified in the next received authentic
Hello.  Thus the less frequent the authentic Hellos are, the longer it will
take before the bad parameter is overwritten with the good parameter.  

> If LDP session transport address is  different from IP addresses used for
> T-LDP hellos then Session Keepalives are not substitute. But if we want to
> use protocols like BFD for fast tracking reachability of T-LDP IPs (there
> are other protocols as well) then Hellos are redundant.

The draft seems to recommend the use of "hello reduction" with infinite hold
time.  If there are situations in which this is not a good idea, the draft
should describe those.