Benjamin Kaduk's Discuss on draft-ietf-bfd-yang-16: (with DISCUSS and COMMENT)

Benjamin Kaduk <kaduk@mit.edu> Tue, 03 July 2018 20:21 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: rtg-bfd@ietf.org
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 522D0130E22; Tue, 3 Jul 2018 13:21:22 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Benjamin Kaduk <kaduk@mit.edu>
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-bfd-yang@ietf.org, Jeffrey Haas <jhaas@pfrc.org>, bfd-chairs@ietf.org, jhaas@pfrc.org, rtg-bfd@ietf.org
Subject: Benjamin Kaduk's Discuss on draft-ietf-bfd-yang-16: (with DISCUSS and COMMENT)
X-Test-IDTracker: no
X-IETF-IDTracker: 6.81.3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153064928232.4913.5177531623706237853.idtracker@ietfa.amsl.com>
Date: Tue, 03 Jul 2018 13:21:22 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/GUnPQF1WSvsd9Vy6S4GAZZ0j1tc>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.26
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2018 20:21:23 -0000

Benjamin Kaduk has entered the following ballot position for
draft-ietf-bfd-yang-16: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bfd-yang/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Section 2.1 describes a scheme wherein an IGP may generate events that
cause BFD sessions to be created/destroyed; this effectively is proxying
commands from IGP over the local BFD API, which brings the authentication
and authorization of the IGP into scope, even if the local BFD
configuration access is authenticated.  (That is, the proxying component is
always authenticated, but now bears responsibility for performing
authentication/authorization/sanity checks on commands before proxying
them.)  Since IGP security is a topic for elsewhere, the changes to this
document seem scoped to documenting the requirements on the IGP/local proxy
for these checks, and arguably for only allowing authenticated IGP events
to create authenticated BFD sessions (though arguably not as well, for the
latter, since this is a YANG model document and not an architecture
document).


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I'm not very familiar with YANG notifications; is there a risk that they
can be abused as a DoS attack vector on the notification recipient by an
attacker (e.g., by causing a flapping series of state transition events or
by creating/destroying many sessions)?

Regarding the Security Considerations:

It's unclear whether local-multiplier, the various intervals, and
authentication are the only nodes that merit mention for every
per-forwarding-path-type module.  For example, source/destination addresses
could be modified to direct traffic at unwitting recipients, and the
key-chain and meticulous settings also seem security-related.

Similarly, read-only access to the discriminators (and
key-chain/authentication information) could make it easier for an attacker
to spoof traffic.