Re: ttl and authentication
Pekka Savola <pekkas@netcore.fi> Thu, 24 February 2005 07:02 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA17125; Thu, 24 Feb 2005 02:02:48 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D4DOD-0003r7-7G; Thu, 24 Feb 2005 02:26:26 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D4Cz9-0001Wu-1g; Thu, 24 Feb 2005 02:00:31 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1D4Cz7-0001Vw-NZ for rtg-bfd@megatron.ietf.org; Thu, 24 Feb 2005 02:00:29 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA14909 for <rtg-bfd@ietf.org>; Thu, 24 Feb 2005 02:00:28 -0500 (EST)
Received: from netcore.fi ([193.94.160.1]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1D4DLw-0003fx-Qf for rtg-bfd@ietf.org; Thu, 24 Feb 2005 02:24:06 -0500
Received: from localhost (pekkas@localhost) by netcore.fi (8.11.6/8.11.6) with ESMTP id j1O70Ee23475; Thu, 24 Feb 2005 09:00:14 +0200
Date: Thu, 24 Feb 2005 09:00:14 +0200
From: Pekka Savola <pekkas@netcore.fi>
To: Dave Katz <dkatz@juniper.net>
In-Reply-To: <eb091c568763bfdd10f3c04ae3c9677c@juniper.net>
Message-ID: <Pine.LNX.4.61.0502240855100.22843@netcore.fi>
References: <200502222036.PAA16786@ietf.org> <Pine.LNX.4.61.0502232111590.6499@netcore.fi> <eb091c568763bfdd10f3c04ae3c9677c@juniper.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0bc60ec82efc80c84b8d02f4b0e4de22
Cc: rtg-bfd@ietf.org
Subject: Re: ttl and authentication
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
Sender: rtg-bfd-bounces@ietf.org
Errors-To: rtg-bfd-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d
On Wed, 23 Feb 2005, Dave Katz wrote: > On Feb 23, 2005, at 12:15 PM, Pekka Savola wrote: >> If I interpret this correctly, the routers can not simply drop BFD session >> which are sent to the router with a bogus TTL and bogus authentication >> (e.g., wrong password) based on the TTL check? > > I should have been a bit more specific here. The intent was that an > appropriately authenticated packet needn't be "authenticated" based on the > TTL. I don't quite understand your concern; obviously if the packet fails > authentication, it must be discarded, so it's not as though the MUST NOT > language forces you to accept the packet. The concern is which is done first: TTL check or authentication check. Compare the situation to BGP with MD5. Folks can easily DoS a router by sending bogus MD5-signed BGP packets to spend all the CPU's computational resources. Using TTL=255 check _first_ prevents this particular attack vector, except from the on-link neighbors. The same argument seems to apply here. Speaking as an operator who's using BFD, I will not be happy if the TTL is not checked first as this opens a resource exhaustion attack vector which could be easily prevented. -- Pekka Savola "You each name yourselves king, yet the Netcore Oy kingdom bleeds." Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
- I-D ACTION:draft-ietf-bfd-multihop-01.txt Internet-Drafts
- ttl and authentication [Re: I-D ACTION:draft-ietf… Pekka Savola
- Re: ttl and authentication Dave Katz
- Re: ttl and authentication Pekka Savola
- Re: ttl and authentication Dave Katz
- Re: ttl and authentication Pekka Savola
- Re: ttl and authentication Dave Katz