[secdir] Secdir review of draft-ietf-rtgwg-mrt-frr-architecture-09

"Christian Huitema" <huitema@huitema.net> Fri, 29 January 2016 05:48 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E7CB1B3E5F for <secdir@ietfa.amsl.com>; Thu, 28 Jan 2016 21:48:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.4
X-Spam-Level: *
X-Spam-Status: No, score=1.4 tagged_above=-999 required=5 tests=[BAYES_50=0.8, J_CHICKENPOX_31=0.6, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FMbcY3xkyTjF for <secdir@ietfa.amsl.com>; Thu, 28 Jan 2016 21:48:35 -0800 (PST)
Received: from xsmtp02.mail2web.com (xsmtp02.mail2web.com [168.144.250.215]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B12911B39D9 for <secdir@ietf.org>; Thu, 28 Jan 2016 21:48:35 -0800 (PST)
Received: from [10.5.2.18] (helo=xmail08.myhosting.com) by xsmtp02.mail2web.com with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <huitema@huitema.net>) id 1aP1v4-0008PD-1w for secdir@ietf.org; Fri, 29 Jan 2016 00:48:34 -0500
Received: (qmail 9323 invoked from network); 29 Jan 2016 05:48:28 -0000
Received: from unknown (HELO huitema1) (Authenticated-user:_huitema@huitema.net@[24.16.156.113]) (envelope-sender <huitema@huitema.net>) by xmail08.myhosting.com (qmail-ldap-1.03) with ESMTPA for <draft-ietf-rtgwg-mrt-frr-architecture.all@ietf.org>; 29 Jan 2016 05:48:28 -0000
From: Christian Huitema <huitema@huitema.net>
To: draft-ietf-rtgwg-mrt-frr-architecture.all@ietf.org, iesg@ietf.org, 'secdir' <secdir@ietf.org>
Date: Thu, 28 Jan 2016 21:48:33 -0800
Message-ID: <015f01d15a58$b1a53070$14ef9150$@huitema.net>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_0160_01D15A15.A3843A60"
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AdFaWFzsfFgj+Jo0RK++cct7ULABhQ==
Content-Language: en-us
Archived-At: <http://mailarchive.ietf.org/arch/msg/secdir/AiAuEyBZsdv2r0QrZto72Whm_kA>
Subject: [secdir] Secdir review of draft-ietf-rtgwg-mrt-frr-architecture-09
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2016 05:48:37 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the 
IESG.  These comments were written primarily for the benefit of the 
security area directors.  Document editors and WG chairs should treat 
these comments just like any other last call comments.

The draft presents an architecture for quickly repairing routes after a link 
break or a node failure, in a network managed using OSPF or IS-IS.
Classic solutions repair the routing after routing updates propagate across 
the network, but in the interim the routing can be imperfect, with the 
possibility of micro loops causing local bouts of congestion. The proposed 
solution is to precompute two sets of "backup routes," to activate one of 
them immediately after failure, and to revert to shortest
path routing when the routing protocol has converged again. The architecture
draft provide justification and guidelines for implementing that solution.

The main focus of my review was the security aspects of the solution. From
that point of view, the document is ready for publication. 

On the other hand, I struggled with the prolific use of acronyms, some of which 
are not spelled out in the text. I wish this could be fixed.

This is an architecture document, and the security considerations are thus 
somewhat abstract. They point two potential issues: an attacker crafting
packet headers to send packets on the longer backup routes and thus 
creating extra load on the network; and an attacker injecting false 
"backup" information in the routing network to send some traffic through
an unexpected route where it could be inspected by a third party. I tried
to come up with different attacks, but the worse I can think off is an
attackers taking control of a router through a virus or a phishing attack.
Such attackers could certainly use the backup routing information in
creative ways, but then they could also do lots of damage by manipulating
the regular OSPF or IS-IS data. In short, I don't think that the addition
of backup routes opens big new risks, apart from the two listed in the
security considerations.

The document is generally well written but the authors have an annoying 
fondness for acronyms. Some of these acronyms, like the LDP in the title,
must be completely obvious for the WG members, but I had to actually
do a lookup to understand that this was about the Label Distribution 
Protocol used by MPLS. A bit later, I was really wondering what Forward
Error Correction had to do with the problem, until I realized that FEC
actually stood for Forward Equivalence Class. Most of the acronyms used
are spelled out the first time they are used in the text, which is good, 
but given the wide usage it would be even better if there was some kind
of lexicon. 

Also, it would be nice if there was some kind of "expected reading" at or
near the introduction, so the average reader could become familiar with 
the problem and the vocabulary before studying this document.

- -- Christian Huitema
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using gpg4o v3.5.53.6558 - http://www.gpg4o.com/
Charset: utf-8

iQEcBAEBAgAGBQJWqv0vAAoJELba05IUOHVQMUUH/jtChUOM9wZkBgDKATsufdpH
do1g66lk8ZNfIufVRe8UVNm+668GJIbII4GDj6GUJHfbYMtVktSe3LPP0DG7hMl6
IFODITiycjgUmp0bA+ya63PA4Q4HgIqv4+ES2GZjoe2c0Kx1/qN2lNz2oIraqAJL
PYB2IrUBrRvMADseXipcq3nDQs6qbGsWWG/QsdXW9vX54AbI0UdV1MbkqlquGdgu
0CCbcH1IbQKsTWv1kewW5S4gwW+9/ksCJZSMlPCN4/L4F8kazJLBTxp2ecZJJo5V
/kS3aO/13l87mzpeBZsD5stCOVMZmW1g4V4MBlvpezol8JBXvdVyGXB82mrUE4w=
=1a4k
-----END PGP SIGNATURE-----