Re: [secdir] secdir review draft-ietf-teas-p2mp-loose-path-reopt-08

Leif Johansson <leifj@sunet.se> Fri, 10 February 2017 14:22 UTC

Return-Path: <leifj@sunet.se>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76A9E128B38 for <secdir@ietfa.amsl.com>; Fri, 10 Feb 2017 06:22:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level:
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sunet-se.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ya6P0VVKrswg for <secdir@ietfa.amsl.com>; Fri, 10 Feb 2017 06:22:16 -0800 (PST)
Received: from mail-lf0-x22f.google.com (mail-lf0-x22f.google.com [IPv6:2a00:1450:4010:c07::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9059129965 for <secdir@ietf.org>; Fri, 10 Feb 2017 06:22:15 -0800 (PST)
Received: by mail-lf0-x22f.google.com with SMTP id v186so22203351lfa.1 for <secdir@ietf.org>; Fri, 10 Feb 2017 06:22:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sunet-se.20150623.gappssmtp.com; s=20150623; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-transfer-encoding; bh=Zz4hxarfAOqbaDCRoetP3YUP9U00ZIor+Xd+tmCL/PM=; b=G3zh+DOTdvejknoZY8HEAKA02x8qRgrn2oLqG4mhCfbXJn7MeqK6AdWu1jOTk2ky92 BWFXlgtgmVX20pudZ96vRCkoeN9oquLF3oBngBhQ3XzX9s9UEJNojOf6/n0Pwf1ymXcO XDDZUD8/A766zuXyApafN878JXzo3VISHRFR1MqPlYy1BO9rxFz9xGRKCWlh2g5tEYPV rwEgXfnWu2Xh603Y2Kw4mYG2zLlQGfRRWMlD4d629OTsfSKtOLkB0wbXVdFKkLuu4TKW 1dO/hn2AgVs2xx8ndgX+OEV0YfbeY0WKIWKPYMv8qS2GMUdE7ukfnZWeuRitUQDvfejL 8udQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=Zz4hxarfAOqbaDCRoetP3YUP9U00ZIor+Xd+tmCL/PM=; b=A/f2MqKAYt1pi5nZYDVJRt7w/sMf3Bpv8jtUBqwxwK1xb4B7OF9gnZQyHGLooyVKgU OdlCDbQjNbJeWgls2VUfdBdTIVZeClLSiY9YS4CpRt2I+U4/yWHccBZHmnTl7M6s9tEk 5AyuyeNwFl2Bocm4z1dwsl+qih2y59oeHl/FAuOwDusp/WJLEO7auQZwm6AKWUVwZbui 9crCTsfVVBtcnWcqIOaA2G8Sq9DuB0y4Ch9MDYIdltZeEWB4uOANG5TLTihDpI6q7p8B i3dkfQEBxfSb0LBq976PQf9k/u+DY3cTKu4XEROYPAxoczu04pPlEJBlx2EM3ExjvRLF 43Mw==
X-Gm-Message-State: AMke39kY7TlJodCIxcL0yvTVmF1i0iY66MdAMujSCwlgGzc3spzLbZUiVGxC/BuDkWBYow==
X-Received: by 10.25.200.65 with SMTP id y62mr3229876lff.132.1486736533800; Fri, 10 Feb 2017 06:22:13 -0800 (PST)
Received: from ?IPv6:2001:6b0:7:1:5d5e:1119:da9a:e72a? ([2001:6b0:7:1:5d5e:1119:da9a:e72a]) by smtp.gmail.com with ESMTPSA id 70sm592776lfq.14.2017.02.10.06.22.12 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 10 Feb 2017 06:22:13 -0800 (PST)
To: "Rakesh Gandhi (rgandhi)" <rgandhi@cisco.com>, "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-teas-p2mp-loose-path-reopt.all@ietf.org" <draft-ietf-teas-p2mp-loose-path-reopt.all@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
References: <36116fa6-2670-c0b2-3a4f-b72107bfbc82@sunet.se> <4CCAD7DC-173A-41E9-A22B-E87A05CFC07B@cisco.com>
From: Leif Johansson <leifj@sunet.se>
Message-ID: <4ba99af5-c23f-c521-9ec0-72aa642e47f7@sunet.se>
Date: Fri, 10 Feb 2017 15:22:12 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.7.0
MIME-Version: 1.0
In-Reply-To: <4CCAD7DC-173A-41E9-A22B-E87A05CFC07B@cisco.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/Jz5uFAClOsR0mSnua2kOpn2ySiE>
Subject: Re: [secdir] secdir review draft-ietf-teas-p2mp-loose-path-reopt-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Feb 2017 14:22:17 -0000

On 2017-02-10 14:28, Rakesh Gandhi (rgandhi) wrote:
> Hi Leif,
> 
> Thank you for the review of the document. 
> 
> RFC 4736 (basis for this document), Security Section 9, has coverage for this aspect – “Furthermore, a head-end LSR may decide to ignore explicit notification coming from a mid-point residing in another domain.”
> 

Ah ok so trust is placed in the domain? I guess that property is
something that could be made explicit in the security considerations
(or maybe its obvious to people in the field)

> Thanks,
> Rakesh
> 
> 
> On 2017-02-10, 2:30 AM, "Leif Johansson" <leifj@sunet.se> wrote:
> 
>     
>     Reviewer: Leif Johansson
>     Review result: Minor issues
>     
>     I have reviewed this document as part of the security directorate's
>     ongoing effort to review all IETF documents being processed by the
>     IESG.  These comments were written primarily for the benefit of the
>     security area directors.  Document editors and WG chairs should treat
>     these comments just like any other last call comments.
>     
>     The draft describes a way to handle groupings of large sets of sub-
>     LSPs in a P2MP GMPLS setup for the purpose of traffic engineering
>     (re-)optimization by introducing the concept of "fragment identifiers"
>     
>     Let me state up front that the topic is outside my normal area of
>     expertise. My only question is this: could an attacker fake messages
>     that would (to the receiver ingress node) appear to be part of a
>     fragmented group of sub-LSPs so as to trigger a full re-computation
>     of the tree? The text in the last but one paragraph of 4.2 would
>     seem to suggest that this attack is a possibility. At "worst" this
>     would be a denial-of-service attack but it should perhaps be addressed
>     in the security considerations section anyway.
>     	
>     	Cheers Leif
>     
>