Re: Re: [ssm] Document Action: An Overview of Source-Specific Multicast(SSM) Deployment to Informational
Hugh Holbrook <holbrook@cisco.com> Tue, 10 June 2003 17:39 UTC
Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA10350 for <ssm-archive@lists.ietf.org>; Tue, 10 Jun 2003 13:39:58 -0400 (EDT)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h5AHd9B11881; Tue, 10 Jun 2003 13:39:09 -0400
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h5AHc0B11840 for <ssm@optimus.ietf.org>; Tue, 10 Jun 2003 13:38:00 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA10324 for <ssm@ietf.org>; Tue, 10 Jun 2003 13:37:56 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19Pn2H-0000qH-00 for ssm@ietf.org; Tue, 10 Jun 2003 13:35:53 -0400
Received: from sj-core-5.cisco.com ([171.71.177.238]) by ietf-mx with esmtp (Exim 4.12) id 19Pn2G-0000q0-00 for ssm@ietf.org; Tue, 10 Jun 2003 13:35:52 -0400
Received: from holbrook-laptop.cisco.com (sjc-vpn3-792.cisco.com [10.21.67.24]) by sj-core-5.cisco.com (8.12.9/8.12.6) with ESMTP id h5AHb4jc025963; Tue, 10 Jun 2003 10:37:15 -0700 (PDT)
Received: by holbrook-laptop.cisco.com (Postfix, from userid 500) id 61C9910B7A7; Tue, 10 Jun 2003 10:36:50 -0700 (PDT)
From: Hugh Holbrook <holbrook@cisco.com>
To: Toerless Eckert <eckert@cisco.com>
Cc: Jon Zeeff <jzeeff@internet2.edu>, Toerless Eckert <eckert@cisco.com>, Bill Fenner <fenner@research.att.com>, ssm@ietf.org
In-reply-to: <20030610143954.GK23388@cypher.cisco.com>
Subject: Re: Re: [ssm] Document Action: An Overview of Source-Specific Multicast(SSM) Deployment to Informational
Reply-To: holbrook@cisco.com
Message-Id: <20030610173650.61C9910B7A7@holbrook-laptop.cisco.com>
Date: Tue, 10 Jun 2003 10:36:50 -0700
Sender: ssm-admin@ietf.org
Errors-To: ssm-admin@ietf.org
X-BeenThere: ssm@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ssm>, <mailto:ssm-request@ietf.org?subject=unsubscribe>
List-Id: Source-Specific Multicast <ssm.ietf.org>
List-Post: <mailto:ssm@ietf.org>
List-Help: <mailto:ssm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ssm>, <mailto:ssm-request@ietf.org?subject=subscribe>
Jon, Toerless: This problem has not been ignored by the IETF; see draft-holbrook-idmr-igmpv3-ssm-04.txt. Section 3.5 states that a router should not revert to IGMPv2 (or MLDv1) compatibility mode in the SSM range in response to IGMPv1/v2 or MLDv1 reports. So this protects against v1 and v2 reports in the SSM range. That is if a v2-only host sends a v2 report for some SSM address, it won't deny ssm service to everyone else. To deny SSM service, you have to either plug in a v2 *router*, or you have to have a malicious attacker that is sending v2 queries. I think the current rules (MUST log an error on the v3-capable router) are good enough to detect benign misconfigurations when you have a v2 router on the LAN. You see the log, go find the bad router, and fix it. For *malicious* attacks, we considered a requirement on hosts to ignore v2 queries in the SSM range. The -03 revision of the draft, in fact, included text specifically nothing this as a MAY. But this (a) contradicts RFC3376, it is only is useful if the *routers* also refuse to revert to v2 compatibility mode (for the SSM range) in the presence of a v2 querier, and it results in a situation that is not addressed at all in RFC3376. Our assessment was that there were too many complicated scenarios to get this right, and so we did not call this out as an option. If you want to suggest something else, pleaes bring your concerns forward now. Hitoshi, if you have implementation experience that indicates that this works, that would also be useful to know. The ssm-with-igmpv3/mld document has just gone through a magma wg last call, and mostly passed -- we're pretty close to shipping it to the IESG. An alternative solution to address the problem is to filter v2 queries at the ingress physical port -- basically implement a layer 2 security policy that prevents queries from unauthorized hosts. A number of vendors make products that are capable of this, at least in the wired world. The right way for hosts to learn the SSM range is to use the MRD SSM Range option, IMO. -Hugh > > I see similar lack of concern about real world security in > > wireless routing protocols (and DHCP and IPv6 and PIM and ...). > > Well, it's as simple as this: IGMPv3 was NOT MADE for SSM, so it's a > bit hart to shift the blame onto it completely. Once there is sufficient > interest in SSM and people come to realize that SSM alone is sufficient > in many cases on hosts, one could make much stronger statements about an SSM > subset (and extensions) of IGMPv3 implementations in hosts: > > subset: - Ignore all IGMPv1/v2 queries > - Don't implent any exclude mode reports > extension: - trigger unsolicited IS_INCLUDE mode reports after > 60 seconds without a query. > > Makes a really simple & safe SSM only implementation, and is completely > compatible with IGMPv3 routers. But as long as the host needs to support > both ASM _and_ SSM, it is really hard to strip down the complexity: Even > that part of "which group is SSM, which is ASM" is contentuous. I for > once am a strong proponent of using SSM also within 239/8 because of admin > scoping, so how does a host determine wether a group is SSM or not ? > MSNIP SSM range ? Well, that's another requirement for a host stack, > and if i look at how long it takes for new requirements to be implemented > into host stack *oh well*... > > Cheers > Toerless _______________________________________________ ssm mailing list ssm@ietf.org https://www1.ietf.org/mailman/listinfo/ssm
- [ssm] Document Action: An Overview of Source-Spec… Bill Fenner
- Re: [ssm] Document Action: An Overview of Source-… Jon Zeeff
- Re: [ssm] Document Action: An Overview of Source-… Toerless Eckert
- Re: [ssm] Document Action: An Overview of Source-… Jon Zeeff
- Re: [ssm] Document Action: An Overview of Source-… Hitoshi Asaeda
- Re: [ssm] Document Action: An Overview of Source-… Toerless Eckert
- Re: [ssm] Document Action: An Overview of Source-… Toerless Eckert
- Re: [ssm] Document Action: An Overview of Source-… Hitoshi Asaeda
- Re: [ssm] Document Action: An Overview of Source-… Toerless Eckert
- Re: [ssm] Document Action: An Overview of Source-… Hitoshi Asaeda
- Re: Re: [ssm] Document Action: An Overview of Sou… Hugh Holbrook
- Re: [ssm] Document Action: An Overview of Source-… Hitoshi Asaeda
- Re: [ssm] Document Action: An Overview of Source-… Jean-Jacques Pansiot