Re: [tsvwg] Editorial comments on draft-yong-tsvwg-gre-in-udp-encap-01
Lucy yong <lucy.yong@huawei.com> Thu, 12 September 2013 17:55 UTC
Return-Path: <lucy.yong@huawei.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF7F711E8184 for <tsvwg@ietfa.amsl.com>; Thu, 12 Sep 2013 10:55:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.315
X-Spam-Level:
X-Spam-Status: No, score=-6.315 tagged_above=-999 required=5 tests=[AWL=0.284, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YtV7El4OhV1w for <tsvwg@ietfa.amsl.com>; Thu, 12 Sep 2013 10:55:23 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 9167621E8117 for <tsvwg@ietf.org>; Thu, 12 Sep 2013 10:55:02 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.5-GA FastPath queued) with ESMTP id AVI68079; Thu, 12 Sep 2013 17:54:59 +0000 (GMT)
Received: from LHREML406-HUB.china.huawei.com (10.201.5.243) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.146.0; Thu, 12 Sep 2013 18:53:24 +0100
Received: from DFWEML405-HUB.china.huawei.com (10.193.5.102) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.3.146.0; Thu, 12 Sep 2013 18:53:36 +0100
Received: from DFWEML509-MBB.china.huawei.com ([169.254.2.225]) by dfweml405-hub.china.huawei.com ([10.193.5.102]) with mapi id 14.03.0146.000; Thu, 12 Sep 2013 10:53:29 -0700
From: Lucy yong <lucy.yong@huawei.com>
To: "gorry@erg.abdn.ac.uk" <gorry@erg.abdn.ac.uk>
Thread-Topic: [tsvwg] Editorial comments on draft-yong-tsvwg-gre-in-udp-encap-01
Thread-Index: AQHOr94x2OaKLm0IrUup1VNzlsrJdJnCYCig
Date: Thu, 12 Sep 2013 17:53:29 +0000
Message-ID: <2691CE0099834E4A9C5044EEC662BB9D452C6409@dfweml509-mbb.china.huawei.com>
References: <a39c877edcf0255e3bab642d08593839.squirrel@www.erg.abdn.ac.uk> <2691CE0099834E4A9C5044EEC662BB9D452C62EF@dfweml509-mbb.china.huawei.com> <5231FAD6.9050206@erg.abdn.ac.uk>
In-Reply-To: <5231FAD6.9050206@erg.abdn.ac.uk>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.147.16]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "draft-yong-tsvwg-gre-in-udp-encap@tools.ietf.org" <draft-yong-tsvwg-gre-in-udp-encap@tools.ietf.org>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Subject: Re: [tsvwg] Editorial comments on draft-yong-tsvwg-gre-in-udp-encap-01
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tsvwg>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Sep 2013 17:55:31 -0000
-----Original Message----- From: Gorry Fairhurst [mailto:gorry@erg.abdn.ac.uk] Sent: Thursday, September 12, 2013 12:33 PM To: Lucy yong Cc: tsvwg@ietf.org; draft-yong-tsvwg-gre-in-udp-encap@tools.ietf.org Subject: Re: [tsvwg] Editorial comments on draft-yong-tsvwg-gre-in-udp-encap-01 On 12/09/2013 16:56, Lucy yong wrote: > Hi Gorry, > > Thank you very much for the review and suggestion. I am fine with editing suggestions. > > Regarding the resilience to off-path attack, although UDP, in general, is used as a transport protocol, this application only uses it to provide flow entropy. Both tunnel endpoints do not rely on UDP protocol to provide any transport function. This is the difference from other UDP protocol usages. Zero value in source UDP port is used if the ingress tunnel is unable to generate flow entropy from the payload and/or gre header, which results all the encapsulated packets forwarded to the same path over IP networks. Therefore, IMO, rfc6056 does not help off-path attack for this case. If an ingress tunnel end point uses the algorithm in rfc6056 to generate one Ephemeral port for this purpose, it works. > Leastways for this draft - I suggest it would be useful to decsribe the attack. [Lucy] I am not sure that using rfc6056 can prevent off-path attack in this application. In this application, the udp source port is used for flow entropy, egress tunnel can't perform any sanity check against UDP source port. What do I miss here? > We point out that ICMP verification method prompt some security concern but think the solution addressing that is out of the scope of this document. Based on the application, there are some ways to address it. For example, application layer could use signaling protocol to confirm the use of this encapsulation for tunneling; then tunnel ingress will ignore ICMP notice. > Again, let's first document and see whether a protocol mechanism is needed. [Lucy] agree. Lucy > Other authors may have opinion on these. > > Thanks, > Lucy > Thanks, Gorry > > > -----Original Message----- > From: gorry@erg.abdn.ac.uk [mailto:gorry@erg.abdn.ac.uk] > Sent: Thursday, September 12, 2013 5:15 AM > To: tsvwg@ietf.org > Cc: gorry@erg.abdn.ac.uk; draft-yong-tsvwg-gre-in-udp-encap@tools.ietf.org > Subject: Editorial comments on draft-yong-tsvwg-gre-in-udp-encap-01 > > Please see below some comments on the present use of keywords and text in the draft (I'll forward a second email shortly with a few questions). > > Gorry > > ---- > > Section 1. Last para > - This sentence does not make sense to me: > Hash functions in existing IP routers a GRE-in-UDP tunnel > transits will automatically utilize and benefit from this procedure > without needing any change or upgrade. > - Is something like this better: > Hash functions in existing IP routers will automatically utilize > and benefit from a GRE-in-UDP tunnel > without needing any change or upgrade to the forwarding. > > Section 1. Last para > Wide Area networks. > ^ > - suggest you remove capitalisation, but if you keep it, then please capitilise 'n'. > > Section 2. > - This section misses a RFC 2119 standards declaration. > > Para 3: > To simplify packet processing at the tunnel egress, packets destined > to this special UDP destination port [TBD] should have their UDP > ^^^^^ ^^^^ > - change /special/ to /assigned/ > - should? - I think this needs to be SHOULD, with an explanatory sentence explaining that this is the mechanism used by receivers to identify this protocol. > > Para 3: > relax this constraint to allow the zero UDP > checksum. > - This needs to add "for specific use-cases" and then para 5 needs to directly follow this. This keeps the implications clear. > > Para 5: > In addition IPv6 nodes must conform to the following: > - This needs to be a MUST. > > Section 4 > If a tunnel ingress must perform fragmentation on a packet before > encapsulation, it must use the same source > - The second /must/ is a requirement, please replace by MUST. > > para 3: > Tunnel end points that support > ECN must use the method described in > - This needs to be a MUST! > > Section 6: > - Do you wish to ask IANA for a service name for this port - I think you should. > > Section 7.1 > - Transport protocols in general should describe the vulnerabilities to on and off-path attack. The standard defence to off-path data injection attacks is to use port randomisation of the source port. At the moment this draft does not provide this function, and this may be a serious issue to consider. It could be resolved by requiring the sender to set the source port using the standard algorithm. > - RFC 6056 is BCP. > - Please update the security considerations section of the draft to identify this issue. > > Section 7.1 > - A second issue is that there is no ICMP verification method specified. > This also leads to an off-path DoS vulnerability. > - RFC 6056 is BCP. > - Please update the security considerations section of the draft to identify this issue. > > Section 10 > - Please add normative reference to RFC 2119. > - I am not sure that RFC 6335 is normative? > > > >
- [tsvwg] Editorial comments on draft-yong-tsvwg-gr… gorry
- Re: [tsvwg] Editorial comments on draft-yong-tsvw… Lucy yong
- Re: [tsvwg] Editorial comments on draft-yong-tsvw… Gorry Fairhurst
- Re: [tsvwg] Editorial comments on draft-yong-tsvw… Lucy yong
- Re: [tsvwg] Editorial comments on draft-yong-tsvw… Gorry Fairhurst