Hi Acee, Roman, all,
[top posting, hope that’s OK]
After talking with Roman about this today, what I understand his position to be
is (at least in part), since the document identifies one specific case of a
type of attack ("The ability to disable OSPFv3 Extended LSA support can result
in a denial of service”), shouldn’t it also list other cases? What’s special
about "denial of service” vs. other things such as the ones Roman mentioned? I
don’t think he was seeking an in-depth exploration of these, just a more
complete summary list. I also wonder if the concern could equally be satisfied
by removing the one special case.
I’m sure Roman will chime in if I’ve gotten this wrong.
Thanks,
—John
> On Jan 31, 2024, at 8:50 PM, Acee Lindem <[email protected]> wrote:
>
>
>
>> On Jan 31, 2024, at 20:14, Acee Lindem <[email protected]> wrote:
>>
>>
>>
>>> On Jan 31, 2024, at 19:56, Roman Danyliw via Datatracker <[email protected]>
>>> wrote:
>>>
>>> Roman Danyliw has entered the following ballot position for
>>> draft-ietf-lsr-ospfv3-extended-lsa-yang-28: Discuss
>>>
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>>
>>>
>>> Please refer to
>>> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
>>>
>>> for more information about how to handle DISCUSS and COMMENT positions.
>>>
>>>
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/draft-ietf-lsr-ospfv3-extended-lsa-yang/
>>>
>>>
>>>
>>> ----------------------------------------------------------------------
>>> DISCUSS:
>>> ----------------------------------------------------------------------
>>>
>>> ** Section 5.
>>>
>>> Write
>>> operations (e.g., edit-config) to these data nodes without proper
>>> protection can have a negative effect on network operations. There
>>> are the subtrees and data nodes and their sensitivity/vulnerability:
>>>
>>> /ospf:ospf/extended-lsa-support
>>> /ospf:ospf/ospf:areas/ospf:area/extended-lsa-support
>>> The ability to disable OSPFv3 Extended LSA support can result in a
>>> denial of service.
>>>
>>> Isn’t it more than just denial of service? In certain environments wouldn’t
>>> the ability to modify OSPF Extended LSA configurations enable an attacker
>>> to:
>>> modify network topologies to enable select traffic to avoid inspection or
>>> treatment by security controls; route traffic in a way that it would be
>>> subject
>>> to inspect/modification by an adversary node; or gain access to otherwise
>>> segregated parts of the network.
>>
>> Only if they were able to craft extended LSAs on behalf of the original as
>> well as
>> modify the YANG configuration added by this document. I didn’t think we’d
>> have to
>> reiterate all the possible protocol attacks for every incremental
>> enhancement.
>
> Furthermore, no one is going to use the support of extended LSAs to isolate
> OSPFv3 domains
> from one another. The configuration is to control migration to the extended
> LSA encodings.
> Please see RFC 8362 for more information on OSPFv3 Extended LSAs.
>
> Acee
>
>
>
>
>
>>
>> Acee
>>
>>
>>
>>>
>>>
>>> ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>>
>>> As an editorial note, I would have benefit from some narrative prose on the
>>> data model.
>
> _______________________________________________
> Lsr mailing list
> [email protected]
> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/lsr__;!!NEt6yMaO-gk!CSaaziWFGrg6dv81sm55-XN-CP5eUEsFoeObIEuQzH8mYmJPURb3VboumvFzwTwOiHyiHP8O67tleiE$
_______________________________________________
Lsr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lsr