Hi Les,

As has been stated multiple times before…there is nothing today – without
> MP-TLV support – that prevents an attacker from sending many TLVs for the
> same object. Introduction of MP-TLV does not alter that attack vector.
>

I am not sure about that. Tell me what I am missing ...

If I get 5 TLVs today without MP-TLV I still store only the latest.

If I however get 5 MP-TLVs tomorrow with MP-TLV I need to store all 5
chunks of it.

In both cases I need to reflood all so from that perspective you are right
this is no different. But I was not concerned about reflooding but local
node resources to store then in LSDB.


> As was discussed in this thread with Med, if anything the addition of
> MP-TLV support makes an implementation better equipped to handle such
> attacks since MP-TLVs are recognized and not treated as duplicates.
>

To me, treating as duplicates is actually safer node wise, while same
network wide.

R.


>
>
>    Les
>
>
>
> *From:* Robert Raszuk <rob...@raszuk.net>
> *Sent:* Friday, March 28, 2025 2:59 PM
> *To:* Les Ginsberg (ginsberg) <ginsb...@cisco.com>
> *Cc:* mohamed.boucad...@orange.com; The IESG <i...@ietf.org>;
> draft-ietf-lsr-multi-...@ietf.org; lsr-cha...@ietf.org; lsr@ietf.org;
> yingzhen.i...@gmail.com
> *Subject:* Re: [Lsr] Re: Mohamed Boucadair's Yes on
> draft-ietf-lsr-multi-tlv-11: (with COMMENT)
>
>
>
> Hi Les,
>
>
>
> > we now have to do an upgrade
>
>
>
> The way I understand Mohamed's suggestion is not to have a static
> implementation constant, but a configurable limit by an operator. If you
> prefer the default to be infinity so be it. If this is just a config no
> upgrade would be necessary.
>
>
>
> But how do you protect the network from malicious or accidental injection
> of MP-TLV consisting of 1000s of pieces ? And it seems better to ignore the
> TLV exceeding such limit as opposed to break entire level.
>
>
>
> So let's assume there is no limit ... how do you protect from such attack
> vectors or just bugs especially if what is exceeded is just a link state
> opaque value simply carried by ISIS for convenience of other upper level
> apps ?
>
>
>
> Ideally such a limit would need to be set per each MP capable TLV.
>
>
>
> Thx,
>
> R.
>
>
>
>
>
> On Fri, Mar 28, 2025 at 9:47 PM Les Ginsberg (ginsberg) <ginsberg=
> 40cisco....@dmarc.ietf.org> wrote:
>
> Med –
>
>
>
> V13 of the draft has been posted which addresses the logging text and the
> Security section text.
>
>
>
> There is then one open issue:
>
>
>
> > > > # Section 5 (*)
>
> > > >
>
> > > > CURRENT:
>
> > > >    When processing MP-TLVs, implementations MUST NOT impose a
>
> > > minimum
>
> > > >    length check.
>
> > > >
>
> > > > Agree... however, should we have a max of MP-TLVs to be used as a
>
> > > > guard for splitting the information into a large numbers of TLVs?
>
> > >
>
> > > [LES:] I see no reason to impose a maximum. Any number chosen would be
>
> > > arbitrary and risks becoming "too small" in the future.
>
> >
>
> > [Med] I'm not asking to pick a random max value, but to have a knob for
>
> > Operators to control a max based on their local policy. We need some
> guards
>
> > here.
>
> >
>
> [LES:] I am not comfortable specifying (or even suggesting) a max value.
>
> *[Med] As I said earlier, I’m not asking for that. The exact value will be
> up to the taste of the operation. My request here is to give that control.*
>
>
>
> It isn’t needed and I think introduces additional issues.
>
> *[Med] misbehaviors from within networks happen, bugs and misconfiguration
> happen as well, etc. I still think the guard does not bring any issue, but
> fix them.*
>
>
>
> The only reason an excessively large number of TLVs for the same object
> would be sent are:
>
>
>
> a)They are actually needed because of the amount if information required
> in a given deployment
>
> b)The sending implementation has a bug
>
> c)There is an attacker
>
>
>
> Regardless of the reason, the receiver has to deal with this. Specifying
> an arbitrary max isn’t going to help when the need is legitimate - and it
> obviously won’t help prevent the pathological cases.
>
> Note that Section 5 (last paragraph) provides guidance on how to deal with
> duplicated information.
>
>
>
> *[Med] I’m afraid that para does not cover this point.*
>
>
>
> *[LES2:] Let’s dig a bit deeper here.*
>
> *You propose that each implementation locally choose a maximum value for
> the number of MP-TLVs it supports for a given object.*
>
> *Suppose that Node A chooses “2” and Node B chooses “3”.*
>
> *Both of them receive advertisements which have 3 MP-TLVs for a given
> object. What will happen?*
>
> *Node A will use 2 of the TLVs – Node B will use all 3 of the TLVs.*
>
> *Which means we are in an equivalent situation to having a node which
> doesn’t support MP-TLVs at all in the network.*
>
> *And  we are vulnerable to the same problems – forwarding loops/black
> holes.*
>
>
>
> *One way of dealing with this would be to specify a global maximum instead
> of leaving it to individual nodes to choose a maximum.*
>
> *But this means if the number proves too small over time, we now have to
> do an upgrade and get all nodes to support a larger number.*
>
>
>
> *And even with a consistent maximum, receivers still have to deal with
> what ever they receive i.e., nodes cannot simply ignore the additional
> TLVs. Even if they don’t actively use the information in those TLVs they
> have to track all of the TLVs associated with a given object so that they
> become aware when that number falls into the acceptable range – noting that
> you don’t know which of the TLVs may be withdrawn in the next update.*
>
>
>
> *I appreciate the concern that you have – but imposing a limit isn’t going
> to help – it is only going to create additional problems.*
>
>
>
> *    Les*
>
>
>
> _______________________________________________
> Lsr mailing list -- lsr@ietf.org
> To unsubscribe send an email to lsr-le...@ietf.org
>
>
_______________________________________________
Lsr mailing list -- lsr@ietf.org
To unsubscribe send an email to lsr-le...@ietf.org

Reply via email to