Hi,

Thanks for the review. Please see inline <RR>.


On 2018-07-03, 4:21 PM, "Benjamin Kaduk" <ka...@mit.edu> wrote:

    Benjamin Kaduk has entered the following ballot position for
    draft-ietf-bfd-yang-16: Discuss
    
    When responding, please keep the subject line intact and reply to all
    email addresses included in the To and CC lines. (Feel free to cut this
    introductory paragraph, however.)
    
    
    Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
    for more information about IESG DISCUSS and COMMENT positions.
    
    
    The document, along with other ballot positions, can be found here:
    https://datatracker.ietf.org/doc/draft-ietf-bfd-yang/
    
    
    
    ----------------------------------------------------------------------
    DISCUSS:
    ----------------------------------------------------------------------
    
    Section 2.1 describes a scheme wherein an IGP may generate events that
    cause BFD sessions to be created/destroyed; this effectively is proxying
    commands from IGP over the local BFD API, which brings the authentication
    and authorization of the IGP into scope, even if the local BFD
    configuration access is authenticated.  (That is, the proxying component is
    always authenticated, but now bears responsibility for performing
    authentication/authorization/sanity checks on commands before proxying
    them.)  Since IGP security is a topic for elsewhere, the changes to this
    document seem scoped to documenting the requirements on the IGP/local proxy
    for these checks, and arguably for only allowing authenticated IGP events
    to create authenticated BFD sessions (though arguably not as well, for the
    latter, since this is a YANG model document and not an architecture
    document).
<RR> I am not 100% sure I understand the point being made. Is it a question of 
underlying the importance of having the IGPs authenticated since the IGPs can 
create/destroy BFD sessions via the local API?

    
    ----------------------------------------------------------------------
    COMMENT:
    ----------------------------------------------------------------------
    
    I'm not very familiar with YANG notifications; is there a risk that they
    can be abused as a DoS attack vector on the notification recipient by an
    attacker (e.g., by causing a flapping series of state transition events or
    by creating/destroying many sessions)?
<RR> To do that an attacker would need to e.g. access the local device or the 
directly connected devices to cause those BFD state transitions.

 
    Regarding the Security Considerations:
    
    It's unclear whether local-multiplier, the various intervals, and
    authentication are the only nodes that merit mention for every
    per-forwarding-path-type module.  For example, source/destination addresses
    could be modified to direct traffic at unwitting recipients, and the
    key-chain and meticulous settings also seem security-related.
    
    Similarly, read-only access to the discriminators (and
    key-chain/authentication information) could make it easier for an attacker
    to spoof traffic.
<RR> Good point. I will add those nodes.

Regards,
Reshad.
    
    

Reply via email to