Hi, Jeff,

> 2019/12/18 午後4:41、Jeffrey Haas <jh...@pfrc.org>のメール:
> 
> Carlos,
> 
> On Wed, Dec 18, 2019 at 09:28:30PM +0000, Carlos Pignataro (cpignata) wrote:
>> The TTL of 1 recommended for RFC 4379 / RFC 8029 S4.3 is because if the MPLS 
>> packet is mis-routed, or there's a forwarding mis-programming, then an MPLS 
>> LSE pop would expose the BFD packet and so that the BFD is not further 
>> mis-forwarded.
>> 
>> In the VXLAN case an intermediate router would not remove the VXLAN encap 
>> because the outer encap is IP (with a destination address, not an MPLS Label 
>> that can be mis-interpreted in context) and a mid-point router would not 
>> understand VXLAN.
> 
> Explained, that now seems obvious.  Thanks. :-)
> 
> But given that point, what precisely is the objection to the inner IP header
> of the BFD for vxlan having a TTL of 1?

The intent would be to protect of potential attacks beyond the encapsulating 
endpoint (i.e., packet coming into the VTEP vs. sourced, off-link spoofing).

> 
> I think this is partially a matter of attack spaces varying depending on
> whether we're targeting the management VNI vs. a tenant.  In the case of the
> management VNI, we (should) have very strong control over what BFD traffic
> is getting encapsulated.  
> 
> However, for tenant VNI mode, is the argument that depending on what the
> other vxlan PDU parameters look like, tenant sourced BFD PDUs may be
> indistinguishable from ones sourced by the management infrastructure?  And
> if so, how would GTSM help us here?

Tenant sourced BFD PDUs would not use host loopback dest addresses. Scanning 
through S6 of draft-ietf-bfd-vxlan-09, "MAY support the use of the Management 
VNI”.

And if there are already protections for not over-forwarding the BFD pak, the 
flip-question is “what does TTL = 1 bug you?”

My assumption was that if the base BFD specs say “GSTM is useful”, why not here?

Thanks,

Carlos.

> 
> -- Jeff
> 

Reply via email to