Hi Phillip, Thanks for your review of the "draft-ietf-rtgwg-srv6-egress-protection-16". This draft indeed raises security concerns regarding the rerouting of traffic around egress node or link failures within a single administrative domain. However, these concerns are not unique to this proposal but are rather common in network environments.
Specifically: Security within a Single Administrative Domain The assumption of a "single administrative domain" does limit certain types of attacks since nodes within the domain are typically protected by unified security policies. However, as you pointed out, attackers might indirectly affect traffic paths within the target domain by launching broader network attacks, such as denial-of-service attacks on other transit domains. Such attack methods do not rely on the protection mechanisms proposed in the draft but rather exploit the characteristics of network topology and routing protocols. Possibility of Cross-Domain Attacks The cross-domain attack scenario you mentioned (such as BGP attacks by Country X on Country Y) is indeed a real-world issue. The goal of such attacks is to manipulate routing information to change traffic paths and redirect traffic to websites or services controlled by the attacker. The root cause of these attacks lies in the security vulnerabilities of the BGP protocol, not the SRv6 egress protection mechanism proposed in the draft. In fact, the SRv6 egress protection mechanism is designed to quickly restore faults within the administrative domain and is not intended to address cross-domain attack issues. Leverage for Attackers The mechanisms proposed in the draft do not provide new leverage for attackers. On the contrary, they quickly switch to backup paths within the administrative domain to reduce the impact of faults on network services. This mechanism was designed with the security of the administrative domain in mind, such as using stronger authentication mechanisms (like ISO10589, RFC5304, RFC5310, etc.) to protect IS-IS and OSPFv3 protocols. Mitigation Measures For the attack scenarios you mentioned, mitigation measures should focus on strengthening the security of cross-domain traffic and the authentication mechanisms of routing protocols. For example, using strong authentication mechanisms for BGP (such as RFC4552 and RFC7166) can prevent the spread of malicious routing information. Additionally, network operators can reduce dependence on single transit paths by using traffic engineering and policy-based routing. Best Regards! =============================================== Tao He Next Generation Internet Research Department Research Institute CHINA UNITED NETWORK COMMUNICATIONS CORPORATION LIMITED Mobile: +86-18618484923 E-mail: he...@chinaunicom.cn From: Phillip Hallam-Baker via Datatracker Date: 2024-11-02 20:14 To: sec...@ietf.org CC: draft-ietf-rtgwg-srv6-egress-protection.all; rtgwg Subject: [secdir] Secdir early review of draft-ietf-rtgwg-srv6-egress-protection-16 Reviewer: Phillip Hallam-Baker Review result: Has Issues I have reviewed this document and in general, it seems ready. While it does raise serious security concerns, it is not clear that these are new to this proposal or that this proposal gives more leverage to an attacker. Specifically, the draft stipulates that 'the area is in a single administrative domain' the security considerations describes one set of attacks arising from customers served by the domain. However, this set of attacks may be broader than described. Consider for instance the case where there are two domains A and B that provide transit for ISP C. An attacker that wants to ensure C is serviced exclusively by B might perform a denial of service attack on A so as to increase the cost of that route so as to achieve that goal. A real world attack that has been seen in the past is country X preparing for an invasion of country Y, performing BGP level attacks to effectively reroute Internet traffic within Y so that the government Web sites were serviced by fake sites set up by X. These sites containing messages of the form 'don't worry about the military exercises'.
_______________________________________________ rtgwg mailing list -- rtgwg@ietf.org To unsubscribe send an email to rtgwg-le...@ietf.org