Hi John,

We've just posted an update to the draft for the Color-Only steering modes
and the allocation of bits from the BGP Color Extended community.

https://datatracker.ietf.org/doc/html/draft-ietf-spring-segment-routing-policy-20

This is along the lines of your suggestions and the ongoing discussions on
the IDR list for the draft-ietf-idr-segment-routing-te-policy :
https://mailarchive.ietf.org/arch/msg/idr/3F2m4usa-uahnriF6fFh5F9wlQA/

Looking forward to your response on your discuss & comments on this
document. Please let know of any outstanding discuss or comments that
remain to be addressed in the document.

Thanks,
Ketan


On Thu, Feb 17, 2022 at 1:12 AM John Scudder <j...@juniper.net> wrote:

> Hi Ketan,
>
> > On Feb 16, 2022, at 2:03 PM, Ketan Talaulikar <ketant.i...@gmail.com>
> wrote:
> >
> > Hi John,
> >
> > Thanks for your review and please check inline below for responses.
>
> Thanks for your reply. For this response I’m confining myself to points 3
> and 4.
>
> [snip]
>
> > 3. Related to the above, at least one of the references listed as
> informational
> > clearly has to be normative with the document as it stands.
> > draft-ietf-idr-segment-routing-te-policy is the one I’m thinking of, for
> > example its use in §2.4 seems like it may rise to the "normative" level,
> §2.5
> > almost surely does, §4.1 surely does, and §8.8.1 is the icing on the cake
> > because this document defines semantics for a field that isn’t even
> allocated
> > until and unless draft-ietf-idr-segment-routing-te-policy is published.
> >
> > KT> It is the other way round. The SPRING document specifies the
> information model and the constructs of the SR Policy. The IDR document is
> primarily about signaling of the SR Policy from a controller to the headend
> using the new SR Policy SAFI (73) - as such it does refer normatively to
> the SPRING SR Policy.
>
> Without getting too far into the details on this one, you just can’t write
> a spec about a field (or set of flags) that doesn’t (don’t) exist. The way
> you’ve structured these two documents, that field (I will call it a field)
> doesn’t formally exist until and unless
> draft-ietf-idr-segment-routing-te-policy is published. Therefore,
> draft-ietf-spring-segment-routing-policy has a hard dependency on it, and
> this is one thing that makes a reference “normative”. These would hardly be
> the first two documents to normatively reference one another, it’s what the
> RFC Editor uses clusters for (amongst other things).
>
> You could also resolve this particular issue by restructuring the
> documents to make them more self-contained. If you do, then perhaps we
> would need to revisit the other references to
> draft-ietf-idr-segment-routing-te-policy in more detail — but until then it
> wouldn’t be time well spent, as the §8.8.1 reference is sufficient to
> cement the requirement.
>
> > 4. In §2.1 you talk about the signaling of symbolic names for candidate
> paths.
> > Although you are careful to say that such symbolic names are only used
> for
> > presentation purposes, it seems to me they still could be considered a
> new
> > potential source of vulnerability, since a string that has no
> sanity-checking
> > whatsoever applied by the protocol can display literally anything to an
> > operator viewing it. Shouldn’t this be addressed in your Security
> > Considerations? (For an example of a related Security Considerations,
> see RFC
> > 9003. It’s probably not the best example, but it’s the one I had at my
> > fingertips…)
> >
> > KT> RFC9003 uses UTF-8 while this document uses printable ASCII. As
> such, I am not aware of security issues around printable ASCII - please do
> point me to any references.
>
> You’re thinking too much like a protocol designer. The kind of concern I’m
> thinking about has to do with using the string as a vector to put some
> words in front of an operator, as part of a larger social engineering
> attempt. I don’t have a detailed attack scenario to paint for you, but a
> quick sketch is along the lines of
>
> - Attacker manages to inject a candidate path with the name
> “Big_Bank_Low_Latency”
>         - ProTip: the candidate path does not actually terminate at
> Big_Bank
> - Attacker then phones NOC, feigns urgency, asks NOC to redirect Big_Bank
> traffic onto that path
>
> You get the idea, I hope.
>
> > Also note that this document does not specify protocol encodings where
> some extra verbiage is normally required (e.g. that it is signaled without
> NULL, handling truncation/overruns, etc.).
>
> But yet it does specify the precise character set to be used, and a
> near-obsolescent one at that. Why is that? I mean, I don’t hate ASCII, but
> I just find it odd and assume you actually have a reason for it, instead of
> taking either the option of leaving the character set unspecified (as you
> point out there are many such details you don’t concern yourself with in
> this document) or if specifying it, using UTF-8 or similar.
>
> > KT> As discussed in the WG, we are sticking to printable ASCII. When the
> encoding is specified to be printable ASCII, it is expected that
> implementations valid that.
>
> I admire your optimism.
>
> —John
_______________________________________________
spring mailing list
spring@ietf.org
https://www.ietf.org/mailman/listinfo/spring

Reply via email to