Andrew,

On Fri, Aug 4, 2023 at 4:25 AM Andrew Alston via Datatracker <
nore...@ietf.org> wrote:

> Andrew Alston has entered the following ballot position for
> draft-ietf-spring-sr-replication-segment-16: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-spring-sr-replication-segment/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> Firstly, thanks for the security section updates - that moves me from an
> abstain to a discuss.
>
> I would like to this discuss text:
>
> "Given the definition of the Replication segment in this document, an
> attacker
> subverting ingress filter above cannot take advantage of a stack of
> replication
> segments to perform amplification attacks nor link exhaustion attacks.
> Replication segment trees always terminate at a Leaf or Bud node resulting
> in a
> decapsulation."
>
> Here is issue with this - what happens post decapsulation.  I.E - if I
> were to
> take an IPv4 packet - encapsulate it in a replication SID - with a source
> host
> I wished to attack, and a destination address of an attached broadcast -
> would
> the IPv4 packet be processed post de-cap.
>
> If the packets post de-cap do indeed get forwarded, the attack vector is
> still
> entirely real. The SRv6 is used to tunnel packets pass things like IP
> directed
> broadcast protections, unicast reverse path filtering etc, and the de-cap
> ensures they get acted on.
>
> If I've missed something here or am off in my analysis - apologies - but
> if not
> - the above text needs to be rectified so that this attack vector is made
> clear.
>
>
> Yes, this is certainly possible, but the same vulnerability applies to
other SRv6 behaviors that perform decapsulation or even to MPLS
encapsulated payloads. I will add text about this in the next revision.

Thanks,
-Rishabh
_______________________________________________
spring mailing list
spring@ietf.org
https://www.ietf.org/mailman/listinfo/spring

Reply via email to