Andrew,
We have added text addressing your DISCUSS concern in revision 17 of the
document.

Please take a look,
-Rishabh

On Tue, Aug 8, 2023 at 3:19 PM Rishabh Parekh <risha...@gmail.com> wrote:

> Andrew,
>
> On Fri, Aug 4, 2023 at 4:25 AM Andrew Alston via Datatracker <
> nore...@ietf.org> wrote:
>
>> Andrew Alston has entered the following ballot position for
>> draft-ietf-spring-sr-replication-segment-16: Discuss
>>
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut this
>> introductory paragraph, however.)
>>
>>
>> Please refer to
>> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
>> for more information about how to handle DISCUSS and COMMENT positions.
>>
>>
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-spring-sr-replication-segment/
>>
>>
>>
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>>
>> Firstly, thanks for the security section updates - that moves me from an
>> abstain to a discuss.
>>
>> I would like to this discuss text:
>>
>> "Given the definition of the Replication segment in this document, an
>> attacker
>> subverting ingress filter above cannot take advantage of a stack of
>> replication
>> segments to perform amplification attacks nor link exhaustion attacks.
>> Replication segment trees always terminate at a Leaf or Bud node
>> resulting in a
>> decapsulation."
>>
>> Here is issue with this - what happens post decapsulation.  I.E - if I
>> were to
>> take an IPv4 packet - encapsulate it in a replication SID - with a source
>> host
>> I wished to attack, and a destination address of an attached broadcast -
>> would
>> the IPv4 packet be processed post de-cap.
>>
>> If the packets post de-cap do indeed get forwarded, the attack vector is
>> still
>> entirely real. The SRv6 is used to tunnel packets pass things like IP
>> directed
>> broadcast protections, unicast reverse path filtering etc, and the de-cap
>> ensures they get acted on.
>>
>> If I've missed something here or am off in my analysis - apologies - but
>> if not
>> - the above text needs to be rectified so that this attack vector is made
>> clear.
>>
>>
>> Yes, this is certainly possible, but the same vulnerability applies to
> other SRv6 behaviors that perform decapsulation or even to MPLS
> encapsulated payloads. I will add text about this in the next revision.
>
> Thanks,
> -Rishabh
>
_______________________________________________
spring mailing list
spring@ietf.org
https://www.ietf.org/mailman/listinfo/spring

Reply via email to