[Last-Call] Re: [Lsr] Re: Secdir last call review of draft-ietf-lsr-multi-tlv-09

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi, David:

I think you raised a good question, maybe ignored by the LSR WGLC.

It is possible that the memory of the receiver be corrupted/comprised by the attacker, because current solution has no length limit for one possible large IS-IS TLV.

Les, your answer doesn’t address the issues raised by David.

This is another point that we should BLOCK this proposal. Other outstanding unsolved issues are also in discussions.

I copy this mail also to IESG for further references of the IESG experts.

Aijun Wang
China Telecom

> On Feb 15, 2025, at 07:35, Les Ginsberg (ginsberg) <ginsberg=40cisco.com@xxxxxxxxxxxxxx> wrote:
> 
> David -
> 
> Thanx for the review.
> 
> The amount of information a given IS can advertise at a given level is bounded by (maximum # of LSPs(256) * LSP-MTU(typical default is 1492)).
> IS-IS supports two levels.
> 
> The easiest way to extend this is to use a larger MTU - the caveat being that all links in the network that are used by IS-IS MUST support the larger MTU as IS-IS does not support fragmentation of its PDUs.
> 
> None of this is altered by use of MP-TLV.
> 
> The driver for needing MP-TLVs are applications like Traffic Engineering/Flex Algo which require additional information to be sent about objects such as Neighbors and Prefixes.
> 
> So, I think current content of our Security section is accurate and appropriate.
> 
> HTH
> 
>    Les
> 
>> -----Original Message-----
>> From: David Mandelberg via Datatracker <noreply@xxxxxxxx>
>> Sent: Friday, February 14, 2025 2:22 PM
>> To: secdir@xxxxxxxx
>> Cc: draft-ietf-lsr-multi-tlv.all@xxxxxxxx; last-call@xxxxxxxx; lsr@xxxxxxxx
>> Subject: Secdir last call review of draft-ietf-lsr-multi-tlv-09
>> 
>> Reviewer: David Mandelberg
>> Review result: Has Nits
>> 
>> Looks good, I think.
>> 
>> The security considerations section doesn't have much detail, but this doc
>> seems to be an extension of existing practice to additional TLVs in a way that
>> wouldn't change the security considerations at all.
>> 
>> The only security-relevant thing I could think of is around memory bounds and
>> allocation in implementations. When going from limited-size fields to
>> unlimited-size data across separate TLVs, I could imagine attacks that try to
>> cause out of memory conditions on a router, or that try to overflow a
>> fixed-size buffer. But this doc talks about existing TLVs that already work the
>> same way, so I'm guessing that hasn't been an issue in practice, or has been
>> mitigated? Do any of the existing docs talk about this? Or is there a size
>> limit somewhere else (I'm not very familiar with IS-IS) that makes this a
>> non-issue?
>> 
> 
> --
> last-call mailing list -- last-call@xxxxxxxx
> To unsubscribe send an email to last-call-leave@xxxxxxxx

-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux