[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: draft-ietf-opsec--infrastructure-security-00.txt



Sorry for delay in responding, inline,

On Thu, 14 Sep 2006, Paul Quinn wrote:
On Sep 12, 2006, at 11:38 PM, Pekka Savola wrote:
I don't think this is BCP material for two reasons: (1) making it a BCP doesn't seem to send a much stronger signal than Informational (all ingress filtering RFCs are BCPs...), and (2) it includes some recommendations that at least I find questionable.

PQ> Do you have examples (other than the comments below) of thing you find "questionable"? The recommendations have been reviewed by many large operators and overwhelmingly the feedback has been positive wrt the applicability/deployment of the techniques.

With 'questionable' I was only referring to the issues that were listed further down in the email, especially the most user-unfriedly forms of infrastructure hiding (breaking PMTUD, sending RFC1918-sourced junk to your peers, using non-routed address space which is indistinguishable from spoofing). Again, I think it's fine to do infrastructure hiding, but we should not recommend forms which break protocols like PMTUD or place burden on the neighboring networks.

I'm also not yet sure about DSCP rewriting; if it was more explicit that only preferred-treatment DSCP values were to be rewritten unless properly authorized (leaving most of the DSCPs untouched), I could probably that the justification for rewriting is strong and harmless enough.

Specifically: EIACLs seems fine though mostly redundant if you can do ingress filtering,

Please define ingress filtering. EIACLs are simply a refinement of the general filtering concepts with specific intent: limit traffic destined to the infrastructure. They have been widely deployment by many large carriers and have proven benefits.

The document seems to be saying that instead of general ingress filtering (also for transit traffic) you {c,sh}ould do this form of filtering where you look at the destination addresses first and then at your source addresses.

I think this is missing applicability discussion, because if you are able to use EIACLs, that means you have line-rate filtering capability at the edge. Which also means that you could do spoofing protection for _all_ the traffic, including transit at the edge -- at the very least denying source addresses which belong to your infrastructure or single-homed customers. But the document seems to be assuming you don't want or can't implement "filter out your own addresses" at borders.

Don't get me wrong, EIACLs seem like an OK solution, but I have difficulty seeing a scenario with EIACLs where 1) you couldn't deploy a more complete spoofing protection at your borders, and 2) EIACLs would provide significant additional benefit after applying the spoofing protection. The additional benefit seems to be dropping certain kinds of traffic targeted at your routers at the edge instead at the router itself. But on the other hand, EIACLs has significant maintenance cost especially if the P2P interfaces and loopbacks are not from a contiguous netblocks (so you'd have to enumerate hundreds or even a thousand infrastructure prefixes) or it's difficult to figure out the accepted traffic.


substantial
-----------

- abstract and introduction seem to start in a bit long-winded fashion, discussing at length BCPs related to ingress filtering. I'd change the order of the text a bit -- start by focusing on what this document is about rather than what it isn't.

Do you have suggested text that you feel would work better?

For example, in the abstract you could just say (copy-pasting from the -00 version):

This
   document focuses solely on traffic destined to elements of the the
   network infrastructure itself.  This document presents techniques
   that, together with network edge ingress filtering and RFC 2267 and
   RFC 3704, provides a defense in depth approach for infrastructure
   protection.  This document does not present recommendations for
   protocol validation (i.e. "sanity checking") nor does it address
   guidelines for general security configuration.

.. and minor wordsmithing (e.g., remove "solely").

You could start in a similar way in Introduction also, but keep the discussion of ingress filtering RFCs in a later part of the introduction.

--
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings