[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

OWAMP review (Was: Re: Please review documents on IESG agenda for June 9, 2005)



Wijnen, Bert (Bert) wrote:

o draft-ietf-ippm-owdp-14.txt
A One-way Active Measurement Protocol (OWAMP) (Proposed Standard) - 4 of 8 Token: Allison Mankin


I read this draft based on Bert's request. Here are my comments:

Overall:

I like this draft, its very exciting technology. I'm eager to
start testing it, when it becomes available on the types
of machines that I use.

The draft is mostly OK. I noted some nits. The main
technical concern I have is tighting up the denial-of-service
protection text.

Note that I'm not a IPPM expert and this is the first time I
read this draft. I may have missed something obvious. If
so, let me know.

Technical:

6.2. Preventing Third-Party Denial of Service

   OWAMP-Test sessions directed at an unsuspecting party could be used
   for denial of service (DoS) attacks.  In unauthenticated mode,
   servers SHOULD limit receivers to hosts they control or to the OWAMP-
   Control client.

The above text is good, but I would like to tighten the rule a little bit. Maybe by adding this:

  "Specifically, unless otherwise configured, the default behavior
   of servers MUST be to decline requests where the Receiver Address
   field is not equal to the address that the control connection
   was initiated from. Given the TCP handshake procedure and sequence
   numbers in the control connection, this ensures that the hosts that
   make such requests are actually those hosts themselves, or at
   least on the path towards them. If either this test or the handshake
   procedure were omitted, it would become possible for attackers
   anywhere in the Internet to request large amounts of test packets
   be directed against victim nodes somewhere else.

   In any case, servers MUST decline all requests where the Sender
   Address is not either the server's own address or the address of
   a node that it controls; OWDP-Test packets with a given source
   address can only be sent from the node that has been assigned
   that address."

   payload of a single ATM cell (this is only achieved in
   unauthenticated and encrypted modes).

I have to wonder whether this should read "unauthenticated and unencrypted", but I'm reading on... Section 4.1.2 shows the authenticated and encrypted modes to have the same format, and neither EBC or CBC modes should add any overhead. What am I missing? Why does an encrypted mode packet fit an ATM cell but an authenticated does not? And I don't see a MAC field anywhere.

The protocol does not carry any information in a natural language.

I would actually prefer the Username field to be in UTF-8, rather than Octet. (It would be even better if it were possible to have longer than 16 byte usernames, in case someone later wants to use AAA or something for the shared secret management of OWDP. But I can see that changing that would be a too big change for the protocol formats.)

7. IANA Considerations

   IANA is requested to allocate a well-known TCP port number for the
   OWAMP-Control part of the OWAMP protocol.

How about Accept values? Might make sense to have a rule about adding those. Say, Standards Action.

Editorial:

 hosts
   increasingly have available to them very accurate time
   sources

Maybe "very accurate time sources are increasingly available to hosts", which sounds better to me (but I'm not a native speaker).

--Jari