[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

catchup



Catching up on things I've missed:

    * /To/: Alex Zinin <zinin at psg.com <mailto:zinin@DOMAIN.HIDDEN>>,
      routing-discussion at ietf.org
      <mailto:routing-discussion@DOMAIN.HIDDEN>
    * /Subject/: Re: Last Call: draft-jones-opsec "Operational Security
      Requirements for IP Network Infrastructure"
    * /From/: Ross Callon <rcallon at juniper.net
      <mailto:rcallon@DOMAIN.HIDDEN>>
    * /Date/: Thu, 05 Feb 2004 11:50:27 -0500
    * /Cc/: iesg at ietf.org <mailto:iesg@DOMAIN.HIDDEN>

------------------------------------------------------------------------
rc> I think that this is a very useful document, and is quite well done. The
rc> topic is also quite urgent. I therefore encourage publication.
rc>
rc> My comments are very minor editorial comments, and are intended
rc> only to be helpful (if any of these are controversial then "never mind").
rc>
rc>
rc> Regarding the title: it is very clearly stated in the scope section that
rc> this
rc> document covers routers and switches. My general interpretation of the
rc> phrase "IP Network Infrastructure" tends to include servers as well. It
rc> therefore seems reasonable to change the title to "Operational Security
rc> Requirements for IP Routers and Switches". (although I wouldn't change
rc> the title if this requires any major trouble -- the stated scope is very
rc> clear,
rc> and some of these requirements might carry over to other devices).

The scope is actually "things that transit packets in very large networks".
I think "infrastructre" is more accurate/less limiting than "routers and switches".

rc> Section 1.4, second bullet item: In principle a packet could be delivered
rc> to more than one place. Thus I would be inclined to reword this bullet as:
rc>
rc>         o traffic goes where its supposed to go, and only where its supposed
                                                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^
rc>            to go (availability, confidentiality)
               ^^^^^

Changed.

rc>
rc>
rc> Section 1.5, In interpret the phrase "end user" to be a person sitting at
rc> home on the other end of a dial-up or DSL connection, or perhaps a
rc> company. Thus I think that "end user" could be changed to "network
rc> operator" so that this section reads:
rc>
rc>         There are two intended audiences: the network operator who selects,
rc>         purchases, and operates IP network equipment, and the vendors who
rc>         create them.

Changed.

rc>
rc> Page 10, definition of "Single-Homed Network". Does this include a network
rc> which has two physical links to the same service provider? Does this depend
rc> upon whether this results in the network having a single address prefix that
rc> needs to be advertised? It seems to me that the issue is primarily
rc> related to
rc> addressing and routing, and the related checking of source addresses. Thus
rc> the definition looks good, but a little clarification might not hurt.
rc> This is a
rc> difficult area to get precisely the right wording, but how about a comment
rc> along the line of:
rc>
rc>         Note: A single homed network may have more than one physical links
rc>         to the same service provider, so long as the connection can be
rc> treated
rc>         as one logical connection for the purpose of inter-domain
rc> routing and
rc>         addressing.

I've since been over this several times with Pekka Savola.
I think this in much better shape now.   See

  http://www.port111.com/opsec/draft-jones-opsec-04.txt

rc>
rc>
rc> Page 27/28, section 2.5.6, discussion of anti-spoofing filters. Current text
rc> for the example says:
rc>
rc>         Examples.
rc>         This requirement could be satisfied in several ways. It could be
rc>         satisfied by the provision of a single command that automatically
rc>         generates and applies filters to an interface that implements
rc>         anti-spoofing. It could be satisfied by the provision of a
rc>         command that causes the return path for packets received to be
rc>         checked against the current routing tables and dropped if they
rc>         would not be forwarded back through the interface on which they
rc>         were received.
rc>
rc> This is perhaps a nit. In the single-homed case, the text is correct as
rc> it currently stands. If we wanted this to extend to spoof checking in
rc> other cases, then you want a slightly less rigid check, in that there
rc> might be multiple paths, and you want to accept the packet if /any
rc> /path exists back to the source over the interface, not just the paths
rc> that you happen to have chosen. Thus we could generalize this as
rc> follows:
rc>
rc>         Examples.
rc>         This requirement could be satisfied in several ways. It could be
rc>         satisfied by the provision of a single command that automatically
rc>         generates and applies filters to an interface that implements
rc>         anti-spoofing. It could be satisfied by the provision of a
rc>         command that causes the return path for packets received to be
rc>         checked against the current routing tables and dropped if they
rc>         could not be forwarded back through the interface on which they
rc>         were received (ie, if no path to the source exists over the
rc> interface).

Ditto.

Thanks,
---George