-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Alissa Cooper - Discuss #14
Comments
Added this text: All data nodes defined in the YANG modules which can be created, o Setting the value of 'br-ipv6-addr' on the CE to point to an o Setting the MTU to a low value, which may increase the number of o Disabling hairpinning ('enable-hairpinning') to prevent o Setting 'softwire-num-max' to an arbitrary high value, which may o Setting 'icmpv4-rate' or 'icmpv6-rate' to a low value, which may o Accessing to privacy data maintained by the BR (e.g., the binding o Instructing the BR to install entries which in turn will induce a |
Here's the text that I wrote for this. If Med's version is acceptable, then I'm happy to go with that, but this is here if we need it: The YANG module specified in this document defines a schema for data that is designed to be accessed The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access There are a number of data nodes defined in this YANG module that are writable/creatable/deletable In the "ietf-softwire-ce" module: /softwire-payload-mtu /softwire-payload-mtu Setting either of these nodes to a low value could result in the /binding/br-ipv6-addr/ /algo/algo-instances/algo-instance/encapsulation/br-ipv6-addr/ /algo/algo-instances/algo-instance/translation/dmr-ipv6-prefix/ The values of the above nodes could be changed to redirect all of the client's /binding/binding-ipv6info /algo/algo-instances/algo-instance/ The values of nodes in the above subtrees could be altered to create invalid In the "ietf-softwire-br" module: /br-instances/binding/binding-instance/softwire-payload-mtu Setting either of these nodes to a low value could result in the /br-instances/binding/binding-instance/ /algorithm/algorithm-instance/ The values of the above nodes could be changed to reject or redirect all, Security considerations related to lw4o6, MAP-T and MAP-E are discussed in [RFC7596], |
DISCUSS:
The security considerations do not seem to follow the YANG security guidelines
https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines. They do not
list the specific writeable and readable subtrees/nodes and why they are
sensitive. The fact that all the writeable nodes could "negatively affect
network operations" seems trivially true for most writeable YANG module nodes.
In the case of these modules, there seem to be multiple different threats
relevant to different nodes, including exposure of data about individual
users/customers, potential for disruption of the operations of the BR or CE,
etc.
The text was updated successfully, but these errors were encountered: