Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PSA Consider adding note about DoS attacks possible on to-CPU packets #666

Open
jafingerhut opened this issue Aug 30, 2018 · 1 comment
Open

Comments

@jafingerhut
Copy link
Collaborator

This is a fairly well known kind of attack on routers/switches, for which most implement some kind of metering on packets before they are sent to the CPU. There are many variations of this, e.g. use a ternary table matching on the packet 5-tuple and perhaps additional packet header fields to match an entry in a table, and each entry has its own meter with an independently configurable rate is one reasonably common example I have seen. There is nothing I can think of that should be added to PSA for this purpose -- just a warning to P4 code writers.

@vgurevich
Copy link
Contributor

I do not think this is actually needed, especially since there are so many ways that PSA facilities can be employed to implement the proper protections (if necessary) and there are probably a lot of other ways how these protections can be implemented by the components outside of PSA. There is, obviously, no big harm, but in the specification document I'd rather stick to the definitions and the facts than the opinions and recommendations for the beginner code writers. That's what books and tutorials are for.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants