[bess] Re: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn

Linda Dunbar <linda.dunbar@futurewei.com> Fri, 14 June 2024 17:23 UTC

Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C6B5C15199D; Fri, 14 Jun 2024 10:23:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.108
X-Spam-Level:
X-Spam-Status: No, score=-7.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W6H_mDUtYsRW; Fri, 14 Jun 2024 10:23:03 -0700 (PDT)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2110.outbound.protection.outlook.com [40.107.244.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E7125C1DFD48; Fri, 14 Jun 2024 10:23:02 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eRsSrEFsULLs7cRUqbD/lpExd8N/Sk55W/h1JHkKpn9RJPJerEs3lPRt/8TxUmllYITjnh59CJyD/2wj94Q7XK+GoH7xutE5eE/3vAxD+DHif0An40PYX49cllzpT7CTmZFyCf4LmaS2dVy9dnXoqBwSb2lgmXSXzaD8Sb3TaJBz11Mth8DZaA3CrAhV3pG43IapLXZwNtN3dCPwZFKeLojTluvMi0wftFZ6vR7G1Swoz4IsLP641yBWpcapGF5ym/oZhAnoqatysY+AA71iRQhIYX0wX44naMH9NW4r5zEHDn6LdPX9SKV+qBvDIaRxO8Z1KYc4VLbeAl4RtueKhg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=26piqYeeHA13dCbAVLqGPU72pC24X9EHsyFRkhKeSFU=; b=FY0HnQnfRlsXOBv6DJZdsCkenYkU6lUNbj4W2kcVxBGI/U1fgCtEskGexVoqRuZmi8Ejj77V5dL+0S3RO7Mj26Bdbdq0wMhDWVGekkMs559A2CQs0Uk8oz7s0m4K2z1g7BkIta41Ff8sC5Ql/EYbVMs1Kjg4g4FWp0WUQzTojo0Lq9oHRIUd0N587LFb2zaPC4pHlnZd+S9Ev0jLf4CT44py0B4a1MmSsX91EzXWo54lkaIZanHAnXUgpr1AC1OXuwY7HQEQpndfV3jMTGUu+O9dTkYSQK469o5d4jrPEi8qD1WC4+w4WC6Tr2g9NQidvLlLv+VQqMJCIfATAPHTWg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=26piqYeeHA13dCbAVLqGPU72pC24X9EHsyFRkhKeSFU=; b=r8y/Xy8yrwvva75cbiRz+SwXSS4cIXwfK8HcRruNxFBIY6XEoKpWy8PUskafyvHwh/q78X4fuuBEclwSGAKsx5Rgn6sC4SmOCkciVrGzfP9DIXm4b42w249Ijdllyq6UOV1Mc5EgTtttED3xvBD4hmW0FOFT1tqF9EADIqLHn6c=
Received: from CO1PR13MB4920.namprd13.prod.outlook.com (2603:10b6:303:f7::17) by BY5PR13MB4453.namprd13.prod.outlook.com (2603:10b6:a03:1d1::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.26; Fri, 14 Jun 2024 17:22:58 +0000
Received: from CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::4021:909f:bb6c:72a6]) by CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::4021:909f:bb6c:72a6%5]) with mapi id 15.20.7677.024; Fri, 14 Jun 2024 17:22:58 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: "Ali Sajassi (sajassi)" <sajassi@cisco.com>
Thread-Topic: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn
Thread-Index: Adqf5r0n8EGG1Zz4QQiJzOIx39malQYr7WGgARS7ZhAAOyWeAgApNDFQ
Date: Fri, 14 Jun 2024 17:22:58 +0000
Message-ID: <CO1PR13MB49206AB2A6FF0D16F1CD0EA385C22@CO1PR13MB4920.namprd13.prod.outlook.com>
References: <CO1PR13MB4920ED1F49CFE4D3F16A6772851C2@CO1PR13MB4920.namprd13.prod.outlook.com> <SJ0PR11MB577031DA2A534F38CEDB1223B0FB2@SJ0PR11MB5770.namprd11.prod.outlook.com> <CO1PR13MB4920D561843D0205DA9DB82885C02@CO1PR13MB4920.namprd13.prod.outlook.com> <SJ0PR11MB57701B11640D357D21D4677DB0C12@SJ0PR11MB5770.namprd11.prod.outlook.com>
In-Reply-To: <SJ0PR11MB57701B11640D357D21D4677DB0C12@SJ0PR11MB5770.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR13MB4920:EE_|BY5PR13MB4453:EE_
x-ms-office365-filtering-correlation-id: c4879be8-3850-40a2-6c05-08dc8c96a29f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230037|1800799021|366013|376011|38070700015;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR13MB4920.namprd13.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230037)(1800799021)(366013)(376011)(38070700015);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR13MB49206AB2A6FF0D16F1CD0EA385C22CO1PR13MB4920namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR13MB4920.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c4879be8-3850-40a2-6c05-08dc8c96a29f
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jun 2024 17:22:58.0889 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dhGsKRU+KwZtHF3txTHcgVtG/hafIKmJnnUsLfxA/8QiS2x+TWQPHbGmT++zB4UqdcebsHDlUe3dGEWm54EQbA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR13MB4453
Message-ID-Hash: I4HGXMGI42HESFCHUMHJXSA7SNLDJNHQ
X-Message-ID-Hash: I4HGXMGI42HESFCHUMHJXSA7SNLDJNHQ
X-MailFrom: linda.dunbar@futurewei.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "bess@ietf.org" <bess@ietf.org>, "draft-ietf-bess-secure-evpn@ietf.org" <draft-ietf-bess-secure-evpn@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [bess] Re: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/5Eg1HoVoMxr_WWkaWFOHoJemSGM>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>

Ali,

Since the Network Service Provider managed SRv6 domain is often considered a trusted and secure environment, as detailed in RFC 8754, RFC 8402, and RFC 8986, exposing the VPN-ID or Service-ID as part of the Segment Routing Header (SRH) outside the ESP header is generally less of a concern. Additionally, because the VPN-ID or Service-ID is added and managed by the NSP, it is desirable for these identifiers to be visible to intermediate nodes.

The primary requirement is to encrypt user data flows that carry sensitive or confidential information, rather than the headers managed by the network service provider.

Therefore, for both Case 1) & 2) you listed (VPN-ID being either in the SRH or not), the SRH needs to be outside the ESP header.  i.e., both can be covered by the ESP-Transport tunnel type which is already specified by your draft.

Your current Section 9.1 (Standard ESP Encapsulation) emphasizes on encrypting NVO packets only. Therefore, it is necessary to revise the text in  Section 9 to accommodate the standard ESP Transport for SRv6 packets with SIDs outside the ESP header.

Thank you,

Linda

From: Ali Sajassi (sajassi) <sajassi@cisco.com>
Sent: Thursday, June 13, 2024 2:26 PM
To: Linda Dunbar <linda.dunbar@futurewei.com>
Cc: bess@ietf.org; draft-ietf-bess-secure-evpn@ietf.org
Subject: Re: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn

Linda,

There are two scenarios to consider with SRv6 IPsec encapsulation:


  1.  VPN-ID/Service-ID is not part of the SRH
  2.  VPN-ID/Service-ID is part of the SRH


  1.  is already covered in the document and I don’t believe we need to do much except adding a sentence or two mentioning that IPv6 EH can be SRH.
  2.  Implies that VPN-ID/Service-ID is carried in the open and this compromises security aspects. So far, if you look at MACsec or IPsec, VPN-ID/Service-ID has always been encrypted with ESP; however, now you are talking about deviating from the prior practices. Because secure-evpn draft is a WG document, we cannot add (2) without WG consensus. So, it would be good to bring up this issue up in BESS and IPSECME and solicit input on this point ONLY.
Cheers,
Ali

From: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Date: Wednesday, June 12, 2024 at 10:39 AM
To: Ali Sajassi (sajassi) <sajassi@cisco.com<mailto:sajassi@cisco.com>>
Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>, draft-ietf-bess-secure-evpn@ietf.org<mailto:draft-ietf-bess-secure-evpn@ietf.org> <draft-ietf-bess-secure-evpn@ietf.org<mailto:draft-ietf-bess-secure-evpn@ietf.org>>
Subject: RE: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn
Ali,

Section 9 needs change to accommodate the standard ESP Transport for SRv6 packets with SIDs outside the ESP header. Your current Section 9.1 (Standard ESP Encapsulation) emphasizes on encrypting NVO packets only.

Suggest adding a new subsection 9.3 (Standard ESP Encapsulation for SRv6). Here is the suggested wording for 9.3.
---------------------
9.3. Standard ESP Transport Encryption for SRv6 Packets
In scenarios where traffic needs to be securely steered through an SRv6 domain, ESP transport encryption can be applied to SRv6 packets with SIDs outside the ESP header. This allows the packet to benefit from the security provided by ESP while leveraging the routing capabilities of SRv6.

Example of ESP Transport Encryption for SRv6 Packets:
Consider an SRv6 packet with three SIDs where the original transport layer packet (e.g., UDP) is encrypted by ESP. The SIDs remain outside the ESP header, allowing intermediate nodes to route the packet based on the SIDs.

Below is the detailed structure of such a packet:

+--------------------+
| IPv6 Base Header   |
| Version = 6        |
| Next Header = 43   | <- Indicates Routing Header (RH)
| Source Address     |
| Destination Address|
+--------------------+
| Routing Header     | <- Segment Routing Header (SRH)
| Next Header = 50   | <- Indicates ESP header after SRH
| +-----------------+
| | Segment Left = 3|
| | Last Entry      |
| | SID 1           |
| +-----------------+
| | Segment Left = 2|
| | SID 2           |
| +-----------------+
| | Segment Left = 1|
| | SID 3           |
| | Next Header = 17| <- Indicates UDP
| +-----------------+
+--------------------+
| ESP Header         |
| SPI                |
| Sequence Number    |
| Initialization Vec |
+--------------------+
| Encrypted Payload  |
| (Original IPv6 Hdr)|
| (UDP Header)       |
| (UDP Data)         |
+--------------------+
| ESP Trailer        |
| (Padding, Pad Len, |
|  Next Header = 17) | <- Original payload was UDP
+--------------------+
| ESP Authentication |
| (ICV, optional)    |
+--------------------+
---------------------

Alternatively, you can modify the wording of Section 9.1. to include SRv6 and NVO payload as below:

9.1. Standard ESP Encapsulation
When standard IP Encapsulating Security Payload (ESP) is used (without outer UDP header) for encryption of IP packets, including NVO packets as well as SRv6 packets with Segment Identifiers (SIDs) outside the ESP header, it is used in transport mode as depicted below.

(Give the SRv6 example above).

Thank you,

Linda

From: Ali Sajassi (sajassi) <sajassi@cisco.com<mailto:sajassi@cisco.com>>
Sent: Thursday, June 6, 2024 9:53 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Cc: bess@ietf.org<mailto:bess@ietf.org>; draft-ietf-bess-secure-evpn@ietf.org<mailto:draft-ietf-bess-secure-evpn@ietf.org>
Subject: Re: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn

Hi Linda,

I don’t think we need to put too much explanation wrt SRv6 because with respect to IPsec, it is just a IPv6 encapsulation. So, let me expand on it with respect to your four points below:

  1.  Scenario description: The rational and the reasons for needing IPsec are basically the same whether it is for regular IPv6 or SRv6. So, such text is already covered in the draft.
  2.  Implementation Strategy: with respect to flow identification, policy configuration, etc. The draft already covers that and indicates different level of granularity (all the way at the flow level) for doing IPsec encap.
  3.  Security considerations and benefits: This is again applies to both IPv6+ VxLAN and SRv6. So, if we need to beef up some existing texts, we can do it.

So, I can add a sentence or two to sections 9.1 and 9.2 mentioning that IPv6 can carry an extension header including SRv6.

Cheers,
Ali

From: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Date: Monday, May 6, 2024 at 12:40 PM
To: Ali Sajassi (sajassi) <sajassi@cisco.com<mailto:sajassi@cisco.com>>
Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>, draft-ietf-bess-secure-evpn@ietf.org<mailto:draft-ietf-bess-secure-evpn@ietf.org> <draft-ietf-bess-secure-evpn@ietf.org<mailto:draft-ietf-bess-secure-evpn@ietf.org>>
Subject: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn
Ali,

I am writing to follow up on our discussion during the IETF 119 BESS WG session regarding the draft-wang-bess-secservice. As you may recall, you endorsed Option 1 as the preferable approach for using SECURE-EVPN mechanism to encrypt selective SRv6 Flows into the Secure EVPN framework.
Option 1: Merge with Secure EVPN, directly incorporating the section into the main body of the document.
Additionally, consider adding a description of the necessary encapsulation methods in Section 9 and extending the discussion of new tunnel types in Section 10 to accommodate this feature.

Proposed Integration: I suggest adding a new subsection, "Encrypting Selective SRv6 Flows," to Section 3 of the Secure EVPN draft. This addition would detail the use case and requirements for selectively applying IPsec encryption to SRv6 data flows within NSP-managed networks, addressing the need for heightened security measures for sensitive data.

The proposed content for the subsection "Encrypting Selective SRv6 Flows" would include:

Scenario Description: Highlighting environments where SRv6 is deployed and the types of data flows that require enhanced security measures.
Implementation Strategy: Outlining the steps for implementing IPsec encryption, including flow identification, policy configuration, and the encryption mechanism itself.
Security Considerations: Discussing the added complexity and necessary management adjustments to maintain performance and security.
Benefits: Explaining how this approach secures sensitive information and ensures compliance with various regulatory requirements.

Here is the wording proposal. You can modify them to fit the SECURE-EVPN style.

3.6 Encrypting Selective SRv6 Flows
While a Network Service Provider (NSP) managed SRv6 domain is often considered a trusted and secure domain as detailed in RFC 8754, RFC 8402, and RFC 8986, certain scenarios require an enhanced security model. Particularly in cases where data flows carry sensitive or confidential information, there is a compelling need for additional security measures. Encrypting selective SRv6 flows caters to this need by providing robust protection even within a network environment presumed to be secure.

Scenario Description
In environments where SRv6 is deployed, data flows might include transactions requiring confidentiality, integrity, and authenticity assurances that exceed standard network security measures. Examples include financial transactions, personal data transmissions subject to privacy regulations, or corporate communications involving sensitive strategic content. In such cases, selectively encrypting specific SRv6 flows ensures that even if network breaches occur, the encrypted data remains secure.

Implementation Strategy
The implementation of IPsec for encrypting selective SRv6 flows involves the following steps:
Flow Identification: Define criteria for selecting which SRv6 flows require encryption. This could be based on the type of data, the source/destination of the flows, or preconfigured security policies.
Policy Configuration: Configure security policies that dictate the parameters for encryption, such as the algorithms used, the keys to be employed, and the duration of key validity. These policies are applied specifically to the identified SRv6 flows that require encryption.
Encryption Mechanism: Utilize IPsec in transport mode to encrypt the payload of identified SRv6 packets. The SRH (Segment Routing Header) remains unencrypted to allow for the routing of the packet, while the payload is encrypted, ensuring the confidentiality and integrity of the data.

Security Considerations
Encrypting selective SRv6 flows introduces additional complexity into the network management. It requires careful coordination between network security policies and the dynamic requirements of SRv6 routing. Additionally, the overhead introduced by encryption needs to be evaluated to ensure that it does not impact the network performance adversely. Effective monitoring and management are crucial to detect and respond to security incidents in a timely manner.

Benefits
This approach enhances data security by protecting sensitive information from potential eavesdropping and tampering. It also provides compliance with various regulatory requirements for data protection, offering an added layer of security without encrypting all network traffic, which can be resource intensive.
________________________________
This addition will fit seamlessly into your existing document structure under Section 3, providing a detailed examination of how IPsec can be used to enhance the security of selective SRv6 flows in a network environment managed by NSPs.



I look forward to your feedback on this proposal and am eager to assist in any drafting or revisions needed to facilitate this integration. Once we align on the approach, I will provide detailed text for adding a subsection in section 9 to describe encapsulation and adding extension of new tunnel type in section 10.

Thank you for considering this enhancement. I believe it will make a substantial contribution to the deployment and effectiveness of SECURE-EVPN by addressing critical security needs in SRv6 networks.

Linda