Re: [Detnet] Roman Danyliw's Discuss on draft-ietf-detnet-ip-06: (with DISCUSS and COMMENT)

Roman Danyliw <rdd@cert.org> Thu, 25 June 2020 14:11 UTC

Return-Path: <rdd@cert.org>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A91743A0B87; Thu, 25 Jun 2020 07:11:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yUDV3xiZVp16; Thu, 25 Jun 2020 07:11:27 -0700 (PDT)
Received: from taper.sei.cmu.edu (taper.sei.cmu.edu [147.72.252.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F03B93A0B85; Thu, 25 Jun 2020 07:11:26 -0700 (PDT)
Received: from korb.sei.cmu.edu (korb.sei.cmu.edu [10.64.21.30]) by taper.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id 05PEBOEw010445; Thu, 25 Jun 2020 10:11:24 -0400
DKIM-Filter: OpenDKIM Filter v2.11.0 taper.sei.cmu.edu 05PEBOEw010445
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1593094284; bh=wRt5dod2EthLp96wBcBYuuktXgQYMNywV6WkPGzy6AE=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=EHD9MXp4PKZ+0QY8T0WXzLnm3spRHRe6y3w+FCECxbmBu0Vlrk+Yid7qZierqZ0gU 1sdu4Tu4Gh4IQbXuzo3MLjHOirDaV322SsJPj10eUaPaCftftgRRDXaScR26qkGEt+ Zz+mZpQhDQrbIAXo1KzznBOBmypS4ek1CA8/PmZ0=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by korb.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id 05PEBKHB014126; Thu, 25 Jun 2020 10:11:20 -0400
Received: from MORRIS.ad.sei.cmu.edu (147.72.252.46) by CASSINA.ad.sei.cmu.edu (10.64.28.249) with Microsoft SMTP Server (TLS) id 14.3.487.0; Thu, 25 Jun 2020 10:11:19 -0400
Received: from MORRIS.ad.sei.cmu.edu (147.72.252.46) by MORRIS.ad.sei.cmu.edu (147.72.252.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1979.3; Thu, 25 Jun 2020 10:11:19 -0400
Received: from MORRIS.ad.sei.cmu.edu ([fe80::555b:9498:552e:d1bb]) by MORRIS.ad.sei.cmu.edu ([fe80::555b:9498:552e:d1bb%13]) with mapi id 15.01.1979.003; Thu, 25 Jun 2020 10:11:19 -0400
From: Roman Danyliw <rdd@cert.org>
To: Lou Berger <lberger@labn.net>, The IESG <iesg@ietf.org>
CC: Ethan Grossman <eagros@dolby.com>, "detnet@ietf.org" <detnet@ietf.org>, "draft-ietf-detnet-ip@ietf.org" <draft-ietf-detnet-ip@ietf.org>, "detnet-chairs@ietf.org" <detnet-chairs@ietf.org>
Thread-Topic: Roman Danyliw's Discuss on draft-ietf-detnet-ip-06: (with DISCUSS and COMMENT)
Thread-Index: AQHWSMYrof6Ey13blUOWVInshJHylKjpmiMA///Cc5A=
Date: Thu, 25 Jun 2020 14:11:18 +0000
Message-ID: <721c6cdc3fa544349a650ca49208dbbb@cert.org>
References: <159285187260.32738.2496766777836008651@ietfa.amsl.com> <ee4d8560-f765-3914-26ef-f9d494ae13f9@labn.net>
In-Reply-To: <ee4d8560-f765-3914-26ef-f9d494ae13f9@labn.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.64.201.72]
Content-Type: multipart/alternative; boundary="_000_721c6cdc3fa544349a650ca49208dbbbcertorg_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/45GfmSeqkjFq3wYV2v5WL1Z8rHA>
Subject: Re: [Detnet] Roman Danyliw's Discuss on draft-ietf-detnet-ip-06: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jun 2020 14:11:30 -0000

Hi Lou!

Thanks for the quick response with the edits and clarifications.  In that spirit and resolving blocking things before the telechat -- the proposed edits addresses my DISCUSSes; consider all of the COMMENTs but the last resolved (give me a chance to put fingers to keyboard).

Roman

From: iesg <iesg-bounces@ietf.org> On Behalf Of Lou Berger
Sent: Thursday, June 25, 2020 9:27 AM
To: Roman Danyliw <rdd@cert.org>; The IESG <iesg@ietf.org>
Cc: Ethan Grossman <eagros@dolby.com>; detnet@ietf.org; draft-ietf-detnet-ip@ietf.org; detnet-chairs@ietf.org
Subject: Re: Roman Danyliw's Discuss on draft-ietf-detnet-ip-06: (with DISCUSS and COMMENT)


Hi,

Thank you for the comments/discuss.  Please see responses (as co-author) in line below


On 6/22/2020 2:51 PM, Roman Danyliw via Datatracker wrote:

Roman Danyliw has entered the following ballot position for

draft-ietf-detnet-ip-06: Discuss



When responding, please keep the subject line intact and reply to all

email addresses included in the To and CC lines. (Feel free to cut this

introductory paragraph, however.)





Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html

for more information about IESG DISCUSS and COMMENT positions.





The document, along with other ballot positions, can be found here:

https://datatracker.ietf.org/doc/draft-ietf-detnet-ip/







----------------------------------------------------------------------

DISCUSS:

----------------------------------------------------------------------



A few easy clarifications:



** Section 7.  Per “From a data plane perspective this document does not add or

modify any header information”, this statement, which is also found in Section

9.1 of draft-ietf-detnet-security-10 does not seem consistent with Section 3

which states “… however modification of these fields is allowed, for example

changing the DSCP value, when required by the DetNet service”.
This is actually a mistake.  DetNet does not modify standard DSCP remarking.  I just addressed this as part of addressing Murry's comments.  The text should read:

   Non-DetNet and DetNet IP packets are identical on the wire.
   Generally the fields used in flow identification are forwarded
   unmodified.  However, standard modification of the DSCP field
   [RFC2474] is not precluded.







** Section 7.  RFC8655 reminds us that “Security considerations for DetNet are

constrained (compared to, for example, the open Internet) because DetNet is

defined to operate only within a single administrative domain”.  However, the

only IP-specific guidance on preventing escape from the DetNet domain is in

Section 4.2 (“Note that not mixing DetNet and non-DetNet traffic within a

single 5-tuple,  as described above, enables simpler 5-tuple filters to be used

(or re-used) at the edges of a DetNet network to prevent

non-congestion-responsive DetNet traffic from escaping the DetNet domain.”).

Please provide more prescriptive guidance in this section.
How about adding the following to section 6.

The DetNet controller plane MUST ensure that non-congestion-responsive DetNet traffic is not forwarded outside a DetNet domain.







** Section 7.  The guidance from RFC8655 and draft-ietf-detnet-security needs

to be deconflicted relative to confidentiality.  The following assertions are

stated in a single paragraph:



(a) The primary considerations for the data plane is to maintain

   integrity of data and delivery of the associated DetNet service

   traversing the DetNet network.



(b) Application flows can be protected

   through whatever means is provided by the underlying technology.  For

   example, encryption may be used, such as that provided by IPSec

   [RFC4301] for IP flows and/or by an underlying sub-net using MACSec

   [IEEE802.1AE-2018] for IP over Ethernet (Layer-2) flows.



(a) appears to be a cut-and-paste (or maybe vice versa) from Section 9 of

draft-ietf-detnet-security-10



(b) appears to be a cut-and-paste from Section 5 of RFC8655.



The concatenation of (a) + (b) appears to be unique to this document.



When RFC8655 states (b), it prefaced with “[t]o maintain confidentiality of

data traversing the DetNet, application flows can be protected through whatever

means is provided by the underlying technology.”  (a) makes no references to

confidentiality.  It seems like it should.
Sure, added.








----------------------------------------------------------------------

COMMENT:

----------------------------------------------------------------------



Thanks for responding to the SECDIR review (and thank you Tero for doing it).



** Section 3.  I wasn’t able to follow how the reference architectures (Figure

1 and 2) in this section had bearing on the normative behavior in Section 5 and

6.
Figures 1 and 2 provide overall context for the node specific behavior defined in 5 and 6.






** Section 3. Editorial.  As a reader, I would have benefited from a forward

reference to Section 5 somewhere in this section.  As I was reading this text,

I kept looking for specify in exactly which fields go into the tuple and under

what circumstances.
sure.




** Section 3.  Per “Same can be valid for flow aggregates”, I didn’t follow

what this meant.  Did you mean, “The same can be true for flow aggregates”,

editorially? But I’m still not sure what a “flow aggregates” is in this case.

This has been fixed per my previous mail.





** Section 3.  Per “… however modification of these fields is allowed, for

example changing the DSCP value, when required by the DetNet service”, is the

DSCP the only field that is permitted to be modified?  Perhaps I missed it, but

I didn’t see this behavior covered in the subsequent guidance (i.e., outside of

this overview) -- see related DISCUSS above.

per above, detnet does not preclude standard remarking, i.,e., it allows for it.



** Section 4.  Per “This section provides informative considerations …”, is

that the same thing as saying this entire section is not normative?  If so, I

was surprised by the use of RFC2119 language in this section.
"informative" should have been removed when the 2119 language was added.  I have removed it.




** Section 4.2.  Per “Note that not mixing DetNet and non-DetNet traffic within

a single 5-tuple”, how does one do flow identification if such mixing is done?

This is a requirement on the application.  It's the only one that could identify the different traffic types when such mixing occurs.







** Section 4.3.1.  Is there a pointer that can be provided to explain how

DetNet nodes are to “ensure that the CoS service classes do not impact the

congestion protection and latency control mechanisms used to provide DetNet

QoS?”

This is a tough one as the IETF has generally avoided defining internal behavior (unlike some other SDOs).  Section 5.3 does provide some additional information.





** Section 5.1.2.2.  Per “DetNet flow identification for ICMP is achieved based

on the protocol’s header”, I recommend being precise by explicitly saying which

protocol header field and which value (just as was done in for TCP, UDP and

IPSec.).

In the current definition, it's just the protocol number:

s/protocol's header/protocol number in the IP header.



** Section 7.  It wasn’t clear to me which security consideration mentioned

here were specific to a DetNet data plane when IP is used for the forwarding

sub-layer.  I have no issues restating key considerations, but this write-up

was generic.

I'm not sure what else to add here.  If you have suggestion, we're more than open to them.

Changes covered here can be previewed at:

https://github.com/detnet-wg/data-plane-drafts/tree/working/lb/iesg-0625



https://xml2rfc.tools.ietf.org/cgi-bin/xml2rfc.cgi?url=https://raw.githubusercontent.com/detnet-wg/data-plane-drafts/working/lb/iesg-0625/ip/draft-ietf-detnet-ip.xml



Thank you!



Lou