Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

János Farkas <janos.farkas@ericsson.com> Mon, 25 March 2019 16:18 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0061512040B for <detnet@ietfa.amsl.com>; Mon, 25 Mar 2019 09:18:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.302
X-Spam-Level:
X-Spam-Status: No, score=-4.302 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CpqcSShtBnH0 for <detnet@ietfa.amsl.com>; Mon, 25 Mar 2019 09:18:07 -0700 (PDT)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 86DBC120416 for <detnet@ietf.org>; Mon, 25 Mar 2019 09:18:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/relaxed; q=dns/txt; i=@ericsson.com; t=1553530680; x=1556122680; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=O0USSjkqhCVIKqRzXME3XTqZdSfWoupJYXaIIgcWX/o=; b=T1Fa3FG15YIl8IHEyse0rqZ9L8uHlBkaOUjUKTCjbia9L7qzXkOxWiCN9SEFStf5 Va5OZbSCPnr2vF4YG6bp6Umytt29jfkx5tWHOyYPRlSMUgtaDFcd3IM72Wrgq1Op TXTzgzsLW7JfVEXWyEtj9kgxR6D1oBZA7Cv1cv1hSE4=;
X-AuditID: c1b4fb30-307ff70000007fec-4d-5c98ff38e6fe
Received: from ESESSMB503.ericsson.se (Unknown_Domain [153.88.183.121]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 9A.96.32748.83FF89C5; Mon, 25 Mar 2019 17:18:00 +0100 (CET)
Received: from ESESBMR505.ericsson.se (153.88.183.201) by ESESSMB503.ericsson.se (153.88.183.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Mon, 25 Mar 2019 17:18:00 +0100
Received: from ESESBMB501.ericsson.se (153.88.183.168) by ESESBMR505.ericsson.se (153.88.183.201) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Mon, 25 Mar 2019 17:17:59 +0100
Received: from [100.94.53.247] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.184) with Microsoft SMTP Server id 15.1.1713.5 via Frontend Transport; Mon, 25 Mar 2019 17:17:59 +0100
To: Benjamin Kaduk <kaduk@mit.edu>
CC: Lou Berger <lberger@labn.net>, draft-ietf-detnet-architecture@ietf.org, detnet@ietf.org, The IESG <iesg@ietf.org>, "detnet-chairs@ietf.org" <detnet-chairs@ietf.org>
References: <155063426136.20704.6779201119170972943.idtracker@ietfa.amsl.com> <cb52062a-b4fb-b51a-2dc3-ca7f161c8f89@labn.net> <20190220160743.GD69562@kduck.mit.edu> <36c4ce97-5c4a-89ab-d648-3e7705a6acd3@labn.net> <20190220212104.GK69562@kduck.mit.edu> <30e27625-da32-7e67-6e3a-a923830b9e5c@labn.net> <e8b22823-fe37-4f6f-e7e3-d597ca29f882@ericsson.com> <20190304032524.GM53396@kduck.mit.edu> <aa104257-0c1d-44d8-b3c2-3aa5212fd08c@ericsson.com>
From: János Farkas <janos.farkas@ericsson.com>
Message-ID: <7346abb6-c4bf-4d15-c438-9bfc438e81a8@ericsson.com>
Date: Mon, 25 Mar 2019 17:17:59 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <aa104257-0c1d-44d8-b3c2-3aa5212fd08c@ericsson.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrPLMWRmVeSWpSXmKPExsUyM2J7pa7F/xkxBhvOc1hc6//BYvH702wW iw/fZrJYzPgzkdli+caZTBYdzW9ZHNg8liz5yeTxYVMzm0fTmaPMAcxRXDYpqTmZZalF+nYJ XBm3/n5iKlhXUrHnSj9LA+OUuC5GTg4JAROJnRteMYPYQgJHGCXeLDbrYuQCsr8xSkz5N4UZ zrl/fgc7hANUtfHEF1aQFmGBQokLC6cygtgiAkoSi8+2sIHYzAIbgNp/qEA0nGKWuLerCyzB JmAvcffSBqCxHBy8QPaEaVwgYRYBVYl3e26AzREViJX4dGUx2Em8AoISJ2c+YQGxOQUcJDZO u8UEMd9CYub884wQtrxE89bZzBC2uMStJ/OZIN5Rk3jfcIdxAqPwLCSjZiFpn4WkfRaS9gWM LKsYRYtTi5Ny042M9FKLMpOLi/Pz9PJSSzYxAqPl4JbfBjsYXz53PMQowMGoxMN74MOMGCHW xLLiytxDjBIczEoivE9EgUK8KYmVValF+fFFpTmpxYcYpTlYlMR5/wgJxggJpCeWpGanphak FsFkmTg4pRoYXa991bDUuq8e9GfS+q50nhj3W2/rFdoOvNnbcoK1n0/eeU14emSgXrT117TZ tzmy2RJdXJb3mM5/eWZrsntA+Jm1V3k7lpkY/NapfhuuoTA3P07f7MSFDU2nHjExNAt8SDCd ISVUtthkutnkRdNupXxOOeg8a/Lf40orzwtpl2Q/fzzvyhIzJZbijERDLeai4kQAS9maJ5IC AAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/HKhSS7Tc2yxQjOLYPCT3NUCnwNk>
Subject: Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Mar 2019 16:18:10 -0000

Hi Benjamin,

We believe that we have addressed your comments in the most recent 
revision: https://tools.ietf.org/html/draft-ietf-detnet-architecture-12. 
(https://mailarchive.ietf.org/arch/msg/detnet/utVL9ZVGcOeGtRIASRFx5WT_ErM)

Please let us know what else you would like to see done before you clear 
your DISCUSS.

I/we would be happy to meet with you this week if there is anything you 
would like to discuss.

Regards,
Janos


On 3/5/2019 10:40 PM, János Farkas wrote:
> Hi Benjamin,
>
> I'm glad that we are progressing. :-)
> Thank you!
>
> Please see in-line.
>
> On 3/4/2019 4:25 AM, Benjamin Kaduk wrote:
>> Hi János,
>>
>> Thanks for the new text.  These are some great things to be thinking 
>> about,
>> but I'm a little worried that it's just specifying mechanism without
>> describing the motiviations; in fact, it may even be more detailed 
>> than we
>> need for this document.  More inline...
>>
>> On Sat, Mar 02, 2019 at 07:22:15PM +0100, János Farkas wrote:
>>> Hi Benjamin,
>>>
>>> Thank you for your review!
>>>
>>> Focusing on the main point now: Section 5 Security Considerations. We
>>> could consolidate the section to address your comment. Would it be
>>> helpful to replace the section with the following text?:
>>>
>>>
>>> Security considerations for DetNet are described in detail in
>>> [I-D.ietf-detnet-security]. This section considers exclusively security
>>> considerations which are specific to the DetNet Architecture.
>>>
>>> Security aspects which are unique to DetNet are those whose aim is to
>>> secure the specific quality of service aspects of DetNet, which are
>>> primarily to deliver data flows with extremely low packet loss rates 
>>> and
>>> bounded end-to-end delivery latency. A DetNet is implemented using MPLS
>>> and IP (including both v4 and v6) technologies, and thus inherits the
>>> security properties of those technologies at both the control plane and
>>> the data plane.
>>>
>>> Security considerations for DetNet are constrained (compared to, for
>>> example, the open Internet) because DetNet is defined to operate only
>>> within a single administrative domain (see Section 1).  The primary
>>> considerations are to secure the request and control of DetNet
>>> resources, maintain confidentiality of data traversing the DetNet, and
>>> provide uninterrupted availability of the DetNet quality of service.
>> "secure" (verb) can mean many different things in different 
>> contexts.  So
>> when we want to "secure" the request and control of resources, that 
>> would
>> presumably be something like denying unauthorized entities the 
>> ability to
>> use the resources, and probably also to limit the consumption of any
>> given entity.  This probably also means that the ability of resources
>> external to DetNet to disrupt the DetNet resources should be limited in
>> some fashion, but the exact details are still unclear to me.
> "secure is not the right word in this sentence. I suggest to replace 
> it with "provide" to get:
>
>           Security aspects which are unique to DetNet are those whose 
> aim is to
>           provide the specific quality of service aspects of DetNet, 
> which are
>           primarily to deliver data flows with extremely low packet 
> loss rates
>           and bounded end-to-end delivery latency.
>
>
>> Similarly, the "uninterrupted availability" is not without 
>> qualifications:
>> an EMP or nuclear blast may not be something in the threat model that we
>> need to defend against.  But if we just say "uninterrupted 
>> availability",
>> the reader has no way to know that.
> "uninterrupted availability" is not a good phrase here, can be 
> confused with zero loss.
> Suggest to replace "uninterrupted availability" with "the" to get:
>
>           Security considerations for DetNet are constrained (compared 
> to, for
>           example, the open Internet) because DetNet is defined to 
> operate only
>           within a single administrative domain (see Section 1). The 
> primary
>           considerations are to secure the request and control of DetNet
>           resources, maintain confidentiality of data traversing the 
> DetNet,
>           and provide the availability of the DetNet quality of service.
>
>>
>> To be clear, I'm not saying that this introductory text has to 
>> change, but
>> if we keep it, the follow-on paragraphs need to provide the
>> motivation/reasoning that is missing here.
>>
>>> To secure the request and control of DetNet resources, authentication
>>> and authorization must be provided for each device connected to a 
>>> DetNet
>>> domain, most importantly to network controller devices. Control of a
>> We require authn/authz because there is/are some risk(s) that we are 
>> trying to
>> protect against.  What is/are that risk?
>
> What we want to prevent is having unauthorized device placed within a 
> DetNet domain, or attached to the DetNet domain; or unauthorized 
> person accessing DetNet domain. This helps preventing some of the 
> attacks, e.g., man-in-the-middle, diverging the routes of DetNet flows.
>
>>
>>> DetNet network may be centralized or distributed (within a single
>>> administrative domain). In the case of centralized control, precedent
>>> for security considerations as defined for ACTN can be found in 
>>> RFC8453,
>>> Section 9. In the case of a distributed control protocols, DetNet
>>> security is expected to be provided by the security properties of the
>>> protocols in use. In any case, the result must be that manipulation of
>>> administratively configurable parameters is limited to authorized 
>>> entities.
>> Deferring on control protocol security is a fine thing to do.
>>
>>> To maintain confidentiality of data traversing the DetNet, application
>>> flows must be protected through whatever means is provided by the
>>> underlying technology. For example, encryption may be used, such as 
>>> that
>>> provided by IPSec for IP (Layer 3) flows and by MACSec for Ethernet
>>> (Layer 2) flows. DetNet flows are identified on a per-flow basis, which
>> (I wouldn't care whether the "For example" sentence is present or 
>> not; we
>> aren't necessarily obligated to provide it.)
> I think the examples are useful to make it clearer what is meant.
>
>>
>>> may provide attackers with additional information about the data flows
>>> (when compared to networks that do not include per-flow 
>>> identification);
>>> this is an inherent property of DetNet which has security implications
>>> which must be considered when determining if DetNet is a suitable
>>> technology for any given use case. Similar consideration may need to be
>>> given to the use of replicated packet flows, which result in increased
>>> surface for Reconnaissance attacks. In any case, the result must be 
>>> that
>>> the confidentiality of the data is maintained to a degree sufficient 
>>> for
>>> the use cases addressed by the given DetNet implementation.
>> I could consider putting this in a new paragraph.  I'd also consider
>> trimming it down: the key point at this level is that detnet provides 
>> a new
>> type of information on packets that can be used by an attacker in the
>> network looking at metadata.  The specific details of that could be 
>> shunted
>> off to the other document with no real harm.
> OK, make it a new paragraph.
>
> A shorter version:
>
> OLD:
>           DetNet flows are identified on a per-flow basis, which may 
> provide
>           attackers with additional information about the data flows 
> (when
>           compared to networks that do not include per-flow 
> identification);
>           this is an inherent property of DetNet which has security
>           implications which must be considered when determining if 
> DetNet is
>           a suitable technology for any given use case. Similar 
> consideration
>           may need to be given to the use of replicated packet flows, 
> which
>           result in increased surface for Reconnaissance attacks. In 
> any case,
>           the result must be that the confidentiality of the data is
>           maintained to a degree sufficient for the use cases 
> addressed by the
>           given DetNet implementation.
>
> NEW:
>           DetNet flows are identified on a per-flow basis, which may 
> provide
>           attackers with additional information about the data flows 
> (when
>           compared to networks that do not include per-flow 
> identification).
>           This is an inherent property of DetNet which has security
>           implications which should be considered when determining if 
> DetNet is
>           a suitable technology for any given use case.
>
>>
>>> To provide uninterrupted availability of the DetNet quality of service,
>>> provisions must be made against DOS attacks and delay attacks. To
>>> protect against DOS attacks, excess traffic due to malicious or
>>> malfunctioning devices must be prevented or mitigated, for example
>>> through the use of traffic admission control applied at the input of a
>>> DetNet domain, as described in Section 3.2.1.1, and through the fault
>>> mitigation methods described in Section 3.3.2.
>> This is getting closer to the sort of thing I was looking for -- we 
>> need to
>> provide availability *in the face of DOS attacks and delay attacks*.  We
>> could probably say more about where the boundary is between "external"
>> entities that could threaten DOS and "internal" entities that we assume
>> behave properly -- is it the boundary of the DetNet domain, or will we
>> consider the risk of misbehaving/compromised equipment in the domain?
>>
>>> To prevent DetNet packets from being delayed, protection must be
>>> provided against Man-In-The-Middle attacks, for example through use of
>>> authentication and authorization of devices within the DetNet domain.
>> (nit: maybe join this into the previous paragraph, since that 
>> paragraph's
>> topic sentence also mentions delay)
> OK to merge it.
>
>> This is also pretty close to what I hoped for: it implies that we 
>> need to
>> keep the traffic inside our trusted elements (by avoiding the MITM), 
>> since
>> the MITM is untrusted and could introduce delay, but the internal 
>> elements
>> are trusted to not delay.  So this could be "prevent DetNet packets from
>> being delayed by external network entities", which implicitly 
>> disclaims an
>> attempt to protect against a compromised DetNet router.
> I like your proposal.
> to make it clear that external is relative to the DetNet domain, I 
> suggest to have:
> "To prevent DetNet packets from being delayed by an entity external to 
> a DetNet domain, "
>
> Got another comment suggesting not to use "protection" here. With that 
> the suggested new text:
>
>                                                                "To 
> prevent DetNet packets from
>           being delayed by an entity external to a DetNet domain, DetNet
>           technology definition must allow for the mitigation of
>           Man-In-The-Middle attacks, for example through use of
>           authentication and authorization of devices within the 
> DetNet domain."
>
>>
>>> Time synchronization methods are not specified by DetNet, however any
>>> time synchronization method used with DetNet must also be secured, 
>>> using
>>> the security methods available for the given time synchronization
>>> mechanism, for example as described in [RFC7384].
>>> In any case, the result must be that the DetNet is protected from DOS,
>>> delay, and time manipulation attacks to the extent sufficient for the
>>> use cases addressed by the given DetNet implementation.
>> I'd consider rephrasing this more like "Because DetNet mechanisms can 
>> make
>> heavy use of methods that require precise time synchronization, the
>> accuracy, availability, and integrity of time synchronization is of
>> critical importance.  Extensive discussion of this topic can be found in
>> [RFC7384]."  We may not need the rest of the details in this document.
> I like your proposal.
>
> I suggest to replace
>
> OLD:
> "Time synchronization methods are not specified by DetNet, however any
> time synchronization method used with DetNet must also be secured, using
> the security methods available for the given time synchronization
> mechanism, for example as described in [RFC7384]."
>
> with:
>
> NEW:
>           Because DetNet mechanisms or applications that rely on 
> DetNet can
>           make heavy use of methods that require precise time 
> synchronization,
>           the accuracy, availability, and integrity of time 
> synchronization is
>           of critical importance. Extensive discussion of this topic 
> can be
>           found in [RFC7384].
>
> That is, I suggest to add "or applications that rely on DetNet" to the 
> text you proposed.
> I suggest to capture that time synchronization can be important to the 
> application running on an end system. There may be cases when a 
> particular DetNet deployment does not rely on time synchronization, 
> but it is still needed for an application.
>
> Based on your proposal delete:
> "          In any case, the result must be that the DetNet is 
> protected from DOS,
>           delay, and time manipulation attacks to the extent 
> sufficient for the
>           use cases addressed by the given DetNet implementation."
>
>
>>
>>> DetNet use cases are known to have widely divergent security
>>> requirements. The intent of this section is to provide a baseline for
>>> security considerations which are common to all DetNet designs and
>>> implementations, without burdening individual designs with specifics of
>>> security infrastructure which may not be germane to the given use case.
>>> Designers and Implementers of DetNet systems are expected to take use
>>> case specific considerations into account in their DetNet designs and
>>> implementations.
>> This is good.
>>
>> -Benjamin
>>
>
> We've got a few more comments. The main one is to remove "must" from 
> the security section because the use of security mechanisms is a 
> deployment choice, not that of the IETF.
>
> A diff is attached to show the changes described above.
>
> Thank you,
> Janos