Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

Benjamin Kaduk <kaduk@mit.edu> Wed, 20 February 2019 21:21 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70C7C12D4E7; Wed, 20 Feb 2019 13:21:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.701
X-Spam-Level:
X-Spam-Status: No, score=-1.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Iz9rSz9TYWA; Wed, 20 Feb 2019 13:21:11 -0800 (PST)
Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-eopbgr810094.outbound.protection.outlook.com [40.107.81.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8A09128AFB; Wed, 20 Feb 2019 13:21:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W6e2w3mvBg45ZWGVXCzdWMevXTxeDuOQgiCGXwXYqqc=; b=cIp1ERmvhfvNfxdpEcj+yVVexHMDMkvs3+boUmvxX+YBUhAIii+Rcteoif+6H8SgdsWLwPbFG3Dl2ICTMnEYplq3gURweN/csuFEYpF/BZUy94UnmWyq8w9bYxNAkNwfrq/KSjKdngw4aSuv1qPx/zZ2GgHV96IE92ulGlk4Pn8=
Received: from MWHPR01CA0039.prod.exchangelabs.com (2603:10b6:300:101::25) by BYAPR01MB5176.prod.exchangelabs.com (2603:10b6:a03:7f::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1622.19; Wed, 20 Feb 2019 21:21:09 +0000
Received: from CO1NAM03FT029.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e48::205) by MWHPR01CA0039.outlook.office365.com (2603:10b6:300:101::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1643.15 via Frontend Transport; Wed, 20 Feb 2019 21:21:09 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by CO1NAM03FT029.mail.protection.outlook.com (10.152.80.168) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1643.13 via Frontend Transport; Wed, 20 Feb 2019 21:21:09 +0000
Received: from kduck.mit.edu (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x1KLL5ZX000981 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 20 Feb 2019 16:21:07 -0500
Date: Wed, 20 Feb 2019 15:21:05 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Lou Berger <lberger@labn.net>
CC: draft-ietf-detnet-architecture@ietf.org, detnet@ietf.org, The IESG <iesg@ietf.org>, detnet-chairs@ietf.org
Message-ID: <20190220212104.GK69562@kduck.mit.edu>
References: <155063426136.20704.6779201119170972943.idtracker@ietfa.amsl.com> <cb52062a-b4fb-b51a-2dc3-ca7f161c8f89@labn.net> <20190220160743.GD69562@kduck.mit.edu> <36c4ce97-5c4a-89ab-d648-3e7705a6acd3@labn.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <36c4ce97-5c4a-89ab-d648-3e7705a6acd3@labn.net>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(396003)(39860400002)(376002)(136003)(346002)(2980300002)(199004)(189003)(104016004)(7696005)(8676002)(53416004)(336012)(8936002)(86362001)(4326008)(54906003)(186003)(246002)(5660300002)(14444005)(106466001)(126002)(305945005)(426003)(26005)(476003)(956004)(47776003)(11346002)(2906002)(2870700001)(75432002)(53546011)(486006)(23756003)(93886005)(88552002)(76176011)(33656002)(6916009)(478600001)(356004)(229853002)(26826003)(446003)(50466002)(55016002)(36906005)(6246003)(58126008)(786003)(316002)(1076003)(106002)(18370500001); DIR:OUT; SFP:1102; SCL:1; SRVR:BYAPR01MB5176; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; A:1; MX:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 355cca06-4a29-4aa6-5e22-08d697795551
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600110)(711020)(4605104)(4608103)(4709054)(2017052603328)(7153060); SRVR:BYAPR01MB5176;
X-MS-TrafficTypeDiagnostic: BYAPR01MB5176:
X-Microsoft-Exchange-Diagnostics: 1; BYAPR01MB5176; 20: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
X-Microsoft-Antispam-PRVS: <BYAPR01MB5176A078A75C86A72BC175F5A07D0@BYAPR01MB5176.prod.exchangelabs.com>
X-Forefront-PRVS: 0954EE4910
X-Microsoft-Exchange-Diagnostics: 1; BYAPR01MB5176; 23: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
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: 1S0qnrYU7bRABxvdV9eLOPzM6L7vZ3ZIYBHqKLj35Fd2TVVnbOWmXZWNFSE7ivKHMmK1Dlpck1d0qnNd0Q8Ig+WJjUq+Jnk5u3ZNzka8nH17926X4z3waqIUWq6y9jmilJeLZ+d7ipn7Ru7WuLEHGXgYZTcJ97Q3QeBqWBHKdwD5VFciiGEB88u/Zoo7VhdhJc90SFaH740lJHXyqUFNxhkqzGqeVKgFZWiX368jTN7tceY+eML1RAcrD9YJlTWM9Y3a/hN38Rtk5XDqfySHi01YQpUwhfuA4fy8zzvEwUzrz8/oRsEuluhwGjGBahLdzHKzr35nCT9+AKNTGxRINlSex3XETZ5hA67f4JwPbO/DP8e97Nk8kgHsbQrXUtcP0a1OgU/s1L8h3npMZJUMGhMseHrgyPjyWuiDmcJFco0=
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Feb 2019 21:21:09.3593 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 355cca06-4a29-4aa6-5e22-08d697795551
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11]; Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR01MB5176
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/V9szkT2eYndfdh7gG-CuBTRp-uU>
Subject: Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2019 21:21:14 -0000

Hi Lou,

On Wed, Feb 20, 2019 at 11:34:11AM -0500, Lou Berger wrote:
> On 2/20/2019 11:07 AM, Benjamin Kaduk wrote:
> > On Wed, Feb 20, 2019 at 09:33:34AM -0500, Lou Berger wrote:
> >> On 2/19/2019 10:44 PM, Benjamin Kaduk wrote:
> >>> I note that the DETNET WG is explicitly chartered with a work item for the
> >>> "overall architecture: This work encompasses ... and security aspects".
> >>> It seems incomplete to specify an architecture for a topic such as
> >>> deterministic networking without specifically considering what threats are
> >>> and are not in scope to be protected against.
> >> The working group certainly recognizes that security is an important
> >> topic and necessary part of the work. The WG's  approach to ensure that
> >> this significant topic is sufficiently covered is to have a  document
> >> dedicated to the topic.  As you note below this work,
> >> draft-ietf-detnet-security, is not at the same level maturity - so
> >> please stay tuned.  Of course, the WG would welcome any input on this
> >> security draft now or even a full early-review or security area advisor.
> > I do appreciate that the WG has taken the time to work on a dedicated
> > security document, that goes through the (tedious!) effort to tabulate the
> > various known attacker capabilities, threats, and their interactions.
> >
> > What I think is missing from the high-level architecture document is a
> > sense for what security goals the architecture intends to achieve.  It's
> > fine to have this be separate from the nitty-gritty stuff in the separate
> > document, but these high-level questions can have an impact on the
> > high-level design of the protocol ecosystem as a whole.  We have mounds of
> > examples of "come up with a design; bolt security on as an afterthought"
> > working poorly or being nigh-impossible, and I haven't seen any attempt at
> > justification for why doing so here is likely to be any different.
> > Including the security concepts from the start and wholly integrating them
> > into the system tends to produce a much more elegant design and smoother
> > outcomes all around.
> 
> We went back and forth on how much of the security topic to include in 
> the architecture document and settled on the current text of section 5 
> where just high level security requirements are identified.  From your 
> list below, the architecture covers the points you raise (non-detnet 
> traffic impacting detnet traffic, and detnet traffic trying to use more 
> than its allocation) mainly from a service delivery perspective.  It 
> does mention "shaping" as a security concern, the document could expand 
> these if helpful. But I think the real discussion point is how much of 
> the security details should be in the base (vs dedicated) document  -- 
> and that you disagree with where the WG has drawn the line.  Is this 
> correct?

Well, it's not as much that I disagree about where the line is drawn, as
that I disagree with the characterization as "high level security
requirements".

The first paragraph covers topics worth including here, certainly -- an
attacker that can introduce delay can inherently break the DetNet
guarantees, and there is no further defense.  But the text could probably
go further than its current version and explicitly call out that no
technical measures can defend against such delay, other than by
rerouting/avoiding the compromised position.

The second paragraph also covers a topic worth noting, that entropy and
Murphy as as important of risks to consider as active attacks.

The rest of the section/list don't seem to match up with the high-level
view, though -- "protection of the signaling protocol", but protection
against what?  Authentication and authorization are important parts of
security, but authorization is tied to actions and entities, not just
entities in vacuo.  For "identification and shaping of DetNet flows", if
security must cover them, what security properties are needed.  Do we need
to provide integrity protection for the marking, or confidentiality
protection, too?  Does authentication/integrity need to be provided for
in-line or are out-of-band considerations in play?

The rest of the document presents a good high level picture of what pieces
will be involved in a system, and how they fit together.  I'm hoping to see
a high-level picture of what attacks/failures the architecture does and
does not aim to protect against.  It's somewhat implied that we need to
protect against the failure of any single node or link (except at the
boundary) due to random faults; explicitly saying this would be a perfect
hting to include in the security considerations here!  Once we get beyond
entropy as an attack, into more active attack scenarios, though, we need to
consider what capabilities an attacker might have.  Do we protect against
an entity with the ability to inject various forms of traffic?  Modify or
drop valid traffic?  Are there any (classes of) credentials that we assume
must be securely held, or will we attempt to protect against attackers that
have some privilege within the system?  (Note that misbehaving hardware can
sometimes present as similar or identical to such an attacker.)

Does this give a better picture of what I'm thinking of as "high-level
security requirements"?  I don't necessarily need details of specific
hardware or credentials at play, and certainly not for the solutions, but I
want to have a clear picture of what the scope of future security analysis
will be.  "How will I be able to tell if the actual protocols meet the
security requirements of the architecture?"

-Benjamin