Re: [Detnet] Alissa Cooper's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

"Black, David" <David.Black@dell.com> Thu, 18 April 2019 16:52 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA07C12036E; Thu, 18 Apr 2019 09:52:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.638
X-Spam-Level:
X-Spam-Status: No, score=-0.638 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, KHOP_DYNAMIC=1.363, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com header.b=npz+LcQZ; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=emc.com header.b=Ip/KykYK
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FfolUXp5Pxed; Thu, 18 Apr 2019 09:52:34 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCAED12036D; Thu, 18 Apr 2019 09:52:28 -0700 (PDT)
Received: from pps.filterd (m0170396.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x3IGq6OB003468; Thu, 18 Apr 2019 12:52:21 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=smtpout1; bh=KTUdqICr6aqKaRIhj7AkEyh1lGth5t6Gegdf3yBcvqI=; b=npz+LcQZxFLKbemELr5vfvJXUxZepeiBwv7z9IcobYVtLJEhWeau6gp29j1Omv3vNk7s SLevdfXCEIQKQgx7vd0rMlGaI+T1yBuE+9Bz0iyD1FbZYuKi6VtmJfj/pdI0N3tZrRNW PpTxrimkxv7By916GBVmek5w+H0G0aGvZQRby9KraMvs3lHoIKmIenG6+U5VrboUNQqV m6HAJdw7DVjxK4tGtYmYcSIQY63o2S0FpCnXPr87E1gW/k0mBKU4Te1EniOGlD3YBhlS 9l+RUeqXCZJER4vOLz1FZ3WhLTorI1HSkOtm94kKITgLpQdxHYKL4W87MjqEBUrJGt5N Zg==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0b-00154904.pphosted.com with ESMTP id 2rwgs1guwh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 18 Apr 2019 12:52:20 -0400
Received: from pps.filterd (m0142693.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x3IGmhm1078805; Thu, 18 Apr 2019 12:52:19 -0400
Received: from mailuogwdur.emc.com (mailuogwdur.emc.com [128.221.224.79]) by mx0a-00154901.pphosted.com with ESMTP id 2rxu7f29j2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 18 Apr 2019 12:52:19 -0400
Received: from maildlpprd55.lss.emc.com (maildlpprd55.lss.emc.com [10.106.48.159]) by mailuogwprd51.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id x3IGqEEb006306 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 18 Apr 2019 12:52:17 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd51.lss.emc.com x3IGqEEb006306
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1555606337; bh=wtluJcU/Ixamqin954h/San6Uc0=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=Ip/KykYKr5wchpflrlC6S7MsxKMLr09bdtX+QyRyyIJIkVOdr9EPv71lK8YCtP79U 7qPV0KDBV9DyvPAarj9KQciTor2WNW7CR+ZjSEeVz/ZwZPrqpMsl/Vb6Ext5SaME0J gS8jrWci28d8kXMRlulXwkMCEUByq64ronwSTLMo=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd51.lss.emc.com x3IGqEEb006306
Received: from mailusrhubprd04.lss.emc.com (mailusrhubprd04.lss.emc.com [10.253.24.22]) by maildlpprd55.lss.emc.com (RSA Interceptor); Thu, 18 Apr 2019 12:52:04 -0400
Received: from MXHUB311.corp.emc.com (MXHUB311.corp.emc.com [10.146.3.89]) by mailusrhubprd04.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id x3IGq3E6011599 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Thu, 18 Apr 2019 12:52:04 -0400
Received: from MX307CL04.corp.emc.com ([fe80::849f:5da2:11b:4385]) by MXHUB311.corp.emc.com ([10.146.3.89]) with mapi id 14.03.0415.000; Thu, 18 Apr 2019 12:52:02 -0400
From: "Black, David" <David.Black@dell.com>
To: Alissa Cooper <alissa@cooperw.in>, János Farkas <janos.farkas@ericsson.com>
CC: "draft-ietf-detnet-architecture@ietf.org" <draft-ietf-detnet-architecture@ietf.org>, "detnet@ietf.org" <detnet@ietf.org>, Lou Berger <lberger@labn.net>, IESG <iesg@ietf.org>, "detnet-chairs@ietf.org" <detnet-chairs@ietf.org>
Thread-Topic: [Detnet] Alissa Cooper's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
Thread-Index: AQHUySxoxYKdPZ/cGkiiIpVb+83tzKXpIDAAgAACRICAT+/lM4AFPPsAgAKlrICAAYWQ0A==
Date: Thu, 18 Apr 2019 16:52:02 +0000
Message-ID: <CE03DB3D7B45C245BCA0D2432779493630516479@MX307CL04.corp.emc.com>
References: <155067447797.31337.768983002923056061.idtracker@ietfa.amsl.com> <40b28261-5f04-7fcd-4f4f-ce243f32a808@labn.net> <1AA376D8-DE94-4FAF-B9D2-CC4E155CEC85@cooperw.in> <ec41b988-8f3c-4ae0-fc65-1269bf33f93e@labn.net> <b1c6345f-d3f1-735c-04cd-81c5a405ef11@ericsson.com> <0f7e2d9a-bf74-b5ea-6898-29ad2129a0c0@ericsson.com> <CCCB305C-257F-4436-8C6C-CAEBD2137B9D@cooperw.in> <ddfc0ddb-3ac6-d4dc-da6e-8c9889dd77c4@ericsson.com> <BEAECAD3-DA6B-4858-97C3-6C05264761E0@cooperw.in>
In-Reply-To: <BEAECAD3-DA6B-4858-97C3-6C05264761E0@cooperw.in>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.238.21.130]
Content-Type: multipart/alternative; boundary="_000_CE03DB3D7B45C245BCA0D2432779493630516479MX307CL04corpem_"
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd04.lss.emc.com
X-RSA-Classifications: public
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-04-18_08:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1904180107
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1904180108
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/Vc_V-wkMioYNJQ8hcJI5nDxaCrI>
Subject: Re: [Detnet] Alissa Cooper's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Apr 2019 16:52:37 -0000

+1 on Alissa’s near-final comment:

> […] the architecture does not actually forbid the possibility of adding additional information into DetNet packets that could be used as vectors for tracking/correlation.

My understanding is that this is allowed by the DetNet architecture even though none of the data plane designs have done so to date.  In particular, I’ve seen some prior discussion of using DSCPs for to identify DetNet traffic, even though that approach is not currently being pursued.

Thanks, --David

From: detnet <detnet-bounces@ietf.org> On Behalf Of Alissa Cooper
Sent: Wednesday, April 17, 2019 9:34 AM
To: János Farkas
Cc: draft-ietf-detnet-architecture@ietf.org; detnet@ietf.org; Lou Berger; IESG; detnet-chairs@ietf.org
Subject: Re: [Detnet] Alissa Cooper's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)


[EXTERNAL EMAIL]
Hi János,


On Apr 15, 2019, at 5:08 PM, János Farkas <janos.farkas@ericsson.com<mailto:janos.farkas@ericsson.com>> wrote:

Hi Alissa,

Please see in-line.
On 4/12/2019 7:08 PM, Alissa Cooper wrote:
Hi János,



On Mar 25, 2019, at 12:16 PM, János Farkas <janos.farkas@ericsson.com<mailto:janos.farkas@ericsson.com>> wrote:

Hi Alissa,

We believe that we have addressed your comments in the most recent revision: https://tools.ietf.org/html/draft-ietf-detnet-architecture-12. (https://mailarchive.ietf.org/arch/msg/detnet/utVL9ZVGcOeGtRIASRFx5WT_ErM)

Please let us know what else you would like to see done before you clear your DISCUSS.

I/we would be happy to meet with you this week if there is anything you would like to discuss.

Regards,
Janos

On 2/26/2019 2:20 PM, János Farkas wrote:
Hi Alissa,

Thank you for your review!

We can replace
"DetNet is provides a Quality of Service (QoS), and as such, does not
   directly raise any new privacy considerations."
with
"DetNet provides a Quality of Service (QoS), and as such, is not expected to
   directly raise any new privacy considerations.”

I don’t understand why this is not expected. From what I can tell, the architecture allows for the use off domain- or app-flow-specific IDs. These seem like a new potential vector for tracking, and one that not every QoS architecture requires.
As far as I understood from below, you were happy with the change to "is not expected”.

“Combined with the above removals” (about flow IDs and OAM) is what I said. Either the architecture allows for these things, in which case one might expect them, or it doesn’t.



Combined that with this discussion on the related text:
https://mailarchive.ietf.org/arch/msg/detnet/-L_wsGPMqNEOtPMgsGYaJ30nFXk

We came to the current text:
   DetNet provides a Quality of Service (QoS), and as such, is not
   expected to directly raise any new privacy considerations, the
   generic considerations for such mechanisms apply.  In particular,
   such markings allow for an attacker to correlate flows or to select
   particular types of flow for more detailed inspection.


Flow ID and associated QoS is not a new concept introduced by DetNet; therefore, does not expected to raise new concerns.

What specific further changes do you suggest to this text?

Given your exchange with Benjamin and the email today from Stewart, I would suggest:

DetNet provides a Quality of Service (QoS) mechanism, and the generic
   considerations for such mechanisms apply.  In particular, such markings
   allow for an attacker to correlate flows or to select particular types
   of flow for more detailed inspection.

My point is that the architecture does not actually forbid the possibility of adding additional information into DetNet packets that could be used as vectors for tracking/correlation. This change would also address my concern about the OAM piece, but if you or the WG want to pursue further edits regarding OAM given Greg’s mail I’m happy to review.

Best,
Alissa





This edit also doesn’t seem to cover the potential for additional privacy exposure implied by the discussion of OAM in Section 4.1.1:
Thank you for making clear that this is the text you mean under "novel flow IDs and OAM tags" below. It was not clear to me because the architecture document does not contain either new / novel   Flow ID / OAM tag.



"OAM can involve specific tagging added in the packets for tracing implementation or

   network configuration errors; traceability enables to find whether a

   packet is a replica, which DetNet relay node performed the

   replication, and which segment was intended for the replica.

This text is there since: https://tools.ietf.org/html/draft-finn-detnet-architecture-05.



Active

   and hybrid OAM methods require additional bandwidth to perform fault

   management and performance monitoring of the DetNet domain.  OAM may,

   for instance, generate special test probes or add OAM information

   into the data packet.”
This was added based on https://www.ietf.org/mail-archive/web/detnet/current/msg01577.html.

This paragraph reads to me as pretty generic text on OAM.

What specific cahnge would you like to see made to this text?

Should we, e.g., update the first sentence of the paragraph to:
   OAM can support tracing implementation or
   network configuration errors. Traceability enables to find whether a
   packet is a replica, which DetNet relay node performed the
   replication, and which segment was intended for the replica.

?

Regards,
János







Thanks,

Alissa





I'm not sure what "references to new flow IDs and OAM tags should be removed"?

Could you point to the text that should be changed?

Thank you!
Janos

On 2/20/2019 4:39 PM, Lou Berger wrote:

On 2/20/2019 10:25 AM, Alissa Cooper wrote:



On Feb 20, 2019, at 7:17 AM, Lou Berger <lberger@labn.net<mailto:lberger@labn.net>> wrote:

Hi Alissa,

Thanks for the comments - see below.

On 2/20/2019 9:54 AM, Alissa Cooper wrote:

Alissa Cooper has entered the following ballot position for
draft-ietf-detnet-architecture-11: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-detnet-architecture/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

= Section 6 =

"DetNet is provides a Quality of Service (QoS), and as such, does not
   directly raise any new privacy considerations."

This seems like a false statement given the possibility that DetNet may require
novel flow IDs and OAM tags that create additional identification and
correlation risk beyond existing fields used to support QoS today.

Based on the other work in the WG, I think "is not expected" is more accurate than "does not". This is based on the WG solutions for the DetNet data plane using existing IP (v4 or 6) headers or MPLS labels for flow identification.

If that is the case then the references to new flow IDs and OAM tags should be removed from the architecture.
sounds reasonable.  Can you point to the specific offending text?
Thanks,
Lou



Would changing to "is not expected" address your concern?

Combined with the above removals, that would work for me.

Thanks,
Alissa



Thanks,

Lou




_______________________________________________

detnet mailing list

detnet@ietf.org<mailto:detnet@ietf.org>

https://www.ietf.org/mailman/listinfo/detnet