Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

János Farkas <janos.farkas@ericsson.com> Sat, 02 March 2019 18:22 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 419FF130DEF for <detnet@ietfa.amsl.com>; Sat, 2 Mar 2019 10:22:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hu2ZHeMStCfm for <detnet@ietfa.amsl.com>; Sat, 2 Mar 2019 10:22:22 -0800 (PST)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D3CF130E66 for <detnet@ietf.org>; Sat, 2 Mar 2019 10:22:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/relaxed; q=dns/txt; i=@ericsson.com; t=1551550936; x=1554142936; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=PAtK46KRVQmjAH6c7lGEXNPhmfXtQF8QVZZZsxnarIM=; b=VfY/G9RmCEVlt3sodD/WUw5U2GN4fqfoaYTWWXkGlxJP/f7pyenho+xDWDWFkJA2 vHGllBq8fRu4unz1/LUOqqvdVuaULTBywZJLj5/chxI8mUzw9uK14mymZZYxKGEG 4UuA7XOa+bvIejsULWeCi/EPt8ssULTK5OsubJzGcBk=;
X-AuditID: c1b4fb2d-db5ff7000000062f-49-5c7ac9d837c8
Received: from ESESBMB505.ericsson.se (Unknown_Domain [153.88.183.118]) by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id 3D.B8.01583.8D9CA7C5; Sat, 2 Mar 2019 19:22:16 +0100 (CET)
Received: from ESESBMB503.ericsson.se (153.88.183.170) by ESESBMB505.ericsson.se (153.88.183.172) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Sat, 2 Mar 2019 19:22:15 +0100
Received: from [100.94.35.103] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.186) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Sat, 2 Mar 2019 19:22:14 +0100
To: Benjamin Kaduk <kaduk@mit.edu>
CC: Lou Berger <lberger@labn.net>, draft-ietf-detnet-architecture@ietf.org, detnet@ietf.org, The IESG <iesg@ietf.org>, detnet-chairs@ietf.org
References: <155063426136.20704.6779201119170972943.idtracker@ietfa.amsl.com> <cb52062a-b4fb-b51a-2dc3-ca7f161c8f89@labn.net> <20190220160743.GD69562@kduck.mit.edu> <36c4ce97-5c4a-89ab-d648-3e7705a6acd3@labn.net> <20190220212104.GK69562@kduck.mit.edu> <30e27625-da32-7e67-6e3a-a923830b9e5c@labn.net>
From: János Farkas <janos.farkas@ericsson.com>
Message-ID: <e8b22823-fe37-4f6f-e7e3-d597ca29f882@ericsson.com>
Date: Sat, 02 Mar 2019 19:22:15 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <30e27625-da32-7e67-6e3a-a923830b9e5c@labn.net>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrMLMWRmVeSWpSXmKPExsUyM2J7me6Nk1UxBj9mS1hc6//BYvH702wW iw/fZrJYzPgzkdli+caZTBYdzW9ZHNg8liz5yeTxYVMzm0fTmaPMAcxRXDYpqTmZZalF+nYJ XBl/N2YXTI6qOLlvI0sD4y7PLkZODgkBE4lL3XMZQWwhgSOMEnu+53QxcgHZXxklls/sZYJw DjNK3D3wgw2kSligUOLCwqlgHSICShKLz7awgRQxC0xllHjQfZ8VomMrk8S2jl/MIFVsAvYS dy9tALN5gexL+86xg9gsAioSaxedZQWxRQViJT5dWQxVIyhxcuYTFhCbU8BG4k/7SrB6ZgEL iZnzzzNC2PISzVtnM0PY4hK3nsxngvhBTeLT24fsExiFZiEZNQtJ+ywk7bOQtC9gZFnFKFqc Wlycm25krJdalJlcXJyfp5eXWrKJERgVB7f81t3BuPq14yFGAQ5GJR7evl1VMUKsiWXFlbmH GCU4mJVEeCfsBwrxpiRWVqUW5ccXleakFh9ilOZgURLn/SMkGCMkkJ5YkpqdmlqQWgSTZeLg lGpg9Nm5XE7m3aOzH4SWyMyXusQVvudrquGy+/OURSZIMipVTX9iNDnmwy3dvr1ivPW/go49 e7Ch8LfGu0XvfnEeT5wte2sW87a4fM6dW36f1qydXZ/QOvNZ8r7weesivkdbRiit3fe1Ysm6 B3ozVBawP/Izt2M896bvhoqbocwT8yuqL/nDhHTn71ViKc5INNRiLipOBADv3BMfhgIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/mOzgdXOJ5lGr4gLBGAapYt6Azl8>
Subject: Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Mar 2019 18:22:24 -0000

Hi Benjamin,

Thank you for your review!

Focusing on the main point now: Section 5 Security Considerations. We 
could consolidate the section to address your comment. Would it be 
helpful to replace the section with the following text?:


Security considerations for DetNet are described in detail in 
[I-D.ietf-detnet-security]. This section considers exclusively security 
considerations which are specific to the DetNet Architecture.

Security aspects which are unique to DetNet are those whose aim is to 
secure the specific quality of service aspects of DetNet, which are 
primarily to deliver data flows with extremely low packet loss rates and 
bounded end-to-end delivery latency. A DetNet is implemented using MPLS 
and IP (including both v4 and v6) technologies, and thus inherits the 
security properties of those technologies at both the control plane and 
the data plane.

Security considerations for DetNet are constrained (compared to, for 
example, the open Internet) because DetNet is defined to operate only 
within a single administrative domain (see Section 1).  The primary 
considerations are to secure the request and control of DetNet 
resources, maintain confidentiality of data traversing the DetNet, and 
provide uninterrupted availability of the DetNet quality of service.

To secure the request and control of DetNet resources, authentication 
and authorization must be provided for each device connected to a DetNet 
domain, most importantly to network controller devices. Control of a 
DetNet network may be centralized or distributed (within a single 
administrative domain). In the case of centralized control, precedent 
for security considerations as defined for ACTN can be found in RFC8453, 
Section 9. In the case of a distributed control protocols, DetNet 
security is expected to be provided by the security properties of the 
protocols in use. In any case, the result must be that manipulation of 
administratively configurable parameters is limited to authorized entities.

To maintain confidentiality of data traversing the DetNet, application 
flows must be protected through whatever means is provided by the 
underlying technology. For example, encryption may be used, such as that 
provided by IPSec for IP (Layer 3) flows and by MACSec for Ethernet 
(Layer 2) flows. DetNet flows are identified on a per-flow basis, which 
may provide attackers with additional information about the data flows 
(when compared to networks that do not include per-flow identification); 
this is an inherent property of DetNet which has security implications 
which must be considered when determining if DetNet is a suitable 
technology for any given use case. Similar consideration may need to be 
given to the use of replicated packet flows, which result in increased 
surface for Reconnaissance attacks. In any case, the result must be that 
the confidentiality of the data is maintained to a degree sufficient for 
the use cases addressed by the given DetNet implementation.

To provide uninterrupted availability of the DetNet quality of service, 
provisions must be made against DOS attacks and delay attacks. To 
protect against DOS attacks, excess traffic due to malicious or 
malfunctioning devices must be prevented or mitigated, for example 
through the use of traffic admission control applied at the input of a 
DetNet domain, as described in Section 3.2.1.1, and through the fault 
mitigation methods described in Section 3.3.2.

To prevent DetNet packets from being delayed, protection must be 
provided against Man-In-The-Middle attacks, for example through use of 
authentication and authorization of devices within the DetNet domain.

Time synchronization methods are not specified by DetNet, however any 
time synchronization method used with DetNet must also be secured, using 
the security methods available for the given time synchronization 
mechanism, for example as described in [RFC7384].
In any case, the result must be that the DetNet is protected from DOS, 
delay, and time manipulation attacks to the extent sufficient for the 
use cases addressed by the given DetNet implementation.

DetNet use cases are known to have widely divergent security 
requirements. The intent of this section is to provide a baseline for 
security considerations which are common to all DetNet designs and 
implementations, without burdening individual designs with specifics of 
security infrastructure which may not be germane to the given use case. 
Designers and Implementers of DetNet systems are expected to take use 
case specific considerations into account in their DetNet designs and 
implementations.


Regards,
Janos



On 2/21/2019 9:32 PM, Lou Berger wrote:
> Hi Benjamin,
>
> On 2/20/2019 4:21 PM, Benjamin Kaduk wrote:
>> Hi Lou,
>>
>> On Wed, Feb 20, 2019 at 11:34:11AM -0500, Lou Berger wrote:
>>> On 2/20/2019 11:07 AM, Benjamin Kaduk wrote:
>>>> On Wed, Feb 20, 2019 at 09:33:34AM -0500, Lou Berger wrote:
>>>>> On 2/19/2019 10:44 PM, Benjamin Kaduk wrote:
>>>>>> I note that the DETNET WG is explicitly chartered with a work 
>>>>>> item for the
>>>>>> "overall architecture: This work encompasses ... and security 
>>>>>> aspects".
>>>>>> It seems incomplete to specify an architecture for a topic such as
>>>>>> deterministic networking without specifically considering what 
>>>>>> threats are
>>>>>> and are not in scope to be protected against.
>>>>> The working group certainly recognizes that security is an important
>>>>> topic and necessary part of the work. The WG's  approach to ensure 
>>>>> that
>>>>> this significant topic is sufficiently covered is to have a  document
>>>>> dedicated to the topic.  As you note below this work,
>>>>> draft-ietf-detnet-security, is not at the same level maturity - so
>>>>> please stay tuned.  Of course, the WG would welcome any input on this
>>>>> security draft now or even a full early-review or security area 
>>>>> advisor.
>>>> I do appreciate that the WG has taken the time to work on a dedicated
>>>> security document, that goes through the (tedious!) effort to 
>>>> tabulate the
>>>> various known attacker capabilities, threats, and their interactions.
>>>>
>>>> What I think is missing from the high-level architecture document is a
>>>> sense for what security goals the architecture intends to achieve.  
>>>> It's
>>>> fine to have this be separate from the nitty-gritty stuff in the 
>>>> separate
>>>> document, but these high-level questions can have an impact on the
>>>> high-level design of the protocol ecosystem as a whole.  We have 
>>>> mounds of
>>>> examples of "come up with a design; bolt security on as an 
>>>> afterthought"
>>>> working poorly or being nigh-impossible, and I haven't seen any 
>>>> attempt at
>>>> justification for why doing so here is likely to be any different.
>>>> Including the security concepts from the start and wholly 
>>>> integrating them
>>>> into the system tends to produce a much more elegant design and 
>>>> smoother
>>>> outcomes all around.
>>> We went back and forth on how much of the security topic to include in
>>> the architecture document and settled on the current text of section 5
>>> where just high level security requirements are identified. From your
>>> list below, the architecture covers the points you raise (non-detnet
>>> traffic impacting detnet traffic, and detnet traffic trying to use more
>>> than its allocation) mainly from a service delivery perspective.  It
>>> does mention "shaping" as a security concern, the document could expand
>>> these if helpful. But I think the real discussion point is how much of
>>> the security details should be in the base (vs dedicated) document  --
>>> and that you disagree with where the WG has drawn the line. Is this
>>> correct?
>> Well, it's not as much that I disagree about where the line is drawn, as
>> that I disagree with the characterization as "high level security
>> requirements".
>>
>> The first paragraph covers topics worth including here, certainly -- an
>> attacker that can introduce delay can inherently break the DetNet
>> guarantees, and there is no further defense.  But the text could 
>> probably
>> go further than its current version and explicitly call out that no
>> technical measures can defend against such delay, other than by
>> rerouting/avoiding the compromised position.
>>
>> The second paragraph also covers a topic worth noting, that entropy and
>> Murphy as as important of risks to consider as active attacks.
>>
>> The rest of the section/list don't seem to match up with the high-level
>> view, though -- "protection of the signaling protocol", but protection
>> against what?  Authentication and authorization are important parts of
>> security, but authorization is tied to actions and entities, not just
>> entities in vacuo.  For "identification and shaping of DetNet flows", if
>> security must cover them, what security properties are needed. Do we 
>> need
>> to provide integrity protection for the marking, or confidentiality
>> protection, too?  Does authentication/integrity need to be provided for
>> in-line or are out-of-band considerations in play?
>>
>> The rest of the document presents a good high level picture of what 
>> pieces
>> will be involved in a system, and how they fit together.  I'm hoping 
>> to see
>> a high-level picture of what attacks/failures the architecture does and
>> does not aim to protect against.  It's somewhat implied that we need to
>> protect against the failure of any single node or link (except at the
>> boundary) due to random faults; explicitly saying this would be a 
>> perfect
>> hting to include in the security considerations here!  Once we get 
>> beyond
>> entropy as an attack, into more active attack scenarios, though, we 
>> need to
>> consider what capabilities an attacker might have.  Do we protect 
>> against
>> an entity with the ability to inject various forms of traffic? Modify or
>> drop valid traffic?  Are there any (classes of) credentials that we 
>> assume
>> must be securely held, or will we attempt to protect against 
>> attackers that
>> have some privilege within the system?  (Note that misbehaving 
>> hardware can
>> sometimes present as similar or identical to such an attacker.)
>>
>> Does this give a better picture of what I'm thinking of as "high-level
>> security requirements"?  I don't necessarily need details of specific
>> hardware or credentials at play, and certainly not for the solutions, 
>> but I
>> want to have a clear picture of what the scope of future security 
>> analysis
>> will be.  "How will I be able to tell if the actual protocols meet the
>> security requirements of the architecture?"
>
> I'll get with authors (of both the architecture and security docs) and 
> see how much they think can be reasonably be added to this document -- 
> to be clear you *are* asking for a change in how the WG decide to 
> address this topic and what would go in which document.
>
> Lou
>
>> -Benjamin
>>
>> _______________________________________________
>> detnet mailing list
>> detnet@ietf.org
>> https://www.ietf.org/mailman/listinfo/detnet
>>
>
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://www.ietf.org/mailman/listinfo/detnet