[I2nsf] AD Review of draft-ietf-i2nsf-capability-data-model-16

Roman Danyliw <rdd@cert.org> Thu, 05 August 2021 17:08 UTC

Return-Path: <rdd@cert.org>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 659E83A19F8 for <i2nsf@ietfa.amsl.com>; Thu, 5 Aug 2021 10:08:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=seicmu.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L2H8JwWXdFb3 for <i2nsf@ietfa.amsl.com>; Thu, 5 Aug 2021 10:08:49 -0700 (PDT)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on0119.outbound.protection.office365.us [23.103.208.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F3923A19F3 for <i2nsf@ietf.org>; Thu, 5 Aug 2021 10:08:49 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=l0acG+azTDjsbzvBSx9eTj3InlI6CCC8Fp87owuFJsHgI0ro4yYKmu8RiY7ep9/1reAx0M2v1Qh9yCYWPio+OVEiTMuh0aFFq27AMbQOdijW3poe+co4r/JttmdLSeYe0cehhhpbw/oQyy/psRsizjTqRS8TBkF1vuHpmihHofl4S+ELWwlYFAy9eFmM2VPGSdxCrLMi3PApCG9eNkfxbn/D4cLSZSE9X7/mayS9DweRw8gYcVCSVyTAMy/UMoKlZSDglzhiT+HFGVuZzJ8QMaPtF4YVJhNMyECCVRRleDBw9vwN7G2fH3PYXh+81Aid4X8frjyvcn2O1VvN2H63EA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UqDYOyQHU7xtbchI9+5cu8x1xtwIMQBC+HO2WBRhhF8=; b=AVicGSfMLTFsU704Ik/cY2bOI9hBTBAVgzLCVPy4Dad2BJvjR9u/tKO/gjQNj+GoS9Z7/tj6ep+pxjdrX5CaYGOJ09krs3f1w2YluqyoFlZvtGjJcE26LcIIoGydwRNjEaaoq8gtZVMFV6aRr0JjjgpWpnkc1XSb0Gw70cG0y0kFTRZIC7thLqWmUMJ/mYP/8r+3rrdga++aiNR2O5mWVfU+OFNHqy6lh2feOh1XLRCirpRHk9iPf1uNXtZxMxv+UOd8AOVUF5tnRnpYIG5yWhFpr6FnvXUqF2R8IeRAEebmOniee4GXaKlxbo1aFNP6e8LjXfLgWxmNR9fUPuOGRA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seicmu.onmicrosoft.com; s=selector1-seicmu-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UqDYOyQHU7xtbchI9+5cu8x1xtwIMQBC+HO2WBRhhF8=; b=FVEpT0+G6pkrTBSa2QmyJf9Y/cEXUxdtJ/pqHX85u69sl0IEUSxgKh+wrPtU/nenrrTJyNBhlKN8qq6OugtmIJATHb4gtRqrTaTTROUnJE5OaWvfw9+WwR+XvWxGORA0C/vv+y95Qx4GHrBTT4YlQMldmeN/4XDHHiueEzaK8xw=
Received: from DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:414::9) by DM3P110MB0331.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:411::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.21; Thu, 5 Aug 2021 17:08:46 +0000
Received: from DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM ([fe80::8156:6fdb:538a:7d36]) by DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM ([fe80::8156:6fdb:538a:7d36%5]) with mapi id 15.20.4352.035; Thu, 5 Aug 2021 17:08:46 +0000
From: Roman Danyliw <rdd@cert.org>
To: "i2nsf@ietf.org" <i2nsf@ietf.org>
Thread-Topic: AD Review of draft-ietf-i2nsf-capability-data-model-16
Thread-Index: AdeKGyStpCRGg3NwTo+vc38Uq2/Qsw==
Date: Thu, 05 Aug 2021 17:08:46 +0000
Message-ID: <DM3P110MB05385ABC1B53F91A63273021DCF29@DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=cert.org;
x-originating-ip: [71.112.171.248]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b8b91c52-d32e-4fd4-42fb-08d95833afd1
x-ms-traffictypediagnostic: DM3P110MB0331:
x-microsoft-antispam-prvs: <DM3P110MB03312F26C3BB0F08CB96F06EDCF29@DM3P110MB0331.NAMP110.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(376002)(396003)(136003)(346002)(39840400004)(366004)(2906002)(26005)(38100700002)(76116006)(38070700005)(122000001)(66946007)(8936002)(86362001)(33656002)(66556008)(186003)(64756008)(66476007)(316002)(7696005)(5660300002)(9686003)(66446008)(52536014)(8676002)(6506007)(55016002)(66574015)(83380400001)(478600001)(6916009)(71200400001)(21314003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: b8b91c52-d32e-4fd4-42fb-08d95833afd1
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Aug 2021 17:08:46.4809 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM3P110MB0331
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/BJ4GUttBVZRvHGm3m2_bEycNQWI>
Subject: [I2nsf] AD Review of draft-ietf-i2nsf-capability-data-model-16
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Aug 2021 17:08:54 -0000

Hi!

I conducted a second AD review on -16 of draft-ietf-i2nsf-capability-data-model.  Thanks for the work to merge the text from the previous stand-alone information model document and the preliminary IESG feedback that came before the document was removed from the telechat. My feedback is below:

** Section 1.
   As the industry becomes more sophisticated and network devices (e.g.,
   Internet-of-Things (IoT) devices, autonomous vehicles, and
   smartphones using Voice over IP (VoIP) and Voice over LTE (VoLTE))
   require advanced security protection in various scenario, service
   providers have a lot of problems described in [RFC8192].  

There seems to be a slight change in framing between RFC8192 and this sentence.  RFC8192 discusses the problem as protecting infrastructures and networks, this text frames it as "devices".  This isn't necessarily a problem, I just wanted to ask if that drift was intentional.

** Section 1.  Editorial.

OLD
   Security Capabilities describe the functions that Network Security
   Functions (NSFs) are available to provide for security policy
   enforcement purposes.  

NEW
   Security Capabilities describe the functions that Network Security
   Functions (NSFs) can provide for security policy
   enforcement.  

** Section 1.  

Security Capabilities are independent of the
   actual security control mechanisms that will implement them.

Can you clarify the intent of this statement?  There is a distinction being made between a "security control mechanism" and a "policy" and the "NSF functionality" that I don't follow.

** Section 1.  Editorial.  The sentence beginning with "That is, it is not needed ..." seem repetitive to the text before and after it.  I recommend removing it.

** Section 1.  Per "Note that this YANG data model outlines ...", can you clarify what "outlines" means?

** Section 1.  In the paragraph beginning with "This document provides an information model ...", is there are reason that "NSF" and "Security devices" is being used interchangeably.  I thought architecturally, the unit of capability was a NSF.

** Section 1.  Per the bulleted list of starting with the text of "The 'ietf-i2nsf-capability' YANG module defined in this document ...", there is distinction made between "advanced network security functions" and "generic network security functions".  Where is the difference between those two explained? (There is another comment on this below and Eric Vynke also mentioned it in his initial ballot)

** Section 3.  I'm having trouble finding the information model (CapIM).  Section 4 has a data model.  Section 3.1. describes the properties of the information model.  Is the ECA text in Section 3.1 - 3.3 the CapIM?

** Section 3.  Per the paragraph starting with "Analogous considerations can be applied for channel protection protocols ...", this text seems rather broad in scope.  The data model appears to let you configure IPSec.

** Section 3.  Editorial. s/[RFC8329] , /[RFC8329], / (i.e., remove the extra space between the reference and the comma.

** Section 3.1. Editorial.  s/-po This document/This document/

** Section 3.1. Editorial. s/resepectively/ respectively/ (multiple places)

** Section 3.1.  A few of these requirements are generically written, and I wondering if it needs to be so in the I2NSF context.  For example:

-- For the Advertisement requirement, is this "dedicated, well-known" interface anything but the registration interface?

-- For the Execution requirement, is this "monitoring" capability more than the monitoring module"?

** Section 3.1.  Per the requirement for automation and scalability, no I2NSF document I can find provides guidance on how to realize this design.  As there a normative MUSTs/SHOULDs here, the bounds of these need more details.

-- Are these implementation details out of scope for I2NSF?

-- How much "scale up/down or scale in/out" is needed?

** Section 3.1.

Furthermore, when an unknown threat (e.g., zero-day exploits and
   unknown malware) is reported by an NSF, new capabilities may be
   created, and/or existing capabilities may be updated (e.g., by
   updating its signature and algorithm).  This results in enhancing the
   existing NSFs (and/or creating new NSFs) to address the new threats.
   New capabilities may be sent to and stored in a centralized
   repository, or stored separately in a vendor's local repository.  In
   either case, a standard interface facilitates this update process.

I understand the general update mechanism of security tools with new signatures of algorithms described here, but cannot link it to the abstract nature of the capability model described in this document.  The granularity of the capability model  appears to be "has ips capability" not "has ips capability to mitigate exploit-X".

** Section 3.1.  Per "definitions of all I2NSF policy-related terms are also defined in [RFC8329]", the only defines in RFC8329 on ECA is in Section 7.0.  The definitions in this section appears to be a super-set of those.  Is this reference needed?

** Section 3.1.  The definitions of the ECA elements in this section don't entirely agree with the definitions in Section 7 of RFC8329.  For example, for action, is it flow or packet+flow specific?
-- Here: "An action is used to control and monitor aspects of flow-based NSFs"

-- RFC8329: "defines the type of operations that may be performed on this packet or flow"

** Section 3.2.  I don't follow the intent of this section.  It defines the concept of a "matched policy rule" and terms like "Ac" and "Ec" which aren't used anywhere else in the document.  The title suggested (to me) that there would be some guidance on how to match rules, but there is no guidance there beyond what's already stated in Section 3.1.  I would recommend removing it.

** Section 3.2.  Recommend removing the sentence "To precisely describe ..." as it could be read a redefinition of the ECA terms.  

** Section 3.2. Editorial.  s/the properties to characterize/the properties that characterize/

** Section 3.3.  R1 and R2 are presented to show rules that don't conflict.  Based on their descriptions their action clause affecting the same object in different ways isn't clear because I don't know what "conduct anti-malware investigation" entails.  Please also expand "FW" to be firewall.

** Section 3.3.  I appreciate that R1 - R4 are high level rules that that will get translated into more specific guidance and are intended to demonstrate the parts of ECA.  However, I'm having difficulty matching those rules with the capabilities of the YANG module described in this document.  In particular, R3 and R4 don't appear to be security related unless there is something assumed by virtue of being "GoldService" or "BronzeServer".  What capabilities expressed in the YANG module would one use to encode these rules?

** Section 3.3.

   Conflicts theoretically compromise the correct functioning of devices
   (as happened for routers several year ago).  However, NSFs have been
   designed to cope with these issues.  Since conflicts are originated
   by simultaneously matching rules, an additional process decides the
   action to be applied, e.g., among the ones which the matching rule
   would have enforced.  This process is described by means of a
   resolution strategy for conflicts.


-- Per "(as happened for routers several years ago)", can this event be referenced or explained

-- This text appears to be making assumptions about the internal implementation of NSF (i.e., "conflicts are originated by simultaneously matching rules").  Is that a safe assumption? Should this matching strategy be more clearly stated an underlying requirement of the NSFs that I2NSF can handle

** Section 3.3.

   On the other hand, it may happen that, if an event is caught, none of
   the policy rules matches the event.  

How can an event be caught if there is no event clause in any rule to match it?  The subsequent logic about a firewall doesn't follow for me because the default rule still is a rule.

** Section 3.3.  As noted for Section 3.2, this section introduces RSc and Dc, but this notation is used elsewhere in the document.  Why is this needed?

** Section 4.  Editorial. s/is used for the Security Controller/is used by the Security Controller/

** Section 4 notes that the primary use of this YANG model is for the DMs to populate (via the registration interface) the capabilities of various NSFs.  Given that scope, it is a bit striking that the narrative describing Figure 1 primarily discusses only the byproduct of the database on the controller created by the YANG module in this document.

** Section 5.1.  Is it possible define generic-nsf and advanced-nsf capabilities with a more principled definition.  Perhaps that the generic-nsf operates on layer 3 and 4 headers only; and the advanced in application layer or those requiring cross flow state?

** Yang module.  "This can be used for an extension point ..." is used in a few places.  Can the proposed approach for making extensions be further explained?

** YANG module.  There is a notation being used in the reference section which is not clear to me.  It is of the form: "RFC XXX: <title of RFC - <text>".  For example, in leaf-list default action-capabilities, the reference reads "RFC 8329: Framework for Interface to Network Security Functions - Ingress and egress actions."  What part of RFC8329 am I supposed to be reading.  There is not Section with the title "Ingress and egress" and that exact phrase appears only in Section 9.2 which doesn't appear germane.  It would be much clearer if the references were of the form "RFC XXX: <title of RFC - <Section #>" instead.

** Identity application-layer-filter.  The references seem to suggest that this is HTTP only.  Is the intent for generic capability or for an HTTP-only focus?

** Identity baseline-learning, signature-set, ips-exception-signature.  RFC8329 makes no reference to these types of capabilities.  What are these?

** leaf-list anti-virus-capability, anti-ddos-capability, url-capability, voip-volte-capability.  All of these refer to RFC8329 but I can't find the reference Section in that document which describes these capabilities

** Section 8.  I appreciate the inclusion of this new section in response to the original IESG telechat.  I don't follow how it informs awareness on privacy issues - no insight is being provide on how the trade-off is being made and even what privacy issues are arising beyond simply stating there are some.  I would suggest reframing this section to emphasize that this module is intended to describe the capabilities of a diverse set of network security function already in common use in enterprise security operations. The specificity of the privacy issues can be addressed with reference as is already done with further fidelity as noted in the next comment in Section 9.  Ben Kaduk made a few comments on privacy language in his initial ballot too.

** Section 9.  Thanks for using the YANG Security Considerations template (https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines) as a starting point.  Please include the other elements of the template:

-- Discuss the readable nodes noting the consequences from the perspective of the attacker (e.g., reading nodes will reveal the specific configuration of security controls to an attacker (a) craft an attack path that avoids observation or mitigations; may revealing topology information to inform additional targets or enable lateral movement; enabling the construction of an attack path that avoids observation or mitigations; or (c) provide an indication that the operator has discovered the attack).  The scope of this is likely the entire data model.

-- Discuss the specifics of which readable nodes might be considered privacy sensitive

** References

-- RFC8805 should be a normative reference

-- Can the shepherd write-up please be updated to reflect that there are several downrefs.  From idnits:

  ** Downref: Normative reference to an Informational RFC: RFC 6691

  ** Downref: Normative reference to an Informational RFC: RFC 8192

  ** Downref: Normative reference to an Informational RFC: RFC 8329

  ** and also RFC8805 as noted above

-- Per "Unused Reference: 'RFC2119' is defined on line 2884, but no explicit      reference was found in the text", this means that the boiler plate such as:

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

Is not present but the text is still citing RFC2119.  Please add the above text to Section 2 since I believe that the "MUSTs" and "SHOULDs" present in the document are in fact intended to be normative?

Regards,
Roman