Re: [I2nsf] Many aspects are needed to seamlessly integrate vNSF to network (was RE: [Newsletter] Re: I2NSF charter for IESG Review

Linda Dunbar <linda.dunbar@huawei.com> Wed, 18 February 2015 17:44 UTC

Return-Path: <linda.dunbar@huawei.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59DEE1A8A8A for <i2nsf@ietfa.amsl.com>; Wed, 18 Feb 2015 09:44:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.21
X-Spam-Level:
X-Spam-Status: No, score=-6.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_I_LETTER=-2, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zdfz_iPKe_by for <i2nsf@ietfa.amsl.com>; Wed, 18 Feb 2015 09:44:46 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18B0D1A8A6A for <i2nsf@ietf.org>; Wed, 18 Feb 2015 09:44:45 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BPK81876; Wed, 18 Feb 2015 17:44:44 +0000 (GMT)
Received: from DFWEML704-CHM.china.huawei.com (10.193.5.141) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 18 Feb 2015 17:44:43 +0000
Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml704-chm ([10.193.5.141]) with mapi id 14.03.0158.001; Wed, 18 Feb 2015 09:44:39 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Yoav Nir <ynir.ietf@gmail.com>, "i2nsf@ietf.org" <i2nsf@ietf.org>
Thread-Topic: [I2nsf] Many aspects are needed to seamlessly integrate vNSF to network (was RE: [Newsletter] Re: I2NSF charter for IESG Review
Thread-Index: AQHQRKT9+PvLMG2I80GIG3WRjMWRFpzoys6ggADNkoCABwCxgIAGGFSw
Date: Wed, 18 Feb 2015 17:44:39 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F645EDCFA1@dfweml701-chm>
References: <4A95BA014132FF49AE685FAB4B9F17F645EBFBDF@dfweml701-chm> <CAHbuEH5gP09OOi7itpTF2C8XyXPvhjoOS+PU+5+k96drvoV4rA@mail.gmail.com> <4A95BA014132FF49AE685FAB4B9F17F645EBFC07@dfweml701-chm> <9904FB1B0159DA42B0B887B7FA8119CA5C98C6FA@AZ-FFEXMB04.global.avaya.com> <CB00F089-5B91-4805-8EFF-990C9663928B@fortinet.com> <6F99AE8C-7D50-4BFE-A749-3875AE07317A@telefonica.com> <4A95BA014132FF49AE685FAB4B9F17F645EC1151@dfweml701-chm> <6248AB2B-2625-4691-8B4F-8EBBE1E675D2@fortinet.com> <CAHbuEH7nYX=0xPZFV5r6ECe6cqxmVveP=mOdTj9jETzpvFQA0Q@mail.gmail.com> <, > <4A95BA014132FF49AE685FAB4B9F17F645EC13A8@dfweml701-chm> <F244BAA9-8CED-43DA-87C8-466E8C31FFD8@fortinet.com> <D0E33528-5C08-4D4F-A39C-E47CD82F426F@gmail.com>
In-Reply-To: <D0E33528-5C08-4D4F-A39C-E47CD82F426F@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.192.11.175]
Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F645EDCFA1dfweml701chm_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2nsf/ROOp8DC7QtKLZ6BJkdcPJ2OzKbc>
Subject: Re: [I2nsf] Many aspects are needed to seamlessly integrate vNSF to network (was RE: [Newsletter] Re: I2NSF charter for IESG Review
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Feb 2015 17:44:53 -0000

Yoav,

Does it mean that you also agree with Ed's suggestion that I2NSF can start with Flow Based Security Functions (instead of specific security devices because different vendors have different features on their devices)? AD Kathleen asked this question on the I2NSF list.

I had a face to face discussion with Ed again during ONF meeting last week. He pointed out that  all those security devices, such as FW/WebFilter/DPI/IPS/IDS/DPI.., are for enforcing some type of security policies to packets traversing through. They are just in different form factor (or device type) by today's vendors. Those device names & functions can change in the future.

Flow Based Security Functions provide treatment to packets/flows, such as IPS/IDS, Web filter, and Stateless flow filter. (They are different from Application layer security functions, such as email filter, virus treatment, etc. They are also different from policies to specify what types of encryption for certain traffic).

I2NSF can focus on specifying a mechanism to express "Flow Based Security Policies", as specified by the drafts: http://datatracker.ietf.org/doc/draft-strassner-i2nfs-info-model/
http://datatracker.ietf.org/doc/draft-xia-i2nsf-service-interface-dm/


I2NSF should not target at specifying entire configuration for a specific device, such as FW. As you said different vendors have different features.

I2NSF is only targeted at the "Flow based security policies", which is a subset of features provided by Security Devices.  Those policies can be requested by application gateways or clients for their specific need. Each vendor has its own "Adaptor" to convert those policies to its own specific command.


Linda


From: I2nsf [mailto:i2nsf-bounces@ietf.org] On Behalf Of Yoav Nir
Sent: Saturday, February 14, 2015 6:03 AM
To: i2nsf@ietf.org
Subject: Re: [I2nsf] Many aspects are needed to seamlessly integrate vNSF to network (was RE: [Newsletter] Re: I2NSF charter for IESG Review

Hi

I agree with Ed that this statement is problematic: "Since there could be many types of intents, the I2NSF will focus on the intents that are traditionally provided by FW/IPS/IDS", but for another reason.

FW/IPS/IDS are being used for a lot of kinds of policy enforcement that are not related to security. The example "my son can access *.facebook.com<http://facebook.com> only between 18:30 and 20:00" is a perfect example. It's policy, but it's not security policy. I guess most firewalls can enforce this particular intent, but how about "my son can play Farmville between 18:30 and 20:00"? Some firewalls can do that, but that can't be taken separately from "deep packet inspection", because without it the firewall can't tell farmville apart from just reading statuses on Facebook.

Just as "deep packet inspection" is a technology rather than an intent, there is also "URL filtering". An "intent" might be "no access to pornographic material", but can a firewall enforce this? It depends, because filtering pornography, blasphemy, and other types of undesirable material is often done using URL filtering. A firewall might have the technology, but is entirely dependent on being provided with a database of objectionable URLs, and such a database may or may not be provided by the firewall vendor, especially when the definition of "pornographic", "blasphemy", or even "NSFW" is location and culture specific.

I'm wondering how an API could reflect this, considering that every firewall has different APIs for both vendor-provided databases and external databases. So how do we communicate to the NSF that it should filter according to the "Hacking & Warez" database from URLfilterDB, and how can the NSF communicate back to the controller if that format is supported?

Yoav