Re: [I2nsf] AD Review of draft-ietf-i2nsf-applicability-07

"Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com> Tue, 25 December 2018 14:42 UTC

Return-Path: <jaehoon.paul@gmail.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE532130E03 for <i2nsf@ietfa.amsl.com>; Tue, 25 Dec 2018 06:42:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.5
X-Spam-Level:
X-Spam-Status: No, score=-0.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HK_NAME_FM_MR_MRS=1.499, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F5YdYCXbP0Qx for <i2nsf@ietfa.amsl.com>; Tue, 25 Dec 2018 06:42:38 -0800 (PST)
Received: from mail-it1-x12d.google.com (mail-it1-x12d.google.com [IPv6:2607:f8b0:4864:20::12d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C109E12D4E6 for <i2nsf@ietf.org>; Tue, 25 Dec 2018 06:42:37 -0800 (PST)
Received: by mail-it1-x12d.google.com with SMTP id m62so18498259ith.5 for <i2nsf@ietf.org>; Tue, 25 Dec 2018 06:42:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Yvq7V/NLYsgitS/hToQA62QPy5hs3dlbfCZoaop62hY=; b=HG/4xUrAmg8jKa7ET/DU003YrQdTWSb1xzEXMaIgDfjmPmwv7cKZPyn6qBU/QLMdPq Fh8/t9OMR2tkLB75pXl5XqR46UIEQPOLXepCDOkERQkQ3wXAn9TnxCYdYAFjDosBdgj3 I46xdmWJPiLUkCTnRjqQv/2ZuJQwDR9yc0G+1IbNbyuIoatqH1Ps0U3Gu5zafQrIdkhK cNCBfECM91sNzOYtvNz1LuzC1PL77qlMuQeWQF6Li93NuGsTL56GWJtozZGq0NHHV8oh 8QrffP560A5CkCcZtZZvf/QX+JQzOYX+Dk01cv2VKv7X50ScDQFfKpDTDv+mlHW9LMep 1a/w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Yvq7V/NLYsgitS/hToQA62QPy5hs3dlbfCZoaop62hY=; b=F4Z1EHSsKHKxT3hDc8E3OHJMXrjvNOuDIdwwDSa5V5WXbr1v3EFRr1VRlFl0Wej04J 604kiK3fvJfbwh8bTQT/8DS0vQetL8K9H7rJ14bQ8FamhMfHu82nr9GetvI1guECDyBu +KkkxtHsP0/0GxlU+kcJsruJbvsYCW6lrd1BFS78ysFmfEodExaBBiClj4mpTY8p4XJq 8pN8Xk21dBUCnr/aZpF7RAFDfRHGdc9JDCXPNhDLCNWyo6VCqs7mRydikptm+5/zQ/vm iqCArmngFtmCksw5SLnbKz/2px0WDmW8yKr4ghBhXVjdogf6CopVkfFg9e0jEYiLdK2W iz5Q==
X-Gm-Message-State: AJcUukc13iIpExkBoR1yjlJtIDY4PtGTu1qC8JS9YbzLclOW5EVhIJ6s kmIseIPOGECRa+0LrOibt+ux4w2d8T+lQe55f4o=
X-Google-Smtp-Source: ALg8bN7g6pHDwR0Pn3mpZyXAAHmoBlRZwUnrhlIvVlVgbSDFu3KhDa7DNMOHVIO+7jVKMnySHnujcgPSJutSEaglPG4=
X-Received: by 2002:a24:2914:: with SMTP id p20mr3004227itp.156.1545748956840; Tue, 25 Dec 2018 06:42:36 -0800 (PST)
MIME-Version: 1.0
References: <CABcZeBOjhEpw4gNDRgJD=FCWy1Wrirz_EsJefJjDHpp5mVe1fw@mail.gmail.com>
In-Reply-To: <CABcZeBOjhEpw4gNDRgJD=FCWy1Wrirz_EsJefJjDHpp5mVe1fw@mail.gmail.com>
From: "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>
Date: Tue, 25 Dec 2018 23:41:59 +0900
Message-ID: <CAPK2DewE2vbjAr41xErxnjmxK2CTmK2h9fXFTBSFCigpNj9XPQ@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>, Linda Dunbar <linda.dunbar@huawei.com>, Yoav Nir <ynir.ietf@gmail.com>
Cc: "i2nsf@ietf.org" <i2nsf@ietf.org>, skku_secu-brain_all@googlegroups.com, "Mr. Jaehoon Paul Jeong" <jaehoon.paul@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000007c0738057dd9b939"
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/np64-GEPESaIj4yBrslhoe8INtE>
Subject: Re: [I2nsf] AD Review of draft-ietf-i2nsf-applicability-07
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Dec 2018 14:42:41 -0000

Hi Eric, Linda and Yoav,
I have reflected all the comments from Eric and submitted the revision -08
as follows:
https://tools.ietf.org/html/draft-ietf-i2nsf-applicability-08

The changes are described in Appendix A of -08 document as follows:
-------------------------------------------------------------------------------------------------
Appendix A.  Changes from draft-ietf-i2nsf-applicability-07

   The following changes have been made from
   draft-ietf-i2nsf-applicability-07:

   o  This version has reflected all the comments from Eric Rescorla who
      is a Security Area Director as follows.

   o  In Section 1, Network Security Function (NFV) is defined in the
      viewpoint of the I2NSF framework.

   o  In Section 1, a user using the I2NSF User is clarified as a system
      administrator in the I2NSF framework.

   o  In Section 1, as the applicability of the I2NSF framework, four
      different scenarios are represented with a standard bulleted list.

   o  The standard document about ETSI-NFV is moved to Normative
      References.

   o  In Section 2, key terms (e.g., Network Function, Network Security
      Function, Network Functions Virtualization, and Servive Function
      Chaining) are internally defined along with the reference to open
      specifications.

   o  In Section 2, the definition of Firewall is corrected such that
      some suspicious packets are inspected by the firewall rather than
      every packet.

   o  In Section 3, for a Developer's Management System, the problem of
      an inside attacker is addressed, and a possible solution for the
      inside attacks is suggested through I2NSF NSF monitoring
      functionality.

   o  In Section 4, an XML file for the RESTCONF/YANG for the time-
      dependent web access control is pointed out with a reference to
      the Consumer-Facing Interface's data model
      [consumer-facing-inf-dm].

   o  In Section 6, the definitions of an SDN forwarding element and an
      NSF are clarified such that an SDN forwarding element is a switch
      running as either a hardware middle box or a software virtual
      switch, and an NSF is a virtual network function for a security
      service.

   o  In Section 6.3, a flow forwarding path management scheme in
      [AVANT-GUARD] is described in a self-contained way as follows.
      For DDoS-attack mitigation, the forwarding of traffic flows in
      switches can be dynamically configured such that malicious traffic
      flows are handled by the paths separated from normal traffic flows
      in order to minimize the impact of those malicious traffic on the
      the servers.  This flow path separation can be done by a flow
      forwarding path management scheme based on [AVANT-GUARD].

   o  Some typos are corrected such as "Interner -> Internet",
      "Registation -> Registration", "The low-level security rules for
      web filter checks -> The low-level security rules for web filter
      check", "fltering -> filtering", "illegal packets -> malicious
      packets", "manipulate rules -> configure rules", "managenent ->
      management", and "DDoS-attack mitigation operations -> DDoS-attack
      mitigation".
-------------------------------------------------------------------------------------------------

Thanks and Merry Christmas!

Best Regards,
Paul

On Fri, Dec 21, 2018 at 11:33 PM Eric Rescorla <ekr@rtfm.com> wrote:

> Rich version of this review at:
> https://mozphab-ietf.devsvcdev.mozaws.net/D3181
>
>
> I found a number of typographical and grammar errors. Please give this
> document a thorough read.
>
> IMPORTANT
> S 1.
> >
> >      Interface to Network Security Functions (I2NSF) defines a framework
> >      and interfaces for interacting with Network Security Functions
> >      (NSFs).  The I2NSF framework allows heterogeneous NSFs developed by
> >      different security solution vendors to be used in the Network
> >      Functions Virtualization (NFV) environment [ETSI-NFV] by utilizing
>
> Much of this document cannot be understood without reading ETSI-NFV,
> so it has to be a normative reference. It also would be helpful to
> provide a link.
>
>
> S 2.
> >      This document uses the terminology described in [RFC7149],
> >      [ITU-T.Y.3300], [ONF-OpenFlow], [ONF-SDN-Architecture],
> >      [ITU-T.X.1252], [ITU-T.X.800], [RFC8329], [i2nsf-terminology],
> >      [consumer-facing-inf-im], [consumer-facing-inf-dm],
> >      [i2nsf-nsf-cap-im], [nsf-facing-inf-dm], [registration-inf-dm], and
> >      [nsf-triggered-steering].  In addition, the following terms are
>
> Every term in this document needs to be understandable without
> reference to closed specifications or internally defined. Please
> ensure that this is so,
>
>
> S 3.
> >      used for the I2NSF NSF-Facing Interface.
> >
> >      The Registration Interface between the Security Controller and the
> >      Developer's Management System can be implemented by RESTCONF
> >      [RFC8040].  The data model defined in [registration-inf-dm] can be
> >      used for the I2NSF Registration Interface.
>
> What role does the Developer's Management System play in this? I think
> this refers to the text above starting with "The developers (or
> vendors)...". Is that correct?
>
> Assuming I am correct, this seems like a potentially serious security
> vulnerability in this design in that it potentially allows an inside
> attacker at the developer to seriously weaken a system's security.
> What protections exist to prevent this?
>
>
> S 4.
> >      administrator wants to control the staff members' access to a
> >      particular Interner service (e.g., Example.com) during business
> >      hours.  The following is an example high-level security policy rule
> >      that the administrator requests: Block the staff members' access to
> >      Example.com from 9 AM to 6 PM.  The administrator sends this high-
> >      level security policy to the Security Controller, then the Security
>
> The text above suggests that high-level policies are via
> RESTCONF/YANG, but this is clearly freeform text.
> COMMENTS
> S 1.
> >
> >   1.  Introduction
> >
> >      Interface to Network Security Functions (I2NSF) defines a framework
> >      and interfaces for interacting with Network Security Functions
> >      (NSFs).  The I2NSF framework allows heterogeneous NSFs developed by
>
> Please define "Network Security Functions" here.
>
>
>
>
> S 1.
> >      functions in the NFV platform.  In the I2NSF framework, each NSF
> >      initially registers the profile of its own capabilities into the
> >      system in order for themselves to be available in the system.  In
> >      addition, the Security Controller is validated by the I2NSF Client
> >      (also called I2NSF User) that the user is employing, so that the
> user
> >      can request security services through the Security Controller.
>
> In this case the user is the system administrator.
>
>
> S 1.
> >      [RFC7149] to provide different security functionality such as
> >      firewalls [opsawg-firewalls], Deep Packet Inspection (DPI), and
> >      Distributed Denial of Service (DDoS) attack mitigation; (iv) the use
> >      of NFV as supporting technology.  The implementation of I2NSF in
> >      these scenarios has allowed us to verify the applicability and
> >      effectiveness of the I2NSF framework for a variety of use cases.
>
> This would be easier to read with a standard bulleted list.
>
>
> S 2.
> >         network resources, which facilitates the design, delivery and
> >         operation of network services in a dynamic and scalable manner
> >         [ITU-T.Y.3300].
> >
> >      o  Firewall: A service function at the junction of two network
> >         segments that inspects every packet that attempts to cross the
>
> Nit: It might not inspect *every* packet.
>
>
> S 4.
> >
> >   4.  Time-dependent Web Access Control Service
> >
> >      This service scenario assumes that an enterprise network
> >      administrator wants to control the staff members' access to a
> >      particular Interner service (e.g., Example.com) during business
>
> Nit: "Internet"
>
>
> S 4.
> >      inspection capability is required to check whether the target URL of
> >      a received packet is in the Example.com domain or not.
> >
> >      The Security Controller maintains the security capabilities of each
> >      NSF running in the I2NSF system, which have been reported by the
> >      Developer's Management System via the Registation interface.  Based
>
> Nit: "Registration"
>
>
> S 4.
> >      currently using the network.  Based on the retrieved information,
> the
> >      Security Controller generates low-level security rules to check
> >      whether the source IP address of a received packet matches any one
> >      being used by a staff member.  In addition, the low-level security
> >      rules should be able to determine that a received packet is of HTTP
> >      protocol.  The low-level security rules for web filter checks that
>
> Nit: "rules"... "checks" disagree.
>
>
> S 6.
> >      translated into their packet forwarding rules, whereas NSFs enforce
> >      NSF-related security rules requiring the security capabilities of
> the
> >      NSFs.  For this purpose, the Security Controller instructs the SDN
> >      Controller via NSF-Facing Interface so that SDN forwarding elements
> >      can perform the required security services with flow tables under
> the
> >      supervision of the SDN Controller.
>
> I'm having some trouble understanding the difference here between NSFs
> and SDN elements. They both seem to be software controlled network
> elements. Is this just some continuum about CPU power?
>
>
> S 6.
> >      can perform the required security services with flow tables under
> the
> >      supervision of the SDN Controller.
> >
> >      As an example, let us consider two different types of security
> rules:
> >
> >      Rule A is a simple packet fltering rule that checks only the IP
>
> Nit: "filtering"
>
>
> S 6.2.
> >          packets that have the same call-id.
> >
> >      6.  The SDN Controller installs new rules (e.g., drop packets) into
> >          underlying switches.
> >
> >      7.  The illegal packets are dropped by these switches.
>
> "Illegal" is probably the wrong wrod here.
>
>
> S 6.3.
> >         is helpful to determine security policies for such a network.
> >
> >   6.3.  Attack Mitigation: Centralized DDoS-attack Mitigation System
> >
> >      A centralized DDoS-attack mitigation can manage each network
> resource
> >      and manipulate rules to each switch through a common server for
> DDoS-
>
> "manipulate rules to" is not grammatical.
>
>
> S 6.3.
> >
> >      Servers are categorized into stateless servers (e.g., DNS servers)
> >      and stateful servers (e.g., web servers).  For DDoS-attack
> >      mitigation, traffic flows in switches are dynamically configured by
> >      traffic flow forwarding path management according to the category of
> >      servers [AVANT-GUARD].  Such a managenent should consider the load
>
> 1. This seems hard to understand without this reference, which is not
> public.
> 2. "management"
>
>
> S 6.3.
> >      mitigation, traffic flows in switches are dynamically configured by
> >      traffic flow forwarding path management according to the category of
> >      servers [AVANT-GUARD].  Such a managenent should consider the load
> >      balance among the switches for the defense against DDoS attacks.
> >
> >      The procedure of DDoS-attack mitigation operations in this system is
>
> "procedure of... operations" is ungrammatical
>
>

-- 
===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Associate Professor
Department of Software
Sungkyunkwan University
Office: +82-31-299-4957
Email: jaehoon.paul@gmail.com, pauljeong@skku.edu
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php
<http://cpslab.skku.edu/people-jaehoon-jeong.php>