Re: [ippm] Adoption call for IOAM deployment and integrity documents

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Tue, 17 August 2021 18:54 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 052DA3A2AD1 for <ippm@ietfa.amsl.com>; Tue, 17 Aug 2021 11:54:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.495
X-Spam-Level:
X-Spam-Status: No, score=-9.495 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=UO1VUS7j; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=XPUpI3cd
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sLsYHNyTWgSw for <ippm@ietfa.amsl.com>; Tue, 17 Aug 2021 11:54:31 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C1F43A2A35 for <ippm@ietf.org>; Tue, 17 Aug 2021 11:54:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25438; q=dns/txt; s=iport; t=1629226471; x=1630436071; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=FbJU+ncG913GB9fD4wqC3ijAOhYrCRDJMPtBNv9Brv8=; b=UO1VUS7jGzyLxgvfc9meZeig9zKQDqedCY4JCFn71mX+ndYXbL5o6+bm NM9NiW0ZWYBKYKcGRYfIiEziz+oTBSXTOW4hGISe/W4J7cHNlqp4yq98k OGtPvhPGwPONKldIorEFQiAF0iAsDYl9pwMfmnBxqmvi1Zr7KjJY96J7J w=;
IronPort-PHdr: A9a23:sCcSZBIMCPRVquVkHNmcuX8yDhhOgF28FgcJ9twsjLcdOqig/pG3OkvZ6L0tiVLSRozU5rpCjPaeqKHvX2EMoPPj+HAPeZBBTVkJ3MMRmQFzCdKZT0b8Ka2iYykzBs8XUlhj8jmyOlRUH8CrYVrUrzWy4DceFw+5OxByI7H+G5XZiIK80OXhk6A=
IronPort-HdrOrdr: A9a23:Zc1Ojal8TzHa5l4QQXh8RwtKApHpDfOHimdD5ihNYBxZY6Wkfp+V/cjzhCWbtN9OYh4dcIi7SdW9qADnhOFICOgqTPmftWzd2FdAQ7sSlbcKrweQfhEWs9QtqJuIEJIOSeEYb2IK9voSiTPQe71LrbX3k9HLuQ6d9QYWcegAUdAG0+4NMHfjLqQAfnghOXNWLuv52uN34x6bPVgHZMWyAXcIG8LZocfQqZ7gaRkaQzY69Qinl1qTmf7HOind+i1bfyJEwL8k/2SAuRf+/L+fv/ayzQKZ/3PP7q5RhMDqxrJ4dY+xY4kuW3fRYzSTFcBcso65zXcISSaUmRAXeez30lId1gJImirsly+O0EPQMkLboUgTAjfZuC6laD3Y0JfErPZQMbsduWqfGSGpsXbI9esMoJ5jziaXsYFaAgjHmzm479/UVwtynk7xunY6l/UP5kYvG7f2RYUh5bD3xnklW6vo3RiKnLwPAa1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJg3cw1YgahDMN5Zg9Q55L66DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3dk7lutry+vE49euqcJsHwN87n4nASkpRsSood0fnGaS1rdR2G9D2MROAtBHWu45jDrRCy8/BrYvQQFq+oQoV4ridSt0kc7jmZ8o=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D9CwCSBRxh/4oNJK1aH4JDgSMwUQd3WjcxA4REgV+BZwIDhTmGRYIkA5o8gUKBEQNUAwgBAQENAQEwEQQBAYMsgTYCF4JYAiU3Bg4BAgQBAQESAQEFAQEBAgEGBIERE4VoDYZCAQEBAQMSCwYKEwEBJRMPAgEGAhABBAEBKAMCAgIwFAkIAgQBEggTB4JQgX5XAy8BDow+jzQBgToCih96gTGBAYIHAQEGBASBOgIOQYMjGII0AwaBOoJ+gnJTSAEBgmyDeiccgUlEgRVDgjIwPoJiAQEBAQGBKAESASMrCYJhNoIMIoNNJoEwAQMNJREOAmZfDwMVARUBAgMLGREykVSDM4hXjUGRDoEPCoMoij+ULhKDZYtjhkSQaZYTjD6TWASFAwIEAgQFAg4BAQaBdiVpcHAVgyRQGQ6NfoQUhRSFSnMCATUCAwMBCgEBAwmKCgEB
X-IronPort-AV: E=Sophos;i="5.84,329,1620691200"; d="scan'208,217";a="828424394"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Aug 2021 18:54:23 +0000
Received: from mail.cisco.com (xbe-aln-007.cisco.com [173.36.7.22]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 17HIsN9I013002 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 17 Aug 2021 18:54:23 GMT
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xbe-aln-007.cisco.com (173.36.7.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 17 Aug 2021 13:54:23 -0500
Received: from xfe-rtp-005.cisco.com (64.101.210.235) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Tue, 17 Aug 2021 13:54:22 -0500
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-005.cisco.com (64.101.210.235) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Tue, 17 Aug 2021 14:54:22 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LU3Ts80mnRFAtMLOgWoUGM+qxjb67M5SjarqvNL7cN7zG+f+bV4ov5H5p6+qb77tDdhp8/8Edw1O/Crg8sDUy4McDASXGbRWrmrfQaY1iwUke9iWV6hWkTeF7tZ+dgyhl7P+P7EDht9GcAa6mR8QpT7QoLMiC/N5de3w+3Fo8I3EjhYSYSiL3OHUHF90wDAJi+tsD8rjNrR/HBtdl1jhq5GXwUFyBYzBFDYjkz5iQbZnBBTb3YMomt7A46sMaWhRYnx8hqXfRozvCUxfkVk0S5J4IBcUSmEDkKi76VP3XUlWktMxZ6lzaFbhJfQEF8kF0x8Tq6N+JZJfRJGahrxh4A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FbJU+ncG913GB9fD4wqC3ijAOhYrCRDJMPtBNv9Brv8=; b=T2HpH36R5cjtsPlH4BntuGWaMy8vSbZc5DOxtaglPuXSzlKE+BYyIjSS0pyZR5g53Jkez7RUJx58NNjy30gD4/AY2R0hzDPc7AUH7Y0SBBW+0lqWTBINCZbqo5tJMKNk+2ng113uu2eiSjVH0eAhv+8ri2dUIPhG8lmLhgHzqXEFb3jFMMc/FuEL/fbSvWgSNWGQAeN9HntpeLA05zUS/+xEgEArt66ai+DJ1kFTOVOgd6JPmoBNLJn0QJGv980MGppTh8ZupRr0dROQapY1LIO7syWWgtdys+b4Jif8PeP7Fi9w0cyYezBQ0F1CE1nqOQXd1z/KqZwSK/F+p5QjSw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FbJU+ncG913GB9fD4wqC3ijAOhYrCRDJMPtBNv9Brv8=; b=XPUpI3cdh00YYj+SCv/HJg3syTfUbrs01ENTTQ9d0FI0WnmFuGaT0rU3m4bit5cee5wtc5hQzbyga+N8iFVklapBBxQ0vsA0U5l4ddCw5jO8nqR9PeTVSYQ5oLa1jz/ae8geWvbBsQLHZPrc7IXFocmFo3E0lDrpnc3jdFG0oy0=
Received: from DM8PR11MB5606.namprd11.prod.outlook.com (2603:10b6:8:3c::23) by DM8PR11MB5624.namprd11.prod.outlook.com (2603:10b6:8:35::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4415.19; Tue, 17 Aug 2021 18:54:21 +0000
Received: from DM8PR11MB5606.namprd11.prod.outlook.com ([fe80::a1e1:3a20:1e56:60b5]) by DM8PR11MB5606.namprd11.prod.outlook.com ([fe80::a1e1:3a20:1e56:60b5%8]) with mapi id 15.20.4415.024; Tue, 17 Aug 2021 18:54:21 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: "MORTON JR., AL" <acmorton@att.com>, Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>, "IETF IPPM WG (ippm@ietf.org)" <ippm@ietf.org>
Thread-Topic: [ippm] Adoption call for IOAM deployment and integrity documents
Thread-Index: AQHXiISx+Bx+bKdW1kyg2ynIN68Qj6t1V3yAgALI8iA=
Date: Tue, 17 Aug 2021 18:54:21 +0000
Message-ID: <DM8PR11MB5606E9915C97BDBABC65C31CDAFE9@DM8PR11MB5606.namprd11.prod.outlook.com>
References: <69C9F697-A970-41DD-B7EF-0C17204D57AA@apple.com> <SJ0PR02MB785348BFDADE7B118AF5221BD3FD9@SJ0PR02MB7853.namprd02.prod.outlook.com>
In-Reply-To: <SJ0PR02MB785348BFDADE7B118AF5221BD3FD9@SJ0PR02MB7853.namprd02.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: att.com; dkim=none (message not signed) header.d=none;att.com; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c846e9da-dfd8-4bfe-14a5-08d961b06cc4
x-ms-traffictypediagnostic: DM8PR11MB5624:
x-microsoft-antispam-prvs: <DM8PR11MB5624209365F47748A77C0C1EDAFE9@DM8PR11MB5624.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM8PR11MB5606.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(346002)(396003)(376002)(39860400002)(136003)(38100700002)(966005)(53546011)(5660300002)(122000001)(64756008)(8676002)(55016002)(38070700005)(7696005)(33656002)(6506007)(66556008)(66446008)(86362001)(9326002)(83380400001)(9686003)(8936002)(26005)(110136005)(316002)(52536014)(186003)(76116006)(66476007)(478600001)(2906002)(66946007)(166002)(71200400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM8PR11MB5606E9915C97BDBABC65C31CDAFE9DM8PR11MB5606namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM8PR11MB5606.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c846e9da-dfd8-4bfe-14a5-08d961b06cc4
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Aug 2021 18:54:21.4960 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JxNPd6ecqu/HYGebZoU6/vSL555vwZu82GUTyM/jZUeS3bmCxg6f3KT4qbkCF8nrTAMX5rEvyVFI2UWQwjpM8Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR11MB5624
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.22, xbe-aln-007.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/1mpCjKoeFcwaGq2PMIEu2NSMARs>
Subject: Re: [ippm] Adoption call for IOAM deployment and integrity documents
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Aug 2021 18:54:37 -0000

Hi Al,

Thanks a lot for your review and support. Please see inline.

From: ippm <ippm-bounces@ietf.org> On Behalf Of MORTON JR., AL
Sent: Montag, 16. August 2021 02:19
To: Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>; IETF IPPM WG (ippm@ietf.org) <ippm@ietf.org>
Subject: Re: [ippm] Adoption call for IOAM deployment and integrity documents

Hi Tommy, Authors, and IPPM,

I took a look at one of the drafts the WG is considering:

For Integrity of In-situ OAM Data Fields, I got tripped-up by the first sentence of the Abstract 😊,

   In-situ Operations, Administration, and Maintenance (IOAM) records
   operational and telemetry information in the packet while the packet
   traverses a path between two points in the network.

I read “records” as a noun, not as a verb as I now see was intended. maybe s/records/collects/ to resolve that ambiguity.

…FB: That is a good suggestion. We’ll use “collect” instead of “record” moving forward.

Then the second sentence:

   ...  IOAM deployments
   could require ensuring the integrity of IOAM data fields.

Maybe we can say more specifically what needs to be done, something like:

IETF protocols require features to ensure their security; this document describes integrity protect for IOAM data fields.
…FB: Another good suggestion. Similar to what you note below, the heritage of the above sentence is that the document started as an informational document discussing options for integrity protection.


In the Intro, after saying:
   As such, IOAM tracing data is carried in
   the packets in clear and there are no protections against any node or
   middlebox tampering with the data.

the draft says:
...  As a consequence, IOAM tracing
   data collected in an untrusted or semi-trusted environments cannot be
   trusted for critical operational decisions.

I think this is where the draft should indicate that a form of integrity protection is the solution to the problem, such as:

...IOAM tracing data collected in an untrusted or semi-trusted environments
   requires integrity protection to support critical operational decisions.

Parts of the intro need to move beyond the “this is for IPPM WG study” phase, to the “here’s the integrity protection solution(s)” voice.

…FB: Good points. We’ll fix those in the next rev – and ensure that the doc uses the appropriate language for a standards track document.

Otherwise, the threat analysis is useful, and the Methods of providing integrity to IOAM data fields seem clear.

I support the adoption of “Integrity of In-situ OAM Data Fields” for additional development by the WG.

Thanks again Al.

Cheers, Frank

Al


From: ippm <ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org>> On Behalf Of Tommy Pauly
Sent: Tuesday, August 3, 2021 12:29 PM
To: IETF IPPM WG (ippm@ietf.org<mailto:ippm@ietf.org>) <ippm@ietf.org<mailto:ippm@ietf.org>>
Subject: [ippm] Adoption call for IOAM deployment and integrity documents

Hello IPPM,

As discussed in our meeting last week, we will be starting an adoption call for two IOAM-related documents that have been raised as important dependencies during the IESG review of IOAM-data.

This email begins a Working Group adoption call for two documents:

Integrity of In-situ OAM Data Fields
https://datatracker.ietf.org/doc/draft-brockners-ippm-ioam-data-integrity/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-brockners-ippm-ioam-data-integrity/__;!!BhdT!0Ny1D5V4maIuQ6qGnzMqhb2g1XeWhqAWW3MMMWLT5TI-730YRx2JHVbaSFNx$>
https://www.ietf.org/archive/id/draft-brockners-ippm-ioam-data-integrity-03.html<https://urldefense.com/v3/__https:/www.ietf.org/archive/id/draft-brockners-ippm-ioam-data-integrity-03.html__;!!BhdT!0Ny1D5V4maIuQ6qGnzMqhb2g1XeWhqAWW3MMMWLT5TI-730YRx2JHQVTAIy3$>

In-situ OAM Deployment
https://datatracker.ietf.org/doc/draft-brockners-opsawg-ioam-deployment/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-brockners-opsawg-ioam-deployment/__;!!BhdT!0Ny1D5V4maIuQ6qGnzMqhb2g1XeWhqAWW3MMMWLT5TI-730YRx2JHUSOBrbQ$>
https://datatracker.ietf.org/doc/html/draft-brockners-opsawg-ioam-deployment-03<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-brockners-opsawg-ioam-deployment-03__;!!BhdT!0Ny1D5V4maIuQ6qGnzMqhb2g1XeWhqAWW3MMMWLT5TI-730YRx2JHWwp9dBH$>

This call will last until Wednesday, August 18. Please reply to this email with your comments, and if you think these documents should be taken on by IPPM.

Best,
Tommy & Ian