Re: [ippm] On the integrity of IOAM data fields - new draft draft-brockners-ippm-ioam-data-integrity-00

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Thu, 25 February 2021 15:59 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D68ED3A1BBA; Thu, 25 Feb 2021 07:59:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=KyyBBMBw; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=RUuy3owi
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qgBe76vlxUVx; Thu, 25 Feb 2021 07:59:44 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D46803A1BA4; Thu, 25 Feb 2021 07:59:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=19128; q=dns/txt; s=iport; t=1614268778; x=1615478378; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Z+evwLTwCWMkmG+9Zj0+NuSxojseauLBWhOZ6vFI7ZY=; b=KyyBBMBwoU9dMWkMETozHoYwY2zuNde+6fFv/mN+LZcc6JJ8nRhc75Uz c5dPWu5ctGbZIsS0eINEFYxl2CzgWQEf0hweXwDDF5dq10MMn+5WOdPDV NEknCCmKYjqaQCwUaq9muSUrfJHAP5JG07yKxALrmaUu0Y90iB8s5FAM3 I=;
X-IPAS-Result: A0DeAABAyDdg/4cNJK1iGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBgg+BIzBRB3ZaNjEKAYQ2g0gDhTmIYwOKI4oKhHOBQoERA1QLAQEBDQEBHQEKCgIEAQGETQIXgWECJTgTAgMBAQEDAgMBAQEBBQEBAQIBBgRxhWENhkQBAQEBAwEBIQoTAQEsCwELBAIBCBEEAQEBIwQDAgICHwYLFAkIAQEEDgUIE4JWgX5XAy8BAwulLgKKJXaBMoMEAQEGgTcCg2kNC4ISAwaBOIJ2hAYBAYEMgxGCKCYcgUFCgRFDgikuPoIbQgEBAgGBIxErKwmCYDSCK4FYEWFZCwQNCzkCIC8MPTMIAw4eEBk6k2SHR51CWwqCfIk/jTKFTqNNHYYYjhmLPIMCjl6EfgICAgIEBQIOAQEGgWsjgVdwFTuCaVAXAg2OHwwWFIM5hRQchSlzAjYCBgEJAQEDCXyIU4E1AYEOAQE
IronPort-PHdr: 9a23:LXcu2RHIiLIyCzxvSN3dnJ1GYnJ96bzpIg4Y7IYmgLtSc6Oluo7vJ1Hb+e401QObUoDS6vYCgO3T4OjsWm0FtJCGtn1KMJlBTAQMhshemQs8SNWEBkv2IL+PDWQ6Ec1OWUUj8yS9Nk5YS8n7blzW5Ha16G1aFhD2LwEgIOPzF8bbhNi20Obn/ZrVbk1IiTOxbKk0Ig+xqFDat9Idhs1pLaNixw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.81,206,1610409600"; d="scan'208,217";a="652183922"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Feb 2021 15:59:37 +0000
Received: from mail.cisco.com (xbe-rcd-001.cisco.com [173.37.102.16]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 11PFxbU2021585 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 25 Feb 2021 15:59:37 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xbe-rcd-001.cisco.com (173.37.102.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Thu, 25 Feb 2021 09:59:37 -0600
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 25 Feb 2021 10:59:36 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 25 Feb 2021 10:59:36 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OK05WhW5iTuFNCw9RLfjN57QzjceWFy5/XYys9kvR6T9LOh5VgW/InaqG+P4E8oF+xxlruPA1w+ko5WItfoJXhjnOdlTeRoocf72jfnS0pfgY78gb2vZHC29sSJhpAB8OB0y7A1suKmTIFdKYQatUhtK3w2pyAOCx1VoAKItymWFclqk/KuhtyMKAm9VsOGp3cdQODMN9bIfLxSdc4Kr2vytNzkl5rrZ6koJFItJT3UTgdnjpxst3tJ/oFJuDsEpzCbJFQw1wpxWsG65+rH5CvRGPNXS/ABfgubOJn2bbM5kzP/sonejF15Ua6whbonVCo5EFKYW6Si9Tb7XXkn69A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Z+evwLTwCWMkmG+9Zj0+NuSxojseauLBWhOZ6vFI7ZY=; b=OWz7bddISlSv/0huOFeOkZPO59BdCldj2oCqrrsh1pKVqM6iPD0XZQYjgfqCndejZzZ1UgdrYW8/Aym1tvMwkY9ivADIp2NOUbr8RBTdMfYCib+MDtj0RycUWkd3kIfgWVR4MGdlM5e73RMYGsY8Mt112sDxfQs+QpAsFzvc5UpUHD/s3oghZmn+71YVB9YajDfHwYA82nBxt+bI5Ou2ml/vDjNbpHW9t/IFiQwTpZGCHwRKSJ0+Sy3TuU8rlfODgbn4hi1n4vZcP/KNySTM2a2MOih4OEh0mJy6hAAGznf36ioZbUEvYXzK+wT6ESqvOJDHdtgf8PXdgnsoow9p5Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Z+evwLTwCWMkmG+9Zj0+NuSxojseauLBWhOZ6vFI7ZY=; b=RUuy3owijVQUEKJ9+uz4O209nspKQxuPdMNGCAz1H8BLYX4RRssVXUWwke3P4VMuCnlGHK6vGlqgqdzXGoay9bGZcDqILBpj99aGZicAaozk+2Y94E66/83BmO6bXo+b+1mYrG02LERxvsgCLKK+dxXqcfZckJ5s10jBFhcnNQs=
Received: from BYAPR11MB2584.namprd11.prod.outlook.com (2603:10b6:a02:c8::31) by SJ0PR11MB4910.namprd11.prod.outlook.com (2603:10b6:a03:2d7::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20; Thu, 25 Feb 2021 15:59:35 +0000
Received: from BYAPR11MB2584.namprd11.prod.outlook.com ([fe80::a872:1bf5:965e:3763]) by BYAPR11MB2584.namprd11.prod.outlook.com ([fe80::a872:1bf5:965e:3763%7]) with mapi id 15.20.3868.033; Thu, 25 Feb 2021 15:59:35 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>, "Frank Brockners (fbrockne)" <fbrockne=40cisco.com@dmarc.ietf.org>
CC: IPPM Chairs <ippm-chairs@ietf.org>, IETF IPPM WG <ippm@ietf.org>
Thread-Topic: [ippm] On the integrity of IOAM data fields - new draft draft-brockners-ippm-ioam-data-integrity-00
Thread-Index: AdbzJUQeSNhmFamWSjG2Ti8S/kB80AJxBn2AA6ljzDA=
Date: Thu, 25 Feb 2021 15:59:35 +0000
Message-ID: <BYAPR11MB2584BF982C62F1C6ADD60A4ADA9E9@BYAPR11MB2584.namprd11.prod.outlook.com>
References: <SN6PR11MB2589138CDBB694A95D0DE15BDABD9@SN6PR11MB2589.namprd11.prod.outlook.com> <CA+RyBmXgkMcTSqqjqg-NZ6jWKMYhfa3d3QFgEOVw-skv5VfgUg@mail.gmail.com>
In-Reply-To: <CA+RyBmXgkMcTSqqjqg-NZ6jWKMYhfa3d3QFgEOVw-skv5VfgUg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [95.222.148.183]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 436b6ec4-4de6-4db7-6ea8-08d8d9a6591b
x-ms-traffictypediagnostic: SJ0PR11MB4910:
x-microsoft-antispam-prvs: <SJ0PR11MB491062CA3C5C51F0E01C1FD3DA9E9@SJ0PR11MB4910.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2584.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(376002)(346002)(396003)(136003)(39860400002)(33656002)(83380400001)(4326008)(2906002)(55016002)(71200400001)(166002)(5660300002)(9686003)(52536014)(86362001)(53546011)(478600001)(26005)(8936002)(9326002)(6506007)(8676002)(54906003)(110136005)(316002)(64756008)(66556008)(966005)(186003)(66446008)(66946007)(76116006)(66476007)(7696005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB2584BF982C62F1C6ADD60A4ADA9E9BYAPR11MB2584namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2584.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 436b6ec4-4de6-4db7-6ea8-08d8d9a6591b
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2021 15:59:35.4874 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 9vMx4DA8FEYqQ7umH6HmXADnXshNYT5pNI82wjA7zaGcgQVCnG0pbXt5LO3Ew5GEOHB2cqU5KuBrTk4RUtKLhA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB4910
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.16, xbe-rcd-001.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/EaclWuTSov0_A08ZmHBMzrMeGrc>
Subject: Re: [ippm] On the integrity of IOAM data fields - new draft draft-brockners-ippm-ioam-data-integrity-00
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Feb 2021 15:59:52 -0000

Hi Greg,

Thanks a lot for the review and feedback. We’ve included your idea of leveraging AH for those IOAM Option-Types which are not mutable by transit nodes into the draft as another candidate method: Method 5. See https://tools.ietf.org/html/draft-brockners-ippm-ioam-data-integrity-01 that we published on Monday this week.

Cheers, Frank

From: ippm <ippm-bounces@ietf.org> On Behalf Of Greg Mirsky
Sent: Sonntag, 7. Februar 2021 01:37
To: Frank Brockners (fbrockne) <fbrockne=40cisco.com@dmarc.ietf.org>
Cc: IPPM Chairs <ippm-chairs@ietf.org>; IETF IPPM WG <ippm@ietf.org>
Subject: Re: [ippm] On the integrity of IOAM data fields - new draft draft-brockners-ippm-ioam-data-integrity-00

Hi Frank and Authors,
thank you for preparing this well-written and really mature document. I fully agree with your opinion that IOAM security is not limited to identifying potential attack vectors and mitigating threats. This document provides implementors with a comprehensive set of mechanisms to protect the integrity of IOAM data fields.
While the draft gives us a detailed analysis of the potential threats and protection solutions for IOAM Trace Options, it could be helpful to expand the scope of the analysis by adding the Direct Export mode of IOAM. I think that for the Direct Export the native security mechanisms of IPv6, i.e., Authentication and Encapsulating Security Payload Headers (RFCs 4302 and 4303 respectively) can be used.

Regards,
Greg

On Mon, Jan 25, 2021 at 6:20 AM Frank Brockners (fbrockne) <fbrockne=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
Dear IPPM WG,

During the IETF last call, there's been a discussion on how to ensure the integrity of IOAM data fields for those deployments that require it (see e.g. the thread below).

The IPPM chairs inspired an "integrity-00" draft to facility the discussion and evolve towards a solution. We've just published a first cut at discussing the different threads along with outlining different methods for addressing the integrity of IOAM data fields: https://tools.ietf.org/html/draft-brockners-ippm-ioam-data-integrity-00.

It would be great to get a view on which method you see as preferable and for what reasons, along with whether anyone has any additional methods/solution approaches in mind.

Thanks,
Frank, Shwetha, Tal.

> -----Original Message-----
> From: Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>>
> Sent: Samstag, 28. November 2020 06:11
> To: Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>
> Cc: Tal Mizrahi <tal.mizrahi.phd@gmail.com<mailto:tal.mizrahi.phd@gmail.com>>; last-call@ietf.org<mailto:last-call@ietf.org>; MORTON,
> ALFRED C (AL) <acm@research.att.com<mailto:acm@research.att.com>>; IPPM Chairs <ippm-chairs@ietf.org<mailto:ippm-chairs@ietf.org>>;
> draft-ietf-ippm-ioam-data@ietf.org<mailto:draft-ietf-ippm-ioam-data@ietf.org>; IETF IPPM WG <ippm@ietf.org<mailto:ippm@ietf.org>>
> Subject: Re: [Last-Call] [ippm] Last Call: <draft-ietf-ippm-ioam-data-11.txt>
> (Data Fields for In-situ OAM) to Proposed Standard
>
> Hi Greg, Tal,
>
> On Thu, Nov 26, 2020 at 12:14:42PM -0800, Greg Mirsky wrote:
> >
> > On Wed, Nov 25, 2020 at 1:56 AM Tal Mizrahi
> > <tal.mizrahi.phd@gmail.com<mailto:tal.mizrahi.phd@gmail.com>>
> > wrote:
> > >
> > > On Tue, Nov 24, 2020 at 11:30 PM Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>
> > > wrote:
> > >
> > > I would suggest to consider a new IOAM option that incorporates an
> > > HMAC, which can be used alongside the conventional trace options.
> > > This would allow an optional integrity protection capability for
> > > those specific implementations that require it. This new option
> > > could be defined in a new draft, allowing the data draft to proceed
> > > to publication.
> > >
> > GIM>> I think that proceeding without addressing the essential
> > GIM>> security
> > issue of the protocol might be premature and may produce
> > implementations that are vulnerable to attacks.
>
> Thanks for raising this topic.
>
> Based on the discussion so far and skimming the first few sections of the draft, I
> expect that I would put a discuss ballot in to ensure the availability of a security
> mechanism such as this, which in effect would negate the intent to "allow the
> data draft to proceed to publication".
> That said, my stance could change as the thread continues or when I take a
> closer look at the whole document, so it is okay (from my point of view) if you
> (Tal) choose to wait and see if this does end up being a discuss point.
> That said, I'd of course prefer if you and Greg can find a solution and get it into
> place now :)
>
> Thanks,
>
> Ben

_______________________________________________
ippm mailing list
ippm@ietf.org<mailto:ippm@ietf.org>
https://www.ietf.org/mailman/listinfo/ippm