Re: [lisp] Secdir last call review of draft-ietf-lisp-rfc6830bis-15

Luigi Iannone <ggx@gigix.net> Tue, 11 September 2018 09:18 UTC

Return-Path: <ggx@gigix.net>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6C431310FD for <lisp@ietfa.amsl.com>; Tue, 11 Sep 2018 02:18:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gigix-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q--s5GvM_H9W for <lisp@ietfa.amsl.com>; Tue, 11 Sep 2018 02:18:03 -0700 (PDT)
Received: from mail-wr1-x42a.google.com (mail-wr1-x42a.google.com [IPv6:2a00:1450:4864:20::42a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9EDEA130E5C for <lisp@ietf.org>; Tue, 11 Sep 2018 02:18:02 -0700 (PDT)
Received: by mail-wr1-x42a.google.com with SMTP id g33-v6so24968933wrd.1 for <lisp@ietf.org>; Tue, 11 Sep 2018 02:18:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gigix-net.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=n5Y724u5OXBBefCq76QbkwEaAJCmLwZc4l8kZizCLmE=; b=FI5W/HF1NtjizkgUludyYFXWdBlUaP7lmljM7chywyn0F4Hnpu8YQ6+gLNkgAy6+P4 gXE851T9k9L7Q/ucfKbksZ6MAgpoJQ1+0VwtrNDKOXSEUwfYe0NQSjxU6ug3wHKuTCDy 75LsVFhqvMAYGJC1BTF7sitXDf2MTLb45l0RmsYoDJAIykm5WbQPBbJmvspr6fB3tBan 3bwYYZ3SiqpKxBoLK/Yiz+KXp7JcD6O7mc6YhtPUaAXcBG1o8j3uUxVF661MLXJ8Puzm Kjv0Ij5PycGfDSaSvFoUS/y9h0Sz9SxNWc5ujV/L++uhxEBeZJk0jSEtxH0StEWzAwY8 PyxQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=n5Y724u5OXBBefCq76QbkwEaAJCmLwZc4l8kZizCLmE=; b=BNMIyaKRD9Nk9FCWABbIKkEEaRKNuHKc/BMcec1eHPUsRWM3I3Gm7Tq3/GF1CPNsz4 Y2SvKgY+dW+Di8OXm8lyCKkSTz0zuI1dkpU6+m5scZbTwD9NHNj2FwkSWnsXieFudRND kF81pLxcbQSI9VsA/HmCDEOdAqo72k9KYLWJ5vEJz1detJi1E+TaEzcwKIbSpg1pint3 XJ7o1PBsKWmr9uztrKYxHN4WkPCwV4UkZ+ZCODsJmceO1qyKWHQkRuwrYz7y+WYRREtz knEUbos1u/vhF0YRiP6NHUJhpSZaoy+nLt9BSsU9Bw6dpF6/ZxgkZyg14mzElRz21wHn Qxug==
X-Gm-Message-State: APzg51AqaIUJM6mde4+4ugR0QdAgK197QGRS+vpFAdvoLgRvNvuhP5+k gdw5rcy/NH2Zf01x120fm9F//Q==
X-Google-Smtp-Source: ANB0VdZ2TE703+Co0QLym0A3pHRe2gHn4oJxyxOcpxp0AiHk1ZabCOSsF8QSmcc9Jwmk4jo+0y43XA==
X-Received: by 2002:a1c:b441:: with SMTP id d62-v6mr693199wmf.17.1536657481045; Tue, 11 Sep 2018 02:18:01 -0700 (PDT)
Received: from ?IPv6:2001:660:330f:a4:b493:b5af:65cf:aebf? ([2001:660:330f:a4:b493:b5af:65cf:aebf]) by smtp.gmail.com with ESMTPSA id y205-v6sm9837464wmc.3.2018.09.11.02.17.58 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 11 Sep 2018 02:17:58 -0700 (PDT)
From: Luigi Iannone <ggx@gigix.net>
Message-Id: <77109099-A756-4563-968C-5AC17FF38291@gigix.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_722DBC36-275B-4B0C-80DA-04799B4F7825"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 11 Sep 2018 11:17:57 +0200
In-Reply-To: <CAJU8_nUJ7BLJhgjw6Sa-xeY0=OpK4N2ffKLjZ-3m6+Uiws5wTw@mail.gmail.com>
Cc: Dino Farinacci <farinacci@gmail.com>, IETF SecDir <secdir@ietf.org>, draft-ietf-lisp-rfc6830bis.all@ietf.org, IETF Discussion Mailing List <ietf@ietf.org>, "lisp@ietf.org list" <lisp@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
To: Kyle Rose <krose@krose.org>
References: <153513922907.22939.10542350679349996082@ietfa.amsl.com> <FDA69FDF-696B-4959-AADB-0999630C723D@gmail.com> <CAJU8_nWwHAQYeo4oCVq=dVquRK1VhO-TdUKw5JmvbX1idWa=VA@mail.gmail.com> <A037BDB7-C780-4D44-A031-49F39AA3F11F@gmail.com> <CAJU8_nUJ7BLJhgjw6Sa-xeY0=OpK4N2ffKLjZ-3m6+Uiws5wTw@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/63O00EHsK0jkS7d3rFJ0AbOXkDs>
Subject: Re: [lisp] Secdir last call review of draft-ietf-lisp-rfc6830bis-15
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Sep 2018 09:18:12 -0000

Hi Kyle,

good for you having a break, hope you enjoyed your vacation.

Any thoughts about my last email on the subject?

Ciao

L.


> On 11 Sep 2018, at 04:13, Kyle Rose <krose@krose.org> wrote:
> 
> Apologies for the two-week absence: I've been on vacation (especially from email) for most of that period.
> 
> On Tue, Aug 28, 2018 at 6:17 PM, Dino Farinacci <farinacci@gmail.com <mailto:farinacci@gmail.com>> wrote:
> > The whole point of LISP is to create a routing overlay for the EID address space, the RIB of which is managed by a global mapping system, not BGP sessions. If control plane traffic managed by BGP (or static routes, or whatever networks use once the DFZ RIB is limited to entities in the core) continues to flow, that is of small comfort to end users trying to get data over the data plane. From the perspective of end users, BGP is being replaced routing of the traffic that matters to them.
> 
> That really is not true. You need both the overlay and underlay to get user traffic to flow.
> 
> Sure, just like you need link layer connectivity and closed circuits. User traffic is directly handled by the overlay, which is an added layer of novel complexity. When you add complexity, you inevitably add room for bugs and mysterious behavior. Anyway, I'm happy to drop this point for secdir because this is more of a general architectural observation than something specifically related to security.
>  
> >  * It does not resolve the trust anchor problem. Instead of proposing a PKI, you seem to be proposing a trusted third party authoritative for the Hash-EID namespace. (Q.v. section 2, the Hash-EID definition: "Another entity”)
> 
> The trust anchor is the mapping system. And that is the PKI. And the mapping system is distributed.
> 
> What PKI? That's part of what I'm trying to establish. How do entities decide to trust each other?
> 
> E.g., if entity A has pairwise trust with peer B, but needs an EID mapping for peer C, it needs some way to establish that the replies it's supposedly receiving from C are genuine. One popular model enabling you to do that without employing transitive trust is end-to-end signing chained to a trust anchor. With TLS as deployed on the web today, the trust anchors are a set of mostly mutually agreed-upon CA certificates that serve as roots for the certificates presented by every public web server. There are of course issues with this model (q.v., certificate transparency, Symantec), but its behavior is well-established and its properties are understood. What is the equivalent here?
> 
> It sounds like the answer here is mapping system-specific. E.g., from a quick perusal of the DDT draft, it sounds very DNSSEC-like (which might suggest a course of action to eliminate the need to develop, deploy, and maintain a custom security protocol, but that is a different discussion).
> 
> Where an interface is described without reference to a specific implementation, a set of assumptions (e.g., "correct routing relies on the authenticity of mapping system responses") and associated security requirements for any conforming mapping system (e.g., "entities making use of mapping system responses must have some way to authenticate them that does not rely on transitive trust") need to be stated for the document to be a complete description of a system component. That is, without first clearly defining the required properties of any valid implementation of described interfaces, there's no way to evaluate whether the component under review will do what it's supposed to.
> 
> A good place to put these assumptions and requirements is in the security considerations section: those statements are not normative for the system component described by the draft in which they appear, but are effectively requirements for whatever system component is to implement that interface in a conforming way. Enumerating them as such (in the document describing the interface in detail) allows the reader to evaluate the requirements in light of the system using the interface, while also providing a convenient checklist for those designing conforming systems.
> 
> A set of well-crafted security considerations sections also makes it much easier for a reviewer to understand the security of the system as a whole without having to understand the details of every implementation, and to verify that individual system components under review will have the appropriate behavior.
> 
> I'm going to skip the comments related to draft-farinacci-lisp-ecdsa-auth, just to limit scope here. We can get back to it once that document has been adopted and more fully fleshed-out.
> 
> > "TLS" does not appear anywhere in the draft of LISP-SEC I reviewed:
> 
> Right as I explained DTLS does.
> 
> Check again. Just to be sure, I've tried several tools and the letters "T", "L", and "S" do not appear consecutively anywhere in this document. Neither do "SSL" nor "transport-level security".
>  
> > I would like to see a discussion of whether and how the nature and scale of this problem differs from that of the status quo. BGP sessions and RIB push have properties that are well-established from decades of experience: surely LISP does not have exactly the same properties. The security considerations should make clear, for instance, how a loss of control plane connectivity differs from the loss of a BGP session, and how this impacts visibility and behavior of the data plane.
> 
> Please look at the deployment drafts. Please note, you are reviewing a document that is focusing on encapsulating packets on an overlay. All the other support pieces are broken out, in what the WG felt was logical, in sepreate documents.
> 
> I think this gets back to the point I made at the end of my original review, which is that this system is difficult to evaluate from a security perspective in a piecewise manner given the dependencies between the different layers and the lack of explicitly-enumerated security requirements for each system component implementing a given interface.
> 
> Kyle