Re: [lisp] [secdir] Secdir early review of draft-ietf-lisp-nexagon-04

David Mandelberg <david@mandelberg.org> Mon, 19 October 2020 23:34 UTC

Return-Path: <david@mandelberg.org>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD9C03A1011 for <lisp@ietfa.amsl.com>; Mon, 19 Oct 2020 16:34:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.346
X-Spam-Level:
X-Spam-Status: No, score=-2.346 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.247, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mandelberg.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yQ6-Bmo9OM-0 for <lisp@ietfa.amsl.com>; Mon, 19 Oct 2020 16:34:42 -0700 (PDT)
Received: from mail-vs1-xe63.google.com (mail-vs1-xe63.google.com [IPv6:2607:f8b0:4864:20::e63]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81CF83A113D for <lisp@ietf.org>; Mon, 19 Oct 2020 16:34:42 -0700 (PDT)
Received: by mail-vs1-xe63.google.com with SMTP id f8so29483vsl.3 for <lisp@ietf.org>; Mon, 19 Oct 2020 16:34:42 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:dkim-signature:from:subject:to:cc:references :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=8FAmYK2yuYodu2OswGS2CV1ovbpu8jAz37HpbPVqLUA=; b=NaIboiBQIcBND9NIhAc/HYHBrmKYSOGSEP/JL3EIsVLVWddRwbtirK6jM+PUjxMoly uXIm66Md+1Oij4dXcnbtqid1ae2SW+EepHS64fZX8ITfEPGuo7YaFcJ6pZMquqPpLEqP sJ0HHVGQe+yYpnEnMYThQzBpo+hBsmQ41hDNAdnT+QSb8Q7ql0szBsyFtuCPl4V2wiS9 bcnBzBvrAzlpsGyIkSQwpmZ2Z8oKLzwtFX8xYBW1D9eQSM8hTGXojAiheT+DhbBAvUxI ZTuHu8qQG+wKA62qp9N2PONbCt/9qNeoX0gFIraMYLzIU2UFqTWkXJm8++XfiW9XVsxA lmRA==
X-Gm-Message-State: AOAM531tPEQO6u5ceF7kAT3jeHe7WtkSbK8pCINZlwiZReQGdAjvtBeD v5yeK5dd1JbFUaEB7uxwI6RGsyCrMWUQtnqkCkvRbbjGRl/T0w==
X-Google-Smtp-Source: ABdhPJy1IhMveUHtj7sdU/8r35GkRyaSkXQS69sGre8R8wJFwcB6sT4Km3EmK0AXO4aS1K7vNunU6RBRznEg
X-Received: by 2002:a05:6102:1249:: with SMTP id p9mr31685vsg.51.1603150478756; Mon, 19 Oct 2020 16:34:38 -0700 (PDT)
Received: from uriel.mandelberg.org (pool-100-0-196-177.bstnma.fios.verizon.net. [100.0.196.177]) by smtp-relay.gmail.com with ESMTPS id b16sm21483vka.6.2020.10.19.16.34.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Oct 2020 16:34:38 -0700 (PDT)
X-Relaying-Domain: mandelberg.org
Received: from [192.168.1.162] (nevia [192.168.1.2]) by uriel.mandelberg.org (Postfix) with ESMTPSA id B21001C6057; Mon, 19 Oct 2020 19:34:37 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mandelberg.org; s=202009; t=1603150477; bh=pEcYiDvtE5kPU6kO8XtZMMSwYYtA4OXN7vdMxSiTqQE=; h=From:Subject:To:Cc:References:Date:In-Reply-To:From; b=vU3izEnjQJ57ZvQp+/cLsaO4Ej43Cd030WjS51KlmkFPiT//Eds6Nvhn74xNP4dyD d08NWAR/nZJN67NtiN6BO4rqHMrzue/9cPUBOABCLqjzBND769Xg6Fx/qAkAzn6gZ0 L5ivgTRiEi5hZ5QZf3kfwYgLAlza8dpHi2KcyeOds7BZd7oUj1L23YkpbgaooGRfeI oRPtaBdf5Mf/fa6FTxMpdk2VTlCSYDdEg/FLYAPo6oLf8gvjPf+nXbbIU/elwJvYtj ngeoHDgYPbdVIJpyPgJv7F/Hca6+JcO9HvQoeb4MKtbrk4aertk1CwbUKkuNAeU4M3 na/DVNcoDpGag==
From: David Mandelberg <david@mandelberg.org>
To: Sharon Barkai <sharon.barkai=40getnexar.com@dmarc.ietf.org>, Tero Kivinen <kivinen@iki.fi>
Cc: draft-ietf-lisp-nexagon.all@ietf.org, lisp@ietf.org, secdir@ietf.org
References: <160218848061.12936.5873889616190686198@ietfa.amsl.com> <6524FE35-8DE2-4A3B-89ED-7B9933104FB2@getnexar.com>
Message-ID: <5bd465d2-449c-6b1d-f83f-0e3489f1bf22@mandelberg.org>
Date: Mon, 19 Oct 2020 19:34:35 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0
MIME-Version: 1.0
In-Reply-To: <6524FE35-8DE2-4A3B-89ED-7B9933104FB2@getnexar.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/RHRU2Lvsxi6SSaet_eB4y7HLLbY>
Subject: Re: [lisp] [secdir] Secdir early review of draft-ietf-lisp-nexagon-04
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Oct 2020 23:34:44 -0000

(I previously sent the email below on 2020-10-10, but I don't think it 
went through due to an email server misconfiguration. Sending again now 
that my email issues are fixed, I think)

On 10/9/20 1:32 PM, Sharon Barkai wrote:
> Sorry for the confusion, David! really want to thank you for putting in 
> the time, you clearly understood the draft completely and point to areas 
> we invested thought on but can improve the wording.

No worries. I'm just glad I noticed that my initial review email didn't 
go through. Hopefully this one does?

> Before adjusting the draft would like to rehash together with the group, 
> Joel, and Luigi the themes pointed, which are spot on, so to reach the 
> best possible language.
> 
> 
> 1) End to end encryption -
> 
> Nexagon uses LISP overlay encapsulations end to end:
> - between EIDClients and EdgeRTRs
> - between ingress and egress EdgeRTR
> - between EdgeRTRs and H3EIDServices

That doesn't cover "The H3ServiceEIDs themselves decrypt and parse 
actual H3-R15 annotations" though, right? Is there any encryption of the 
H3-R15 information all the way from EIDClient to H3EIDService?

> Depending on the specific  nexagon as service we would like to offer the 
> option to encrypt all communications on these dynamic encapsulations.
> 
> We could suggest IPSec, draft-ietf-lisp-crypto-10 which specifies 
> RFC2631 key exchange over LISP tunnels, also DTLS was suggested.
> 
> Should we determine one or just describe the geo privacy and commercial 
> exposure if encryption is not used, especially on the tunnels between 
> MobilityEIDClients and EdgeRTRs?

You understand the specifics of where this protocol will be used much 
better than I do, so I think you're in a better place to choose between 
picking one option or explaining the issues and letting implementers 
decide on the encryption mechanism. In general, I'd lean towards picking 
one good cipher suite and sticking to that (without making it difficult 
to change things up in the future), but there can be good reasons not to 
do that.

> 2) Spoofing and imposters -
> 
> EdgeRTRs and H3EIDServices are provisioned in the service provider edge 
> network. EdgeRTRs which are added to the network are provisioned with 
> the mapping system, H3EIDServices are whitelist provisioned with their 
> designated EdgeRTRs.
> 
> We rely on the edge network routers to detect and stop spoofing using 
> industry standard double-lookup source/dest  mechanisms.
> Should we state so?

I think so, yes. I generally think it's good to be explicit when relying 
on underlying infrastructure for security, so that if anybody later 
tries to adapt a protocol to some different infrastructure, they know 
what to pay attention to.

> The MobilityEIDClients are behind mobile access networks and go through 
> AAA step before receiving ephemeral EIDs and EdgeRTR  RLOCs as anchors.
> 
> This EID is based on their client ID credentials, and this EID is 
> whitelist provisioned by the AAA to the EdgeRTR given to the client as 
> an anchor.
> 
> The ipv6 EIDs given to these clients reflect their credibility 
> reputation and authorization level to pub-sub into the nexagon network.
> 
> It is going to be very hard to guess a valid EIDClient which an EdgeRTR 
> expects after AAA to whitelist provision. These EIDs are temporary and 
> expire after 15 minutes.
> 
> Spoofed EIDClients which are sniffed are going to be detected by the 
> EdgeRTRs because of mismatched client RLOC. Spoofed client RLOCs are 
> detected by the mobile packet core.

Oh, I didn't realize incoming packets on the EdgeRTR were dropped if the 
source EID doesn't match the RLOC associated with that EID. I thought 
that was a typical roaming case. If an attacker has to guess both a 
valid EID and its matching RLOC, I suspect that makes the attack much 
more difficult. (Though still far from impossible, depending on how many 
EID-RLOC pairs an EdgeRTR knows about at a time and how many guesses the 
attacker can get. IP allocation for the RLOC would play a huge factor 
too. If an ISP allocates RLOCs sequentially, it might be much easier to 
guess than if RLOCs are random /128s within guessable /64s. Though if an 
attacker can sniff RLOCs, the math changes again.)

> Should we detail these aspects in security considerations ?

Yes please.

> 3) Fake news and client trust -
> 
> This is a higher level concern as it is with many other protocols. 
> Privacy and reputation require trade-offs. The lisp-nexagon network uses 
> crowd-sourced street sampling to reflect current geo-state. Even the 
> most honest client may still be wrong, have faulty vision gear, gps 
> interruption, or buggy AI. Malicious clients may try to manipulate 
> geo-state to their advantage, clear their path from traffic, or simply 
> try to saw confusion.
> 
> For this reason all detections are corroborated and trust level of each 
> client is constantly scored by the H3EIDServices and updates the AAA 
> system. This credit score update reflects the behavior of  the assigned 
> ephemeral client EID not the client, a car for ecample. But the AAA 
> system knows which client ID credentials the EID map to. The AAA system 
> does not need to know the geo association of these EID scores. They can 
> be aggregated from all H3EIDServices before handed to AAA.
> 
> We can describe this general behavior even though its part of management 
> and orchestration and not part of the LISP-Nexagon interface specification.

Sounds good, even if you mention it only at a high level. I think the 
fact that H3EIDServices are sharing reputation information back to the 
AAA service is important to mention.

> After we clear these 3 key items to everyone satisfaction we can quickly 
> turn around the doc to one more iteration.
> 
> Thank you in advance!
> 
> --szb
> Cell: +972.53.2470068
> WhatsApp: +1.650.492.0794