Re: [lisp] Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)

Roman Danyliw <rdd@cert.org> Thu, 23 February 2023 13:54 UTC

Return-Path: <rdd@cert.org>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C73D6C14F726; Thu, 23 Feb 2023 05:54:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vqayzk3htp5r; Thu, 23 Feb 2023 05:54:24 -0800 (PST)
Received: from USG02-CY1-obe.outbound.protection.office365.us (mail-cy1usg02on0700.outbound.protection.office365.us [IPv6:2001:489a:2202:d::700]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99E7FC14E515; Thu, 23 Feb 2023 05:54:23 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=ilv/cY5DRA7I58MJfMgaJZvep1tReEyklv7wsARG9misCXTr8ize2gh4c+afHcoXlKSxzz3rsNWtlo11b1X29B+mJB9fpKX0REq49tWL65w+2pAboccHpZykc2eBX9x80YD+LydbUfATwIRPt2wwrkJ0iLvjDphqk9q1UH/Dg1uN3oOFfT+Uz28LtOPd94RCL/6viujDcSkt57/UjaOjUR5qHPi62Lp+0nSSzAMWekuxp3VbwKJ6yEGWTTUymQDhcJ+AuKDqeTfY5k5bXggCkYDQ1hfjXaaMX/y28QZJxkgTJGXBmeQMH5sCqPXWM3C6qhd5n+G/qoIjgRf5C9lCbg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YHBtMS+ZyomcuxZC6ZK5A3+EYL60UeA9qtpybXYAf4o=; b=AMyIbwFhYcSDBwh6BAqBugixRbngBAstP/ZTBhodDNsM47e7svkGN8aBeaM135XgZLRyipgS+a9nLyUQUrkYd3vyj9SsBVMva+nYcQ3n5+sntWBrvdEHD4dTFoA865cmXpFsqtZN9sJK7PM6WpfOHvIFdYGzFiAN9sIIBYAVgNP53iuuw8vKL1jusqFhcih5rIWyjU0Y3Wxjp0zPYNf6W+uQz1Wt36PSlzm3yNfZlY5JQRtaD2r6mwqKErWrIP4gDpzlKGwil/8K1eDEpn4KcdXtzfKZd7j26J7Vmz1JDpImvnsvWkzZbumuv3N7WpVwqJd0Cp3nDnmVOfB3hc6SLA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YHBtMS+ZyomcuxZC6ZK5A3+EYL60UeA9qtpybXYAf4o=; b=UBvLpdT+pcQtX6P01ft8mmiFz3hhsKry/vYd7wMLolw7PzhGSLSaNZXQd3QAlzhREbxP6TzPN4nnkj88vSmk/zeZ3df7d0KRoTqSxyuqeOIcsXf/jxPJUYuTu17sefjxUNZE6NTCiGSLutZFNJ6/rCQVtl2ieiQVuJHE1ckLacM=
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:168::11) by BN2P110MB1639.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:17d::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6134.21; Thu, 23 Feb 2023 13:54:20 +0000
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::1381:99e7:70c3:7cd5]) by BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::1381:99e7:70c3:7cd5%6]) with mapi id 15.20.6134.021; Thu, 23 Feb 2023 13:54:20 +0000
From: Roman Danyliw <rdd@cert.org>
To: "Alberto Rodriguez-Natal (natal)" <natal@cisco.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-lisp-pubsub@ietf.org" <draft-ietf-lisp-pubsub@ietf.org>, "lisp-chairs@ietf.org" <lisp-chairs@ietf.org>, "lisp@ietf.org" <lisp@ietf.org>, "ggx@gigix.net" <ggx@gigix.net>
Thread-Topic: Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)
Thread-Index: AQHZQaBeAg5oVlb9rkiDBD7DCyvEyq7RrvMAgAacHgCABE4eUA==
Date: Thu, 23 Feb 2023 13:54:20 +0000
Message-ID: <BN2P110MB1107B144C49F1DAED3C8E8B4DCAB9@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
References: <167650848906.56280.5745687851664238675@ietfa.amsl.com> <BYAPR11MB3591E1A414382A828BD1DF01B6A09@BYAPR11MB3591.namprd11.prod.outlook.com> <BYAPR11MB359105225241715316D441A9B6A49@BYAPR11MB3591.namprd11.prod.outlook.com>
In-Reply-To: <BYAPR11MB359105225241715316D441A9B6A49@BYAPR11MB3591.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN2P110MB1107:EE_|BN2P110MB1639:EE_
x-ms-office365-filtering-correlation-id: ee70e909-9abf-40f6-9dd4-08db15a57641
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230025)(396003)(366004)(136003)(39830400003)(451199018)(166002)(7696005)(966005)(83380400001)(110136005)(8936002)(55016003)(5660300002)(52536014)(54906003)(86362001)(76116006)(41320700001)(66476007)(33656002)(66946007)(66446008)(4326008)(66556008)(64756008)(66574015)(41300700001)(8676002)(9686003)(38070700005)(26005)(186003)(71200400001)(122000001)(82960400001)(2906002)(53546011)(508600001)(38100700002)(6506007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 5rGB/EXuum2+BollMO1Vc3JYHhFJx4hE1yarGlueTCAPC0sJ/wLByqqGmocbLLrTgiFfXNcpgnB1ItLAuei6xGKwxekJKdX4E36gjmPAoNkYgkgjWRdEMu4S3TcHzQwny0GJ0Tbjq5ZMGesI1YoD3ms2Zdlx/ASRArSXkeq8jB2zeacZESViFt1/L7hSyLAPSAC+tFosAQPJaucALOk1xptF/azZ/Oy40ealnUkkmOpwgtUyAEYWD6LGTkyYz3p8wOlYUX8gsMiHDmZbGMlBB2mA/kxcX1zgXFgKoyPhRNWpG+A7L9aHLWmNhsWoBPzfW0CophcFVWjE+BNPl4z1AZeZoQdtpDOCeylcKHsXBZx7UORbrtIRFsauwyhoGhUhFl8bCJhBv1lWMCJceIY5EMQxJK4pu9tlQcDLrmPbXmI=
Content-Type: multipart/alternative; boundary="_000_BN2P110MB1107B144C49F1DAED3C8E8B4DCAB9BN2P110MB1107NAMP_"
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: ee70e909-9abf-40f6-9dd4-08db15a57641
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Feb 2023 13:54:20.0543 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN2P110MB1639
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/sgrWk2OLABFYU0WKisvrF5mpg1E>
Subject: Re: [lisp] Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Feb 2023 13:54:28 -0000

Hi Alberto!

Thanks for this -14 revision and the explanations below.  It addresses all of DISCUSS and COMMENT feedback.  I've cleared my ballot.

Thanks,
Roman

From: Alberto Rodriguez-Natal (natal) <natal@cisco.com>
Sent: Monday, February 20, 2023 3:09 PM
To: Roman Danyliw <rdd@cert.org>; The IESG <iesg@ietf.org>
Cc: draft-ietf-lisp-pubsub@ietf.org; lisp-chairs@ietf.org; lisp@ietf.org; ggx@gigix.net
Subject: Re: Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)

Hi Roman,

Thanks again for your review! A revised version of the draft (-14) has just been uploaded.

To address your DISCUSS, version -14 adds a third bullet to Section 3 to mention that a security association is required between the ITR and Map-Server (via LISP-SEC or PSK). Version -14 should also address the rest of your feedback, following the conversation below. Let us know what you think.

Thanks!
Alberto

From: Alberto Rodriguez-Natal (natal) <natal@cisco.com<mailto:natal@cisco.com>>
Date: Thursday, February 16, 2023 at 4:12 PM
To: Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>>, The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
Cc: draft-ietf-lisp-pubsub@ietf.org<mailto:draft-ietf-lisp-pubsub@ietf.org> <draft-ietf-lisp-pubsub@ietf.org<mailto:draft-ietf-lisp-pubsub@ietf.org>>, lisp-chairs@ietf.org<mailto:lisp-chairs@ietf.org> <lisp-chairs@ietf.org<mailto:lisp-chairs@ietf.org>>, lisp@ietf.org<mailto:lisp@ietf.org> <lisp@ietf.org<mailto:lisp@ietf.org>>, ggx@gigix.net<mailto:ggx@gigix.net> <ggx@gigix.net<mailto:ggx@gigix.net>>
Subject: Re: Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)
Hi Roman,

Thanks a lot for your review! Please see inline.

Thanks!
Alberto

From: Roman Danyliw via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>>
Date: Thursday, February 16, 2023 at 1:48 AM
To: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
Cc: draft-ietf-lisp-pubsub@ietf.org<mailto:draft-ietf-lisp-pubsub@ietf.org> <draft-ietf-lisp-pubsub@ietf.org<mailto:draft-ietf-lisp-pubsub@ietf.org>>, lisp-chairs@ietf.org<mailto:lisp-chairs@ietf.org> <lisp-chairs@ietf.org<mailto:lisp-chairs@ietf.org>>, lisp@ietf.org<mailto:lisp@ietf.org> <lisp@ietf.org<mailto:lisp@ietf.org>>, ggx@gigix.net<mailto:ggx@gigix.net> <ggx@gigix.net<mailto:ggx@gigix.net>>, ggx@gigix.net<mailto:ggx@gigix.net> <ggx@gigix.net<mailto:ggx@gigix.net>>
Subject: Roman Danyliw's Discuss on draft-ietf-lisp-pubsub-13: (with DISCUSS and COMMENT)
Roman Danyliw has entered the following ballot position for
draft-ietf-lisp-pubsub-13: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-lisp-pubsub/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

** In following the robust discussion in the TSVART thread
(https://mailarchive.ietf.org/arch/msg/tsv-art/vcJRc6oXRRiCl5-bouLTyRVbTc8/),
it appears that design assumption of this document is to build on RFC9301 and
RFC9303.  Section 3 helpfully outlines unique deployment assumptions for PubSub
relative to RFC301.  Missing is an explicit summary of what Alberto stated in
https://mailarchive.ietf.org/arch/msg/tsv-art/80yDl25rP3Ev4H_x_rOstue_J7M/.
There appears to be a stronger requirements to use LISP-SEC or associated
pre-shared secret to secure this new mechanism which is not the same as the
baseline RFC9301 (per Section 1.1).
[AR] Yes, a PubSubKey is required for PubSub operation, this can be a PSK or can be generated via LISP-SEC, both options are described in Section 7.1. In early versions of the draft (-05 and prior), there used to be a bullet point in the deployment assumptions that mentioned that a security association was required for PubSub, but the bullet point was removed when section 7.1 was introduced in -06. We can add again a bullet point to the deployment assumptions to mention that a PubSubKey is needed (via PSK or LISP-SEC) and that details are in Section 7.1.



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

** Thank you to Chris M. Lonvick for the SECDIR review.

** Thank you to Magnus Westerlund for the TSVART review which had a number of
security items of feedback.

** The shepherd report noted that this document was moved from experimental to
PS status based on existing deployment experiment.  As this was the basis of
the document status, is it possible read more about these "production networks"
that were running "early implementations" as described in Appendix A.  Who were
they?  Were all these implementations limited domain?  Any over the Internet?

[AR] The most predominant example (afaik) of PubSub running in production is in the Software-Defined Access (SD-Access) solution from Cisco. SD-Access is a solution that enterprises deploy for their campus networks where the overlay is established over an underlay of campus switches. Both the underlay and overlay are under the control of the enterprise.

** Section 1.  Editorial.  Is the "encap" in the phrase "map-and-encap
approach" a shortening of "encapsulate"?  Spell it out.

[AR] Ack

** Section 1.1.  Thanks for added this section based on TSVART review.
Consider if it possible to qualify which of these verification and
configurations are handled with practices outside the scope of this document
and what can be forward referenced into this document.

[AR] We'll clarify the text.

** Section 5.
   Otherwise, the Map-Server silently
   drops the Map-Request message and logs the event to record that a
   replay attack could have occurred.

Why is the guidance to log when observing an attack weaker than the guidance in
Section 4 when handling malformed Map-Requests ("In this case, the receiver
SHOULD log a malformed Map-Request and MUST drop the message.")
[AR] We'll update the text so the same guidance is provided for both cases.


** Section 5.
   For example, the Map-Server may be instructed to limit the resources
   that are dedicated to unsolicited Map-Notify messages to a small
   fraction (e.g., less than 10%) of its overall processing and
   forwarding capacity.

What is an unsolicited "Map-Notify" message in the PubSub context?  Is that the
PubSub message itself?

[AR] The publication message yes.

** Section 5

   If the Map-Server
   does not keep last nonces seen, then in deployments concerned with
   replay attacks the Map-Server MUST require the xTRs to subscribe
   using the procedure described in Section 7.1 to create a new security
   association with the Map-Server.

What is a "deployment concerned with replay attacks"?  Shouldn't that be all
deployments?  Section 7.1 has similar text.
[AR] We'll update this text.


** Section 7.
   To prevent xTR-ID hijacking, it is RECOMMENDED to follow guidance
   from Section 9 of [RFC9301] to ensure integrity protection of Map-
   Request messages.

Can this text be more specific on what text in RFC9301 is being referenced.
[AR] The text is referring to Section 9 of RFC9301 (Security Considerations), particularly the last paragraph. We'll update this to make it more specific.


** Section 7.1
   First, when the ITR is sending a Map-Request with the N-bit set
   following Section 5, the ITR also performs the steps described in
   Section 5.4 of [RFC9303].

RFC9303 doesn't have a Section 5.4.  Is it Section 6.4?
[AR] That's correct, thanks for catching this up!


** Section 7.1
   The ITR can then generate a PubSubKey by
   deriving a key from the One-Time Key (OTK) as follows: PubSubKey =
   KDF( OTK ), where KDF is the Key Derivation Function indicated by the
   OTK Wrapping ID.

Should the Map-Request nonce be used as part of the KDF input?  See Section 3.1
of RFC5869.
[AR] That's a reasonable suggestion, we'll update the text to reflect it.