Re: [Lsr] Spencer Dawkins' No Objection on draft-ietf-ospf-ospfv3-segment-routing-extensions-20: (with COMMENT)

Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Wed, 05 December 2018 16:34 UTC

Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C87DD12D7EA; Wed, 5 Dec 2018 08:34:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MbOxuBSW3oZ0; Wed, 5 Dec 2018 08:34:22 -0800 (PST)
Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com [IPv6:2a00:1450:4864:20::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF2F7128CE4; Wed, 5 Dec 2018 08:34:21 -0800 (PST)
Received: by mail-lj1-x230.google.com with SMTP id g11-v6so18925064ljk.3; Wed, 05 Dec 2018 08:34:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ozo7F+Ia+6irEjJzqmh33+AoB4rlJ3qMUQqvSjSWWcE=; b=Kae6G2EjACIhV/Xnzha7wwZmD+6RRk28Rsv27fxNmRGp3tfa02YfBczmMa97HjZDXd 7HBZOrIrbFYzOe8wEdazDIbAMg59s8rEjUFtDPu0vlQaAWJ/PL1KTfHBlEb+P73Kmu15 cPKSmqC1HlMNcsOK0ycq1kBfF6Vi0+av+Kj8EskNwraItXo4BG9JMPr2zlRGwk7M4wO5 Qm1jnrBlqSip2dXm1m2HZTnOaAqV4ylyvclIIqFMOuZ1CtdjmAETK6lWHjcefaWKICQO hs4FPAOQaVpaydWJwrFR4nKukZQTIzygZHxu1Tfq31Ohf9InEr8xpsKzGQILJeCkkupt 5hgQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ozo7F+Ia+6irEjJzqmh33+AoB4rlJ3qMUQqvSjSWWcE=; b=gqKDJtn+IWOOBijjeiQk2RRI/eG8nczN4+9yXfg339zjql1Jm8fyRQt9b6HM6H9ytO YvKU9iAsOfDVddLJTD3iUXYscmP3uYvsBBJ44bzEclp2tZORv84Eu1HeEkLSdMzW13uP M9PIqKx2WfKA2tel2nc7/ReNTRb4zes0G+B27lqi2hhjd1mAxwYzhUAYH2od2ah2Ba/5 tkch/Ra2EKvi/ZW4CfbKH0V01V5rJvxO7vQtzWQ355rziIgYtlK9pK3R8jzRnKrIQk2t YpMySZmLW4PPp1WPoVY2ABZy81vmVkK5MTwHhXrF/5BoIi2/d2P7cAVfXN4K9XVLnSGQ XKlA==
X-Gm-Message-State: AA+aEWaYa5F8iU0fJiU7X3iXa7Pgy7ZGtxxVe+I+Uv4NhLFp7+EDIC2X Y9meTz6D8QpoAHDkuwg4isDVIx43aSg9e/q8xmY=
X-Google-Smtp-Source: AFSGD/Ve/RSP18/kKW4a8jwcSOw8GYFasHww2GHbdluNZryYzecl/IHS3dpBDfhqSKhnxWEujwL63RlS8s94AZ8mlxs=
X-Received: by 2002:a2e:9819:: with SMTP id a25-v6mr17680157ljj.6.1544027659614; Wed, 05 Dec 2018 08:34:19 -0800 (PST)
MIME-Version: 1.0
References: <154394880135.4620.12307141022996623217.idtracker@ietfa.amsl.com> <EF47FAAB-7982-4BE3-AE1C-AA30B7F5BA11@cisco.com>
In-Reply-To: <EF47FAAB-7982-4BE3-AE1C-AA30B7F5BA11@cisco.com>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Wed, 05 Dec 2018 10:34:07 -0600
Message-ID: <CAKKJt-f9qoQ18vmd2-4_3-34YEmoLTLiPrX10kUif8cF+hgWLg@mail.gmail.com>
To: "Acee Lindem (acee)" <acee@cisco.com>
Cc: IESG <iesg@ietf.org>, "Alvaro Retana (aretana)" <aretana.ietf@gmail.com>, draft-ietf-ospf-ospfv3-segment-routing-extensions@ietf.org, lsr-chairs@ietf.org, lsr@ietf.org
Content-Type: multipart/alternative; boundary="0000000000002cbeb8057c48f42f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/XvjMqColz0n6mk93_DiV88XddWM>
Subject: Re: [Lsr] Spencer Dawkins' No Objection on draft-ietf-ospf-ospfv3-segment-routing-extensions-20: (with COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Dec 2018 16:34:25 -0000

Hi, Acee,
On Tue, Dec 4, 2018 at 6:37 PM Acee Lindem (acee) <acee@cisco.com> wrote:

> Hi Spencer,
>
> I'm replying as document shepherd.
>

It's a pleasure to be talking when we're not both sleepwalking on a 777 :-)

Please note that all of these are comments, so covered under "do the right
thing".


> On 12/4/18, 1:40 PM, "Spencer Dawkins" <spencerdawkins.ietf@gmail.com>
> wrote:
>
>     Spencer Dawkins has entered the following ballot position for
>     draft-ietf-ospf-ospfv3-segment-routing-extensions-20: No Objection
>
>     When responding, please keep the subject line intact and reply to all
>     email addresses included in the To and CC lines. (Feel free to cut this
>     introductory paragraph, however.)
>
>
>     Please refer to
> https://www.ietf.org/iesg/statement/discuss-criteria.html
>     for more information about IESG DISCUSS and COMMENT positions.
>
>
>     The document, along with other ballot positions, can be found here:
>
> https://datatracker.ietf.org/doc/draft-ietf-ospf-ospfv3-segment-routing-extensions/
>
>
>
>     ----------------------------------------------------------------------
>     COMMENT:
>     ----------------------------------------------------------------------
>
>     The Introduction would have been much clearer for me if these
> paragraphs were
>     much closer to the top of the section - they're at the bottom of the
> section
>     now.
>
>       This draft describes the OSPFv3 extensions required for Segment
>        Routing with MPLS data plane.
>
>        Segment Routing architecture is described in [RFC8402].
>
>        Segment Routing use cases are described in [RFC7855].
>
>     With that change, I'm not sure how much of the discussion in the
> Introduction
>     would still be required, but do the right thing, of course.
>
>     I'd make the same suggestion for the Abstract,
>
>       Segment Routing (SR) allows a flexible definition of end-to-end paths
>        within IGP topologies by encoding paths as sequences of topological
>        sub-paths, called "segments".  These segments are advertised by the
>        link-state routing protocols (IS-IS and OSPF).
>
>        This draft describes the OSPFv3 extensions required for Segment
>        Routing with MPLS data plane.
>
>     if it was more than two paragraphs long ...
>
> You mean "were" since this is subjective. I'm not sure what you're asking
> for since your comment has something to do with ordering and, as you note,
> the abstract is two paragraphs long.
>

Sorry this wasn't clear.

What I meant was, the Introduction is long enough that moving the
high-order bits to the top is helpful; the Abstract also has the high-order
bits at the bottom, but it's a short distance to the bottom. If you flipped
the Abstract, that might be helpful, and would match the Introduction, but
if you don't, I think making the change in the Introduction would be
sufficient.

>
>     I am thinking that the reference
>
>       There are additional segment types, e.g., Binding SID defined in
>        [RFC8402].
>
>     would be more useful at the beginning of Section 3, because that's
> where you
>     list the additional segment types, but the reference is back in the
>     Introduction (with only one example of the segment types).
>
> Actually, the Binding SID is no longer in the encodings so this could be
> removed.
>

An even better reason to remove this sentence :D ...

That would put the reference to RFC 8402 in Section 3, I assume.


>     I'm thinking the SHOULD in this text
>
>       Existing security extensions as described in [RFC5340] and [RFC8362]
>        apply to these segment routing extensions.  While OSPFv3 is under a
>        single administrative domain, there can be deployments where
>        potential attackers have access to one or more networks in the
> OSPFv3
>        routing domain.  In these deployments, stronger authentication
>        mechanisms such as those specified in [RFC4552] or [RFC7166] SHOULD
>        be used.
>
>     is not an RFC 2119 SHOULD that describes interworking, so something
> like
>
>        In these deployments, stronger authentication
>        mechanisms such as those specified in [RFC4552] or [RFC7166] are
>        needed.
>
> I'll defer to our AD, Alvaro. We have normative text in other "Security
> Considerations" sections.
>

Oh, sure. That wasn't my heartburn at all. My point was

>
>     would be better, but if this IS a SHOULD, I'm curious why you wouldn't
> use
>     stronger authentication mechanisms if they're needed. You might want
> to add
>     guidance about that, so it's not confused with MUST (BUT WE KNOW YOU
> WON'T) as
>     defined in https://tools.ietf.org/html/rfc6919#section-1.
>

that I'm reading the text as saying "you're more vulnerable to attackers,
so you SHOULD use stronger authentication mechanisms, but you might not,
for reasons left to the implementer". Is there a reason that you might
decide not to use stronger authentication mechanisms when you're more
vulnerable to attackers? If so, you might provide it as an example, so the
implementers can do the right thing.

(I spent enough time in the SIP community talking to product managers who
wanted to pay for MUSTs, but didn't think they needed to pay for SHOULDs,
that I'm perhaps overreacting to a problem you folks in RTG don't have. Do
the right thing, of course!)


>     Is there another document that says things like
>
>       Implementations MUST assure that malformed TLV and Sub-TLV defined in
>        this document are detected and do not provide a vulnerability for
>        attackers to crash the OSPFv3 router or routing process.  Reception
>        of a malformed TLV or Sub-TLV SHOULD be counted and/or logged for
>        further analysis.  Logging of malformed TLVs and Sub-TLVs SHOULD be
>        rate-limited to prevent a Denial of Service (DoS) attack
> (distributed
>        or otherwise) from overloading the OSPFv3 control plane.
>
>     ? This doesn't seem very SR-specific, although I'm guessing. If
> there's a
>     broader document, I don't object to including this guidance here, but
> adding a
>     reference to a broader document might be useful.
>
> We do have similar text in section 5 of RFC8362. However, it is not in the
> "Security Considerations" and the statement about rate-limiting is not
> there. It doesn’t hurt to repeat it and it provides confidence that
> "security" has been appropriately "considered".
>

Agree, and thanks for considering all my comments.

Spencer


>
> Thanks,
> Acee
>
>
>
>