Re: [Lsr] Spencer Dawkins' No Objection on draft-ietf-ospf-ospfv3-segment-routing-extensions-20: (with COMMENT)

"Thomas Beaver" <thomas.beaver.ietf@gmail.com> Thu, 06 December 2018 14:42 UTC

Return-Path: <thomas.beaver.ietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F10A2126BED; Thu, 6 Dec 2018 06:42:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Aw7eHggXfOdI; Thu, 6 Dec 2018 06:42:35 -0800 (PST)
Received: from mail-yb1-xb2a.google.com (mail-yb1-xb2a.google.com [IPv6:2607:f8b0:4864:20::b2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08ADB1276D0; Thu, 6 Dec 2018 06:42:32 -0800 (PST)
Received: by mail-yb1-xb2a.google.com with SMTP id z2-v6so555090ybj.2; Thu, 06 Dec 2018 06:42:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:thread-index:content-language; bh=8pL1OUgT3wytM2w+y9c4MdgrrSlK2Jp44yGx4lIqYTk=; b=tvEBZKUwYo4KWxN8mZzxKviru4R4JDEKXZYKswyOIRKUcYnf80+4/+FIqiGMDa90T3 YMQmqdYd5Nyw8YSP74S8Y8axbt6BSF5C/IkmrEp7rRtU2nPI8Df1enlYmpDOVg1ChlYB 7PqWMigHjyjT6/opSI/VJ7dsljDzv7TaJ4RlRPIr4I5L+OzXggAXDi8YA7G8vH8QBhRR fSRM8Tqgx9uPzmzZ9PkFyC/DRRk37QGWml/zuJ1zRvpx8rLmBFVORDZiFObkew5cz2/a iwe1FM/NMPAlx2mNH+nt8xtrm+02uCvJ3NY6/GowRIX5mTwy1/0KamNtefMkofBokifB p/EA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date :message-id:mime-version:thread-index:content-language; bh=8pL1OUgT3wytM2w+y9c4MdgrrSlK2Jp44yGx4lIqYTk=; b=OY+oJBW7MDm5zQm0Nlntja30yRSWEM6WDFPpphm0EiqLVy6K+GKkjiLdrOAqV/L8S+ +kBlia8HusO/Ns4tpAxRdlQk7ePSIhs+ndrmhgMkNkyG3qvI7iFDeZ7yVsPr4reY65El Pylodq7bOXhyNyJLVMnbfkw3l8zA7pZI9TsH3vUX8MWm39IBGt73r+HqzdQy4j0qar0H jFmlah+Z+CU8QFYHFoCIhc3VO7zmJw8sU8jSLpev4bt5TE0RooVS/jgYwAtO5j/eOApR RNlxMXzHE1mgaEbfJWuqNQrJH/BYtllPu5zNtAVMAEf9HAUTBi6tEks0cDYp8iqjtYk9 do3g==
X-Gm-Message-State: AA+aEWYAKIwfgZc7uS/N1PHUlOEmaeNGtuYxocf5fe0w3n7XGANJ7MO+ NGaIjdrDJeKO1CRqlM/naNSiiLcNZk0=
X-Google-Smtp-Source: AFSGD/Vjm7YOOxXsJIhLD8eVMfdn8plj08UJckchuY5MzgAlIwcE48qRt8NJ6Gjh0i9PcGC7UG4Qtw==
X-Received: by 2002:a25:cd04:: with SMTP id d4-v6mr26998242ybf.189.1544107351017; Thu, 06 Dec 2018 06:42:31 -0800 (PST)
Received: from TPAS0085304 ([71.44.146.70]) by smtp.gmail.com with ESMTPSA id r193-v6sm142002ywg.32.2018.12.06.06.42.28 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Dec 2018 06:42:29 -0800 (PST)
From: Thomas Beaver <thomas.beaver.ietf@gmail.com>
To: "'Acee Lindem (acee)'" <acee@cisco.com>, 'Spencer Dawkins at IETF' <spencerdawkins.ietf@gmail.com>
Cc: lsr@ietf.org, lsr-chairs@ietf.org, draft-ietf-ospf-ospfv3-segment-routing-extensions@ietf.org, 'IESG' <iesg@ietf.org>, 'Alvaro Retana' <aretana.ietf@gmail.com>
References: <154394880135.4620.12307141022996623217.idtracker@ietfa.amsl.com> <EF47FAAB-7982-4BE3-AE1C-AA30B7F5BA11@cisco.com> <CAKKJt-f9qoQ18vmd2-4_3-34YEmoLTLiPrX10kUif8cF+hgWLg@mail.gmail.com> <43EBA61F-9AF6-492D-BA1D-C167D03973CB@cisco.com>
In-Reply-To: <43EBA61F-9AF6-492D-BA1D-C167D03973CB@cisco.com>
Date: Thu, 06 Dec 2018 09:42:28 -0500
Message-ID: <008401d48d71$e9b4fb40$bd1ef1c0$@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0085_01D48D48.00E16440"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQH3kqaOClks9OBJ2nFtbQIk5CvF7gM0FI0vAVWvQksCCBJ5ZqT3Lpvw
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/mLdoaDLF9TFoDpzxafUniqNa8ps>
Subject: Re: [Lsr] Spencer Dawkins' No Objection on draft-ietf-ospf-ospfv3-segment-routing-extensions-20: (with COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 14:42:39 -0000

Personally, I think the structure of this draft reads perfectly fine. The referenced RFCs for use case and architecture were introduced at a point where the reader’s interest in more background information would naturally come into play. I think we should probably focus on more of the technical aspects, or specifics that may need clarification; In contrast to restructuring unnecessarily.

 

Regards,

 

Thomas Beaver

 

 

From: Lsr <lsr-bounces@ietf.org> On Behalf Of Acee Lindem (acee)
Sent: Wednesday, December 5, 2018 1:00 PM
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Cc: lsr@ietf.org; lsr-chairs@ietf.org; draft-ietf-ospf-ospfv3-segment-routing-extensions@ietf.org; IESG <iesg@ietf.org>; Alvaro Retana <aretana.ietf@gmail.com>
Subject: Re: [Lsr] Spencer Dawkins' No Objection on draft-ietf-ospf-ospfv3-segment-routing-extensions-20: (with COMMENT)

 

Hey Spencer, 





On Dec 5, 2018, at 11:34 AM, Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com <mailto:spencerdawkins.ietf@gmail.com> > wrote:

 

Hi, Acee, 

On Tue, Dec 4, 2018 at 6:37 PM Acee Lindem (acee) <acee@cisco.com <mailto:acee@cisco.com> > wrote:

Hi Spencer, 

I'm replying as document shepherd. 

 

It's a pleasure to be talking when we're not both sleepwalking on a 777 :-) 

 

Luckily the flight home was a breeze compared to my 25 hour 40 minute flight to Hong Kong. 





 

Please note that all of these are comments, so covered under "do the right thing".

 

On 12/4/18, 1:40 PM, "Spencer Dawkins" <spencerdawkins.ietf@gmail.com <mailto:spencerdawkins.ietf@gmail.com> > wrote:

    Spencer Dawkins has entered the following ballot position for
    draft-ietf-ospf-ospfv3-segment-routing-extensions-20: No Objection

    When responding, please keep the subject line intact and reply to all
    email addresses included in the To and CC lines. (Feel free to cut this
    introductory paragraph, however.)


    Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
    for more information about IESG DISCUSS and COMMENT positions.


    The document, along with other ballot positions, can be found here:
    https://datatracker.ietf.org/doc/draft-ietf-ospf-ospfv3-segment-routing-extensions/



    ----------------------------------------------------------------------
    COMMENT:
    ----------------------------------------------------------------------

    The Introduction would have been much clearer for me if these paragraphs were
    much closer to the top of the section - they're at the bottom of the section
    now.

      This draft describes the OSPFv3 extensions required for Segment
       Routing with MPLS data plane.

       Segment Routing architecture is described in [RFC8402].

       Segment Routing use cases are described in [RFC7855].

    With that change, I'm not sure how much of the discussion in the Introduction
    would still be required, but do the right thing, of course.

    I'd make the same suggestion for the Abstract,

      Segment Routing (SR) allows a flexible definition of end-to-end paths
       within IGP topologies by encoding paths as sequences of topological
       sub-paths, called "segments".  These segments are advertised by the
       link-state routing protocols (IS-IS and OSPF).

       This draft describes the OSPFv3 extensions required for Segment
       Routing with MPLS data plane.

    if it was more than two paragraphs long ...

You mean "were" since this is subjective. I'm not sure what you're asking for since your comment has something to do with ordering and, as you note, the abstract is two paragraphs long. 

 

Sorry this wasn't clear. 

 

What I meant was, the Introduction is long enough that moving the high-order bits to the top is helpful; the Abstract also has the high-order bits at the bottom, but it's a short distance to the bottom. If you flipped the Abstract, that might be helpful, and would match the Introduction, but if you don't, I think making the change in the Introduction would be sufficient.  

 

I read this and we’ll consider but I don’t think we’ll move things around. All the SR RFCs/drafts have this abstract ordering and I can’t see just changing this one. 

 






    I am thinking that the reference

      There are additional segment types, e.g., Binding SID defined in
       [RFC8402].

    would be more useful at the beginning of Section 3, because that's where you
    list the additional segment types, but the reference is back in the
    Introduction (with only one example of the segment types).

Actually, the Binding SID is no longer in the encodings so this could be removed.

 

An even better reason to remove this sentence :D ...

 

That would put the reference to RFC 8402 in Section 3, I assume. 

 

 

We will remove the references to binding SID. I think we put the reference to RFC 8402 earlier in the Introduction. 

 





 

    I'm thinking the SHOULD in this text

      Existing security extensions as described in [RFC5340] and [RFC8362]
       apply to these segment routing extensions.  While OSPFv3 is under a
       single administrative domain, there can be deployments where
       potential attackers have access to one or more networks in the OSPFv3
       routing domain.  In these deployments, stronger authentication
       mechanisms such as those specified in [RFC4552] or [RFC7166] SHOULD
       be used.

    is not an RFC 2119 SHOULD that describes interworking, so something like

       In these deployments, stronger authentication
       mechanisms such as those specified in [RFC4552] or [RFC7166] are
       needed.

I'll defer to our AD, Alvaro. We have normative text in other "Security Considerations" sections. 

 

Oh, sure. That wasn't my heartburn at all. My point was  


    would be better, but if this IS a SHOULD, I'm curious why you wouldn't use
    stronger authentication mechanisms if they're needed. You might want to add
    guidance about that, so it's not confused with MUST (BUT WE KNOW YOU WON'T) as
    defined in https://tools.ietf.org/html/rfc6919#section-1.

 

that I'm reading the text as saying "you're more vulnerable to attackers, so you SHOULD use stronger authentication mechanisms, but you might not, for reasons left to the implementer". Is there a reason that you might decide not to use stronger authentication mechanisms when you're more vulnerable to attackers? If so, you might provide it as an example, so the implementers can do the right thing. 

 

(I spent enough time in the SIP community talking to product managers who wanted to pay for MUSTs, but didn't think they needed to pay for SHOULDs, that I'm perhaps overreacting to a problem you folks in RTG don't have. Do the right thing, of course!)

 

I see your point but “SHOULD” is already pretty strong language but we wouldn’t be opposed to changing it to “MUST” since an implementation advanced enough to support OSPFv3 SR should support RFC5340 or RFC8362. However the latter is simpler from an operational standpoint. 

 

Thanks,

Acee

 





 

    Is there another document that says things like

      Implementations MUST assure that malformed TLV and Sub-TLV defined in
       this document are detected and do not provide a vulnerability for
       attackers to crash the OSPFv3 router or routing process.  Reception
       of a malformed TLV or Sub-TLV SHOULD be counted and/or logged for
       further analysis.  Logging of malformed TLVs and Sub-TLVs SHOULD be
       rate-limited to prevent a Denial of Service (DoS) attack (distributed
       or otherwise) from overloading the OSPFv3 control plane.

    ? This doesn't seem very SR-specific, although I'm guessing. If there's a
    broader document, I don't object to including this guidance here, but adding a
    reference to a broader document might be useful.

We do have similar text in section 5 of RFC8362. However, it is not in the "Security Considerations" and the statement about rate-limiting is not there. It doesn’t hurt to repeat it and it provides confidence that "security" has been appropriately "considered". 

 

Agree, and thanks for considering all my comments. 

 

Spencer

 


Thanks,
Acee