Re: [Lsvr] [OPSEC] security against what?

Christopher Morrow <morrowc.lists@gmail.com> Wed, 05 September 2018 05:16 UTC

Return-Path: <christopher.morrow@gmail.com>
X-Original-To: lsvr@ietfa.amsl.com
Delivered-To: lsvr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E550612785F; Tue, 4 Sep 2018 22:16:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LizubImtlN-d; Tue, 4 Sep 2018 22:16:31 -0700 (PDT)
Received: from mail-ua1-x92c.google.com (mail-ua1-x92c.google.com [IPv6:2607:f8b0:4864:20::92c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0C4B1277D2; Tue, 4 Sep 2018 22:16:30 -0700 (PDT)
Received: by mail-ua1-x92c.google.com with SMTP id m26-v6so4812250uap.2; Tue, 04 Sep 2018 22:16:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qMV0Pjq1AePCuM/SuOHe6MEZImteyeuBNi91kcjYfgc=; b=UqdyX1YGVqBukQgDl4N3w4/SCv/kHkvMwHLrUP1oQ3HbRKut6hqjnoVRrTiF3kYzRB fVbl80wgNHBqkk2VubVO/59Og3b5Wv7Xd9QO+FR26p8A1d4whlSPLG/tsbeed5M2b/lp T21gnwV7sPTETOJda2z3T5ljkK4+4P+cONu4HO1/Y5Sg3CsureFlL4Kev5Qn94gCPLK6 sau39XIRb4SNgW4RKCQef18mwg4xlzrmX6Rh8l9m7ArJr4NAZpbEXqVOYem5agFj77ie Je+ie82azaEnwHj7YO3oaWYHpSDAQw0AvRiTqA8HE7D4T6nhc83hMX/L/BlsSPI8lZyy PiGA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qMV0Pjq1AePCuM/SuOHe6MEZImteyeuBNi91kcjYfgc=; b=Ys0vneQcSmyS0ia4FqhxYCpIoW6Fi87D7RAVtwjYsBIUJ74u/3np0D50o80U4MSz6h ETDkuwCoC9yJulOIVH5zu3E67s8uxa+ing0CBEyMPSMPvDLvqeE4v0ZtwrveKNkZDfZx W7J/CER7xsRD0X0xYaIOXt/b26nGlDMuyA+5Bmzb4P9yCTmxcjB2jn+682szMo98f8QC NkD3aNjdIRFWugfWV8KLCZ4enoxt9MrCZRTeurkuRYVhjrfZ5V7qFvX6mNCbEWAmcmDG 0WfdGcmmXw6+DhdGpyeyPQJiflp/EnwGP7ehWNj680H0XBHIIQM/tFv/eLNlgKgh7luK FmNw==
X-Gm-Message-State: APzg51DzUUTeSWpPxXWpYL3QoXuwC+zaSqh1YE1JCPgpCgX6mazY5z9J DCxiGMdRysD2+OUzuJNsZvEDEm4REgknz/E2C2Q=
X-Google-Smtp-Source: ANB0VdZ2h6fLHXRX5ngxBF6TB2dVlSBozPWwFHUAYXfUMfunf4wzHSLeYL1Sn5CaAya2akhEECxQ5dpRqtztAP5SyZ8=
X-Received: by 2002:ab0:74d1:: with SMTP id f17-v6mr19247252uaq.105.1536124589594; Tue, 04 Sep 2018 22:16:29 -0700 (PDT)
MIME-Version: 1.0
References: <m21sbkjba8.wl-randy@psg.com> <AM5PR0701MB172966DC99841C55D5E26CA2E0030@AM5PR0701MB1729.eurprd07.prod.outlook.com> <CAAedzxrX5TWxYtA-uCfA3QyF_N1L3-tmjtqWTNThXvNNi4Uppw@mail.gmail.com> <m2zhwxposb.wl-randy@psg.com> <CAL9jLaa0VmEQpi45T0wdNV51R5+ib4Lo8NhmO9RJq-6OiO69EA@mail.gmail.com> <m2wos1p92d.wl-randy@psg.com> <CAL9jLaaVSh+Kht6JepHCzN1r4Y_+vtd0ypNSHhLx+GVA7DVpVQ@mail.gmail.com> <m2musxp1pf.wl-randy@psg.com>
In-Reply-To: <m2musxp1pf.wl-randy@psg.com>
From: Christopher Morrow <morrowc.lists@gmail.com>
Date: Wed, 05 Sep 2018 01:16:18 -0400
Message-ID: <CAL9jLaa4meQ5gYZjDsnTQg6bkjH8FeGg==5TgahRBUv_yt_bqA@mail.gmail.com>
To: Randy Bush <randy@psg.com>
Cc: Erik Kline <ek@google.com>, opsec wg mailing list <opsec@ietf.org>, lsvr@ietf.org, gunter.van_de_velde@nokia.com
Content-Type: multipart/alternative; boundary="0000000000007e5fa6057518e065"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsvr/kkDiBHxcNqzcJLTY0Q-k7WhvxRs>
Subject: Re: [Lsvr] [OPSEC] security against what?
X-BeenThere: lsvr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Vector Routing <lsvr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsvr>, <mailto:lsvr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsvr/>
List-Post: <mailto:lsvr@ietf.org>
List-Help: <mailto:lsvr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsvr>, <mailto:lsvr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Sep 2018 05:16:34 -0000

On Tue, Sep 4, 2018 at 2:17 PM Randy Bush <randy@psg.com> wrote:

> >>> 'datacenter operators' == "hyperscale web wonkers" ?
> >> i asked in lsvr, which is what i guess you woud call hyperscale.
> >> lsvr also tends toward decentralized,
> > sorry: 'decentralized' means what here?
>
> for example, compare jupiter rising to bgp-spf; both of which i think
> are super cool
>
>
oh! decentralized routing decision vs


> >>> or 'datacenter operators' == 'colo provider' ('the planet' not
> >>> 'equinix' and 'the planet' is now 'someone else' but...)
> >> 1x would seem especially inapporpriate here as there is no
> >> centralisation of authority.
> > So, in a large datacenter where randos are able to walk around and
> > affect change to my cage's in/outs (and potentially clamp mitm/etc
> > gear without my knowledge) there's a different 'security concern' than
> > there is in a building I wholey own and operate behind several layers
> > of physical security and such.
>
> there are probably threats shared between the two, oh frabjious joy.
> but i suspect the intersection is far smaller than the union.
>
>
ok.


> > If all of your "datacenter deployment" is inside a single cage in a
> > colocation building you MAY be "safe", but if you span cage spaces
> > (who ever decided on day-one in a building that they only would ever
> > need 640kb ram/squarefeet/kw/etc?) you are potentially sending your
> > 'routing protocols' over links outside of your immediate security
> > perimeter.
>
> yes, in which case one worries about those monkeys in the middle more
> than ever
>
>
yup.


> > That seems rather scary... like kinda really scary, actually...  I
> > wonder how often people consider: "security of the data in the
> > datacenter (at rest or in flight)" but forget about the routing system
> > which is intrinsic to the operation of that datacenter?
>
> we would be out of work were it not for the naïve :)
>
>
it's not really just 'naive' as much as shifting sands of requirements and
sudden successes :)


> >>>>> Is recommending 802.1x possible/sufficient (given the description in
> >>>>> Randy's strawperson comment)?
> >>>> it's a long way to that radius server
> >> with coffee, i might expand a bit.  during turn up of new links and
> >> devices, it may not be easy to get to a distant 1x authority.
> > I'd point out that if you put business critical dependencies 'far
> > away' you are a competitor I'd love to have? :)
> > Ideally once you figure out your deployment scenario and drive down
> > all the dependency tree branches you figure out who/what needs to be
> > "local" to the deployment, and how to live in a state where that
> > dependency is unfulfilled for part of the turnup/repair/turndown
> > workflows.  Right?
>
> sure.  but at the moment, i am trying to tease out the lsvr ops' threat
> models.
>
>
ok, i'll be quiet now and see what other people think are problematic :)


> randy
>