Re: [mif] Comments on mif-pvd-arch

Dmitry Anipko <Dmitry.Anipko@microsoft.com> Thu, 03 April 2014 03:39 UTC

Return-Path: <Dmitry.Anipko@microsoft.com>
X-Original-To: mif@ietfa.amsl.com
Delivered-To: mif@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7034F1A00AB for <mif@ietfa.amsl.com>; Wed, 2 Apr 2014 20:39:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DRBzHxHf7BXr for <mif@ietfa.amsl.com>; Wed, 2 Apr 2014 20:39:33 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1lp0139.outbound.protection.outlook.com [207.46.163.139]) by ietfa.amsl.com (Postfix) with ESMTP id 15CAF1A00A3 for <mif@ietf.org>; Wed, 2 Apr 2014 20:39:32 -0700 (PDT)
Received: from SN2PR03MB077.namprd03.prod.outlook.com (10.255.175.153) by SN2PR03MB080.namprd03.prod.outlook.com (10.255.175.156) with Microsoft SMTP Server (TLS) id 15.0.898.11; Thu, 3 Apr 2014 03:39:26 +0000
Received: from SN2PR03MB077.namprd03.prod.outlook.com ([169.254.14.128]) by SN2PR03MB077.namprd03.prod.outlook.com ([169.254.14.130]) with mapi id 15.00.0898.005; Thu, 3 Apr 2014 03:39:26 +0000
From: Dmitry Anipko <Dmitry.Anipko@microsoft.com>
To: Alper Yegin <alper.yegin@yegin.org>, "mif@ietf.org" <mif@ietf.org>
Thread-Topic: [mif] Comments on mif-pvd-arch
Thread-Index: AQHPR0gx+m72Kgvge0CUY6/4Q6hMJ5r/RbDg
Date: Thu, 03 Apr 2014 03:39:25 +0000
Message-ID: <38dc9508d2534d9d80947427e321a16f@SN2PR03MB077.namprd03.prod.outlook.com>
References: <53E93173-D69F-492C-9ABB-643AF53CB27D@yegin.org>
In-Reply-To: <53E93173-D69F-492C-9ABB-643AF53CB27D@yegin.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [2001:4898:80e8:ed31::3]
x-forefront-prvs: 0170DAF08C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009001)(6009001)(428001)(377454003)(199002)(189002)(74706001)(56776001)(54356001)(98676001)(86362001)(74366001)(59766001)(93136001)(86612001)(51856001)(54316002)(93516002)(53806001)(81342001)(4396001)(74876001)(81686001)(2656002)(50986001)(87266001)(79102001)(77982001)(69226001)(99286001)(94946001)(74316001)(85852003)(87936001)(47976001)(81542001)(19580395003)(77096001)(97336001)(83322001)(83072002)(81816001)(74662001)(95666003)(90146001)(85306002)(97186001)(63696002)(47736001)(76796001)(74502001)(31966008)(95416001)(46102001)(80022001)(76786001)(49866001)(19580405001)(65816001)(80976001)(15202345003)(16236675002)(15975445006)(47446002)(56816005)(20776003)(76482001)(99396002)(76576001)(19300405004)(92566001)(94316002)(33646001)(3826001)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:SN2PR03MB080; H:SN2PR03MB077.namprd03.prod.outlook.com; FPR:EC30F066.A4FA93D1.B1D13DBB.1AEDF841.2070E; MLV:sfv; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (: microsoft.com does not designate permitted sender hosts)
Content-Type: multipart/alternative; boundary="_000_38dc9508d2534d9d80947427e321a16fSN2PR03MB077namprd03pro_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.onmicrosoft.com
Archived-At: http://mailarchive.ietf.org/arch/msg/mif/9vLs8x4RoydnXz7TZwitdBFO1qQ
Subject: Re: [mif] Comments on mif-pvd-arch
X-BeenThere: mif@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multiple Interface Discussion List <mif.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mif>, <mailto:mif-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mif/>
List-Post: <mailto:mif@ietf.org>
List-Help: <mailto:mif-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mif>, <mailto:mif-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Apr 2014 03:39:40 -0000

Hello Alper,

Thank you for the comments.

>> Default IP gateway deserves to be mentioned here.

I believe this topic was raised during the last meeting (in the context of single RA having info on multiple PVDs), and it seems to me there was an agreement that it is a valid requirement, though not fully clear to me, whether it can be implemented w/o protocol changes / new options (but perhaps, the latter doesn't have to be discussed in the arch doc). I can add this text in the next revision, though I want to note, that it might re-open the controversy of "DHCP route option".

>> This text mentions auth in the context of using PVD ID across multiple interfaces, as if the auth issue only arises in that case.
Auth/z issues arise even with single PVD over single interface case.

I'll clarify this.

>> Yes, we can declare this out-of scope for this document. But this (s/PVDs/configuration parameters) in fact is very doable, and commonly used in wireless networks.

If you're referring to the advertisement of different info to different nodes, is there a specific text you'd suggest to be included as opposed to the current out-of-scope?

>> This is already available with RA and DHCP today.

Can you suggest a specific reference to the corresponding mechanisms in RA/DHCP?

>> This is not trivial. If using serial lookup, how is the order determined?
If using parallel lookup, one can get multiple answers, in which case how does the selection work?
In either case, are we not back to the original problem?

There is at least one way, in which the host could avoid ambiguity - use a specific PVD, per configured policy, for particular destinations, and use one at a time for generic Internet (for example, based on available connectivity cost information)****. I can add a reference to that as an example, if you think that helps.  Outside of that, I think we won't converge in this document, if we try to prescribe a particular host behavior, to fully cover complicated cases, because different hosts may have different business needs.

The original problem had multiple parts. One part is that w/o information from the network, it's generally not  possible to know, which network configuration elements are OK to be used together, and which aren't. The explicit MPVDs, in my opinion, first of all solve this problem. After that it is still up to the host, how exactly they want to use the multiple connections that they have - but now they can do it in a more structured way.

>> So, the DNS server used for lookup dictates where the rest of the config parameters come from.
Now, how we select the DNS server to use becomes the key issue...

Not necessarily, in some cases, it could be a proxy server, or a policy, which prescribes, that for a VOIP app, the particular network should be used. DNS is just an example (which would be the common case). In those cases, where DNS is relevant, the PVD, from which the DNS server is taken, could be selected based on the mechanism such as above (see ****).

>> Given the current practices in the industry, do we still need something standardized?

Do you believe the specific mechanisms would belong to the arch doc? If there are particular examples, which are common, we could mention them as examples.

>>6.1 Basic (API) is more of a "No API support" (as in legacy apps case).

It is expected that ~80% of apps, if not more, would fall into this category, and hence it is important to call out the category.

>> Can someone provide examples of requirements/preferences, for the sake of discussion and also elaboration in the text?

I'll add a couple of sentences with example requirements.

>> Is this exactly the same threat we are seeing today with the RA and DHCP, or is the introduction of PVD-ID making a difference?
I think there is a difference, because PVD-ID is making a claim that "the following parameters are coming from Operator X". Which can be leveraged for worse attacks.

IMO, PVD makes a difference, because the original source of PVD info is potentially different from the router/DHCP server. So I agree with you, and I think this is an open issue, for which I personally don't know a good solution at this time.

>> Or by a (crypto) binding between the L1/L2 and the configuration parameters.

Can you provide a bit more elaborated text?

-Dmitry

From: mif [mailto:mif-bounces@ietf.org] On Behalf Of Alper Yegin
Sent: Monday, March 24, 2014 3:02 AM
To: mif@ietf.org
Subject: [mif] Comments on mif-pvd-arch

Helo folks,

I went over the draft, and here are my comments:

   Typical examples of information in a provisioning domain, learned
   from the network, are: source address prefixes that can be used by
   connections within the provisioning domain, IP address of DNS server,
   name of HTTP proxy server if available, DNS suffixes associated with
   the network etc.

Default IP gateway deserves to be mentioned here.


   Implicit PVDs are limited to network configuration information
   received on a single interface.  Explicit PVDs, in practice will
   often also be scoped to a configuration related to a particular
   interface, however per this architecture there is no such requirement
   or limitation and as defined in this architecture, explicit PVDs may
   include information related to more than one interfaces, if the node
   learns presence of the same PVD on those interfaces and the
   authentication of the PVD ID meets the level required by the node
   policy.

This text mentions auth in the context of using PVD ID across multiple interfaces, as if the auth issue only arises in that case.
Auth/z issues arise even with single PVD over single interface case.


   Possible extensions, where different sets of PVDs may be advertised
   by the networks to different connected nodes, are out of scope of
   this document.

Yes, we can declare this out-of scope for this document. But this (s/PVDs/configuration parameters) in fact is very doable, and commonly used in wireless networks.


   After the PvD information is provided to the host it may be outdated
   or updated with newer information before the hosts would normally
   request updates.  Thos would require the mchanism to be able to
   update and/or withdraw all (or some subset) of information related to
   a given PvD. For efficiency reasons, there should be a way to specify
   that all the information from the PvD needs to be reconfigured
   instead of individually updating each item associated with the PvD.

This is already available with RA and DHCP today.



   The node may pick multiple PVDs, if e.g., they are general purpose
   PVDs providing connectivity to the Internet, and the node desires to
   maximize chances for connectivity in Happy Eyeballs style.  In this
   case, the node could do the lookups in parallel, or in sequence.
   Alternatively, the node may use for the lookup only one PVD, based on
   the PVD connectivity properties, user choice of the preferred
   Internet PVD, etc.


This is not trivial. If using serial lookup, how is the order determined?
If using parallel lookup, one can get multiple answers, in which case how does the selection work?
In either case, are we not back to the original problem?


   In either case, by default the node uses information obtained in a
   name service lookup to establish connections only within the same PVD
   from which the lookup results were obtained.

So, the DNS server used for lookup dictates where the rest of the config parameters come from.
Now, how we select the DNS server to use becomes the key issue...


   An attempt to use such PVD may lead to limited network connectivity
   or connection failures for applications.  To prevent the latter, a
   PVD-aware node may perform connectivity test for the PVD, before
   using it to serve network connection requests of the applications.
   In current implementations, some nodes do that, for instance, by
   trying to reach a dedicated web server (e.g., see [RFC6419]).


Given the current practices in the industry, do we still need something standardized?


6.1 Basic (API) is more of a "No API support" (as in legacy apps case).



6.2.  Intermediate

   Applications indirectly participate in selection of PVD by specifying
   hard requirements and soft preferences.  The node performs PVD
   selection, based on applications inputs and policies and/or user
   preferences.  Some / all properties of the resultant PVD may be
   exposed to applications.


Can someone provide examples of requirements/preferences, for the sake of discussion and also elaboration in the text?



7.2.2.  PVDs trusted by attachment

Not that I expect this to be written down in the draft, but I think this'd have more applicability than the PSK and CERT-based approaches. Even DHCP is secured this way today (not via DHCP AUTH).



      Tampering with configuration information provided An attacker may
      attempt to modify the information provided inside the PVD
      container option.

Is this exactly the same threat we are seeing today with the RA and DHCP, or is the introduction of PVD-ID making a difference?
I think there is a difference, because PVD-ID is making a claim that "the following parameters are coming from Operator X". Which can be leveraged for worse attacks.


      Replay attacks A compromised configuration source or an on-link
      attacker may try to capture advertised configuration information
      and replay it on a different link or at a future point in time.
      This can be avoided by including some replay protection mechanism
      such as a timestamp or a nonce inside the PvD container to ensure
      freshness of the provided information.

Or by a (crypto) binding between the L1/L2 and the configuration parameters.


Thank you Dmitry and the other folks who contributed to this I-D.

Cheers,

Alper