Re: [mpls] MPLS Working Group Last Call on draft-ietf-mpls-mna-requirements

Adrian Farrel <adrian@olddog.co.uk> Tue, 24 October 2023 15:01 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41C4EC14CE22; Tue, 24 Oct 2023 08:01:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.103
X-Spam-Level:
X-Spam-Status: No, score=-7.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=olddog.co.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eNm6peqmYvyy; Tue, 24 Oct 2023 08:01:39 -0700 (PDT)
Received: from mta6.iomartmail.com (mta6.iomartmail.com [62.128.193.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4C38C14CF1E; Tue, 24 Oct 2023 08:01:38 -0700 (PDT)
Received: from vs4.iomartmail.com (vs4.iomartmail.com [10.12.10.122]) by mta6.iomartmail.com (8.14.7/8.14.7) with ESMTP id 39OF1b6b026199; Tue, 24 Oct 2023 16:01:37 +0100
Received: from vs4.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 9398C4604C; Tue, 24 Oct 2023 16:01:36 +0100 (BST)
Received: from vs4.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 8F5C94604B; Tue, 24 Oct 2023 16:01:36 +0100 (BST)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs4.iomartmail.com (Postfix) with ESMTPS; Tue, 24 Oct 2023 16:01:36 +0100 (BST)
Received: from LAPTOPK7AS653V ([85.255.234.118]) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.7/8.14.7) with ESMTP id 39OF1YTM004943 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 24 Oct 2023 16:01:35 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Stewart Bryant' <sb@stewartbryant.com>, "'Matthew Bocci (Nokia)'" <matthew.bocci@nokia.com>
Cc: mpls@ietf.org, draft-ietf-mpls-mna-requirements@ietf.org
References: <2ded21ed-f70c-4361-a6a9-36df027194fd@pi.nu> <067901d9f477$3a10ded0$ae329c70$@olddog.co.uk> <AM6PR07MB40213A3CA9EEEAE08EB1D6C9EBD5A@AM6PR07MB4021.eurprd07.prod.outlook.com> <36D3E8B6-4BB8-4E08-970B-26FD51B64D79@stewartbryant.com>
In-Reply-To: <36D3E8B6-4BB8-4E08-970B-26FD51B64D79@stewartbryant.com>
Date: Tue, 24 Oct 2023 16:01:34 +0100
Organization: Old Dog Consulting
Message-ID: <045f01da068a$fb97e420$f2c7ac60$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0460_01DA0693.5D5DABB0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQMDjq3T6a+fDHQaflIPenLQniAaywG/yYOdAaLNBGwCO+u7463ZAf8Q
Content-Language: en-gb
X-Originating-IP: 85.255.234.118
X-Thinkmail-Auth: adrian@olddog.co.uk
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=olddog.co.uk; h=reply-to :from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type; s=20221128; bh=yiOBtiKrdBbFSkR/Wj2tv sXHkvI8u56d9sUtUM0yB1Y=; b=xnF4MhyG0NdnHyaReT/9F7StRibNCVkJ14Lbv tfBh66lbh++WCh1LIivCKYocM5LviMkaZZDrUSaylWa0Ql4rQQ28dvKO3ySHwS3U RENnCFqmHbrD40X8WmCwdimeVh5Mb1SZpMiuTbWsvkSXGr/LFKOD7oESP0QAOrdA sFY/3HA6eJTFl/XW8UcP39xozFok9H5Y6NnicO84M6rHUgkKd+MBUFwpQkuVRHbf JV+xMf+73hx8+j/Qzj96WkTFc7dXfshstUV5ZYf0jSP6x56vOwBY4Wwsh8FI8w70 XS4yJZoDr9AzZX5pXGiZuuHYfv4ha1gZnVupBcLUphK9CUoNw==
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-9.0.0.1002-27956.000
X-TM-AS-Result: No--37.440-10.0-31-10
X-imss-scan-details: No--37.440-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-9.0.1002-27956.000
X-TMASE-Result: 10--37.440100-10.000000
X-TMASE-MatchedRID: OoEa6u7Uk5/uYusHgJkgymjJpufOqOIAz5ZiODdbPIot2Beyb95hZgGR C3bBIF8o9KrPClOqHtqULKc3M3OLX+Y6WKvKEZZTLKLocOycIiF1x9TrfLzE8Ggl3Yhc98CWZX2 hfwUP7YoGhhFoDaP3nLOK8uskIIKbtPYfgFJ3kY93bXPW/xzArtbZhgeyVPQj3JJxYymi1AEWm/ gAtjCd7I8wIk4Za+jeQn/BYVF69lCouIifi0cFXN0pE2POjYg4qV6J1mZL0EG1/YZzKs5fu1oQt zDagiNkREJp/7/ObSoN/wR6FZazMyoiRKlBVkYIXHlQSIX8DvXTOHAZDnXUbh9sSF9fYJNfkD7d Bt4dE2lvedD3CYSjHS8KnNUc5YsXLGQFtelDl4sWjdLJd+hcyw75W7QujTUfgIKAm34bs1xwgBh VtY7EDYrKktVf4pjC4Nq9UPxkIDs14ETxvAKbsgqD16qGUCXmPHMAbjuhwd/uSA+epSfrgDNgIY GoURf7+0lDNR1DBKsqr12s6iu4vBvUzKo8be8xThFY8edc6ywz91mDYZLM5b/02qQUniCgbP/Ei 6ZWBVk6Nq56H4cpP73Q3hZ5tpfxiSe9g7mQdJzhedsCudIIsZTx+2LIqNmtCxm2yCUzRNeaelW7 arxTNHYy3PkaLtS6qKlRqPCRYwEIoUOTWQl7EvAvmQ0gDCQe0CaceNfk7y2j+z/PaLqWMBAAI+8 BMEGnDcJqKcsg7SSPcxe/n56ep6w4YlsZcAHlU+cChPhtO6OvloAnGr4qhqJv4V2TxsYRj7wS/J 3wogUpXjujEbRvcRV+lXexX99t/Sl5cYQQGW/qtOCMCMzOYUkpgPVaEY4Jo8WMkQWv6iXoC+VlR HhOyKFoh/IyQbQvP9xmfnR7MeqLZAVphLW/basQd9qPXhnJVWgRcrSEFLc=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/djGEgQJ-XZ5XExDK_JMFAnDBlJk>
Subject: Re: [mpls] MPLS Working Group Last Call on draft-ietf-mpls-mna-requirements
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Oct 2023 15:01:45 -0000

Thanks Matthew and Stewart.

 

There is obviously a lot to go through here (mainly my fault for raising comments)-: but I hope to catch up with it “real soon, now.”

 

A very quick skim through Matthew’s email in a motorway service station suggests we are at least 80% there. Probably better than that.

 

A

 

From: Stewart Bryant <sb@stewartbryant.com> 
Sent: 24 October 2023 11:28
To: Matthew Bocci (Nokia) <matthew.bocci@nokia.com>
Cc: Stewart Bryant <sb@stewartbryant.com>; adrian@olddog.co.uk; loa Andersson <loa@pi.nu>; mpls@ietf.org; draft-ietf-mpls-mna-requirements@ietf.org
Subject: Re: [mpls] MPLS Working Group Last Call on draft-ietf-mpls-mna-requirements

 

Thank you Adrian/ We will work through these points in the process of producing a new draft, assuming of course we are aiming to publish a draft at all. I think an RFC is useful, but if we are not going to publish an RFC, why would we spend time refining and polishing the text? 

 

I agree with Matthew, however I have a few additional comments that I include in the snipped text below.

 


---

Section 5 is a bit skimpy. You might at least point back to the
requirements in the other sections that relate to security.

But, since you say, "The mechanisms required by this document introduce
new security considerations to MPLS," you might at venture to say what
those new considerations are. In particular, does the use of MNA make
any difference to the security properties of other MPLS functions?




MB> To be honest, there has been little discussion of the security implications of MNA in the working group.
As an author I have a concern about a couple of aspects of MNA: it potentially
allows solutions to embed metadata from the payload into the MPLS layer (so exposing data that a user
might assume is otherwise opaque to any transport network), and using something inserted by the ingress LER to affect forwarding
downstream when the ingress may have no idea how that is being used or whether it is used in a manner consistent with
its intended use by ingress. 

 

I  rewrote the FWK security section and I think that it could use yet more work. I think the right approach is to generalise the FWK text and see if there are other generalities that need including in the REQ test. We are in much the same position as SRv6 and N/W programming where introducing new capabilities in the data-plane as per the current fashion does expose new vulnerabilities. Indeed I wonder if IP itself would pass a modern security audit and thus have been killed over 40 years ago. This is of course all about pragmatism and we should use the requirements text to at least get people thinking in the right direction. 

 






== MINOR ==

It came as a surprise to me in Section 1.1 that Ancillary Data can be
write as well as read. Maybe I haven't been paying attention to the
use cases. I suppose this is OK so long as the WG noticed and agreed.




MB> This reflects discussion about use cases such as time bounded networking where a mid-point may need to update a timestamp
embedded in the packet.

 

Yes there are a number of cases where it needs to be written. There are certainly cases associated with modern thinking on congestion control particularly in the 5/6G world. There is the NFFRR case (nearly 20 years back we abandoned some IPFRR approaches due to the absence of this facility) particularly with some of the failover approaches people seem to be thinking about. Then there is time transfer where residence time accumulation is required to improve the radar part of the time transfer. Time transfer is an increasing <http://increasing.ly> ly urgent aspect of national infrastructure security requirements as the vulnerability of space based time transfer becomes more apparent.

 

3.1

   6.   The design of any MNA solution SHOULD be such that an LSR is
        able to efficiently parse the label stack.

What does it mean to parse a label stack? Are you saying that an
implementation should be able to read ahead in the label stack? Is that
consistent with the MPLS architecture?




MB> Yes. Scanning the label stack is done today in the case of Entropy Label.

.. and there is an expectation within the WG that the NMA information will be deep in the stack if only to co-exist with SR.





What does "efficient" mean in this context?




MB> We were trying to capture a requirement to minimise how deep in the stack such parsing is required. I agree
we should be more explicit here. 


Why is this a SHOULD? How would a solution designer decide to vary this?




MB> I agree it would be better as a MUST.

 

The problem with MUST is that it is solution constraining. 

 

The reason for “efficient” is that this is in the fast path and so directly impacts the headline performance and the amount of h.w support needed to maintain that performance. As you know is a fundamental of all packet components that are processed by the forwarder in the fasts path that the process needs to be efficient. Unfortunately only a few modern engineers seem to have ever written forwarders and most need to be reminded that not thinking through this aspect of the problem carefully enough has significant consequences.

 

 

---

3.1

   8.   Consistent with MPLS best practise, MNA solutions MUST NOT
        increase the size of the MPLS label stack more than is
        necessary.

You and I might agree on this "best practice" but is it described
anywhere that can be referenced? And, is it necessary to mention the
best practice, or could you just write the requirement.




MB> I agree we can remove ‘consistent with MPLS best …’


And what does "more than is necessary" mean in the context of a
proposed solution?




MB> There are always going to be practical constraints on the size of the stack that can be pushed at ingress LER. This
is made worse by MNA, which may consume space that is needed for LSP labels, for example from an SR-TE label stack.
So what we were trying to say was that solution design choices, for example the way NAIs or ancillary data are encoded,  matters.

MB> We could be more specific and say that ‘solutions MUST minimize any additions to the size of the MPLS label stack”. 

 

That is going to result in the ISD folks complaining that we are promoting PSD. That needs to be carefully worded and that is what the original text tried to do.

 

---

3.4

   11.  A solution MUST be provided to verify the authenticity of
        ancillary data processed to LSRs [RFC3552].

"Authenticity" is only mentioned once in 3552. "Authentication" is
mentioned a lot, but it is mainly about user identity. I think you
may be talking about "Data Integrity"?




MB> Yes. The intent here is to say that mechanisms are required to prevent a bad actor from using MNA to alter the forwarding or other behavior of the network in an undesirable way.

 

… except I cannot see how you get a satisfactory authentication method to work within acceptable ISD constraints.

 

- Stewart