Return-Path: <agmalis@gmail.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id A95F4129A4B;
 Wed, 20 Mar 2019 07:57:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.01
X-Spam-Level: 
X-Spam-Status: No, score=-0.01 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001,
 HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001,
 SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
 header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id qtzkuNK-sVuk; Wed, 20 Mar 2019 07:57:22 -0700 (PDT)
Received: from mail-qt1-x829.google.com (mail-qt1-x829.google.com
 [IPv6:2607:f8b0:4864:20::829])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 921771310AB;
 Wed, 20 Mar 2019 07:57:21 -0700 (PDT)
Received: by mail-qt1-x829.google.com with SMTP id x12so2834006qts.7;
 Wed, 20 Mar 2019 07:57:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; 
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=P4d6J+UPPOrwoW2ZqDCOqXyWMbjF+fo8t6W/R6RACts=;
 b=jxz0YQHVCGX9QRX90YokZi9ZCrrRl4VrtbYVqhqRfghv3KH/7fE+9o810PnX996TcY
 +sml5eTKlWM+kSBMA6q1HqkBZVJVguqL5ZSFBO7eU5+vyrQGSAkA7DG4zGl0U4g6MjZY
 RblpAnHnQm5x77z/nsDIyBnI8NjbzmSmVa2q5YYdppLdaR+yrOpKO/hJY8FQSxfCdCA7
 hmsaMWD1hTLq7A6O2OYaEFPnKQqe7mYTC+NDfthDyW6YN467Xs9pqgX4Y/R/74FOgq+/
 k03aOl7MLCtH/bgC+7HD49Vnb+l4O6b2t3VUZVpML/XMmx92Fzoevf2ZgvEKnKXMwDC2
 qiXg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=P4d6J+UPPOrwoW2ZqDCOqXyWMbjF+fo8t6W/R6RACts=;
 b=td+BHM3WIdATRrw1yW/qHRd2jDQaxqyO2L0mkxNbR1kEiLIp1liABzDn6FOcVOeLue
 OtwurMr6QDryrtk9RQUYvLydR5howuOpMvskkz41P2eML6QZRKfiJtTjS4oBJulEKCZv
 6rPWRw2ZAC42U8jgZvH9ds0xmsPITfD4QTN5Qa+laCv1cI3P+JV5//5+xQH76+UjYfOr
 4jwxatVUn8e1M+7zjc4np2rpKwuJX8qJpTDIQ5jVVoqkj5/mU+W4MTo1B36/2wxWnc1N
 2jH/KaL1vuJD9KxJSLB080CIreXdYTwLh71I05DW4GvpEdkE2GkwATSIMpf5MTuREtmD
 bzyQ==
X-Gm-Message-State: APjAAAVqF6LPE3hSp4xqr8oEXff08IOxInInq1GBELYtzznLJrchoUK3
 EZjavu5AjkletosuHEESJZXMo1olcAoCl0KLRMPURUeahRg=
X-Google-Smtp-Source: APXvYqwyn9dARQocRk6/VPg0vjPmvT/j9Cp//nsASllWBk2wkqnP7QnHd3/zp4Fls7BVz0em9S1rmW3XYORok3JAoVY=
X-Received: by 2002:a0c:9319:: with SMTP id d25mr6775795qvd.99.1553093840504; 
 Wed, 20 Mar 2019 07:57:20 -0700 (PDT)
MIME-Version: 1.0
References: <155252958505.24865.4180223375091950120.idtracker@ietfa.amsl.com>
 <CAA=duU2xRovw34jTWQQdkufrenBq-SHgKh_6hSWLcy0OuSzQTQ@mail.gmail.com>
 <20190320001751.GS80498@kduck.mit.edu>
 <CAA=duU1CNcPSZxyeFYveOkBf8jZFsdRCnohJCv_WSmUgf92rdA@mail.gmail.com>
In-Reply-To: <CAA=duU1CNcPSZxyeFYveOkBf8jZFsdRCnohJCv_WSmUgf92rdA@mail.gmail.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Wed, 20 Mar 2019 10:57:09 -0400
Message-ID: <CAA=duU1204gJN6L88u-EUu2S3tXV5_bF2T_WqagqEDwLUG=JaA@mail.gmail.com>
To: Benjamin Kaduk <kaduk@mit.edu>
Cc: The IESG <iesg@ietf.org>, draft-ietf-mpls-sfc-encapsulation@ietf.org, 
 Loa Andersson <loa@pi.nu>, mpls-chairs <mpls-chairs@ietf.org>,
 mpls <mpls@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000aa8d20058487d614"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/nkB709TUx1G8vBzS49IzL_PTP6E>
Subject: Re: [mpls] Benjamin Kaduk's Discuss on
 draft-ietf-mpls-sfc-encapsulation-03: (with DISCUSS and COMMENT)
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>,
 <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>,
 <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2019 14:57:28 -0000

--000000000000aa8d20058487d614
Content-Type: text/plain; charset="UTF-8"

It turns out that the BBF recently reorganized their website. The new URL
is
https://www.broadband-forum.org/wp-content/uploads/2018/12/IPMPLSForum19.0.0.pdf
.

Cheers,
Andy




On Wed, Mar 20, 2019 at 8:12 AM Andrew G. Malis <agmalis@gmail.com> wrote:

> Benjamin,
>
> Thanks again. I'm not sure why that BBF URL stopped working, but you can
> find the document here:
>
>
> https://web.archive.org/web/20160426184514/https://www.broadband-forum.org/technical/download/ipmpls/IPMPLSForum19.0.0.pdf
>
> I'll check with them regarding fixing the link going forward.
>
> Regarding option a of RFC 4364, see section 10 on p. 32. We've always
> referred to those as options a, b, and c.
>
> Once I get the go-ahead from Deborah, I'll do an update on the draft.
>
> Cheers,
> Andy
>
>
>
>
> On Tue, Mar 19, 2019 at 8:17 PM Benjamin Kaduk <kaduk@mit.edu> wrote:
>
>> On Fri, Mar 15, 2019 at 11:05:59AM -0400, Andrew G. Malis wrote:
>> > Benjamin,
>> >
>> > Thanks for your review and comments. See below inline.
>> >
>> > On Wed, Mar 13, 2019 at 10:13 PM Benjamin Kaduk via Datatracker <
>> > noreply@ietf.org> wrote:
>> >
>> > >
>> > > ----------------------------------------------------------------------
>> > > DISCUSS:
>> > > ----------------------------------------------------------------------
>> > >
>> > > Thanks for this clear and concise document!  I just have one concern,
>> > > which will hopefully be easy to resolve (since there is a good chance
>> > > that all the text necessary to do so is already written).
>> > >
>> > > As far as I can tell, the comment made by the secdir reviewer of
>> > > draft-ietf-mpls-sfc-04 about circular references between that document
>> > > and RFCs 7665 and 8300 regarding security properties, is also somewhat
>> > > applicable to this document.  I do recognize the validity of first
>> > > paragraph of the security considerations here (the NSH is an opaque
>> > > payload for MPLS), but that in and of itself does not present a
>> security
>> > > analysis of the NSH in the MPLS environment.  The last paragraph of
>> the
>> > > security considerations of this document attempts to provide some
>> > > analysis, but it seems to be incomplete and perhaps overly optimistic,
>> > > particularly with respect to the use of MPLS with Inter-Carrier
>> > > Interconnect and the processing of MPLS traffic from external
>> > > interfaces.  Is there any reason not to fully harmonize (i.e.,
>> > > synchronize) the security considerations of draft-ietf-mpls-sfc and
>> > > draft-ietf-mpls-sfc-encapsulation?  (I guess the first paragraph of
>> this
>> > > document's security considerations doesn't apply to the other
>> document,
>> > > that allocates extended-special-purpose label values, but that's the
>> > > only thing I saw.)
>> > >
>> >
>> > Trying to keep this document in sync with draft-ietf-mpls-sfc was
>> difficult
>> > because it was a moving target while this draft was being developed,
>> and of
>> > course, it was updated during IETF last call and IESG review following
>> the
>> > completion of this draft. And as you noted, there are some fundamental
>> > differences between the two drafts. Because the other draft makes some
>> > additions and changes to the MPLS label stack while this draft uses the
>> > MPLS label stack as designed and in wide practice, there's text in the
>> > other draft that doesn't apply to this one, such as regarding the use of
>> > MPLS to encode a logical representation of the NSH.
>>
>> Other than things purely related to the specific encoding of the semantic
>> content of the NSH, though, it seems that the security and privacy
>> considerations to conveying the information content of the NSH over MPLS
>> transit should be essentially identical, regardless of how that semantic
>> content is encoded.  Did you have in mind text in specifically the
>> security
>> considerations of the other draft that doesn't apply to this one?  I made
>> a quick skim and didn't see anything that stuck out, but it was pretty
>> quick.
>>
>> > If you have any specific suggestions for improvement for the text here,
>> > that would be greatly appreciated! Also, does the IESG have any policy
>>
>> I suppose this may change given the response to my question above, but
>> given my comments in the COMMENT section on this document's security
>> considerations, my initial specific suggestion would be to take the first
>> paragraph from this document, strike the other three paragraphs, and
>> incorporate (whether inline or by reference) the full security
>> considerations from the other document.
>>
>> (And to be clear, "initial" and "suggestion" are important words here; I
>> don't intend to say this is the final word.)
>>
>> > regarding direct copying of applicable text from one draft to another in
>> > situations like this? Or perhaps we could just add a reference to
>>
>> I don't know of a policy one way or the other...
>>
>> > particular paragraphs in section 15 of draft-ietf-mpls-sfc? That would
>> > remove the need to copy any text.
>>
>> ... but the reference seems like it should be sufficient, at least.
>>
>> > I'll await your reply before taking any action.
>> >
>> >
>> > ----------------------------------------------------------------------
>> > > COMMENT:
>> > > ----------------------------------------------------------------------
>> > >
>> > > Section 1
>> > >
>> > >    This encapsulation is equivalent from an SFC perspective to other
>> > >    transport encapsulations of packets using the NSH.  This can be
>> > >    illustrated by adding an additional line to the example of a
>> next-hop
>> > >    SPI/SI-to-network overlay network locator mapping in Table 1 of
>> > >    [RFC8300]:
>> > >
>> > > We probably should expand SPI and SI, since we haven't yet hit a
>> > > terminiology section or a note that (implies that) readers should be
>> > > familiar with the standard SFC terminology.
>> > > Also, Table 1 of RFC 8300 is labeled "SFF NSH Mapping Example"; it's
>> not
>> > > really clear that specifically that table is the best way to
>> illustrate
>> > > how the MPLS encapsulation would work.
>> > >
>> >
>> >  That table 1 extension was added to the draft as a result of the
>> Routing
>> > Directorate review. Other than expanding the acronyms, I'll leave making
>> > any changes here up to Deborah.
>>
>> Okay.  I doubt I'm really the target audience anyway...
>>
>> >
>> > > (side note) We use the strings "VPN" and "virtual private" here, which
>> > > in some contexts will cause an (uninformed) reader to assume that data
>> > > privacy (confidentiality) is involved; our uses do not seem to be for
>> > > cases that would involve such a confidentiality property.  As a
>> general
>> > > matter, not necessarily involving changes to this document, it may be
>> > > good to try to reserve these terms for cases where the confidentiality
>> > > is in fact provided, to help disambiguate the cases for the reader.
>> > >
>> >
>> > I take your point, but these are just examples of other uses of MPLS
>> > service labels.
>> >
>> >
>> > > Section 2.1
>> > >
>> > > nit: s/The TTL For/The TTL for/ (twice)
>> > >
>> >
>> > Will fix.
>> >
>> >
>> > >
>> > > Section 3
>> > >
>> > >    For SFC, ECMP may or may not be desirable.  To prevent ECMP when it
>> > >    is not desired, the NSH Base Header was carefully constructed so
>> that
>> > >    the NSH could not look like IPv4 or IPv6 based on its first nibble.
>> > >    See Section 2.2 of [RFC8300] for further details.
>> > >
>> > > nit: this paragraph might flow better into the next one if we add a
>> note
>> > > that "Accordingly, the default behavior for MPLS-encapsulated SFC will
>> > > not use ECMP."
>> > >
>> >
>> > Good suggestion, will add.
>> >
>> >
>> > >
>> > > Section 6
>> > >
>> > >    However, it can be argued that carrying the NSH over MPLS is more
>> > >
>> > > re: "it can be argued" -- is this document attempting to make that
>> > > argument?
>> > >
>> >
>> > It could be argued that is the case! :-)
>>
>> I think that "arguably is more secure" would more directly represent such
>> a claim, but it is of course your call.
>>
>> >
>> > >    secure than using other encapsulations, as it is extremely
>> difficult,
>> > >    due to the MPLS architecture, for an attempted attacker to inject
>> > >
>> > > It's not entirely clear to me how much of this is the MPLS
>> architecture
>> > > vs. implementation/deployment; I suppose to some extent it is true of
>> > > both.
>> > >
>> >
>> > IMHO, it really is a result of the architecture, and as a result, any
>> > implementation that properly follows the architecture. MPLS packets
>> must be
>> > created by a PE router, and downstream P routers will drop any incoming
>>
>> (I think the crux of what I'm "not clear" about is the source of this
>> "must".  But it seems unlikely to be relevant to the present discussion,
>> so
>> perhaps we should just drop this topic.)
>>
>> > MPLS packets from upstream P or PE routers that don't have a top-most
>> label
>> > that's in the router's LIB. So successfully injecting MPLS attack
>> packets
>>
>> Just needing to know the label allocations that are valid for that router
>> is unlikely to inspire much confidence from security-area folks; given
>> that
>> this is necessarily shared with several parties (i.e., at least everything
>> directly connected to that router) it's hard for us, in our mental model,
>> to be confident that it will remain secret and unguessable.  (Also,
>> depending on their goal, an attacker may not need to know what a specific
>> label does, so if they just need to be able to guess *any* valid label,
>> their job gets easier.)
>>
>> > really does require insider access, and if you have that, there are so
>> many
>>
>> An N of 2**20 chance of success (per packet!) doesn't really mesh with
>> "requires insider access", given my present understanding.
>>
>> > other bad things you can do that are less expensive or difficult than
>> > trying to use an MPLS-based attack.
>>
>> Sure, but that doesn't always mean that we should completely ignore the
>> risk; the situation may not always be that way.
>>
>> >
>> > >
>> > >    unexpected MPLS packets into a network, as MPLS networks do not by
>> > >    design accept MPLS packets from external interfaces, and an
>> attacker
>> > >
>> > > What about Inter-Carrier Interconnect?
>> > >
>> >
>> > MPLS ICI is really off-topic for this draft because the NSH is only
>> used in
>> > limited SFC domains that not only within a single domain (see RFC 8300),
>> > but within a well-defined sub-domain of that provider, such as within a
>> > data center.
>>
>> The specific text I quoted was supposedly talking about generic MPLS
>> networks, not restricted to sites using the NSH.  The argument, as stated,
>> does not seem to hold up, given the ability of MPLS networks to use ICI to
>> accept external traffic (i.e., it is "within the design").  The specific
>> environments in which the NSH is intended to be used may well have a
>> different situation, but the current text does not reflect that different
>> situation, just from a purely rhetorical point of view.
>>
>> > That said, just to answer your question, carriers for the most part
>> don't
>> > do MPLS across carrier boundaries, there's too much trust that would be
>> > required. That said, there are some examples of inter-carrier MPLS, most
>> > commonly using RFC 4364 option A, which really isn't an MPLS interface.
>> > There is an MPLS Forum document,
>> >
>> https://www.broadband-forum.org/technical/download/ipmpls/IPMPLSForum19.0.0.pdf
>> > , which discusses the various ways one can implement an MPLS ICI and the
>> > security implications of doing so, in section 13.
>>
>> (I couldn't find "option A" in RFC 4364, and the broadband-forum link
>> gives
>> a 404 over here.)
>>
>> >
>> > >
>> > >    would need knowledge of the specific labels allocated by control
>> and/
>> > >    or management plane protocols.  Thus, an attacker attempting to
>> spoof
>> > >    MPLS-encapsulated NSH packets would require insider knowledge of
>> the
>> > >
>> > > An attacker in a position to inject traffic seems likely to also be
>> able
>> > > to observe legitimate traffic and correspondingly their valid label
>> > > values (if not necessarily the mapping from label to behavior).
>> > >
>> >
>> > Absolutely, As I said above, if you've got that much insider access,
>> there
>> > are much easier ways to screw up a network than play with MPLS packets.
>>
>> My point is that from a rhetorical point of view, this is a facile
>> argument
>> -- the "requirement" would essentially always be met by anyone that meets
>> the preconditions from the first part of the sentence.
>>
>> >
>> > >
>> > >    network's control and management planes and a way to inject packets
>> > >    into internal interfaces.  This is compared to, for example, NSH
>> over
>> > >    UDP over IP, which could be injected into any external interface
>> in a
>> > >    network that was not properly configured to filter out such packets
>> > >    at the ingress.
>> > >
>> > > The NSH security considerations already (essentially) require this
>> > > filtering at ingress behavior; the practical question relevant here
>> > > seems to just be a matter of scale -- how hard it is to misconfigure
>> > > this filtering or how likely it is that the relevant filtering is
>> > > present as a consequence of factors external to SFC.
>> > >
>> >
>> > I think that's a question more for RFC 8300 than this draft. In terms of
>> > how hard it is to misconfigure filtering, that's really an
>> implementation
>> > and deployment question.
>>
>> I guess I'm trying to say that the comparison doesn't feel particularly
>> compelling to me (given my (low) level of background knowledge) -- 8300
>> requires this sort of filtering in all cases, whether MPLS or UDP or
>> otherwise.  The expected MPLS deployment setup (or architecture, as you
>> put
>> it) makes this happen essentially by default, but anything using the NSH
>> is
>> supposed to do it.  So, the comparison is not really about the encoding
>> per se, but rather around the risk/likelihood of noncompliant deployment,
>> but the current wording gives the impression that it's supposed to arise
>> as
>> a natural consequence of the encoding (as opposed to the deployment
>> details).
>>
>> > Thanks again for your review.
>>
>> And thanks for your responses!  Sorry for the slow reply.
>>
>> Benjamin
>>
>

--000000000000aa8d20058487d614
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">It turns out that the BBF recently reorga=
nized their website. The new URL is=C2=A0<a href=3D"https://www.broadband-f=
orum.org/wp-content/uploads/2018/12/IPMPLSForum19.0.0.pdf">https://www.broa=
dband-forum.org/wp-content/uploads/2018/12/IPMPLSForum19.0.0.pdf</a> .</div=
><div dir=3D"ltr"><br></div><div>Cheers,</div><div>Andy</div><div><br></div=
><div dir=3D"ltr"><br></div><div dir=3D"ltr"><br></div></div><br><div class=
=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Mar 20, 2019=
 at 8:12 AM Andrew G. Malis &lt;<a href=3D"mailto:agmalis@gmail.com">agmali=
s@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr">Benjamin,<div><br></div><div>T=
hanks again. I&#39;m not sure why that BBF URL stopped working, but you can=
 find the document here:</div><div><br></div><div><a href=3D"https://web.ar=
chive.org/web/20160426184514/https://www.broadband-forum.org/technical/down=
load/ipmpls/IPMPLSForum19.0.0.pdf" target=3D"_blank">https://web.archive.or=
g/web/20160426184514/https://www.broadband-forum.org/technical/download/ipm=
pls/IPMPLSForum19.0.0.pdf</a><br></div><div><br></div><div>I&#39;ll check w=
ith them regarding fixing the link going forward.</div><div><br></div><div>=
Regarding option a of=C2=A0RFC 4364, see section 10 on p. 32. We&#39;ve alw=
ays referred to those as options a, b, and c.</div><div><br></div><div>Once=
 I get the go-ahead from Deborah, I&#39;ll do an update on the draft.</div>=
<div><br></div><div>Cheers,</div><div>Andy</div><div><br></div><div><br></d=
iv><div><br></div></div></div><br><div class=3D"gmail_quote"><div dir=3D"lt=
r" class=3D"gmail_attr">On Tue, Mar 19, 2019 at 8:17 PM Benjamin Kaduk &lt;=
<a href=3D"mailto:kaduk@mit.edu" target=3D"_blank">kaduk@mit.edu</a>&gt; wr=
ote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px=
 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">On Fri, Mar=
 15, 2019 at 11:05:59AM -0400, Andrew G. Malis wrote:<br>
&gt; Benjamin,<br>
&gt; <br>
&gt; Thanks for your review and comments. See below inline.<br>
&gt; <br>
&gt; On Wed, Mar 13, 2019 at 10:13 PM Benjamin Kaduk via Datatracker &lt;<b=
r>
&gt; <a href=3D"mailto:noreply@ietf.org" target=3D"_blank">noreply@ietf.org=
</a>&gt; wrote:<br>
&gt; <br>
&gt; &gt;<br>
&gt; &gt; -----------------------------------------------------------------=
-----<br>
&gt; &gt; DISCUSS:<br>
&gt; &gt; -----------------------------------------------------------------=
-----<br>
&gt; &gt;<br>
&gt; &gt; Thanks for this clear and concise document!=C2=A0 I just have one=
 concern,<br>
&gt; &gt; which will hopefully be easy to resolve (since there is a good ch=
ance<br>
&gt; &gt; that all the text necessary to do so is already written).<br>
&gt; &gt;<br>
&gt; &gt; As far as I can tell, the comment made by the secdir reviewer of<=
br>
&gt; &gt; draft-ietf-mpls-sfc-04 about circular references between that doc=
ument<br>
&gt; &gt; and RFCs 7665 and 8300 regarding security properties, is also som=
ewhat<br>
&gt; &gt; applicable to this document.=C2=A0 I do recognize the validity of=
 first<br>
&gt; &gt; paragraph of the security considerations here (the NSH is an opaq=
ue<br>
&gt; &gt; payload for MPLS), but that in and of itself does not present a s=
ecurity<br>
&gt; &gt; analysis of the NSH in the MPLS environment.=C2=A0 The last parag=
raph of the<br>
&gt; &gt; security considerations of this document attempts to provide some=
<br>
&gt; &gt; analysis, but it seems to be incomplete and perhaps overly optimi=
stic,<br>
&gt; &gt; particularly with respect to the use of MPLS with Inter-Carrier<b=
r>
&gt; &gt; Interconnect and the processing of MPLS traffic from external<br>
&gt; &gt; interfaces.=C2=A0 Is there any reason not to fully harmonize (i.e=
.,<br>
&gt; &gt; synchronize) the security considerations of draft-ietf-mpls-sfc a=
nd<br>
&gt; &gt; draft-ietf-mpls-sfc-encapsulation?=C2=A0 (I guess the first parag=
raph of this<br>
&gt; &gt; document&#39;s security considerations doesn&#39;t apply to the o=
ther document,<br>
&gt; &gt; that allocates extended-special-purpose label values, but that&#3=
9;s the<br>
&gt; &gt; only thing I saw.)<br>
&gt; &gt;<br>
&gt; <br>
&gt; Trying to keep this document in sync with draft-ietf-mpls-sfc was diff=
icult<br>
&gt; because it was a moving target while this draft was being developed, a=
nd of<br>
&gt; course, it was updated during IETF last call and IESG review following=
 the<br>
&gt; completion of this draft. And as you noted, there are some fundamental=
<br>
&gt; differences between the two drafts. Because the other draft makes some=
<br>
&gt; additions and changes to the MPLS label stack while this draft uses th=
e<br>
&gt; MPLS label stack as designed and in wide practice, there&#39;s text in=
 the<br>
&gt; other draft that doesn&#39;t apply to this one, such as regarding the =
use of<br>
&gt; MPLS to encode a logical representation of the NSH.<br>
<br>
Other than things purely related to the specific encoding of the semantic<b=
r>
content of the NSH, though, it seems that the security and privacy<br>
considerations to conveying the information content of the NSH over MPLS<br=
>
transit should be essentially identical, regardless of how that semantic<br=
>
content is encoded.=C2=A0 Did you have in mind text in specifically the sec=
urity<br>
considerations of the other draft that doesn&#39;t apply to this one?=C2=A0=
 I made<br>
a quick skim and didn&#39;t see anything that stuck out, but it was pretty<=
br>
quick.<br>
<br>
&gt; If you have any specific suggestions for improvement for the text here=
,<br>
&gt; that would be greatly appreciated! Also, does the IESG have any policy=
<br>
<br>
I suppose this may change given the response to my question above, but<br>
given my comments in the COMMENT section on this document&#39;s security<br=
>
considerations, my initial specific suggestion would be to take the first<b=
r>
paragraph from this document, strike the other three paragraphs, and<br>
incorporate (whether inline or by reference) the full security<br>
considerations from the other document.<br>
<br>
(And to be clear, &quot;initial&quot; and &quot;suggestion&quot; are import=
ant words here; I<br>
don&#39;t intend to say this is the final word.)<br>
<br>
&gt; regarding direct copying of applicable text from one draft to another =
in<br>
&gt; situations like this? Or perhaps we could just add a reference to<br>
<br>
I don&#39;t know of a policy one way or the other...<br>
<br>
&gt; particular paragraphs in section 15 of draft-ietf-mpls-sfc? That would=
<br>
&gt; remove the need to copy any text.<br>
<br>
... but the reference seems like it should be sufficient, at least.<br>
<br>
&gt; I&#39;ll await your reply before taking any action.<br>
&gt; <br>
&gt; <br>
&gt; ----------------------------------------------------------------------=
<br>
&gt; &gt; COMMENT:<br>
&gt; &gt; -----------------------------------------------------------------=
-----<br>
&gt; &gt;<br>
&gt; &gt; Section 1<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 This encapsulation is equivalent from an SFC perspec=
tive to other<br>
&gt; &gt;=C2=A0 =C2=A0 transport encapsulations of packets using the NSH.=
=C2=A0 This can be<br>
&gt; &gt;=C2=A0 =C2=A0 illustrated by adding an additional line to the exam=
ple of a next-hop<br>
&gt; &gt;=C2=A0 =C2=A0 SPI/SI-to-network overlay network locator mapping in=
 Table 1 of<br>
&gt; &gt;=C2=A0 =C2=A0 [RFC8300]:<br>
&gt; &gt;<br>
&gt; &gt; We probably should expand SPI and SI, since we haven&#39;t yet hi=
t a<br>
&gt; &gt; terminiology section or a note that (implies that) readers should=
 be<br>
&gt; &gt; familiar with the standard SFC terminology.<br>
&gt; &gt; Also, Table 1 of RFC 8300 is labeled &quot;SFF NSH Mapping Exampl=
e&quot;; it&#39;s not<br>
&gt; &gt; really clear that specifically that table is the best way to illu=
strate<br>
&gt; &gt; how the MPLS encapsulation would work.<br>
&gt; &gt;<br>
&gt; <br>
&gt;=C2=A0 That table 1 extension was added to the draft as a result of the=
 Routing<br>
&gt; Directorate review. Other than expanding the acronyms, I&#39;ll leave =
making<br>
&gt; any changes here up to Deborah.<br>
<br>
Okay.=C2=A0 I doubt I&#39;m really the target audience anyway...<br>
<br>
&gt; <br>
&gt; &gt; (side note) We use the strings &quot;VPN&quot; and &quot;virtual =
private&quot; here, which<br>
&gt; &gt; in some contexts will cause an (uninformed) reader to assume that=
 data<br>
&gt; &gt; privacy (confidentiality) is involved; our uses do not seem to be=
 for<br>
&gt; &gt; cases that would involve such a confidentiality property.=C2=A0 A=
s a general<br>
&gt; &gt; matter, not necessarily involving changes to this document, it ma=
y be<br>
&gt; &gt; good to try to reserve these terms for cases where the confidenti=
ality<br>
&gt; &gt; is in fact provided, to help disambiguate the cases for the reade=
r.<br>
&gt; &gt;<br>
&gt; <br>
&gt; I take your point, but these are just examples of other uses of MPLS<b=
r>
&gt; service labels.<br>
&gt; <br>
&gt; <br>
&gt; &gt; Section 2.1<br>
&gt; &gt;<br>
&gt; &gt; nit: s/The TTL For/The TTL for/ (twice)<br>
&gt; &gt;<br>
&gt; <br>
&gt; Will fix.<br>
&gt; <br>
&gt; <br>
&gt; &gt;<br>
&gt; &gt; Section 3<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 For SFC, ECMP may or may not be desirable.=C2=A0 To =
prevent ECMP when it<br>
&gt; &gt;=C2=A0 =C2=A0 is not desired, the NSH Base Header was carefully co=
nstructed so that<br>
&gt; &gt;=C2=A0 =C2=A0 the NSH could not look like IPv4 or IPv6 based on it=
s first nibble.<br>
&gt; &gt;=C2=A0 =C2=A0 See Section 2.2 of [RFC8300] for further details.<br=
>
&gt; &gt;<br>
&gt; &gt; nit: this paragraph might flow better into the next one if we add=
 a note<br>
&gt; &gt; that &quot;Accordingly, the default behavior for MPLS-encapsulate=
d SFC will<br>
&gt; &gt; not use ECMP.&quot;<br>
&gt; &gt;<br>
&gt; <br>
&gt; Good suggestion, will add.<br>
&gt; <br>
&gt; <br>
&gt; &gt;<br>
&gt; &gt; Section 6<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 However, it can be argued that carrying the NSH over=
 MPLS is more<br>
&gt; &gt;<br>
&gt; &gt; re: &quot;it can be argued&quot; -- is this document attempting t=
o make that<br>
&gt; &gt; argument?<br>
&gt; &gt;<br>
&gt; <br>
&gt; It could be argued that is the case! :-)<br>
<br>
I think that &quot;arguably is more secure&quot; would more directly repres=
ent such<br>
a claim, but it is of course your call.<br>
<br>
&gt; <br>
&gt; &gt;=C2=A0 =C2=A0 secure than using other encapsulations, as it is ext=
remely difficult,<br>
&gt; &gt;=C2=A0 =C2=A0 due to the MPLS architecture, for an attempted attac=
ker to inject<br>
&gt; &gt;<br>
&gt; &gt; It&#39;s not entirely clear to me how much of this is the MPLS ar=
chitecture<br>
&gt; &gt; vs. implementation/deployment; I suppose to some extent it is tru=
e of<br>
&gt; &gt; both.<br>
&gt; &gt;<br>
&gt; <br>
&gt; IMHO, it really is a result of the architecture, and as a result, any<=
br>
&gt; implementation that properly follows the architecture. MPLS packets mu=
st be<br>
&gt; created by a PE router, and downstream P routers will drop any incomin=
g<br>
<br>
(I think the crux of what I&#39;m &quot;not clear&quot; about is the source=
 of this<br>
&quot;must&quot;.=C2=A0 But it seems unlikely to be relevant to the present=
 discussion, so<br>
perhaps we should just drop this topic.)<br>
<br>
&gt; MPLS packets from upstream P or PE routers that don&#39;t have a top-m=
ost label<br>
&gt; that&#39;s in the router&#39;s LIB. So successfully injecting MPLS att=
ack packets<br>
<br>
Just needing to know the label allocations that are valid for that router<b=
r>
is unlikely to inspire much confidence from security-area folks; given that=
<br>
this is necessarily shared with several parties (i.e., at least everything<=
br>
directly connected to that router) it&#39;s hard for us, in our mental mode=
l,<br>
to be confident that it will remain secret and unguessable.=C2=A0 (Also,<br=
>
depending on their goal, an attacker may not need to know what a specific<b=
r>
label does, so if they just need to be able to guess *any* valid label,<br>
their job gets easier.)<br>
<br>
&gt; really does require insider access, and if you have that, there are so=
 many<br>
<br>
An N of 2**20 chance of success (per packet!) doesn&#39;t really mesh with<=
br>
&quot;requires insider access&quot;, given my present understanding.<br>
<br>
&gt; other bad things you can do that are less expensive or difficult than<=
br>
&gt; trying to use an MPLS-based attack.<br>
<br>
Sure, but that doesn&#39;t always mean that we should completely ignore the=
<br>
risk; the situation may not always be that way.<br>
<br>
&gt; <br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 unexpected MPLS packets into a network, as MPLS netw=
orks do not by<br>
&gt; &gt;=C2=A0 =C2=A0 design accept MPLS packets from external interfaces,=
 and an attacker<br>
&gt; &gt;<br>
&gt; &gt; What about Inter-Carrier Interconnect?<br>
&gt; &gt;<br>
&gt; <br>
&gt; MPLS ICI is really off-topic for this draft because the NSH is only us=
ed in<br>
&gt; limited SFC domains that not only within a single domain (see RFC 8300=
),<br>
&gt; but within a well-defined sub-domain of that provider, such as within =
a<br>
&gt; data center.<br>
<br>
The specific text I quoted was supposedly talking about generic MPLS<br>
networks, not restricted to sites using the NSH.=C2=A0 The argument, as sta=
ted,<br>
does not seem to hold up, given the ability of MPLS networks to use ICI to<=
br>
accept external traffic (i.e., it is &quot;within the design&quot;).=C2=A0 =
The specific<br>
environments in which the NSH is intended to be used may well have a<br>
different situation, but the current text does not reflect that different<b=
r>
situation, just from a purely rhetorical point of view.<br>
<br>
&gt; That said, just to answer your question, carriers for the most part do=
n&#39;t<br>
&gt; do MPLS across carrier boundaries, there&#39;s too much trust that wou=
ld be<br>
&gt; required. That said, there are some examples of inter-carrier MPLS, mo=
st<br>
&gt; commonly using RFC 4364 option A, which really isn&#39;t an MPLS inter=
face.<br>
&gt; There is an MPLS Forum document,<br>
&gt; <a href=3D"https://www.broadband-forum.org/technical/download/ipmpls/I=
PMPLSForum19.0.0.pdf" rel=3D"noreferrer" target=3D"_blank">https://www.broa=
dband-forum.org/technical/download/ipmpls/IPMPLSForum19.0.0.pdf</a><br>
&gt; , which discusses the various ways one can implement an MPLS ICI and t=
he<br>
&gt; security implications of doing so, in section 13.<br>
<br>
(I couldn&#39;t find &quot;option A&quot; in RFC 4364, and the broadband-fo=
rum link gives<br>
a 404 over here.)<br>
<br>
&gt; <br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 would need knowledge of the specific labels allocate=
d by control and/<br>
&gt; &gt;=C2=A0 =C2=A0 or management plane protocols.=C2=A0 Thus, an attack=
er attempting to spoof<br>
&gt; &gt;=C2=A0 =C2=A0 MPLS-encapsulated NSH packets would require insider =
knowledge of the<br>
&gt; &gt;<br>
&gt; &gt; An attacker in a position to inject traffic seems likely to also =
be able<br>
&gt; &gt; to observe legitimate traffic and correspondingly their valid lab=
el<br>
&gt; &gt; values (if not necessarily the mapping from label to behavior).<b=
r>
&gt; &gt;<br>
&gt; <br>
&gt; Absolutely, As I said above, if you&#39;ve got that much insider acces=
s, there<br>
&gt; are much easier ways to screw up a network than play with MPLS packets=
.<br>
<br>
My point is that from a rhetorical point of view, this is a facile argument=
<br>
-- the &quot;requirement&quot; would essentially always be met by anyone th=
at meets<br>
the preconditions from the first part of the sentence.<br>
<br>
&gt; <br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 network&#39;s control and management planes and a wa=
y to inject packets<br>
&gt; &gt;=C2=A0 =C2=A0 into internal interfaces.=C2=A0 This is compared to,=
 for example, NSH over<br>
&gt; &gt;=C2=A0 =C2=A0 UDP over IP, which could be injected into any extern=
al interface in a<br>
&gt; &gt;=C2=A0 =C2=A0 network that was not properly configured to filter o=
ut such packets<br>
&gt; &gt;=C2=A0 =C2=A0 at the ingress.<br>
&gt; &gt;<br>
&gt; &gt; The NSH security considerations already (essentially) require thi=
s<br>
&gt; &gt; filtering at ingress behavior; the practical question relevant he=
re<br>
&gt; &gt; seems to just be a matter of scale -- how hard it is to misconfig=
ure<br>
&gt; &gt; this filtering or how likely it is that the relevant filtering is=
<br>
&gt; &gt; present as a consequence of factors external to SFC.<br>
&gt; &gt;<br>
&gt; <br>
&gt; I think that&#39;s a question more for RFC 8300 than this draft. In te=
rms of<br>
&gt; how hard it is to misconfigure filtering, that&#39;s really an impleme=
ntation<br>
&gt; and deployment question.<br>
<br>
I guess I&#39;m trying to say that the comparison doesn&#39;t feel particul=
arly<br>
compelling to me (given my (low) level of background knowledge) -- 8300<br>
requires this sort of filtering in all cases, whether MPLS or UDP or<br>
otherwise.=C2=A0 The expected MPLS deployment setup (or architecture, as yo=
u put<br>
it) makes this happen essentially by default, but anything using the NSH is=
<br>
supposed to do it.=C2=A0 So, the comparison is not really about the encodin=
g<br>
per se, but rather around the risk/likelihood of noncompliant deployment,<b=
r>
but the current wording gives the impression that it&#39;s supposed to aris=
e as<br>
a natural consequence of the encoding (as opposed to the deployment<br>
details).<br>
<br>
&gt; Thanks again for your review.<br>
<br>
And thanks for your responses!=C2=A0 Sorry for the slow reply.<br>
<br>
Benjamin<br>
</blockquote></div>
</blockquote></div>

--000000000000aa8d20058487d614--

