Re: [nvo3] Review of draft-ietf-nvo3-geneve-13

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Tue, 30 July 2019 18:06 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7A8B120187 for <nvo3@ietfa.amsl.com>; Tue, 30 Jul 2019 11:06:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AGsrS319Afg3 for <nvo3@ietfa.amsl.com>; Tue, 30 Jul 2019 11:06:43 -0700 (PDT)
Received: from mail-qt1-x82b.google.com (mail-qt1-x82b.google.com [IPv6:2607:f8b0:4864:20::82b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11C511201D8 for <nvo3@ietf.org>; Tue, 30 Jul 2019 11:06:42 -0700 (PDT)
Received: by mail-qt1-x82b.google.com with SMTP id h21so63878314qtn.13 for <nvo3@ietf.org>; Tue, 30 Jul 2019 11:06:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=26xEO4XT85imfDUlGhc2nyVgFFjdmiOyEblnn0Rkm3U=; b=WA9uOTcddAxEMsFGY5/Uo+nODd+QmIxJvh8W2OP/m8c5oAXANuANlzMPG1tvCZdRJ3 0Gs5GyNRD0xqvpwBWPtOu/7aSLatcJioyp45i2+TUaZebyyEiP95rUweSRVtO5nOx69v P2nCODI3XovELBQFVx/YB8j+iSe2eL8RfDH5fKh/KwP9aRZGqQZN1fACfy9802BmlNIX kw+qGmRlUnEXoo4qXIRQjjSC5696e5qblaYCb9oa3aJCVqLBBAyNZ8vDudnqS5Fn4oIi WZU7PIioTrRgcKxm9fwa2kLUbseaM6jvyzeW4R0qubccnBZ5Kjv4BAN/7pvrCICDzsCP 8nQg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=26xEO4XT85imfDUlGhc2nyVgFFjdmiOyEblnn0Rkm3U=; b=N7xpD942jUiX1v6MralHGFGSTRMHfLx8xiSZBZHxw8UgZJIFhYPLyXm7ynyun0b99E XB5F14Fkk+o/UOTHCs/1d5Gza+wpo/1/Dvy6m2g4WWea8pCr07/I9xvWHbQJbOAJjcZo TSpkAcAtyMxO+r09gs99vNX+yiGQEnT86/limjxqJM5g5MwBLS9FoE0Oq7+0GwatnrL3 n9zK6VhPZZVCvNncR9iO+OIcfSsemC7zASQZZ9G0slDT7WsGoPJklaCO2T1qdiu+51+m uvfSB//ysFHNXHKwUTH5VAReKPuO04wLVL5pgJy10e8NPF3Mct/BEZnMgWl5Df7vIfpW q43Q==
X-Gm-Message-State: APjAAAVb8cSZX9IWJVwxDBmpKuYepYwTiA6IbC5W50k4+eKF5RTEF2v8 re5UsthjOyIrxUyPrHhnHCY=
X-Google-Smtp-Source: APXvYqxCf3NmhjrT09rnUEm629xMzVHmQcFdiKp36ztBADTSqA/qCUdbK2qLzzIYigpWyFgpG1YW6g==
X-Received: by 2002:aed:3a24:: with SMTP id n33mr80488888qte.361.1564510001113; Tue, 30 Jul 2019 11:06:41 -0700 (PDT)
Received: from [192.168.1.3] (146-115-73-78.s5196.c3-0.arl-cbr1.sbo-arl.ma.cable.rcncustomer.com. [146.115.73.78]) by smtp.gmail.com with ESMTPSA id o12sm27211733qkg.99.2019.07.30.11.06.40 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 30 Jul 2019 11:06:40 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-CA671E15-391B-4BCE-BF1B-F5B51FD1B679"
Mime-Version: 1.0 (1.0)
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
X-Mailer: iPhone Mail (16F203)
In-Reply-To: <CA+RyBmWPHYKBSF5tdKStbVG-ZoZjJ-gne1NQ2p4EsFhDLdQc9g@mail.gmail.com>
Date: Tue, 30 Jul 2019 14:06:39 -0400
Cc: Anoop Ghanwani <anoop@alumni.duke.edu>, Daniel Migault <daniel.migault@ericsson.com>, "Ganga, Ilango S" <ilango.s.ganga@intel.com>, "nvo3@ietf.org" <nvo3@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <7C5A829C-0B23-4061-ABFA-EBF29655AC86@gmail.com>
References: <CAHbuEH66JZd1KOi5_mL8nzdTZ7WjSsOQP8a3B+oSwA6wNnfDKw@mail.gmail.com> <C5A274B25007804B800CB5B289727E35905C4AA0@ORSMSX116.amr.corp.intel.com> <CA+-tSzxD6u+KwEizhWBjQipm=dFVoXbPu2=Agj-sbyKm5Mcrwg@mail.gmail.com> <CADZyTk=bouYF_TmeDfUseAtU9nFMoS3RytmBB3f6z3v+Q-X3Xg@mail.gmail.com> <CA+-tSzyzhS8Gu2g8CKmNsaJHyEZm8AqcHLpCAL2DbdycTR1OaQ@mail.gmail.com> <CA+RyBmWPHYKBSF5tdKStbVG-ZoZjJ-gne1NQ2p4EsFhDLdQc9g@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/fL4XhIHhWKfPBN2L48xhraqNzwc>
Subject: Re: [nvo3] Review of draft-ietf-nvo3-geneve-13
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jul 2019 18:06:46 -0000


Sent from my mobile device

> On Jul 30, 2019, at 1:36 PM, Greg Mirsky <gregimirsky@gmail.com> wrote:
> 
> Hi Anoop,
> thank you for pointing to iOAM as the use case of Geneve options. As I understand, the iOAM for Geneve document offers several options, including one that takes advantage of Geneve options. But such use of options must not, in my opinion, weaken the security in Geneve. We can emphasize that with the text you've proposed and minor, in my opinion, re-wording:
> Transit devices may not be capable to process Geneve option content if the Geneve header is secured.

I do like this addition.

Thank you,
Kathleen 
> 
> 
> Regards,
> Greg
> 
>> On Tue, Jul 30, 2019 at 12:20 PM Anoop Ghanwani <anoop@alumni.duke.edu> wrote:
>> Hi Daniel,
>> 
>> Perhaps what is causing confusion is that there's a difference between NVO3 OAM and I-OAM (the reference provided below).  
>> 
>> From my understanding, NVO3 OAM will involve only NVEs processing those packets, while depending on other OAM methods for the underlay.
>> 
>> On the other hand, with I-OAM the idea is to gather information about all devices along the path.  There are several different encapsulation drafts (e.g. IOAM using Geneve, IOAM using VXLAN GPE, IOAM using NSH, etc.), so this is not NVO3-specific.
>> 
>> Perhaps what the Geneve document needs to note is that the Geneve header cannot be secured if there are devices other than NVEs that are required to process its contents.  Unless there is some non-obvious way of doing it and, if it exists, it would be helpful if a reference is provided.
>> 
>> Thanks,
>> Anoop
>> 
>>> On Tue, Jul 30, 2019 at 6:49 AM Daniel Migault <daniel.migault@ericsson.com> wrote:
>>> Hi, 
>>> 
>>> OAM has been raised during the meeting, so thank you for providing the appropriated references of OAM. My understanding is that OAM is a Geneve option that is updated by the OAM devices that are on path. Is that correct ?
>>> 
>>> IPsec or DTLS authenticate or encrypt the full Geneve packet ( Geneve Header, Geneve Options and Geneve payload) between the NVEs. If my assumption regarding the OAM devices is correct, the use of DTLS or IPsec would not make possible to authenticate or encrypt and Geneve packet with OAM enabled. Again if my assumption is correct, I believe that an appropriated way to address this concern might be to be able to leave some Geneve Option non authenticated. while other parts of the packet is authenticated or encrypted. Such mechanism needs to be implemented at the Geneve layer. 
>>> 
>>> Yours, 
>>> Daniel 
>>> 
>>>> On Fri, Jul 26, 2019 at 2:52 PM Anoop Ghanwani <anoop@alumni.duke.edu> wrote:
>>>> Hi Ilango,
>>>> 
>>>> What would be the recommended way to secure the Geneve header in cases where Geneve header extensions are used and routers in the underlay need to access/process the contents of the Geneve header?  For example, this proposal:
>>>> https://tools.ietf.org/html/draft-brockners-ippm-ioam-geneve-02
>>>> 
>>>> Thanks,
>>>> Anoop
>>>> 
>>>>> On Thu, Jul 25, 2019 at 2:18 PM Ganga, Ilango S <ilango.s.ganga@intel.com> wrote:
>>>>> Hello Kathleen,
>>>>> 
>>>>>  
>>>>> 
>>>>> Thanks for your review of draft-ietf-nvo3-geneve-13.  We could provide additional clarification in section 4.3 to address your comment. Please let us know if this satisfies your comment.
>>>>> 
>>>>>  
>>>>> 
>>>>> Current text in Section 4.3, first paragraph:
>>>>> 
>>>>>    In order to provide integrity of Geneve headers, options and payload,
>>>>>    for example to avoid mis-delivery of payload to different tenant
>>>>>    systems in case of data corruption, outer UDP checksum SHOULD be used
>>>>>    with Geneve when transported over IPv4.  An operator MAY choose to
>>>>>    disable UDP checksum and use zero checksum if Geneve packet integrity
>>>>>    is provided by other data integrity mechanisms such as IPsec or
>>>>>    additional checksums or if one of the conditions in Section 4.3.1 a,
>>>>>    b, c are met.
>>>>>  
>>>>> 
>>>>> Proposed text to 4.3 that we believe would address your comments:
>>>>> 
>>>>>  
>>>>> 
>>>>>    In order to provide integrity of Geneve headers, options and payload,
>>>>>    for example to avoid mis-delivery of payload to different tenant
>>>>>    systems in case of data corruption, outer UDP checksum SHOULD be used
>>>>>    with Geneve when transported over IPv4. "The UDP checksum provides a statistical guarantee that a payload was not corrupted in transit. These integrity checks are not strong from a coding or cryptographic perspective and are not designed to detect physical-layer errors or malicious modification of the datagram (see RFC 8085 section 3.4). In deployments where such a risk exists, an operator SHOULD use additional data integrity mechanisms such as offered by IPSec (see Section 6.2)." 
>>>>>  
>>>>>    An operator MAY choose to
>>>>>    disable UDP checksum and use zero checksum if Geneve packet integrity
>>>>>    is provided by other data integrity mechanisms such as IPsec or
>>>>>    additional checksums or if one of the conditions in Section 4.3.1 a,
>>>>>    b, c are met.
>>>>>  
>>>>> 
>>>>> Thanks,
>>>>> 
>>>>> Ilango
>>>>> 
>>>>>  
>>>>> 
>>>>>  
>>>>> 
>>>>> From: nvo3 [mailto:nvo3-bounces@ietf.org] On Behalf Of Kathleen Moriarty
>>>>> Sent: Tuesday, July 2, 2019 12:43 PM
>>>>> To: nvo3@ietf.org
>>>>> Subject: [nvo3] Review of draft-ietf-nvo3-geneve-13
>>>>> 
>>>>>  
>>>>> 
>>>>> Hello,
>>>>> 
>>>>>  
>>>>> 
>>>>> I just read through draft-ietf-nvo3-geneve, sorry I am out-of-cycle in the review process, but it looks like it has not started IETF last call yet.  I have what's really just a nit and request for a little more text.
>>>>> 
>>>>>  
>>>>> 
>>>>> Section 4.3.1
>>>>> 
>>>>> The value of the UDP checksum is overstated.  The text should note that corruption is still possible as this is a checksum and not a hash with low collision rates.  Corruption happens and goes undetected in normal operations today.
>>>>> 
>>>>> The security considerations section does address the recommendation to use IPsec, but making the connection on the UDP checksum being inadequate could be helpful.
>>>>> 
>>>>>  
>>>>> 
>>>>> Reality:
>>>>> 
>>>>>  
>>>>> 
>>>>> The way this is written, I suspect there really are no plans to use IPsec with GENEVE, are there?  The MUST statements around not altering traffic can only be achieved with IPsec, so if the intent is really to enforce the early MUST statements in the document, sooner mention of IPsec would be good.  If this is more for detecting corruption (and not having that be 100% or close) that should be clear up front.
>>>>> 
>>>>>  
>>>>> 
>>>>> I'm just envisioning use cases where the virtual path is set differently to the physical path for expected operations to route through desired security functions, then an attacker alters checksums to avoid detection of these changes.
>>>>> 
>>>>>  
>>>>> 
>>>>> Thanks and sorry for a late review! 
>>>>> 
>>>>>  
>>>>> 
>>>>> --
>>>>> 
>>>>>  
>>>>> 
>>>>> Best regards,
>>>>> 
>>>>> Kathleen
>>>>> 
>>>>> _______________________________________________
>>>>> nvo3 mailing list
>>>>> nvo3@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/nvo3
>>>> _______________________________________________
>>>> nvo3 mailing list
>>>> nvo3@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/nvo3
>> _______________________________________________
>> nvo3 mailing list
>> nvo3@ietf.org
>> https://www.ietf.org/mailman/listinfo/nvo3