Re: [Pals] Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)

Stephen Farrell <stephen.farrell@cs.tcd.ie> Tue, 27 September 2016 11:27 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: pals@ietfa.amsl.com
Delivered-To: pals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 211F812B460; Tue, 27 Sep 2016 04:27:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.617
X-Spam-Level:
X-Spam-Status: No, score=-6.617 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-2.316, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hBSTRxC26Rhs; Tue, 27 Sep 2016 04:27:20 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5CD1712B4B1; Tue, 27 Sep 2016 04:25:35 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 4886EBE5B; Tue, 27 Sep 2016 12:25:32 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dUhKMZGwLNni; Tue, 27 Sep 2016 12:25:32 +0100 (IST)
Received: from [134.226.36.93] (bilbo.dsg.cs.tcd.ie [134.226.36.93]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 7EA4EBE64; Tue, 27 Sep 2016 12:25:31 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1474975532; bh=fOp5u8PeuJlDJVBxOT01w4fIeXmWeJHMF+yOQfX4Wew=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=ugLWXjlA5c7SgaGJu8YfjHB1dfViMiHk1oVhFRkGiaF1pB1rVyKkGM3dSYPaG1rIj PdLKtvyjJtHOKTe2QdaBoByMPGnU/8FYwpAyv/fGyoajuvQ3fTwX8KtXV5HEW1KzDg nJaKU/qBX4xmX37rxjbBB7XoEofDREbsKHsgxTF8=
To: Jiangyuanlong <jiangyuanlong@huawei.com>, Edwin Mallette <edwin.mallette@gmail.com>, The IESG <iesg@ietf.org>
References: <147381075416.13170.14909169380037916813.idtracker@ietfa.amsl.com> <3B0A1BED22CAD649A1B3E97BE5DDD68B9175EEE0@szxema506-mbs.china.huawei.com> <69703e52-57c6-26b4-7517-6a968ba14620@cs.tcd.ie> <D40008DA.A2F16%edwin.mallette@gmail.com> <3B0A1BED22CAD649A1B3E97BE5DDD68B917627CD@szxema506-mbs.china.huawei.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <a1d04012-3a1b-6e1c-261c-a0b041686014@cs.tcd.ie>
Date: Tue, 27 Sep 2016 12:25:31 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0
MIME-Version: 1.0
In-Reply-To: <3B0A1BED22CAD649A1B3E97BE5DDD68B917627CD@szxema506-mbs.china.huawei.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms070909020709000505060507"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pals/sBEWKlGapvdq5tT51qIfd2QXyLg>
Cc: "pals-chairs@ietf.org" <pals-chairs@ietf.org>, "agmalis@gmail.com" <agmalis@gmail.com>, "draft-ietf-pals-mc-pon@ietf.org" <draft-ietf-pals-mc-pon@ietf.org>, "pals@ietf.org" <pals@ietf.org>
Subject: Re: [Pals] Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)
X-BeenThere: pals@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Pseudowire And LDP-enabled Services dicussion list." <pals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pals>, <mailto:pals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pals/>
List-Post: <mailto:pals@ietf.org>
List-Help: <mailto:pals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pals>, <mailto:pals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Sep 2016 11:27:24 -0000

Hiya,


On 18/09/16 09:28, Jiangyuanlong wrote:
> Hi Ed and Stephen,
> 

Sorry for the slow response.

> 
> 
> A further improvement over the Proposed Text:
> 
> 
> 
> Again, similar to ICCP, activity on the attachment circuits may cause
> security threats or be exploited to create denial-of-service attacks.
> In many passive optical networks the optical paths between OLT and
> ONUs traverse publicly accessible facilities including public
> attachments (e.g. telephone poles), which opens up the risk of
> excessive link bouncing by optical layer impairment.  While ICCP for
> MC-PON interconnects in the MPLS domain and does not traverse the PON
> network, risks do include introduction of a malicious ONU which could
> cause, for example, excessive link bouncing.  This link bouncing
> could result in increased ICCP exchanges similar to the malicious CE
> case described in [RFC7275 <https://tools.ietf.org/html/rfc7275>].
> Operators of such networks should take additional care to restrict
> unauthorized ONUs and to limit the impact of link bouncing at the
> OLT, as these could result in service impairment.

So I guess limitation to single domains the assertion that this
ICCP is not used on the publicly accessible links (telephone poles
etc.) is good enough for me to clear. (Will do that in a bit.)

On the text above - is "link bouncing" really the worst thing
that can happen if someone introduces a malicious ONU? That
would be surprising. So I'd suggest maybe using another example
threat in this bit:

"While ICCP for
MC-PON interconnects in the MPLS domain and does not traverse the PON
network, risks do include introduction of a malicious ONU which could
cause, for example,..."

E.g. couldn't a fake ONU inject/monitor traffic?

Cheers,
S.

> 
> 
> 
> Are you OK with this proposal?
> 
> 
> 
> Thanks,
> 
> Yuanlong
> 
> 
> 
> -----Original Message----- From: Edwin Mallette
> [mailto:edwin.mallette@gmail.com] Sent: Thursday, September 15, 2016
> 11:05 PM To: Stephen Farrell; Jiangyuanlong; The IESG Cc:
> pals-chairs@ietf.org; agmalis@gmail.com;
> draft-ietf-pals-mc-pon@ietf.org; pals@ietf.org Subject: Re: Stephen
> Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)
> 
> 
> 
> 
> 
> 
> 
> On 9/15/16, 5:39 AM, "Stephen Farrell"
> <stephen.farrell@cs.tcd.ie<mailto:stephen.farrell@cs.tcd.ie>> wrote:
> 
> 
> 
>> 
> 
>> 
> 
>> On 14/09/16 03:39, Jiangyuanlong wrote:
> 
>>> Hi Stephen,
> 
>>> 
> 
>>> To be clear, it is proposed to add "in a single administrative
> 
>>> domain" to the end of "this ICCP application SHOULD only be used
>>> in
> 
>>> well-managed and highly monitored service provider PON access
> 
>>> networks..." Thus we have the following texts "this ICCP
>>> application
> 
>>> SHOULD only be used in well-managed and highly monitored service
> 
>>> provider PON access networks in a single administrative domain".
> 
>> 
> 
>> That's more consistent yes.
> 
>> 
> 
>>> 
> 
>>> Typically, the PON network and the MPLS network interconnection
>>> as
> 
>>> described in the document (for scenarios including FTTx, MSO and
> 
>>> mobile backhaul) are under the control of a single service
>>> provider.
> 
>>> So the proposed change does not inflict any real constraint.
> 
>> 
> 
>> Sorry but I'm still not seeing how "under the control of" and
> 
>> "telephone poles" make for it being reasonable to depend on the
>> fairly
> 
>> modest security mechanisms that are available, and IIUC, that are
>> not
> 
>> often used (in less threatened environments). Can you clarify that
>> for
> 
>> me?
> 
>> 
> 
>> Thanks,
> 
>> S.
> 
> Hi Stephen,
> 
> 
> 
> I suppose what might not be clear, at least in the security section,
> is that ICCP for MC-PON does not operate between the OLT and
> ONU/ONT.
> 
> Without going into too much detail in terms of how security
> mechanisms work on PON access networks, I¹ve attempted to propose
> some additional text in the second paragraph of the security section
> to attempt to clarify that the risk isn¹t to ICCP via a direct ICCP
> protocol interaction.  There is some risk to ICCP that can be caused
> by mucking around with the ONU or the physical fiber path between the
> OLT and ONU.  Does this help address your concern ?
> 
> 
> 
> Original Text:
> 
> 
> 
> Again, similar to ICCP, activity on the attachment circuits may cause
> security threats or be exploited to create denial-of-service attacks.
> In many passive optical networks the optical paths between OLT and
> ONTs traverse publicly accessible facilities including public
> attachments (e.g.
> 
> telephone poles), which opens up the risk of excessive link bouncing
> by optical layer impairment. Other risks include a malicious ONT,
> which can lead to excessive ICCP exchanges similar to the malicious
> CE case described in [RFC7275]. Operators of such networks should
> take additional care to restrict unauthorized ONTs and to limit the
> impact of link bouncing, as these could result in service
> impairment.
> 
> 
> 
> 
> 
> Proposed Text:
> 
> 
> 
> Again, similar to ICCP, activity on the attachment circuits may cause
> security threats or be exploited to create denial-of-service attacks.
> In many passive optical networks the optical paths between OLT and
> ONUs traverse publicly accessible facilities including public
> attachments (e.g.
> 
> telephone poles), which opens up the risk of excessive link bouncing
> by optical layer impairment.  While ICCP for MC-PON does not operate
> between the OLT and ONU, risks do include introduction of a malicious
> ONU which could cause, for example, excessive link bouncing.  This
> link bouncing could result in increased ICCP exchanges similar to the
> malicious CE case described in [RFC7275
> <https://tools.ietf.org/html/rfc7275>]. Operators of such networks
> should take additional care to restrict unauthorized ONUs and to
> limit the impact of link bouncing at the OLT, as these could result
> in service impairment.
> 
> 
> 
> Cheers!
> 
> 
> 
> Ed
> 
> 
> 
>> 
> 
>>> 
> 
>>> ICCP is a sub-type of LDP protocol (RFC5036), the same security
> 
>>> measures of LDP are applicable too, that is, ICCP peer PEs (LDP
> 
>>> peers) are in the same MPLS administration domain, access list
>>> and
> 
>>> authentication mechanisms can be used between the PEs (e.g., all
>>> LDP
> 
>>> packets are denied by the OLT if they are received from the
> 
>>> interfaces connecting the ONUs). As this document is based on
>>> ICCP
> 
>>> (i.e., LDP), we can use all these mechanisms described in RFC5036
>>> and
> 
>>> RFC7275.
> 
>>> 
> 
>>> Are you satisfied with this resolution? Do you have any
>>> suggestions?
> 
>>> 
> 
>>> Thanks, Yuanlong
> 
>>> 
> 
>>> 
> 
>>> -----Original Message----- From: Stephen Farrell
> 
>>> [mailto:stephen.farrell@cs.tcd.ie] Sent: Wednesday, September
>>> 14,
> 
>>> 2016 7:53 AM To: The IESG Cc:
>>> draft-ietf-pals-mc-pon@ietf.org<mailto:draft-ietf-pals-mc-pon@ietf.org>;
>>> Andrew
> 
>>> G. Malis; pals-chairs@ietf.org<mailto:pals-chairs@ietf.org>;
>>> agmalis@gmail.com<mailto:agmalis@gmail.com>;
>>> pals@ietf.org<mailto:pals@ietf.org>
> 
>>> Subject: Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04:
> 
>>> (with DISCUSS)
> 
>>> 
> 
>>> Stephen Farrell has entered the following ballot position for
> 
>>> draft-ietf-pals-mc-pon-04: Discuss
> 
>>> 
> 
>>> When responding, please keep the subject line intact and reply to
>>> all
> 
>>> email addresses included in the To and CC lines. (Feel free to
>>> cut
> 
>>> this introductory paragraph, however.)
> 
>>> 
> 
>>> 
> 
>>> Please refer to
> 
>>> https://www.ietf.org/iesg/statement/discuss-criteria.html for
>>> more
> 
>>> information about IESG DISCUSS and COMMENT positions.
> 
>>> 
> 
>>> 
> 
>>> The document, along with other ballot positions, can be found
>>> here:
> 
>>> https://datatracker.ietf.org/doc/draft-ietf-pals-mc-pon/
> 
>>> 
> 
>>> 
> 
>>> 
> 
>>> ---------------------------------------------------------------------
>
>>>  -
> 
>>> 
> 
>>> 
> 
>> DISCUSS:
> 
>>> ---------------------------------------------------------------------
>
>>>  -
> 
>>> 
> 
>>> 
> 
>>> 
> 
>>> Is this extension to ICCP really compatible with section 10 of
> 
>>> RFC7275?  RFC7275 says "It ought not be deployed on or over the
> 
>>> public Internet.  ICCP is not intended to be applicable when the
> 
>>> Redundancy Group spans PEs in different administrative domains"
> 
>>> whereas this draft only refers to the "well-managed" stuff and
>>> says
> 
>>> nothing about multiple domains, and this draft also refers to
>>> public
> 
>>> contexts such as telephone poles. Can you justify for me how
>>> using
> 
>>> ICCP here is safe? (It may well be, but I'm entirely unsure,
>>> probably
> 
>>> mostly due to my ignorance of PON deployments.)
> 
>>> 
> 
>>> The same point was made in the secdir review [1] which did get a
> 
>>> response. Sadly, I didn't get how the response answered the
>>> question.
> 
>>> 
> 
>>> 
> 
>>> [1]
> 
>>> https://www.ietf.org/mail-archive/web/secdir/current/msg06762.html
>
>>> 
>>> 
> 
>>> 
> 
>>> 
> 
>>> 
> 
>> 
> 
> 
> 
>