Re: [Pals] Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)

Jiangyuanlong <jiangyuanlong@huawei.com> Sun, 18 September 2016 08:28 UTC

Return-Path: <jiangyuanlong@huawei.com>
X-Original-To: pals@ietfa.amsl.com
Delivered-To: pals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11B1212B0CD; Sun, 18 Sep 2016 01:28:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.536
X-Spam-Level:
X-Spam-Status: No, score=-6.536 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.316, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 42vzlMNknctp; Sun, 18 Sep 2016 01:28:30 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 436A512B056; Sun, 18 Sep 2016 01:28:29 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CWJ68011; Sun, 18 Sep 2016 08:28:26 +0000 (GMT)
Received: from SZXEMA415-HUB.china.huawei.com (10.82.72.33) by lhreml703-cah.china.huawei.com (10.201.5.104) with Microsoft SMTP Server (TLS) id 14.3.235.1; Sun, 18 Sep 2016 09:28:25 +0100
Received: from SZXEMA506-MBS.china.huawei.com ([169.254.4.3]) by SZXEMA415-HUB.china.huawei.com ([10.82.72.33]) with mapi id 14.03.0235.001; Sun, 18 Sep 2016 16:28:17 +0800
From: Jiangyuanlong <jiangyuanlong@huawei.com>
To: Edwin Mallette <edwin.mallette@gmail.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>, The IESG <iesg@ietf.org>
Thread-Topic: Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)
Thread-Index: AQHSDhnrM2JeV5n1TUKGxeOCmD2ke6B4MO/AgAG4aQCAADlhAIAEyw7Q
Date: Sun, 18 Sep 2016 08:28:17 +0000
Message-ID: <3B0A1BED22CAD649A1B3E97BE5DDD68B917627CD@szxema506-mbs.china.huawei.com>
References: <147381075416.13170.14909169380037916813.idtracker@ietfa.amsl.com> <3B0A1BED22CAD649A1B3E97BE5DDD68B9175EEE0@szxema506-mbs.china.huawei.com> <69703e52-57c6-26b4-7517-6a968ba14620@cs.tcd.ie> <D40008DA.A2F16%edwin.mallette@gmail.com>
In-Reply-To: <D40008DA.A2F16%edwin.mallette@gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.74.203.119]
Content-Type: multipart/alternative; boundary="_000_3B0A1BED22CAD649A1B3E97BE5DDD68B917627CDszxema506mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090203.57DE502B.0032, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.4.3, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 36a30ee8211babaf5cb8b41d26a78a84
Archived-At: <https://mailarchive.ietf.org/arch/msg/pals/utT2QQid47UV4WvZvH6j6y0stFw>
Cc: "pals-chairs@ietf.org" <pals-chairs@ietf.org>, "agmalis@gmail.com" <agmalis@gmail.com>, "draft-ietf-pals-mc-pon@ietf.org" <draft-ietf-pals-mc-pon@ietf.org>, "pals@ietf.org" <pals@ietf.org>
Subject: Re: [Pals] Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)
X-BeenThere: pals@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Pseudowire And LDP-enabled Services dicussion list." <pals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pals>, <mailto:pals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pals/>
List-Post: <mailto:pals@ietf.org>
List-Help: <mailto:pals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pals>, <mailto:pals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Sep 2016 08:28:35 -0000

Hi Ed and Stephen,



A further improvement over the Proposed Text:



Again, similar to ICCP, activity on the attachment circuits may cause security threats or be exploited to create denial-of-service attacks. In many passive optical networks the optical paths between OLT and ONUs traverse publicly accessible facilities including public attachments (e.g. telephone poles), which opens up the risk of excessive link bouncing by optical layer impairment.  While ICCP for MC-PON interconnects in the MPLS domain and does not traverse the PON network, risks do include introduction of a malicious ONU which could cause, for example, excessive link bouncing.  This link bouncing could result in increased ICCP exchanges similar to the malicious CE case described in [RFC7275 <https://tools.ietf.org/html/rfc7275>]. Operators of such networks should take additional care to restrict unauthorized ONUs and to limit the impact of link bouncing at the OLT, as these could result in service impairment.



Are you OK with this proposal?



Thanks,

Yuanlong



-----Original Message-----
From: Edwin Mallette [mailto:edwin.mallette@gmail.com]
Sent: Thursday, September 15, 2016 11:05 PM
To: Stephen Farrell; Jiangyuanlong; The IESG
Cc: pals-chairs@ietf.org; agmalis@gmail.com; draft-ietf-pals-mc-pon@ietf.org; pals@ietf.org
Subject: Re: Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)







On 9/15/16, 5:39 AM, "Stephen Farrell" <stephen.farrell@cs.tcd.ie<mailto:stephen.farrell@cs.tcd.ie>> wrote:



>

>

>On 14/09/16 03:39, Jiangyuanlong wrote:

>> Hi Stephen,

>>

>> To be clear, it is proposed to add "in a single administrative

>> domain" to the end of "this ICCP application SHOULD only be used in

>> well-managed and highly monitored service provider PON access

>> networks..." Thus we have the following texts "this ICCP application

>> SHOULD only be used in well-managed and highly monitored service

>> provider PON access networks in a single administrative domain".

>

>That's more consistent yes.

>

>>

>> Typically, the PON network and the MPLS network interconnection as

>> described in the document (for scenarios including FTTx, MSO and

>> mobile backhaul) are under the control of a single service provider.

>> So the proposed change does not inflict any real constraint.

>

>Sorry but I'm still not seeing how "under the control of" and

>"telephone poles" make for it being reasonable to depend on the fairly

>modest security mechanisms that are available, and IIUC, that are not

>often used (in less threatened environments). Can you clarify that for

>me?

>

>Thanks,

>S.

Hi Stephen,



I suppose what might not be clear, at least in the security section, is that ICCP for MC-PON does not operate between the OLT and ONU/ONT.

Without going into too much detail in terms of how security mechanisms work on PON access networks, I¹ve attempted to propose some additional text in the second paragraph of the security section to attempt to clarify that the risk isn¹t to ICCP via a direct ICCP protocol interaction.  There is some risk to ICCP that can be caused by mucking around with the ONU or the physical fiber path between the OLT and ONU.  Does this help address your concern ?



Original Text:



Again, similar to ICCP, activity on the attachment circuits may cause security threats or be exploited to create denial-of-service attacks. In many passive optical networks the optical paths between OLT and ONTs traverse publicly accessible facilities including public attachments (e.g.

telephone poles), which opens up the risk of excessive link bouncing by optical layer impairment. Other risks include a malicious ONT, which can lead to excessive ICCP exchanges similar to the malicious CE case described in [RFC7275]. Operators of such networks should take additional care to restrict unauthorized ONTs and to limit the impact of link bouncing, as these could result in service impairment.





Proposed Text:



Again, similar to ICCP, activity on the attachment circuits may cause security threats or be exploited to create denial-of-service attacks. In many passive optical networks the optical paths between OLT and ONUs traverse publicly accessible facilities including public attachments (e.g.

telephone poles), which opens up the risk of excessive link bouncing by optical layer impairment.  While ICCP for MC-PON does not operate between the OLT and ONU, risks do include introduction of a malicious ONU which could cause, for example, excessive link bouncing.  This link bouncing could result in increased ICCP exchanges similar to the malicious CE case described in [RFC7275 <https://tools.ietf.org/html/rfc7275>]. Operators of such networks should take additional care to restrict unauthorized ONUs and to limit the impact of link bouncing at the OLT, as these could result in service impairment.



Cheers!



Ed



>

>>

>> ICCP is a sub-type of LDP protocol (RFC5036), the same security

>> measures of LDP are applicable too, that is, ICCP peer PEs (LDP

>> peers) are in the same MPLS administration domain, access list and

>> authentication mechanisms can be used between the PEs (e.g., all LDP

>> packets are denied by the OLT if they are received from the

>> interfaces connecting the ONUs). As this document is based on ICCP

>> (i.e., LDP), we can use all these mechanisms described in RFC5036 and

>> RFC7275.

>>

>> Are you satisfied with this resolution? Do you have any suggestions?

>>

>> Thanks, Yuanlong

>>

>>

>> -----Original Message----- From: Stephen Farrell

>> [mailto:stephen.farrell@cs.tcd.ie] Sent: Wednesday, September 14,

>> 2016 7:53 AM To: The IESG Cc: draft-ietf-pals-mc-pon@ietf.org<mailto:draft-ietf-pals-mc-pon@ietf.org>; Andrew

>> G. Malis; pals-chairs@ietf.org<mailto:pals-chairs@ietf.org>; agmalis@gmail.com<mailto:agmalis@gmail.com>; pals@ietf.org<mailto:pals@ietf.org>

>> Subject: Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04:

>> (with DISCUSS)

>>

>> Stephen Farrell has entered the following ballot position for

>> draft-ietf-pals-mc-pon-04: Discuss

>>

>> When responding, please keep the subject line intact and reply to all

>> email addresses included in the To and CC lines. (Feel free to cut

>> this introductory paragraph, however.)

>>

>>

>> Please refer to

>> https://www.ietf.org/iesg/statement/discuss-criteria.html for more

>> information about IESG DISCUSS and COMMENT positions.

>>

>>

>> The document, along with other ballot positions, can be found here:

>> https://datatracker.ietf.org/doc/draft-ietf-pals-mc-pon/

>>

>>

>>

>> ---------------------------------------------------------------------

>> -

>>

>>

>DISCUSS:

>> ---------------------------------------------------------------------

>> -

>>

>>

>>

>> Is this extension to ICCP really compatible with section 10 of

>> RFC7275?  RFC7275 says "It ought not be deployed on or over the

>> public Internet.  ICCP is not intended to be applicable when the

>> Redundancy Group spans PEs in different administrative domains"

>> whereas this draft only refers to the "well-managed" stuff and says

>> nothing about multiple domains, and this draft also refers to public

>> contexts such as telephone poles. Can you justify for me how using

>> ICCP here is safe? (It may well be, but I'm entirely unsure, probably

>> mostly due to my ignorance of PON deployments.)

>>

>> The same point was made in the secdir review [1] which did get a

>> response. Sadly, I didn't get how the response answered the question.

>>

>>

>> [1]

>> https://www.ietf.org/mail-archive/web/secdir/current/msg06762.html

>>

>>

>>

>>

>