Re: [Pals] Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)

Edwin Mallette <edwin.mallette@gmail.com> Thu, 15 September 2016 16:07 UTC

Return-Path: <edwin.mallette@gmail.com>
X-Original-To: pals@ietfa.amsl.com
Delivered-To: pals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3D4E12BA70; Thu, 15 Sep 2016 09:07:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LlKyX2_BrZHz; Thu, 15 Sep 2016 09:07:13 -0700 (PDT)
Received: from mail-pa0-x230.google.com (mail-pa0-x230.google.com [IPv6:2607:f8b0:400e:c03::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DF9612B7EE; Thu, 15 Sep 2016 08:05:06 -0700 (PDT)
Received: by mail-pa0-x230.google.com with SMTP id wk8so16745988pab.1; Thu, 15 Sep 2016 08:05:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=user-agent:date:subject:from:to:cc:message-id:thread-topic :references:in-reply-to:mime-version:content-transfer-encoding; bh=hD+CjLg6W5kb3pnID5f/yJoEUzu+veepwZCaJ6b2O3U=; b=SFSuf2WxkDwrTdK89VnhrbAosOy/yb/jJKWD+ZkgVrHBF+LdKTgls5685Q84Jv6TNk XPvS2JRljxzbbPlYXWacMQwXSCm+5lu0pYfK5P5V5eABhUexTKDsCGTjPDp2evUt1ylL TkTU7iv0xZXZtZ82rk4HeKHs3dBR/gJPqp3+H9r/zESY5lYIN4CZ0nmabZ7i5szJf2rD LVcCra33zsF7r4cwGwBOrEVoPg7VobROrE2043EYeG67XCHwl3rvFQj0DzxW9h+yfBEr PBvhy10jN7ndxuC/rFW6RDyHZDfsJeElWsxI71SqnaPfHrPWoEdAqMliSmBJxLwCcljC LFpA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:user-agent:date:subject:from:to:cc:message-id :thread-topic:references:in-reply-to:mime-version :content-transfer-encoding; bh=hD+CjLg6W5kb3pnID5f/yJoEUzu+veepwZCaJ6b2O3U=; b=FcHbrF4rme5pj/IyGSRnKjD2LVKDN+0VI78crV4vKe8icUmhuki9AHuLPqMdQsUFPT 2WxDYTnr1939PQ+JEt/BaIS9tfoE10hz+zBWOn73Gqfp9XksrM+Ls9gJ1pvHDXoSTSf8 JnJBvTXlaDsLJDxkuVE1YGBXL+mZvufmJOY6ZWF+vvsJ4QWByi9vz4/GmczcRD8WjeSl 0SAeAviXF7vRHIY7KwV0dofSQbJibwLhvSFtXrx0Hvs38r6dD8xYRAp9SwcZA5HZnzsw /f4NlD249GitQPJI5GU/NUpW5hqhZ7d45hWBe+SFzwLTBoMJdSGeOUO8eme877fQNA5M 2JGw==
X-Gm-Message-State: AE9vXwPl/KbFIPDOJYiVY7b+GHfSpRxdinN2/fy33z1lu4yq7FfBr2vIPmlnlJPFnlVrVA==
X-Received: by 10.66.224.101 with SMTP id rb5mr15439733pac.45.1473951905667; Thu, 15 Sep 2016 08:05:05 -0700 (PDT)
Received: from [10.50.214.32] (68-114-34-42.static.gwnt.ga.charter.com. [68.114.34.42]) by smtp.gmail.com with ESMTPSA id q14sm26805330pfg.63.2016.09.15.08.05.00 (version=TLS1 cipher=AES128-SHA bits=128/128); Thu, 15 Sep 2016 08:05:04 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/14.6.6.160626
Date: Thu, 15 Sep 2016 09:04:56 -0600
From: Edwin Mallette <edwin.mallette@gmail.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Jiangyuanlong <jiangyuanlong@huawei.com>, The IESG <iesg@ietf.org>
Message-ID: <D40008DA.A2F16%edwin.mallette@gmail.com>
Thread-Topic: Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)
References: <147381075416.13170.14909169380037916813.idtracker@ietfa.amsl.com> <3B0A1BED22CAD649A1B3E97BE5DDD68B9175EEE0@szxema506-mbs.china.huawei.com> <69703e52-57c6-26b4-7517-6a968ba14620@cs.tcd.ie>
In-Reply-To: <69703e52-57c6-26b4-7517-6a968ba14620@cs.tcd.ie>
Mime-version: 1.0
Content-type: text/plain; charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/pals/uyWxKSVUgXpAzbNM9DnUfqRM7Y8>
Cc: "pals-chairs@ietf.org" <pals-chairs@ietf.org>, "agmalis@gmail.com" <agmalis@gmail.com>, "draft-ietf-pals-mc-pon@ietf.org" <draft-ietf-pals-mc-pon@ietf.org>, "pals@ietf.org" <pals@ietf.org>
Subject: Re: [Pals] Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04: (with DISCUSS)
X-BeenThere: pals@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Pseudowire And LDP-enabled Services dicussion list." <pals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pals>, <mailto:pals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pals/>
List-Post: <mailto:pals@ietf.org>
List-Help: <mailto:pals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pals>, <mailto:pals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Sep 2016 16:07:16 -0000


On 9/15/16, 5:39 AM, "Stephen Farrell" <stephen.farrell@cs.tcd.ie> wrote:

>
>
>On 14/09/16 03:39, Jiangyuanlong wrote:
>> Hi Stephen,
>> 
>> To be clear, it is proposed to add "in a single administrative
>> domain" to the end of "this ICCP application SHOULD only be used in
>> well-managed and highly monitored service provider PON access
>> networks..." Thus we have the following texts "this ICCP application
>> SHOULD only be used in well-managed and highly monitored service
>> provider PON access networks in a single administrative domain".
>
>That's more consistent yes.
>
>> 
>> Typically, the PON network and the MPLS network interconnection as
>> described in the document (for scenarios including FTTx, MSO and
>> mobile backhaul) are under the control of a single service provider.
>> So the proposed change does not inflict any real constraint.
>
>Sorry but I'm still not seeing how "under the control of" and
>"telephone poles" make for it being reasonable to depend on the
>fairly modest security mechanisms that are available, and IIUC,
>that are not often used (in less threatened environments). Can
>you clarify that for me?
>
>Thanks,
>S.
Hi Stephen,

I suppose what might not be clear, at least in the security section, is
that ICCP for MC-PON does not operate between the OLT and ONU/ONT.
Without going into too much detail in terms of how security mechanisms
work on PON access networks, I¹ve attempted to propose some additional
text in the second paragraph of the security section to attempt to clarify
that the risk isn¹t to ICCP via a direct ICCP protocol interaction.  There
is some risk to ICCP that can be caused by mucking around with the ONU or
the physical fiber path between the OLT and ONU.  Does this help address
your concern ?

Original Text:

Again, similar to ICCP, activity on the attachment circuits may cause
security threats or be exploited to create denial-of-service attacks. In
many passive optical networks the optical paths between OLT and ONTs
traverse publicly accessible facilities including public attachments (e.g.
telephone poles), which opens up the risk of excessive link bouncing by
optical layer impairment. Other risks include a malicious ONT, which can
lead to excessive ICCP exchanges similar to the malicious CE case
described in [RFC7275]. Operators of such networks should take additional
care to restrict unauthorized ONTs and to limit the impact of link
bouncing, as these could result in service impairment.


Proposed Text:

Again, similar to ICCP, activity on the attachment circuits may cause
security threats or be exploited to create denial-of-service attacks. In
many passive optical networks the optical paths between OLT and ONUs
traverse publicly accessible facilities including public attachments (e.g.
telephone poles), which opens up the risk of excessive link bouncing by
optical layer impairment.  While ICCP for MC-PON does not operate between
the OLT and ONU, risks do include introduction of a malicious ONU which
could cause, for example, excessive link bouncing.  This link bouncing
could result in increased ICCP exchanges similar to the malicious CE case
described in [RFC7275 <https://tools.ietf.org/html/rfc7275>]. Operators of
such networks should take additional care to restrict unauthorized ONUs
and to limit the impact of link bouncing at the OLT, as these could result
in service impairment.

Cheers!

Ed

>
>> 
>> ICCP is a sub-type of LDP protocol (RFC5036), the same security
>> measures of LDP are applicable too, that is, ICCP peer PEs (LDP
>> peers) are in the same MPLS administration domain, access list and
>> authentication mechanisms can be used between the PEs (e.g., all LDP
>> packets are denied by the OLT if they are received from the
>> interfaces connecting the ONUs). As this document is based on ICCP
>> (i.e., LDP), we can use all these mechanisms described in RFC5036 and
>> RFC7275.
>> 
>> Are you satisfied with this resolution? Do you have any suggestions?
>> 
>> Thanks, Yuanlong
>> 
>> 
>> -----Original Message----- From: Stephen Farrell
>> [mailto:stephen.farrell@cs.tcd.ie] Sent: Wednesday, September 14,
>> 2016 7:53 AM To: The IESG Cc: draft-ietf-pals-mc-pon@ietf.org; Andrew
>> G. Malis; pals-chairs@ietf.org; agmalis@gmail.com; pals@ietf.org
>> Subject: Stephen Farrell's Discuss on draft-ietf-pals-mc-pon-04:
>> (with DISCUSS)
>> 
>> Stephen Farrell has entered the following ballot position for
>> draft-ietf-pals-mc-pon-04: Discuss
>> 
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut
>> this introductory paragraph, however.)
>> 
>> 
>> Please refer to
>> https://www.ietf.org/iesg/statement/discuss-criteria.html for more
>> information about IESG DISCUSS and COMMENT positions.
>> 
>> 
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-pals-mc-pon/
>> 
>> 
>> 
>> ----------------------------------------------------------------------
>>
>> 
>DISCUSS:
>> ----------------------------------------------------------------------
>>
>> 
>> 
>> Is this extension to ICCP really compatible with section 10 of
>> RFC7275?  RFC7275 says "It ought not be deployed on or over the
>> public Internet.  ICCP is not intended to be applicable when the
>> Redundancy Group spans PEs in different administrative domains"
>> whereas this draft only refers to the "well-managed" stuff and says
>> nothing about multiple domains, and this draft also refers to public
>> contexts such as telephone poles. Can you justify for me how using
>> ICCP here is safe? (It may well be, but I'm entirely unsure, probably
>> mostly due to my ignorance of PON deployments.)
>> 
>> The same point was made in the secdir review [1] which did get a
>> response. Sadly, I didn't get how the response answered the question.
>> 
>> 
>> [1]
>> https://www.ietf.org/mail-archive/web/secdir/current/msg06762.html
>> 
>> 
>> 
>> 
>