Re: [Pce] Benjamin Kaduk's No Objection on draft-ietf-pce-segment-routing-14: (with COMMENT)

Jonathan Hardwick <Jonathan.Hardwick@metaswitch.com> Mon, 11 February 2019 18:58 UTC

Return-Path: <Jonathan.Hardwick@metaswitch.com>
X-Original-To: pce@ietfa.amsl.com
Delivered-To: pce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCB42131132; Mon, 11 Feb 2019 10:58:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=metaswitch.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tH0axNbO2XV5; Mon, 11 Feb 2019 10:57:58 -0800 (PST)
Received: from NAM04-CO1-obe.outbound.protection.outlook.com (mail-eopbgr690098.outbound.protection.outlook.com [40.107.69.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7FA7913112E; Mon, 11 Feb 2019 10:57:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=metaswitch.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9RqCLhx7G58CiXo+MdDI934UGjjdKC6eJppKTnXbNx4=; b=plxnt3symzf8RLWy5DSQ6zcJw4dvFDAnrd6/Jfm00acrjY6T15nOm0NWmeREVLornDhjYkKQL9YBcKb2khGHUZ6RNrm8V4l351bGfIPkpicMXuArgb4znUI/laNk1Df6kfpg4gncb0cDMMxlKOEc2istxV5yn4Wz+1hNowEba70=
Received: from BL0PR02MB4868.namprd02.prod.outlook.com (52.132.14.77) by BL0PR02MB5395.namprd02.prod.outlook.com (20.177.207.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1601.22; Mon, 11 Feb 2019 18:57:55 +0000
Received: from BL0PR02MB4868.namprd02.prod.outlook.com ([fe80::e58c:afab:ba34:5920]) by BL0PR02MB4868.namprd02.prod.outlook.com ([fe80::e58c:afab:ba34:5920%6]) with mapi id 15.20.1601.023; Mon, 11 Feb 2019 18:57:55 +0000
From: Jonathan Hardwick <Jonathan.Hardwick@metaswitch.com>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: The IESG <iesg@ietf.org>, "draft-ietf-pce-segment-routing@ietf.org" <draft-ietf-pce-segment-routing@ietf.org>, Dhruv Dhody <dhruv.ietf@gmail.com>, "pce-chairs@ietf.org" <pce-chairs@ietf.org>, "pce@ietf.org" <pce@ietf.org>
Thread-Topic: Benjamin Kaduk's No Objection on draft-ietf-pce-segment-routing-14: (with COMMENT)
Thread-Index: AQHUiQQzmSqj5oLIbUKPiu99QbcTX6WJhE0wgBgaS4CAOcP7AA==
Date: Mon, 11 Feb 2019 18:57:55 +0000
Message-ID: <BL0PR02MB4868A466BC15948F809E209784640@BL0PR02MB4868.namprd02.prod.outlook.com>
References: <154362042021.27428.14843328031369141534.idtracker@ietfa.amsl.com> <BL0PR02MB4868D21341B671EEB1E34E7084B80@BL0PR02MB4868.namprd02.prod.outlook.com> <20190106003943.GF28515@kduck.kaduk.org>
In-Reply-To: <20190106003943.GF28515@kduck.kaduk.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Jonathan.Hardwick@metaswitch.com;
x-originating-ip: [86.137.2.32]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BL0PR02MB5395; 6:O1d4OmOIBXjKAv3sVg/W4cx+1JsGAkQ9E2e0tpfkZxdVGxbSsNzqaO/MFjYaSGZ6vECGX91M4pcu+SzFkH9no4rvHvh4kzls8JaIKe8kRYYyt6tSHT2ZJ1B4l7mKzFXFkutUQENUN8pDx9BW/CRU8ley2Fw2EkZlS4wr2aQsN1pKybNOpgcP57jyefADUjr0Uxl7UTItpcOYizHVFXw7KBVSUT0WmYhGhKkzJhVcJ0w/ia7RkNtkN77lAzXwnIJzQxG4gfqFrJwvCzlzgwJhxM+pOeDdqZFkinCQdAa9yW+SlRcrUajchlAeukBqbB65Uqq+PqHbWo9a2naHHxALd2MJsxN3hqMIaEWK7DWpcuDhE4C2Qrxll90eHWZorGv2AoqY1iv7eC7skUy5T5SnV+INJtYhceLdpSZEvGByNnxc0f+2QRCo+wiHYO3e02jtVgf9/NEznp6oSVT1rwouXw==; 5:Bznn5moIDD973JtRYiQueLHfxm2bdJHKBdvSkNU4nT0mimzbBs8IW2WFavQlzh44SyzsaLi9w5YZ8qluJLSx/uyQVfvb2YN/h0bTZpfCrwWF7pUrmVQQVdwl4Pk5B30ykXUjOXhLwjer3U6iYzWKYRKisARihoEs95prZq8FTscPnJ1PFaMsRVs2xMvIiaslS1hgrbfV0NQE40lK7FGdgg==; 7:47j6TENE8YGIsLmj5RIykJs5maq43NDkdJEcsdHsiFu8WUuo6KZ5Emg/hfNaAD3k5iK8bUG29GwS/OzuM+CtwKwYywThUn8ccqiIRH5QFrOB47TlGtxUdufSEIwh4M/YrFSlqM9jAn9JBbsvtfEcsg==
x-ms-office365-filtering-correlation-id: e940d573-88e8-418b-4f35-08d69052d53e
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600110)(711020)(4605077)(2017052603328)(7153060)(7193020); SRVR:BL0PR02MB5395;
x-ms-traffictypediagnostic: BL0PR02MB5395:
x-microsoft-antispam-prvs: <BL0PR02MB5395F17E59A0A0CFFA08B10A84640@BL0PR02MB5395.namprd02.prod.outlook.com>
x-forefront-prvs: 0945B0CC72
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(136003)(346002)(376002)(39850400004)(396003)(366004)(37854004)(52314003)(189003)(199004)(6506007)(33656002)(561944003)(2906002)(7696005)(305945005)(76176011)(102836004)(26005)(478600001)(186003)(6436002)(53936002)(55016002)(6916009)(7736002)(74316002)(68736007)(105586002)(81166006)(72206003)(8676002)(8936002)(106356001)(14454004)(9686003)(71200400001)(71190400001)(256004)(14444005)(81156014)(4326008)(6246003)(2171002)(25786009)(316002)(66066001)(486006)(54906003)(86362001)(446003)(11346002)(476003)(229853002)(99286004)(3846002)(6116002)(97736004); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR02MB5395; H:BL0PR02MB4868.namprd02.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: metaswitch.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 8ZU8a1cjanGh/G3Ewymikw+KML1a7fenExSJMENTvl/2cY3rGT8LutqBAIrnuQl8uXPXQUUaR3xYQbQrPI4Zsjr9NDPQjH8cb9BgHxlu108SAP3+LCbwvJ1RiaiUxCvVIEw1QcOy34O+Xo80P4Jq754Sz25zWeTwPADI0K03ZXYeEzO78mtXFs/KNwtbkTABkiNEOwoayoqjuohNee4DJRiUy0gYBZd/ihOKPptrSnfU8ZXe+E0QE0TyyT/DYh5p77uVD0kA182GxJgf/tF3dCUkAm1Q3FdTksbcq6Rp/AxmMBZiSJCCFVhwKy8swgmKGt3pZhHcMtLlyVeb1RMYGV86qLWK4Qs9sObwCKSQJppBuu4KfpXoNPx8iOREhFSj81omFvEWGK7RCVhj8daylmegp+3HccHM+a9nzDGGTzA=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: metaswitch.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e940d573-88e8-418b-4f35-08d69052d53e
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2019 18:57:55.7061 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9d9e56eb-f613-4ddb-b27b-bfcdf14b2cdb
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR02MB5395
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/TcApx9jAp-kbD5J89mkIVyZ3rQk>
Subject: Re: [Pce] Benjamin Kaduk's No Objection on draft-ietf-pce-segment-routing-14: (with COMMENT)
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2019 18:58:02 -0000

Hi Benjamin

As I was preparing the next revision of this document, I realised I'd forgotten to reply to your email.  (I thought I had replied, but I can find no evidence that I did so!)

Anyway, I think we have converged.  Please see my proposals below, and apologies for my tardiness.

Cheers
Jon

----
> Isn't the 'F' bit fully redundant with NT?
> 
> [Jon] The F bit determines whether NAI is appended, or not.  NT gives the type of the NAI that is appended.  The NT field has no meaning if F=0.

My (implicit) proposal was to assign a value for the NT field that means "no NAI is present", and to treat that value of NT as meaning that F=0, with any other value of NT meaning F=1, in which case the F bit does not add any new information.

[Jon2] Understood. Unfortunately, we have to make a pragmatic decision here as implementations are already fielded.  I have changed the text to say this to clarify.

NEW
   NAI Type (NT):  Indicates the type and format of the NAI contained in
      the object body, if any is present.  If the F bit is set to zero
      (see below) then the NT field has no meaning and MUST be ignored
      by the receiver.
END NEW

----
> It's interesting that the routing protocols' MSD value supersedes the PCE-obtained one, given that all three (IS-IS, OSPF, and BGP-LS) documents have text to the effect of "PCEP provides a way to get this, but if PCEP is not used you can use our thing", which a naive reader would take to mean that PCEP is intended to be the primary distribution mechanism.
> 
> [Jon] Probably needs to be fixed in the other documents.  PCEP is a fairly blunt tool for specifying the MSD, which it can only do per node.  The IGPs can do better by specifying the MSD per network interface.

Ah.  Unfortunately, at least the IS-IS document is already published as an RFC (8491) and thus immutable.  (I didn't check the others.)  I don't know whether it would be appropriate to add this explanation into this document since the other documents cannot (all) be changed.

[Jon2] I've reworded the text to make the relationship between PCEP and the IGPs clearer:

NEW
   Note that the MSD value exchanged via the SR-PCE-CAPABILITY sub-TLV
   indicates the SID/label imposition limit for the PCC node.  It is
   anticipated that, in many deployments, the PCCs will have network
   interfaces that are homogeneous with respect to MSD (that is, each
   interface has the same MSD).  In such cases, having a per-node MSD on
   the PCEP session is sufficient; the PCE SHOULD interpret this to mean
   that all network interfaces on the PCC have the given MSD.  However,
   the PCE MAY also learn a per-node MSD and a per-interface MSD from
   the routing protocols, as specified in: [RFC8491]; [RFC8476];
   [I-D.ietf-idr-bgp-ls-segment-routing-msd].  If the PCE learns the
   per-node MSD of a PCC from a routing protocol, then it MUST ignore
   the per-node MSD value in the SR-PCE-CAPABILITY sub-TLV and use the
   per-node MSD learned from the routing protocol instead.  If the PCE
   learns the MSD of a network interface on a PCC from a routing
   protocol, then it MUST use the per-interface MSD instead of the MSD
   value in the SR-PCE-CAPABILITY sub-TLV when it computes a path that
   uses that interface.
END NEW


----
> I don't think it's a good idea to just refer to "the security 
> mechanisms of [RFC 5440] and [RFC8281]", since there are qualitative 
> differences between the TCP authentication schemes and the full-on 
> encryption provided by TLS and IPsec.  (Also, what exactly are the 
> security mechanisms of RFC8281 supposed to be -- a quick look only 
> sees the new guidance to apply resource
> limits?)  The second paragraph only requires integrity protection to avoid the vulnerability mentioned there, but the third paragraph requires confidentiality protection to preent the attack.
> 
> [Jon] RFC 8281 pulls in RFC 8231 in its security section, as you note 
> above.  RFC 8231 says
> 
>    As a general precaution, it is RECOMMENDED that these PCEP extensions
>    only be activated on authenticated and encrypted sessions across PCEs
>    and PCCs belonging to the same administrative authority, using
>    Transport Layer Security (TLS) [PCEPS], as per the recommendations
>    and best current practices in [RFC7525].

That still doesn't seem to give the reader much guidance about which cases require encryption and which cases can safely proceed with just integrity protection (even though I'm happy to see the general recommendation to use TLS!).

[Jon2] OK, I understand. The strong steer is that TLS should be used all the time, but we haven't mandated it, so you are right, more guidance should be given.  I think your analysis is correct, so I've changed the text in the second and third paragraphs as follows.

NEW
   Note that this specification enables a network controller to
   instantiate a path in the network without the use of a hop-by-hop
   signaling protocol (such as RSVP-TE).  This creates an additional
   vulnerability if the security mechanisms of [RFC5440], [RFC8231] and
   [RFC8281] are not used.  If there is no integrity protection on the
   session, then an attacker could create a path which is not subjected
   to the further verification checks that would be performed by the
   signaling protocol.

   Note that this specification adds the MSD field to the OPEN message
   (see Section 4.1.2) which discloses how many MPLS labels the sender
   can push onto packets that it forwards into the network.  If the
   security mechanisms of [RFC8231] and [RFC8281] are not used with
   strong encryption, then an attacker could use this new field to gain
   intelligence about the capabilities of the edge devices in the
   network.
END NEW

------