Re: [Pce] Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05

Qin Wu <bill.wu@huawei.com> Mon, 09 August 2021 13:09 UTC

Return-Path: <bill.wu@huawei.com>
X-Original-To: expand-draft-ietf-lsr-pce-discovery-security-support.all@virtual.ietf.org
Delivered-To: pce@ietfa.amsl.com
Received: by ietfa.amsl.com (Postfix, from userid 65534) id 36DDA3A1043; Mon, 9 Aug 2021 06:09:12 -0700 (PDT)
X-Original-To: xfilter-draft-ietf-lsr-pce-discovery-security-support.all@ietfa.amsl.com
Delivered-To: xfilter-draft-ietf-lsr-pce-discovery-security-support.all@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 684DC3A1042; Mon, 9 Aug 2021 06:09:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UO38yYq6ObMs; Mon, 9 Aug 2021 06:09:07 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C76793A103C; Mon, 9 Aug 2021 06:09:06 -0700 (PDT)
Received: from fraeml709-chm.china.huawei.com (unknown [172.18.147.201]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4GjxGm5mpVz6C97d; Mon, 9 Aug 2021 21:08:32 +0800 (CST)
Received: from dggeml752-chm.china.huawei.com (10.1.199.151) by fraeml709-chm.china.huawei.com (10.206.15.37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2308.8; Mon, 9 Aug 2021 15:09:02 +0200
Received: from dggeml753-chm.china.huawei.com (10.1.199.152) by dggeml752-chm.china.huawei.com (10.1.199.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2176.2; Mon, 9 Aug 2021 21:09:00 +0800
Received: from dggeml753-chm.china.huawei.com ([10.1.199.152]) by dggeml753-chm.china.huawei.com ([10.1.199.152]) with mapi id 15.01.2176.012; Mon, 9 Aug 2021 21:09:00 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Yaron Sheffer <yaronf.ietf@gmail.com>, "secdir@ietf.org" <secdir@ietf.org>
CC: "draft-ietf-lsr-pce-discovery-security-support.all@ietf.org" <draft-ietf-lsr-pce-discovery-security-support.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
Thread-Index: AdeNHypPK1Aju325Q+6DWq9xSrH09w==
Date: Mon, 09 Aug 2021 13:09:00 +0000
Message-ID: <a54b52bd71be4f8380f5288197c683bb@huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.136.123.117]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Resent-From: alias-bounces@ietf.org
Resent-To: pce@ietf.org, yingzhen.ietf@gmail.com, diego.r.lopez@telefonica.com, bill.wu@huawei.com, maqiufang1@huawei.com, aretana.ietf@gmail.com, daniel@olddog.co.uk, chopps@chopps.org, dhruv.ietf@gmail.com, acee@cisco.com, lsr@ietf.org, martin.vigoureux@nokia.com, jgs@juniper.net
Resent-Message-Id: <20210809130912.36DDA3A1043@ietfa.amsl.com>
Resent-Date: Mon, 09 Aug 2021 06:09:12 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/nEC3je8bQK5OxnIsc9LcOX2PHO4>
Subject: Re: [Pce] Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Aug 2021 13:09:12 -0000

Thanks Yaron for valuable comments, please see my reply inline below.
-----邮件原件-----
>发件人: Yaron Sheffer via Datatracker [mailto:noreply@ietf.org] 
>发送时间: 2021年8月6日 3:25
>收件人: secdir@ietf.org
>抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org; last-call@ietf.org; lsr@ietf.org
>主题: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05

>Reviewer: Yaron Sheffer
>Review result: Not Ready

>This document defines a mechanism (a TLV) to advertise the PCE Protocol security required (use of TCP-AO and its key ID, or alternatively use of TLS) within the routing protocol being used.

>* Sec. 3.1: I don't understand why "SHOULD advertise" and not MUST. Especially given the strict client behavior defined later.
[Qin]: I believe "SHOULD advertise" is consistent with client behavior defined later, i.e., we apply SHOULD NOT language to the client behavior.
I am not sure we should change it into strong language with MUST. Since if IGP advertisement doesn't include TCP-AO
 support flag bit or TLS support flag bit, NMS may fall back to configure both PCC and PCE server to support TCP-AO or TLS. That's one of reason I think why we choose to use SHOULD language.

>* Sec. 3.1: should we also say something about the case where both methods are advertised, and whether we recommend for the client to use one of them over the other?

[Qin]: It is up to local policy, which has bee clarified in the end of section 3.1. Hope this clarify.

>* Sec. 4: typo (appears twice) - "to be carried in the PCED TLV of the for use".

[Qin]:Thanks, have fixed them in the local copy.

>* Sec. 7: this phrase appears to be essential to security of this mechanism: "it MUST be insured that the IGP is protected for authentication and integrity of the PCED TLV". I would expect more guidance: how can this property be ensured in the relevant IGPs?
[Qin]:I think mechanism defined in [RFC3567] and [RFC2154] can be used to ensure authenticity and integrity of OSPF LSAs or ISIS LSPs and their TLVs. Here is the proposed changes:
OLD TEXT:
"
   Thus before advertisement of
   the PCE security parameters, it MUST be insured that the IGP is
   protected for authentication and integrity of the PCED TLV if the
   mechanism described in this document is used.
"
NEW TEXT:
"
   Thus before advertisement of
   the PCE security parameters, it MUST be insured that the IGP is
   protected for authentication and integrity of the PCED TLV with mechanisms defined in [RFC3567][RFC2154] if the
   mechanism described in this document is used.
"
>* Also, a possibly unintended consequence of this requirement is that if the IGP cannot be protected in a particular deployment/product, this mechanism would not be used. Please consider if this is likely to happen and whether we want to forego PCEP transport >security in such cases. My gut feel (not based on experience in such networks) is that the threat models are different enough that we should decouple the security of IGP from that of PCEP.

[Qin] I agree IGP security should be separated from PCEP security. IGP extension defined in this document is used by the PCC to select PCE server with appropriate security mechanism. On the other hand, Operator can either use IGP advertisement for PCEP security capability or rely on local policy to select PCE. If operator feels IGP advertisement is not secure, he can fall back to local policy or rely on manual configuration. Hope this clarifies.