Re: Benjamin Kaduk's Discuss on draft-ietf-bfd-yang-16: (with DISCUSS and COMMENT)

"Reshad Rahman (rrahman)" <rrahman@cisco.com> Wed, 11 July 2018 13:25 UTC

Return-Path: <rrahman@cisco.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C09BE130DF9; Wed, 11 Jul 2018 06:25:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 82sJuTJixPpM; Wed, 11 Jul 2018 06:25:54 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CFF3E127598; Wed, 11 Jul 2018 06:25:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5248; q=dns/txt; s=iport; t=1531315554; x=1532525154; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=T7oDI+zlS1mrA/sjhilcuv0eqQbP2QSaM+1o5cntWzQ=; b=EojlgJUcpGeJjJHU9dG3ol+mS7r1V1qyq0CKLDX/AAKsUugt/GwZHze+ vnUOTLYGJEItr2tIZ56W2uWivEsrXF55eqCW+/gCNojIKw5cJKh3K85nz EuhBw0tPVJ4aLjMxcS3ByiIai1V5/PCGl0CduJn9tYqMTpBBXYNn9It+e A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DXBgAuBEZb/4QNJK1bDgsBAQEBAQEBAQEBAQEHAQEBAQGDSYFiKAqDcJQ8gguDOJF6gXoLLIRAAheCJiE2FgECAQECAQECbSiFNwEFIxFFEAIBCBgCAiYCAgIwFRACBAENBYMgggCpe4EuigWBC4UygkGBVz+BECeCaoR7FyOCRzGCJAKZVwkCjyWBQ4Z7hSORawIREwGBJCQMJSaBLHAVZQGCPoJNjUw5AW+BFYszAYEZAQE
X-IronPort-AV: E=Sophos;i="5.51,338,1526342400"; d="scan'208";a="141833802"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 11 Jul 2018 13:25:53 +0000
Received: from xch-rcd-011.cisco.com (xch-rcd-011.cisco.com [173.37.102.21]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id w6BDPqkB022090 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 11 Jul 2018 13:25:53 GMT
Received: from xch-rcd-005.cisco.com (173.37.102.15) by XCH-RCD-011.cisco.com (173.37.102.21) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Wed, 11 Jul 2018 08:25:52 -0500
Received: from xch-rcd-005.cisco.com ([173.37.102.15]) by XCH-RCD-005.cisco.com ([173.37.102.15]) with mapi id 15.00.1320.000; Wed, 11 Jul 2018 08:25:52 -0500
From: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
To: "Acee Lindem (acee)" <acee@cisco.com>, Jeffrey Haas <jhaas@pfrc.org>, Benjamin Kaduk <kaduk@mit.edu>
CC: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, "draft-ietf-bfd-yang@ietf.org" <draft-ietf-bfd-yang@ietf.org>, The IESG <iesg@ietf.org>, "bfd-chairs@ietf.org" <bfd-chairs@ietf.org>
Subject: Re: Benjamin Kaduk's Discuss on draft-ietf-bfd-yang-16: (with DISCUSS and COMMENT)
Thread-Topic: Benjamin Kaduk's Discuss on draft-ietf-bfd-yang-16: (with DISCUSS and COMMENT)
Thread-Index: AQHUEwtqGJqI5psVSUyofhcJ5M3R26R+dqWAgABNJ4CACrpYAIAAKkyAgAB3nIA=
Date: Wed, 11 Jul 2018 13:25:52 +0000
Message-ID: <650FCD2E-A555-447A-A7AA-87D67B4E2BDE@cisco.com>
References: <153064928232.4913.5177531623706237853.idtracker@ietfa.amsl.com> <69638E39-860F-4D2F-AE2B-3B0B0A7BA855@cisco.com> <20180704035647.GF60996@kduck.kaduk.org> <20180710234621.GD12853@pfrc.org> <DBDBAFD1-8280-4389-B7F9-08785FC01BF8@cisco.com>
In-Reply-To: <DBDBAFD1-8280-4389-B7F9-08785FC01BF8@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.b.0.180311
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [161.44.212.99]
Content-Type: text/plain; charset="utf-8"
Content-ID: <1D54F19F5EA80541A266F3EF01EFDCBD@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-bfd/ipEoEkysNQoNP5F-dDAmuhpHpZM>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jul 2018 13:25:56 -0000

Hi,

My read on the DISCUSS is not just wrt spoofing of BFD clients but also making sure that the proper access restriction (NACM) is used for the BFD clients. 

I didn't interpret Benjamin's comments as requiring a security boundary between BFD clients (BGP, IPGPs) and BFD running on the same dveice, which I agree would be preposterous.

Regards,
Reshad.

On 2018-07-10, 10:17 PM, "Acee Lindem (acee)" <acee@cisco.com> wrote:

    
    
    On 7/10/18, 7:46 PM, "Rtg-bfd on behalf of Jeffrey Haas" <rtg-bfd-bounces@ietf.org on behalf of jhaas@pfrc.org> wrote:
    
        On Tue, Jul 03, 2018 at 10:56:49PM -0500, Benjamin Kaduk wrote:
        > On Wed, Jul 04, 2018 at 03:20:42AM +0000, Reshad Rahman (rrahman) wrote:
        > > <RR> I am not 100% sure I understand the point being made. Is it a question of underlying the importance of having the IGPs authenticated since the IGPs can create/destroy BFD sessions via the local API?
        > 
        > That's the crux of the matter, yes.  Since (in this case) the IGP state
        > changes are being translated directly into BFD configuration changes,
        > the NETCONF/RESTCONF authentication is not really used.  So, any
        > authentication/authorization decisions that are made must be on the basis
        > of authentication at the IGP level.  This does not necessarily mean a hard
        > requirement for IGP authentication, though using unauthenticated IGP would
        > then be equivalent (for the purposes of this document) to allowing
        > anonymous NETCONF/RESTCONF access.
        > 
        > I'd be happy to just have a note in the security considerations that "when
        > BFD clients such as IGPs are used to modify BFD configuration, any
        > authentication and authorization for the configuration changes take place
        > in the BFD client, such as by using authenticated IGPs".  But feel free to
        > reword in a better fashion; this is really just about acknowledging the new
        > access mechanism (since the boilerplate covers SSH/TLS for
        > NETCONF/RESTCONF).
        
        I must admit to being somewhat perplexed by the request here.
        
        In the cases where BFD as a top level module is not the creator of a BFD
        session, you seem to be concerned that BFD can be used to attack a resource
        by spoofing that non-BFD client.
        
        While this is perhaps logically true, it also means that you have a far
        greater problem of being able to spoof the underlying BFD clients.  To give
        some real-world examples:
        - BGP typically requires explicit configuration for its endpoints.
        - Both OSPF and ISIS will require a matched speaker with acceptable
          configuration parameters for a session to come up.
        - Static routes with BFD sessions will require explicit configuration.
        
        In each of these cases, a client protocol that also wants to use BFD, the
        simple spoofing of the protocol endpoints is already a massive disaster
        since it will allow injection of control plane or forwarding state into the
        device.  This is so much worse than convincing a BFD session to try to come
        up with its default one packet per mode that ... well, I'm boggled we're
        even talking about this. :-)
        
        My request would be that we not complicate the security considerations of
        this module for such cases.
    
    I agree. This is DISCUSS is just preposterous - imposing some sort of security boundary between the IGP modules and the BFD module running on the same networking device.
    
    Thanks,
    Acee (LSR WG Co-Chair) 
    
        
        
        -- Jeff