Re: [savi] Gen-ART review of draft-ietf-savi-threat-scope-07

Russ Housley <housley@vigilsec.com> Tue, 09 April 2013 22:36 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: savi@ietfa.amsl.com
Delivered-To: savi@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E63C421F90BB; Tue, 9 Apr 2013 15:36:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eExCO2rGBBNc; Tue, 9 Apr 2013 15:36:24 -0700 (PDT)
Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by ietfa.amsl.com (Postfix) with ESMTP id B1E8421F9051; Tue, 9 Apr 2013 15:36:24 -0700 (PDT)
Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id B50D89A4112; Tue, 9 Apr 2013 18:36:29 -0400 (EDT)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id KKu1GypQBele; Tue, 9 Apr 2013 18:36:20 -0400 (EDT)
Received: from [192.168.2.100] (pool-173-79-232-68.washdc.fios.verizon.net [173.79.232.68]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id CC52F9A410F; Tue, 9 Apr 2013 18:36:27 -0400 (EDT)
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset="us-ascii"
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <8D3D17ACE214DC429325B2B98F3AE71293D371CF@MX15A.corp.emc.com>
Date: Tue, 09 Apr 2013 18:36:19 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <34B1BF5C-9A14-4B86-BA51-9780F2832ACF@vigilsec.com>
References: <7C4DFCE962635144B8FAE8CA11D0BF1E055F69357F@MX14A.corp.emc.com> <8D3D17ACE214DC429325B2B98F3AE71293AEEDC8@MX15A.corp.emc.com> <8D3D17ACE214DC429325B2B98F3AE71293D371CF@MX15A.corp.emc.com>
To: "Black, David" <david.black@emc.com>
X-Mailer: Apple Mail (2.1085)
Cc: IETF Gen-ART <gen-art@ietf.org>, savi@ietf.org, IETF <ietf@ietf.org>
Subject: Re: [savi] Gen-ART review of draft-ietf-savi-threat-scope-07
X-BeenThere: savi@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Mailing list for the SAVI working group at IETF <savi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/savi>, <mailto:savi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/savi>
List-Post: <mailto:savi@ietf.org>
List-Help: <mailto:savi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/savi>, <mailto:savi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Apr 2013 22:36:26 -0000

David:

Thanks for your efforts on this document.  Your first review was in May 2011, and the document has improved greatly for you continued pushing on the concerns.

Russ


On Apr 3, 2013, at 1:04 PM, Black, David wrote:

> The -07 version of this draft resolves all of the issues raised by the Gen-ART
> review of the -06 version.  Discussion of the review with the authors has
> resulted in a common understanding that there is no need for additional text
> on statically allowing all source addresses through all links in a set of
> teamed/aggregated links - that's at best "nice to have" for this draft, but
> not essential.
> 
> Thanks,
> --David
> 
>> -----Original Message-----
>> From: Black, David
>> Sent: Monday, March 25, 2013 9:04 PM
>> To: McPherson, Danny; Fred Baker; joel.halpern@ericsson.com; gen-art@ietf.org
>> Cc: Jean-Michel Combes; Ted Lemon; savi@ietf.org; Black, David; ietf@ietf.org
>> Subject: Gen-ART review of draft-ietf-savi-threat-scope-06
>> 
>> I have been selected as the General Area Review Team (Gen-ART) reviewer
>> for this draft (for background on Gen-ART, please see
>> http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).
>> 
>> Please wait for direction from your document shepherd or
>> AD before posting a new version of the draft.
>> 
>> Document: draft-ietf-savi-threat-scope-06
>> Reviewer: David L. Black
>> Review Date: March 27, 2013
>> IESG Telechat Date: (if known)
>> 
>> Summary: This draft is on the right track, but has open issues, described in
>> the review.
>> 
>> Looking at the original Gen-ART review of the -05 draft and checking the diffs
>> between -05 and -06, the issues raised by that review have only been partially
>> addressed:
>> 
>>> There is no discussion of link teaming or aggregation (e.g., via LACP); this
>>> may affect source address validation functionality by requiring the same
>>> validation checks on all aggregated ports.  An important case to discuss
>>> is where the aggregated host links are connected to ports on different
>>> switches (e.g., in an active/passive configuration).
>> 
>> This is partially addressed on 4.1.2 (new section in -06), but only in terms
>> of moving validation state when something like LACP reconfigures.  This has a
>> couple of shortcomings:
>> a) the alternative of statically  allowing all source addresses through all
>> 	teamed/aggregated links (decouples SAVI state from link
>> teaming/aggregation
>> 	state) should also be mentioned, and
>> b) the new text implies that LACP is the only way to cause this situation -
>> it's
>> 	not, so LACP should be used as an example.  VRRP is another example.
>> 
>>> (1) Some of the software switch implementations are single instance switches
>>> whose implementation is distributed across multiple physical servers.  This
>>> results in concerns similar to the link aggregation discussion above.
>> 
>> I don't think this has been addressed, but the notion of single-instance
>> switches
>> could be added to the generalization of the new text in 4.1.2.
>> 
>>> (2) Live migration of virtual machines among physical servers causes
>>> relocation of MAC addresses across switch ports.  A so-called "gratuitous
>> ARP"
>>> is often used to inform the network of the MAC address move; port-based
>>> source address validation information needs to move in response to such
>> ARPs.
>>> 
>>> (3) MAC address relocation is also used as a failure recovery technique; the
>>> surviving hardware element (e.g., host in a cluster) takes over the MAC
>>> addresses of the failed hardware; like the previous case, a "gratuitous ARP"
>>> is a common means of informing the network that the MAC address has moved,
>>> and source address validation information needs to move in response to it.
>>> 
>>> Minor issues:
>>> 
>>> There doesn't seem to be much discussion of dynamic network reconfiguration,
>>> which may change traffic egress points.  VRRP may be a useful example to
>>> discuss beyond the typical routing protocol updates to forwarding tables.
>> 
>> A paragraph has been added to 5.2.3 to address all three of the above
>> concerns.
>> I guess that's ok, but I would have liked to see some text pointing out that a
>> MAC move can be detected by the switches and used to update SAVI state about
>> which port(s) a MAC is accessed through.
>> 
>> Thanks,
>> --David
>> 
>>> -----Original Message-----
>>> From: Black, David
>>> Sent: Friday, May 13, 2011 1:03 AM
>>> To: McPherson, Danny; Fred Baker; joel.halpern@ericsson.com; gen-
>> art@ietf.org
>>> Cc: Black, David; Christian Vogt; Jean-Michel Combes; Jari Arkko;
>>> savi@ietf.org
>>> Subject: Gen-ART review of draft-ietf-savi-threat-scope-05
>>> 
>>> I am the assigned Gen-ART reviewer for this draft. For background on
>>> Gen-ART, please see the FAQ at
>>> <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.
>>> 
>>> Please resolve these comments along with any other Last Call comments
>>> you may receive.
>>> 
>>> Document: draft-ietf-savi-threat-scope-05
>>> Reviewer: David L. Black
>>> Review Date: 12 May 2011
>>> IETF LC End Date: 18 May 2011
>>> 
>>> Summary: This draft is on the right track, but has open issues, described in
>>> the review.
>>> 
>>> This draft discusses the threats and deployment environment for IP source
>>> address validation with particular attention to finer-grain validation that
>>> could be used within a network to validate IP addresses closer to the
>> sources
>>> of network traffic than ingress to an ISP's network.
>>> 
>>> Major issues:
>>> 
>>> There is no discussion of link teaming or aggregation (e.g., via LACP); this
>>> may affect source address validation functionality by requiring the same
>>> validation checks on all aggregated ports.  An important case to discuss
>>> is where the aggregated host links are connected to ports on different
>>> switches
>>> (e.g., in an active/passive configuration).
>>> 
>>> The discussion of multi-instance hosts in section 5.2.3 is incomplete
>>> in several important aspects:
>>> 
>>> (1) Some of the software switch implementations are single instance switches
>>> whose implementation is distributed across multiple physical servers.  This
>>> results in concerns similar to the link aggregation discussion above.
>>> 
>>> (2) Live migration of virtual machines among physical servers causes
>>> relocation of MAC addresses across switch ports.  A so-called "gratuitous
>> ARP"
>>> is often used to inform the network of the MAC address move; port-based
>>> source address validation information needs to move in response to such
>> ARPs.
>>> 
>>> (3) MAC address relocation is also used as a failure recovery technique; the
>>> surviving hardware element (e.g., host in a cluster) takes over the MAC
>>> addresses of the failed hardware; like the previous case, a "gratuitous ARP"
>>> is a common means of informing the network that the MAC address has moved,
>>> and source address validation information needs to move in response to it.
>>> 
>>> Minor issues:
>>> 
>>> There doesn't seem to be much discussion of dynamic network reconfiguration,
>>> which may change traffic egress points.  VRRP may be a useful example to
>>> discuss beyond the typical routing protocol updates to forwarding tables.
>>> 
>>> Nits/editorial comments:
>>> 
>>> idnits 2.12.11 ran clean.
>>> 
>>> Thanks,
>>> --David
>>> ----------------------------------------------------
>>> David L. Black, Distinguished Engineer
>>> EMC Corporation, 176 South St., Hopkinton, MA  01748
>>> +1 (508) 293-7953             FAX: +1 (508) 293-7786
>>> david.black@emc.com        Mobile: +1 (978) 394-7754
>>> ----------------------------------------------------
>>> 
>