[secdir] Secdir last call review of draft-ietf-detnet-security-12

Yaron Sheffer via Datatracker <noreply@ietf.org> Thu, 05 November 2020 14:21 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: secdir@ietf.org
Delivered-To: secdir@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 230673A1234; Thu, 5 Nov 2020 06:21:30 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Yaron Sheffer via Datatracker <noreply@ietf.org>
To: secdir@ietf.org
Cc: last-call@ietf.org, detnet@ietf.org, draft-ietf-detnet-security.all@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.21.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <160458609008.18764.7738961429715355351@ietfa.amsl.com>
Reply-To: Yaron Sheffer <yaronf.ietf@gmail.com>
Date: Thu, 05 Nov 2020 06:21:30 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/FfpnlExpMQmh3yDX_Lfy_wQvXZQ>
Subject: [secdir] Secdir last call review of draft-ietf-detnet-security-12
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2020 14:21:31 -0000

Reviewer: Yaron Sheffer
Review result: Has Issues

Comments: draft-ietf-detnet-security-12

The name says it all: this document is all about Deterministic Networking
(DetNet) security.

To summarize my perspective on this document: you chose to publish this
document as Informational and to not include any normative text. I understand
the motivation, presumably all normative text should be included in the base
documents. But it makes the document a lot less useful: network architects
would be guided much better if you made specific recommendations (specifically,
in Sec. 7, "Mitigation") and graded these recommendations as MAY/SHOULD/MUST. I
think deployers and architects would expect much more specific treatment of
security technologies and how they can/should be applied to DetNet rather than
an open-ended discussion that they may be able to apply to their own network,
but only after they have themselves gone through a deep dive into the technical
options.

One way you may want to improve the "usability" of the document is by adding
references from Sec. 7 ("mitigations") to the specific mitigations proposed in
the various technology-specific documents: for IP, MPLS, Ethernet etc. That
would make the discussion much more concrete. It would also allow users (as
well as WG participants) to understand more clearly which security areas are
addressed well and which are not.

* 1. "These DetNet technologies have not previously been deployed together on a
wide area IP-based network". Referring to the previous paragraph, I think you
mean to say, "DetNet technologies have not previously been deployed together
with a wide area IP-based network"

* "primarily concerned with denial-of service prevention" - this paragraph
seems to assume orthogonality/composability of architectural elements that
appears somewhat naive. Can we ensure basic security concerns (confidentiality,
integrity) on DetNet networks using standard mechanisms, such as TLS/DTLS or
IPsec while retaining the "deterministic" properties? Even if this is the case,
it needs to be mentioned explicitly. For example, throttling or retry
mechanisms might well interact badly between security protocols and the
underlying transport.

* 3.3 "integrity of the values in any header" - please provide a reference to a
recommendation on how to protect these values.

* 3.4: we punt the response of the network in the face of malicious actions
(e.g., a replayed, out-of-time-window packet) to admin configuration. DetNet
specifies (or at least refers to) queuing and shaping algorithms in RFC 8655,
Sec. 4.5. I would expect a similar reference to attack-resistant algorithms,
instead of having the admin choose from a menu of choices that appear to be
simplistic - drop the packet or shut down the link.

* 4: Sec. 7.1 of the DiffServ RFC has a different threat model in mind. The
introductory sections to the current document make it clear that we care about
mixed IT/OT networks ("insider threat") whereas DiffServ assumes a secure
network that can be policed on the perimeter, in boundary nodes. I think the
reference to "internal link[s] that cannot be adequately secured against
modification of DSCP values" is awkward - in a campus network, this would be
*any* link, because there is no perimeter.

* 5.2.2: as well as simple elimination of packets from the flow.

* 5.3 (table): an Internal, on-path attacker can inject some signaling packets.
Also, isn't a DDoS attack from the outside potentially an "inter-segment
attack" by an External attacker?

* 7.2: the section on sequence number integrity appears to assume that this
protection is achieved by using encryption. This is not necessarily true,
protocols such as ESP-null (or the deprecated AH) integrity-protect packets
without encrypting them. Similar solutions are available in MACsec.

* 7.4: if dummy packet insertion is presented as a mitigation against
reconnaissance (e.g. now my flow doesn't look like VoIP any more), I would
appreciate a reference to a proposed algorithm and a demonstration that this
really works. Personally I am skeptical of that.

* 7.5.1: I suggest to add to the end of the paragraph "However, if secret
symmetrical keys are used": Group key management protocols can be used to
automate management of such symmetric keys, see [draft-ietf-ipsecme-g-ikev2-01]
for an example in the context of IPsec.

* 7.6: and if we are worried about recon, then signaling needs to be encrypted,
not just integrity-protected.

* 8.1.3: this is phrased in a negative way, essentially saying, "the network
should accommodate insecure packet flows". A more positive way to address the
same issue would be "deployments should allow for dynamic and secure
registration of new devices, and possibly manual deregistration of retired
devices."

* 8.1.4: this short section is totally opaque. What is the threat? What are
deployers supposed to do about it? The same in fact applies to 8.1.5.

* 8.1.8: I would have liked to see treatment of the more complicated issues,
such as IT packets that need to "cross the line" into OT. Are there
application-level dependencies on the IT network? For example, does the OT
network need to use the IT network for DNS or OAM services? If such
dependencies exist, how are malicious packet flows handled?

* 8.1.11: this begs the question: are there unambiguous specifications of the
DetNet security mechanisms, so as to enable interoperability?

* 8.1.21: This section ends on a pessimistic note. It doesn't have to be that
way... One way to deal with your conclusions is for network designers to adopt
a standard risk-based approach, where only those attacks are mitigated whose
potential cost is higher than the cost of mitigation.

* Sec. 9, when discussing IPsec, again omits to mention that packet integrity
protection *without* encryption is an option.