Re: [secdir] [sfc] Secdir last call review of draft-ietf-sfc-oam-framework
"Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com> Tue, 28 April 2020 13:53 UTC
Return-Path: <naikumar@cisco.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC0E53A0A0F; Tue, 28 Apr 2020 06:53:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Qv64U0FE; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=y/7lZH/9
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HJXzMQDLmykg; Tue, 28 Apr 2020 06:53:41 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 276993A09A0; Tue, 28 Apr 2020 06:53:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10838; q=dns/txt; s=iport; t=1588082021; x=1589291621; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=vXoN43zbfu4AWzmOQ1P5t936oarHMNsiKqS6Qkbd5JI=; b=Qv64U0FE4pyyvB88zXVSvfTb1w/kX0mxPBuZRCNQIRyT+ctsUqt4AgP4 fflxDYXGVi4bLH4+TC8bYLD5J0d5DkA7kozUHe+OaK/srxf2i8FTfKk50 axgLBmuhudbsx+Jne5jyMZ9KF77MQ/iUU0WJOQX647DRSXM7J4A8b2r0a 0=;
IronPort-PHdr: 9a23:841WHhVVu+A9+hECfYzWDQcLS2DV8LGuZFwc94YnhrRSc6+q45XlOgnF6O5wiEPSBNyFuddPouTbvubrXmlTqZqCsXVXdptKWldFjMgNhAUvDYaDDlGzN//laSE2XaEgHF9o9n22Kw5ZTcD5YVCBh3ab4zMfXB74MFk9KuH8AIWHicOx2qi78IHSZAMdgj27bPtyIRy6oB+XuNMRhN5pK706zV3CpX4bdg==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AeAADSNKhe/49dJa1mGQEBAQEBAQEBAQEBAQEBAQEBEQEBAQEBAQEBAQEBPIE2AQEBAQEBCwGBU1EFbFgvKgqEFYNGA40xJZgvgUKBEANUCwEBAQwBARgLCgIEAQGERAIXghEkNwYOAgMBAQsBAQUBAQECAQUEbYUqByUMhXEBAQEBAwEBEBERDAEBKwELAQsEAgEGAhEEAQEBAgImAgICJQsVCAgBAQQBDQUbB4MEAYJLAy4BDpcakGcCgTmILDV2gTKDAAEBBYUrGIIOAwaBDioBgmKHEoEggSwaggCBEScMEIFPfj6CZwEBgSYKAQsHASEHMQKCWDKCLY4sO4JViQqHao9/CoJFmAMdgluIWIwohSSPfoFXmzACBAIEBQIOAQEFgWgjZnBwFTsqAYI+UBgNkFqBYQwXg0+FFIVCdDUCBgEHAQEDCXyPKYE1ATBfAQE
X-IronPort-AV: E=Sophos;i="5.73,327,1583193600"; d="scan'208";a="506050370"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Apr 2020 13:53:37 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 03SDrX0q025580 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 28 Apr 2020 13:53:35 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 28 Apr 2020 08:53:33 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 28 Apr 2020 09:53:32 -0400
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 28 Apr 2020 09:53:32 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XCt0M/XyzJGEHRrQ6sGkEt79+KjI4dM/B2vQKuEFd/ypUWoxYD9oYhlehmJILIEumANoyLc4VrXtGO/Ens6FhnQVYKswGizIIKK2XsycXv0KuCH3r7BOJnEGA3WEbGo5GoHMxqQdmMkyez523AFcPLVchjaaUJmNbxuLCc/QoLsx7eREWsUVDmQtesUi5wgqIFO4KLmjoaKZy7M1L727WTZPU/QEqXBYtgc58Z39uZWu7xF4Z8FJC8ixLluyYdzVhbzNet1T2CQWs/Zg9j9OAS5MxxZ9qE/1mh8I01ncczrm7AKDTYM9ADT6/v0P/n5B3zl77+JuXIjTL73It1lYzg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vXoN43zbfu4AWzmOQ1P5t936oarHMNsiKqS6Qkbd5JI=; b=BYddyb+KpFWmoTJDbeVP4F1kTHdgs4g3Se3upViR2l2LBsL0Jvgte9c/42/9t9hn6vYujF6IaSwqQQrEPkRi27+Muu9pT2GiIKGNAz23iUbHgsjg0V5/QiuybjqPhj22gWQwI1nXyGbv3/mwnhIUlTY8rGfOEjeIYJp81wITVscGZSCnmFU2lNrcXsDfat0KUbhV+w7g3eOF8agBYYWlH/5lmgJA9SjUZtuHH2IAOXrHStegK+3vJ6JMjQ4rHfCVZLGzCO7GuaGSVYFEP3PKILFC+QCsNIIHLGyqJfKT6vxLRHLQlUlyocI6HD+57BuYBTvJzxcXyMoWiekTP+Zt4w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vXoN43zbfu4AWzmOQ1P5t936oarHMNsiKqS6Qkbd5JI=; b=y/7lZH/9cSMjjVTWqkdZX98XkPzp7KEJmu3iZcgxZ6Dy3V5FCVz0hiJZUka7Adpg/ShvNBwTNuEDVQaCDG5pTfkeHMHoh/8alB8NNiYu/frJnE3w14LtPh1wLJBHc/UVSKvPmA5PfiiVoDr2Q9wvMXxAExZ0U52TMqvS5zVGxZA=
Received: from BN6PR11MB4068.namprd11.prod.outlook.com (2603:10b6:405:7c::31) by BN6PR11MB1505.namprd11.prod.outlook.com (2603:10b6:405:c::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2958.19; Tue, 28 Apr 2020 13:53:32 +0000
Received: from BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::cb:ae2d:1f21:7263]) by BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::cb:ae2d:1f21:7263%4]) with mapi id 15.20.2958.019; Tue, 28 Apr 2020 13:53:31 +0000
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
CC: "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>
Thread-Topic: [sfc] Secdir last call review of draft-ietf-sfc-oam-framework
Thread-Index: AdYW4VRPPDX1YR3aSqa2kbIsbH1DggD1H3GAADj+SVAAOXNWAAAlebMQAAtYDYA=
Date: Tue, 28 Apr 2020 13:53:31 +0000
Message-ID: <ACFF8B73-46BB-455A-8994-EDA675D8B281@cisco.com>
References: <CY4PR1601MB12541726BC79551C2A2EBBF0EAD40@CY4PR1601MB1254.namprd16.prod.outlook.com> <AEE6AFB3-6EE8-495F-992B-6314CBD2B6F6@cisco.com> <CY4PR1601MB1254E6CD2D9C4558EAFF21F5EAAE0@CY4PR1601MB1254.namprd16.prod.outlook.com> <760DA3B5-3B10-4786-8EC9-B107BFEBAC28@cisco.com> <CY4PR1601MB1254CADC9C21C9A205CFDF33EAAC0@CY4PR1601MB1254.namprd16.prod.outlook.com>
In-Reply-To: <CY4PR1601MB1254CADC9C21C9A205CFDF33EAAC0@CY4PR1601MB1254.namprd16.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.35.20030802
authentication-results: McAfee.com; dkim=none (message not signed) header.d=none;McAfee.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [136.56.55.90]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b141cfb9-f63f-43c0-148f-08d7eb7b89ad
x-ms-traffictypediagnostic: BN6PR11MB1505:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BN6PR11MB15053644BC7CC4A3BC38A005C6AC0@BN6PR11MB1505.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0387D64A71
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN6PR11MB4068.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(346002)(366004)(39860400002)(396003)(136003)(91956017)(76116006)(5660300002)(110136005)(66946007)(66556008)(54906003)(64756008)(316002)(66476007)(66446008)(2616005)(2906002)(33656002)(6486002)(26005)(36756003)(8676002)(186003)(8936002)(6506007)(4326008)(81156014)(71200400001)(6512007)(86362001)(53546011)(966005)(6636002)(478600001); DIR:OUT; SFP:1101;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <8C6F6C242A238741A995F2DAA261FDCB@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: b141cfb9-f63f-43c0-148f-08d7eb7b89ad
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Apr 2020 13:53:31.8701 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: YGkzuOSNlgDWkFTOsYKeDp1SiysO1M6CV7n9H7i0yUE70w7EgFwLJi8O8Ptoi3ojQsuYWAetP5DIQ1IZAslplg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB1505
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/PoxSg6z-UCjyBSHLXWNpAXKZuCY>
Subject: Re: [secdir] [sfc] Secdir last call review of draft-ietf-sfc-oam-framework
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Apr 2020 13:53:44 -0000
HI Tiru, Thank you. We will submit the updated version by EOB today. Thanks, Nagendra On 4/28/20, 1:26 AM, "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> wrote: Hi Nagendra, You may want to update the following line: OLD: To address the above concerns, SFC and SF OAM should provide mechanisms for: NEW: To address the above concerns, SFC and SF OAM should provide mechanisms for preventing: Rest of the changes look good. Cheers, -Tiru > -----Original Message----- > From: Nagendra Kumar Nainar (naikumar) <naikumar@cisco.com> > Sent: Monday, April 27, 2020 8:06 PM > To: Konda, Tirumaleswar Reddy > <TirumaleswarReddy_Konda@McAfee.com>; Carlos Pignataro (cpignata) > <cpignata@cisco.com> > Cc: secdir@ietf.org; draft-ietf-sfc-oam-framework@ietf.org > Subject: Re: [sfc] Secdir last call review of draft-ietf-sfc-oam-framework > > CAUTION: External email. Do not click links or open attachments unless you > recognize the sender and know the content is safe. > > Hi Tirumaleswar, > > Hope you are doing good. > > Thank you for the review and the comments/suggestions. Please find the > diff attached that incorporates the comments. > > We will submit the new version with the changes. Let us know if you have > any further comments. > > Thanks, > Nagendra > > On 4/26/20, 3:24 AM, "sfc on behalf of Konda, Tirumaleswar Reddy" <sfc- > bounces@ietf.org on behalf of TirumaleswarReddy_Konda@McAfee.com> > wrote: > > Hi Carlos, > > Please see inline > > > -----Original Message----- > > From: Carlos Pignataro (cpignata) <cpignata@cisco.com> > > Sent: Saturday, April 25, 2020 9:29 AM > > To: Konda, Tirumaleswar Reddy > <TirumaleswarReddy_Konda@McAfee.com> > > Cc: secdir@ietf.org; sfc@ietf.org; draft-ietf-sfc-ioam-nsh.all@ietf.org > > Subject: Re: [sfc] Secdir last call review of draft-ietf-sfc-oam-framework > > > > CAUTION: External email. Do not click links or open attachments unless > you > > recognize the sender and know the content is safe. > > > > Hi, Tiru, > > > > Many thanks for the review, and great to hear from you! > > > > I hope all is well — Please see inline. > > Thanks, I’m fine, and I hope all is well with you too. > > > > > > 2020/04/20 午前3:28、Konda, Tirumaleswar Reddy > > <TirumaleswarReddy_Konda@McAfee.com>のメール: > > > > > > Reviewer: Tirumaleswar Reddy > > > Review result: Ready with issues > > > > > > > > > I reviewed this document as part of the security directorate's ongoing > > > effort to review all IETF documents entering the IESG.. These > comments > > are directed at the security area director(s). Document editors and WG > > chairs should treat these comments like any other last call comments. > > > > > > This document provides a reference framework for OAM for SFC. > > > > > > Comments: > > > > > > 1. The document in Section 8 discusses various attacks (including both > > > security and privacy) but does not discuss any protection mechanisms > > other than proposing rate-limiting. It is suggesting drafts proposing the > OAM > > solution should address the attacks but I don’t see any security > mechanisms > > discussed in draft-ietf-sfc-ioam-nsh to address the attacks. > > > > > > > Since the document already clarifies that it does not define solutions, it > > cannot define security consideration for those solutions, beyond saying > that > > those solutions ought to address security considerations in those areas. > Any > > security measures must be included and explained in the respective > solution > > document. I believe this comment requires potentially action on draft- > ietf- > > sfc-ioam-nsh but not on this draft. > > Yup. I see three solutions from SFC WG a) sfc-ioam-nsh b) ietf-sfc-proof- > of-transit (Experimental) c) penno-sfc-trace (Expired). sfc-ioam-nsh is the > only current standards track specification and it should address these attacks. > > > > > That said you are right regarding the specifics of the rate-liming > > recommendation. See the next answer for text. > > > > Also, in re-reading Section 8, seems like this: > > > > To address the above concerns, SFC and SF OAM may provide > mechanism > > for: > > > > > > Should say > > > > To address the above concerns, SFC and SF OAM should provide > > mechanisms > > for preventing: > > Yes. > > > > > > > > > > 2. More discussion is required on the internal attacks. > > > (a) How are attack packets bypassing SFC detected and blocked ? > > > (b) How is sensitive information protected from eavesdroppers ? > > > (c) How is DoS/DDoS attack of misusing the OAM channel is mitigated ? > > > (d) Rate-limiting blocks both good and bad OAM probes and is a weak > > mitigation strategy. Anomaly detection (e.g., deep learning techinques) > and > > identifying the attacker look like a better strategy. > > > > > > > > > This is a good point. How about. > > > > OLD: > > > > The documents proposing the OAM solution for SF component should > > consider rate-limiting the OAM probes at a frequency guided by the > > implementation choice. Rate-limiting may be applied at the SFF or > > the SF . The OAM initiator may not receive a response for the probes > > that are rate-limited resulting in false negatives and the > > implementation should be aware of this. > > > > > > NEW: > > > > > > The documents proposing the OAM solution for SF component should > > consider rate-limiting the OAM probes at a frequency guided by the > > implementation choice. Rate-limiting may be applied at the SFF or > > the SF. The OAM initiator may not receive a response for the probes > > that are rate-limited resulting in false negatives and the > > implementation should be aware of this. To mitigate any attacks that > > Leverage OAM packets, future documents proposing OAM solutions > > should describe the use of any techniques to detect > > and mitigate anomalies and various security attacks. > > Works for me. > > Cheers, > -Tiru > > > > > > > Would that work? > > > > Please feel free to suggest textual improvements or changes. > > > > Thanks, > > > > Carlos. > > > > > Cheers, > > > -Tiru > > > _______________________________________________ > > > sfc mailing list > > > sfc@ietf.org > > > https://www.ietf.org/mailman/listinfo/sfc > > _______________________________________________ > sfc mailing list > sfc@ietf.org > https://www.ietf.org/mailman/listinfo/sfc >
- [secdir] Secdir last call review of draft-ietf-sf… Konda, Tirumaleswar Reddy
- Re: [secdir] [sfc] Secdir last call review of dra… Carlos Pignataro (cpignata)
- Re: [secdir] [sfc] Secdir last call review of dra… Konda, Tirumaleswar Reddy
- Re: [secdir] [sfc] Secdir last call review of dra… Carlos Pignataro (cpignata)
- Re: [secdir] [sfc] Secdir last call review of dra… Nagendra Kumar Nainar (naikumar)
- Re: [secdir] [sfc] Secdir last call review of dra… Konda, Tirumaleswar Reddy
- Re: [secdir] [sfc] Secdir last call review of dra… Carlos Pignataro (cpignata)
- Re: [secdir] [sfc] Secdir last call review of dra… Nagendra Kumar Nainar (naikumar)