Re: [secdir] [sfc] Secdir last call review of draft-ietf-sfc-oam-framework

"Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com> Tue, 28 April 2020 13:53 UTC

Return-Path: <naikumar@cisco.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC0E53A0A0F; Tue, 28 Apr 2020 06:53:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Qv64U0FE; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=y/7lZH/9
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HJXzMQDLmykg; Tue, 28 Apr 2020 06:53:41 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 276993A09A0; Tue, 28 Apr 2020 06:53:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10838; q=dns/txt; s=iport; t=1588082021; x=1589291621; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=vXoN43zbfu4AWzmOQ1P5t936oarHMNsiKqS6Qkbd5JI=; b=Qv64U0FE4pyyvB88zXVSvfTb1w/kX0mxPBuZRCNQIRyT+ctsUqt4AgP4 fflxDYXGVi4bLH4+TC8bYLD5J0d5DkA7kozUHe+OaK/srxf2i8FTfKk50 axgLBmuhudbsx+Jne5jyMZ9KF77MQ/iUU0WJOQX647DRSXM7J4A8b2r0a 0=;
IronPort-PHdr: 9a23:841WHhVVu+A9+hECfYzWDQcLS2DV8LGuZFwc94YnhrRSc6+q45XlOgnF6O5wiEPSBNyFuddPouTbvubrXmlTqZqCsXVXdptKWldFjMgNhAUvDYaDDlGzN//laSE2XaEgHF9o9n22Kw5ZTcD5YVCBh3ab4zMfXB74MFk9KuH8AIWHicOx2qi78IHSZAMdgj27bPtyIRy6oB+XuNMRhN5pK706zV3CpX4bdg==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AeAADSNKhe/49dJa1mGQEBAQEBAQEBAQEBAQEBAQEBEQEBAQEBAQEBAQEBPIE2AQEBAQEBCwGBU1EFbFgvKgqEFYNGA40xJZgvgUKBEANUCwEBAQwBARgLCgIEAQGERAIXghEkNwYOAgMBAQsBAQUBAQECAQUEbYUqByUMhXEBAQEBAwEBEBERDAEBKwELAQsEAgEGAhEEAQEBAgImAgICJQsVCAgBAQQBDQUbB4MEAYJLAy4BDpcakGcCgTmILDV2gTKDAAEBBYUrGIIOAwaBDioBgmKHEoEggSwaggCBEScMEIFPfj6CZwEBgSYKAQsHASEHMQKCWDKCLY4sO4JViQqHao9/CoJFmAMdgluIWIwohSSPfoFXmzACBAIEBQIOAQEFgWgjZnBwFTsqAYI+UBgNkFqBYQwXg0+FFIVCdDUCBgEHAQEDCXyPKYE1ATBfAQE
X-IronPort-AV: E=Sophos;i="5.73,327,1583193600"; d="scan'208";a="506050370"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Apr 2020 13:53:37 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 03SDrX0q025580 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 28 Apr 2020 13:53:35 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 28 Apr 2020 08:53:33 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 28 Apr 2020 09:53:32 -0400
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 28 Apr 2020 09:53:32 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XCt0M/XyzJGEHRrQ6sGkEt79+KjI4dM/B2vQKuEFd/ypUWoxYD9oYhlehmJILIEumANoyLc4VrXtGO/Ens6FhnQVYKswGizIIKK2XsycXv0KuCH3r7BOJnEGA3WEbGo5GoHMxqQdmMkyez523AFcPLVchjaaUJmNbxuLCc/QoLsx7eREWsUVDmQtesUi5wgqIFO4KLmjoaKZy7M1L727WTZPU/QEqXBYtgc58Z39uZWu7xF4Z8FJC8ixLluyYdzVhbzNet1T2CQWs/Zg9j9OAS5MxxZ9qE/1mh8I01ncczrm7AKDTYM9ADT6/v0P/n5B3zl77+JuXIjTL73It1lYzg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vXoN43zbfu4AWzmOQ1P5t936oarHMNsiKqS6Qkbd5JI=; b=BYddyb+KpFWmoTJDbeVP4F1kTHdgs4g3Se3upViR2l2LBsL0Jvgte9c/42/9t9hn6vYujF6IaSwqQQrEPkRi27+Muu9pT2GiIKGNAz23iUbHgsjg0V5/QiuybjqPhj22gWQwI1nXyGbv3/mwnhIUlTY8rGfOEjeIYJp81wITVscGZSCnmFU2lNrcXsDfat0KUbhV+w7g3eOF8agBYYWlH/5lmgJA9SjUZtuHH2IAOXrHStegK+3vJ6JMjQ4rHfCVZLGzCO7GuaGSVYFEP3PKILFC+QCsNIIHLGyqJfKT6vxLRHLQlUlyocI6HD+57BuYBTvJzxcXyMoWiekTP+Zt4w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vXoN43zbfu4AWzmOQ1P5t936oarHMNsiKqS6Qkbd5JI=; b=y/7lZH/9cSMjjVTWqkdZX98XkPzp7KEJmu3iZcgxZ6Dy3V5FCVz0hiJZUka7Adpg/ShvNBwTNuEDVQaCDG5pTfkeHMHoh/8alB8NNiYu/frJnE3w14LtPh1wLJBHc/UVSKvPmA5PfiiVoDr2Q9wvMXxAExZ0U52TMqvS5zVGxZA=
Received: from BN6PR11MB4068.namprd11.prod.outlook.com (2603:10b6:405:7c::31) by BN6PR11MB1505.namprd11.prod.outlook.com (2603:10b6:405:c::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2958.19; Tue, 28 Apr 2020 13:53:32 +0000
Received: from BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::cb:ae2d:1f21:7263]) by BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::cb:ae2d:1f21:7263%4]) with mapi id 15.20.2958.019; Tue, 28 Apr 2020 13:53:31 +0000
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>, "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
CC: "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>
Thread-Topic: [sfc] Secdir last call review of draft-ietf-sfc-oam-framework
Thread-Index: AdYW4VRPPDX1YR3aSqa2kbIsbH1DggD1H3GAADj+SVAAOXNWAAAlebMQAAtYDYA=
Date: Tue, 28 Apr 2020 13:53:31 +0000
Message-ID: <ACFF8B73-46BB-455A-8994-EDA675D8B281@cisco.com>
References: <CY4PR1601MB12541726BC79551C2A2EBBF0EAD40@CY4PR1601MB1254.namprd16.prod.outlook.com> <AEE6AFB3-6EE8-495F-992B-6314CBD2B6F6@cisco.com> <CY4PR1601MB1254E6CD2D9C4558EAFF21F5EAAE0@CY4PR1601MB1254.namprd16.prod.outlook.com> <760DA3B5-3B10-4786-8EC9-B107BFEBAC28@cisco.com> <CY4PR1601MB1254CADC9C21C9A205CFDF33EAAC0@CY4PR1601MB1254.namprd16.prod.outlook.com>
In-Reply-To: <CY4PR1601MB1254CADC9C21C9A205CFDF33EAAC0@CY4PR1601MB1254.namprd16.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.35.20030802
authentication-results: McAfee.com; dkim=none (message not signed) header.d=none;McAfee.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [136.56.55.90]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b141cfb9-f63f-43c0-148f-08d7eb7b89ad
x-ms-traffictypediagnostic: BN6PR11MB1505:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BN6PR11MB15053644BC7CC4A3BC38A005C6AC0@BN6PR11MB1505.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0387D64A71
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN6PR11MB4068.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(346002)(366004)(39860400002)(396003)(136003)(91956017)(76116006)(5660300002)(110136005)(66946007)(66556008)(54906003)(64756008)(316002)(66476007)(66446008)(2616005)(2906002)(33656002)(6486002)(26005)(36756003)(8676002)(186003)(8936002)(6506007)(4326008)(81156014)(71200400001)(6512007)(86362001)(53546011)(966005)(6636002)(478600001); DIR:OUT; SFP:1101;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <8C6F6C242A238741A995F2DAA261FDCB@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: b141cfb9-f63f-43c0-148f-08d7eb7b89ad
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Apr 2020 13:53:31.8701 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: YGkzuOSNlgDWkFTOsYKeDp1SiysO1M6CV7n9H7i0yUE70w7EgFwLJi8O8Ptoi3ojQsuYWAetP5DIQ1IZAslplg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB1505
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/PoxSg6z-UCjyBSHLXWNpAXKZuCY>
Subject: Re: [secdir] [sfc] Secdir last call review of draft-ietf-sfc-oam-framework
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Apr 2020 13:53:44 -0000

HI Tiru,

Thank you. We will submit the updated version by EOB today.

Thanks,
Nagendra

On 4/28/20, 1:26 AM, "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> wrote:

    Hi Nagendra,
    
    You may want to update the following line:
    
    OLD:
    To address the above concerns, SFC and SF OAM should provide mechanisms for: 
    NEW:
    To address the above concerns, SFC and SF OAM should provide mechanisms for preventing:
    
    Rest of the changes look good.
    
    Cheers,
    -Tiru
    
    > -----Original Message-----
    > From: Nagendra Kumar Nainar (naikumar) <naikumar@cisco.com>
    > Sent: Monday, April 27, 2020 8:06 PM
    > To: Konda, Tirumaleswar Reddy
    > <TirumaleswarReddy_Konda@McAfee.com>; Carlos Pignataro (cpignata)
    > <cpignata@cisco.com>
    > Cc: secdir@ietf.org; draft-ietf-sfc-oam-framework@ietf.org
    > Subject: Re: [sfc] Secdir last call review of draft-ietf-sfc-oam-framework
    > 
    > CAUTION: External email. Do not click links or open attachments unless you
    > recognize the sender and know the content is safe.
    > 
    > Hi Tirumaleswar,
    > 
    > Hope you are doing good.
    > 
    > Thank you for the review and the comments/suggestions. Please find the
    > diff attached that incorporates the comments.
    > 
    > We will submit the new version with the changes. Let us know if you have
    > any further comments.
    > 
    > Thanks,
    > Nagendra
    > 
    > On 4/26/20, 3:24 AM, "sfc on behalf of Konda, Tirumaleswar Reddy" <sfc-
    > bounces@ietf.org on behalf of TirumaleswarReddy_Konda@McAfee.com>
    > wrote:
    > 
    >     Hi Carlos,
    > 
    >     Please see inline
    > 
    >     > -----Original Message-----
    >     > From: Carlos Pignataro (cpignata) <cpignata@cisco.com>
    >     > Sent: Saturday, April 25, 2020 9:29 AM
    >     > To: Konda, Tirumaleswar Reddy
    > <TirumaleswarReddy_Konda@McAfee.com>
    >     > Cc: secdir@ietf.org; sfc@ietf.org; draft-ietf-sfc-ioam-nsh.all@ietf.org
    >     > Subject: Re: [sfc] Secdir last call review of draft-ietf-sfc-oam-framework
    >     >
    >     > CAUTION: External email. Do not click links or open attachments unless
    > you
    >     > recognize the sender and know the content is safe.
    >     >
    >     > Hi, Tiru,
    >     >
    >     > Many thanks for the review, and great to hear from you!
    >     >
    >     > I hope all is well — Please see inline.
    > 
    >     Thanks, I’m fine, and I hope all is well with you too.
    > 
    >     >
    >     > > 2020/04/20 午前3:28、Konda, Tirumaleswar Reddy
    >     > <TirumaleswarReddy_Konda@McAfee.com>のメール:
    >     > >
    >     > > Reviewer: Tirumaleswar Reddy
    >     > > Review result: Ready with issues
    >     > >
    >     > >
    >     > > I reviewed this document as part of the security directorate's ongoing
    >     > > effort to review all IETF documents entering the IESG..  These
    > comments
    >     > are directed at the security area director(s).  Document editors and WG
    >     > chairs should treat these comments like any other last call comments.
    >     > >
    >     > > This document provides a reference framework for OAM for SFC.
    >     > >
    >     > > Comments:
    >     > >
    >     > > 1. The document in Section 8 discusses various attacks (including both
    >     > > security and privacy) but does not discuss any protection mechanisms
    >     > other than proposing rate-limiting.  It is suggesting drafts proposing the
    > OAM
    >     > solution should address the attacks but I don’t see any security
    > mechanisms
    >     > discussed in draft-ietf-sfc-ioam-nsh to address the attacks.
    >     > >
    >     >
    >     > Since the document already clarifies that it does not define solutions, it
    >     > cannot define security consideration for those solutions, beyond saying
    > that
    >     > those solutions ought to address security considerations in those areas.
    > Any
    >     > security measures must be included and explained in the respective
    > solution
    >     > document. I believe this comment requires potentially action on draft-
    > ietf-
    >     > sfc-ioam-nsh but not on this draft.
    > 
    >     Yup. I see three solutions from SFC WG a) sfc-ioam-nsh b) ietf-sfc-proof-
    > of-transit (Experimental) c) penno-sfc-trace (Expired). sfc-ioam-nsh is the
    > only current standards track specification and it should address these attacks.
    > 
    >     >
    >     > That said you are right regarding the specifics of the rate-liming
    >     > recommendation. See the next answer for text.
    >     >
    >     > Also, in re-reading Section 8, seems like this:
    >     >
    >     >    To address the above concerns, SFC and SF OAM may provide
    > mechanism
    >     >    for:
    >     >
    >     >
    >     > Should say
    >     >
    >     >    To address the above concerns, SFC and SF OAM should provide
    >     > mechanisms
    >     >    for preventing:
    > 
    >     Yes.
    > 
    >     >
    >     >
    >     >
    >     > > 2. More discussion is required on the internal attacks.
    >     > > (a) How are attack packets bypassing SFC detected and blocked ?
    >     > > (b) How is sensitive information protected from eavesdroppers ?
    >     > > (c) How is DoS/DDoS attack of misusing the OAM channel is mitigated ?
    >     > > (d) Rate-limiting blocks both good and bad OAM probes and is a weak
    >     > mitigation strategy. Anomaly detection (e.g., deep learning techinques)
    > and
    >     > identifying the attacker look like a better strategy.
    >     > >
    >     >
    >     >
    >     > This is a good point. How about.
    >     >
    >     > OLD:
    >     >
    >     >    The documents proposing the OAM solution for SF component should
    >     >    consider rate-limiting the OAM probes at a frequency guided by the
    >     >    implementation choice.  Rate-limiting may be applied at the SFF or
    >     >    the SF . The OAM initiator may not receive a response for the probes
    >     >    that are rate-limited resulting in false negatives and the
    >     >    implementation should be aware of this.
    >     >
    >     >
    >     > NEW:
    >     >
    >     >
    >     >    The documents proposing the OAM solution for SF component should
    >     >    consider rate-limiting the OAM probes at a frequency guided by the
    >     >    implementation choice.  Rate-limiting may be applied at the SFF or
    >     >    the SF.  The OAM initiator may not receive a response for the probes
    >     >    that are rate-limited resulting in false negatives and the
    >     >    implementation should be aware of this. To mitigate any attacks that
    >     >    Leverage OAM packets, future documents proposing OAM solutions
    >     >    should describe the use of any techniques to detect
    >     >    and mitigate anomalies and various security  attacks.
    > 
    >     Works for me.
    > 
    >     Cheers,
    >     -Tiru
    > 
    >     >
    >     >
    >     > Would that work?
    >     >
    >     > Please feel free to suggest textual improvements or changes.
    >     >
    >     > Thanks,
    >     >
    >     > Carlos.
    >     >
    >     > > Cheers,
    >     > > -Tiru
    >     > > _______________________________________________
    >     > > sfc mailing list
    >     > > sfc@ietf.org
    >     > > https://www.ietf.org/mailman/listinfo/sfc
    > 
    >     _______________________________________________
    >     sfc mailing list
    >     sfc@ietf.org
    >     https://www.ietf.org/mailman/listinfo/sfc
    >