Re: [secdir] secdir review of draft-ietf-spring-segment-routing-13

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Sat, 24 March 2018 11:14 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 544151241F8; Sat, 24 Mar 2018 04:14:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level:
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yX8gO_B-Xqu6; Sat, 24 Mar 2018 04:14:03 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F75B1201F2; Sat, 24 Mar 2018 04:14:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=80274; q=dns/txt; s=iport; t=1521890043; x=1523099643; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Y9wu6jepaswEp6kQDqM/f41STagANGZu7UF1nNahgBs=; b=Mjly+kJO59ywdKPgXAUGkdYS/uCr1AHTBXFNSr+5jySXXPXAqzYZd3sQ 8bXfSlF3J+4bTA7WYfcEt07oI3bO+JIcuM1iJlcx+WyNoksAS4rkYjDdT 5Yvmz3emum/7g1U2KZMjJHzU7cmCiOsF95lE1CMEftuuES0Thy+k7lVEU I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BLAQC9MbZa/40NJK1dGQEBAQEBAQEBAQEBAQcBAQEBAYJNdGFwKAqDUogAjQ6BdIERhmCHDIRlFIFyCyeBVIMKAhqDViE0GAECAQEBAQEBAmsohSUBAQEDARoJVgUHBAIBCA4DAQMBASgDAgICHxEUAwYIAgQBDQUIBoRoAw0ID6lagiCHCA2BLIILCgWFKwSCGoFUQIEMgweCUUIBAQEBAQGBJwESATYVglWCVAOHJx6JBYZHLggCgzGCH4UwM4J0gTgagz2HMocmgW07hgECERMBgSQBHDhhWBEIcBWCbQEPgiEYjhZvAY0+DxgEgQSBFwEB
X-IronPort-AV: E=Sophos;i="5.48,354,1517875200"; d="scan'208,217";a="370121828"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Mar 2018 11:14:00 +0000
Received: from XCH-RCD-001.cisco.com (xch-rcd-001.cisco.com [173.37.102.11]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id w2OBE0Ze005588 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 24 Mar 2018 11:14:00 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-RCD-001.cisco.com (173.37.102.11) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Sat, 24 Mar 2018 06:13:59 -0500
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1320.000; Sat, 24 Mar 2018 06:13:59 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Eric Rescorla <ekr@rtfm.com>, Alissa Cooper <alissa@cooperw.in>
CC: David Mandelberg <david+work@mandelberg.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-spring-segment-routing.all@ietf.org" <draft-ietf-spring-segment-routing.all@ietf.org>
Thread-Topic: secdir review of draft-ietf-spring-segment-routing-13
Thread-Index: AQHTVAN+h13Fy6LhA0quT26NkWnvTKPee6ywgAEZggD//7GikIAAWWwA//+s6BCAAFkXgP//rdqwACISmgAACWbCwA==
Date: Sat, 24 Mar 2018 11:13:59 +0000
Message-ID: <b60d331d3fbe482d95a94487d81542af@XCH-ALN-001.cisco.com>
References: <3b7c6cdc-0e9e-0a57-e030-ae3a715c6a03@mandelberg.org> <e32e5f9bc00043e3a8b86205d434c35d@XCH-ALN-001.cisco.com> <56ce2942-388f-d03b-721a-3b06af5559bc@mandelberg.org> <ef5efa3a9f1d434580946f1012ebb0bc@XCH-ALN-001.cisco.com> <9521bc0e-a1f2-046e-8e92-9e4a64237036@mandelberg.org> <d259d31119534e76b1ebf45faab43941@XCH-ALN-001.cisco.com> <894918aa-b853-299c-38f4-6c56ce385c64@mandelberg.org> <0735a0688ee64980b5d1da734fc8cbcd@XCH-ALN-001.cisco.com> <CABcZeBNwbitatbJ1f-tiEUw+G6CosK6g-r6pDa0Sx=iNvLmqJQ@mail.gmail.com>
In-Reply-To: <CABcZeBNwbitatbJ1f-tiEUw+G6CosK6g-r6pDa0Sx=iNvLmqJQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.46.144]
Content-Type: multipart/mixed; boundary="_004_b60d331d3fbe482d95a94487d81542afXCHALN001ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/QaiU0CcyM7sFVtz2piD8wJIJT_k>
Subject: Re: [secdir] secdir review of draft-ietf-spring-segment-routing-13
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Mar 2018 11:14:07 -0000

Eric –

Alissa’s comments were addressed – and we have been waiting for a response from her for nearly 3 months.
See attached.

   Les


From: Eric Rescorla <ekr@rtfm.com>
Sent: Saturday, March 24, 2018 3:40 AM
To: Les Ginsberg (ginsberg) <ginsberg@cisco.com>
Cc: David Mandelberg <david+work@mandelberg.org>; iesg@ietf.org; secdir@ietf.org; draft-ietf-spring-segment-routing.all@ietf.org
Subject: Re: secdir review of draft-ietf-spring-segment-routing-13

The DISCUSS on this document is being held by Alissa Cooper.
https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing/ballot/

I would suggest responding to her points (there should be an associated email thread)

-Ekr


On Fri, Mar 23, 2018 at 11:27 PM, Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>> wrote:

Hmmm...well if you look at https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing/ we see




Reviews

OPSDIR Last Call Review (of -13): Ready <https://datatracker.ietf.org/doc/review-ietf-spring-segment-routing-13-opsdir-lc-ersue-2017-12-19/>
SECDIR Last Call Review (of -13): Has Nits <https://datatracker.ietf.org/doc/review-ietf-spring-segment-routing-13-secdir-lc-mandelberg-2017-11-18/>
RTGDIR Telechat Review (of -13): Ready <https://datatracker.ietf.org/doc/review-ietf-spring-segment-routing-13-rtgdir-telechat-hardwick-2017-12-12/>




And then the SECDIR review link points to your review: https://datatracker.ietf.org/doc/review-ietf-spring-segment-routing-13-secdir-lc-mandelberg-2017-11-18/



So I don’t know what else needs to be done to clear this.



Bruno? Rob? Can you help here?



    Les



> -----Original Message-----

> From: David Mandelberg <david+work@mandelberg.org<mailto:david%2Bwork@mandelberg.org>>

> Sent: Friday, March 23, 2018 4:18 PM

> To: Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>>; iesg@ietf.org<mailto:iesg@ietf.org>;

> secdir@ietf.org<mailto:secdir@ietf.org>; draft-ietf-spring-segment-routing.all@ietf.org<mailto:draft-ietf-spring-segment-routing.all@ietf.org>

> Subject: Re: secdir review of draft-ietf-spring-segment-routing-13

>

> No worries about the delay. And I'm just a secdir reviewer, not an IESG member,

> so I can't do anything about a DISCUSS.

>

> On 03/23/2018 07:02 PM, Les Ginsberg (ginsberg) wrote:

> > David -

> >

> > Yes - IGP specs have this. See (for example):

> >

> > https://tools.ietf.org/html/draft-ietf-isis-segment-routing-extensions

> > -15#section-2.2.1

> >

> > If this suffices please clear your DISCUSS on the draft.

> >

> > Again, apologies for the long delay in responding - it was not intentional.

> >

> >      Les

> >

> >> -----Original Message-----

> >> From: David Mandelberg <david+work@mandelberg.org<mailto:david+work@mandelberg.org>>

> >> Sent: Friday, March 23, 2018 3:57 PM

> >> To: Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>>; iesg@ietf.org<mailto:iesg@ietf.org>;

> >> secdir@ietf.org<mailto:secdir@ietf.org>; draft-ietf-spring-segment-routing.all@ietf.org<mailto:draft-ietf-spring-segment-routing.all@ietf.org>

> >> Subject: Re: secdir review of draft-ietf-spring-segment-routing-13

> >>

> >> Thanks, I didn't know it was in the IGP specs. If the usage you

> >> describe would be clear to anybody using this, then I think you've

> >> fully addressed my original comment.

> >>

> >> On 03/23/2018 06:43 PM, Les Ginsberg (ginsberg) wrote:

> >>> David -

> >>>

> >>> Thanx for the very prompt response.

> >>>

> >>> If a controller (for example) is defining a SID stack for an SR

> >>> Policy, it can

> >> choose to use an  Adj-SID which is advertised as Persistent and be

> >> confident that the SID will not be reused for some other purpose no

> >> matter what happens on the owning node.

> >>>

> >>> BTW, the flag isn’t new - it has been part of the IGP specifications

> >>> for quite a

> >> long while. It just wasn't mentioned in the SR Architecture in earlier versions.

> >>>

> >>> HTH

> >>>

> >>>        Les

> >>>

> >>>> -----Original Message-----

> >>>> From: David Mandelberg <david+work@mandelberg.org<mailto:david+work@mandelberg.org>>

> >>>> Sent: Friday, March 23, 2018 3:17 PM

> >>>> To: Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>>; iesg@ietf.org<mailto:iesg@ietf.org>;

> >>>> secdir@ietf.org<mailto:secdir@ietf.org>; draft-ietf-spring-segment-routing.all@ietf.org<mailto:draft-ietf-spring-segment-routing.all@ietf.org>

> >>>> Subject: Re: secdir review of draft-ietf-spring-segment-routing-13

> >>>>

> >>>> Hi,

> >>>>

> >>>> How will the indication of persistence be used? I scanned the

> >>>> changes from -13 to -15, but I didn't notice any other text about the new

> flag.

> >>>>

> >>>> On 03/23/2018 06:34 AM, Les Ginsberg (ginsberg) wrote:

> >>>>> David -

> >>>>>

> >>>>> Apologies. It appears that I neglected to respond to this old

> >>>>> review comment.

> >>>>>

> >>>>> This was not intentional. Authors actively discussed your comment

> >>>>> promptly and we did add text in V14 of the draft to address this point:

> >>>>>

> >>>>> Please see:

> >>>>> https://tools.ietf.org/html/draft-ietf-spring-segment-routing-15#s

> >>>>> ec

> >>>>> ti

> >>>>> on-3.4

> >>>>>

> >>>>> /o  Indication whether the Adj-SID is persistent across control

> >>>>> plane/

> >>>>>

> >>>>> /      restarts.  Persistence is a key attribute in ensuring that

> >>>>> an SR/

> >>>>>

> >>>>> /      Policy does not temporarily result in misforwarding due to/

> >>>>>

> >>>>> /      reassignment of an Adj-SID./

> >>>>>

> >>>>> //

> >>>>>

> >>>>> Please let us know if this adequately addresses your comment.

> >>>>>

> >>>>> Again, apologies for the long delay.

> >>>>>

> >>>>>       Les

> >>>>>

> >>>>>    > -----Original Message-----

> >>>>>

> >>>>>    > From: David Mandelberg <david@mandelberg.org<mailto:david@mandelberg.org>>

> >>>>>

> >>>>>    > Sent: Thursday, November 02, 2017 10:53 AM

> >>>>>

> >>>>>    > To: iesg@ietf.org<mailto:iesg@ietf.org>; secdir@ietf.org<mailto:secdir@ietf.org>;

> >>>>> draft-ietf-spring-segment-

> >>>>>

> >>>>>    > routing.all@ietf.org<mailto:routing.all@ietf.org>

> >>>>>

> >>>>>    > Subject: secdir review of

> >>>>> draft-ietf-spring-segment-routing-13

> >>>>>

> >>>>>    >

> >>>>>

> >>>>>    > I have reviewed this document as part of the security

> >>>>> directorate's ongoing

> >>>>>

> >>>>>    > effort to review all IETF documents being processed by the IESG.

> >>>>> These

> >>>>>

> >>>>>    > comments were written primarily for the benefit of the

> >>>>> security area directors.

> >>>>>

> >>>>>    > Document editors and WG chairs should treat these comments

> >>>>> just like any

> >>>>>

> >>>>>    > other last call comments.

> >>>>>

> >>>>>    >

> >>>>>

> >>>>>    > The summary of the review is Ready with nits.

> >>>>>

> >>>>>    >

> >>>>>

> >>>>>    > This document affects routing within a trusted domain, and

> >>>>> the security

> >>>>>

> >>>>>    > considerations section adequately talks about filtering at

> >>>>> the border of a trusted

> >>>>>

> >>>>>    > domain.

> >>>>>

> >>>>>    >

> >>>>>

> >>>>>    > I do have one question about something I didn't see in the

> >>>>> document, what

> >>>>>

> >>>>>    > happens when SIDs change while packets are in transit? Here's

> >>>>> a hypothetical

> >>>>>

> >>>>>    > situation that could be bad for security, but I'm not sure

> >>>>> whether or not it could

> >>>>>

> >>>>>    > happen: 1. An internal node calculates an SR Policy and sends

> >>>>> out a packet that

> >>>>>

> >>>>>    > will eventually egress towards a BGP peer. 2. Multiple links

> >>>>> on the BGP router go

> >>>>>

> >>>>>    > down and then back up, but are allocated different PeerAdj

> >>>>> SIDs than they had

> >>>>>

> >>>>>    > before. 3. The packet reaches the BGP router, but egresses to

> >>>>> the wrong BGP

> >>>>>

> >>>>>    > peer because the original PeerAdj SID is now mapped to a

> >>>>> different PeerAdj

> >>>>>

> >>>>>    > segment.

> >>>>>

> >>>>>    >

> >>>>>

> >>>>>    > --

> >>>>>

> >>>>>    > Freelance cyber security consultant, software developer, and

> >>>>> more

> >>>>>

> >>>>>    > https://david.mandelberg.org/

> >>>>>

> >>>>

> >>>>

> >>>> --

> >>>> Freelance cyber security consultant, software developer, and more

> >>>> https://david.mandelberg.org/

> >>

> >>

> >> --

> >> Freelance cyber security consultant, software developer, and more

> >> https://david.mandelberg.org/

>

>

> --

> Freelance cyber security consultant, software developer, and more

> https://david.mandelberg.org/

--- Begin Message ---
Alissa:

Hi!

Any thoughts on the update to this document?

Thanks!

Alvaro.


On December 20, 2017 at 6:18:13 PM, Les Ginsberg (ginsberg) (ginsberg@cisco.com<mailto:ginsberg@cisco.com>) wrote:

Alissa -

Thanx for the review.
V14 has been published and it attempts to address the Security concerns raised by you and others.
Look forward to your feedback.

Inline.

> -----Original Message-----
> From: Alissa Cooper [mailto:alissa@cooperw.in<mailto:alissa@cooperw.in>]
> Sent: Wednesday, December 13, 2017 10:42 AM
> To: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
> Cc: draft-ietf-spring-segment-routing@ietf.org<mailto:draft-ietf-spring-segment-routing@ietf.org>; aretana.ietf@gmail.com<mailto:aretana.ietf@gmail.com>;
> spring-chairs@ietf.org<mailto:spring-chairs@ietf.org>; martin.vigoureux@nokia.com<mailto:martin.vigoureux@nokia.com>; spring@ietf.org<mailto:spring@ietf.org>
> Subject: Alissa Cooper's Discuss on draft-ietf-spring-segment-routing-13:
> (with DISCUSS and COMMENT)
>
> Alissa Cooper has entered the following ballot position for
> draft-ietf-spring-segment-routing-13: Discuss
>
> When responding, please keep the subject line intact and reply to all email
> addresses included in the To and CC lines. (Feel free to cut this introductory
> paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> I ended up reading draft-ietf-6man-segment-routing-header in tandem with
> this document, and I have a question arising out of that. The trust model for
> SRv6 outlined in this document appears to be one of reliance on the fact that
> an SRH will only ever be inserted and appear within a single administrative
> domain.
> But Section 5.2.2 of draft-ietf-6man-segment-routing-header talks about an
> SRH being inserted by a device outside of the segment routing domain.
> Which is correct? I think this is an important question because the whole
> trust model for the SR information seems to rely on out-of-band trust
> between participating nodes.
>
> I also think this is important because there is no discussion in this document
> of the impact of the inclusion of the SR metadata on the fingerprinting of the
> device that inserted it. Section 5.1.4 of draft-ietf-6man-segment-routing-
> header sort of alludes to this but seems to equate the capabilities of an
> active attacker (who can conduct a traceroute) with a passive attacker who
> could passively collect topology/fingerprinting information simply by
> observing SRHes flowing by on the network. If the limitation to a single
> administrative domain is meant to prevent such a passive attack (not sure if
> that is really true, but perhaps the document assumes it?), that's another
> reason that the existence of such a limitation needs to be clarified.
>
>
[Les:] We share a common concern regarding trust issues. The architecture draft speaks to the default policy of only allowing trusted sources to insert SRH.
The 6man draft currently discusses exceptions under the protection of authentication. I don’t see that as a contradiction.
The risk/reward of allowing such exceptions can (and should) be discussed in the review of the 6man draft, but I am not convinced the architecture draft needs to speak to this since it is a clearly stated exception to the base trust model.

The point that SR is intended to operate within a trusted domain has been clarified/reemphasized in the Security section changes.

Les



> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
>
> Per my DISCUSS comment, I think this document needs to include some
> considerations concerning the additional metadata that SRv6 adds to the
> packet.
> This has implications not just for passive observers but also for any node that
> logs the SRH.
>

--- End Message ---