Re: [secdir] Secdir review of draft-ietf-nvo3-arch-06

"Takeshi Takahashi" <> Sat, 13 August 2016 00:10 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 92BF212D92C; Fri, 12 Aug 2016 17:10:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -5.447
X-Spam-Status: No, score=-5.447 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.247, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id LixavmMx0A2D; Fri, 12 Aug 2016 17:10:22 -0700 (PDT)
Received: from ( [IPv6:2001:df0:232:300::1]) by (Postfix) with ESMTP id D886612D8B1; Fri, 12 Aug 2016 17:10:21 -0700 (PDT)
Received: from ( []) by with ESMTP id u7D0AHAv014103; Sat, 13 Aug 2016 09:10:17 +0900 (JST)
Received: from DESKTOP2JPR8KD ( []) by with ESMTP id u7D0AHTC013909; Sat, 13 Aug 2016 09:10:17 +0900 (JST)
From: Takeshi Takahashi <>
To: "'Black, David'" <>,
References: <225101d1f4ab$be76d9a0$3b648ce0$> <>
In-Reply-To: <>
Date: Sat, 13 Aug 2016 09:10:17 +0900
Message-ID: <14afb01d1f4f7$1275e230$3761a690$>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_14AFC_01D1F542.825D8A30"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQJVc9ShE0j+FVnLpFrAsWqfActl/gEaTFovnzYytfA=
Content-Language: ja
X-Virus-Scanned: clamav-milter 0.98.7 at zenith1
X-Virus-Status: Clean
Archived-At: <>
Subject: Re: [secdir] Secdir review of draft-ietf-nvo3-arch-06
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Sat, 13 Aug 2016 00:10:24 -0000

Hello David-san,


Thank you for reflecting my comments. I like the revised sentences.

I hope this draft will be published as an RFC soon.


Best regards,



From: Black, David [] 
Sent: Saturday, August 13, 2016 12:51 AM
To: Takeshi Takahashi <>;
Cc:;;; Black, David
Subject: RE: Secdir review of draft-ietf-nvo3-arch-06




Thank you for the review.   I've made changes to address all of your
comments in my working copy of this draft that will be posted as the -07
version next week.


The minor comment on information leakage affects both the data plane and
control plane and hence I've made changes to address it in two paragraphs in
the Security Considerations section.  Here are the revised versions of both


For the data plane, tunneled application traffic may need protection against
being misdelivered, modified, or having its content exposed to an
inappropriate third party. In all cases, encryption between authenticated
tunnel endpoints and enforcing policies that control which endpoints and VNs
are permitted to exchange traffic can be used to mitigate risks.




Leakage of sensitive information about users or other entities associated
with VMs whose traffic is virtualized can also be covered by using
encryption for the control plane protocols and enforcing policies that
control which NVO3 components are permitted to exchange control plane


Thanks, --David


From: Takeshi Takahashi [] 
Sent: Friday, August 12, 2016 11:11 AM
Cc: <> ;
<> ; <> 
Subject: Secdir review of draft-ietf-nvo3-arch-06


I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.

These comments were written primarily for the benefit of the security area

Document editors and WG chairs should treat these comments just like any
other last call comments.


[General summary]

This document is ready.


[Topic of this draft]

This informational document describes a high-level overview architecture for
building data center network viatualization overlay (NVO3) networks.

It breaks down the architecture and defines several components needed for
realizing the architecture, such as Network Virtualization Edge (NVE) and
Network Virtualization Authority (NVA).


[Minor Comment]

In Section 16 "Security Considerations", you could consider addressing the
policy enforcement issue you've discussed in Section 5.4.

The sentence starting with "Leakage of sensitive information" could be, for
instance, changed from " using encryption" to " using encryption
and ensuring policy enforcement".


[Editorial Comment]

In Page 9, there is a sentence "NVAs provide a service, and NVEs access that
service via an NVE-to-NVA protocol as discussed in Section 4.3."

This current sentence is fine, but referring Section 8 "NVE-to-NVA Protocol"
(instead of Section 4.3 "NVE State") could be better.


In Section 2, definition of "VLAN": "are used in this document denote a
C-VLAN", could be "are used in this document to denote a C-VLAN".


I enjoyed reading the draft.


Thank you.