Re: [secdir] Review of draft-ietf-sfc-architecture-08

Benjamin Kaduk <kaduk@MIT.EDU> Wed, 27 May 2015 18:16 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DE811A89F9; Wed, 27 May 2015 11:16:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p8nYGYAzcBcT; Wed, 27 May 2015 11:16:17 -0700 (PDT)
Received: from dmz-mailsec-scanner-4.mit.edu (dmz-mailsec-scanner-4.mit.edu [18.9.25.15]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 403431A89FC; Wed, 27 May 2015 11:16:09 -0700 (PDT)
X-AuditID: 1209190f-f79d16d000000d3d-6d-556609e72423
Received: from mailhub-auth-2.mit.edu ( [18.7.62.36]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-4.mit.edu (Symantec Messaging Gateway) with SMTP id BC.1F.03389.7E906655; Wed, 27 May 2015 14:16:08 -0400 (EDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-2.mit.edu (8.13.8/8.9.2) with ESMTP id t4RIG6v5000719; Wed, 27 May 2015 14:16:07 -0400
Received: from multics.mit.edu (system-low-sipb.mit.edu [18.187.2.37]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id t4RIG4Uq032042 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Wed, 27 May 2015 14:16:05 -0400
Received: (from kaduk@localhost) by multics.mit.edu (8.12.9.20060308) id t4RIG39i015702; Wed, 27 May 2015 14:16:03 -0400 (EDT)
Date: Wed, 27 May 2015 14:16:03 -0400
From: Benjamin Kaduk <kaduk@MIT.EDU>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
In-Reply-To: <53F5D306-5860-4415-8AA4-390882ED94AB@cisco.com>
Message-ID: <alpine.GSO.1.10.1505271355150.22210@multics.mit.edu>
References: <20150524211041.52cde768@latte.josefsson.org> <02FCDA94-FCC3-4875-AFBE-D07CC792B0C9@cisco.com> <alpine.GSO.1.10.1505252257290.22210@multics.mit.edu> <2DB7995B-8AF1-4EEE-971E-40A1A6294461@cisco.com> <alpine.GSO.1.10.1505261917240.22210@multics.mit.edu> <53F5D306-5860-4415-8AA4-390882ED94AB@cisco.com>
User-Agent: Alpine 1.10 (GSO 962 2008-03-14)
MIME-Version: 1.0
Content-Type: MULTIPART/MIXED; boundary="-559023410-1818982703-1432749639=:22210"
Content-ID: <alpine.GSO.1.10.1505271415440.22210@multics.mit.edu>
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrIKsWRmVeSWpSXmKPExsUixG6novuCMy3U4GuJxad3O1gsbny6zWwx 489EZosPCx+yWNzbcondgdVjyu+NrB5Llvxk8ph55iK7x5fLn9kCWKK4bFJSczLLUov07RK4 Mo7dOchWcNWoYvLC6ywNjL81uhg5OSQETCTOzfvOAmGLSVy4t54NxBYSWMwkceacdxcjF5C9 kVHi/JJDrBDOISaJfauXskM4DYwSa++vZgJpYRHQlri64iI7iM0moCIx881GsFEiAmYSjY8n MYE0MAs8YZQ43XeEsYuRg0NYwE7i+wQVEJNTwFai/1kmSDmvgKNE28wHTBDzdzFJLNrzCew8 UQEdidX7p7BAFAlKnJz5BMxmFgiUePjoKhuE7Shx699tpgmMQrOQlM1CUjYLSRmErS5x4NNF RghbW+L+zTa4miWzV7AsYGRbxSibklulm5uYmVOcmqxbnJyYl5dapGuil5tZopeaUrqJERRT nJL8Oxi/HVQ6xCjAwajEw3tAOjVUiDWxrLgy9xCjJAeTkijvT4a0UCG+pPyUyozE4oz4otKc 1OJDjBIczEoivG4fgcp5UxIrq1KL8mFS0hwsSuK8m37whQgJpCeWpGanphakFsFkZTg4lCR4 13IADRUsSk1PrUjLzClBSDNxcIIM5wEafh6khre4IDG3ODMdIn+KUVFKnPcGSEIAJJFRmgfX C0t5rxjFgV4R5mUGJkAhHmC6hOt+BTSYCWiw2dEUkMEliQgpqQbGxJzTte7/ate0vjA+XPAl PeVerqRaomB6c3KDto/k3kDh8qnf5uqEFk03mzUnrGJy46S0/DXccSE8jw5PNXv+w4Rv4gWu a1vcvt6smfOQZdMD7jOCLW6pyj+nmH9ZkDf90P4vQmGn20+t5PX7sO5PX7rx7ZVTK2cxPqnO O1M1de0aryOb/M+zKrEUZyQaajEXFScCALppJd9UAwAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/secdir/TeKbScJbf6hzkxVIXw3OrijPN5g>
Cc: "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-sfc-architecture.all@tools.ietf.org" <draft-ietf-sfc-architecture.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Subject: Re: [secdir] Review of draft-ietf-sfc-architecture-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 May 2015 18:16:19 -0000

On Wed, 27 May 2015, Carlos Pignataro (cpignata) wrote:

>
> > On May 26, 2015, at 7:41 PM, Benjamin Kaduk <kaduk@MIT.EDU> wrote:
> >
> >
> > My take of the key point is that SFC is (potentially) going to be making
> > the actual physical flow of data very different from how it currently is,
> > and potentially also divorced from the conceptual topology of the service
> > function chain (if the service functions are laid out "strangely" compared
> > to the physical topology).  This has the potential to drastically change
> > the security issues an operator deploying things has to consider, and an
> > architecture document should point out that both protocol designers
> > implementing the architecture and operators using such protocols should be
> > aware of the new security environment.
>
> Fully agree — and I believe this is what the current Security
> Considerations section achieves.

I think we disagree on what the current Security Considerations section
achieves.

> In particular, Section 6 highlights the areas of the new architecture
> (Overlay, Classification, Encapsulation) of which designers and
> operators ought to be aware.
>
> >  Thus, we are proposing that it is
> > mandatory for protocol designers and operators to consider whether they
> > should be encrypting, but not mandatory for them to encrypt (if they are
> > satisfied with their topology).
>
> Further specifically, the "SFC Encapsulation” seems to cover this.

So, you believe that the SFC Encapsulation section is intended to cover
the potential need for confidentiality protection of the plaintext payload
which is being encapsulated by SFC?

I think that given the way the current text flows from "an operator may
consider the SFC Metadata as sensitive" straight into "from a privacy
perspective, a user may be concerned about the operator revealing data
about [...] the customer", it causes me to read that privacy concern as
applying only to the SFC Metadata (i.e., not to the original payload).
Likewise for the "risk of sensitive information slipping out of the
operators [sic] control"; since the paragraph started with the SFC
Metadata, it seems like this paragraph may apply only to the metadata.

> But as I said, I would not oppose strengthening this section even more.

But more generally, I think the rhetoric is better (stronger) if it is of
the form "you should do this thing (general concept); here are some
concrete examples", rather than "you should do this list of things"
without giving the overarching motivation.  This is a lot of why I am
pushing for added (summary) text.

> > I think that the SFC architecture does have the potential to change where
> > additional security and privacy considerations are needed.  There can
> > definitely be security and privacy considerations within a single
> > administrative domain, and I do not think the current document has
> > sufficient acknowledgement of the potential for the new architecture to
> > require drastically different security and privacy measures in some (not
> > all!) cases.  (Yes, I did read through it before composing this mail.)
>
> I do not disagree. Are there areas beyond what’s already in the Security
> considerations that require specific focus?

I think I only have the points I mentioned above (lack of clarity
regarding protecting the original payload, and clear rhetoric).  But let's
see if Simon has anything else to add, as well.

> > I see some text in each of the three areas listed which sort-of addresses
> > my concerns, ("Used transport mechanisms should satisfy the security
> > requirements of the specific SFC deployment", "These include [...]
> > potential confidentiality issues of that policy", "solutions should
> > consider whether there is a risk of sensitive information slipping out of
> > the operators control.  Issues of information exposure should also
> > consider flow analysis"), but they could easily be missed by the reader,
> > and do not convey a single central sense that adopting SFC will involve a
> > full reevaluation of network security policy.
>
> This is the key of the review, IMHO. On one hand, you seem to
> acknowledge that your security concerns are already addressed with the
> existing text. On the other hand, you seem to want to child-proof the
> text in case a reader misses what is already there already addressing
> the concern.

I'm sorry that my message was unclear; I was not intending to "acknowledge
that [my concerns] are already addressed", but rather to say that the
existing text gets some of the way there, but there were still things
missing.  (Hopefully this email is helping clarify already.)

> >  That reevaluation will
> > include security/privacy issues for the original payload as well as the
> > classification and encapsulation data added by the SFC protocol(s).
> >
> >
>
> Yes — which is what the doc already says.

Just to ensure we're getting through to each other, do you mind pointing
to the specific text that you have in mind that is supposed to already
say this?

> “Reevaluated” is significantly better, of course. Here’s another proposal:
>
> "The architecture described here is different from the current model, and
> moving to the new model could lead to different security arrangements and
> modeling. In the SFC architecture, a relatively static topologically-dependent
> deployment model is replaced with the chaining of sets of service functions.
> This can change the flow of data through the network, and the security and
> privacy considerations of the protocol and deployment will need to be
> reevaluated in light of the model.”

I might add in "new" or "chained" before the very last "model", but this
seems to catch the sentiment I was going for.  The idea would be to insert
this as a new paragraph after the first paragraph of section 6?

Thank you,

Ben