Re: [secdir] comments on draft-ietf-rtgwg-ipfrr-framework-12

mike shand <mshand@cisco.com> Tue, 20 October 2009 11:25 UTC

Return-Path: <mshand@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F23E3A6900 for <secdir@core3.amsl.com>; Tue, 20 Oct 2009 04:25:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nolcQa4H5-Dx for <secdir@core3.amsl.com>; Tue, 20 Oct 2009 04:25:41 -0700 (PDT)
Received: from ams-iport-1.cisco.com (ams-iport-1.cisco.com [144.254.224.140]) by core3.amsl.com (Postfix) with ESMTP id 199C33A67AC for <secdir@ietf.org>; Tue, 20 Oct 2009 04:25:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=mshand@cisco.com; l=10849; q=dns/txt; s=amsiport01001; t=1256037949; x=1257247549; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20mike=20shand=20<mshand@cisco.com>|Subject:=20Re: =20comments=20on=20draft-ietf-rtgwg-ipfrr-framework-12 |Date:=20Tue,=2020=20Oct=202009=2012:25:49=20+0100 |Message-ID:=20<4ADD9E3D.1030709@cisco.com>|To:=20Sandra =20Murphy=20<sandy@sparta.com>|CC:=20secdir@ietf.org,=20s tbryant@cisco.com,=20Ross=20Callon=20<rcallon@juniper.net >,=0D=0A=20=20=20=20=20=20=20=20"John=20G.=20Scudder"=20< jgs@juniper.net>,=20Alia=20Atlas=20<akatlas@gmail.com>, =0D=0A=20=20=20=20=20=20=20=20ZININ=20Alex=20<Alex.Zinin@ alcatel-lucent.com>|MIME-Version:=201.0 |Content-Transfer-Encoding:=207bit|In-Reply-To:=20<Pine.W NT.4.64.0910070735580.3532@SANDYM-LT.columbia.ads.sparta. com>|References:=20<Pine.WNT.4.64.0910070735580.3532@SAND YM-LT.columbia.ads.sparta.com>; bh=XhnYvA8CV642ONiY4A0vtr7myOMxnKTN31mXGvZLBq8=; b=PI4wNuJtZxfaI8hoGFXLt0Hkqr6zFiUxoRvrpgXMaloi2jMCGFKUnhlw sjrzO0x/Fu1+SVDIM34AUjL2xMDRzh4bWgFsNBMwmuHd9UO3d7cIrSqgv cW+YU3DcYK5Sn1ufh5N52pPzMtBGODLQHZCN0DHBAeDRoYgrgp2ZEMn7g A=;
Authentication-Results: ams-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-AV: E=Sophos;i="4.44,590,1249257600"; d="scan'208";a="52237547"
Received: from ams-core-1.cisco.com ([144.254.224.150]) by ams-iport-1.cisco.com with ESMTP; 20 Oct 2009 11:25:47 +0000
Received: from [64.103.65.18] (dhcp-gpk02-vlan300-64-103-65-18.cisco.com [64.103.65.18]) by ams-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id n9KBPlLR001393; Tue, 20 Oct 2009 11:25:47 GMT
Message-ID: <4ADD9E3D.1030709@cisco.com>
Date: Tue, 20 Oct 2009 12:25:49 +0100
From: mike shand <mshand@cisco.com>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Sandra Murphy <sandy@sparta.com>
References: <Pine.WNT.4.64.0910070735580.3532@SANDYM-LT.columbia.ads.sparta.com>
In-Reply-To: <Pine.WNT.4.64.0910070735580.3532@SANDYM-LT.columbia.ads.sparta.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Mailman-Approved-At: Tue, 20 Oct 2009 04:26:30 -0700
Cc: ZININ Alex <Alex.Zinin@alcatel-lucent.com>, secdir@ietf.org, Alia Atlas <akatlas@gmail.com>, Ross Callon <rcallon@juniper.net>, "John G. Scudder" <jgs@juniper.net>, stbryant@cisco.com
Subject: Re: [secdir] comments on draft-ietf-rtgwg-ipfrr-framework-12
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Oct 2009 11:25:43 -0000

Thank you for your comments. We propose to address them as follows. 
Please see inline.

Sandra Murphy wrote:
> I am reviewing this document draft-ietf-rtgwg-ipfrr-framework-12 as 
> part of the security directorate's ongoing effort to review all IETF 
> documents being processed by the IESG.  These comments were written 
> primarily for the benefit of the security area directors.  Document 
> editors and WG chairs should treat
> these comments just like any other last call comments (that you
> received well after last call). Feel free to forward to any 
> appropriate forum.
>
> This draft describes a framework for mechanisms to  compute backup 
> "repair" paths that allow traffic to continue to forward to the 
> destination around failed links or nodes.  This is similar to a
> mechanism in MPLS to provide backup LSPs by using RSVP-TE.
>
> For background, I also looked at
> RFC4090 Fast Reroute Extensions to RSVP-TE for LSP Tunnels
> RFC 5296 Basic Specification for IP Fast Reroute: Loop-Free Alternates
> draft-ietf-rtgwg-lf-conv-frmwk-06 A Framework for Loop-free Convergence
> draft-bryant-ipfrr-tunnels-03 IP Fast Reroute using tunnels
> draft-ietf-rtgwg-ipfrr-notvia-addresses-03 IP Fast Reroute Using
>                 Not-via Addresses
>
> The security considerations covers some concerns introduced by using 
> fast-reroute mechanisms where providing repair paths may introduce
> vulnerabilities, particularly where the repair paths could interfere
> with existing robustness mechanisms (reverse path forwarding and
> TTL limits).

Our assumption is that there are no document actions above this point.
>
> I wonder if the knowledge of computed repair paths could
> be useful to an attacker in doing traffic-shaping, i.e., an attacker who
> was doing link-cutting to affect traffic flow.  Similarly, the ability
> to influence the computation of the repair path could be valuable.
> Perhaps the framework document could mention that the proposed solutions
> should consider the need to protect the computation from exposure (to the
> same extent infrastructure information is protected from exposure) and
> corruption/contamination if such an attack were a concern.
These considerations are equally applicable to routing protocols in 
general and it does not seem appropriate to conduct a detailed analysis 
in this document.

>
> Note:
> RFC5286 dismisses this concern, without noting the benefit of an
> attacker to be able to producing a desired forwarding change if a
> failure (and therefore repair activity) could be induced:
>
>    Traffic to certain
>    destinations can be temporarily routed via next-hop routers that
>    would not be used with the same topology change if this mechanism
>    wasn't employed.  However, these next-hop routers can be used anyway
>    when a different topological change occurs, and hence this can't be
>    viewed as a new security threat.
>
> The notvia-addresses draft does seem to recognize this risk from repair
> paths:
>
>    The repair endpoints present vulnerability in that they might be used
>    as a method of disguising the delivery of a packet to a point in the
>    network.
>
> The loop-free convergence framework draft in the last-called version
> said:
>
>    All micro-loop control mechanisms raise significant security issues
>    which must be addressed in their detailed technical description.
>
> which I thought should be reflected in this framework,
> but that has changed in the post-last-call version to:
>
>    This document analyzes the problem of micro-loops and summarizes a
>    number of potential solutions that have been proposed.  These
>    solutions require only minor modifications to existing routing
>    protocols and therefore do not add additional security risks.
>    However a full security analysis would need to be provided within the
>    specification of a particular solution proposed for deployment.
>
> I'm curious as to how "significant security issues" changed to
> "do not add additional security risks", but I don't have the time
> to track down the last call comments that created that change.
The original statement was just a place-holder held over from the first 
draft of the document.
>
> (I'd say that adding any additional information to a routing protocol
> may not change the underlying vulnerabilities of the routing protocol
> but certainly provides new means to cause damage when exploiting the
> known vulenrabilities.)
>
> Non-security related comments:
>
> The following comment would have been useful to see before section 6:
>
> 6.  Scope and applicability
>
>    The initial scope of this work is in the context of link state IGPs.
>    Link state protocols provide ubiquitous topology information, which
>    facilitates the computation of repairs paths.
We have moved this after the introduction.
>
> The following comment would have been useful to see before section
> 4.2.5:
>
>    Complete protection against multiple unrelated failures is out of
>    scope of this work.
>
We have copied this to the scope and applicability section.

> Some terms in this document are never defined and/or used ambiguously.
>
> The following terms are not in the terminology list:
> repair path
We have added a definition:-
"The path used by a repairing node to send traffic that it is unable to 
send via the normal path owing to a failure."
>
> Shared Risk Link Groups (SRLG) - perhaps so common in the teleco world
>     and in optical networks that definition was judged unnecessary.
We think this is well known
>
> "link(node) protecting" "being protected" "fully protected 
> (link/node)" "unprotectable" - it would seem to refer to a link or node
>   failure for which a repair path is being computed, but may also mean
>   mechanisms to avoid micro-loops.
In the context of this document they all refer to path protection. This 
doesn't seem to need any further clarification.
>
> a path being "affected" by a reconvergence - which I think means that
>   reconvergence to a new forwarding tree does not change any link
>   in the repair path
Yes.  A path not being affected means that there is no change to the 
path as a result of re-convergence of routers along the path.
>
> a repair path being "valid for a node" or "valid for destinations"
Valid means that it is a functioning repair path. A repair path may be 
valid for a link failure, but not for a node failure.
>
> Some text I found confusing:
>
> Page 7:
>
>    2.  In topologies that are susceptible to micro-loops, a mechanism to
>        prevent the effects of any micro-loops during subsequent re-
>        convergence.
>
> Because the loop free convergence draft distinguishes micro-loop 
> prevention
> from micro-loop suppression, which attempts to avoid the impact on other
> traffic from micro-loops, I thought "the effects of any micro-loops"
> referred to this collateral damage.  But later in that page it talks
> about micro-loop avoidance, which sounds like the loop free convergence
> draft's term "micro-loop prevention".  So I'm not sure what is meant 
> here.
We have revised this read:-

"In topologies that are susceptible to micro-loops, a micro-loop control 
mechanism may be required" and inserted a reference to the loop free 
convergence framework.
>
> Page 10:
>
>   1.  The percentage of links (or nodes) which can be fully protected
>        for all destinations.  This is appropriate where the requirement
>        is to protect all traffic, but some percentage of the possible
>        failures may be identified as being un-protectable.
>
>
> What does it mean to be "fully protected for all destinations"?  Is that
> redundant?  And what about "unprotectable"?  Is it possible to have
>   fully protected for all destinations
>   fully protected for some destinations
>   partially protected for all destinations
>   partially protected for some destinations
>   unprotectable for all destination
>   unprotectable for some destinations
> etc.?
Yes. We have revised the text to read :-

1. The percentage of links (or nodes) which can be fully protected (i.e. 
for all destinations). This is appropriate where the requirement is to 
protect all traffic, but some percentage of the possible failures may be 
identified as being un-protectable.

2. The percentage of destinations which can be protected for all link 
(or node) failures. This is appropriate where the requirement is to 
protect against all possible failures, but some percentage of 
destinations may be identified as being un-protectable.


>
> The outline in section 4 has me a bit confused:
>    4.  Mechanisms for IP Fast-reroute . . . . . . . . . . . . . . . .  7
>      4.1.  Mechanisms for fast failure detection  . . . . . . . . . .  7
>      4.2.  Mechanisms for repair paths  . . . . . . . . . . . . . . .  8
>        4.2.1.  Scope of repair paths  . . . . . . . . . . . . . . . .  9
>        4.2.2.  Analysis of repair coverage  . . . . . . . . . . . . .  9
>        4.2.3.  Link or node repair  . . . . . . . . . . . . . . . . . 10
>        4.2.4.  Maintenance of Repair paths  . . . . . . . . . . . . . 11
>        4.2.5.  Multiple failures and Shared Risk Link Groups  . . . . 11
>      4.3.  Local Area Networks  . . . . . . . . . . . . . . . . . . . 12
>      4.4.  Mechanisms for micro-loop prevention . . . . . . . . . . . 12
>
> Section 4.2.5 covers SRLG's as an example of multiple related failures,
> which it says are out of scope.  Then section 4.3 covers LANs - which
> would seem to me to satisfy the definition of a SRLG.  Is 4.3 supposed
> to be a subtopic under 4.2.5?  It seems out of keeping with the
> mechanism focus of sections 4.1, 4.2 and 4.4.
>
> Also, 4.3 says:
>
>    Protection against partial or complete failure of LANs is more
>    complex than the point to point case.  In general there is a trade-
>    off between the simplicity of the repair and the ability to provide
>    complete and optimal repair coverage.
>
> (That's a complete quote of that section, which is another reason for
> asking if it is really supposed to be a separate section)
>
> Does this imply that all previous discussion was about point to point
> links only?

We have moved section 4.3 to become 4.2.5 leaving the SRLG section as 4.2.6
>
>
>
> RFC 5286 has an extended discussion of computing backup paths for
> broadcast and NBMA links, so I was surprised to see this draft seem
> to indicate that LANs were out of scope.

They are not out of scope, but they do require special consdieration in 
the context of each repair mechanism.



    Mike & Stewart
>
>
>
>
>
> --Sandy Murphy
>