Re: [secdir] Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05

Yaron Sheffer <yaronf.ietf@gmail.com> Tue, 10 August 2021 11:25 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B1713A1066; Tue, 10 Aug 2021 04:25:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rXVdNEKZZzls; Tue, 10 Aug 2021 04:25:44 -0700 (PDT)
Received: from mail-wm1-x329.google.com (mail-wm1-x329.google.com [IPv6:2a00:1450:4864:20::329]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9CA7B3A1064; Tue, 10 Aug 2021 04:25:44 -0700 (PDT)
Received: by mail-wm1-x329.google.com with SMTP id u15so12785642wmj.1; Tue, 10 Aug 2021 04:25:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=user-agent:date:subject:from:to:cc:message-id:thread-topic :references:in-reply-to:mime-version:content-transfer-encoding; bh=Ze7QcJN+EZdCIFlZrdLKX/72PySuLgGUt14iphjvAW0=; b=O38WB4v5oR/eXhafhFLwpaIkXHBbd12hIbubLgvt87hggNzjUMnDqKFLm/OkQzueii /Pj9KLGvk8gGNJMnP0N5kQLLwaxLnpIqkY1YX6GVWOcWFEUyXGztZMFFOyNHpiZCSnf5 buVZwOf3+oMUjBVtBRQGGwqau/uM7z3PXxm96syBupVJwfH3e0E0RPwmsec7tl2JJs80 BcjSejka/H51Sgz40afwKsYt1ZdJht1ykcqMA9SNSAFYvciu0ngJh1zu4O3mV0GIyO+3 h5aB0P755ZfFP664fbReLo4XeQLPdyNBh0Y/HKldHP9rDzdfVlQFImqdibLj0tLt2me6 6OAg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:user-agent:date:subject:from:to:cc:message-id :thread-topic:references:in-reply-to:mime-version :content-transfer-encoding; bh=Ze7QcJN+EZdCIFlZrdLKX/72PySuLgGUt14iphjvAW0=; b=cL0HVs93V+/3/pxzlHPIG4B6G+OqlF7MdUwNT3/QB4/cy9zgBVKAw9Q4CH1bMEYe3k drMWxB8wasbPNIALgcg90HVFO2ej0zjJJEr/CnXTzGukvOCU8s79/metc/nKdWPg3CSX II5qMZ9K8loysAfj1idWrcCJopYMyB160EJsDuYByp2qctBk6WznsJ/i/JUx/gA1V3tU 7zRO7F20wXfFlWiHsO8UGzMsB9UlJXD1499e1pdUmXPK005x055ivuRna9HPHFnodgeS CEPWnIKYT+PmSWGqsP+ojfU9biFHMgLrKlc1mwPZp4Flp73ZQ6eEHqT6oSy5GopmXnRl qLRQ==
X-Gm-Message-State: AOAM531QjOSwdIexUsM/eZ4fUwGsJjRT/tluqgQzuHaprE3cUHk5wXo6 om/UlfMIYj318ULBLlRDhRk=
X-Google-Smtp-Source: ABdhPJyidEwtqX9+dAisrKcgtlVkpK7g/Z23p5m0y64XWSls0CPCsu84gw9Og8ZGSabZ7xMTQ/101A==
X-Received: by 2002:a05:600c:3b8f:: with SMTP id n15mr4121825wms.155.1628594741923; Tue, 10 Aug 2021 04:25:41 -0700 (PDT)
Received: from [192.168.68.110] (bzq-79-181-28-50.red.bezeqint.net. [79.181.28.50]) by smtp.gmail.com with ESMTPSA id t15sm22038836wrw.48.2021.08.10.04.25.40 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 10 Aug 2021 04:25:41 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/16.51.21071101
Date: Tue, 10 Aug 2021 14:25:39 +0300
From: Yaron Sheffer <yaronf.ietf@gmail.com>
To: Qin Wu <bill.wu@huawei.com>, "secdir@ietf.org" <secdir@ietf.org>
CC: "draft-ietf-lsr-pce-discovery-security-support.all@ietf.org" <draft-ietf-lsr-pce-discovery-security-support.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>
Message-ID: <3402B241-F3FF-414D-9D4E-AFAC3790BC74@gmail.com>
Thread-Topic: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
References: <3a667c95733942579ca3b2c051c178c4@huawei.com>
In-Reply-To: <3a667c95733942579ca3b2c051c178c4@huawei.com>
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/at4IyLL1VgjumV4PwX1bLewq57c>
Subject: Re: [secdir] Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Aug 2021 11:25:52 -0000

Hi Qin,

Sorry, but I find your latest proposed text very confusing, because we should be focusing on integrity protection and not privacy (=secrecy) of the TLV. So I would prefer to keep the text as-is, with the addition of a reference to the IS-IS and OSPF security mechanisms that were discussed on this thread.

Thanks,
	Yaron

On 8/10/21, 05:00, "Qin Wu" <bill.wu@huawei.com> wrote:

    Hi, Yaron
    -----邮件原件-----
    >发件人: Yaron Sheffer [mailto:yaronf.ietf@gmail.com] 
    >发送时间: 2021年8月9日 21:44
    >收件人: Qin Wu <bill.wu@huawei.com>; secdir@ietf.org
    >抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org; last-call@ietf.org; lsr@ietf.org
    >主题: Re: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05

    >Hi Qin,

    >Thank you for your response.

    >* RFC 3567 (for IS-IS) is obsoleted by RFC 5304. Unfortunately RFC 5304 still uses HMAC-MD5, which would be considered insecure nowadays.
    >* RFC 2154 is very old and Experimental (and only supports RSA-MD5 signatures). I'm not an OSPF expert by any means, but I'm willing to bet that there are no production implementations of this RFC. (I'm willing to be proven wrong). 
    >Is there another RFC that define a protection mechanism for OSPF?

    >All in all, there appear to be no good options for the IGP.

    [Qin Wu]Yes, we do have alternatives, see Les's response in the separate email
    "
    On 8/9/21, 23:36,"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> wrote:
    For IS-IS security please also see RFC 5310.
    For OSPF security please see RFC 5709.
    "
    >To your last point, when I mentioned decoupling the mechanisms, I was suggesting to use the extension you define even if the IGP *cannot* be secured. If you think this is reasonable, please add such text to the Security Considerations.

    [Qin Wu] Okay, how about the following change
    OLD TEXT:
    "
    As stated in [RFC5088]
    and [RFC5089], the IGP do not provide encryption mechanism to protect
    the privacy of the PCED TLV, if this information can make the PCEP
    session less secure then the operator should take that into consideration .
    "
    NEW TEXT:
    "
    As stated in [RFC5088]
    and [RFC5089], the IGP do not provide encryption mechanism to protect
    the privacy of the PCED TLV, if this information can make the PCEP
    session less secure then the operator should take that into consideration 
    when getting the mechanism described in this document deployed.
    "
     >Thanks,
     >	Yaron

    >On 8/9/21, 16:09, "Qin Wu" <bill.wu@huawei.com> wrote:

      >   Thanks Yaron for valuable comments, please see my reply inline below.
        -----邮件原件-----
        >发件人: Yaron Sheffer via Datatracker [mailto:noreply@ietf.org] 
        >发送时间: 2021年8月6日 3:25
        >收件人: secdir@ietf.org
        >抄送: draft-ietf-lsr-pce-discovery-security-support.all@ietf.org; last-call@ietf.org; lsr@ietf.org
        >主题: Secdir last call review of draft-ietf-lsr-pce-discovery-security-support-05

        >Reviewer: Yaron Sheffer
        >Review result: Not Ready

        >This document defines a mechanism (a TLV) to advertise the PCE Protocol security required (use of TCP-AO and its key ID, or alternatively use of TLS) within the routing protocol being used.

        >* Sec. 3.1: I don't understand why "SHOULD advertise" and not MUST. Especially given the strict client behavior defined later.
        [Qin]: I believe "SHOULD advertise" is consistent with client behavior defined later, i.e., we apply SHOULD NOT language to the client behavior.
        I am not sure we should change it into strong language with MUST. Since if IGP advertisement doesn't include TCP-AO
         support flag bit or TLS support flag bit, NMS may fall back to configure both PCC and PCE server to support TCP-AO or TLS. That's one of reason I think why we choose to use SHOULD language.

        >* Sec. 3.1: should we also say something about the case where both methods are advertised, and whether we recommend for the client to use one of them over the other?

        [Qin]: It is up to local policy, which has bee clarified in the end of section 3.1. Hope this clarify.

        >* Sec. 4: typo (appears twice) - "to be carried in the PCED TLV of the for use".

        [Qin]:Thanks, have fixed them in the local copy.

        >* Sec. 7: this phrase appears to be essential to security of this mechanism: "it MUST be insured that the IGP is protected for authentication and integrity of the PCED TLV". I would expect more guidance: how can this property be ensured in the relevant IGPs?
        [Qin]:I think mechanism defined in [RFC3567] and [RFC2154] can be used to ensure authenticity and integrity of OSPF LSAs or ISIS LSPs and their TLVs. Here is the proposed changes:
        OLD TEXT:
        "
           Thus before advertisement of
           the PCE security parameters, it MUST be insured that the IGP is
           protected for authentication and integrity of the PCED TLV if the
           mechanism described in this document is used.
        "
        NEW TEXT:
        "
           Thus before advertisement of
           the PCE security parameters, it MUST be insured that the IGP is
           protected for authentication and integrity of the PCED TLV with mechanisms defined in [RFC3567][RFC2154] if the
           mechanism described in this document is used.
        "
        >* Also, a possibly unintended consequence of this requirement is that if the IGP cannot be protected in a particular deployment/product, this mechanism would not be used. Please consider if this is likely to happen and whether we want to forego PCEP transport >security in such cases. My gut feel (not based on experience in such networks) is that the threat models are different enough that we should decouple the security of IGP from that of PCEP.

        [Qin] I agree IGP security should be separated from PCEP security. IGP extension defined in this document is used by the PCC to select PCE server with appropriate security mechanism. On the other hand, Operator can either use IGP advertisement for PCEP security capability or rely on local policy to select PCE. If operator feels IGP advertisement is not secure, he can fall back to local policy or rely on manual configuration. Hope this clarifies.