Re: [secdir] Review of draft-ietf-sfc-architecture-08

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 27 May 2015 16:50 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A694F1A871E; Wed, 27 May 2015 09:50:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PpY9G2UWXKl3; Wed, 27 May 2015 09:50:40 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82F9B1A8720; Wed, 27 May 2015 09:50:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8098; q=dns/txt; s=iport; t=1432745437; x=1433955037; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=1bRsErfCkxDfEqjsZh4qDmwjCF57MEeve2YsBmFKGvY=; b=ALRyqwZlukV1T09eg1nDrfIm6HVFG/gGu05ys6rDgVMYCPUSFDX0/hPN U/xUf2VI0kQQJ5cgVR2BRvJ8TY5GXQjHrWgJ1Ce067Bat8RJVlOuTxUSg kxXandUh6cwcaDfkMbnrIep6wxpcLVJzs09w6o+ljREkYo+QEk59oEMi9 A=;
X-Files: signature.asc : 841
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ArBACL9WVV/4QNJK1cDoMCgTIGgxm9XmYJh1ACgT44FAEBAQEBAQGBCoQiAQEBAwEjVgULAgEIEgYqAgIyFw4CBA4FDg2ICgitVaQmAQEBAQEBAQEBAQEBAQEBAQEBAQEBF4s6hDMBAVAHgmgvgRYFkwiCEoFDhzqBKYNxgn+LPYNZI4FmJByBFD5vgQw6gQEBAQE
X-IronPort-AV: E=Sophos;i="5.13,506,1427760000"; d="asc'?scan'208";a="153831452"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-5.cisco.com with ESMTP; 27 May 2015 16:50:36 +0000
Received: from xhc-rcd-x04.cisco.com (xhc-rcd-x04.cisco.com [173.37.183.78]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id t4RGoawL007351 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 27 May 2015 16:50:36 GMT
Received: from xmb-aln-x02.cisco.com ([169.254.5.147]) by xhc-rcd-x04.cisco.com ([173.37.183.78]) with mapi id 14.03.0195.001; Wed, 27 May 2015 11:50:36 -0500
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Benjamin Kaduk <kaduk@MIT.EDU>
Thread-Topic: [secdir] Review of draft-ietf-sfc-architecture-08
Thread-Index: AQHQllVoiI0EciI2k0ypB2MTIDGLzJ2L5tT3gAIA+oCAAJkTAIAAwU8AgAEfd4A=
Date: Wed, 27 May 2015 16:50:35 +0000
Message-ID: <53F5D306-5860-4415-8AA4-390882ED94AB@cisco.com>
References: <20150524211041.52cde768@latte.josefsson.org> <02FCDA94-FCC3-4875-AFBE-D07CC792B0C9@cisco.com> <alpine.GSO.1.10.1505252257290.22210@multics.mit.edu> <2DB7995B-8AF1-4EEE-971E-40A1A6294461@cisco.com> <alpine.GSO.1.10.1505261917240.22210@multics.mit.edu>
In-Reply-To: <alpine.GSO.1.10.1505261917240.22210@multics.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.150.54.90]
Content-Type: multipart/signed; boundary="Apple-Mail=_EA4AF42B-E3FD-4B1B-94A9-9035CBEF67F2"; protocol="application/pgp-signature"; micalg="pgp-sha256"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/secdir/dXhUBdw_AV8aBYQ2oYLRIseGopw>
Cc: "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-sfc-architecture.all@tools.ietf.org" <draft-ietf-sfc-architecture.all@tools.ietf.org>, "iesg@ietf.org" <iesg@ietf.org>
Subject: Re: [secdir] Review of draft-ietf-sfc-architecture-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 May 2015 16:50:45 -0000

Hi, Ben,

Thanks for the follow-up, please see inline.

> On May 26, 2015, at 7:41 PM, Benjamin Kaduk <kaduk@MIT.EDU> wrote:
> 
> Hi Carlos,
> 
> On Tue, 26 May 2015, Carlos Pignataro (cpignata) wrote:
> 
>>> On May 25, 2015, at 11:01 PM, Benjamin Kaduk <kaduk@MIT.EDU> wrote:
>>> 
>>> insist that encryption always be used, but please do not claim that being
>>> in a single administrative domain excuses the operator from considering
>>> whether encryption is necessary.
>>> 
>> 
>> My point was a different one: that SFC does not change these
>> requirements.
>> 
>> I may have misunderstood, but what I read in Simon's review (admittedly
>> oversimplified) was: in SFC you move services from on-network-path
>> (which, as an aside, is really the other way around; it is moving from
>> creating an on-network-path steering of network topology through the
>> service) to a machine ‘elsewhere' — and thus, consequently, you have to
>> encrypt.
> 
> I do not think anyone is saying "you must encrypt".
> 
> My take of the key point is that SFC is (potentially) going to be making
> the actual physical flow of data very different from how it currently is,
> and potentially also divorced from the conceptual topology of the service
> function chain (if the service functions are laid out "strangely" compared
> to the physical topology).  This has the potential to drastically change
> the security issues an operator deploying things has to consider, and an
> architecture document should point out that both protocol designers
> implementing the architecture and operators using such protocols should be
> aware of the new security environment.

Fully agree — and I believe this is what the current Security Considerations section achieves.

In particular, Section 6 highlights the areas of the new architecture (Overlay, Classification, Encapsulation) of which designers and operators ought to be aware.

>  Thus, we are proposing that it is
> mandatory for protocol designers and operators to consider whether they
> should be encrypting, but not mandatory for them to encrypt (if they are
> satisfied with their topology).

Further specifically, the "SFC Encapsulation” seems to cover this.

But as I said, I would not oppose strengthening this section even more.

> 
>> My point is that the logic above (which, again, I may have
>> misunderstood) does not follow.
>> 
>> There may be additional security and privacy considerations needed in
>> the DC, in mobile networks, etc. However, the SFC architecture does not
>> change that, and mandating encryption on SFCs might not be the right
>> answer. As we wrote, the solution realizing the architecture need to
>> perform part of that analysis.
> 
> I think that the SFC architecture does have the potential to change where
> additional security and privacy considerations are needed.  There can
> definitely be security and privacy considerations within a single
> administrative domain, and I do not think the current document has
> sufficient acknowledgement of the potential for the new architecture to
> require drastically different security and privacy measures in some (not
> all!) cases.  (Yes, I did read through it before composing this mail.)

I do not disagree. Are there areas beyond what’s already in the Security considerations that require specific focus?

> 
> I see some text in each of the three areas listed which sort-of addresses
> my concerns, ("Used transport mechanisms should satisfy the security
> requirements of the specific SFC deployment", "These include [...]
> potential confidentiality issues of that policy", "solutions should
> consider whether there is a risk of sensitive information slipping out of
> the operators control.  Issues of information exposure should also
> consider flow analysis"), but they could easily be missed by the reader,
> and do not convey a single central sense that adopting SFC will involve a
> full reevaluation of network security policy.

This is the key of the review, IMHO. On one hand, you seem to acknowledge that your security concerns are already addressed with the existing text. On the other hand, you seem to want to child-proof the text in case a reader misses what is already there already addressing the concern.

I support your view of elevating the message with a central sense of ‘this is an architecture and re-evaluate security’. However, that is not (in my read) what the text proposed by Simon achieved.

I’ll be happy to add a short preamble sentence/paragraph to Section 6 with this, if the WG agrees.

>  That reevaluation will
> include security/privacy issues for the original payload as well as the
> classification and encapsulation data added by the SFC protocol(s).
> 
> 

Yes — which is what the doc already says.

>> As I had said, I am more than happy adding text strengthening the
>> security considerations — as long as we do not mandate a solution at a
>> specific layer.
> 
> To partially crib from Simon's proposal, how about
> 
> The architecture described here is different from the current model, and
> moving to the new model could lead to different security arrangements and
> modeling. For example, when service functions are moved from on-path
> static machines to dynamic remote machines, this can change the flow of
> data through the network, and the security and privacy considerations of
> the protocol and deployment will need to be reevaluated in light of the
> new topology.
> 

“Reevaluated” is significantly better, of course. Here’s another proposal:

"The architecture described here is different from the current model, and
moving to the new model could lead to different security arrangements and
modeling. In the SFC architecture, a relatively static topologically-dependent
deployment model is replaced with the chaining of sets of service functions.
This can change the flow of data through the network, and the security and
privacy considerations of the protocol and deployment will need to be
reevaluated in light of the model.”

Simon, Ben, Joel, Jim, Thomas, Alia, WG,

Thoughs?

— Carlos.

> The word "reevaluated" is intended to indicate that a new analysis should
> be performed, but not that a different conclustion must necessarily be
> reached.
> 
> -Ben
> 
> P.S. "consdierations" in the second paragraph of section 6 is a typo