Re: [secdir] [Idr] Secdir early review of draft-ietf-idr-te-pm-bgp-13

Robert Raszuk <robert@raszuk.net> Fri, 19 October 2018 06:52 UTC

Return-Path: <robert@raszuk.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 357EA130DFC for <secdir@ietfa.amsl.com>; Thu, 18 Oct 2018 23:52:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7_8qJ_ZcUz8s for <secdir@ietfa.amsl.com>; Thu, 18 Oct 2018 23:52:12 -0700 (PDT)
Received: from mail-qt1-x82e.google.com (mail-qt1-x82e.google.com [IPv6:2607:f8b0:4864:20::82e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CFA8130E3D for <secdir@ietf.org>; Thu, 18 Oct 2018 23:51:56 -0700 (PDT)
Received: by mail-qt1-x82e.google.com with SMTP id j46-v6so37186285qtc.9 for <secdir@ietf.org>; Thu, 18 Oct 2018 23:51:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WwH8OjfuRv0fGBwN1/0v32KziOukAfoi2wieokKnTmU=; b=Ngq94Lo0ysAlb971FtGiWp1PswCF3Hc+gHb6yvAyy1HEy/MsC/f9AhytYgDl1CEuSe rKIM/7B0oPjfWu7X5CeDLd8g9n6RBQ4rhaXutzbsh8gIP2r8RmnMkEVV7jz9eJmfGbaX pKMV4fKlx17SxHIna1oVEhw2tPR353+psWF8D5mCN6K0PalVYqcFyP5Dg/oqFPgCTBel lfRoZvda2RKT8NFXPWnc+ac8ml+GtvoGhqB3kPFuk9WwXRz+giQhfQCN8l3Eo/ZiZlAf d5OpyWBxooh5YAyT7yVLPuwFhE6i1A39kKBILg7Cx0C69BGOt+IV00ubn7uy2uWTtzEs W7Qg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WwH8OjfuRv0fGBwN1/0v32KziOukAfoi2wieokKnTmU=; b=azh3d+SD0RHN26lszBeYcvR8uLfL2mTPJcJjxWB5zTBsacxOx68TSgI1TL8diazHrv k5Eb72vPJVtHWH+RZrD7y6WEiOk2q9NtDTjNM9mLfsI/pFbJqU+uXDAdRbBG7WZKxgOo 0wQiLsxeYsaz0MtGFVU/SUe5gakHTn5CA3Gnp0ZiyDJSKD8uRVVSDAzdhJrMPOHiEul1 XUr4MitE4hk4H13AwG7VMvUdxpr0b++Hw1igR5d+5LB6m8c7e00YCh3/32uM33BtIRGk SqSSZLIiOS9VKaYmdmQgvznLMmgWHZUQvT0gtxvZ77BoUlJAZ9w+08No6UoXsvURlOC6 6DCw==
X-Gm-Message-State: ABuFfoiGWWSpliilOaDiUD+ei6VGUkMO8BXjsEg/jUaG+N8k5L1YryLj FUG/NSSfysAeieLIiIJ1UTEdVczN9YBmmHaXclPXIQ==
X-Google-Smtp-Source: ACcGV62XMKmVbYSzNY6KrU7dcGlz8ErXY6aJzjbPrzroeh8i0UYsD7YfBq1sDmc8RQo00oPOO6WDgjMf4orffXhfE0A=
X-Received: by 2002:ac8:70b:: with SMTP id g11-v6mr31343118qth.219.1539931915154; Thu, 18 Oct 2018 23:51:55 -0700 (PDT)
MIME-Version: 1.0
References: <153972468642.9298.14442375581871750001@ietfa.amsl.com> <ec43e712e8024930831a206f8e843cbb@XCH-ALN-001.cisco.com> <7655493D-9EF0-42FF-B2D3-B9CE4E78178D@gmail.com> <feec42a72bd64f31afbcb3b340dad52b@XCH-ALN-001.cisco.com> <1FFA9449-D03C-4EB6-9D08-BA4A1AA93FE3@gmail.com> <92af26fef2da470d853f292c84f026a0@XCH-ALN-001.cisco.com> <20181019002642.GX19309@kduck.kaduk.org>
In-Reply-To: <20181019002642.GX19309@kduck.kaduk.org>
From: Robert Raszuk <robert@raszuk.net>
Date: Fri, 19 Oct 2018 08:51:46 +0200
Message-ID: <CAOj+MMH1=SBV=ikiNE6UHEe1mzf5xKLPOZXnnqPEvyFHTC=83A@mail.gmail.com>
To: kaduk@mit.edu
Cc: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, idr@ietf.org, draft-ietf-idr-te-pm-bgp.all@ietf.org, ietf@ietf.org, ynir.ietf@gmail.com, secdir@ietf.org
Content-Type: multipart/alternative; boundary="000000000000c80f3005788f567b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/iHPPNELt3oaMojkWZvyadIOyieQ>
Subject: Re: [secdir] [Idr] Secdir early review of draft-ietf-idr-te-pm-bgp-13
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Oct 2018 06:52:14 -0000

Hello Benjamin,

Not sure if you have spotted similar comment made to IDR regarding this
topic, but your comment seems to indicate that here we are about to define
ways to carry nicely scoped IGP information into BGP. Well that has already
happened with RFC7752 and your comment or for that matter Yoav's remarks
are indeed spot on but to the security discussion on RFC7752 and IMO not
any follow up extensions of it.

Sure - as observed by Sue - one may argue that providing more information
about the network to the potential attacker makes the network weaker, but
the cure for that is to prevent the leaks and reduce probability of
intercepting new information by unauthorized parties.

BGP-LS is already defined in a new SAFI what by itself does provide nice
level of isolation. RFC7752 is pretty clear on that too and says:

"BGP peerings are not automatic and require configuration; thus, it is the
responsibility of the network operator to ensure that only trusted
consumers are configured to receive such information."

If someone would be still concerned about configuration mistakes and
negotiating SAFI 71 or 72 to those who should not get this data I recommend
we reissue the RFC7752 as -bis version and restrict the scope of the
distribution even further by mandating default use of NO-EXPORT community
with ability to overwrite it for the selective eBGP peers. Or perhaps we
could progress Jim's One Administrative Domain draft
(draft-uttaro-idr-oad-01).

In either case while both of your comments are great they seems a bit late
in the game here or at least targeting wrong document.

Kind regards,
Robert.


On Fri, Oct 19, 2018 at 2:27 AM Benjamin Kaduk <kaduk@mit.edu> wrote:

> On Thu, Oct 18, 2018 at 06:00:13PM +0000, Les Ginsberg (ginsberg) wrote:
> > Yoav –
> >
> > In regards to the risks associated with advertising the specific
> information covered in this draft we have a statement in the IGP drafts:
> >
> > From RFC7810
> >
> > “The sub-TLVs introduced in this document allow an operator to
> >    advertise state information of links (bandwidth, delay) that could be
> >    sensitive and that an operator may not want to disclose.”
> >
> > In regards to the risks associated with sending information via BGP-LS
> we have a number of statements in RFC 7752 – most relevant is:
> >
> > “Additionally, it may be considered that the export of link-state and
> >    TE information as described in this document constitutes a risk to
> >    confidentiality of mission-critical or commercially sensitive
> >    information about the network.”
> >
> > So long as there are references to both the IGP RFCs and RFC 7752 I am
> therefore hard pressed to understand what else could be usefully said.
> > Certainly the risks associated with the BGP-LS transport mechanism are
> not altered by adding some new TLVs – and since the IGP RFCs have already
> covered risks associated with the specific class of information (not simply
> the risks associated with the transport mechanism) you are going to have to
> provide more specifics on what can meaningfully be said that is not already
> covered in the references.
>
> My apologies for jumping in in the middle, but IIUC the IGP RFCs have
> covered the risks associated with a specific class of information, *under
> the assumption that the transport mechanism is within a single AS and
> administrative domain*.  Yoav is pointing out that the risks for that
> information may change when the distribution is over a broader domain than
> the one for which the previous analysis was performed.
>
> -Ben
>