Re: [secdir] secdir review of draft-ietf-ospf-node-admin-tag-05

<bruno.decraene@orange.com> Tue, 13 October 2015 14:12 UTC

Return-Path: <bruno.decraene@orange.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F26FD1B4285; Tue, 13 Oct 2015 07:12:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nEMP2Ph9Ks9j; Tue, 13 Oct 2015 07:12:40 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABEF91B320A; Tue, 13 Oct 2015 07:12:38 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id ECEE918C404; Tue, 13 Oct 2015 16:12:36 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.69]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id B979C27C053; Tue, 13 Oct 2015 16:12:36 +0200 (CEST)
Received: from OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06]) by OPEXCLILMA2.corporate.adroot.infra.ftgroup ([fe80::bc1c:ad2f:eda3:8c3d%19]) with mapi id 14.03.0248.002; Tue, 13 Oct 2015 16:12:36 +0200
From: <bruno.decraene@orange.com>
To: Benjamin Kaduk <kaduk@MIT.EDU>, Shraddha Hegde <shraddha@juniper.net>
Thread-Topic: secdir review of draft-ietf-ospf-node-admin-tag-05
Thread-Index: AQHRAtRlvV1UQkvmNE6+tMDsl/U1DJ5pef1g
Date: Tue, 13 Oct 2015 14:12:36 +0000
Message-ID: <27748_1444745556_561D1154_27748_5857_1_53C29892C857584299CBF5D05346208A0F677EDF@OPEXCLILM21.corporate.adroot.infra.ftgroup>
References: <alpine.GSO.1.10.1510091159450.26829@multics.mit.edu>
In-Reply-To: <alpine.GSO.1.10.1510091159450.26829@multics.mit.edu>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.168.234.5]
Content-Type: multipart/alternative; boundary="_000_53C29892C857584299CBF5D05346208A0F677EDFOPEXCLILM21corp_"
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.10.13.132415
Archived-At: <http://mailarchive.ietf.org/arch/msg/secdir/jSLKBjQhSZwfYas20_3KrcQz6Xo>
X-Mailman-Approved-At: Thu, 22 Oct 2015 07:18:03 -0700
Cc: "draft-ietf-ospf-node-admin-tag.all@ietf.org" <draft-ietf-ospf-node-admin-tag.all@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [secdir] secdir review of draft-ietf-ospf-node-admin-tag-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Oct 2015 14:12:49 -0000

Hi Ben,



> In section 4.5, I do not see that the constraint "Traffic from A nodes to

> I nodes must not go through R and T nodes" can be satisfied for the

> leftmost pair of A nodes.





Thanks for the careful review.

My mistake. I missed the left part of the network.

I see 2 options:

a) add some network topology on the left part

b) remove the leftmost pair of A nodes.



Option "b" makes the asci art easier to read, but remove some of the complexity of the network hence some part of the use case.

Option "a" would make something like that:



     +----------------------+   +----------------+

     |                       \ /                 |

     |   +-----------------+  x   +---------+    |

     |   |                  \/  \/          |    |

     |   |                +-T-10-T          |    |

     |   |               /  |   /|          |    |

     |   |              /  100 / |          |    |

     |   |             /    | | 100         |    |

     |   |            /   +-+-+  |          |    |

     |   |           /   /  |    |          |    |

     |   |          /   /   R-18-R          |    |

     |   |        10   10  /\   /\          |    |

     |   |        /   /   /  \ /  \         |    |

     |   |       /   /   /    x    \        |    |

     |   |      /   /   10  10 \    \       |    |

     |   |     /   /   /    /   10   10     |    |

     |   |    /   /   /    /     \    \     |    |

     |   |   A-25-A  A-25-A       A-25-A    |    |

     |   |   |    |   \    \     /    /     |    |

     |   |   |    |   201  201  201 201     |    |

     |   |   |    |     \    \ /    /       |    |

     |   |  201  201     \    x    /        |    |

     |   |   |    |       \  / \  /         |    |

     |   |   |    |        \/   \/          |    |

    |   |   I-24-I        I-24-I          100  100

     |   |  /    /         |    |           |    |

     |   +-+    /          |    +-----------+    |

     +---------+           +---------------------+





Ben, Shraddha, what would be your preference?

(Personally I'm biased as I know the network topology so any asci art seems readable to me)



Thanks,

-- Bruno

> From: Benjamin Kaduk [mailto:kaduk@MIT.EDU] > Sent: Friday, October 09, 2015 10:52 PM

>

> I have reviewed this document as part of the security directorate's

> ongoing effort to review all IETF documents being processed by the

> IESG.  These comments were written primarily for the benefit of the

> security area directors.  Document editors and WG chairs should treat

> these comments just like any other last call comments.

>

> I will preface these comments with a note that my routing background is

> quite weak, and I needed to read RFC 2328 and RFC 4970 to have enough

> context to be able to say much useful about what's going on here; I may

> still be suffering from some misconceptions.

>

> On the whole, this document leaves me feeling unsatisfied; it spends maybe

> three pages talking about the actual new protocol extension and then gives

> four pages of example usage, all the while claiming that the actual tag

> values are only meaningful within a single administrative domain/network,

> are for generic use, and do not require an IANA registry.  That is, it is

> trying to walk a middle line between "this document allocates a value in

> the OSPF TLVs registry for site-local use, use it as you will" and "this

> document specifies a complete protocol extension for tagging OSPF nodes

> for traffic engineering, LFA, and other purposes".  That is a hard middle

> line to follow, and I am not sure that this document does so successfully.

> I will not try to reopen the question of whether it would be better to

> take one of the non-middle paths, and continue on the assumption that this

> document will take the middle path.  I think there are a few things that

> are missing before this document should be published, and that it might be

> worth considering a more drastic restructuring as well.

>

> It would probably be good to include some text with the reasoning behind

> the choice of the "middle line" -- the current text attempting to enforce

> it, "new OSPF extensions MUST NOT require use of per-node administrative

> tags or define well-known tag values", seems unenforcable, as a future RFC

> updating this one could just remove that restriction.

>

> It looks like there's now an -06, but the changes from the -05 are not

> significant.  The security considerations in the -05 correctly note what

> are essentially privacy considerations regarding the contents of the admin

> tags.  However, it seems like there are also potential security

> considerations on the actual operation of the network that are not

> discussed here, nor in RFC 2328 (OSPFv2) or RFC 5340 (OSPFv3).  RFC 5340's

> security considerations explicitly disclaims protections against

> compromised, malfunctioning, or misconfigured routers, deferring to RFC

> 4593, "Generic Threats to Routing Protocols".  I believe that the security

> considerations of this document should address, either directly or

> indirectly, protections against compromised, malfunctioning, or

> misconfigured routers, and additionally protection against malicious

> actors with access to the layer-3 network (and maybe lower layers as

> well).

>

> That probably means mentioning RFC 4593 directly, or maybe just pointing

> out that RFC 5340 does so.  There are still additional considerations

> introduced by this document, though; unfortunately, because the bulk of

> the interpretation of the admin tags is left to the site administrator, it

> is hard to give a comprehensive security analysis, but the examples and

> the protocol description itself do give some areas for consideration.

>

> The RI LSAs carrying administrative tags can be at link-, area-, or

> AS-level scope; an administrator assigning tag values and associated

> policies should consider what would happen if a given tag was advertised

> at a different scope than intended.  Compliant implementations MUST NOT

> generate the same tag at different scopes, but a receiver would need to

> take some action if it happened, whether due to network glitch or

> malicious action -- what should they do?

>

> Another potential issue lies in the "stickiness" of the admin tags -- the

> text "the node administrative tags associated with a node for the purpose

> of any computation or processing SHOULD be a superset of node

> administrative tags from all the TLVs in all instances of the RI LSA

> originated by that node" seems to mean that once a tag is set, it cannot

> (easily) be unset.  Would force-expiring an LSA be enough to reset the

> tag, or something else?  How disruptive would that be?  It would be

> helpful to see some discussion of how a tag would be removed.

>

> That is particularly easy for an attacker when the null OSPF

> authentication mechanism is in use (how common is that?  I saw some

> websites indicating it was the default behavior, at least sometimes).  I

> do not see a need to turn this document into "security considerations for

> OSPF authentication", but maybe it is worth mentioning some things: the

> md5 scheme seems pretty week at this point (though probably not trivially

> broken), the hmac-sha scheme of RFC 5709 is only from 2009, and RFC 7474

> (only six months old) points out cases where both are susceptible to

> replay attacks.  Just looking at the security considerations of this

> document and the core OSPF v2/v3 specs does not convey this to the reader,

> so I would like to see at least a pointer to such considerations.  (The

> stance of RFC 2328 that "all OSPF protocol exchanges are authenticated"

> seems particularly disingenous given the presence of the null

> authentication scheme.)

>

> There is also the possibility that an attacker could block delivery of an

> LSA, causing a tag that should be set to not be seen.  This seems unlikely

> for wired point-to-point links, but is more plausible in other

> environments, such as radio links.  I think I can imagine scenarios where

> this would cause drastic damage to the routing topology.

>

> The parenthetical in section 3.2 wherein routers might advertise a

> per-node aministrative tag "without knowing (or even explicitly

> supporting) functionality implied by the tag" seems potentially dangerous,

> since it sounds like the routers in question are lying about their

> capabilities.  Would the document suffer harm if the parenthetical was

> removed?

>

> One reason I am unsatisfied by making the interpretation of the tag values

> specific to an administrative domain is that a misconfigured border router

> might erroneously use tag values from one domain on the other side of the

> border.  Perhaps the other damage from a router misconfigured in such a

> fashion would dwarf the additional damage from the misinterpreted tags and

> so my concern is invalid; I really can't say.

>

>

>

>

> I also have some editorial comments unrelated to the secdir review:

>

> Section 3.2 reads rather like a jumbled list and could benefit from some

> additional structure.

>

> Similarly, I would find it helpful if there was some text motivating the

> "middle patch" mentioned above, towards the beginning of the technical

> (non-example) portion of the document.

>

> For a construction as weakly structured as these administrative tags,

> preventing any internal structure or dependencies between tags (as this

> document attempts to do) seems correct.  However, this sentiment seems to

> be expressed differently in several different places in the document, and

> it would be good to consolidate and coordinate them.  In particular,

> paragraph 3 of section 3.2 explicitly says that tag order has no meaning,

> but paragraph 4 has the weaker "SHOULD be considered an unordered list".

> (The word "set" might be appropriate here.)

>

> Paragraph 7 of section 3.2 seems to be trying to say that the

> administrative tags must indicate inherent or administratively configured

> properties of a node and must not be used to convey attributes of the

> routing topology.  (The word "tie" seems insufficiently clear.)

>

> Many (but not all) of the acronyms/abbreviations should be expanded at

> first use -- the ones marked with a '*' at

> https://www.rfc-editor.org/materials/abbrev.expansion.txt are assumed to

> be common knowledge and do not need expansion.  Other things, like traffic

> engineering, router information, link statement advertisement, autonomous

> system, etc., should be written out in full at their first use, with the

> abbreviated version in parentheses afterwards.

>

> The first paragraph of section 1 contains a list of potential

> applications; please use some XML markup to preserve the list structure in

> the rendered document.

>

> Plase give an informative reference for Loop Free Alternate backup

> selection at its first appearance.

>

> The divider between the type and length fields in Figure 1 is placed one

> bit to the left of the correct division for two 16-bit fields.  (In many

> cases the position indicators above the diagram are offset by one space so

> they land over the '-'s instead of the '+'s, but there is some argument

> for putting them in their current location, as well.)

>

> In the seventh paragraph of section 3.2, I think it would be fine to just

> remove the "but not limited to" clause, which is not quite correct grammar

> and is not really needed.

>

> The last paragraph of section 3.2 could probably be written more clearly.

> In particular, "in any instance of the RI-LSA" is not entirely clear to me

> (but then again, I don't really understand how LSAs normally work).  Is it

> enough to just say that implementations MUST detect when the

> administrative tags associated with a given node change, and update their

> state accordingly?

>

> In section 4.5, I do not see that the constraint "Traffic from A nodes to

> I nodes must not go through R and T nodes" can be satisfied for the

> leftmost pair of A nodes.

>

> I am also attaching a diff to the xml sources with some grammar fixes not

> worth enumerating explicitly.

>

> -Ben Kaduk

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.