Re: [sfc] Secdir early review of draft-ietf-sfc-nsh-integrity-01

mohamed.boucadair@orange.com Tue, 05 January 2021 16:18 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 970303A0E4C; Tue, 5 Jan 2021 08:18:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.118
X-Spam-Level:
X-Spam-Status: No, score=-2.118 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZGXJMUe9vHVf; Tue, 5 Jan 2021 08:18:53 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7BD7D3A0E93; Tue, 5 Jan 2021 08:18:53 -0800 (PST)
Received: from opfedar03.francetelecom.fr (unknown [xx.xx.xx.5]) by opfedar24.francetelecom.fr (ESMTP service) with ESMTP id 4D9Hk35r3Qz5vk6; Tue, 5 Jan 2021 17:18:51 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1609863531; bh=VWy6K37PMYlzI+5yhvgmWfL1WRNtn20t3LIBTIvBEb4=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=mT/T20JSyu5CfZ8daAxfAQkY/rqAXUc9rIIHmKYbyQ1x6ekrb9R5pShWbn5W1kg65 hhAqE5ce9X4lzD2D1Z4TwTCjG1JEFDEo8q3xjuXneilYbgtcECEhkDVC8RtJ6R8aQz 0ooBx6cTI2c6uUtpm3P994wbsgQSB6eBXRDHN6IW2r0GWvR+7Hx47YnyH3fgCnCLeZ oFbCMyzAFKIF+qpP8R/deK959N0U1lmF5P/J/WxRl3VDeM9gahcaY5QN6y7YSX+a3Z b5/6Kwg7efs7KnvsvGx51Ql4GFHGlwWtgteFUVLjRiv4yFgfCDieIzBKPK0z+uULXJ 2tv6Vd511r8Pw==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.32]) by opfedar03.francetelecom.fr (ESMTP service) with ESMTP id 4D9Hk34jk9zCqkf; Tue, 5 Jan 2021 17:18:51 +0100 (CET)
From: mohamed.boucadair@orange.com
To: Steve Hanna <steve@hannas.com>, "secdir@ietf.org" <secdir@ietf.org>
CC: "draft-ietf-sfc-nsh-integrity.all@ietf.org" <draft-ietf-sfc-nsh-integrity.all@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Secdir early review of draft-ietf-sfc-nsh-integrity-01
Thread-Index: AQHW2iGfyZergZl9c0m+HEhLWQWzAqoZEuiA
Date: Tue, 05 Jan 2021 16:18:51 +0000
Message-ID: <32489_1609863531_5FF4916B_32489_106_1_787AE7BB302AE849A7480A190F8B9330315A77C3@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <160883409674.11984.2680388131154961282@ietfa.amsl.com>
In-Reply-To: <160883409674.11984.2680388131154961282@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/0jMuywLmVhkYTvVjLvC35XRStVA>
Subject: Re: [sfc] Secdir early review of draft-ietf-sfc-nsh-integrity-01
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jan 2021 16:18:56 -0000

Hi Steve, 

Many thanks for the review.

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Steve Hanna via Datatracker [mailto:noreply@ietf.org]
> Envoyé : jeudi 24 décembre 2020 19:22
> À : secdir@ietf.org
> Cc : draft-ietf-sfc-nsh-integrity.all@ietf.org; sfc@ietf.org
> Objet : Secdir early review of draft-ietf-sfc-nsh-integrity-01
> 
> Reviewer: Steve Hanna
> Review result: Has Issues
> 
> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.
>  Document editors and WG chairs should treat these comments just
> like any other last call comments.
> 
> This document describes adds integrity and optional encryption of
> sensitive metadata directly to the Network Service Header (NSH)
> protocol defined in RFC 8300, thus reducing or eliminating several
> attack vectors against Service Function Chaining (SFC). The document
> is well written and seems adequate for the goals articulated here
> and elsewhere in the SFC document suite.

[Med] Thanks. 

 However, I have some
> issues, questions, and nits.

[Med] This was exactly what we were looking for! Thanks. 

> 
> Note that I have not previously worked with SFC. In the last few
> days, I have read the documents on this document so I am fairly
> confident that I understand the relevant security aspects.
> 
> ISSUES and QUESTIONS:
> Why include a MUST in section 9.2? Isn't that already covered
> earlier (in the last sentence of section 7.5)?

[Med] Fair point. Will reword to avoid redundant use of normative language. 

> 
> The Timestamp field is supposed to handle replay attacks. However,
> this permits unlimited replays within the Delta interval. Is that
> acceptable?

[Med] This is a discussion we had among the authors and we believe that 2 seconds is acceptable especially that the timestamp is set by the classifier and kept along an chain (except, if reclassification happens). That value can be decreased if required as a function of a local deployment.

FWY, we considered the use of sequence numbers in the -00 but abandoned that design because some SF instances may not receive all the packets of a given flow. That is typically the case of load-balancing or the so-called SFC Offloads. 

> 
> What is the ? operator in section 7.4 supposed to connote?
> Subtraction seems like a better choice.

[Med] We are calculating the diff between TS and TSrt. Will clarify in the next iteration. 

> 
> Is the Timestamp field only set by the first imposer in the SFP or
> should it be updated whenever an imposer changes the MAC? This
> should be documented somewhere, maybe in section 7.4.

[Med] The timestamp is left untouched as long a packet progresses in a service path. It will be updated when we do reclassification, though. Will add text to make this clear. 

> 
> The threat model described in draft-arkko-farrell-arch-model-t-04
> includes compromised nodes. The security considerations section of
> this document should describe how and to what extent compromised
> nodes are handled by the protections provided by this document and
> what residual risks remain.

[Med] A compromised entity can drop packets or bypass an SF is discussed in the draft:   

   The attacks discussed in [I-D.nguyen-sfc-security-architecture] are
   handled owing to the solution specified in this document, except for
   attacks dropping packets.  Such attacks can be detected relying upon
   statistical analysis; such analysis is out of scope of this document.
   Also, if SFFs are not involved in the integrity checks, a misbehaving
   SFF which decrements SI while this should be done by an SF (SF bypass
   attack) will be detected by an upstream SF because the integrity
   check will fail.

Other damage may be induced by compromised devices. Will see what we can add more.  

> 
> The Security Considerations section should explicitly acknowledge
> that authentication is not provided by this method.
> 
> What does this statement mean?
>         • If HMAC algorithm is used, IV length is set to zero.
> Don't all the current algorithms use HMAC?
> 

[Med] Actually we wanted to refer to this mode: 

   o  If the Context Headers are not encrypted, the Hashed Message
      Authentication Mode (HMAC) algorithm discussed in [RFC4868] is
      used to integrity protect the NSH data.

> What is the expected behavior if these Context Headers are missing?
> The last paragraph at the bottom of page 18 seems to be ambiguous on
> this topic, with the first sentence saying that this "SHOULD be
> logged locally" 

[Med] That one is from the perspective of the entity (e.g., classifier) that fails to inject the header at the first place. 

while the last sentence says that this "MUST cause
> that packet to be discarded".

[Med] This one is the behavior for on-path entities. 

 Probably this is clear to the writer
> but not to this reader!

[Med] Point taken. Will reword. 

> 
> NITS:

[Med] All good points. Will be fixed. Thanks. 

> At the top of page 6, "unecrypted" should be "unencrypted".
> 
> In the last line of page 18, "depend" should be "depending".
> 
> Just below Figure 9 on page 20, a comma is needed after "doing so".
> 
> In the second paragraph of section 7.5, "successfuly" should be
> spelled "successfully".
> 
> At the end of the first paragraph of section 9, change the sentence
> from:
>         • Also, that section indicates that metadata considerations
> that
>         operators can take into account when using NSH are discussed
> in
>         [RFC8165].
> to
>         • Also, that section indicates that [RFC8165] discusses
> metadata
>         considerations that operators can take into account when
> using NSH.
> 
> The last sentence of the third paragraph of section 9 recommends
> that "the next key identifier" be distributed long before the key is
> changed. This should say "the next key identifier and associated
> keying material".
> 
> In the second paragraph of section 9.1, "domain be able" should be
> "domain should be able".
> 
> 


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.