Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS and COMMENT)

mohamed.boucadair@orange.com Wed, 04 November 2020 10:33 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18E463A0DE9; Wed, 4 Nov 2020 02:33:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id noVKDtv0_Dpk; Wed, 4 Nov 2020 02:33:29 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.39]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAFD53A0EA5; Wed, 4 Nov 2020 02:33:28 -0800 (PST)
Received: from opfedar06.francetelecom.fr (unknown [xx.xx.xx.8]) by opfedar20.francetelecom.fr (ESMTP service) with ESMTP id 4CR3073JCtz8sns; Wed, 4 Nov 2020 11:33:27 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1604486007; bh=Bpyw8SheV0v7ZCI53wl2Ap3XrgYAjdp43CW4D2ljlf8=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=enOlXNvfYnF8gVtGOyi2CGAkz94y9T7maecqtBdT2JJqs7F01/5tVmmRbvx4c/eUc ZXNrpxB/qSfa42ws7lUarknwy5pUwHJ6C5EFH8zDdS3r+1tLMMnzvnpDvT1G1oO3GE i+xzcYTiaX2vB0b1t5yST+gTkxHA7g1CojteJuzmJzL808QVXGkXsD+/7Ad6YC4B43 Sd+8O+C1ZH1jRHGCgdjFIXmOfYUqKs/NDBIMKXfFsyPBiyfhzq1/LhxueHZM4jRehc tNC2RxEkPtbU4BS+wKkCUi9xo6F0EGs5D7OuvcxFG8U6mqR3lTpfkDTTYZBnnzvOOP b+otz4wpj1L4Q==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.86]) by opfedar06.francetelecom.fr (ESMTP service) with ESMTP id 4CR3070mm5z3wf1; Wed, 4 Nov 2020 11:33:27 +0100 (CET)
From: mohamed.boucadair@orange.com
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: "draft-ietf-sfc-serviceid-header@ietf.org" <draft-ietf-sfc-serviceid-header@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Greg Mirsky <gregimirsky@gmail.com>
Thread-Topic: Benjamin Kaduk's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS and COMMENT)
Thread-Index: AQHWsmQcaRx2oc7hJkO61zMw0ckSBqm3uEyw
Date: Wed, 04 Nov 2020 10:33:26 +0000
Message-ID: <3869_1604486007_5FA28377_3869_203_1_787AE7BB302AE849A7480A190F8B93303156FA8C@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <160446460674.32614.15877665689972040502@ietfa.amsl.com>
In-Reply-To: <160446460674.32614.15877665689972040502@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/8vAEANRP5ezEFVwK1hNJ-xTnIXY>
Subject: Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Nov 2020 10:33:31 -0000

Re-, 

Focusing on the DISCUSS. 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Benjamin Kaduk via Datatracker [mailto:noreply@ietf.org]
> Envoyé : mercredi 4 novembre 2020 05:37
> À : The IESG <iesg@ietf.org>
> Cc : draft-ietf-sfc-serviceid-header@ietf.org; sfc-chairs@ietf.org;
> sfc@ietf.org; Greg Mirsky <gregimirsky@gmail.com>;
> gregimirsky@gmail.com
> Objet : Benjamin Kaduk's Discuss on draft-ietf-sfc-serviceid-header-
> 12: (with DISCUSS and COMMENT)
> 
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-sfc-serviceid-header-12: Discuss
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-
> criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-sfc-serviceid-header/
> 
> 
> 
> --------------------------------------------------------------------
> --
> DISCUSS:
> --------------------------------------------------------------------
> --
> 
> Retaining my original Discuss position (without the "early warning"
> note), as it is the one that was supported by Martin D and Alvaro:
> 
> %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
> This document defines (among other things) a mechanism for carrying
> subscriber information in an NSH.  RFC 8300 (NSH) notes both that:
> 
>                                              Metadata privacy and
>    security considerations are a matter for the documents that
> define
>    metadata format.
> 
> and that:
> 
>       One useful element of providing privacy protection for
> sensitive
>       metadata is described under the "SFC Encapsulation" area of
> the
>       Security Considerations of [RFC7665].  Operators can and
> should
>       use indirect identification for metadata deemed to be
> sensitive
>       (such as personally identifying information), significantly
>       mitigating the risk of a privacy violation.  In particular,
>       subscriber-identifying information should be handled
> carefully,
>       and, in general, SHOULD be obfuscated.
> 
> On the other hand, this document in its security considerations
> claims
> that:
> 
>    Data plane SFC-related security considerations, including
> privacy,
>    are discussed in [RFC7665] and [RFC8300].
> 
> and does not seem to incorporate any discussion of the privacy and
> security considerations of the subscriber information metadata
> carried by the new format it conveys.  Yes, it does note that all
> nodes with access to the information are part of the same trusted
> domain, but I do not think that is sufficient, especially given that
> personally identifiable information is often subject to strict
> compliance regimes.
> 
> In short, 8300 and this document are referring to each other for
> privacy considerations, and the actual privacy considerations do not
> seem to be documented in either place.
> 
> Additionally, I did not see any indication of how the subscriber-
> identifying information ought to be obfuscated (or an explanation of
> why it is okay to violate the SHOULD from 8300).
> %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
> 
> To record some additional synthesis of the above (original) remark
> with my more thorough reading of the document: we are defining
> containers specifically to contain subscriber and performance policy
> identifiers/information.  While the specific contents are out of
> scope for this document, we still are obligated to describe the
> general classes of issues that can arise due to conveying those
> types of information within a SFC domain.  We should also give
> guidance on how to populate the contents of these context headers in
> a secure and privacy-supporting manner, including the use of
> indirect identification and obfuscation/encryption.

[Med] I made the following changes: 
* Reiterate the reco to use obfuscated as this may be missed in the "one" pointer to the Security section of 8300.
* Add a new text for the use of non-persistent identifiers as well as instructing SFs to remove the header early in the SFP. 
* Add new text to illustrate that the nature of SFs in a chain and a subscriber ID may be a privacy violation. 
* Add text to point to the NSH encryption when obfuscation is not sufficient.

The full text can be seen in: https://tinyurl.com/sfc-service-iesg.

> 
> Futhermore (and this part is not a discuss point but may lead to me
> switching my position to Abstain once the discusses are resolved), I
> have some misgivings about including subscriber identification
> information at all, and would prefer if it could instead be
> translated into the relevant policy information element(s) needed by
> the SFP in question before being applied to the NSH.  For example,
> rather than saying "this packet is from user X" we could say "this
> packet is part of quota bucket ABC (with bucket size Z) for time
> period Y" to enforce per-user quota.

[Med] Putting aside how the quota usage can be conveyed in a policy instead of a subscriber id, the issue Ben is that a per-subscriber policy is not only about a quota. There are bunch of SFs that are making use of the subscriber identifier (e.g., implicit identification to portal, control the number of devices of a subscriber accessing to a service). The identity of the subscriber is also needed for various reasons (legal data retention). 

As we designed the subscriber id without requiring any specific internal structure, innovation among the lines you are suggesting are not excluded.

With draft-ietf-sfc-serviceid-header, we do solve many many privacy issues that are encountered in current deployments with header enrichment practices (MISDN leaks, etc.). 

  While in this case the
> identifier would still ultimately lead back to an individual, the
> identifier would be rotated periodically, and it is possible to
> achieve some level of de-linkability as records age out (depending
> on how the "ABC" is generated, of course).
> I do recognize that even for non-quota use cases where a user is
> part of multiple distinct policy groups, the combination of those
> groups might still identify only a small anonymity set, but the
> overall privacy properties of such a design seem superior than
> consistent use of a persistent identifier or identifiers, in
> aggregate.
> 
> I have an additional Discuss point after doing a more thorough
> review of the document -- I think there's a (minor) internal
> inconsistency within Section 3:
> 
>    Intermediary NSH-aware nodes have to preserve Subscriber
> Identifier
>    Context Headers (i.e., the information can be passed to next hop
> NSH-
>    aware nodes), but local policy may require an intermediary NSH-
> aware
>    node to strip a Subscriber Identifier Context Header after
> processing
>    it.
> 
> since it seems to say that NSH-aware intermediary nodes both "have
> to preserve" and "may strip" a Service Identifier Context Header.

[Med] The default behavior is to preserve the context header when present, but the node may strip it if it is instructed to do so. 

> Similar language is used to describe the Performance Policy
> Identifier Context Header, in Section 4, which would presumably
> receive a similar modification to the Subscriber Identifier case.


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.