Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)

mohamed.boucadair@orange.com Mon, 12 July 2021 19:41 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8F8E3A1381; Mon, 12 Jul 2021 12:41:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.195
X-Spam-Level:
X-Spam-Status: No, score=-0.195 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c1oqAY8tVf8K; Mon, 12 Jul 2021 12:41:19 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.39]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B16913A1389; Mon, 12 Jul 2021 12:41:18 -0700 (PDT)
Received: from opfedar00.francetelecom.fr (unknown [xx.xx.xx.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar26.francetelecom.fr (ESMTP service) with ESMTPS id 4GNvJn3cZ3zFqFG; Mon, 12 Jul 2021 21:41:13 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1626118873; bh=QevUMLTQ5a34kTJaNWNJlaF79Lb4iae29PdjiBINAFo=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=OvVNyUiWs9cYO7poyKmTl4K4rvjGva2jgAkkcVrsMgVBK5437nSoVI9HMCtENgTAU A7aeDE/cjvDHwrOj8wETOGEIg2Ppgj7nAFEXR+W3bQNnIKKcm+yKOs7RodxiNSBaQx EwLijGEXW0tsk6nCWpEk0bzThzJ4sEMw7oWfwzhq5gOC/QGn+oVoRxb1Nc1PE0PxCL W6o748ZAE4MqpWEMZ1mvRNr3Nx+bki2y1WWqXdCzxSqMAoMi7aOGVnxmj7ynWBblgy XJIhPul15CRcB6J0C+AXc2xA7+qPeIjZZhnwgkec2rnJOVIMtnvrRmfYgDwBZf2C/p AV4Z0BFzuehNQ==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfedar00.francetelecom.fr (ESMTP service) with ESMTPS id 4GNvJn26hMzCqk9; Mon, 12 Jul 2021 21:41:13 +0200 (CEST)
From: mohamed.boucadair@orange.com
To: Alvaro Retana <aretana.ietf@gmail.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-sfc-nsh-integrity@ietf.org" <draft-ietf-sfc-nsh-integrity@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "gregimirsky@gmail.com" <gregimirsky@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)
Thread-Index: AQHXd1Pbs7Sb3jEX8kSZOT/s+TE0/as/uzNg
Date: Mon, 12 Jul 2021 19:41:11 +0000
Message-ID: <13781_1626118873_60EC9AD9_13781_9_1_787AE7BB302AE849A7480A190F8B9330353BDA95@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <162611498183.7775.3562397379733537345@ietfa.amsl.com> <23837_1626115941_60EC8F65_23837_478_1_787AE7BB302AE849A7480A190F8B9330353BD8C2@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CAMMESsx0ARXu2gpDT0MDxWT8ZPCZ8p97mcS43usAvPz=79vbiA@mail.gmail.com>
In-Reply-To: <CAMMESsx0ARXu2gpDT0MDxWT8ZPCZ8p97mcS43usAvPz=79vbiA@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/dYX2HDtcmw9HWiJK-FdPMV_IR-A>
Subject: Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jul 2021 19:41:24 -0000

Re-,

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Alvaro Retana [mailto:aretana.ietf@gmail.com]
> Envoyé : lundi 12 juillet 2021 21:27
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>; The
> IESG <iesg@ietf.org>
> Cc : draft-ietf-sfc-nsh-integrity@ietf.org; sfc-chairs@ietf.org;
> gregimirsky@gmail.com; sfc@ietf.org
> Objet : RE: Alvaro Retana's No Objection on draft-ietf-sfc-nsh-
> integrity-06: (with COMMENT)
> 
> On July 12, 2021 at 2:52:22 PM, mohamed.boucadair@orange.com wrote:
> 
> 
> Med:
> 
> Hi!
> 
> ...
> > > (1) Given the required behavior specified in the Security
> > > Considerations section...
> > >
> > > NSH data are exposed to several threats:
> > >
> > > o A man-in-the-middle attacker modifying the NSH data.
> > >
> > > o Attacker spoofing the NSH data.
> > >
> > > o Attacker capturing and replaying the NSH data.
> > >
> > > o Data carried in Context Headers revealing privacy-sensitive
> > > information to attackers.
> > >
> > > o Attacker replacing the packet on which the NSH is imposed with
> a
> > > bogus packet.
> > >
> > > In an SFC-enabled domain where the above attacks are possible,
> (1)
> > > NSH data MUST be integrity-protected and replay-protected, and
> (2)
> > > privacy-sensitive NSH metadata MUST be encrypted for
> confidentiality
> > > preservation purposes. The Base and Service Path headers are not
> > > encrypted.
> > >
> > > Why doesn't this document formally update rfc8300? Concerns that
> > > eventually led to this solution have been expressed for several
> > > other documents, including rfc8459 and rfc8979.
> > >
> > > It looks like the WG didn't consider the question of Updating
> the
> > > base NSH specification. I believe that this document specifies a
> > > required update to NSH, and would like the WG to consider
> formally
> > > Updating rfc8300. [My search of the archive didn't find any
> related
> > > discussion -- did I miss it?]
> >
> > [Med] We don't use the update header as we don't formally update
> any
> > text in 8300.
> 
> Updating text is not the only reason to formally Update another
> specification.
> 
> This document requires the use of both integrity and encryption if
> specific attacks are possible (text above).  It is reasonable to
> interpret that as cases where the "operator deems protection is
> required", which is the text that rfc8300 uses when it talks about
> the need for integrity protection (similar text can also be found
> about encryption).  IOW, the formal Update that I'm suggesting here
> is to provide more insight into when integrity protection and
> encryption are required, and the mechanism to use.
> 
> 
> As I look into this further, I believe there is a normative
> inconsistency between this document and rfc8300:
> 
> - rfc8300 requires the use of an encapsulating transport protocol
> that can provide integrity protection and/or encryption, as needed.
> 
> - This document requires protection as specified in the text
> above.  A stated goal of this specification is so that "the NSH does
> not have to rely upon an underlying transport encapsulation for
> security and confidentiality".
> 
> The outcome is that the requirements in rfc8300 would result in not
> using this specification.
> 

[Med] Not sure about this given that RFC8300 says the following:  

      NSH itself does not mandate protocol-specific integrity
      protection.  However, if an operator deems protection is required,
      several options are viable:

      1.  SFF/SF NSH verification
      ...
      2.  Transport Security
      ...
      3.  NSH Variable Header-Based Integrity

          Lastly, NSH MD Type 2 provides, via variable-length headers,
          the ability to append cryptographic integrity protection to
          the NSH packet.  The implementation of such a scheme is
          outside the scope of this document.

The I-D is basically the third option. 

> 
> > I know that we can interpret the update as "amends", but unless
> I'm
> > mistaken there is no formal IETF consensus on this.
> 
> True.
> 
> Without at least some text explaining the relationship between the
> requirements in this document and how they may be considered instead
> of the ones in rfc8300, I don't think this document is
> complete.  For better or worse, the only tool we have right now to
> make that link clear is the Updates tag.
> 
> 
> Thanks!
> 
> Alvaro.

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.