Re: [sfc] Secdir early review of draft-ietf-sfc-nsh-integrity-01

mohamed.boucadair@orange.com Fri, 15 January 2021 08:02 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A79D83A0D2F; Fri, 15 Jan 2021 00:02:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.116
X-Spam-Level:
X-Spam-Status: No, score=-2.116 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FSL_HAS_TINYURL=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xzGVByR7qMmF; Fri, 15 Jan 2021 00:01:58 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41A7E3A0B54; Fri, 15 Jan 2021 00:01:58 -0800 (PST)
Received: from opfedar04.francetelecom.fr (unknown [xx.xx.xx.6]) by opfedar27.francetelecom.fr (ESMTP service) with ESMTP id 4DHDD446Bsz2y9f; Fri, 15 Jan 2021 09:01:56 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1610697716; bh=k+Mo6j4PU0TGMCzwXmXJNlsV6+7ofVo+9LWDh0TpufA=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=mUBCl4yjbn+jXPEOi1F83vqE9kxlf4Vkd1JaNXH/28UYSAM1H+YyM7SfyHp0fOKB0 LXHk9zr/5wuA9iPjRxAkF9mo0g1K8AMJQFVmDetn1OBSZ/YpmW1AIRZv/GyW14lrQ+ NEg4Qi/YBWAmkyd+cVmewYL0GfvSI/SkkW24fLzf3ReTHQX0bQP6t89JKSe5E2MYbH hATOy4u93O45L1kW6c01IKDJfy9FvDRhMG78pkWFxy3fpCNJXDpHQ87slU9g4EzPVE mY6S2iKUpXmvHUGy5j6yquKXAPzAgFFQsehKCMWxiGiJcT2MzvTPzrMQ/a5ylHNF5u AewgmYTz2wTvQ==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.38]) by opfedar04.francetelecom.fr (ESMTP service) with ESMTP id 4DHDD42yB4z1xp5; Fri, 15 Jan 2021 09:01:56 +0100 (CET)
From: mohamed.boucadair@orange.com
To: "sfc@ietf.org" <sfc@ietf.org>
CC: "draft-ietf-sfc-nsh-integrity.all@ietf.org" <draft-ietf-sfc-nsh-integrity.all@ietf.org>
Thread-Topic: Secdir early review of draft-ietf-sfc-nsh-integrity-01
Thread-Index: AQHW2iGfyZergZl9c0m+HEhLWQWzAqoZEuiAgAN4NXCAC+XsQA==
Date: Fri, 15 Jan 2021 08:01:56 +0000
Message-ID: <10612_1610697716_60014BF4_10612_126_6_787AE7BB302AE849A7480A190F8B9330315BB1CD@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <160883409674.11984.2680388131154961282@ietfa.amsl.com> <32489_1609863531_5FF4916B_32489_106_1_787AE7BB302AE849A7480A190F8B9330315A77C3@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <25629_1610042791_5FF74DA7_25629_15_1_787AE7BB302AE849A7480A190F8B9330315B48D3@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
In-Reply-To: <25629_1610042791_5FF74DA7_25629_15_1_787AE7BB302AE849A7480A190F8B9330315B48D3@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/rrVvYUWKgKb2-13xqFmNieWdOW0>
Subject: Re: [sfc] Secdir early review of draft-ietf-sfc-nsh-integrity-01
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2021 08:02:01 -0000

Hi all, 

We give it a second thought with my co-authors and concluded that the current statement about replay attacks within the delta window is broken. Think about a terminating SF that receives even one replay attack. We could argued that SFs should have enabled means to detect replays (because replays may happen without NSH), but that's putting requirements on other layers that we don't control. 

We discussed the use of a sequence number but this one requires coordinating among several instances of the same SF  (e.g., an SF instance may not receive all packets of the same service chain). We already have text in -02 to explain why we don't explore that one further.

To solve that, we suggest to make the following change: https://tinyurl.com/nsh-integrity-latest. 

Please review and share your thoughts.  

Cheers,
Med

> -----Message d'origine-----
> De : mohamed.boucadair@orange.com
> [mailto:mohamed.boucadair@orange.com]
> Envoyé : jeudi 7 janvier 2021 19:07
> À : Steve Hanna <steve@hannas.com>; secdir@ietf.org
> Cc : draft-ietf-sfc-nsh-integrity.all@ietf.org; sfc@ietf.org
> Objet : RE: Secdir early review of draft-ietf-sfc-nsh-integrity-01
> 
> Hi Steve, all,
> 
> FWIW, an updated version that takes into account your review is
> available online:
> 
> URL:            https://www.ietf.org/archive/id/draft-ietf-sfc-nsh-
> integrity-02.txt
> Status:         https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-
> integrity/
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-
> sfc-nsh-integrity
> Htmlized:       https://tools.ietf.org/html/draft-ietf-sfc-nsh-
> integrity-02
> Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-
> nsh-integrity-02
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : mohamed.boucadair@orange.com
> > [mailto:mohamed.boucadair@orange.com]
> > Envoyé : mardi 5 janvier 2021 17:19
> > À : Steve Hanna <steve@hannas.com>; secdir@ietf.org Cc :
> > draft-ietf-sfc-nsh-integrity.all@ietf.org; sfc@ietf.org Objet :
> RE:
> > Secdir early review of draft-ietf-sfc-nsh-integrity-01
> >
> > Hi Steve,
> >
> > Many thanks for the review.
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De : Steve Hanna via Datatracker [mailto:noreply@ietf.org]
> > Envoyé :
> > > jeudi 24 décembre 2020 19:22 À : secdir@ietf.org Cc :
> > > draft-ietf-sfc-nsh-integrity.all@ietf.org; sfc@ietf.org Objet :
> > Secdir
> > > early review of draft-ietf-sfc-nsh-integrity-01
> > >
> > > Reviewer: Steve Hanna
> > > Review result: Has Issues
> > >
> > > I have reviewed this document as part of the security
> > directorate's
> > > ongoing effort to review all IETF documents being processed by
> the
> > > IESG.  These comments were written primarily for the benefit of
> > the
> > > security area directors.
> > >  Document editors and WG chairs should treat these comments just
> > like
> > > any other last call comments.
> > >
> > > This document describes adds integrity and optional encryption
> of
> > > sensitive metadata directly to the Network Service Header (NSH)
> > > protocol defined in RFC 8300, thus reducing or eliminating
> several
> > > attack vectors against Service Function Chaining (SFC). The
> > document
> > > is well written and seems adequate for the goals articulated
> here
> > and
> > > elsewhere in the SFC document suite.
> >
> > [Med] Thanks.
> >
> >  However, I have some
> > > issues, questions, and nits.
> >
> > [Med] This was exactly what we were looking for! Thanks.
> >
> > >
> > > Note that I have not previously worked with SFC. In the last few
> > days,
> > > I have read the documents on this document so I am fairly
> > confident
> > > that I understand the relevant security aspects.
> > >
> > > ISSUES and QUESTIONS:
> > > Why include a MUST in section 9.2? Isn't that already covered
> > earlier
> > > (in the last sentence of section 7.5)?
> >
> > [Med] Fair point. Will reword to avoid redundant use of normative
> > language.
> >
> > >
> > > The Timestamp field is supposed to handle replay attacks.
> However,
> > > this permits unlimited replays within the Delta interval. Is
> that
> > > acceptable?
> >
> > [Med] This is a discussion we had among the authors and we believe
> > that 2 seconds is acceptable especially that the timestamp is set
> by
> > the classifier and kept along an chain (except, if
> reclassification
> > happens). That value can be decreased if required as a function of
> a
> > local deployment.
> >
> > FWY, we considered the use of sequence numbers in the -00 but
> > abandoned that design because some SF instances may not receive
> all
> > the packets of a given flow. That is typically the case of load-
> > balancing or the so-called SFC Offloads.
> >
> > >
> > > What is the ? operator in section 7.4 supposed to connote?
> > > Subtraction seems like a better choice.
> >
> > [Med] We are calculating the diff between TS and TSrt. Will
> clarify in
> > the next iteration.
> >
> > >
> > > Is the Timestamp field only set by the first imposer in the SFP
> or
> > > should it be updated whenever an imposer changes the MAC? This
> > should
> > > be documented somewhere, maybe in section 7.4.
> >
> > [Med] The timestamp is left untouched as long a packet progresses
> in a
> > service path. It will be updated when we do reclassification,
> though.
> > Will add text to make this clear.
> >
> > >
> > > The threat model described in draft-arkko-farrell-arch-model-t-
> 04
> > > includes compromised nodes. The security considerations section
> of
> > > this document should describe how and to what extent compromised
> > nodes
> > > are handled by the protections provided by this document and
> what
> > > residual risks remain.
> >
> > [Med] A compromised entity can drop packets or bypass an SF is
> > discussed in the draft:
> >
> >    The attacks discussed in [I-D.nguyen-sfc-security-architecture]
> > are
> >    handled owing to the solution specified in this document,
> except
> > for
> >    attacks dropping packets.  Such attacks can be detected relying
> > upon
> >    statistical analysis; such analysis is out of scope of this
> > document.
> >    Also, if SFFs are not involved in the integrity checks, a
> > misbehaving
> >    SFF which decrements SI while this should be done by an SF (SF
> > bypass
> >    attack) will be detected by an upstream SF because the
> integrity
> >    check will fail.
> >
> > Other damage may be induced by compromised devices. Will see what
> we
> > can add more.
> >
> > >
> > > The Security Considerations section should explicitly
> acknowledge
> > that
> > > authentication is not provided by this method.
> > >
> > > What does this statement mean?
> > >         • If HMAC algorithm is used, IV length is set to zero.
> > > Don't all the current algorithms use HMAC?
> > >
> >
> > [Med] Actually we wanted to refer to this mode:
> >
> >    o  If the Context Headers are not encrypted, the Hashed Message
> >       Authentication Mode (HMAC) algorithm discussed in [RFC4868]
> is
> >       used to integrity protect the NSH data.
> >
> > > What is the expected behavior if these Context Headers are
> > missing?
> > > The last paragraph at the bottom of page 18 seems to be
> ambiguous
> > on
> > > this topic, with the first sentence saying that this "SHOULD be
> > logged
> > > locally"
> >
> > [Med] That one is from the perspective of the entity (e.g.,
> > classifier) that fails to inject the header at the first place.
> >
> > while the last sentence says that this "MUST cause
> > > that packet to be discarded".
> >
> > [Med] This one is the behavior for on-path entities.
> >
> >  Probably this is clear to the writer
> > > but not to this reader!
> >
> > [Med] Point taken. Will reword.
> >
> > >
> > > NITS:
> >
> > [Med] All good points. Will be fixed. Thanks.
> >
> > > At the top of page 6, "unecrypted" should be "unencrypted".
> > >
> > > In the last line of page 18, "depend" should be "depending".
> > >
> > > Just below Figure 9 on page 20, a comma is needed after "doing
> > so".
> > >
> > > In the second paragraph of section 7.5, "successfuly" should be
> > > spelled "successfully".
> > >
> > > At the end of the first paragraph of section 9, change the
> > sentence
> > > from:
> > >         • Also, that section indicates that metadata
> > considerations
> > > that
> > >         operators can take into account when using NSH are
> > discussed
> > > in
> > >         [RFC8165].
> > > to
> > >         • Also, that section indicates that [RFC8165] discusses
> > > metadata
> > >         considerations that operators can take into account when
> > using
> > > NSH.
> > >
> > > The last sentence of the third paragraph of section 9 recommends
> > that
> > > "the next key identifier" be distributed long before the key is
> > > changed. This should say "the next key identifier and associated
> > > keying material".
> > >
> > > In the second paragraph of section 9.1, "domain be able" should
> be
> > > "domain should be able".
> > >
> > >
> >
> >
> >
> ____________________________________________________________________
> > _____________________________________________________
> >
> > Ce message et ses pieces jointes peuvent contenir des informations
> > confidentielles ou privilegiees et ne doivent donc pas etre
> diffuses,
> > exploites ou copies sans autorisation. Si vous avez recu ce
> message
> > par erreur, veuillez le signaler a l'expediteur et le detruire
> ainsi
> > que les pieces jointes. Les messages electroniques etant
> susceptibles
> > d'alteration, Orange decline toute responsabilite si ce message a
> ete
> > altere, deforme ou falsifie. Merci.
> >
> > This message and its attachments may contain confidential or
> > privileged information that may be protected by law; they should
> not
> > be distributed, used or copied without authorisation.
> > If you have received this email in error, please notify the sender
> and
> > delete this message and its attachments.
> > As emails may be altered, Orange is not liable for messages that
> have
> > been modified, changed or falsified.
> > Thank you.
> 
> 
> ____________________________________________________________________
> _____________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc pas etre
> diffuses, exploites ou copies sans autorisation. Si vous avez recu
> ce message par erreur, veuillez le signaler a l'expediteur et le
> detruire ainsi que les pieces jointes. Les messages electroniques
> etant susceptibles d'alteration, Orange decline toute responsabilite
> si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or
> privileged information that may be protected by law; they should not
> be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender
> and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that
> have been modified, changed or falsified.
> Thank you.
> 
> 
> <p></p>

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.