Re: [sfc] Opsdir last call review of draft-ietf-sfc-nsh-integrity-05

Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> Fri, 02 July 2021 06:49 UTC

Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B927C3A1079; Thu, 1 Jul 2021 23:49:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.4
X-Spam-Level:
X-Spam-Status: No, score=-2.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s1SN2q0GxYqA; Thu, 1 Jul 2021 23:49:51 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60040.outbound.protection.outlook.com [40.107.6.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DF853A1078; Thu, 1 Jul 2021 23:49:50 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=F2S6NSnDYDm8EHaFkpAW7yTLmtM3nHdEnzvxHl8DaC2URjTnQTVQnqtonIKk/4MUIoi8yHJSz5ryBWvk48aBO8YE16/rhpnfE1mzJgQUc9SvTt998EGdpMCVlzRtjVUJYIRdEC8ZzbWHC2zwcoPd62fIzN0bu919/MJ4NU4ToY+ZB5ZpS3eHhywwEFkGUFF1HBu8UQFTpmQ0DPvBO9va8A0pj0xR3yC2P6h8T8WnZdBgKL3GogRDenEeyassVYsoVZZFYJ4T3R0FF0UgGepXWL6PPLkDRp48aJqKkIQtRws1GmP3fI5DgGzRUzl0vnBFtn2XnXeM63S+30z9tkImBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OuGZgrxnOoe+D6/8frfKqIteVSftFuUgV4uU2J+NvGk=; b=i5PnahyrVxx22RJ7ZFeq/IDO9a+pEa4iiK4b0+OW2th8n4vSPXi5GEEWBO0A1HQLKtvpGG+B4zxsMQu0ur3e+XoYrBbesCJpvacvQJqA4+f6PJX3wqKn8dvjBK4ozvcD4YDHk3KScaQLA/yFvB1rSxLN4WHIv+dh+nBzBVHajYM2KY/CfyjEHbOoQB/I+EAIHCe0STk6HONxjXRh2j3NwRrPPCpa8RWgOulMTxaadYM7QcAMgiLDSpHn1heBQnWnFoQSA0+QUL4ICY1X3Fey1bPTmzJjA2hfdxuspTKmA6TYY+NhGyB7wlpkL3KKKDkWmSqSmyZ8Cqeo73BZikYvrA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OuGZgrxnOoe+D6/8frfKqIteVSftFuUgV4uU2J+NvGk=; b=HUbX5xlkER17wff5OIXw5uha4NcMoZWB5mXIflKeOyFOUeCXg3kLN+dUrRtlpFf2f7V63p3Zq3bsWv6TyRE0KkBM2KBkQazZwWP5CJZZAnFlBbxsm3K1YhqDtzGRbU1C2j/3EDWCNqrtiOl1UZp9kDc1FFtbwqRtWrvDcpF0Wd0=
Authentication-Results: orange.com; dkim=none (message not signed) header.d=none;orange.com; dmarc=none action=none header.from=jacobs-university.de;
Received: from AM0P190MB0641.EURP190.PROD.OUTLOOK.COM (2603:10a6:208:194::23) by AM9P190MB1569.EURP190.PROD.OUTLOOK.COM (2603:10a6:20b:3e7::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.23; Fri, 2 Jul 2021 06:49:48 +0000
Received: from AM0P190MB0641.EURP190.PROD.OUTLOOK.COM ([fe80::fd93:9b33:ac92:ea58]) by AM0P190MB0641.EURP190.PROD.OUTLOOK.COM ([fe80::fd93:9b33:ac92:ea58%8]) with mapi id 15.20.4264.027; Fri, 2 Jul 2021 06:49:48 +0000
Date: Fri, 2 Jul 2021 08:49:44 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: mohamed.boucadair@orange.com
Cc: "ops-dir@ietf.org" <ops-dir@ietf.org>, "draft-ietf-sfc-nsh-integrity.all@ietf.org" <draft-ietf-sfc-nsh-integrity.all@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Message-ID: <20210702064944.a7k5tu6q4uwrvvol@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: mohamed.boucadair@orange.com, "ops-dir@ietf.org" <ops-dir@ietf.org>, "draft-ietf-sfc-nsh-integrity.all@ietf.org" <draft-ietf-sfc-nsh-integrity.all@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
References: <162460909273.657.16151989326348143956@ietfa.amsl.com> <9774_1624614936_60D5A818_9774_471_2_787AE7BB302AE849A7480A190F8B9330353B0E12@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <24262_1625202611_60DE9FB3_24262_195_1_787AE7BB302AE849A7480A190F8B9330353B4F52@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <24262_1625202611_60DE9FB3_24262_195_1_787AE7BB302AE849A7480A190F8B9330353B4F52@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
X-Originating-IP: [212.201.44.244]
X-ClientProxiedBy: FR3P281CA0023.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:1c::7) To AM0P190MB0641.EURP190.PROD.OUTLOOK.COM (2603:10a6:208:194::23)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from localhost (212.201.44.244) by FR3P281CA0023.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:1c::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4308.8 via Frontend Transport; Fri, 2 Jul 2021 06:49:47 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5b3f0aaf-5a64-49d5-a908-08d93d25955b
X-MS-TrafficTypeDiagnostic: AM9P190MB1569:
X-MS-Exchange-Transport-Forked: True
X-Microsoft-Antispam-PRVS: <AM9P190MB1569EAF835BAE252340E84D9DE1F9@AM9P190MB1569.EURP190.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0P190MB0641.EURP190.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(346002)(396003)(366004)(39850400004)(376002)(136003)(3450700001)(66574015)(54906003)(83380400001)(26005)(6496006)(186003)(52116002)(16526019)(4326008)(956004)(2906002)(6486002)(66556008)(5660300002)(966005)(316002)(1076003)(478600001)(66946007)(8676002)(6916009)(786003)(66476007)(8936002)(38350700002)(6666004)(86362001)(38100700002); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?iso-8859-1?Q?GE3jt8gY/qyAQk4H6qFbkqYGg/xeIEA7f5S/mn141Nf2WtsRK1JfWkVFA/?= =?iso-8859-1?Q?PfDIkUpFZCPrPxBKtUjjrGY+GqrgbTS0MS8+ffie47OLyN7QYgqdPMJ+Cg?= =?iso-8859-1?Q?bjDXmPJ4N8SoQ6ijTPx7c162YEF0WeHGJH5z9oBrHW5081ZS4wMIJ/yapf?= =?iso-8859-1?Q?1VQxxrejkSS+FS3K0UzpnA9nB6N70VHu5LAUe36nsXj3NwXerR7Rr0KJPg?= =?iso-8859-1?Q?EdZzBZ6jCpLZIHVpjZHIAQDsMC2MXlMq5A6s6HkBG7TkkYzVVJ9GxZslQx?= =?iso-8859-1?Q?Jh524g9tWfmQ4JT/NGJH1hFsA84c3etuytQP0kxLDKT+59Oiq8cW5kngMQ?= =?iso-8859-1?Q?3lXifQji7PoN/HZaxUkR5csT8u8boRWWV2jDi74D8tvN4SRk2U0ZDiAt/I?= =?iso-8859-1?Q?vsZD3+vf3GnnzO4L5jHL0lL8z7MoRgCwLyvcXVeCr26MrisGB754ZhKzGv?= =?iso-8859-1?Q?x9+KNi3j+wYCEXKys+wilN+6VRpsPK7iik0xmkDhvr40/i0hbSl1WehoAn?= =?iso-8859-1?Q?4krsGPVgJCl1VEnl6i2I2hDfHeZPsPV/HNjCd/sVJX36b97z7U2DqMPmKx?= =?iso-8859-1?Q?Outq55xGAv1QbES95dNp8mODMcyHUpmbfU8DoXScJ0YoQmkhRygLRtZQXd?= =?iso-8859-1?Q?t1LJPZavXEHiHYAVMxYML4g0VwgB8Uvgf06qhSZTg+3kV7b0pA++SAUkxi?= =?iso-8859-1?Q?aNGftvyKUo54d9aaWkiITLMXgsQM1ycdU9LmruXPPka1JNdZEocR8LbVPp?= =?iso-8859-1?Q?bAqqgKjFMP4ff6P920iW85o8r5gLOvvMBELS+0ZuSY2zbQ7pO6Gvt05nc4?= =?iso-8859-1?Q?MtHtWGTnaY0pI64MsvUs2q4oUjSrxV8Wu54CPpXwFV8U7ZT5sRqhPTOiqs?= =?iso-8859-1?Q?w92JSnF8fhg7eIZrzHwlB7r8vFaA+mNn1O3beQzTPZGFCFAI9CehPKoE32?= =?iso-8859-1?Q?pYAuSMEXMTOd3wy/vaTwo5jgFaNFoC7cYWaG6oMPj2/QAT0hRwyJjWgHSf?= =?iso-8859-1?Q?0k977Q6nK6K7U6SPa3VTUa2KQKOhulSD2mJaOTuLpPmnD1dTzvYWHTRUj2?= =?iso-8859-1?Q?CUCMt2whH/7tk2Zh04H/QLNytEFBhMsWdyP5nqDODk46Q/WMsnjEst3+vX?= =?iso-8859-1?Q?rSTDsy7Dd3XbSKR3JduJEBiYs0owfuJLkngkICEt+H1A8LouMGI3GNOddg?= =?iso-8859-1?Q?VLg9B8G+0/I1tnEvEw5YP32SDjCSIAzj1NEam57p5DE/OFuyupeebOMsYd?= =?iso-8859-1?Q?zDe4IWPLerIIce1Zoor6Top1g6h8YLAhLXGWJWUMwxZwrdv4MYC+R/KpFy?= =?iso-8859-1?Q?WGxPEnlr75Vgzzp7RrTWu1RkkbPUGbgUeXENMRYoI/h/aMpnShYhjp43r7?= =?iso-8859-1?Q?NxvsPNQ0dk?=
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 5b3f0aaf-5a64-49d5-a908-08d93d25955b
X-MS-Exchange-CrossTenant-AuthSource: AM0P190MB0641.EURP190.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Jul 2021 06:49:48.0513 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HX84VUVfWSI/Cbhol7mDwGbtLnBrr3bNMUmzySm1HbKILErlG47gQesU3972xct7icKEij+q441gkXAraeamDKMUvvSvDVPz5lFA7Gi7ypk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9P190MB1569
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/saKI-aKFzzCPbmO2ldGqvVPVo2s>
Subject: Re: [sfc] Opsdir last call review of draft-ietf-sfc-nsh-integrity-05
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Jul 2021 06:49:57 -0000

Med,

looks good, thanks for taking my comments into account.

/js

On Fri, Jul 02, 2021 at 05:10:10AM +0000, mohamed.boucadair@orange.com wrote:
> Hi Jürgen, 
> 
> FYI, the changes are now implemented in the public version: 
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-nsh-integrity-06 
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : mohamed.boucadair@orange.com
> > [mailto:mohamed.boucadair@orange.com]
> > Envoyé : vendredi 25 juin 2021 11:56
> > À : Jürgen Schönwälder <j.schoenwaelder@jacobs-university.de>de>; ops-
> > dir@ietf.org
> > Cc : draft-ietf-sfc-nsh-integrity.all@ietf.org; last-call@ietf.org;
> > sfc@ietf.org
> > Objet : RE: Opsdir last call review of draft-ietf-sfc-nsh-integrity-
> > 05
> > 
> > Hi Jürgen,
> > 
> > Thank you for the review. You can track the changes at:
> > https://tinyurl.com/nsh-integrity-latest
> > 
> > Please see inline.
> > 
> > Cheers,
> > Med
> > 
> > > -----Message d'origine-----
> > > De : Jürgen Schönwälder via Datatracker [mailto:noreply@ietf.org]
> > > Envoyé : vendredi 25 juin 2021 10:18 À : ops-dir@ietf.org Cc :
> > > draft-ietf-sfc-nsh-integrity.all@ietf.org; last-call@ietf.org;
> > > sfc@ietf.org Objet : Opsdir last call review of
> > > draft-ietf-sfc-nsh-integrity-05
> > >
> > > Reviewer: Jürgen Schönwälder
> > > Review result: Has Issues
> > >
> > > The document is very well written and organized, thanks for that.
> > I
> > > have some comments and a few nits. The issues I have a minor, I
> > think
> > > the document overall is in a good shape.
> > >
> > > - From an operational perspective, I very much appreciate that
> > there
> > >   is some text discussing error and failure reporting and that
> > there
> > >   are some MTU configuration guidelines.
> > >
> > > - The document claims:
> > >
> > >     As depicted in Table 1, SFFs are not involved in data
> > encryption.
> > >     This document enforces this design approach by encrypting
> > Context
> > >     Headers with keys that are not supplied to SFFs, thus
> > enforcing
> > > this
> > >     limitation by protocol (rather than requirements language).
> > >
> > >   I am a bit puzzled about this statement since a protocol
> > definition
> > >   at the end is just some form of requirements language.
> > 
> > [Med] FWIW, that sentence was drawn compared to an alternative
> > design we considered in the past (use of AEAD which relies upon a
> > single key for both encryption and integrity) and for which we
> > indicated the following at that time:
> > 
> >       In order to avoid the overhead of multiple authentication tags
> > and
> >       multiple keys, and to prevent SFFs from acquiring the secret
> > key
> >       to decrypt the metadata, the recommendation is not to
> > integrity
> >       protect the base header.  Such approach does not require to
> >       recompute the MAC each time TTL is decremented by an SFF.  As
> > a
> >       reminder, an SFF is not supposed to act on the metadata or
> > look
> >       into the content of the metadata.
> > 
> > We were concerned with relying on the requirement language (mainly
> > the last sentence) for the correct protocol behavior. We changed the
> > design so that the limitation is imposed by the protocol: use
> > distinct keys for encryption (ENC_KEY) and integrity (MAC_KEY).
> > 
> > We do have the following:
> > 
> >    The other advantage is
> >    that SFFs do not have access to the ENC_KEY and cannot act on the
> >    encrypted Context Headers and, only in case of the second level
> > of
> >    assurance, SFFs do have access to the MAC_KEY.  Similarly, an
> > NSH-
> >    aware SF or SFC Proxy not allowed to decrypt the Context Headers
> > will
> >    not have access to the ENC_KEY.
> > 
> > but ...
> > 
> >  Well,
> > > putting
> > >   that remark aside, I do not really see anything in the
> > specification
> > >   that ensures that SFFs won't get the keys. We also read:
> > >
> > >     [...] Encryption keying material is only provided to
> > >     these SFC data plane elements.
> > >
> > >   Well, the specification is actually silent about how keys are
> > >   distributed. Section 4.4. says:
> > >
> > >     The procedure for the allocation/provisioning of secret keys
> > (K)
> > > and
> > >     authenticated encryption algorithm or MAC_KEY and HMAC
> > algorithm
> > > is
> > >     outside the scope of this specification.  As such, this
> > > specification
> > >     does not mandate the support of any specific mechanism.
> > >
> > >   To me, it seems the claims made in section 4.4. do not really
> > hold.
> > 
> > [Med] ... I agree that we still depend on the provisioning. Removed
> > that sentence.
> > 
> > >
> > > - In section 6, you picked as the epoch 1970-01-01T00:00Z while
> > NTP
> > >   uses the epoch 1900-01-01T00:00Z. This leads to rollovers in the
> > >   year 2106 for your timestamps while the NTP rollover would be in
> > >   2036. Given that you use an NTP compatible format and a
> > different
> > >   epoch, I think this deserves to be spelled out explicitly so
> > that
> > >   people understand that they have to do conversions.
> > >
> > >   (Alternatively, you could adopt the epoch NTP is using and the
> > need
> > >   for conversions goes away at the price of an earlier rollover.)
> > >
> > >   Anyway, what I am saying is that if you pick a different epoch,
> > I
> > >   suggest to spell this out explicitly and to not rely on
> > >   implementers to discover this.
> > >
> > 
> > [Med] Fair point. Added a note.
> > 
> > > Minor nits:
> > >
> > > - In section 5.2, it should say:
> > >
> > >   OLD
> > >
> > >   In reference to Figure 5
> > >
> > >   NEW
> > >
> > >   In reference to Figure 7
> > >
> > 
> > [Med] For both 5.1 and 5.2 we provide a reference to the figure with
> > the format of the context header (i.e., Figure 5). Figures 6/7 cover
> > the NSH header and so on.
> > 
> > > - In section 7.3, I suggest this change to make it clear again to
> > the
> > >   reader what K is:
> > >
> > >   OLD
> > >
> > >   Using K and
> > >
> > >   NEW
> > >
> > >   Using the secret key K and
> > 
> > [Med] Fixed. Thanks.
> > 
> > 
> > ____________________________________________________________________
> > _____________________________________________________
> > 
> > Ce message et ses pieces jointes peuvent contenir des informations
> > confidentielles ou privilegiees et ne doivent donc pas etre
> > diffuses, exploites ou copies sans autorisation. Si vous avez recu
> > ce message par erreur, veuillez le signaler a l'expediteur et le
> > detruire ainsi que les pieces jointes. Les messages electroniques
> > etant susceptibles d'alteration, Orange decline toute responsabilite
> > si ce message a ete altere, deforme ou falsifie. Merci.
> > 
> > This message and its attachments may contain confidential or
> > privileged information that may be protected by law; they should not
> > be distributed, used or copied without authorisation.
> > If you have received this email in error, please notify the sender
> > and delete this message and its attachments.
> > As emails may be altered, Orange is not liable for messages that
> > have been modified, changed or falsified.
> > Thank you.
> 
> 
> _________________________________________________________________________________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
> 

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>