Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)

Alvaro Retana <aretana.ietf@gmail.com> Mon, 12 July 2021 19:29 UTC

Return-Path: <aretana.ietf@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E48643A126D; Mon, 12 Jul 2021 12:29:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.196
X-Spam-Level:
X-Spam-Status: No, score=-0.196 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Td2IproHC-E; Mon, 12 Jul 2021 12:29:29 -0700 (PDT)
Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15B2C3A129C; Mon, 12 Jul 2021 12:29:26 -0700 (PDT)
Received: by mail-ed1-x536.google.com with SMTP id s15so29623080edt.13; Mon, 12 Jul 2021 12:29:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:in-reply-to:references:mime-version:date:message-id:subject:to :cc; bh=OqHSkBgwTpIHpDbM1Dg7Krf7Igxydn/1i4j/DyPm4xU=; b=YAiJzElD6tLl78CbHs3J2+BUST97tgpUpQFFFhjCuZDrXpQVS5qWX30bYTlyOAiTRn HGJTofiAjCfc47pHaJQptTktRfMds7bPTM3bgwZEA/XoQC7y6uYzW3e5bgdUWlZy4cV4 +O1niqB3ScI6uogKiSDpmFHiWELq1ROs7HmFZRnvQhZUQyVwMuPrS5RAafhuQTiSEVU3 iiZKZgyqi5QRZ1g+qDx6vq3gNSJE+KPT87dWSaEgidmU1SVIqnKTuNTOdknwdF6m/Og4 gPxRZ/RO1TYKuCngXk/+Ij2KlO9NQ6gJtdAq95WvFCZeoS4gcnQzBcUSZ1HVJ8o3Izsz FVZA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:in-reply-to:references:mime-version:date :message-id:subject:to:cc; bh=OqHSkBgwTpIHpDbM1Dg7Krf7Igxydn/1i4j/DyPm4xU=; b=OBrMvivOOJbC3PWjKquxoHqVXZJgREvwgsuVltTVJ6g57gTkydUzwFH86mEp8RbxN+ QKkM10IXzsfjzIeRMvQix+xITVFFiYI+4NbT5eMMr3QwARR05JMVez6cmHl2PkBdWl9I 9mfAsoVa86BLx5MaGgrx/dgb/lA75J0OZNF6rc6kte7Frk0lOZfmqRBUdJw+rUYsm7F6 dmEUVijpcSJtNzLHrO5F3ZiupU7B1wK8TwAeQR0SmcR3xYl3yhgS4FBnN9Zg3YN+daoW 1nulzyH39njXlRb+atQdIJ8DbIcLBZcPEcAMvjOEseXIPfqKcIdGLhJtuti0NnAoE002 oehw==
X-Gm-Message-State: AOAM533jZPlokgKg0+2m7Xz/6dGhw/z4GEJTWkVDO2d8Y7wZaFHJEBQ7 3ifrMvmq3vPhipwRJxYdBm9mnrXbuSEjzQF5Rwtu/k1TJrY=
X-Google-Smtp-Source: ABdhPJzRmYPWDouBH5/+pGz8iMZrjQRdaYFBMWZe7Xmfztr/JLFBzN7Ht3gcVRny5/hUPbEU15S6SO01gJ6BgMLgXBE=
X-Received: by 2002:a05:6402:1692:: with SMTP id a18mr544555edv.344.1626118163690; Mon, 12 Jul 2021 12:29:23 -0700 (PDT)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Mon, 12 Jul 2021 12:29:23 -0700
From: Alvaro Retana <aretana.ietf@gmail.com>
In-Reply-To: <f5961690-4496-7f85-74ca-f3705d5a1c2e@joelhalpern.com>
References: <162611498183.7775.3562397379733537345@ietfa.amsl.com> <f5961690-4496-7f85-74ca-f3705d5a1c2e@joelhalpern.com>
MIME-Version: 1.0
Date: Mon, 12 Jul 2021 12:29:23 -0700
Message-ID: <CAMMESszF+jc7WKkAwmzAFs0A7bsDqXJKA3p5+cyexdU3fvNnDQ@mail.gmail.com>
To: The IESG <iesg@ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>
Cc: sfc@ietf.org, gregimirsky@gmail.com, draft-ietf-sfc-nsh-integrity@ietf.org
Content-Type: multipart/alternative; boundary="0000000000008278a405c6f2233a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/tnT4d36XMXHeGB0qGnt-oM6aNK8>
Subject: Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jul 2021 19:29:39 -0000

Joel:

Hi!

I guess I missed where that discussion happened — probably buried in one of
the threads.  Can you please point me to it?

Thanks!

Alvaro.

On July 12, 2021 at 3:23:28 PM, Joel M. Halpern (jmh@joelhalpern.com) wrote:

I find your description of this as a "required update to 8300" rather
odd. The working group did not agree to make implementation of this
mandatory for 8300. That would, indeed, be an update to 8300. This is
just another feature that can be used with NSH. A useful feature.

The security considerations do give lots of reasons to do this. But that
is not the same as making it "required" for all implementations of 8300.

Yours,
Joel

On 7/12/2021 2:36 PM, Alvaro Retana via Datatracker wrote:
> Alvaro Retana has entered the following ballot position for
> draft-ietf-sfc-nsh-integrity-06: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-integrity/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
>
> (1) Given the required behavior specified in the Security Considerations
> section...
>
> NSH data are exposed to several threats:
>
> o A man-in-the-middle attacker modifying the NSH data.
>
> o Attacker spoofing the NSH data.
>
> o Attacker capturing and replaying the NSH data.
>
> o Data carried in Context Headers revealing privacy-sensitive
> information to attackers.
>
> o Attacker replacing the packet on which the NSH is imposed with a
> bogus packet.
>
> In an SFC-enabled domain where the above attacks are possible, (1)
> NSH data MUST be integrity-protected and replay-protected, and (2)
> privacy-sensitive NSH metadata MUST be encrypted for confidentiality
> preservation purposes. The Base and Service Path headers are not
> encrypted.
>
> Why doesn't this document formally update rfc8300? Concerns that
eventually
> led to this solution have been expressed for several other documents,
including
> rfc8459 and rfc8979.
>
> It looks like the WG didn't consider the question of Updating the base
NSH
> specification. I believe that this document specifies a required update
to
> NSH, and would like the WG to consider formally Updating rfc8300. [My
search
> of the archive didn't find any related discussion -- did I miss it?]
>
> [Even though I consider this omission a serious oversight, I don't think
this
> issue raises to the level of a DISCUSS.]
>
> (2) §3: I find the use of normative language to describe requirements
(that are
> met in this same document) not the best use of rfc2119 language because
any
> interoperability concerns would result from the specification itself and
not
> the requirements.
>
> The use of rfc2119 keywords to describe requirements may result in
confusion.
> For example, "The solution MAY provide integrity protection for the Base
> Header." -- as described later, protecting the Base Header is optional,
but the
> solution *does* provide integrity protection for it. IOW, the
specification is
> what is reflected in the requirement, but referring to the solution, not
the
> protection: providing integrity protection is not optional, using it is.
A
> better working would be: "The solution must provide optional integrity
> protection for the Base Header."
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>