Re: [sfc] Roman Danyliw's Discuss on draft-ietf-sfc-nsh-integrity-06: (with DISCUSS and COMMENT)
mohamed.boucadair@orange.com Thu, 15 July 2021 04:48 UTC
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id BB6073A1B84;
Wed, 14 Jul 2021 21:48:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001,
RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001,
UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001]
autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id cvDsVU1lOwTp; Wed, 14 Jul 2021 21:48:30 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.36])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 7AA2E3A1B82;
Wed, 14 Jul 2021 21:48:29 -0700 (PDT)
Received: from opfednr07.francetelecom.fr (unknown [xx.xx.xx.71])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits))
(No client certificate requested)
by opfednr23.francetelecom.fr (ESMTP service) with ESMTPS id 4GQMMD29Jzz5w2K;
Thu, 15 Jul 2021 06:48:24 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com;
s=ORANGE001; t=1626324504;
bh=PGLvL+sF8EDvz+91GKqpL0SYDcDdjXu1L0gxK1rppLw=;
h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version;
b=CspeMwZfit6Qmaasmm1gpy9HuxV2pOUirOomATgvaM4Yz+2zhv4WR84xZ17gLNL0y
4q/V17PpsKvPKFO3Q0nDwLcF3mHzqJMI0GqmabG2QNYYOHTo+Mh/NNAAzl1iFijwn6
7VNK6Nha/vd+o66xQf5TEzJ3hV6Rr6GrgItMUmJgIoda6wrLZUS3MAt0nLtgKeMjFJ
vBqoQOKlxhwShmXDBafprCxeGPm+WSnPerf1izpi1J2SlviQHeSgnhr1dXT6qYbTk/
XS1jnSBAWNXbf+nyPgbxIj48hm4yPmAe2el2lH7dCcUlhPFWKBpVRdqmBupnLgJel5
hq2Ovpe5X9jKA==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.29])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested)
by opfednr07.francetelecom.fr (ESMTP service) with ESMTPS id 4GQMMD1D4rzFpWq;
Thu, 15 Jul 2021 06:48:24 +0200 (CEST)
From: <mohamed.boucadair@orange.com>
To: tirumal reddy <kondtir@gmail.com>, Roman Danyliw <rdd@cert.org>
CC: The IESG <iesg@ietf.org>, "draft-ietf-sfc-nsh-integrity@ietf.org"
<draft-ietf-sfc-nsh-integrity@ietf.org>, "sfc-chairs@ietf.org"
<sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "gregimirsky@gmail.com"
<gregimirsky@gmail.com>
Thread-Topic: Roman Danyliw's Discuss on draft-ietf-sfc-nsh-integrity-06:
(with DISCUSS and COMMENT)
Thread-Index: AQHXeJKM+kghL6GQcEOKgKF5y7vAVKtDdiAg
Date: Thu, 15 Jul 2021 04:48:23 +0000
Message-ID: <23928_1626324504_60EFBE18_23928_377_1_787AE7BB302AE849A7480A190F8B9330353BF404@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <162620296297.3569.2501497601980031548@ietfa.amsl.com>
<CAFpG3gc5_Cr3E-ZvRq6tMYOFRN-D8iHODBzYh5K-xqXQpSES+w@mail.gmail.com>
In-Reply-To: <CAFpG3gc5_Cr3E-ZvRq6tMYOFRN-D8iHODBzYh5K-xqXQpSES+w@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: multipart/alternative;
boundary="_000_787AE7BB302AE849A7480A190F8B9330353BF404OPEXCAUBMA2corp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/ysnkmaPJj3rkJOmjjdszT8uPv1M>
Subject: Re: [sfc] Roman Danyliw's Discuss on
draft-ietf-sfc-nsh-integrity-06: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>,
<mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>,
<mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jul 2021 04:48:35 -0000
Hi Roman, all, A version that addresses your review can be tracked at: https://tinyurl.com/nsh-integrity-latest. Please see inline for two more comments in addition to the clarifications provided by Tiru. Cheers, Med De : tirumal reddy [mailto:kondtir@gmail.com] Envoyé : mercredi 14 juillet 2021 11:28 À : Roman Danyliw <rdd@cert.org> Cc : The IESG <iesg@ietf.org>rg>; draft-ietf-sfc-nsh-integrity@ietf.org; sfc-chairs@ietf.org; sfc@ietf.org; gregimirsky@gmail.com Objet : Re: Roman Danyliw's Discuss on draft-ietf-sfc-nsh-integrity-06: (with DISCUSS and COMMENT) Hi Roman, Please see inline On Wed, 14 Jul 2021 at 00:33, Roman Danyliw via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>> wrote: Roman Danyliw has entered the following ballot position for draft-ietf-sfc-nsh-integrity-06: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-integrity/ ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- ** Section 4.6. This section explains that an upper NSH can be encapsulated in a lower NSH, and that “the Upper-NSH information is carried along the lower-level chain without modification.” I read this to mean that the upper and lower NSH can independently be protected with different keys. The text even helpfully points out that “Keying material used at the upper-level domain SHOULD NOT be the same as the one used by a lower-level domain.” Such a construct suggests that there are multiple MAC/Encrypted Metadata context headers, one for the upper and another for the lower. However, Section 7.1 later notes that “Only one instance of "MAC and Encrypted Metadata" Context Header (Section 5) is allowed.” This seems like conflict. What am I missing? It means only one instance "MAC and Encrypted Metadata" Context Header (Section 5) is allowed in an NSH-level (one instance in the Upper-NSH and another in the Lower-NSH), we will update text for better clarity. ** Section 7.2. On computing the HMAC in an integrity only situation: -- This section defines the MAC as “T = HMAC-SHA-256-128(MAC_KEY, A)”. Previously, A was defined as the Additional Authenticated Data (per Section 4.2). Since this isn’t the AEAD use case, there is no A. It seems that this should be something closer to: “T = HMAC-SHA-256-128(MAC_KEY, <part of the packet you want to hash>)”. Good catch, will update to "T = HMAC-SHA-256-128(MAC_KEY, target NSH data)" -- The text would benefit from a description on how to serialize the packet for hashing. For example, Figure 6 and 7 are helpful logical descriptions of the integrity scope. However, the MAC field itself is depicted as part of the what should get hashed. Should that field be zeroed out? Removed ? Yes, we will update text as follows: The NSH imposer sets the MAC field to zero and then computes the message integrity for the target NSH data (depending on the integrity protection scope discussed in Section 5) using MAC_KEY and HMAC algorithm. It inserts the computed digest in the MAC field in the "MAC and Encrypted Metadata" Context Header. ** Section 9. The attacks discussed in [I-D.nguyen-sfc-security-architecture] are handled owing to the solution specified in this document, except for attacks dropping packets. The above reference highlights the following attackers – “There are many types of compromised switches attack: packet dropping, packet duplicating, packet manipulating, incorrect forwarding, eavesdropping, weight adjusting, man-in-the-middle, state-spoofing, control-channel hijacking, etc.” Per the security services in this document, it doesn’t seem like all are mitigated by this draft as described above: -- packet dropping = noted as not being handled -- packet manipulating, eavesdropping, weight adjusting, man-in the-middle, state-spoofing, and control-channel hijacking = appear to be handled if both security services are applied Yes. -- packet duplicating = this draft doesn’t not provide a standardized approach for mitigating this issue Replay attack is detected using timestamp and recording a unique value within the delta window derived from the NSH data and packet (see https://datatracker.ietf.org/doc/html/draft-ietf-sfc-nsh-integrity#section-7.4). -- incorrect forwarding = doesn’t appear to be mitigated. If the context headers are encrypted, an attacker receiving forwarded NSH from an compromised switch will not be able to decrypt the context headers. [Med] incorrect forwarding is prevented as any manipulation to the service index is detected by SFs. This is already discussed in the text: Also, if SFFs are not involved in the integrity checks, a misbehaving SFF which decrements SI while this should be done by an SF (SF bypass attack) will be detected by an upstream SF because the integrity check will fail. ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- ** Section 1. Thus, the NSH does not have to rely upon an underlying transport encapsulation for security and confidentiality. Isn’t confidentiality just a subset of the provided security properties, or is something else intended? Recommend s/for security and confidentiality/for security/ Yes, I will update the text. ** Section 2. Per “Key Identifier: Is used to identify and deliver keys to authorized entities. See, for example, 'kid' usage in [RFC7635]”. How does a key identifier “delivery keys”? Doesn’t another protocol provide the delivery using the kid as an identifier? Yes, kid is typically used as an identifier by a KMS protocol. ** Section 7.2. How does one serialize the packet data to construct A? Figure 7 is the closest guidance but it includes the MAC itself. The MAC field is set to zero before computing the message integrity, we will update the text. ** Section 7.4. … legitimate duplicate packets will be tagged by NSH-aware nodes involved in that segment as replay packets unless sufficient entropy is added to the duplicate packet. What is the prescribed mechanism to add entropy? Sequence numbers can be used as discussed in the note in Section 7.4 [Med] this can also be handled by SFs themselves. Added this note: “How such an entropy is added is implementation-specific.” ** Section 7.5 When an SFC data plane element receives an NSH packet, it MUST first ensure that a "MAC and Encrypted Metadata" Context Header is included. I was under the impression that the security protections specified in this document were optional in the overall SFC architecture. Is there some caveat to add to this section to reminder readers? Perhaps, “When an SFC data plan element conforms to this specification, it MUST first …” Yes, we will update. ** Section 7.5 and 7.6. What is the error processing for receiving a packet with an unknown key identifier? An error should be logged, we will update the draft. [Med] Updated the text to cover both unknown and invalid kids. ** Section 9. Section 9. Can you further clarify how is the reader supposed to interpret the guidance in RFC4107 which frames its scope as guidelines as to be “... use[d] by IETF working groups and protocol authors who are determining whether to mandate automated key management and whether manual key management is acceptable. Informed judgment is needed.” Does this document take a position on automated vs. manual key management? ** Section 9. Per “The secret key (K) must have an expiration time assigned …”: (I suspect many of these issues are out of scope …) -- who assigns that expiration time (the key management system)? Yes. [Med] And communicated by the control plane. Please refer to this part in the draft: The secret key (K) must have an expiration time assigned as the latest point in time before which the key may be used for integrity protection of NSH data and encryption of Context Headers. Prior to the expiration of the secret key, all participating NSH-aware nodes SHOULD have the control plane distribute a new key identifier and associated keying material so that when the secret key is expired, those nodes are prepared with the new secret key. This allows the NSH imposer to switch to the new key identifier as soon as necessary. It is RECOMMENDED that the next key identifier and associated keying material be distributed by the control plane well prior to the secret key expiration time. -- who knows about that expiration time, is it both the key management system and the participating nodes? If the nodes know the expiration time, should they refuse to decrypt a message with an expired key? This check of expiration is not the Section 7.5 or 7.6 procedures. Yes, a KMS can assign keys for multiple key intervals. ** Section 9. In the spirit of inclusive language, please s/A man-in-the-middle/An on-path-attacker/ Okay. ** Section 9. In an SFC-enabled domain where the above attacks are possible, (1) NSH data MUST be integrity-protected and replay-protected, and (2) privacy-sensitive NSH metadata MUST be encrypted for confidentiality preservation purposes. Related to the COMMENTs raised by Lars and Alvaro. It’s my understanding that the security protections here are optional for the SFC architecture – is this correct? If so, I don’t follow the above guidance. With the exception of “data carried in the context headers having privacy sensitive information”, all SFC-enabled domains have the potential for the above described attacks. It seems like this document is helpfully making integrity, replay and encrypted meta-data a requirement for the entire SFC architecture (without explicitly updating RFC8300) ** Section 9.1 An active attacker can potentially modify the Base header (e.g., decrement the TTL so the next SFF in the SFP discards the NSH packet). In the meantime, an active attacker can also drop NSH packets. The phrase “In the meantime …” suggests that these two active attackers are coordinating. Both of these sentences seem to be describing independent attackers. Yes, I will remove "In the meantime". ==[ Editorial ** Abstract. Typo. This sentence doesn’t parse. OLD Also, this specification allows to encrypt sensitive metadata that is carried in the NSH. NEW Also, this specification allows for the encryption of sensitive metadata that is carried in the NSH. ** Section 1. Editorial. s/to is an information/to is information/ ** Section 1. Editorial. s/This specification fills that gap/This specification fills that gap for SFC/ ** Section 1. Editorial. s/This specification limits thus access/This specification limits access/ ** Section 3. Editorial. s/The NSH allows to share/The NSH shares/ ** Section 4.1.2. Editorial. s/SFFs are not thus provided/SFFs are not provided/ ** Section 4.2. Editorial. Recommend being clearer on the section – s/The authenticated encryption algorithm defined in [RFC7518]/ The authenticated encryption algorithm defined in Section 5.2 of [RFC7518]/; or you could name the algorithm directly with the reference. ** Section 4.4. Editorial. s/Doing so allows to address the problem/Doing so addresses the problem/ Thanks, we will fix all the above nits in the next revision. Cheers, -Tiru _________________________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you.
- [sfc] Roman Danyliw's Discuss on draft-ietf-sfc-n… Roman Danyliw via Datatracker
- Re: [sfc] Roman Danyliw's Discuss on draft-ietf-s… tirumal reddy
- Re: [sfc] Roman Danyliw's Discuss on draft-ietf-s… mohamed.boucadair
- Re: [sfc] Roman Danyliw's Discuss on draft-ietf-s… Benjamin Kaduk
- Re: [sfc] Roman Danyliw's Discuss on draft-ietf-s… tirumal reddy