Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-oam-packet-02: (with COMMENT)

mohamed.boucadair@orange.com Wed, 15 March 2023 08:17 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BE55C151547; Wed, 15 Mar 2023 01:17:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dj360gCMQvOo; Wed, 15 Mar 2023 01:17:01 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.34]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9E3BC14CF18; Wed, 15 Mar 2023 01:17:00 -0700 (PDT)
Received: from opfednr06.francetelecom.fr (unknown [xx.xx.xx.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr20.francetelecom.fr (ESMTP service) with ESMTPS id 4Pc3CG5bv2z1yZQ; Wed, 15 Mar 2023 09:16:58 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1678868218; bh=Oq4OdymGParwqPhNb2F1AWrasftRwf5kg9kYKI51yuc=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=fB8Odbf/fUrc4xZsTJjXY/UtGbHkATScg/JCNQjLBQls3Xcyl05b54UwoADRKsmb5 rJpybwuoEnhgTp63yYDK115Z1THTh83HeTKfqPpmiifb2JAE+/2v81ub0A98eSMo+a o+fN8604l0qVgs4bWq2aF74Ky6DS/nQvigO95hqBKLCdj474xhbFjDUOipZb/Sh57a x0OgRhM4XPvcpU0KUZrAhQ1jH2reVqV3g/llTYJih3Qk2aNL7HJvLppoEJKHUPi8Jb 9vecPk1P0OBjy3jwsY6kYy64q1Ka1qWDBzzpxqf+VO94qzkDJjLi8mjN+qfkY8Ojdg NC0N3uESwlYRw==
From: mohamed.boucadair@orange.com
To: Alvaro Retana <aretana.ietf@gmail.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-sfc-oam-packet@ietf.org" <draft-ietf-sfc-oam-packet@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "gregimirsky@gmail.com" <gregimirsky@gmail.com>
Thread-Topic: Alvaro Retana's No Objection on draft-ietf-sfc-oam-packet-02: (with COMMENT)
Thread-Index: AQHZVqOxl0F9Y8gJb0ytP7QZiLqgW677am+A
Content-Class:
Date: Wed, 15 Mar 2023 08:16:58 +0000
Message-ID: <12715_1678868218_64117EFA_12715_99_1_87f4c5adbbf0469b95f096a4f0b98191@orange.com>
References: <167881890203.59567.9590061889094198419@ietfa.amsl.com>
In-Reply-To: <167881890203.59567.9590061889094198419@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-03-15T07:00:51Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=1649e20c-9ab6-47c6-8862-1acdd7589fed; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.115.26.52]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/zC-jvmREqw9ZnkXXmZFE2rEZVzw>
Subject: Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-oam-packet-02: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Mar 2023 08:17:05 -0000

Hi Alvaro, 

Thank you for the careful review.  Appreciated as usual!

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Alvaro Retana via Datatracker <noreply@ietf.org>
> Envoyé : mardi 14 mars 2023 19:35
> À : The IESG <iesg@ietf.org>
> Cc : draft-ietf-sfc-oam-packet@ietf.org; sfc-chairs@ietf.org;
> sfc@ietf.org; gregimirsky@gmail.com
> Objet : Alvaro Retana's No Objection on draft-ietf-sfc-oam-packet-
> 02: (with COMMENT)
> 
> Alvaro Retana has entered the following ballot position for
> draft-ietf-sfc-oam-packet-02: No Objection
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-packet/
> 
> 
> 
> ------------------------------------------------------------------
> ----
> COMMENT:
> ------------------------------------------------------------------
> ----
> 
> 
> The 4 initial comments are related to the NEW text in §3.
> 
> (1)
>       Absent explicit configuration, SFFs, SFC-aware SFs, and
>       SFC Proxies SHOULD discard any NSH packets with the O bit
>       set and Next Protocol set to something that is not itself
>       an OAM protocol. This includes discarding the packet when
>       the O bit is set and the Next Protocol is set to 0x01
>       (IPv4), 0x02 (IPv6), 0x03 (MPLS), or 0x05 (Ethernet).
> 
> When is it ok to not discard the packet?

[Med] When there is a local configuration. 

  IOW, why is this action
> recommended
> and not required?

[Med] The discard action is required but only when there is no instruction to do otherwise. We are not using MUST here as I was convinced in the past that constructs such as "MUST xx, except ..." are not correct and this should be "SHOULD". 

> 
> This question came up during the ART review [1], *and* text was
> added about
> optional configuration.  However, the behavior (without explicit
> configuration)
> is still only recommended -- I'd like to understand in which cases
> it is ok to
> not discard by default.
> 
> The opinion in [2] also caught my attention: "I don't have an
> objection to
> discard by default packets with O bit set and next protocol =
> IP/MPLS/Ethernet".
> 
> [1] https://mailarchive.ietf.org/arch/msg/sfc/xkzr-
> BWsTsHT7q6KznMxXveflBw/
> [2] https://mailarchive.ietf.org/arch/msg/sfc/Or3IHPNEP7R-
> NTQlN4PymL0s8tk/
> 
> (2) On the flip side (but independent of the last answer), if
> packets are, in
> fact, dropped (either by default or configuration), a rogue node
> can set the O
> bit while any packet is in transit.  I realize that the document
> says that "The
> O bit MUST NOT be modified along the SFP.", but this threat should
> be added to
> the security considerations for completeness.
> 

[Med] That part was already in RFC8300, and thus this is not listed as a new issue. We point to Section 8 of 8300, which already have the following: 

      Operators SHOULD regularly monitor (i.e.,
      continuously audit) these devices to help ensure compliant
      behavior.

> (3)
>       The processing (including the order) of the SFC OAM data
>       SHOULD be specified in the relevant OAM or Context Header
>       specification.
> 
> Why is this action not required?  Where else would it be
> specified?
> 

[Med] Because there is already a default behavior in RFC8300:

   If no instructions are
   provided and the SFC-aware SF will make use of or modify the specific
   Context Header, then the SFC-aware SF MUST process these Context
   Headers in the order they appear in an NSH packet.


> (4)
> 
>      SFC-aware SF/SFF/SFC Proxy/Classifier implementations that
>      do not support SFC OAM procedures SHOULD discard packets
>      with O bit set, but MAY support a configurable parameter
>      to enable forwarding received NSH OAM packets unmodified
>      to the next element in the chain.
> 
> When is it ok to not discard the packet?

[Med] This text uses "SHOULD .., but MAY" construct rather than "MUST..., but MAY" as in #1. FWIW, we specifically discussed this with Adrian here https://mailarchive.ietf.org/arch/msg/sfc/TeVgb9eNf0-7W9hU7pOMaN6Mmic/.

  IOW, why is this action
> recommended
> and not required?
> 
> This point is related to #1 above, but in this case, the
> recommendation is
> given for SFC data plane elements that do not support SFC OAM
> procedures.
> While this text seems unchanged from rfc8300,

[Med] I confirm that it is inherited from RFC8300.

 what are the odds
> that these
> nodes will support anything related to OAM (including any
> specifications about
> what to do with the O bit)?  I would say "relatively low" -- what
> types of
> "unexpected outcomes for others" can result?  Should they be
> within what a
> rogue node can exploit (either by setting the O bit or ignoring
> this
> specification)?

[Med] We had lengthy discussion in the WG during the development of RFC8300 before we agreed to disable by default when an entity does not support the O bit + leave the assessment out of scope. I don't think we need to reopen this. Thanks.  

> 
> (5) From §5:  "Any data included in an NSH OAM packet SHOULD be
> integrity-protected [RFC9145]."
> 
> Why is this action recommended and not required?

[Med] I remember we discussed this point with you here: https://mailarchive.ietf.org/arch/msg/sfc/rPsqPUisDj3lILJk-CVF-ejBrVg/. Please see also https://mailarchive.ietf.org/arch/msg/sfc/yC-3dN6jvyxZNZY9EYz3XIUlJMs/. The wording in the spec is consistent with the positions expressed there. Thanks.


  §9/rfc9145 lists
> a series of
> threats and then requires integrity protection:
> 
> =====
>    NSH data is exposed to several threats:
> 
>    *  An on-path attacker modifying the NSH data.
> 
>    *  An attacker spoofing the NSH data.
> 
>    *  An attacker capturing and replaying the NSH data.
> 
>    *  Data carried in Context Headers revealing privacy-sensitive
>       information to attackers.
> 
>    *  An attacker replacing the packet on which the NSH is imposed
> with
>       a modified or bogus packet.
> 
>    In an SFC-enabled domain where the above attacks are possible,
> (1)
>    NSH data MUST be integrity protected and replay protected, and
> (2)
>    privacy-sensitive NSH metadata MUST be encrypted for
> confidentiality
>    preservation purposes.  The Base and Service Path Headers are
> not
>    encrypted.
> =====
> 
> Why isn't that same requirement applicable in the NSH OAM case?
> 
> 


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.