Re: [spring] [Int-area] FW: New Version Notification for draft-raviolli-intarea-trusted-domain-srv6-00.txt

Andrew Alston - IETF <andrew-ietf@liquid.tech> Tue, 28 March 2023 23:19 UTC

Return-Path: <andrew-ietf@liquid.tech>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AD36C151B3F for <spring@ietfa.amsl.com>; Tue, 28 Mar 2023 16:19:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.096
X-Spam-Level:
X-Spam-Status: No, score=-7.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=liquid.tech
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OPMbGjlZS4sM for <spring@ietfa.amsl.com>; Tue, 28 Mar 2023 16:18:58 -0700 (PDT)
Received: from eu-smtp-delivery-182.mimecast.com (eu-smtp-delivery-182.mimecast.com [185.58.86.182]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E70EBC151710 for <spring@ietf.org>; Tue, 28 Mar 2023 16:18:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=liquid.tech; s=mimecast20210406; t=1680045535; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=H8w7rqFcBMJYI8vV6kODm94Hw7lwYeMDK5QYJTe/aDU=; b=MXE5aH5pWgSfddFQUGYY/NzE6Min58cqqZl8UphPIPj2jAETZto7y/t2hyWiOowjlgQcPQ fjieBdo6T+9urDICIO9IQJjjBDziyuoFTPhV2nbY2ESNoAayuOLxnJrEtd4WM89zLp8Xf8 X6/MilcyTRLBJhIX7i/3wdLzLRZ1cGI=
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01lp2054.outbound.protection.outlook.com [104.47.1.54]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id uk-mta-199-D5Oq_XwJOsSojH3-Ni_uAA-1; Wed, 29 Mar 2023 00:18:52 +0100
X-MC-Unique: D5Oq_XwJOsSojH3-Ni_uAA-1
Received: from DU2PR03MB8021.eurprd03.prod.outlook.com (2603:10a6:10:2dc::9) by AS8PR03MB7464.eurprd03.prod.outlook.com (2603:10a6:20b:2e6::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6222.34; Tue, 28 Mar 2023 23:18:47 +0000
Received: from DU2PR03MB8021.eurprd03.prod.outlook.com ([fe80::71c9:e7bb:29b0:ce67]) by DU2PR03MB8021.eurprd03.prod.outlook.com ([fe80::71c9:e7bb:29b0:ce67%5]) with mapi id 15.20.6222.034; Tue, 28 Mar 2023 23:18:47 +0000
From: Andrew Alston - IETF <andrew-ietf@liquid.tech>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "int-area@ietf.org" <int-area@ietf.org>
CC: "spring@ietf.org" <spring@ietf.org>
Thread-Topic: [Int-area] FW: New Version Notification for draft-raviolli-intarea-trusted-domain-srv6-00.txt
Thread-Index: AQHZX9DwZQdbkYroZU6BTpz45S0Z+68NsKOUgAHIegCAAE0kpQ==
Date: Tue, 28 Mar 2023 23:18:47 +0000
Message-ID: <DU2PR03MB8021F22335D8188DDF20F89BFA889@DU2PR03MB8021.eurprd03.prod.outlook.com>
References: <167982788827.35510.12970049954861648668@ietfa.amsl.com> <DU2PR03MB8021025B3EA4A7567809EC2BFA8A9@DU2PR03MB8021.eurprd03.prod.outlook.com> <072001d9611c$622fd220$268f7660$@olddog.co.uk>
In-Reply-To: <072001d9611c$622fd220$268f7660$@olddog.co.uk>
Accept-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_99ef9a43-ff34-4715-a5f5-dfd82916d644_Enabled=True; MSIP_Label_99ef9a43-ff34-4715-a5f5-dfd82916d644_SiteId=68792612-0f0e-46cb-b16a-fcb82fd80cb1; MSIP_Label_99ef9a43-ff34-4715-a5f5-dfd82916d644_SetDate=2023-03-28T07:00:13.2157963Z; MSIP_Label_99ef9a43-ff34-4715-a5f5-dfd82916d644_ContentBits=0; MSIP_Label_99ef9a43-ff34-4715-a5f5-dfd82916d644_Method=Standard
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR03MB8021:EE_|AS8PR03MB7464:EE_
x-ms-office365-filtering-correlation-id: 62b88bdb-5b34-4307-cfcf-08db2fe2c867
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0
x-microsoft-antispam-message-info: GApoPxqkOzp3VqUmJDsfAtxC2QFu3c2+89yn0w0fzafIhV5vSKCp56vJNKgyI1s9Qsof+yfDICWyjSoRIZCwtOXabcG5j/af3q44bFNCZvk8bJoUYzJ2IBi1/d8O3dOj1sF38GciWGR3hOUtfR72e4M0mNqifCB/eV/zim6aLEHdN+icIkiaYfncOl6I3X1YSx1jRKyU5w5AoCFr1kupPTgvDuB+qDT4w040w1vL2HYBsZm9XWXcmZ1Pt0F7Pawo4Lyj0s/ZAdbJXHnVlfjgbfDjdmXRCeOFr+zvcecEaGntMD7bTeJQHKgWHlkeVIBHfYHJOqozvH2LU/k/qmfHnp6MLhvUVCEs/VWulPm8cW9ezbf5bkTr86bqpbXjiKvz0EBtue+9QcMolmcvZMoislWGfjWQNbId0f0ra1QR9ENybfPhcqHsMMLCpQcOqSRynzM1LfHD7lUKWUDSHhOZi4jHfLCG8ARgxMcRBYc+iRuj/GJ9ZewUeB0Wp7gETR2yAZB4pYfe8IY6s5wAcHVX+FFp7rdpXNquy6zEY/GSOq9JzjXkfnnRM4HJdfafm7iubxhw2O/CPG4/RGT4yQMOwudngG81h8DpzeURpU/ApboAidg0m90nRdACcOWipnXRDfuZFaNLaoWTcHBqhcnNdA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR03MB8021.eurprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(366004)(136003)(396003)(39860400002)(376002)(346002)(451199021)(55016003)(110136005)(66556008)(66476007)(66446008)(64756008)(8676002)(4326008)(91956017)(76116006)(66946007)(316002)(8936002)(5660300002)(38100700002)(41300700001)(52536014)(122000001)(186003)(53546011)(6506007)(9686003)(83380400001)(7696005)(966005)(71200400001)(478600001)(38070700005)(86362001)(166002)(2906002)(15650500001)(33656002)(66899021)(579004); DIR:OUT; SFP:1102
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
MIME-Version: 1.0
X-OriginatorOrg: liquid.tech
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR03MB8021.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 62b88bdb-5b34-4307-cfcf-08db2fe2c867
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Mar 2023 23:18:47.2808 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 68792612-0f0e-46cb-b16a-fcb82fd80cb1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: kzy0tAIWjnVeCfv8bjPBcIghn9w7Dnx/I8YqlyKW8W5hJOCwAFd8DMGici+4kbY23RrCANELpy+yU8LlIj2F8g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB7464
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: liquid.tech
Content-Language: en-GB
Content-Type: multipart/alternative; boundary="_000_DU2PR03MB8021F22335D8188DDF20F89BFA889DU2PR03MB8021eurp_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/fIxd5Uiua_i98WrpIpi3SQ3d1jY>
Subject: Re: [spring] [Int-area] FW: New Version Notification for draft-raviolli-intarea-trusted-domain-srv6-00.txt
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Mar 2023 23:19:03 -0000

Hi Adrian (and Joel since I will respond to both in one email)

Thanks for the comments and detailed review – its hugely appreciated.  The authors are looking at these comments and will hopefully be pushing out a -01 draft in the next 24 hours, this will aim to address many of the nits and Joel’s comments in one update.

On your first comment regarding a protocol number.  Keep in mind that should a node be designed as using TD-SRv6, effectively what will happen is that on decapsulation of the tunnel, srv6 processing would not actually occur, since on a node enabled for td-srv6 srv6 processing will only happen on packets that contain the new ethertype.

This does however need some thought as to how to enable srv6 processing of traffic inbound on a particular tunnel mechanism, and that may be best handled in subsequent drafts relating to the specific tunnel types, such that traffic coming in across a particular tunnel will be processed as srv6 traffic on a td-srv6 enabled node.  I would suggest that we detail this case in the draft with an explicit note that srv6 tunneled traffic need to be handled by mechanisms out of scope of this draft.  An example of this would be in GRE – which may need a separate draft with an additional code point to tag inbound traffic for SRv6 processing.

With regards to traffic being sent using another ethertype – I think the draft needs to be more explicit that traffic with a DA of a SID will not be treated as SRv6 absent the specified ethertype – it will be treated and handled as standard IPv6.  As such the security issue we are aiming to address will be not triggered by this particular case.  We will add some text to this effect.

I also agree with Joel’s two comments and we will address that in the -01 as well

Thanks

Andrew


From: Adrian Farrel <adrian@olddog.co.uk>
Date: Tuesday, 28 March 2023 at 11:24
To: Andrew Alston - IETF <andrew-ietf@liquid.tech>, int-area@ietf.org <int-area@ietf.org>
Cc: spring@ietf.org <spring@ietf.org>
Subject: RE: [Int-area] FW: New Version Notification for draft-raviolli-intarea-trusted-domain-srv6-00.txt
[Spring cc’ed because, well, you know, SR. I wonder whether 6man and 6ops should care as well.]

tl;dr
I think this is a good initiative and worth discussion. Thanks
for the draft.

I am particularly reminded of two MPLS-related discussions:
- The first was the introduction of Ethertype 8848 for MPLS
  source-assigned labels. This is a good example of a protocol
  variant/extension using a different Ethertype in order to
  facilitate easy distinction between data packets.
- The second was the discussion of using a different Ethertype
  for T-MPLS when the early proposals for what became MPLS-TP
  were sufficiently different to base MPLS that there were
  concerns about interop and leakage problems. In the end, a
  new Ethertype was now assigned because the protocol was
  modified in a way that made it safe to coexist with MPLS.

In my comments below, I call out one point which is important
enough to feature up here. I think you also need a new IP protocol
number to handle "discovered SR". That is, if an SR packet is
encapsulated in an IP header, it is important that it is clear
that the payload is an SR packet (otherwise, I can tunnel SR into
the middle of your network representing it as native IP).

I would note that this Ethertype solution, and my proposed new
IP protocol number are not "secure" solutions. That is, for example,
an SR packet could still be sent using 86DD and the receiver will not
know the difference unless they dig for the SRH and then complain
about it. So while this document can require or recommend the use of
a new Ethertype, making this a security feature would still require
"edge" nodes to inspect packet contents of everything coming in as
86DD. Of course, using a new Ethertype *will* help considerably with
misconfiguration and accidents.

Cheers,
Adrian

==Nitz and Discuzzion==

Please use the correct BCP 14 boilerplate

---

This document does not specify a "standard". Maybe move to "This
document specifies a solution..."

---

Why "Fail-Closed Protocol (FPC):" and not FCP?

---

Abstract and Introduction have "known security problems", but section 3
is "The SRv6 Security Problem" in the singular.

---

3.

   SRv6 relies in its architecture on the concept of limited domain
   which as a concept suffers from lack of security that is deployable
   in economical, scalable fashion easily.

I think it would be helpful to reference the definition of "Segment
Routing domain (SR domain)" in 8402 section 2.

---

3.

   The proper solution is to create a trusted domain that has a default
   fail-closed approach and a well-defined trusted/untrusted boundary.

I wonder whether "the proper solution" is a little strong and likely to
cause undue debate. Perhaps "An established and proven solution..."

---

3.

I think that a valuable example to add to your list is "MPLS with
upstream-assigned label" because this is exactly an example of an
extended use of an established protocol that significantly benefited
from the use of a different Ethertype.

Further, your list might be better if restricted to IETF protocols.
Perhaps add Trill (there are at least 3 Ethertypes) and PPP, but leave
out LLDP (IEEE) and CLNS (not got an Ethertype at all?)

---

"fail closed protocol domain"

Please be consistent with capitalisation and hyphenation.
Please decide "fail-closed domain" or "fail-closed protocol domain".

Ditto "fail-closed protocol"

---

4.

   Processing of the protocol packet on an interface requires explicit
   configuration with a default drop behavior.

Somewhere (6.1?) you need to state (with a reference) that the correct
default behavior for an unknown/unsupported Ethertype is packet (frame)
drop. It would clearly be a bad solution if the processing required a
marching band and streamers.

---

4.

   Leaking according protocol packets beyond the boundary of fail-closed
   domain requires explicit config.

Cannot reliably parse.

---

4.

   Fail closed protocols are easily identifiable by their top level
   (e.g. link layer) encoding early in the packet formats and often by
   fields at fixed offset.

"Top level encoding" is perhaps not as clear as "outer encapsulation"

---

4.

   Classification of the protocol packets is completely deterministic.

This voice is passive. Who is doing the classification?

---

5.  SRv6 in the context of a trusted domain - an objective analysis

You saying other analysis work is not objective? ;-)

---

5.

   It is currently impossible to differentiate SRv6 and IPv6 at the
   link-layer or easily at network layer by e.g. a reserved protocol
   number as IPSec does.

"Currently" is not survivable language because, if this document becomes
an RFC it will no longer be true.

This is a somewhat confusing (to me) paragraph. Are you referring to the
ESP and AH assigned protocol numbers? I don't think there is a separate
Ethertype for IPsec (although I may be wrong). So it is possible you are
comparing and contrasting Ethertype with "next protocol" which is not
quite a fair comparison. Indeed, using a new protocol number for SR
would not solve the problem because it is the outer IP encapsulation
that is what matters. (Although, if you go ahead with this, you also
need to think about "SR-in-IP" encapsulations, so you *do* need to also
assign a new protocol number to handle "discovered SR".

---

I wish 7.2 had a few more words! And maybe somewhere else in the
document should observe that IEEE manages the Ethertype registry.

"TBD0" is not mentioned anywhere in the document. It should be.

From: Int-area <int-area-bounces@ietf.org> On Behalf Of Andrew Alston - IETF
Sent: 27 March 2023 00:17
To: int-area@ietf.org
Subject: [Int-area] FW: New Version Notification for draft-raviolli-intarea-trusted-domain-srv6-00.txt

Hi All,

This is just a notification of publication of the -00 draft referred to in the subject.

We, as the authors, welcome any discussions around this draft and look forward to receiving feedback from the working group.

Thanks

Andrew.



Subject: New Version Notification for draft-raviolli-intarea-trusted-domain-srv6-00.txt

A new version of I-D, draft-raviolli-intarea-trusted-domain-srv6-00.txt
has been successfully submitted by Andrew Alston and posted to the
IETF repository.

Name: draft-raviolli-intarea-trusted-domain-srv6
Revision: 00
Title: Trusted Domain SRv6
Document date: 2023-03-26
Group: Individual Submission
Pages: 6
URL: https://www.ietf.org/archive/id/draft-raviolli-intarea-trusted-domain-srv6-00.txt<https://www.ietf.org/archive/id/draft-raviolli-intarea-trusted-domain-srv6-00.txt>
Status: https://datatracker.ietf.org/doc/draft-raviolli-intarea-trusted-domain-srv6/<https://datatracker.ietf.org/doc/draft-raviolli-intarea-trusted-domain-srv6>
Htmlized: https://datatracker.ietf.org/doc/html/draft-raviolli-intarea-trusted-domain-srv6<https://datatracker.ietf.org/doc/html/draft-raviolli-intarea-trusted-domain-srv6>


Abstract:
SRv6 as designed has evoked interest from various parties, though its
deployment is being limited by known security problems in its
architecture. This document specifies a standard to create a
solution that closes some of the major security concerns, while
retaining the basis of the SRv6 protocol.





The IETF Secretariat


Internal All Employees


Internal All Employees