Hi Christian, Thank you for the review. Please see inline. Cheers, Med > -----Message d'origine----- > De : Christian Huitema via Datatracker [mailto:noreply@xxxxxxxx] > Envoyé : dimanche 4 octobre 2020 01:20 > À : secdir@xxxxxxxx > Cc : opsawg@xxxxxxxx; last-call@xxxxxxxx; draft-ietf-opsawg-model- > automation-framework.all@xxxxxxxx > Objet : Secdir last call review of draft-ietf-opsawg-model- > automation-framework-06 > > Reviewer: Christian Huitema > Review result: Has Issues > > The document proposes an architecture for describing and > provisioning services such as L3VPN or L2VPN. This is an ambitious > architecture, aiming at providing end-to-end services over > concatenations of network services provided by independent > providers. [Med] There is no such assumption in the draft but we can accommodate that case. I am concerned that the model does not expose trust > boundaries during these providers, and that the security section > does not discuss what happens when some providers try to game the > system or otherwise fail to cooperate. [Med] The various blocks discussed in the document are within the scope of the ** same provider **. That's said, if a provider relies upon other providers to deliver a given service, the model will apply in a recursive manner: That is, a network can act as a "customer" and request services from other networks. The peer network will then follow the various levels depicted in the architecture to deliver the service. Any failure of a peer provider to deliver an agreed service is a violation of the service level agreement. Such violation is detected by means of the service fulfilment/assurance and appropriate counter-measures will be followed. These counter-measures may be technical (switch to another provider) and/or contractual (penalties). We can add the following: A provider may rely upon services offered by other providers. Appropriate mechanisms should be enabled by the provider to monitor and detect a service disruption from these providers. The characterization of a service disruption (including, mean time between failures, mean time to repair), the escalation procedure, and penalties are usually documented in contractual agreements. Misbehaving peer providers will thus be identified and appropriate countermeasures will be applied. > > The architecture organizes functions in three levels, service, > network and device. Creation of services will trigger requirements > on the networks, and then configuration of devices. Performance > monitoring at the device level will inform service assurance and > service optimizatio at the network level, and service assurance, > optimization and diagnostic at the service level. The configurations > and the performance measurements are described using Yang models. > > The Yang modules are designed to be accessed through secrure > protocols, such as NETCONF over SSH or RESTCONF over HTTPS. This > provides authentication of the servers and protection of the data, > and allows implementation of access control. That's a good basis, > but these processes only secure "point to point" > interfaces between functions in the system. This presupposes honest > cooperation between all actors, despite the fact that those actors > often are in competition. > > The security considerations consider misconfiguration attacks such > as the creation of forwarding loops, leakage of sensitive > information, and traffic isolation issues. These are all interesting > issues, but they are only mentioned in the architecture document as > guidelines for the future development of actual services. I think > issues such as the protection of sensitive information should be > developed in the model itself, because they are generic. [Med] It is up to each individual model to call out those, not this document. The > document articulates a hierarchy of Yang modules. Why does it not > articulate the trust boundaries between the different actors? [Med] Because the focus is on what happens within ** a single provider **. The interaction with other providers is no more than a provider acting as a "customer" for a service offered by another provider. The customer-facing interface is out of scope. We think this this now clarified with the review from Brian. > > In addition to three classes of issues listed in the security > considerations, I am also concerned with possibilities of retaining > or falsifying data. What if an actor hides or fakes performance > monitoring data, either out of malice or due to faulty equipement? [Med] All the levels are under the responsibility of the same provider. An underlying level can report performance data but the above level can also proceed with OAM checks as per Section 4.1.4. Anomalies can thus be detected locally. > Will that disrupt the provision of the services? What tools are > available to detect such behavior? What if a network provide > overpromises, in order to attract contracts? I understand that the > ultimate remedies lies in contract obligations and contract > enforcement, but that enforcement has to be based on data. How is > the architectur organizing the collection of the data? [Med] This is the role of the assurance functions. See also the NEW text suggested above. > > On a side note, I find that this architecture cites a large number > of other drafts such as evpn, l2vpn, l3vpn, etc. These drafts in > turn presumably cite the architecture, thus forcing the RFC > production to organize all of them in a large publication cluster. > Is it really required for the architecture document to cite all the > documents that will later use it? [Med] None of these drafts is normative. There is not risk to create a publication cluster. _________________________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you. -- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call