Re: [Last-Call] Review of draft-ietf-ippm-ioam-data-11

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Shawn,

 

Thanks – will do. I’ve also added https://github.com/inband-oam/ietf/issues/205 to ensure we add an informative reference to draft-brockners-opsawg-ioam-deployment when we create the next rev of draft-ietf-ippm-ioam-data.

 

Cheers, Frank

 

From: Shawn Emery <shawn.emery@xxxxxxxxx>
Sent: Samstag, 19. Dezember 2020 07:11
To: Frank Brockners (fbrockne) <fbrockne@xxxxxxxxx>
Cc: secdir <secdir@xxxxxxxx>; draft-ietf-ippm-ioam-data.all@xxxxxxxx; last-call@xxxxxxxx
Subject: Re: Review of draft-ietf-ippm-ioam-data-11

 

Hi Frank,

 

This sounds good to me.  Just let me know when the revision is ready for review and please update draft-ietf-ippm-ioam-data with an informative reference to the BCP draft.

 

Thanks,

 

Shawn.

--

 

On Fri, Dec 18, 2020 at 1:33 AM Frank Brockners (fbrockne) <fbrockne@xxxxxxxxx> wrote:

Hi Shawn,

 

Thanks for reviewing draft-brockners-opsawg-ioam-deployment-02 – which is still evolving. I agree that it does not cover mitigation considerations for all the potential threats/attacks. I’ve just created an issues so that we’ll tackle it in the next rev of the doc: https://github.com/inband-oam/ietf/issues/204

 

Thanks again, Frank

 

From: Shawn Emery <shawn.emery@xxxxxxxxx>
Sent: Freitag, 18. Dezember 2020 07:36
To: Frank Brockners (fbrockne) <fbrockne@xxxxxxxxx>
Cc: secdir <secdir@xxxxxxxx>; draft-ietf-ippm-ioam-data.all@xxxxxxxx; last-call@xxxxxxxx
Subject: Re: Review of draft-ietf-ippm-ioam-data-11

 

Hi Frank,

 

Thanks for your response.  I've read draft-brockners-opsawg-ioam-deployment-02 and still have concerns that mitigating against eavesdropping, DoS/DDoS, and time synchronization attacks, have not been sufficiently covered specifically regarding the data tuple vector.

 

Regards,

 

Shawn.

--

 

On Thu, Dec 17, 2020 at 4:25 AM Frank Brockners (fbrockne) <fbrockne@xxxxxxxxx> wrote:

 

Hi Shawn,

 

Thanks a lot for your review. Please see inline (..FB)

 

From: Shawn Emery <shawn.emery@xxxxxxxxx>
Sent: Sonntag, 6. Dezember 2020 23:31
To: secdir <secdir@xxxxxxxx>
Cc: draft-ietf-ippm-ioam-data.all@xxxxxxxx; last-call@xxxxxxxx; Shawn Emery <semery@xxxxxxxx>
Subject: Review of draft-ietf-ippm-ioam-data-11

 

Reviewer: Shawn M. Emery
Review result: Ready with nits

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written primarily for the benefit of the security
area directors. Document editors and WG chairs should treat these
comments just like any other last call comments.

This standards track draft specifies data fields in the In-situ Operations, Administration,

and Maintenance (IOAM) scheme.  The data fields contain operational and telemetry

information in a network domain.  "In-situ" refers to the fact that the associated data is

actually encapsulated in the data packet itself rather than through a separate OAM

packet.


The security considerations section does exist and describes multiple vulnerabilities

to the IOAM.  Attackers can create both false-positives and false-negatives in regards

to failures or the true state of the domain.  This can eventually lead to DoS attacks.

Another form of DoS is by crafting an IOAM header to packets thereby increasing the

resources required or exceeding the packet beyond the network's MTU size.

 

Verifying the path of the data packets is deferred to draft-ietf-sfc-proof-of-transit's security

consideration section which has good coverage and ways to mitigate the various attacks

on the protocol.  Eavesdropping is also possible, which can reveal operational and telemetry

data of the network domain.

 

IOAM also utilizes timestamps, in which an attack on the time synchronization protocol can

affect the timestamp fields in IOAM.  In addition the management functionality of IOAM could

also be targeted, but suggests authentication and integrity checks to protect against said attacks.

 

Various measures against these attacks are not prescribed based on the fact that this specification

is about the data fields of IOAM.  However, I think it would be beneficial to provide some guidance

(at least for future specifications) for each of these attacks that utilize these data fields else why

articulate the security issues at all?

..FB: “…some guidance for each of the attacks…” very much hints at deployment considerations for IOAM. For that, we have an “IOAM Deployment” draft: https://tools.ietf.org/html/draft-brockners-opsawg-ioam-deployment-02 in flight. The current thought model is cover all aspects of IOAM deployment, including guidance on mitigating security concerns, in this deployment draft. Would that be a workable approach for you?

 

Thanks, Frank


General comments:

None.


Editorial comments:

 
None.
 

Shawn.
--

-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux