Yoav - Thanx for the review. I'll preface my remarks by saying I am a big believer in modularity. If a referenced document has already covered an issue I strongly believe we are better off referencing that document than trying to repeat/restate what the referenced
document has said. There are only two things that can happen when we repeat/restate: 1)We are redundant 2)We introduce ambiguity Neither of these is desirable. Responses inline. > -----Original Message----- > From: Yoav Nir <ynir.ietf@xxxxxxxxx> > Sent: Tuesday, October 16, 2018 2:18 PM > To: secdir@xxxxxxxx > Cc: idr@xxxxxxxx; ietf@xxxxxxxx; draft-ietf-idr-te-pm-bgp.all@xxxxxxxx > Subject: Secdir early review of draft-ietf-idr-te-pm-bgp-13 > > Reviewer: Yoav Nir > Review result: Has Nits > > This is an early review with a specific request to review the Security > Considerations section. > > The draft adds a bunch of TLVs to be sent from routers regarding the link > state of the link used for IGP. The draft references RFC 7752 which defined > earlier TLVs used to carry NLRI (reachability) information. > > What I found difficult about both 7752 and this draft is the vagueness about > who the consumer of this information is. The abstract of 7752 begins like this: > "In a number of environments, a component external to a network is called > upon to perform computations based on the network topology and current > state of the connections within the network, including Traffic Engineering > (TE) information." There is also a diagram with information flowing to a > "consumer" > and that's it. Is it an SDN controller? Some kind of application? > [Les:] The diagram you are referring to seems most likely to be in RFC 7752 since there is no such diagram in this draft. Which leads me to say if you feel this is insufficient then it needs to be taken up in the context of RFC 7752 - not this draft. Hopefully this makes sense to you as well. > OK. On to the Security Considerations section. It begins with a statement that > this does not affect the security model of BGP. Although that is just claimed > and not supported in text, it seems reasonable. I should note that this > paragraph is copied from 7752. > > The second (and last) paragraph in the security considerations section talks > about the new attributes. It mentions that security and authentication are > assumed to be used just as in RFCs 7810 and 7471. With proper > authentication this information is not sent except to the proper consumer. > However, there is an important difference that I think needs to be > addressed. 7810 and 7471 are about IS-IS and OSPF respectively. There > routing protocols are typically used in closed environments, and the Security > Considerations of 7810 state that explicitly. BGP (the subject of this > document) is different in that it is typically used all over the Internet. Without > further clarity about who and where the "consumer" is, it has to be assumed > that the information might at least leak out. > [Les:] I think you have misinterpreted this paragraph. (emphasis added below) " The IGP instances originating these TLVs are assumed to have all the required security and authentication mechanism (as described in [RFC7810] and [RFC7471]) in order to prevent any security issue when propagating the TLVs into BGP-LS." What we are stating here is that when the IGP advertisements are sent the security/authentication mechanisms specified in the IGP drafts applies. This is NOT trying to apply RFC7810/RFC7471 to the new BGP advertisements. The security issues related to the new BGP advertisements are discussed in the previous paragraph. > Another issue I have with this section is that the draft specifies how to send > new information (the link state TLVs) from one node to another. This is > information that was not sent before. When a change like that is made, I > think the Security Considerations section should justify why it is OK to > distribute this information. Typically you need to justify that leaking this > information (to the intended recipient or to the rest of the world) does not > (1) make it easier to attack some part of the system, or (2) distributes > privacy-sensitive information, or (3) undermines some other confidentiality > interest. I think it's fairly easy to make the argument that the information in > these TLVs does not do any of the above, but the argument should be made. > The last paragraph in the Security Considerations section of RFC 7752 has just > such an argument. [Les:] Security sections in RFC7810/RFC7471 directly address this point. WE could repeat some of that here – but as per my “opening statement” I am reluctant to do so. What do you think? Les |