Hello, Authors

            I like the way you have the requirements in bullets which is easier 
for discussion. Some comments below:

-       Section 4.3, it seems that "Insecure underlying network" concern is due 
to the connection through the public network. So if there is no connection 
through the public network or if the connection through the public network is 
secured, the underlying network is considered as secured? If yes, there shall 
be an requirement to protect the cross DC traffic.

-       Is an insider attacker in NVA is in the scope of the security 
consideration? Which requirements can help to prevent an insider NVA attacker? 
Please make it clear.

-       Insecure tenant network: why we assume the NVE is accessible to outside 
attackers? Or this is only for some specific use cases? Please make it clear.

-       Section 4.3, is compromised hypervisor in the scope of the security 
consideration?

-       Section 5.1 is for the NVA-NVE interface only?  Otherwise there is 
overlapping with section 5.2.

-       R1 has a mutual authentication requirement on NVO3 devices. But it is 
unclear that this mutual authentication requirement is on both sides or just 
one side? I assume you mean both sides. Please make it clear.

-       R2, are you proposing any authorization mechanisms other than address 
filtering?

-       R4b, it is better to explain how the NVEs may generate a large number 
of responses if 1,2,3 and 4a are all a "MUST" requirements.

-       R5, not clear if this is a requirement on NVE only or both NVA and NVE. 
Is this a requirement on NVA-NVE control plane only? Please make it clear.

-       R5a, per TS key is too much. Do you mean per VN key? Even with per VN 
key, not sure if it is doable. You need key distribution in the NVE before a 
new VN is configured. This is going to add many complicities in the control 
plane signalling. In the current NVA-NVE control plane discussion, there are 
two alternatives. If the NVE is configured by the NVA directly, per VN key does 
not provide mush additional benefits. The NVE authentication and authorization 
shall be good enough. The per-VN key may be needed if NVE-NVE control plane is 
used. However the NVE-NVE control plane is not in the scope of the NVO3 
architecture yet.

-       R6a, it is better to use "should". Data plane has less security risk 
compare to control plane. And this requirement is more important if the tenant 
has a privacy concern.

-       Section 5.1.2: Ingress filtering shall also apply on data plane, not 
only control plane.

-       Section 5.2, assuming you mean the control plane is between the 
hypervisor and the NVE, not the TS-NVE.

-       Both R8 and R9 are proposing using the address filtering for 
authentication and authorization. Any other authorization mechanisms?

-       R11, again, per TS key is too much. If R8/R9/R10 is implemented, the 
control signalling between the hypervisor and the NVE is secured, a compromised 
hypervisor will not be able to impersonate as other hypervisors or NVEs, what 
is the goal to have per TS?

-       R12, this is "should"

-       Any needs to filter the tenant traffic?





Have a nice day

Zu Qiang





>-----Original Message-----

>From: [email protected] [mailto:[email protected]] On Behalf Of

>[email protected]

>Sent: Tuesday, October 22, 2013 11:11 AM

>To: [email protected]

>Cc: [email protected]

>Subject: [nvo3] I-D ACTION:draft-ietf-nvo3-security-requirements-01.txt

>

>A new Internet-Draft is available from the on-line Internet-Drafts directories.

>This draft is a work item of the Network Virtualization Overlays Working Group

>of the IETF.

>

>    Title         : Security Requirements of NVO3

>    Author(s)     : S. Hartman, et al

>    Filename      : draft-ietf-nvo3-security-requirements

>    Pages         : 16

>    Date          : 2013-10-22

>

>   The draft provides a list of security requirements to benefit the

>   design of NOV3 security mechanisms.  In addition, this draft

>   introduces the candidate techniques which could be used to fulfill

>   such security requirements.

>

>

>A URL for this Internet-Draft is:

>http://www.ietf.org/internet-drafts/draft-ietf-nvo3-security-requirements-<http://www.ietf.org/internet-drafts/draft-ietf-nvo3-security-requirements-01.txt>

>01.txt<http://www.ietf.org/internet-drafts/draft-ietf-nvo3-security-requirements-01.txt>

>

>Internet-Drafts are also available by anonymous FTP at:

>ftp://ftp.ietf.org/internet-drafts/

>

>Below is the data which will enable a MIME compliant mail reader

>implementation to automatically retrieve the ASCII version of the Internet-

>Draft.
_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to