Excellent points to discuss.

Thank you very much for posting!

> On Mar 21, 2014, at 9:25 AM, Tom Herbert <[email protected]> wrote:
> 
> Looking a some of the proposals related to nvo3, I am concerned that
> assumptions are being baked in that the data center network will
> provide adequate security of a protocol.
> 
>> From geneve draft:
> "Within a particular security domain, such as a data center operated
> by a single provider, the most common and highest performing security
> mechanism is isolation of trusted components."
> 
>> From nsh draft:
> "In many deployments, NSH will be used in a controlled environment,
> with trusted devices (e.g. a data center) thus mitigating the risk of
> unauthorized header manipulation."
> 
> This seem to be punting the security of a protocol to be someone
> else's problem. Even in the data center, our security threats are
> increasing and obviously the push to allow third party code to run in
> that environment probably increases the threats by an order of
> magnitude.
> 
> Here are some perspectives from a large deployment:
> 
> 1) Given the value of the data that is being carried in packets, the
> cost of a breach is potentially **very** high.
> 2) Any single device which is completely comprised should still only
> have limited access and bad effects.
> 3) Inevitably, misconfiguration or bad routing will misdirect traffic
> and inadvertently bypass network security for some packets.
> 4) In environments that allow third party VMs we must assume that
> every hosting device is potentially untrusted.
> 5) Corollary to above, every host now must implement a security perimeter.
> 6) We will never completely trust third party devices for which we
> don't own the code or implementation.
> 7) In a large network bit errors, HW failures, SW bugs are common
> occurrences. It's problematic that in VXLAN and nvgre even a single
> bit error in the vni could misdirect a packet to the wrong VM (no CRC
> or checksum protects vni).
> 8) We know that threats to our network will only increase overtime, we
> must be able to adapt accordingly. This becomes a big problem if we
> became completely dependent on network HW for security (cost of
> swapping out HW is prohibitive).
> 
> So fundamentally, we need end to end security within the protocols--
> at least that covers any fields that are sensitive to corruption or
> snooping. Mechanisms in the network are still very important, but in
> themselves not adequate and should be complementary to security within
> the protocol.
> 
> Please take this under consideration.
> 
> Thanks,
> Tom
> 
> _______________________________________________
> nvo3 mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/nvo3

_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to