Thank you, Yizhou. All of your suggestions look good and I think will be 
helpful in the document.

Best regards,
Kathleen 

Sent from my mobile device

> On Feb 22, 2018, at 3:52 AM, Liyizhou <liyiz...@huawei.com> wrote:
> 
> Hi Kathleen,
> 
> Thanks for your comments. Please see inlines with [yz].
> 
> Rgds,
> Yizhou
> 
> -----Original Message-----
> From: Kathleen Moriarty [mailto:kathleen.moriarty.i...@gmail.com] 
> Sent: Thursday, February 22, 2018 12:07 PM
> To: The IESG <i...@ietf.org>
> Cc: draft-ietf-nvo3-hpvr2nve-cp-...@ietf.org; Matthew Bocci 
> <matthew.bo...@nokia.com>; nvo3-cha...@ietf.org; matthew.bo...@nokia.com; 
> nvo3@ietf.org
> Subject: Kathleen Moriarty's No Objection on 
> draft-ietf-nvo3-hpvr2nve-cp-req-15: (with COMMENT)
> 
> Kathleen Moriarty has entered the following ballot position for
> draft-ietf-nvo3-hpvr2nve-cp-req-15: No Objection
> 
> When responding, please keep the subject line intact and reply to all email 
> addresses included in the To and CC lines. (Feel free to cut this 
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-nvo3-hpvr2nve-cp-req/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Thanks for your work on this draft.  In light of Spectre and Meltdown, I am 
> wondering if there needs to be more explicit text in the draft on tenant 
> isolation.
> 
> Could you expand the pros and cons of the choices listed out in the security 
> considerations section in the following sentence?  Additional context would 
> be helpful for the reader.
> 
>   One design point is whether the hypervisor
>   should supply the NVE with necessary information (e.g., VM addresses,
>   VN information, or other parameters) that the NVE uses directly, or
>   whether the hypervisor should only supply a VN ID and an identifier
>   for the associated VM (e.g., its MAC address), with the NVE using
>   that information to obtain the information needed to validate the
>   hypervisor-provided parameters or obtain related parameters in a
>   secure manner.
> 
> [yz] I am thinking to add the following after the abovementioned text for 
> better explanations. 
> "The former approach can be used in a trusted environment so that the 
> external NVE can directly use all the information retrieved from the 
> hypervisor for local configuration. It saves the effort on the external NVE 
> side from information retrieval and/or validation. The latter approach gives 
> more reliable information as the external NVE needs to retrieve them from 
> some management system database. Especially some network related parameters 
> like VLAN IDs can be passed back to hypervisor to be used as a more 
> authoritative provisioning. However in certain cases, it is difficult or 
> inefficient for an external NVE to have access or query on some information 
> to those management systems. Then the external NVE has to obtain those 
> information from hypervisor.
> 
> Since the communications happen in multiple ways, I'm wondering how isolation 
> is considered for each.  I see the text on authentication, ACLs and filter 
> rules and that is all good, but I'm wondering if more is needed (firmer 
> wording specific to isolation, etc.).  From the intro:
> 
>   In such cases, there is
>   no need for a standardized protocol between the hypervisor and NVE,
>   as the interaction is implemented via software on a single device.
>   While in the Split-NVE architecture scenarios, as shown in figure 2
>   to figure 4, control plane protocol(s) between a hypervisor and its
>   associated external NVE(s) are required for the hypervisor to
>   distribute the virtual machines networking states to the NVE(s) for
>   further handling. The protocol is an NVE-internal protocol and runs
>   between tNVE and nNVE logical entities. This protocol is mentioned in
>   the NVO3 problem statement [RFC7364] and appears as the third work
>   item.
> 
> Sect 4:  The authentication requirement could be stronger, is there a reason 
> it isn't?
>   Req-11: The protocol MUST allow the External NVE to authenticate the
>   End Device connected.
> 
> If this is not in software as one option provides, there is no statement on 
> encrypted sessions, is there a reason why this is not needed?
> 
> [yz] This document tries to address the requirement between hypervisor and 
> the external NVE, normally single hop only. The traffic isolation between 
> them is by locally significant tag, usually VLAN. Section 2.1 pp2 states 
> "Both the hypervisor and external NVE sides must agree on that tag value for 
> traffic identification, isolation, and forwarding." 
> [yz] As the protocol is used between server and ToR switch in data center 
> which is believed a trustworthy environment, encrypted session is a pretty 
> weak requirement over a single hop here.  VM migration is expected to be fast 
> and encryption session requires key exchanges which takes time and resources. 
> We do not intend to put it as a requirement. But existing mechanism like 
> MACsec is applicable if people wants secure channel. Maybe we can briefly 
> mention applicability of current secure channel mechanism in security 
> considerations section. 
> 
> I also don't see a requirement on logging, should there be one?  If not, why 
> not? Are there security policy management functions that would need to track 
> the connections between tenant systems and external NVEs to prove isolation 
> or track the paths?
> 
> I do see this in Sect 3.2:
>   An external NVE may report the mappings of its underlay IP
>   address and the associated TSI addresses to NVA and relevant network
>   nodes may save such information to their mapping tables but not their
>   forwarding tables.
> 
> Is more needed?  Maybe not, but if you could explain or adjust text and 
> possibly the requirements, I'd appreciate it.
> [yz] The key "logging" information is basically the mapping information for 
> underlay<->overlay address and local tag<->VNI on NVA. The document is trying 
> to focus on split-NVE rather than NVE-NVA, so some of the interleaved 
> interaction between NVE and NVA are not specified and some like address 
> mappings are shown here and there in section 3.  I think adding something 
> like " locally significant tag and VNI mapping to be reported to NVA when 
> locally significant tag information is provided by hypervisor " to section 
> 3.1 makes sense as it is key information.
> 

_______________________________________________
nvo3 mailing list
nvo3@ietf.org
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to