Hello Ilango!

Your proposed text addresses my DISCUSS points.  Thank you for the 
clarifications.  Please note the additional non-blocking editorial feedback 
inline.

Thanks,
Roman

From: Ganga, Ilango S <[email protected]>
Sent: Tuesday, January 14, 2020 11:57 PM
To: Roman Danyliw <[email protected]>; The IESG <[email protected]>
Cc: [email protected]; Matthew Bocci <[email protected]>; 
[email protected]; [email protected]; Martin Vigoureux 
<[email protected]>
Subject: RE: Roman Danyliw's Discuss on draft-ietf-nvo3-geneve-14: (with 
DISCUSS and COMMENT)


Hello Roman,



Thanks for your review and comments. Please see our responses inline below, 
enclosed within <Response> </Response>. Let us know if you are satisfied with 
the resolution.



Regards,

Ilango Ganga

Geneve Editor



-----Original Message-----
From: Roman Danyliw via Datatracker <[email protected]<mailto:[email protected]>>
Sent: Wednesday, December 4, 2019 6:04 PM
To: The IESG <[email protected]<mailto:[email protected]>>
Cc: [email protected]<mailto:[email protected]>; 
Matthew Bocci <[email protected]<mailto:[email protected]>>; 
[email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: Roman Danyliw's Discuss on draft-ietf-nvo3-geneve-14: (with DISCUSS 
and COMMENT)



Roman Danyliw has entered the following ballot position for

draft-ietf-nvo3-geneve-14: Discuss

----------------------------------------------------------------------

DISCUSS:

----------------------------------------------------------------------



(1) The threat model assumed by geneve appears to be expressed in conflicting 
ways.  Section 4.1 notes that RFC8085’s definition of “controlled environment”

applies.  However,



- Section 6 notes “When crossing an untrusted link, such as the public 
Internet, …”



- Section 6.1 notes “Geneve data traffic between tenant systems across such 
separated networks should be protected from threats when traversing public 
networks. Any Geneve overlay data leaving the data center network beyond the 
operator's security domain SHOULD be secured by encryption mechanisms such as 
IPsec or other VPN mechanisms to protect the communications between the NVEs 
when they are geographically separated over untrusted network links.”



The advice provided in Section 6.x is sound.  Nevertheless, it doesn’t appear 
to describe a “controlled environment”.



IG>> <Response> Geographically separated data centers does not mean Geneve 
directly goes over the general internet, whereas Geneve traffic needs to be 
carried over other VPN technologies to bridge Geneve traffic across 
geographically separated data centers. The principles described in Section 4 
regarding controlled environment still applies to Section 6.1.1 usage with 
geographically separated data centers.  We will add the following sentence to 
the end of Section 6.1.1 to clarify this point:



“The principles described in Section 4 regarding controlled environments still 
apply to the geographically separated data center usage outlined in this 
section.

</Response>



[Roman]  Understood.  That seems like a reasonable compromise.  This updated 
text addresses my feedback.



As further editorial feedback (non-blocking), the text in Section 4.1 could 
also be refined to reiterate this point.  Per “[RFC8085] outlines two 
applicability scenarios for UDP applications, 1) general Internet and 2) 
controlled environment.”, it’s helpful to cite [RFC8085], but only scenario (2) 
applies so referencing (1) didn’t make sense to me.  Clearer to me would have 
been:



OLD

[RFC8085] outlines two applicability scenarios for UDP applications,

   1) general Internet and 2) controlled environment.



PROPOSED (approximately)



Geneve is intended for a controlled environment applicability scenario as 
described in [RFC8085].



(2) Section 6.  Per “Compromised tunnel endpoints may also spoof identifiers in 
the tunnel header to gain access to networks owned by other tenants”, couldn’t 
compromised transit devices do the same?



IG>> <Response> We will update the sentence as follows:

“Compromised tunnel endpoints or transit devices may also spoof identifiers in

the tunnel header to gain access to networks owned by other tenants”

</Response>



[Roman]  Thank you.  This updated text addresses my feedback.



(3) Section 6.1.  Similar to what is discussed in Section 6.2 (for integrity), 
please refer to the impact of a compromised node on confidentiality.  For 
example (not verbatim) “A compromised network node or a transit device within a 
data center may passively monitor Geneve packet data between NVEs; or route 
traffic for further inspection.”



IG>> <Response> Agreed. As suggested, we will add the following sentence before 
the last sentence of the first paragraph of section 6.1 as follows:

“A compromised network node or a transit device within a

data center may passively monitor Geneve packet data between NVEs; or route

traffic for further inspection.” A tenant may expect the overlay service 
provider….

</Response>



[Roman]  Thank you.  This updated text addresses my feedback.



(4) Section 6.1.  Per “Due to the nature of multi-tenancy in such environments, 
a tenant system may expect data confidentiality to ensure its packet data is 
not tampered with (active attack) in transit or a target of unauthorized 
monitoring (passive attack).”, please provide additional precision on the 
confidentiality. It is only relative to other tenants, but not from the 
provider (who can engage in tampering and passive monitoring).



IG>> <Response> We will update the sentence as follows to provide clarity:

“Due to the nature of multi-tenancy in such environments,

a tenant system may expect data confidentiality to ensure its packet data is

not tampered with (active attack) in transit or a target of unauthorized

monitoring (passive attack) for example by other tenant systems or underlay 
service provider.”

</Response>



[Roman] Thank you.  This updated text addresses my feedback.



----------------------------------------------------------------------

COMMENT:

----------------------------------------------------------------------



I support Ben Kaduk’s DISCUSS position.  To reiterate part of his write-up, the 
role of the transit device which is only permitted to inspect the geneve 
traffic isn’t clear, especially if end-to-end security is applied.  RFC7365 
didn’t provide insight into this architectural element.



IG>> <Response> Please see our response to Benjamin’s comments on transit 
devices (link below):

https://mailarchive.ietf.org/arch/msg/nvo3/G37hH5brjYzYPQLHAfUr54_-Fwg

</Response>



<End of Responses>




_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to