> Hi Dino,

Thanks so much David for the reply. The pointers you provided will be useful.

> Here are a couple of areas to consider:
> 
> (1) I don't see any confidentiality requirements.   For this and other NVO3 
> security
> requirements, please see the security considerations section of RFC 7365 (NVO3

I can see this for east-west traffic patterns. Assuming the mapping database 
would be managed internal to a data center where there would not be 
regisrations from any VTEPs/xTRs outside of the data center.

But what if there was an overlay among CPE routers, access-points, and 
top-of-rack data center switches. Then the registration and requesting of 
mappings may travel outside of a secured physical area. Any reaction to this?

> framework) and draft-ietf-nvo3-arch.  The latter contains a new paragraph on
> sensitivity of performance and  other monitoring data gathered by the control
> plane - that paragraph was added at the behest of both Security ADs:
> 
> https://tools.ietf.org/html/rfc7365#section-5

For multi-tenancy, there can be an instance of a mapping system that runs for 
each tennant or a single mapping system run by the multi-tennant provider. In 
any case, encrypting Map-Registers and Map-Requests COULD be desirable. Not 
sure. Again, this requirement we have stated would be for private mapping 
systems and not a global mapping system that would be a public service much 
like DNS is.

> https://tools.ietf.org/html/draft-ietf-nvo3-arch-08#section-16

Since the draft-padma-ideas-problem-statement-00.txt is focusing on 
control-plane, there would be no mention of data-plane security but there are 
mechanisms for doing this.

For the control-plane reference in section 16, there is plans to have 
authentication and it could also be done with AE (Authenticated Encryption) 
mechanisms.

> 
> (2) This item:
> 
>>>  7.  Message rate-limiting and other heuristics must be part of the
>>>      foundational support of the mapping system to protect the system
>>>      from invalid overloaded conditions.
> 
> suggests that congestion control is also a consideration to protect the 
> network.

Yes.

> If an existing congestion-controlled transport protocol (e.g., TCP, SCTP, 
> DCCP) is
> not used for control traffic, then see draft-ietf-tsvwg-rfc5405bis for 
> discussion
> of applicable requirements:

We were thinking not just high-rate due to speed mismatches but more 
importantly DoS attacks from rogue sources.

Thanks again,
Dino

> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rfc5405bis/
> 
> Thanks, --David
> 
>> -----Original Message-----
>> From: nvo3 [mailto:nvo3-boun...@ietf.org] On Behalf Of Dino Farinacci
>> Sent: Wednesday, September 21, 2016 6:51 PM
>> To: Dino Farinacci
>> Cc: b...@lispers.net; id...@ietf.org; LISP mailing list list; NVO3; LISPmob;
>> 5gan...@ietf.org; lisp-b...@external.cisco.com
>> Subject: Re: [nvo3] Mapping System Requirements and draft-padma-ideas-
>> problem-statement-00.txt
>> 
>> Reposting since the cisco mailing lists are no longer in service. Please 
>> respond to
>> this email.
>> 
>> Thanks and sorry for inconvenience,
>> Dino
>> 
>>> On Sep 21, 2016, at 2:12 PM, Dino Farinacci <farina...@gmail.com> wrote:
>>> 
>>> Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a 
>>> section
>> on mapping system requirements for map-n-encap and translation based loc/id
>> split protocols. Rather than having you go into the document in detail (we 
>> wish
>> you would and comment though), I will provide the short list below to 
>> attempt a
>> discussion on requirements.
>>> 
>>> I have copied the possible WGs that may want to use the mapping system
>> technology. And I have also copied the LISP working group who can shed
>> expertise on the subject as well as some beta lists that have some 
>> operational
>> experiences with mapping database deployment and management.
>>> 
>>> The requirements below have a security and robustness twist to it but I 
>>> think
>> that is the best place to start and to consider security “up front”.
>>> 
>>> Thanks in advance,
>>> Dino
>>> 
>>> ----
>>> 
>>> 6.4.  Mapping System Security
>>> 
>>>  The secure mapping system must have the following requirements:
>>> 
>>>  1.  The components of the mapping system need to be robust against
>>>      direct and indirect attacks.  If any component is attacked, the
>>>      rest of the system should act with integrity and scale and only
>>>      the information associated with the compromised component is made
>>>      unavailable.
>>> 
>>>  2.  The addition and removal of components of the mapping system must
>>>      be performed in a secure matter so as to not violate the
>>>      integrity and operation of the system and service it provides.
>>> 
>>>  3.  The information returned by components of the mapping system
>>>      needs to be authenticated as to detect spoofing from
>>>      masqueraders.
>>> 
>>>  4.  Information registered (by publishers) to the mapping system must
>>>      be authenticated so the registering entity or the information is
>>>      not spoofed.
>>> 
>>>  5.  The mapping system must allow request access (for subscribers) to
>>>      be open and public.  However, it is optional to provide
>>>      confidentiality and authentication of the requesters and the
>>>      information they are requesting.
>>> 
>>>  6.  Any information provided by components of the mapping system must
>>>      be cryptographically signed by the provider and verified by the
>>>      consumer.
>>> 
>>>  7.  Message rate-limiting and other heuristics must be part of the
>>>      foundational support of the mapping system to protect the system
>>>      from invalid overloaded conditions.
>>> 
>>>  8.  The mapping system should support some form of provisioned
>>>      policy.  Either internal to the system or via mechanisms for
>>>      users of the system to describe policy rules.  Access control
>>>      should not use traditional granular-based access lists since they
>>>      do not scale and are hard to manage.  By the use of token- or
>>>      key- based authentication methods as well as deploying multiple
>>>      instances of the mapping system will allow acceptable policy
>>>      profiles.  Machine learning techniques could automate these
>>>      mechanisms.
>> 
>> _______________________________________________
>> nvo3 mailing list
>> n...@ietf.org
>> https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to