Re: [LISPmob-users] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt

2016-10-04 Thread Dino Farinacci
> When I spoke to some of the 5G folks this was clearly the direction and in 
> fact Dino's LISP was one of the strongest candidates there as control plane. 

The IETF’s LISP-DDT borrows ideas from DNS but does not need to be structured 
like the DNS deployed today. There is hierarchy for scale with iterative 
lookups, but we don’t have to allow it to get out of hand with too many levels 
of hierarchy.

Dino



Re: [LISPmob-users] [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt

2016-10-04 Thread Dino Farinacci
> Am 28.09.2016 um 05:02 schrieb Dino Farinacci:
>>> When I spoke to some of the 5G folks this was clearly the direction and in 
>>> fact Dino's LISP was one of the strongest candidates there as control 
>>> plane. 
>> The IETF’s LISP-DDT borrows ideas from DNS but does not need to be 
>> structured like the DNS deployed today. There is hierarchy for scale with 
>> iterative lookups, but we don’t have to allow it to get out of hand with too 
>> many levels of hierarchy.
> What do you mean by that exactly? What's the problem with DNS and what's
> the advantage of LISP-DDT?

These were the main reasons we didn’t consider DNS as a mapping system back in 
the RRG days when we were designing the mapping system for LISP:

(1) DNS didn’t work easily on bit boundaries. So delegation would have to be on 
byte boundaries and that restricts the flexibility of how EID address 
allocation occurs on the LISP-DDT hierarchy.

(2) DNS doesn’t have a pub/sub model. LISP needed notification support so old 
RLOCs new when an EID has moved to a new set of RLOCs.

(3) Architecturally, we didn’t want routing information to be in an applicaiton 
Directory. Since DNS depends on routing, we didn’t want routing to depend on 
DNS and cause a circular dependency to be created.

(4) And we thought it would be too hard to get IETF to allow network layer 
information to be stored in what is really a application level database.

So the architectural definition of a LISP EID would be in the DNS pointed to by 
names and the dynamic binding of EIDs to RLOCs would be in a new network layer 
database, which we refer to as the LISP Mapping System.

Dino

> 
> Michael
> 
>> 
>> Dino
>> 
>> ___
>> lisp mailing list
>> l...@ietf.org
>> https://www.ietf.org/mailman/listinfo/lisp



Re: [LISPmob-users] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt

2016-10-04 Thread Dino Farinacci
>> If registrations and requests are encrypted, then anyone could run the roots 
>> and the what goes in and out of the mapping system stays private. But there 
>> needs to be competition so the level of service stays at a high-quality 
>> production level.
> What is your vision? How much of the mapping data can be encrypted and
> how much information about the mapping owner can be hidden from the

Well I think we can encrypt the transport of messages from LISP sites to the 
mapping system. As to encrypting the stored state at the map-servers could also 
be done but here are some caveats:

(1) If the MSP is providing proxy-reply services it has to return Map-Replies 
to ITRs/PITRs. It can do so with lisp-sec for security. But the information 
needs to be stored in plaintext.

(2) All the map-servers need to know when they are not proxy-replying is to 
know the RLOCs of the ETRs of the site that registered the information (and not 
so much all of the RLOC-records that were registered) so the map-servers can 
forward Map-Requests to the ETRs so they can Map-Reply.

> mapping system operator? The ID cannot be encrypted as it is used as
> retrieval key. When we want to make sure that only rightful owners of

Right. At a minimum, the amount of plaintext that is stored in the map-servers 
are EID-prefix and the RLOCs in the RLOC-set (for case (2) above).

> IDs can register, the mapping system provider needs to authenticate the

That is done today with a Map-Register that contains an authentication hash 
across the entire Map-Register message.

> mapping owner. Can you elaborate the problem you are tackling and the
> solution in more detail?

I was solely asking if the messaging to the mapping system should be 
confidential.

Dino



Re: [LISPmob-users] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt

2016-10-04 Thread Dino Farinacci
> Hi, Dino
> 
> Should we consider the security of sovereignty for the mapping system? This 
> question is probably too early. 

Yes, you bring up a very real question that needs to be answered this early.

> As you know, DNS tree architecture introduced a lot debate historically for 
> the ownership and operation of root DNS. Due to pressure from industry and 
> other countries, USA government plans to hand over the operation of root DNS 
> to IANA next month even there is a lot opposing voice from congress. It could 
> change back again.

Architecturally we need root nodes as a mechanism but they do not have to be 
run by any one party or spread across government/continental boundaries.

Any root could be run independently and point to the same next level children 
leading to map-servers.

> One side is that the national security of US prefer the government operates 
> the root DNS, another side is that other countries don’t like US to 
> completely control the DNS.

I see this hierarchy run by commercial companies that have monetary incentive 
to run a production level service. So for example, I could use a pair of roots 
from say a Verisign. Or a different pair of roots offered by an AT, or a 
possible a third-party that calls themselves a Mapping Service Provider (MSP).

It is these roots at the top of the tree that need to connect to common parts 
in the middle and to the leaf map-servers of the tree.

> This is related to both technology and politics. Without the support of other 
> countries, mapping server deployment globally will be in question.

If registrations and requests are encrypted, then anyone could run the roots 
and the what goes in and out of the mapping system stays private. But there 
needs to be competition so the level of service stays at a high-quality 
production level.

Dino

> 
> 
> Regards
> 
> Lin
> 
> 
> 
> -Original Message-
> From: Ideas [mailto:ideas-boun...@ietf.org] On Behalf Of Dino Farinacci
> Sent: Wednesday, September 21, 2016 2:13 PM
> To: id...@ietf.org
> Cc: b...@lispers.net; LISP mailing list list; NVO3; 
> lisp-al...@external.cisco.com; LISPmob; 5gan...@ietf.org; 
> lisp-...@external.cisco.com
> Subject: [Ideas] Mapping System Requirements and 
> draft-padma-ideas-problem-statement-00.txt
> 
> Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a section 
> on mapping system requirements for map-n-encap and translation based loc/id 
> split protocols. Rather than having you go into the document in detail (we 
> wish you would and comment though), I will provide the short list below to 
> attempt a discussion on requirements. 
> 
> I have copied the possible WGs that may want to use the mapping system 
> technology. And I have also copied the LISP working group who can shed 
> expertise on the subject as well as some beta lists that have some 
> operational experiences with mapping database deployment and management.
> 
> The requirements below have a security and robustness twist to it but I think 
> that is the best place to start and to consider security “up front”.
> 
> Thanks in advance,
> Dino
> 
> 
> 
> 6.4.  Mapping System Security
> 
>   The secure mapping system must have the following requirements:
> 
>   1.  The components of the mapping system need to be robust against
>   direct and indirect attacks.  If any component is attacked, the
>   rest of the system should act with integrity and scale and only
>   the information associated with the compromised component is made
>   unavailable.
> 
>   2.  The addition and removal of components of the mapping system must
>   be performed in a secure matter so as to not violate the
>   integrity and operation of the system and service it provides.
> 
>   3.  The information returned by components of the mapping system
>   needs to be authenticated as to detect spoofing from
>   masqueraders.
> 
>   4.  Information registered (by publishers) to the mapping system must
>   be authenticated so the registering entity or the information is
>   not spoofed.
> 
>   5.  The mapping system must allow request access (for subscribers) to
>   be open and public.  However, it is optional to provide
>   confidentiality and authentication of the requesters and the
>   information they are requesting.
> 
>   6.  Any information provided by components of the mapping system must
>   be cryptographically signed by the provider and verified by the
>   consumer.
> 
>   7.  Message rate-limiting and other heuristics must be part of the
>   foundational support of the mapping system to protect the system
>   from invalid overloaded conditions.
> 
>   8.  The mapping system sh

Re: [LISPmob-users] [nvo3] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt

2016-09-26 Thread Dino Farinacci
> Hi Dino,

Thanks so much David for the reply. The pointers you provided will be useful.

> Here are a couple of areas to consider:
> 
> (1) I don't see any confidentiality requirements.   For this and other NVO3 
> security
> requirements, please see the security considerations section of RFC 7365 (NVO3

I can see this for east-west traffic patterns. Assuming the mapping database 
would be managed internal to a data center where there would not be 
regisrations from any VTEPs/xTRs outside of the data center.

But what if there was an overlay among CPE routers, access-points, and 
top-of-rack data center switches. Then the registration and requesting of 
mappings may travel outside of a secured physical area. Any reaction to this?

> framework) and draft-ietf-nvo3-arch.  The latter contains a new paragraph on
> sensitivity of performance and  other monitoring data gathered by the control
> plane - that paragraph was added at the behest of both Security ADs:
> 
> https://tools.ietf.org/html/rfc7365#section-5

For multi-tenancy, there can be an instance of a mapping system that runs for 
each tennant or a single mapping system run by the multi-tennant provider. In 
any case, encrypting Map-Registers and Map-Requests COULD be desirable. Not 
sure. Again, this requirement we have stated would be for private mapping 
systems and not a global mapping system that would be a public service much 
like DNS is.

> https://tools.ietf.org/html/draft-ietf-nvo3-arch-08#section-16

Since the draft-padma-ideas-problem-statement-00.txt is focusing on 
control-plane, there would be no mention of data-plane security but there are 
mechanisms for doing this.

For the control-plane reference in section 16, there is plans to have 
authentication and it could also be done with AE (Authenticated Encryption) 
mechanisms.

> 
> (2) This item:
> 
>>>  7.  Message rate-limiting and other heuristics must be part of the
>>>  foundational support of the mapping system to protect the system
>>>  from invalid overloaded conditions.
> 
> suggests that congestion control is also a consideration to protect the 
> network.

Yes.

> If an existing congestion-controlled transport protocol (e.g., TCP, SCTP, 
> DCCP) is
> not used for control traffic, then see draft-ietf-tsvwg-rfc5405bis for 
> discussion
> of applicable requirements:

We were thinking not just high-rate due to speed mismatches but more 
importantly DoS attacks from rogue sources.

Thanks again,
Dino

> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rfc5405bis/
> 
> Thanks, --David
> 
>> -Original Message-
>> From: nvo3 [mailto:nvo3-boun...@ietf.org] On Behalf Of Dino Farinacci
>> Sent: Wednesday, September 21, 2016 6:51 PM
>> To: Dino Farinacci
>> Cc: b...@lispers.net; id...@ietf.org; LISP mailing list list; NVO3; LISPmob;
>> 5gan...@ietf.org; lisp-b...@external.cisco.com
>> Subject: Re: [nvo3] Mapping System Requirements and draft-padma-ideas-
>> problem-statement-00.txt
>> 
>> Reposting since the cisco mailing lists are no longer in service. Please 
>> respond to
>> this email.
>> 
>> Thanks and sorry for inconvenience,
>> Dino
>> 
>>> On Sep 21, 2016, at 2:12 PM, Dino Farinacci <farina...@gmail.com> wrote:
>>> 
>>> Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a 
>>> section
>> on mapping system requirements for map-n-encap and translation based loc/id
>> split protocols. Rather than having you go into the document in detail (we 
>> wish
>> you would and comment though), I will provide the short list below to 
>> attempt a
>> discussion on requirements.
>>> 
>>> I have copied the possible WGs that may want to use the mapping system
>> technology. And I have also copied the LISP working group who can shed
>> expertise on the subject as well as some beta lists that have some 
>> operational
>> experiences with mapping database deployment and management.
>>> 
>>> The requirements below have a security and robustness twist to it but I 
>>> think
>> that is the best place to start and to consider security “up front”.
>>> 
>>> Thanks in advance,
>>> Dino
>>> 
>>> 
>>> 
>>> 6.4.  Mapping System Security
>>> 
>>>  The secure mapping system must have the following requirements:
>>> 
>>>  1.  The components of the mapping system need to be robust against
>>>  direct and indirect attacks.  If any component is attacked, the
>>>  rest of the system should act with integrity and scale and only
>>>  the information associated with the compromised component

Re: [LISPmob-users] [nvo3] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt

2016-09-23 Thread Dino Farinacci
> The optional requirement for confidentiality was added for potential use
> cases where only some users are allowed to access information about
> others. Motivation: snooping mapping system informatation may be a way
> to track the behavior of other users.

Especially if GPS coordinates were part of the RLOC-records.

Dino



[LISPmob-users] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt

2016-09-21 Thread Dino Farinacci
Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a section 
on mapping system requirements for map-n-encap and translation based loc/id 
split protocols. Rather than having you go into the document in detail (we wish 
you would and comment though), I will provide the short list below to attempt a 
discussion on requirements. 

I have copied the possible WGs that may want to use the mapping system 
technology. And I have also copied the LISP working group who can shed 
expertise on the subject as well as some beta lists that have some operational 
experiences with mapping database deployment and management.

The requirements below have a security and robustness twist to it but I think 
that is the best place to start and to consider security “up front”.

Thanks in advance,
Dino



6.4.  Mapping System Security

   The secure mapping system must have the following requirements:

   1.  The components of the mapping system need to be robust against
   direct and indirect attacks.  If any component is attacked, the
   rest of the system should act with integrity and scale and only
   the information associated with the compromised component is made
   unavailable.

   2.  The addition and removal of components of the mapping system must
   be performed in a secure matter so as to not violate the
   integrity and operation of the system and service it provides.

   3.  The information returned by components of the mapping system
   needs to be authenticated as to detect spoofing from
   masqueraders.

   4.  Information registered (by publishers) to the mapping system must
   be authenticated so the registering entity or the information is
   not spoofed.

   5.  The mapping system must allow request access (for subscribers) to
   be open and public.  However, it is optional to provide
   confidentiality and authentication of the requesters and the
   information they are requesting.

   6.  Any information provided by components of the mapping system must
   be cryptographically signed by the provider and verified by the
   consumer.

   7.  Message rate-limiting and other heuristics must be part of the
   foundational support of the mapping system to protect the system
   from invalid overloaded conditions.

   8.  The mapping system should support some form of provisioned
   policy.  Either internal to the system or via mechanisms for
   users of the system to describe policy rules.  Access control
   should not use traditional granular-based access lists since they
   do not scale and are hard to manage.  By the use of token- or
   key- based authentication methods as well as deploying multiple
   instances of the mapping system will allow acceptable policy
   profiles.  Machine learning techniques could automate these
   mechanisms.

Re: [LISPmob-users] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt

2016-09-21 Thread Dino Farinacci
Reposting since the cisco mailing lists are no longer in service. Please 
respond to this email.

Thanks and sorry for inconvenience,
Dino

> On Sep 21, 2016, at 2:12 PM, Dino Farinacci <farina...@gmail.com> wrote:
> 
> Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a section 
> on mapping system requirements for map-n-encap and translation based loc/id 
> split protocols. Rather than having you go into the document in detail (we 
> wish you would and comment though), I will provide the short list below to 
> attempt a discussion on requirements. 
> 
> I have copied the possible WGs that may want to use the mapping system 
> technology. And I have also copied the LISP working group who can shed 
> expertise on the subject as well as some beta lists that have some 
> operational experiences with mapping database deployment and management.
> 
> The requirements below have a security and robustness twist to it but I think 
> that is the best place to start and to consider security “up front”.
> 
> Thanks in advance,
> Dino
> 
> 
> 
> 6.4.  Mapping System Security
> 
>   The secure mapping system must have the following requirements:
> 
>   1.  The components of the mapping system need to be robust against
>   direct and indirect attacks.  If any component is attacked, the
>   rest of the system should act with integrity and scale and only
>   the information associated with the compromised component is made
>   unavailable.
> 
>   2.  The addition and removal of components of the mapping system must
>   be performed in a secure matter so as to not violate the
>   integrity and operation of the system and service it provides.
> 
>   3.  The information returned by components of the mapping system
>   needs to be authenticated as to detect spoofing from
>   masqueraders.
> 
>   4.  Information registered (by publishers) to the mapping system must
>   be authenticated so the registering entity or the information is
>   not spoofed.
> 
>   5.  The mapping system must allow request access (for subscribers) to
>   be open and public.  However, it is optional to provide
>   confidentiality and authentication of the requesters and the
>   information they are requesting.
> 
>   6.  Any information provided by components of the mapping system must
>   be cryptographically signed by the provider and verified by the
>   consumer.
> 
>   7.  Message rate-limiting and other heuristics must be part of the
>   foundational support of the mapping system to protect the system
>   from invalid overloaded conditions.
> 
>   8.  The mapping system should support some form of provisioned
>   policy.  Either internal to the system or via mechanisms for
>   users of the system to describe policy rules.  Access control
>   should not use traditional granular-based access lists since they
>   do not scale and are hard to manage.  By the use of token- or
>   key- based authentication methods as well as deploying multiple
>   instances of the mapping system will allow acceptable policy
>   profiles.  Machine learning techniques could automate these
>   mechanisms.