Skip to main content

Security Considerations for Tenant ID and Similar Fields
draft-eastlake-secdispatch-tenantid-consid-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Active".
Authors Donald E. Eastlake 3rd , Nancy Cam-Winget
Last updated 2023-03-12
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-eastlake-secdispatch-tenantid-consid-00
SECDISPATCH Working Group                                    D. Eastlake
Internet-Draft                                    Futurewei Technologies
Intended status: Best Current Practice                     N. Cam-Winget
Expires: 13 September 2023                                 Cisco Systems
                                                           12 March 2023

        Security Considerations for Tenant ID and Similar Fields
             draft-eastlake-secdispatch-tenantid-consid-00

Abstract

   Many protocols provide for header fields to be added to a packet on
   ingress to a network domain and removed on egress from that domain.
   Examples of such fields are Tenant ID for multi-tenant networks,
   ingress port ID and/or type, and other identity or handling directive
   fields.  These fields mean that a packet may be accompanied by
   supplemental information as it transits the network domain that would
   not be present with the packet or not be visible if it were simply
   forwarded in a traditional manner.  A particular concern is that
   these fields may harm privacy by identifying, in detail, the packet
   source and intended traffic handling.  This document provides
   Security Considerations for the inclusion of such fields with a
   packet.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 13 September 2023.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 1]
Internet-Draft      Tenant ID Security Considerations         March 2023

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   4
   2.  Threat Model  . . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  Examples of Applicable Fields . . . . . . . . . . . . . . . .   5
     3.1.  Example Fields from Standards Track RFCs  . . . . . . . .   5
       3.1.1.  Service Function Chaining Network Service Header  . .   5
       3.1.2.  Geneve  . . . . . . . . . . . . . . . . . . . . . . .   6
       3.1.3.  IP Header Fields  . . . . . . . . . . . . . . . . . .   7
     3.2.  Example Fields from Other RFCs  . . . . . . . . . . . . .   7
       3.2.1.  VXLAN . . . . . . . . . . . . . . . . . . . . . . . .   8
       3.2.2.  NVGRE . . . . . . . . . . . . . . . . . . . . . . . .   8
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   8
     4.1.  Minimization  . . . . . . . . . . . . . . . . . . . . . .   9
     4.2.  Encryption  . . . . . . . . . . . . . . . . . . . . . . .  10
       4.2.1.  Link Encryption . . . . . . . . . . . . . . . . . . .  10
       4.2.2.  Edge-to-Edge Encryption . . . . . . . . . . . . . . .  11
     4.3.  Obfuscation . . . . . . . . . . . . . . . . . . . . . . .  11
     4.4.  Integrity and Authentication Considerations . . . . . . .  12
     4.5.  Covert Channel Considerations . . . . . . . . . . . . . .  12
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  12
   6.  Normative References  . . . . . . . . . . . . . . . . . . . .  12
   7.  Informative References  . . . . . . . . . . . . . . . . . . .  13
   Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .  14
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  14

1.  Introduction

   Many protocols provide for header fields to be added to a packet on
   ingress to a network domain and removed on egress from that domain as
   shown in Figure 1.  Examples of such fields are Tenant ID for multi-
   tenant networks, ingress port ID and/or type, and other identity or
   handling directive fields.  These fields mean that a packet may be
   accompanied by supplemental information as it transits the network
   domain that would not be present with the packet or not be visible if
   it were simply forwarded in a traditional manner.  There are many
   such fields.  A few examples from IETF Standards Track RFCs and Other
   RFCs are given below in Section 3.  This document provides

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 2]
Internet-Draft      Tenant ID Security Considerations         March 2023

   comprehensive Security Considerations [RFC3552] for the inclusion of
   such supplemental information with a packet.

                 +-  --  --  --  --  --  --  --  --  --  -+
                 |                                        |
                              Network Domain
                 |                                        |
     Packet  +-------+           +------+           +--------+  Packet
   ---------->Ingress>---------->Transit>-----------> Egress >--------->
    (Header  +-------+  (Header  +------+  (Header  +--------+ (Header
     +Data)      |       +Field             +Field        |     +Data)
                         +Data)             +Data
                 |                                        |

                 +-  --  --  --  --  --  --  --  --  --  -+

                      Figure 1: Example Network Domain

   Figure 1 is simplified.  For example, there may be zero or many
   transit nodes and, in the case of a multi-destination packet, there
   might be multiple paths from the ingress to multiple egress nodes.
   Also, there might be multiple fields added which are considered one
   logical field for the purposes of this document or an added "field"
   might be encoded into an existing field.

   The primary security concern caused by the supplemental information
   added is harm to the privacy of the packet source by distinguishing
   the packet's source and the packet's intended handling in detail.
   The granularity with which packet sources are distinguished can vary
   greatly from disclosure of any one or combination of a single host
   computer, individual user, or specific process within a host to, at
   the wholesale level, the identity of an adjacent Internet Service
   Provider.  In addition to distinguishing packet sources with a finer
   granularity, supplemental information may enable multiple apparent
   sources to be grouped as related and generally provide some
   information about the structure of complex sources.

   In some cases, such an added field is derived from fields present in
   the packet which are normally forwarded, such as the "5-tuple" of IP
   Source and Destination Address, IP Source and Destination Port, and
   IP Protocol and/or additional header fields that would be transmitted
   with the packet.  Reasons for adding a derived field include that the
   information it is derived from will not actually be available to
   transit nodes because it will be encrypted or will be too difficult
   to access because it is too deep in the packet, that is, too far from
   the beginning of the packet.

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 3]
Internet-Draft      Tenant ID Security Considerations         March 2023

   In other cases, the field may be derived in whole or in part from
   information such as ingress port identity or a VLAN tag on the packet
   arriving via Ethernet and which would not normally be forwarded with
   the packet.

1.1.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

   The acronyms and terms below are used in this document.  For further
   security term definitions, see [RFC4949].

   ASCII  -  American Standard Code for Information Interchange
      [RFC0020].

   ciphertext  -  Data that has been transformed by encryption so that
      its semantic information content is no longer intelligible or
      directly available (see Section 4.2) [RFC4949].

   CPU  -  Central Processing Unit

   MAC  -  Media Access Control [oneq].

   plaintext  -  Data that is input to an encryption process (see
      Section 4.2) [RFC4949].

   TLV  -  Type, Length, Value

2.  Threat Model

   The primary threats to be considered stemming from the addition of
   these fields are surveillance and from the modification of such
   fields.  Such surveillance or modification could be accomplished
   either on links within the network domain or by the subversion of one
   or more nodes.  Surveillance threatens loss of privacy to the users
   whose traffic is transiting the network domain because it permits
   packets to be associated with such users and their host or service
   provider with greater specificity.  The additional information with
   packets may also reveal aspects of the network domain structure and
   capabilities.  And, to the extent that the additional information
   affects the treatment of the packet, unauthorized modification may
   disrupt network operation and interfere with the modified traffic or
   other traffic.

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 4]
Internet-Draft      Tenant ID Security Considerations         March 2023

   (Note that, without suitable countermeasures, radio links are
   particularly subject to surveillance and traffic modification through
   blocking the original version of a packet and injection of a modified
   copy.)

   Subversion of a transit or egress node enables surveillance and
   modification of all the traffic through that node.  Subversion of an
   ingress node is a threat but not closely related to adding
   information to the packet.  All the information that might be in or
   associated with the packet is available at the ingress node
   regardless of whether any of this is added to the packet being
   ingressed.

3.  Examples of Applicable Fields

   The subsections below give some examples of fields to which the
   Security Considerations material in Section 4 apply.

3.1.  Example Fields from Standards Track RFCs

   The following are examples of fields specified in Standards Track
   RFCs to which these Security Considerations would apply.

3.1.1.  Service Function Chaining Network Service Header

   The Service Function Header (SFC) Network Service Header (NSH)
   [RFC8300] provides for the inclusion of metadata with packets inside
   an SFC enabled domain as shown in Figure 2.

      NSH Header:
        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |Ver|O|U|    TTL    |   Length  |U|U|U|U|MD Type| Next Protocol |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |          Service Path Identifier (SPI)        | Service Index |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                                                               |
       ~                Context Header(s)                              ~
       |                                                               |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                            Figure 2: SFC NSH

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 5]
Internet-Draft      Tenant ID Security Considerations         March 2023

   The MD Type field in the NSH header indicates the type of metadata
   field or fields in the Context Headers section of the NSH header.
   Such fields are appropriate for including additional information with
   a packet that would otherwise only be available at the ingress node.
   See, for example, the context headers specified in [RFC9263].

   The NSH is used to encapsulate the traffic and requires an outer
   transport header as shown in Figure 3.  This encapsulation is applied
   on ingress to the SFC enabled domain and removed on egress.  If the
   transport encapsulation is, for example, IP, trasnport enacpsulation
   fields may also be available to add information to the packet within
   the network domain (see Section 3.1.3).

      +------------------------------+
      |    Transport Encapsulation   |
      +------------------------------+
      | Network Service Header (NSH) |
      +------------------------------+
      |    Original Packet / Frame   |
      +------------------------------+

                        Figure 3: NSH Encapsulation

3.1.2.  Geneve

   The Geneve (General Network Virtualization Encapsulation) [RFC8926]
   header provides for a Virtual Network Identifier which is equivalent
   to a Tenant ID, as shown in Figure 4.  It also has a flexible
   provision for header options encoded at TLVs.

       Geneve Header:
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |Ver|  Opt Len  |O|C|    Rsvd.  |          Protocol Type        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |        Virtual Network Identifier (VNI)       |    Reserved   |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                                                               |
      ~                    Variable-Length Options                    ~
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                           Figure 4: VXLAN Header

   Geneve is used to encapsulate the traffic transiting the network
   domain with an IP transport encapsulation in a manner similar to the
   NSH Header as shown in Figure 3 and similar considerations apply.

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 6]
Internet-Draft      Tenant ID Security Considerations         March 2023

3.1.3.  IP Header Fields

   There are a number of IPv4 [RFC0791] and IPv6 [RFC8200] header fields
   that can be used to encode supplemental information.  Some of these
   fields are mutable, so they can change as a packet is propagated
   through a network; however, this document is restricted to
   considerations within a single network domain with coordinated
   management.

   There is particular freedom to use IP fields where the traffic
   transiting the network domain is encapsulated in a manner that
   provides for a new outer IP header.  For example, IP-in-IP or where
   the traffic is encapsulated in a tunnel header, such as VXLAN, NVGRE,
   SFC NSH, or Geneve, which is in turn encapsulated in an outer IP
   header.

   Options  Both IPv4 and IPv6 provide for header options with IPv6
      having provisions for more flexible and extensive options but
      these have proven hard to use in practice.

   IPv6 Flow Label  In the IPv6 header, a 20-bit Flow Label field is
      available.

   Addresses  Where an outer IP header is used within a network domain,
      not all of the IPv4 or generously sized IPv6 address is needed to
      direct transit traffic from ingress to egress.  Thus other
      additional information could be encoded into the address field,
      presumably in low order bits.

   DSCP/ToS  There is an 8-bit field in the IPv6 and IPv4 header.  Two
      of these bits are commonly used for Explicit Congestion
      Notification (ECN) and the other six are commonly used to encode
      hop-by-hop behaviors; however, within a network domain with common
      management those six bits or all 8 bits could be used for other
      purposes.

   Sockets, Etc  There are additional fields available in commonly used
      UDP and TCP headers that could, in an outer IP encapsulation
      inside a network domain, be interpreted as holding other
      information.

3.2.  Example Fields from Other RFCs

   The following are examples of fields specified in RFCs that are not
   Standards Track to which the Security Considerations material in
   Section 4 apply.

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 7]
Internet-Draft      Tenant ID Security Considerations         March 2023

3.2.1.  VXLAN

   VXLAN (Virtual eXtensible Local Area Network) is specified in
   [RFC7348] and the VXLAN header is shown in Figure 5.

      VXLAN Header:
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |R|R|R|R|I|R|R|R|            Reserved                           |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                VXLAN Network Identifier (VNI) |   Reserved    |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                           Figure 5: VXLAN Header

   The Virtual Network Identifier (VNI) is a tenant identifier in multi-
   tenant domains.  It is intended to identify traffic that uses an
   overlay network for that tenant.  In addition, the use of VXLAN
   involves encapsulation of the traffic being forwarded so there is an
   out IP and UDP header with numerous fields that could be used for
   additional information.

3.2.2.  NVGRE

      NVGRE (Virtual eXtensible Local Area Network) is specified in
      [RFC7637] and the VXLAN header is shown in Figure 6.

      GRE Header:
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |0| |1|0|   Reserved0     | Ver |   Protocol Type 0x6558        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |               Virtual Subnet ID (VSID)        |    FlowID     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                           Figure 6: NVGRE Header

   The Virtual Subnet ID (VSID) is a tenant identifier in multi-tenant
   domains.  It is intended to identify traffic that uses an overlay
   network for that tenant.  In addition, the use of VXLAN involves
   encapsulation of the traffic being forwarded so there is an out IP
   and UDP header with numerous fields that could be used for additional
   information

4.  Security Considerations

   This section provides Security Considerations for the fields
   discussed in this document.  These considerations are equally
   applicable to IPv4 [RFC0791] and IPv6 [RFC8200].  They are grouped
   into the following topics:

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 8]
Internet-Draft      Tenant ID Security Considerations         March 2023

      * Surveillance Oriented Considerations

         o Minimization

         o Encryption

         o Obfuscation

      * Other Security Considerations

         o Integrity and Authentication Considerations

         o Covert Channel Considerations

   The first three items above have a dominance relationship as follows:

         Minimization > Encryption > Obfuscation

   Where reasonably possible, the types of additional information
   discussed in this document SHOULD NOT be included with a packet.
   Where it is necessary to include the information, it SHOULD be
   encrypted where practical.  Where encryption of the entire packet is
   prohibitive, the cleartext data MUST be authenticated through
   authenticated encryption with associated data mechanisms.  In cases
   where it can be neither excluded nor encrypted, consideration should
   be given to obfuscating the information even though that provides
   only weak protection.

4.1.  Minimization

   The simplest method to minimize the harm that can be caused by the
   threats described in Section 2 is to minimize the amount of
   additional information added to packets transiting the network
   domain.  If some information is not necessary for controlling the
   treatment of a packet or other network management functions, it
   SHOULD NOT be included.  The exceptional cases where inclusion is
   reasonable are

      (1) transition scenarios, where information remains included for a
      brief time while mechanisms using the information are being
      removed or disabled, or included starting a brief time before
      mechanisms using the information are being installed or enabled,
      and

      (2) some debugging cases where the additional information would be
      helpful (but note that the mere addition of this information may
      change behavior and mask or cause erroneous behavior).

Eastlake & Cam-Winget   Expires 13 September 2023               [Page 9]
Internet-Draft      Tenant ID Security Considerations         March 2023

   This is the strongest method to defeat the security threats outlined
   in Section 2 and MUST always be considered so a determination can be
   made as to whether the benefits of including the information exceed
   the risks.  Any data that does not appear with the packets cannot,
   due to its transit of or egress from the network domain, compromise
   the privacy/security of the packet source.

4.2.  Encryption

   Encryption is a powerful technique.  With the use of appropriate
   cryptographic algorithms and key management, encryption coverts
   easily understandable plaintext into cyphertext from which the
   original plaintext cannot be derived without knowledge of the key.

   Use of encryption provides clear benefits but there also costs.  The
   computational burden of encryption/decryption at line speed may
   increase the cost of CPU or port hardware and requirements for key
   management and pseudorandom number generation [RFC4086] will impose
   some burden.

   Even with strong encryption, surveillance can yield information such
   as the size of packets.  Padding and dummy packets can obscure this
   meta information about encrypted traffic but only at a significant
   expense in bandwidth consumed.  In addition, enough addressing
   information must be present outside the encryption to get the packet
   through the one or more hops it needs to transit to the point where
   it will be decrypted.  Finally, there is usually some encryption
   control information such as a Key ID to facilitate key rollover and
   the like.  Also, depending on the encryption mode, a packet sequence
   number in the encrypted flow may be needed.

   The subsections below discuss the use of encryption at the link level
   and edge-to-edge.  It is RECOMMENDED that both be used unless careful
   consideration shows the costs to exceed the benefits in a particular
   case.  If both are not being used, then it RECOMMENDED that one or
   the other be used with default preference for edge-to-edge encryption
   in wired networks and link encryption for radio networks.

4.2.1.  Link Encryption

   Link encryption encrypts a packet as it is output from the ingress
   node or a transit node and decrypts it on input to the next node in
   the path, which will be a transit node or the egress node.  This
   protects information inside the packet from surveillance of the link.
   However, it is usual that some addressing information, such as a MAC
   address, and control information is needed by the destination node
   and in some cases needed by devices within the link.  For example, if
   routers are connected by a bridged LAN [oneq] proper handling of the

Eastlake & Cam-Winget   Expires 13 September 2023              [Page 10]
Internet-Draft      Tenant ID Security Considerations         March 2023

   packets between them may require that the packet be sent with a VLAN/
   priority tag.

   With link encryption, the packet will be decrypted inside the
   destination node so any additional information within the packet will
   be exposed there and privacy can still be harmed by a subverted
   transit or egress node.

   Link encryption is common by default on radio links which are easily
   surveilled.  For example, almost all Wi-Fi [eleven] chip sets have
   built in cryptographic hardware so link encryption for Wi-Fi is
   usually thought of as "free" in that its use does not impose
   significant additional overhead.

4.2.2.  Edge-to-Edge Encryption

   Encryption between the ingress node and the egress node provides
   protection from surveillance of all the links along that path as well
   as surveillance by the transit nodes used.  However, such encryption
   cannot cover any fields that are needed to control the treatment of
   the packet along its path in the network domain or to cause it to be
   routed to and decrypted at its egress node (or possibly nodes in the
   case of multicast).

   While Link Encryption involves key setup only between the nodes on
   the link, usually two nodes, strong Edge-to-Edge Encryption would
   require key setup for every pair of edge (ingress or egress) nodes
   that will be communicating traffic.  This is potentially up to
   N*(N+1)/2 pairs if there are N edge nodes.  And additional key set up
   and management may be required for multicast groups or the like.

4.3.  Obfuscation

   Obfuscation refers to a weak means of hiding the content of a field
   or packet.  It can be thought of as encryption that is unkeyed or
   uses a fixed key.  There is, nevertheless, some benefit to its use.
   Roughly speaking, it protects against inadvertent disclosure but
   provides only weak protection against deliberate attack.

   For example, someone debugging a network problem might do a capture
   of the packets on a link with a program that will display the packet
   data in hexadecimal and ASCII.  This data might include personally
   identifying information or other sensitive information that could be
   immediately read if interpreted as ASCII.  Such inadvertent
   disclosure could be avoided by an obfuscation as simple as XORing a
   fixed non-zero byte value with each data byte.

Eastlake & Cam-Winget   Expires 13 September 2023              [Page 11]
Internet-Draft      Tenant ID Security Considerations         March 2023

4.4.  Integrity and Authentication Considerations

   Providing for the integrity and authentication of packets in the
   network domain is generally a good idea for reasons including the
   following:

      (1) To the extent that additional information with a packet
      affects network handling of that packet, it is important that the
      information is not corrupted or forged.  Not only can the
      treatment of the packet be affected but if, for example, arbitrary
      numbers of high priority packets can be forged, performance of the
      network domain can be generally disrupted.  Thus, integrity and
      authentication SHOULD be used in such circumstances.

      (2) Many modes of encryption (see Section 4.2) are sensitive to
      modified, dropped, or extra packets which may result in garbling
      the decryption of following genuine packets.  Appropriate
      integrity and authentication SHOULD be used with flow that are so
      encrypted.

4.5.  Covert Channel Considerations

   The presence of additional information in a packet, particularly in
   an encrypted form, provides a place into which a node forwarding a
   packet can hide information and from which such a node can retrieve
   information.

   Many of the headers discussed in Section 3 have reserved fields.
   Most commonly the specification for these fields, which are reserved
   for later definition, state they must be sent as zero and ignored on
   receipt.  Since their value is ignored by standards compliant nodes,
   such fields could be used for covert channel communications.

5.  IANA Considerations

   This document requires no IANA actions.

6.  Normative References

   [RFC0791]  Postel, J., "Internet Protocol", STD 5, RFC 791,
              DOI 10.17487/RFC0791, September 1981,
              <https://www.rfc-editor.org/info/rfc791>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

Eastlake & Cam-Winget   Expires 13 September 2023              [Page 12]
Internet-Draft      Tenant ID Security Considerations         March 2023

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8200]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", STD 86, RFC 8200,
              DOI 10.17487/RFC8200, July 2017,
              <https://www.rfc-editor.org/info/rfc8200>.

7.  Informative References

   [oneq]     802.1 WG, IEEE., "Bridges and Bridged Networks", IEEE Std 
              802.1Q-2014, 3 November 2014.

   [eleven]   802.11 WG, IEEE., "Wireless LAN Medium Access Control
              (MAC) and Physical Layer (PHY) Specifications", IEEE
              Std 802.11-2016, 7 December 2016.

   [RFC0020]  Cerf, V., "ASCII format for network interchange", STD 80,
              RFC 20, DOI 10.17487/RFC0020, October 1969,
              <https://www.rfc-editor.org/info/rfc20>.

   [RFC3552]  Rescorla, E. and B. Korver, "Guidelines for Writing RFC
              Text on Security Considerations", BCP 72, RFC 3552,
              DOI 10.17487/RFC3552, July 2003,
              <https://www.rfc-editor.org/info/rfc3552>.

   [RFC4086]  Eastlake 3rd, D., Schiller, J., and S. Crocker,
              "Randomness Requirements for Security", BCP 106, RFC 4086,
              DOI 10.17487/RFC4086, June 2005,
              <https://www.rfc-editor.org/info/rfc4086>.

   [RFC4949]  Shirey, R., "Internet Security Glossary, Version 2",
              FYI 36, RFC 4949, DOI 10.17487/RFC4949, August 2007,
              <https://www.rfc-editor.org/info/rfc4949>.

   [RFC7348]  Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger,
              L., Sridhar, T., Bursell, M., and C. Wright, "Virtual
              eXtensible Local Area Network (VXLAN): A Framework for
              Overlaying Virtualized Layer 2 Networks over Layer 3
              Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014,
              <https://www.rfc-editor.org/info/rfc7348>.

   [RFC7637]  Garg, P., Ed. and Y. Wang, Ed., "NVGRE: Network
              Virtualization Using Generic Routing Encapsulation",
              RFC 7637, DOI 10.17487/RFC7637, September 2015,
              <https://www.rfc-editor.org/info/rfc7637>.

Eastlake & Cam-Winget   Expires 13 September 2023              [Page 13]
Internet-Draft      Tenant ID Security Considerations         March 2023

   [RFC8300]  Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed.,
              "Network Service Header (NSH)", RFC 8300,
              DOI 10.17487/RFC8300, January 2018,
              <https://www.rfc-editor.org/info/rfc8300>.

   [RFC8926]  Gross, J., Ed., Ganga, I., Ed., and T. Sridhar, Ed.,
              "Geneve: Generic Network Virtualization Encapsulation",
              RFC 8926, DOI 10.17487/RFC8926, November 2020,
              <https://www.rfc-editor.org/info/rfc8926>.

   [RFC9263]  Wei, Y., Ed., Elzur, U., Majee, S., Pignataro, C., and D.
              Eastlake 3rd, "Network Service Header (NSH) Metadata Type
              2 Variable-Length Context Headers", RFC 9263,
              DOI 10.17487/RFC9263, August 2022,
              <https://www.rfc-editor.org/info/rfc9263>.

Acknowledgements

   The suggestions and comments on this document from the following
   persons are gratefully acknowledged:

      TBD

Authors' Addresses

   Donald E. Eastlake 3rd
   Futurewei Technologies
   2386 Panoramic Circle
   Apopka, Florida 32703
   United States of America
   Phone: +1-508-333-2270
   Email: d3e3e3@gmail.com, donald.eastlake@futurewei.com

   Nancy Cam-Winget
   Cisco Systems
   3550 Cisco Way
   San Jose, CA 95134
   United States of America
   Email: ncamwing@cisco.com

Eastlake & Cam-Winget   Expires 13 September 2023              [Page 14]