Skip to main content

Last Call Review of draft-ietf-detnet-mpls-05
review-ietf-detnet-mpls-05-secdir-lc-ladd-2020-03-10-00

Request Review of draft-ietf-detnet-mpls
Requested revision No specific revision (document currently at 13)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2020-03-13
Requested 2020-02-28
Authors Balazs Varga , János Farkas , Lou Berger , Andrew G. Malis , Stewart Bryant , Jouni Korhonen
I-D last updated 2020-03-10
Completed reviews Rtgdir Last Call review of -04 by Carlos Pignataro (diff)
Opsdir Last Call review of -05 by Shwetha Bhandari (diff)
Tsvart Last Call review of -05 by Michael Tüxen (diff)
Secdir Last Call review of -05 by Watson Ladd (diff)
Secdir Telechat review of -11 by Watson Ladd (diff)
Assignment Reviewer Watson Ladd
State Completed
Request Last Call review on draft-ietf-detnet-mpls by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/wlwFOH2x-TfKH8rjNKFUEOHrEAY
Reviewed revision 05 (document currently at 13)
Result Not ready
Completed 2020-03-10
review-ietf-detnet-mpls-05-secdir-lc-ladd-2020-03-10-00
This is the secdir review of draft-ietf-detnet-mpls-05. Authors should treat
these as any other Last Call comments.

Apologies for the delays in completing this review.

I am concerned that this document (and the related work) introduces some
substantial differences from existing Internet architecture, and that
inadequate attention is paid to the consequent security implications. Pointing
to a separate, in progress draft I don't think is an adequate security
consideration section. That's particularly true when we're discussing the
network providing functions like duplicate packet dropping that are potentially
quite expensive and which attackers may exploit to consume large amounts of
resources. Saying that one can mitigate DoS on the edge of a DetNet domain
isn't enough: how do you mitigate the DoS, or detect it? What if the edge is
the problem? Are there resources that can be consumed in the center the edge
doesn't know about?

With confidentiality this draft mentions the possibility of link to link
protection, ignoring the possibility of malicious nodes, and doesn't describe
the way one actually uses that integration. It's not clear to me what the
security goals are, and saying a mechanism may be used, without indicating how
doesn't make it remediation for a security problem. I can think of a few ways
to abuse the one-packet only service to rewrite flows with great ease.

The Internet is composed of smart nodes at the edge and dumb forwarders in the
middle. DetNet is a very different design, with significant complexity and
state in the network, and guarantees not maintained by end nodes. This means
that a lot that has been learned about Internet security doesn't apply, which
raises a whole host of questions: what threat model is applied? Is it
realistic? Are the properties such as bounded latency and low jitter maintained
even in the face of adversarial behavior? While this may be appropriately
handled at greater length in a separated draft, a tighter link to the
mechanisms defined in this draft would be useful.

It's very likely these have been discussed in the detnet wg at length as
evidenced by the security considerations, but I'd like to see the MPLS draft
reflect some of that conversation more directly.