[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: draft-ietf-ccamp-gmpls-architecture



Bert,

Comments on the issues brought up by Steve:
i) The risk of attackers being able to inject and/or snoop on 
   (control) traffic depends on both the physical characteristics 
   of the control link and whether the interface is an inter- or 
   intra-domain one. For example, an in-band, in-fiber control 
   channel over SONET/SDH overhead bytes is, in general, considered
   less vulnerable than an out-of-band IP network. Similarly, however,
   most carriers seem to consider control links that are not within 
   their control (intra-domain) less secure.

   Proposed resolution: Add statement in the document stressing the
   dependency on control link physical characteristics.

ii) Difference between authentication and authorization. I believe 
    authorization falls in the category of what is commonly called 
    "policy control". Steve is right about pointing this out, as well
    as the implications of appropriate policy controls to increase 
    security and limit the impact of attacks.

    Proposed resolution: Expand on the difference, add references for 
    policy control (rap WG?) and Steve's comment. I can provide some 
    updated text for this, as well as (i).

iii) Need for a (broader) security architecture. Clearly, a small section
    in the architecture document can not claim to address all security 
    issues. I recall that there have been some individual draft submissions
    in the past regarding security requirements. Additionally, other bodies
    such as the OIF have carried more work on securing intra-domain 
    interfaces for transport networks; some of that work could hopefully be 
    useful in this discussion. While much of the additional work involves
    using profiles of existing IP security mechanisms in the ccamp context,
    I can see benefits in terms of pursuing this further, especially since 
    it would help alleviate one of the concerns that carriers considering 
    deployment of GMPLS or similar solutions have.

Thanks,
Dimitris


-----Original Message-----
From: Wijnen, Bert (Bert) [mailto:bwijnen@lucent.com]
Sent: Wednesday, April 16, 2003 12:38 PM
To: Ccamp-wg (E-mail)
Cc: Steve Bellovin (E-mail)
Subject: FW: draft-ietf-ccamp-gmpls-architecture


Comments on the document from IESG. I think we need an answer
to the serious comment made by Steve

-----Original Message-----
From: Steve Bellovin [mailto:smb@research.att.com]
Sent: woensdag 16 april 2003 18:20
To: iesg-secretary@ietf.org
Cc: iesg@ietf.org
Subject: draft-ietf-ccamp-gmpls-architecture


Nit:  section 4 says

   Re-using existing IP routing protocols allows for non-PSC layers to
   take advantages of all the valuable developments that took place
   since years for IP routing,

which isn't grammatically correct.

Serious issue:

The Security Considerations section hints at, but doesn't follow
through with, the difference between authentication and authorization.
The requirement for cryptographic authentication or encryption
depends on the risk of attackers being able to inject and/or snoop
on traffic.  This may or may not be correlated with intra-domain vs.
inter-domain GMPLS.  The physical characteristics and exposure of the
link matter more; there may be additional exposure since it appears that
the control plane link may be more than one hop long.

The authorization question is what resources a given node may request
of another.  This may indeed be differ for inter-domain and intra-domain
GMPLS.  On the other hand, imposing such limits even internally helps
guard against spreading break-ins, and has useful effects with regard
to configuration errors.

The more important question raised by this latter point is whether or
not a security architecture is needed that specifies what sorts of
restrictions can be applied.  I don't know the answer to that one; clearly,
though, implementors are going to have to decide.


**********************************************************************
This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. Any review, retransmission or other use of this communication by any person or entity other than the intended recipient is prohibited. If you believe that you have received this email in error please notify the sender by return electronic mail and delete all copies of this communication.
**********************************************************************