[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: draft-ietf-ccamp-gmpls-architecture
ccamp'ers,
after the received iesg comments, a respin of the gmpls
architecture i-d is under submission, the following
changes have been provided:
- grammatical and other editorial changes
- new short paragraph on lmp development (randy's comment)
as previously proposed on this list
- revisited security section (i'd like to thank here,
steve and dimitrios for their precious help)
thanks,
- dimitri.
Wijnen, Bert (Bert) wrote:
Steve thanks for the input/review.
Dimitrios and Dimitri, if the two of you could respind the
draft (by Thursday at the latest) to try and address Steves
(and other, as posted to the list) comments, then I can
put it back on IESG agenda for next week.
Thanks,
Bert
-----Original Message-----
From: Steven M. Bellovin [mailto:smb@research.att.com]
Sent: dinsdag 22 april 2003 18:31
To: Dimitrios Pendarakis
Cc: 'Wijnen, Bert (Bert)'; Ccamp-wg (E-mail); zinin@psg.com
Subject: Re: draft-ietf-ccamp-gmpls-architecture
In message
<05707214338CD5119BFF0040A5B170D30347EEDB@mail3.tellium.com>, Dimitr
ios Pendarakis writes:
Bert,
Comments on the issues brought up by Steve:
i) The risk of attackers being able to inject and/or snoop on
(control) traffic depends on both the physical characteristics
of the control link and whether the interface is an inter- or
intra-domain one. For example, an in-band, in-fiber control
channel over SONET/SDH overhead bytes is, in general, considered
less vulnerable than an out-of-band IP network.
Similarly, however,
most carriers seem to consider control links that are not within
their control (intra-domain) less secure.
Proposed resolution: Add statement in the document stressing the
dependency on control link physical characteristics.
And delete the text about intra-domain versus inter-domain -- that's
not relevant here.
ii) Difference between authentication and authorization. I believe
authorization falls in the category of what is commonly called
"policy control". Steve is right about pointing this out, as well
as the implications of appropriate policy controls to increase
security and limit the impact of attacks.
Proposed resolution: Expand on the difference, add
references for
policy control (rap WG?) and Steve's comment. I can provide some
updated text for this, as well as (i).
I don't think that that's right. The issue is who has the right to,
say, allocate or reallocate lambdas between given pairs of switches.
Note that there are two very different questions here: how to
represent, on the wire, the resources that are available to a given
party, and how to make more complex decisions, such as a limit on the
total bandwidth available to some party in the presence of contention
for certain resources. Simple policies -- "party A,
identified by the
following mechanism, may request N megabits/sec" are simple.
But what
about requests for enough different lambdas that a given waveband of
the desired capacity is not available?
You can't solve this broader problem here; that's the sort of thing I
would like in some follow-on document. But this document needs to
sketch the problem in enough detail that implementors are
aware of it.
(In some sense, the solution doesn't require
interoperability. Control
elements will receive request and match them against the
local security
policy. My goal for this document is that the requirement be spelled
out clearly enough that people will understand the need.
iii) Need for a (broader) security architecture. Clearly, a
small section
in the architecture document can not claim to address
all security
issues. I recall that there have been some individual
draft submissions
in the past regarding security requirements.
Additionally, other bodies
such as the OIF have carried more work on securing intra-domain
interfaces for transport networks; some of that work
could hopefully be
useful in this discussion. While much of the additional
work involves
using profiles of existing IP security mechanisms in the
ccamp context,
I can see benefits in terms of pursuing this further,
especially since
it would help alleviate one of the concerns that
carriers considering
deployment of GMPLS or similar solutions have.
Thanks,
Dimitris
-----Original Message-----
From: Wijnen, Bert (Bert) [mailto:bwijnen@lucent.com]
Sent: Wednesday, April 16, 2003 12:38 PM
To: Ccamp-wg (E-mail)
Cc: Steve Bellovin (E-mail)
Subject: FW: draft-ietf-ccamp-gmpls-architecture
Comments on the document from IESG. I think we need an answer
to the serious comment made by Steve
-----Original Message-----
From: Steve Bellovin [mailto:smb@research.att.com]
Sent: woensdag 16 april 2003 18:20
To: iesg-secretary@ietf.org
Cc: iesg@ietf.org
Subject: draft-ietf-ccamp-gmpls-architecture
Nit: section 4 says
Re-using existing IP routing protocols allows for non-PSC
layers to
take advantages of all the valuable developments that took place
since years for IP routing,
which isn't grammatically correct.
Serious issue:
The Security Considerations section hints at, but doesn't follow
through with, the difference between authentication and
authorization.
The requirement for cryptographic authentication or encryption
depends on the risk of attackers being able to inject and/or snoop
on traffic. This may or may not be correlated with intra-domain vs.
inter-domain GMPLS. The physical characteristics and exposure of the
link matter more; there may be additional exposure since it
appears that
the control plane link may be more than one hop long.
The authorization question is what resources a given node may request
of another. This may indeed be differ for inter-domain and
intra-domain
GMPLS. On the other hand, imposing such limits even internally helps
guard against spreading break-ins, and has useful effects with regard
to configuration errors.
The more important question raised by this latter point is whether or
not a security architecture is needed that specifies what sorts of
restrictions can be applied. I don't know the answer to
that one; clearly,
though, implementors are going to have to decide.
*************************************************************
*********
This email and any files transmitted with it are
confidential and intended sol
ely for the use of the individual or entity to whom they are
addressed. Any re
view, retransmission or other use of this communication by
any person or entit
y other than the intended recipient is prohibited. If you
believe that you hav
e received this email in error please notify the sender by
return electronic m
ail and delete all copies of this communication.
*************************************************************
*********
--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (2nd edition of
"Firewalls" book)
--
Papadimitriou Dimitri
E-mail : dimitri.papadimitriou@alcatel.be
Private: http://www.rc.bel.alcatel.be/~papadimd/index.html
E-mail : dpapadimitriou@psg.com
Public : http://psg.com/~dpapadimitriou/
Address: Fr. Wellesplein 1, B-2018 Antwerpen, Belgium
Phone : +32 3 240-8491