Internet DRAFT - draft-hares-i2nsf-mgtflow-reqs

draft-hares-i2nsf-mgtflow-reqs







I2RS working group                                              S. Hares
Internet-Draft                                                    Huawei
Intended status: Standards Track                          March 20, 2016
Expires: September 21, 2016


               I2NSF Management Traffic Flow Requirement
                 draft-hares-i2nsf-mgtflow-reqs-01.txt

Abstract

   This document discuss the stresses on I2NSF management traffic during
   periods DDoS and network attacks, and how application layer tuning of
   I2NSF management traffic can improve the managementtraffic flow.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 21, 2016.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.





Hares                  Expires September 21, 2016               [Page 1]

Internet-Draft            I2NSF Mangement Flow                March 2016


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Stresses on traffic between I2NSF and vNSF/NSF  . . . . . . .   2
     2.1.  DOTS (DDoS Open Threat Signaling) Management Traffic  . .   3
     2.2.  MILE - Managed Incident Lightweight Exchange  . . . . . .   4
   3.  Stresses on I2NSF controller to User traffic  . . . . . . . .   4
   4.  I2NSF Management Traffic Flow Needs . . . . . . . . . . . . .   4
   5.  I2NSF Protocol with Session Layer Services  . . . . . . . . .   5
   6.  Impact of I2NSF potential use of I2RS protocol  . . . . . . .   5
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   6
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .   6
   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   6
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .   6
     10.1.  Normative References . . . . . . . . . . . . . . . . . .   6
     10.2.  Informative References . . . . . . . . . . . . . . . . .   6
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   7

1.  Introduction

   The Interface to the Network Security Function (I2NSF) Working Group
   is chartered with providing architecture and mechanisms to inject
   into and retrieve information from network security devices.  The
   I2NSF problem statement ([I-D.ietf-i2nsf-problem-and-use-cases]
   indicates that service providers lack a standard management interface
   which preserves:

   o  critical communications during DDoS attacks (DOTS),

   o  allows hosts to continue even during the DDoS attacks,

   o  aids reporting of these attacks the CERT (MILE),

   o  and manages network connnectivity of devices out of compliance
      (SACM).

   This document describes the stress on I2NSF management traffic during
   DDoS and network attacks/incidents, and some mechanisms that help
   traffic flow during these periods.  I2NSF considers two directions:
   I2NSF controller to NSF/vNSF, and I2NSF user to I2NSF controller.

2.  Stresses on traffic between I2NSF and vNSF/NSF

   During periods of DDoS attacks, I2NSF management traffic may
   encounter high error rates, congestion, restricted bandwidth caused
   by DDoS related traffic (ICMP spams, transport protocol SYN attacks,
   port spams, and others.), or attacks on specific network machines.
   Message integrity may be compromised by attacks on the transport



Hares                  Expires September 21, 2016               [Page 2]

Internet-Draft            I2NSF Mangement Flow                March 2016


   protocols, or by replay attacks on message sequence.  However, during
   this same time period the I2NSF controller needs to send to NSFs/
   vNSFs new filter policies or other configuration changes.  IDS/IPS
   NSF functions may need to send I2NSF controller information to help
   detect the attack source or stop the attack.

   During DDOS attacks or network security incidents, the client
   programs may want to receive status information from the I2NSF
   controller.  This communication will also be impacted by the high
   error rates, congestion, and restricted bandwidth caused by DDoS
   related traffic or network security attacks.

   This stress can be illustrated by examining two types of management
   traffic which need to be exchanged with the I2NSF controller: DDoS
   Open Threat Signaling (DOTS) traffic, and security incident (CERT)
   traffic reports.

2.1.  DOTS (DDoS Open Threat Signaling) Management Traffic

   Sending information about DDoS threats occurs during periods where
   the DDoS is congesting the network or causing large packet losses.
   I2NSF controllers may receive requests from DOTS controllers to
   configure new network security functions (NSFs) or reconfigure
   existing security functions on vNSF or NSF devices.  I2NSF
   controllers may need to receive specific events from vNSF/NSF
   devices, and receive traffic monitoring data and logs regarding
   network security incidents.

   The DOTS requirements for messages from devices with security
   functions (such as firewalls in routing devices) are specified in:
   [I-D.ietf-dots-requirements].  The following are DOTS descriptions of
   the resiliency needed by the management data:

   o  Resilence (DOTS-G-003) in the face of severally constrained
      severely constrained network conditions imposed by the attack
      traffic.  The protocol SHOULD be resilient, that is, continue
      operating despite message loss and out-of-order or redundant
      signal delivery,

   o  Small message sizes (DOTS-G-005) to prevent fragmentation so that
      all of the message goes through in attack,

   o  Message integrity (G-006) and Message level replay protection
      (G-007) must exist for data streams even during periods of attack,

   o  Session-level Health monitoring (aka Heart beats) during attack
      (DOTS-OP-003), and




Hares                  Expires September 21, 2016               [Page 3]

Internet-Draft            I2NSF Mangement Flow                March 2016


   o  Abiilty to request/stop mitigation quickly (DOTS-OP-005)

2.2.  MILE - Managed Incident Lightweight Exchange

   Reporting and managing security incident traffic is being
   investigated by the MILE working group.  The MILE related protocols
   ([RFC5070], [I-D.ietf-mile-rfc5070-bis]) provide data formats for
   reporting network security incidents during time periods of network
   attack.  Similar to DOTS, the data passed by these protocols requires
   resilience, message integrity, message level replay protection, and
   session-level health monitoring.  During these attacks, the use of
   small message sizes may be necessary.

3.  Stresses on I2NSF controller to User traffic

   The user application communicating with the network security
   controller uses the I2NSF protocol to:

   o  give commands that direct the actions of the Network Security
      Controller during normal operation and during periods of security
      attack,

   o  give commands to direct the creation of policy on the Network
      Security controller, or on the NSF or vNSF devices,

   o  receive reports on the status of network security including DDoS
      attacks, outages, and devices operating outside the appropriate
      security software or actions, and

   o  give commands to link the network security controller to
      additional resources (e.g.  CERT for incident report or additional
      IDS/IPS services)/

   The communication to perform security operations may encounter DDoS
   and network attack related outages, network congestion (bursts of
   congestion or time periods of congestion), and specific network
   attacks on messages protocols (E.g.  TCP syn attacks, ICMP based
   attacks).

4.  I2NSF Management Traffic Flow Needs

   The I2NSF communication needs to support application layer services
   that handle the transport layer's failure to support critical
   communication.  These application services must provide the following
   to preserve the end-to-end communication between I2NSF controller to
   NSF/vNSF and between I2NSF controller and the user:

   o  data flow resilence,



Hares                  Expires September 21, 2016               [Page 4]

Internet-Draft            I2NSF Mangement Flow                March 2016


   o  breaking the data traffic into appropriate sizes for pass through
      congestion (aka "chunking" the data) and re-assembly of data prior
      to handing to application,

   o  message integrity and replay protection,

   Each I2NSF agent and I2NSF client needs to provide this support at
   the application level since security attacks often attack the
   tranport connections.  This is true whether the communication is
   between the I2NSF Controller to vNSF/NSF device, or between the
   user's client device and the I2NSF controller.

5.  I2NSF Protocol with Session Layer Services

   The diagram in figure 1 shows how a secure session service (SSE) at
   the application layer of the I2NSF protocol that could provide these

    +----------+     +----------------+     +-------+
    |I2NSF User| tcp |I2NSF Controller| tcp | NSF   |
    |     SSE -|-----|SSE  layer------|------SSE    |
    |       |  | UDP | |              |     |       |
    |       |----------|              |     |       |
    |          |     |                |     |       |
    +----------+     +----------------+     +-------+

    SSE    outbound       inbound
        +---------------------------------+
        |              | replay checks    |
        +---------------------------------+
        |  Chunking    | combining chunks |
        +--------------+------------------+
        |  integrity   | integrity        |
        |   checks     |  checks          |
        +--------------+------------------+
        |transport pack| transport upack  |
        | transport/net|  transport/net   |
        | congestion   | congestion       |
        | monitoring   | monitoring       |
        +--------------+------------------+

            Figure 1


6.  Impact of I2NSF potential use of I2RS protocol

   I2NSF protocol may want to consider extending the I2RS protocol
   [I-D.hares-i2rs-protocol-strawman] for communication to routers/
   switches that have onboard security functions.  The first version of



Hares                  Expires September 21, 2016               [Page 5]

Internet-Draft            I2NSF Mangement Flow                March 2016


   the I2RS protocol will support communication by NETCONF [RFC6241]
   (with extensions), RESTCONF [I-D.ietf-netconf-restconf] (with
   extensions), and other protocols.  The I2RS working group is seeking
   feedback on management traffic during network outages (security
   related or network connectivity related) in order to determine what
   protocols are needed beyond NETCONF and RESTCONF.  This management
   traffic includes configuration, events, log information, alerts,
   traffic monitoring information, traffic statistics, and end-to-end
   performance information.  I2NSF could help the I2RS working group
   determine the security management information needed to be passed to
   NSF or vNSF functions in routers.

7.  IANA Considerations

   There are no IANA requirements for this requirementdocument.

8.  Security Considerations

   TBD

9.  Acknowledgements

   The following people have aided in the discussion

   o  Russ White,and

   o  Robert Moskowitz.

10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

10.2.  Informative References

   [I-D.hares-i2rs-dataflow-req]
              Hares, S., "I2RS Data Flow Requirements", draft-hares-
              i2rs-dataflow-req-01 (work in progress), March 2016.

   [I-D.hares-i2rs-protocol-strawman]
              Hares, S., "I2RS protocol strawman", draft-hares-i2rs-
              protocol-strawman-00 (work in progress), March 2016.





Hares                  Expires September 21, 2016               [Page 6]

Internet-Draft            I2NSF Mangement Flow                March 2016


   [I-D.ietf-dots-requirements]
              Mortensen, A., Moskowitz, R., and T. Reddy, "DDoS Open
              Threat Signaling Requirements", draft-ietf-dots-
              requirements-00 (work in progress), October 2015.

   [I-D.ietf-i2nsf-problem-and-use-cases]
              Hares, S., Dunbar, L., Lopez, D., Zarny, M., and C.
              Jacquenet, "I2NSF Problem Statement and Use cases", draft-
              ietf-i2nsf-problem-and-use-cases-00 (work in progress),
              February 2016.

   [I-D.ietf-i2rs-architecture]
              Atlas, A., Halpern, J., Hares, S., Ward, D., and T.
              Nadeau, "An Architecture for the Interface to the Routing
              System", draft-ietf-i2rs-architecture-13 (work in
              progress), February 2016.

   [I-D.ietf-mile-rfc5070-bis]
              Danyliw, R., "The Incident Object Description Exchange
              Format v2", draft-ietf-mile-rfc5070-bis-16 (work in
              progress), February 2016.

   [I-D.ietf-netconf-restconf]
              Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
              Protocol", draft-ietf-netconf-restconf-10 (work in
              progress), March 2016.

   [RFC5070]  Danyliw, R., Meijer, J., and Y. Demchenko, "The Incident
              Object Description Exchange Format", RFC 5070,
              DOI 10.17487/RFC5070, December 2007,
              <http://www.rfc-editor.org/info/rfc5070>.

   [RFC6241]  Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
              and A. Bierman, Ed., "Network Configuration Protocol
              (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
              <http://www.rfc-editor.org/info/rfc6241>.

Author's Address

   Susan Hares
   Huawei
   Saline
   US

   Email: shares@ndzh.com






Hares                  Expires September 21, 2016               [Page 7]