<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.9 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC6347 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
<!ENTITY RFC4301 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
<!ENTITY RFC8221 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8221.xml">
<!ENTITY RFC8014 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8014.xml">
<!ENTITY RFC7365 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7365.xml">
<!ENTITY RFC7258 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
<!ENTITY RFC7516 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7516.xml">
<!ENTITY RFC8446 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY RFC4303 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
<!ENTITY I-D.ietf-nvo3-geneve SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-nvo3-geneve.xml">
<!ENTITY I-D.ietf-nvo3-security-requirements SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-nvo3-security-requirements.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc docName="draft-mglt-nvo3-geneve-security-requirements-04" category="info">

  <front>
    <title abbrev="Geneve Security Requirements">Geneve Security Requirements</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Boutros" fullname="Sami Boutros">
      <organization>VMware, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country></country>
        </postal>
        <email>boutros@vmware.com&lt;</email>
      </address>
    </author>
    <author initials="D." surname="Wings" fullname="Dan Wings">
      <organization>VMware, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country></country>
        </postal>
        <email>dwing@vmware.com</email>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization>Kaloom</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country></country>
        </postal>
        <email>suresh@kaloom.com</email>
      </address>
    </author>

    <date year="2018" month="October" day="12"/>

    <area>Security</area>
    <workgroup>NVO3</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The document defines the security requirements to protect tenants
overlay traffic against security threats from the NVO3 network
components that are interconnected with tunnels implemented using
Generic Network Virtualization Encapsulation (Geneve).</t>

<t>The document provides two sets of security requirements: 
1. requirements to evaluate the data plane security of a given
deployment of Geneve overlay. Such requirements are intended to Geneve
overlay provider to evaluate a given deployment.<vspace />
2. requirement a security mechanism need to fulfill to secure any
deployment of Geneve overlay deployment</t>



    </abstract>


  </front>

  <middle>


<section anchor="requirements-notation" title="Requirements Notation">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described BCP 14
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section anchor="introduction" title="Introduction">

<t>The network virtualization overlay over Layer 3 (NVO3)  as depicted in
Figure 1, allows an overlay cloud provider to provide a logical L2/L3
interconnect for the Tenant Systems TSes that belong to a specific
tenant network. A packet received from a TS is encapsulated by the
ingress Network Virtualization Edge (NVE). The encapsulated packet is
then sent to the remote NVE through a tunnel. When reaching the egress
NVE of the tunnel, the packet is decapsulated and forwarded to the
target TS. The L2/L3 address mappings to the remote NVE(s) are
distributed to the NVEs by a logically centralized Network
Virtualization Authority (NVA) or using a distributed control plane such
as Ethernet-VPN. In a datacenter, the NVO3 tunnels can be implemented
using Generic Network Virtualization Encapsulation (Geneve)
<xref target="I-D.ietf-nvo3-geneve"/>. Such Geneve tunnels establish NVE-to-NVE
communications, may transit within the data center via Transit device.
The Geneve tunnels overlay network enable multiple Virtual Networks to
coexist over a shared underlay infrastructure, and a Virtual Network may
span a single data center or multiple data centers.</t>

<t>The underlay infrastructure on which the multi-tenancy overlay networks
are hosted, can be owned and provided by an underlay provider who may be
different from the overlay cloud provider.</t>

<figure><artwork><![CDATA[
+--------+                                    +--------+
| Tenant +--+                            +----| Tenant |
| System |  |                           (')   | System |
+--------+  |    .................     (   )  +--------+
            |  +---+           +---+    (_)
            +--|NVE|---+   +---|NVE|-----+
               +---+   |   |   +---+
               / .    +-----+      .
              /  . +--| NVA |      .
             /   . |  +-----+      .
            |    . |               .
            |    . |  L3 Overlay +--+--++--------+
+--------+  |    . |   Network   | NVE || Tenant |
| Tenant +--+    . |             |     || System |
| System |       .  \ +---+      +--+--++--------+
+--------+       .....|NVE|.........
                      +---+
                        |
                        |
              =====================
                |               |
            +--------+      +--------+
            | Tenant |      | Tenant |
            | System |      | System |
            +--------+      +--------+

Figure 1: Generic Reference Model for Network Virtualization Overlays
[RFC7365]
]]></artwork></figure>

<t>This document discusses the security risks that a Geneve based NVO3
network may encounter. In addition, this document lists the requirements
to protect the Geneve packet components defined in
<xref target="I-D.ietf-nvo3-geneve"/> that include the Geneve tunnel IP and UDP
header, the Geneve Header, Geneve options, and inner payload.</t>

<t>The document provides two sets of security requirements:</t>

<t><list style="numbers">
  <t>SEC-OP: requirements to evaluate a given deployment of Geneve
overlay. Such requirements are intended to Geneve overlay provider to
evaluate a given deployment. Security of the Geneve packet may be
achieved using various mechanisms.  Typically, some deployments may use
a limited subset of the capabilities provided by Geneve and rely on
specific assumptions. Given these specificities, the secure deployment
of a given Geneve deployment may be achieved reusing specific mechanisms
such as for example DTLS <xref target="RFC6347"/> or IPsec <xref target="RFC4301"/>. On the
other hand, the definition of a security mechanisms that enables to
secure any Geneve deployment requires the design of a Geneve specific
mechanism. Note that the security s limited to the security of the data
plane only. Additional requirements for the control plan MAY be
considered in <xref target="I-D.ietf-nvo3-security-requirements"/>.</t>
  <t>SEC-GEN: requirements a security mechanism need to fulfill to secure
any deployment of Geneve overlay deployment. Such mechanism may require
the design of a specific solution. In the case new protocol needs to be
design, the document strongly recommend to re-use existing security
protocols like IP Security (IPsec) <xref target="RFC4301"/> and Datagram Transport Layer
Security (DTLS) <xref target="RFC6347"/>, and existing encryption algorithms (such
as <xref target="RFC8221"/>),  and authentication protocols.</t>
</list></t>

<t>This document assumes the following roles are involved:
- Tenant: designates the entity that connects various systems within a
single virtualized network. The various system can typically be
containers, VMs implementing a single or various functions.<vspace />
- Geneve Overlay Provider: provides the Geneve overlay that seamlessly
connect the various Tenant Systems over a given virtualized network. <vspace />
- Infrastructure Provider: provides the infrastructure that runs the
Geneve overlay network as well as the Tenant System. A given deployment
may consider different infrastructure provider with different level of
trust. Typically the Geneve overlay network may use a public cloud to
extend the resource of a private cloud. Similarly, a edge computing may
extend its resources using resource of the core network.</t>

<t>Tenant, Geneve Overlay Provider and Infrastructure Provider can be
implemented by a single or various different entities with different
level of trust between each other. The simplest deployment may consists
in a single entity running its systems in its data center and using
Geneve in order to manage its internal resources. A more complex use
case may consider that a Tenant subscribe to the Geneve Overlay Provider
which manage the virtualized network over various type of
infrastructure. The trust between the Tenant, Geneve Overlay Provider
and Infrastructure Provider may be limited.</t>

<t>Given the different relations between Tenant, Geneve Overlay Provider
and Infrastructure Provider, this document aims providing requirements
to ensure:
1. The Geneve Overlay Provider delivers tenant payload traffic (Geneve
inner payload) and ensuring privacy and integrity. 
2. The Geneve Overlay Provider provides the necessary means to prevent
injection or redirection of the Tenant traffic from a rogue node in the
Geneve overlay network or a rogue node from the infrastructure. 
3. The Geneve Overlay Provider can rely on the Geneve overlay in term of
robustness and reliability of the signaling associated to the Geneve
packets (Geneve tunnel header, Geneve header and Geneve options) in
order to appropriately manage its overlay.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>This document uses the terminology of <xref target="RFC8014"/>, <xref target="RFC7365"/> and
<xref target="I-D.ietf-nvo3-geneve"/>.</t>

</section>
<section anchor="security-threats" title="Security Threats">

<t>Attacks from compromised NVO3 and underlay network devices, and attacks
from compromised tenant systems defined in
<xref target="I-D.ietf-nvo3-security-requirements"/>. This document considers these
attacks in the scope of Geneve, that is when the attackers knowing the
details of the Geneve packets can perform their attacks by changing
fields in the Geneve tunnel header, base header, Geneve options and
Geneve inner payload. The scope of Geneve excludes security requirements
related to the control plane.</t>

<t>Threats include traffic analysis, sniffing, injection, redirection, and
replay. Based on these threats, this document enumerates the security
requirements.</t>

<t>Threats are divided into two categories:  passive attack and active
attack.</t>

<t>Threats are always associated with risks and the evaluation of these
risks depend among other things on the environment.</t>

<section anchor="passive-attacks" title="Passive Attacks">

<t>Passive attacks include traffic analysis (noticing which workloads
are communicating with which other workloads, how much traffic, and when
those communications occur) and sniffing (examining traffic for useful
information such as personally-identifyable information or protocol
information (e.g., TLS certificate, overlay routing protocols).</t>

<t>A rogue element of the overlay Geneve network under the control of an
attacker may leak and redirect the traffic from a virtual network to the
attacker for passive monitoring <xref target="RFC7258"/>.</t>

<t>Avoiding leaking information is hard to enforced and the security
requirements expect to mitigate such attacks by lowering the
consequences, typically making leaked data unusable to an attacker..</t>

</section>
<section anchor="active-attacks" title="Active Attacks">

<t>Active attacks involve modifying packets, injecting packets, or
interfering with packet delivery (such as by corrupting packet
checksum). Active attack may target the Tenant System or the Geneve
overlay.</t>

<t>There are multiple motivations to inject illegitimate traffic into a
tenants network. When the rogue element is on the path of the TS
traffic, it may be able to inject and receive the corresponding messages
back. On the other hand, if the attacker is not on the path of the TS
traffic it may be limited to only inject traffic to a TS without
receiving any response back. When rogue element have access to the
traffic in both directions, the possibilities are only limited by the
capabilities of the other on path elements - Transit device, NVE or TS -
to detect and protect against the illegitimate traffic. On the other
hand, when the rogue element is not on path, the surface for such
attacks remains still quite large. For example, an attacker may target a
specific TS or application by crafting a specific packet that can either
generate load on the system or crash the system or application. TCP syn
flood typically overload the TS while not requiring the ability to
receive responses. Note that udp application are privileged target as
they do not require the establishment of a session and are expected to
treat any incoming packets.</t>

<t>Traffic injection may also be used to flood the virtual network to
disrupt the communications between the TS or to introduce additional
cost for the tenant, for example when pricing considers the traffic
inside the virtual network. The two latest attacks may also take
advantage of applications with a large factor of amplification for their
responses as well as applications that upon receiving a packet interact
with multiple TS. Similarly, applications running on top of UDP are
privileged targets.</t>

<t>Note also that an attacker that is not able to receive the response
traffic, may use other channels to evaluate or measure the impact of the
attack. Typically, in the case of a service, the attacker may have
access, for example, to a user interface that provides indication on the
level of disruption and the success of an attack, Such feed backs may
also be used by the attacker to discover or scan the network.</t>

<t>Preventing traffic to cross virtual networks, reduce the surface of
attack, but rogue element main still perform attacks within a
given virtual network by replaying a legitimate packet. Some variant of
such attack also includes modification of unprotected parts when
available in order for example to increase the payload size.</t>

</section>
</section>
<section anchor="requirements-for-security-mitigations" title="Requirements for Security Mitigations">

<t>The document assumes that Security protocols, algorithms, and
implementations provide the security properties for which they are
designed, an attack caused by a weakness in a cryptographic algorithm is
out of scope.</t>

<t>Protecting network connecting TSes and NVEs which could be accessible
to outside attackers is out of scope.</t>

<t>An attacker controlling an underlying network device may break the
communication of the overlays by discarding or delaying the delivery of
the packets passing through it. The security consideration to prevent
this type of attack is out of scope of this document.</t>

<t>Securing communication between NVAs and NVEs is out of scope.</t>

<t>Selectively providing integrity / authentication, confidentiality /
encryption of only portions of the Geneve packet is in scope. This will
be the case if the Tenant Systems uses security protocol to protect its
communications.</t>

<section anchor="sniffing" title="Protection Against Traffic Sniffing">

<t>Passive attacks consists in inferring information about a virtualized
network or some Tenant System from observing the traffic. This could
also involve the correlation between observed traffic and additional
information.  For example, a passive network observer can determine two
virtual machines are communicating by manipulating activity or network
activity of other virtual machines on that same host. For example, the
attacker could control (or be otherwise aware of) network activity of
the other VMs running on the same host, and deduce other network
activity is due to a victim VM.</t>

<t>The inner payload, unless protection is provided by the Tenant System
reveals the content of the communication. This may mitigate by the
Tenant using application level security such as, for example JSON Web
Encryption <xref target="RFC7516"/> or transport layer security such as DTLS
<xref target="RFC6347"/> or TLS <xref target="RFC8446"/> or IPsec/ESP <xref target="RFC4303"/>. However none
of these security protocols are sufficient to protect the entire inner
payload. IPsec/ESP still leave in clear the optional L2 layer
information as well as the IP addresses and some IP options. In addition
to these pieces of information, the use of TLS or DTLS reveals the
transport layer protocol as well as ports.</t>

<t>A secure deployment of a Geneve overlay must fulfill the requirement
below:</t>

<t><list style="numbers">
  <t>SEC-OP-1: A secure deployment of a Geneve overlay SHOULD by default
encrypt the inner payload. A Geneve overlay provider MAY disable this
capability for example when encryption is performed by the Tenant System
and that level of confidentiality is believed to be sufficient. In order
to provide additional protection to traffic already encrypted by the
Tenant the Geneve network operator MAY partially encrypt the clear part
of the inner payload.</t>
</list></t>

<t>A Geneve security mechanism must fulfill the requirements
below:</t>

<t><list style="symbols">
  <t>SEC-GEN-1: Geneve security mechanism MUST provide the capability to
encrypt the inner payload.</t>
  <t>SEC-GEN-2: Geneve security mechanism SHOULD provide the capability to
partially encrypt the inner payload header.</t>
</list></t>

<t>The Geneve Header and Geneve Options contains metadata information
related to the communications. Note that a Geneve packet may have a
combination of Geneve options that needs to be read by transit device,
in which case this option needs to be read by the transit device while
other options MAY only be accessed by the tunnel endpoint. Information
revealed as well as correlation with traffic volumetry may reveal
pattern traffic within a given virtualized network as well as any
information revealed by the current and future Geneve Option.</t>

<t>A secure deployment of a Geneve overlay must fulfill the requirement
below:</t>

<t><list style="symbols">
  <t>SEC-OP-2: A secure deployment of a Geneve overlay MUST evaluate the
information associated to the leakage of the Geneve Outer Header, Geneve
Header and Geneve Option. When those information are likely to carry
sensitive information. they MUST NOT be transmit in clear text.</t>
  <t>SEC-OP-3: A secure deployment of a Geneve overlay MUST evaluate the
risk associated to traffic pattern recognition. When a risk has been
identified, traffic pattern recognition MUST be addressed with padding
policies as well as generation of dummy packets.</t>
</list></t>

<t>A Geneve security mechanism must fulfill the requirements
below:</t>

<t><list style="symbols">
  <t>SEC-GEN-3: Geneve security mechanism MUST provide the capability to
encrypt a single or a set of options while leave other Geneve Option in
clear. Reversely, a Geneve security mechanism MUST be able to leave a
Geneve option in clear, while encrypting the others.</t>
  <t>SEC-GEN-4: Geneve security mechanism MUST provide means to encrypt
the information of Geneve Header. Reversely, a Geneve security mechanism
MUST be able to leave in clear header information while encrypting the
other.</t>
  <t>SEC-GEN-5: Geneve security mechanism MUST provide the ability to pad
a Geneve packet.</t>
  <t>SEC-GEN-6: Geneve security mechanism MUST provide the ability to send
dummy packets.</t>
</list></t>

</section>
<section anchor="injection" title="Protecting Against Traffic Injection">

<t>Traffic injection from a rogue non legitimate NVO3 Geneve overlay device
or a rogue underlay transit device can target an NVE, a transit underlay
device or a Tenant System. Targeting a Tenant's System requires a valid
MAC and IP addresses of the Tenant's System.</t>

<t>Tenant's System may protect their communications using IPsec or TLS.
Such protection protects the Tenants from receiving spoofed packets, as
any injected packet is expected to be discarded by the destination
Tenant's System.  Such protection does not protect the tenant system
from receiving illegitimate packets that may disrupt the Tenant's System
performance. The Geneve overlay network MAY still need to prevent such
spoofed Tenant's system packets from being steered to the Tenant's
system. When the Tenant's Systems are not protecting their
communications, the Geneve overlay network SHOULD be able to to prevent
a rogue device from injecting traffic into the overlay network.</t>

<t>In order to prevent traffic injection to one virtual network, the
destination legitimate Geneve NVE MUST be able to authenticate the
incoming Geneve packets from the source NVE.  The Geneve architecture
considers transit devices that MAY process some Geneve Option without
affecting the Geneve packet. These transit device MAY Authenticate the
Geneve packet as part of the Geneve packet processing but MAY also
process other Geneve options. As a result, integrity protection and
authentication SHOULD be performed by transit device, prior to any
processing.</t>

<t>A secure deployment of a Geneve overlay must fulfill the requirement
below:</t>

<t><list style="symbols">
  <t>SEC-OP-4: A secure deployment of a Geneve overlay SHOULD
authenticate communications between NVE to protect the Geneve Overlay
infrastructure as well as the Tenants System's communications (Geneve
Packet). A Geneve overlay provider MAY disable authentication of the
inner packet and delegates it to the Tenant Systems when communications
between Tenant's System is secured. This is NOT RECOMMENDED. To prevent
injection between virtualized network, it is strongly RECOMMENDED that
at least the Geneve Header is authenticated.</t>
  <t>SEC-OP-5: A secure deployment of a Geneve overlay SHOULD NOT process
data prior authentication. If that is not possible, the Geneve overlay
provider SHOULD evaluate its impact.</t>
</list></t>

<t>A Geneve security mechanism must fulfill the requirements
below:</t>

<t><list style="symbols">
  <t>SEC-GEN-8: Geneve Security mechanism MUST provide means for a
tunnel endpoint (NVE) to  authenticate data prior it is being
processed. A tunnel endpoint (NVE) MUST be able to authenticate at
least:
  <list style="symbols">
      <t>the Geneve Header and a subset of Geneve Options</t>
      <t>the Geneve Header, a subset of Geneve options and the Geneve
inner payload</t>
      <t>the Geneve Header, a subset of Geneve options and the Geneve
inner payload or the portion of the inner payload in case the Tenant's
System provides some authentication mechanism.</t>
    </list></t>
  <t>SEC-GEN-9: Geneve Security mechanism SHOULD provide means for a
transit device to authenticate the Geneve Option prior processing it.
Authentication MAY concern the whole Geneve packet, but MAY be limited
to the Geneve Option.</t>
</list></t>

</section>
<section anchor="protecting-against-traffic-redirection" title="Protecting Against Traffic Redirection">

<t>A rogue device of the NVO3 overlay Geneve network or the underlay
network may redirect the traffic from a virtual network to the attacker
for passive or active attacks. If the rogue device is in charge of the
securing the Geneve packet, then Geneve security mechanisms are not
intended to address this threat. More specifically, a rogue source NVE
will still be able to redirect the traffic in clear text before
protecting ( and encrypting the packet). A rogue destination NVE will
still be able to redirect the traffic in clear text after decrypting the
Geneve packets. The same occurs with a rogue transit that is in charge
of encrypting and decrypting a Geneve Option,  Geneve Option or any
information. The security mechanisms are intended to protect a Geneve
information from any on path  node. Note that modern cryptography
recommend the use of authenticated encryption. This section assumes such
algorithms are used, and as such encrypted packets are also
authenticated.</t>

<t>To prevent an attacker located in the middle between the NVEs and
modifying the tunnel address information in the data packet header to
redirect the data traffic, the solution need to provide confidentiality
protection for data traffics exchanged between NVEs.</t>

<t>Requirements are similar as those provided in section <xref target="sniffing"/> to
mitigate sniffing attacks and those provided in section <xref target="injection"/>
to mitigate traffic injection attacks.</t>

</section>
<section anchor="protecting-against-traffic-replay" title="Protecting Against Traffic Replay">

<t>A rogue device of the NVO3 overlay Geneve network or the underlay
network may replay a Geneve packet, to load the network and/or a
specific Tenant System with a modified Geneve payload. In some cases,
such attacks may target an increase of the tenants costs.</t>

<t>When traffic between tenants is not protected, the rogue device may
forward the modified packet over a valid (authenticated) Geneve Header.
The crafted packet may for example, include a specifically crafted
application payload for a specific Tenant Systems application, with the
intention to load the tenant specific application.</t>

<t>Updating the Geneve header and option parameters such as setting an
OAM bit, adding bogus option TLVs, or setting a critical bit, may result
in different processing behavior, that could greatly impact performance
of the overlay network and the underlay infrastructure and thus affect
the tenants traffic delivery.</t>

<t>The NVO3 overlay network and underlay network nodes that may address
such attacks MUST provide means to authenticate the Geneve packet
components.</t>

<t>A secure deployment of a Geneve overlay must fulfill the requirement
below:</t>

<t><list style="symbols">
  <t>SEC-OP-6: A secure deployment of a Geneve overlay MUST evaluate the
flows subject to replay attacks. Flows that are subject to this attacks
MUST be authenticated with an anti replay mechanism. Note that when
partial authentication is provided, the part not covered by the
authentication remains a surface of attack. It is strongly RECOMMENDED
that the Geneve Header is both authenticated with anti replay
protection.</t>
</list></t>

<t>A Geneve security mechanism must fulfill the requirements
below:</t>

<t><list style="symbols">
  <t>SEC-GEN-10: Geneve Security mechanism MUST provide means for a
tunnel endpoint (NVE) to validate the Geneve Header corresponds to the
Geneve payload, and discard such packets.</t>
</list></t>

</section>
<section anchor="security-management" title="Security Management">

<t>A secure deployment of a Geneve overlay must fulfill the requirement
below:</t>

<t><list style="symbols">
  <t>SEC-OP-7: A secure deployment of a Geneve overlay MUST define the
security policies that associates the encryption, and authentication
associated to each flow between NVEs.</t>
  <t>SEC-OP-8: A secure deployment of a Geneve overlay SHOULD define
distinct material for each flow. The cryptographic depends on the nature
of the flow (multicast, unicast) as well as on the security mechanism
enabled to protect the flow.</t>
</list></t>

<t>A Geneve security mechanism must fulfill the requirements
below:</t>

<t><list style="symbols">
  <t>SEC-GEN-11: A Geneve security mechanism MUST be managed via security
policies associated for each traffic flow to be protected.  Geneve
overlay provider MUST be able to configure NVEs with  different
security policies for different flows. A flow MUST be identified at
minimum by the Geneve virtual network identifier and the inner IP and
transport headers, and optionally additional fields which define a flow
(e.g., inner IP DSCP, IPv6 flow id, Geneve options).</t>
  <t>SEC-GEN-12: A Geneve security mechanism MUST be able to assign
different cryptographic keys to protect the unicast tunnels between NVEs
respectively.</t>
  <t>SEC-GEN-13: A Geneve security mechanisms, when multicast is used,
packets,MUST be able to assign distinct cryptographic group keys to
protect the multicast packets exchanged among the NVEs within different
multicast groups. Upon receiving a data packet, an egress Geneve NVE
MUST be able to verify whether the packet is sent from a proper ingress
NVE which is authorized to forward that packet.</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>There are no IANA consideration for this document.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The whole document is about security.</t>

<t>Limiting the coverage of the authentication / encryption provides
some means for an attack to craft special packets.</t>

<t>The current document details security requirements that are related to
the Geneve protocol. Instead, <xref target="I-D.ietf-nvo3-security-requirements"/>
provides generic architecture security requirement upon the deployment
of an NVO3 overlay network. It is strongly recommended to read that
document as architecture requirements also apply here. In addition,
architecture security requirements go beyond the scope of Geneve
communications, and as such are more likely to address the security
needs upon deploying an Geneve overlay network.</t>

<section anchor="tls" title="TLS">

<t>This section compares how NVE communications using TLS meet the security
requirements for a secure Geneve overlay deployment. In this example TLS
is used over the Geneve Outer Header and secured the Geneve Header,
Geneve Options and the inner payload.</t>

<t>The use of TLS MAY fill the security requirements for a secure Geneve
deployment. However TLS cannot be considered as the Geneve security
mechanism enabling all Geneve deployments.</t>

<t>The use of to secure a Geneve overlay deployment TLS meets SEC-OP-1 as
it protects the inner payload of the tenant. It meets SEC-OP-2 as except
from the UDP port, no information concerning Geneve is leaked. SEC-OP-3
is not met as TLS does not provide the ability to send dummy traffic,
nor to pad. SEC-OP-4 is met as the communication is authenticated,
including the Geneve Header.  SEC-OP-5 is met as the Geneve Packet is
processed once it has been authenticated.  SEC-OP-6 is met as TLS comes
with anti replay protection.  SEC-OP-7 and SEC-OP-8 may also be met with
security policies established per UDP destination port where only
unicast is considered.</t>

<t>The use of TLS as a generic Geneve Security mechanism meets SEC-GEN-1 as
it encrypts the inner payload. However, TLS, but does not enable partial
encryption of the inner payload. TLS does not meet SEC-GEN3 or SEC-GEN-4
that requires the ability to encrypt of a subset of the Geneve Options
or the Geneve Header information. In addition, TLS does not enable that
some Geneve option of Header information remain in clear text while
other are encrypted. Typically TLS would not be compatible with transit
device. In addition is make the Geneve option visible to the transit
device, TLS does not provide the ability for a transit device to
authenticate the option before processing it. SEC-GEN-5 and SEC-GEN-6
are not met as TLS does not provide padding nor the ability to generate
dummy packets. TLS does not meet SEC-GEN-8 that requires the ability to
authenticate some combination of Geneve Header, Geneve Options,
(partial) inner payload.  TLS does not meet SEC-GEN-9 that requires the
ability to authenticate a single Geneve Option. TLS meets SEC-GEN-10 as
it provides anti replay mechanism to the authentication. SEC-GEN-11 is
not natively supported as TLS security is established by UDP destination
ports, rather than by flow.  If more than one security policy or flow
needs to be considered a binding between flow and ports needs to be
established.   SEC-GEN-13 is not met for mutlicast traffic.</t>

</section>
<section anchor="ipsec" title="IPsec">

<t>The use of IPsec/ESP or IPsec/AH share most of the analysis performed
for TLS. The main advantages of using IPsec would be that IPsec supports
multicast communications and natively supports flow based security
policies. However, the use of these security policies in a context of
Geneve is not natively supported.</t>

</section>
</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank Ilango S Ganaga for its useful reviews
and clarifications as well as Matthew Bocci, Sam Aldrin and Ignas
Bagdona for moving the work forward.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8174;
&RFC6347;
&RFC4301;
&RFC8221;
&RFC8014;
&RFC7365;
&RFC7258;
&RFC7516;
&RFC8446;
&RFC4303;


    </references>

    <references title='Informative References'>

&I-D.ietf-nvo3-geneve;
&I-D.ietf-nvo3-security-requirements;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

