Internet Engineering Task Force T. Tsou Internet-Draft Huawei Technologies Intended status: InformationalDecember 22, 2009J. Schoenwaelder Expires:June 20,September 9, 2010 Jacobs University Bremen gGmbH Y. Shi, Ed. Hangzhou H3C Tech. Co., Ltd. March 8, 2010Plug-and-Play Nodal DeploymentProblem Statementdraft-tsou-network-configuration-problem-statement-02 Abstract When a new network node is brought into service, it is typically configured using scripts worked out in advance. These scripts depend critically upon knowledge of the network topology, that is, the node's address and link information. While this information may be derived during advance planning, deviations from plan occur in practice. Correcting the scripts can be expensive, particularly if the corrections have to be reapplied on-site after installation. When an entire network of tens of thousands of nodes is being brought into service, such expenses become a significant part of the deployment budget. Clearly it is helpful if plug-and-play operation of new nodes can be enabled, such that a link between the node and a network management system is established automatically upon activation. In the first place, this allows automated assignment of the node's address and acquisition of its link information at the central location. Beyond that, it provides the meansforapplication of configuration scripts from a central point, avoiding the costPlug-and-Play Deployment ofsending a skilled craftsperson to a remote site.Network Devices draft-tsou-network-configuration-problem-statement-03 Abstract This memo describes the problem of plug-and-play deployment of new nodes. It defines this problem as minimizing the amount of pre- configuration required to achieve a successfulIKEv2 exchangesecurity association with acentral managementcentralized configuration system.It assumes that part of the solution consists of a protocol that distributes addresses from the network management system to the nodes as a preliminary to that exchange. It explores the requirements on that protocol in various network scenarios.Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire onJune 20,September 9, 2010. Copyright Notice Copyright (c)20092010 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Steps To Safely Complete Node Configuration . . . . . . . . . . 41.1. Requirements Language2.1. Preconfiguration . . . . . . . . . . . . . . . . . . .5 2. The. . 4 2.2. Installation . . . . . . . . . . . . . . . . . . . . . . . 4 2.3. IP AddressConfiguration ProtocolAcquisition . . . . . . . . . . . . . .5 2.1. The New Network Scenario. . . . 4 2.4. Management Node Discovery . . . . . . . . . . . . .6 2.2. Increments To an Existing Network. . . . 4 2.5. Establishment of a Secure Channel . . . . . . . . .6 2.3. Attachment To Another Operator's Network. . . . 5 2.6. Topology Discovery and Configuration . . . . .6. . . . . . 5 3. Security Considerations . . . . . . . . . . . . . . . . . . . .75 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . .86 5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . .86 6. Normative References . . . . . . . . . . . . . . . . . . . . .8 Author's Address .6 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .86 1. IntroductionBeforeWhen a new networkmanagement systemnode is brought into service, it is typically configured using scripts worked out in advance. These scripts depend critically upon knowledge of the network topology, that is, the node's address and link information. While this information may be derived during advance planning, deviations from plan occur in practice. Correcting the scripts canconfigurebe expensive, particularly if the corrections have to be reapplied on-site after installation. When an entire network of tens of thousands of nodes is being brought into service, such expenses become a significant part of the deployment budget. Clearly it is helpful if plug-and-play operation of newnetwork node,nodes can be enabled, such that a secure linkhas to be establishedbetween thetwo entities.node and a centralized configuration system is established automatically upon activation. In the first place, this allows automated assignment of the node's address and acquisition of its link information at the central location. Beyond that, it provides the means for application of configuration scripts from a central point, avoiding the cost of sending a skilled craftsperson to a remote site. At a minimum,thisestablishing a link between a new node and a centralized configuration system means that the new node has to acquire an IP address and mask (or an IPv6 prefix). The demands of security (see Section 3) typically mean that the node also needs to possesspre-sharedkeyingmaterial.material in some form. In typical practice such information is entered through a command line interface, and a database relating the device identity to thispre- configuredpre-configured information is built up and made available to thenetwork managementcentralized configuration system. In the worst case, a craftsperson has to do the pre-configuration on site after hardware installation is complete. New networks such as 3GPP LTE (Long Term Evolution) are being deployed today with tens of thousands of network nodes.Pre-configuringPre- configuring each of them manually through a command line interface would be a costly operation, especially if it requires on-site visits. Moreover, topological considerations complicate the task of establishing the management links. A given node may not be reachable until other nodes have been brought into service first. Just to complicate the picture, some nodes may be reachable only across another operator's network. Plug-and-play operation of new network nodes is the ideal outcome, but may not be easy in the face of these considerations. This memoexplores a possible solution toexamines therequirement for plug- and-play operation. This is a protocol through which nodes can request and receive addresses from the network management system, allowing them to communicate with that system. It is assumed that the goal issteps required to achieve asuccessful IKEv2 exchange between the node and the network management system, since once an IPSEC tunnel has been establishedsecure connection betweenthe two entities further configuration can proceed safely. The model of operation assumed in this memo consists of the following steps: 1. Some configuration data is entered into the node at the factory or in advance of deployment. One goal of the analysis which follows is to determine the minimum amount of information which must be so configured. To start with, that information includesanode identifier and the MAC address of each of its interfaces. 2. The node is physically deployed and activated. 3. The node begins to poll its neighbours, looking for a neighbour that can relay a request for an address between the new node and the network management system. 4. Eventually the new node gets a response and acquires an IP address and the address of the network management system. 5. Thenew nodeestablishes a tunnel between itandthe network management system by means of an IKEv2 exchange. The new node is now inaposition to relay requests for addresses from other nodes. 6. The network management system queries the new node for the identitiescentralized source ofthe neighbours reachable through its interfacesconfiguration data, andpossibly other information. 7. The network management system verifies the validity ofcomplete the configurationscriptsof thathave been prepared for this node. If the scripts are valid, it passes the scripts to the node. If they are not valid, corrective action is taken and then the scripts are passed down. Thenodeis now ready for service.within the network. Security considerations are clearly important in determining to what extent plug-and-play operation is possible. The security considerations provided in Section 3 are an integral part of the analysis provided by this memo.1.1. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].2.The AddressSteps To Safely Complete Node ConfigurationProtocol This section explores2.1. Preconfiguration Preconfiguration is defined as that portion of therequirements for an initial addressnode's configurationprotocol. The intentionthat isto provide the information needed to determine whether an existing protocol would doinstalled either at thejob, possibly with modifications,factory orwhetherat anew protocolcentral site before the node isneeded. The exploration considers three scenarios: oinstalled. It seems reasonable that abrand new network where noneconsiderable amount of information describing thenodes have completed configuration to start with; o an existing network to which new nodes are added; o a scenario where the messaging must pass across another operator's network. 2.1. The New Network Scenario Section 1 gave a brief description of an algorithm whereby anodereceivesitself rather than itsIP address and carries out subsequent communications withrelation to the networkmanagement system throughcan be preconfigured. In addition, thefirstnode needs torespondbe preconfigured with information allowing it toit. Inestablish anew network, this algorithm implies that address configuration will advance through a tree which eventually spans the complete network. Communications withsecure channel to thenetwork management system will pass along branchescentralized configuration system. Section 12.5 of [RFC5415] provides one example of thetree until alternative routingsort of information that is needed. 2.2. Installation Installation isestablished. In this specific scenario, the initial poll sent out fromthenew node through eachprocess ofits interfaces needs to contain only the node's MAC address on that link. If a receiving node has established communication withputting thenetwork management system, it sends back a response identifying itself, givinghardware in place, connecting itsown MAC address,interfaces, andindicating that the network management systemverifying its operation. It isreachable through it. If the new node receives more than one such response, it chooses one and sends second message indicating the selection and requestingassumed that theallocationinstallation phase includes verification ofan address. (AsLayer 2 connectivity across each interface. 2.3. IP Address Acquisition Before it can set up arefinement, the responses from the neighbours could contain the round trip time from the neighboursecure link to thenetwork managementcentralized configuration system,andthe new nodecould select the neighbour that minimizes the new node's own round trip time.) The selected neighbour forwards the new node's address request toward the network management system at thehas to be given an IPlevel, with its own address as source and the address ofaddress. It may be desirable for thenetwork managementcentralized configuration systemas destination. The request contains the identity and MAC address of the new node. Upon receiving the request,to control thenetwork management system allocates and returns anaddressand mask or a prefix, as applicable. The neighbour relaysspace. Trust requirements for thisinformation along withphase are discussed in Section 3. DHCP is, of course, thenetwork management system'scandidate means of addressto the new node, which can now operate atacquisition. 2.4. Management Node Discovery Once theIP level itself. Configuration continues withnode has anIKEv2 exchange as described above. IfIP address, thereis no responseare several ways for it toits initial poll, the new node repeatsdiscover thepoll at suitable intervals untilcentralized configuration system. One is for itgetsto send some sort of message out on aresponse. 2.2. Increments To an Existing Network The second scenario is one where the new node is deployed into an existing network. In this case,multicast channel), looking for a reply from theaddresscentralized configurationprotocol described above will continue to work. 2.3. Attachment Tosystem. AnotherOperator's Network The third scenariopossibility isone where another operator's network lies alongthat themessaging path. The only interesting case here is when alladdress or FQDN of thenew node's neighbours belong to the third party. In any other case communication with the network managementcentralized configuration system isprotected by the tunnels that have been set up. When the new node and its neighbour belong to different domains, the informationprovidedbyas part of the process of IP address acquisition, e.g., as a DHCP option. Finally, especially if the new nodetois reachable only across another provider's network, theneighbour hasService Location Protocol [RFC2608] may be used toinclude eitherfind the unicast addressor FQDNof thetarget network managementcentralized configuration system.Otherwise the neighbour would route the request2.5. Establishment of a Secure Channel As Section 3 makes clear, it is essential to establish a secure channel of communication between themanagementcentralized configuration systemfor its own network instead. That meansand thenew node has to be configured with this information so it can send it out. One could imaginenode. Mutual authentication between theaddress configuration protocol operating as described above, withtwo entities is a requirement. It seems likely that theneighbouring node faithfully relayinguse of certificates is theaddress requestpreferable approach to theindicated management entity. However, itnecessary mutual authentication. It may be necessary to define new key purpose values to support this. [Another thing to check, but seemssimplerlikely something exists already in thiscase to rely on local DHCP to give the new node an initial address, thencase.] 2.6. Topology Discovery and Configuration Once these steps havethe new node contact the network management system directly at the IP level.been taken, topological discovery and configuration can proceed. 3. Security Considerations It is critical that no attacker be able to modify the configuration of a networkrouter,device, either through impersonation of thenetwork managementcentralized configuration system or through modification of configuration messages en route to the new node. This is why the preceding discussion assumed that the immediate goal is to set up atunnelsecure channel between the new node and thenetwork management system through an IKEv2 exchange.centralized configuration system. That goal implies that the newnodedevice has to bepre-configuredpre- configured with theshared secret and any otherparameters needed tocarry outestablish theIKEv2 exchange. Takingsecure channel. It is also essential thatpart asan attacker not be able to impersonate agiven, the interesting part ofnew node. Thus theanalysis is whatnode must authenticate itself to thesecurity considerations are forcentralized configuration system as well as theaddress acquisition process. The first point to observe is that, withreverse. With all other aspects of configuration protected, the only outcome of an attack on the address acquisition process is to prevent configuration from being carried out. An attackerwith that goal has to be on the messaging path to achieve it. To minimize exposure to such an attack, the vulnerable portion of the pathcanbe restricted to the portion between the new node and its neighbour, by requiring that messages relayed between the neighbour and the network management system pass via the tunnel that the neighbour has set up. Withaccomplish thisrestriction, the means available to the attacker come down to two: interference withthrough attacks on thelink betweenconfiguration server, on thenew node and any neighbour ablecommunication path toreachthenetwork management system,server, or by impersonation ofsuch a neighbour. The latter is the more likely approach, given thatthenew node probably supports multiple links. The first opportunity for impersonation comes when the new node sends out its initial poll for candidate neighbours. The attacker could send a reply indicating that it isserver or acandidate. The other opportunity is when the new node sends out its second message, the actual request for an address. The attacker could respond before the selected neighbour has an opportunity to do so. In either case, the attacker can provide addresses of its own choosing to the new node. If the allocated address the attacker supplies duplicates the address of another node in the network, subsequent messages from the new node may interfere with messaging to the rightful owner of the address. If the address of the network management systemrelay. Assuming thatthe attacker supplies is false, the subsequent attempt at an IKEv2 exchange will fail. The obvious, but not necessarily effective way to alleviate these attacksDHCP isto provide the means for the new node to authenticate its neighbour as a memberused, impersonation might be countered through use of thesame network. This couldcapabilities provided by [RFC3118]. A perhaps preferable alternative would be to use asecret shared amongst all of the new nodes and their neighbours. The validity of this approach needs further discussion.method based on certificates. 4. IANA Considerations This memo includes no request to IANA. 5. AcknowledgementsTBD. Depends on who gets listed as author.Thanks to Cathy Zhou and Tom Taylor for help in preparing this memo. 6. Normative References[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14,[RFC2131] Droms, R., "Dynamic Host Configuration Protocol", RFC2119,2131, March 1997.Author's Address[RFC2608] Guttman, E., Perkins, C., Veizades, J., and M. Day, "Service Location Protocol, Version 2", RFC 2608, June 1999. [RFC3118] Droms, R. and W. Arbaugh, "Authentication for DHCP Messages", RFC 3118, June 2001. [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and M. Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", RFC 3315, July 2003. [RFC5415] Calhoun, P., Montemurro, M., and D. Stanley, "Control And Provisioning of Wireless Access Points (CAPWAP) Protocol Specification", RFC 5415, March 2009. [RFC5417] Calhoun, P., "Control And Provisioning of Wireless Access Points (CAPWAP) Access Controller DHCP Option", RFC 5417, March 2009. Authors' Addresses Tina Tsou Huawei Technologies Bantian, Longgang District Shenzhen 518129 P.R. China Email: tena@huawei.com Juergen Schoenwaelder Jacobs University Bremen gGmbH Campus Ring 1, Bremen 28759 Germany Email: j.schoenwaelder@jacobs-university.de Yang Shi (editor) Hangzhou H3C Tech. Co., Ltd. Beijing R&D Center of H3C, Digital Technology Plaza, NO.9 Shangdi 9th Street, Haidian District, Beijing China(100085) Phone: +86 010 82775276 Email: young@h3c.com