Open mglt opened 6 years ago
The second paragraph of section 2 is the text below: """ The underlay infrastructure on which the multi-tenancy overlay networks are hosted, can be owned and provided by an underlay provider who may be different from the overlay cloud provider. """
The last paragraph of this section is the text below: """ Given the different relations between Tenant, Geneve Overlay Provider and Infrastructure Provider, this document aims providing requirements to ensure: 1. The Geneve Overlay Provider delivers tenant payload traffic (Geneve inner payload) and ensuring privacy and integrity. 2. The Geneve Overlay Provider provides the necessary means to prevent injection or redirection of the Tenant traffic from a rogue node in the Geneve overlay network or a rogue node from the infrastructure. 3. The Geneve Overlay Provider can rely on the Geneve overlay in term of robustness and reliability of the signaling associated to the Geneve packets (Geneve tunnel header, Geneve header and Geneve options) in order to appropriately manage its overlay. """
If I understand correctly, the comment says that the most common use case- a Cloud Provider providing the virtual network as a service - should be listed. I am inclined to think that use cases popularity is out of the scope of a security analysis.
This document elaborates a model to perform a security analysis. The model defines roles and relations between them as specified in the Geneve architecture document. That a specific combination is popular/common or not should not impact the security analysis. Typically, while the most common use case of today is likely to evolve over time, the security analysis must not. As a result, considering use cases here seems to me out of scope of the document.
As a side note, basing the security analysis on specific use cases is likely to create security vulnerabilities for deployment that do not exactly match the considered most common use case. As a result, this will limit drastically the usage of the protocol to a specific use case, which is probably not what we are looking for.
Do we agree that use cases and security analysis are orthogonal, or do you believe we should still add some considerations of the use cases ?