Re: [Last-Call] New Version Notification for draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Tom!

> -----Original Message-----
> From: tom petch <daedulus@xxxxxxxxxxxxx>
> Sent: Friday, October 30, 2020 7:14 AM
> To: Roman Danyliw <rdd@xxxxxxxx>; Rafa Marin-Lopez <rafa@xxxxx>
> Cc: i2nsf@xxxxxxxx; Fernando Pereniguez-Garcia
> <fernando.pereniguez@xxxxxxxxxxx>; Gabriel Lopez <gabilm@xxxxx>;
> ynir.ietf@xxxxxxxxx; last-call@xxxxxxxx
> Subject: Re: [Last-Call] New Version Notification for draft-ietf-i2nsf-sdn-ipsec-
> flow-protection-11.txt
> 
> Roman  not this I-D but see below
> 
> On 29/10/2020 18:46, Roman Danyliw wrote:
> > Hi Tom!
> >
> >> -----Original Message-----
> >> From: last-call <last-call-bounces@xxxxxxxx> On Behalf Of tom petch
> >> Sent: Thursday, October 29, 2020 12:38 PM
> >> To: Rafa Marin-Lopez <rafa@xxxxx>
> >> Cc: i2nsf@xxxxxxxx; Fernando Pereniguez-Garcia
> >> <fernando.pereniguez@xxxxxxxxxxx>; Gabriel Lopez <gabilm@xxxxx>;
> >> ynir.ietf@xxxxxxxxx; last-call@xxxxxxxx
> >>
> >> Top posting a new, related issue that may need Security AD or WG
> >> Chair to act on.
> >>
> >> It seems to me that the IANA entries for IKEv2 are incomplete.
> >> RFC8247 does a fine job of specifying algorithms and adding
> >> information such as status (MUST/SHOULD+), IoT, AEAD and so on,
> >> information which is not present on IANA.  The policy for, e.g.
> >> Transform Type 1, is expert review and entries have been added via
> >> draft-smyslov-esp-gont but the IANA entries lack this information
> >> and, looking at the I-D, I see no such information (nor is there any
> >> reason for it to be there).  Yet draft-ietf-i2nsf-sdn... needs this information
> as references in the YANG module show.
> >>
> >> It seems to me that this is a similar situation to that which the TLS
> >> WG found itself in and which led to a revision of the TLS IANA
> >> entries to provide what was needed via additional columns.
> >
> > Please help me understand.  In particular, I'm not following why this
> document should modify IKE IANA registries.  In my view, this document is
> provides a data model to encode an "IKEv2 configuration" of sorts.  Certainly,
> there are valid/invalid/incomplete/not recommended ways to provide a
> configuration with this data model if one relied solely on the pointers to the
> IANA registries from the YANG module definition.  However, as you noted,
> RFC8247 already provides guidance on specifying a configuration (albeit this
> guidance isn't fully encoded in the registries).  Furthermore, this document
> states:
> >
> > Section 8.1
> >     o  IKEv2 configurations should adhere to the recommendations in
> >        [RFC8247].
> >
> > so there is guidance on producing a configuration.  What is missing?
> >
> >> I think that the IANA pages for IKEv2 need revising so that that
> >> additional information that RFC8247 provides is required as
> >> additional columns in the IANA entries at least for Type 1, Type 2,
> >> Type 3, Type 4 and Authentication Method.
> >
> > While things could be clearer, I'm unsure of why _this YANG document_
> should do a registry reengineering.  Did you mean it should be done in general?
> 
> Not this I-D but another I-D from a WG with closer links to IKEv2; I don't know
> which WG that would be but a Security AD would:-)

Thanks for clarifying.  IPSECME (https://datatracker.ietf.org/wg/ipsecme/about/) (who has been cross-posted with this note)  is likely the best place to handle IPsec maintenance and the kind of registry modifications you describe below.

Regards,
Roman

> This I-D, as you quote, points to RFC8247 for guidance and that is fine.
>   But security moves on and new algorithms will be needed and this I-D also
> points to the IANA registry, which is Expert Review, where new entries have
> been added already; and for those the IANA Registry gives no guidance and the
> I-D that IANA references for the new entries - written by the Expert Reviewer! -
> also gives no guidance. Over time we are likely to accrue algorithms with no
> guidance unless and until an RFC8247-bis appears or we require IANA to have
> columns for guidance.
> Currently the new algorithms are GOST and so perhaps of limited interest but
> on the TLS list I am always seeing new algorithms appear and there the new
> IANA entry is required to give guidance.  My sense is that IKEv2 is a bit slower
> to take up new ones but, as with RFC8247, it does eventually.
> 
> I think that users need those extra columns that RFC8247 provides on the IANA
> website so that when new algorithms are added by Expert Review, then that
> guidance must be added as well.  This is what the TLS WG came round to and I
> think that IKEv2 needs to do the same.
> 
> Tom Petch
> 
> 
> > Regards,
> > Roman
> >
> >> Tom Petch
> >>
> >> On 29/10/2020 11:23, Rafa Marin-Lopez wrote:
> >>> Hi Tom:
> >>>
> >>>> El 28 oct 2020, a las 19:02, tom petch <daedulus@xxxxxxxxxxxxx>
> escribió:
> >>>>
> >>>> On 28/10/2020 10:42, Rafa Marin-Lopez wrote:
> >>>>> Hi Tom:
> >>>>>
> >>>>> Thank you very much for your insight. It is very helpful. Please
> >>>>> see our
> >> comments/questions inline.
> >>>>>
> >>>>>> El 27 oct 2020, a las 13:42, tom petch <daedulus@xxxxxxxxxxxxx>
> >> escribió:
> >>>>>>
> >>>>>> I think that the IESG will find a number of problems with this I-D.
> >>>>>>
> >>>>>> YANG module references RFC822 which is several years out of date
> >>>>
> >>>> Rafa
> >>>>
> >>>> On boiler plate, I mean the reference to RFC2119 which now must use
> >>>> the
> >> language from RFC8174 in the body of the I-D; sorry for the confusion.
> >>>
> >>> Ah ok. I guess you are referring to change that paragraph with this:
> >>>
> >>>
> >>> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
> >>> "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
> >> "MAY", and
> >>> "OPTIONAL" in this document are to be interpreted as described in
> >>> BCP
> >>> 14 RFC2119 RFC8174 when, and only when, they appear in all capitals,
> >>> as shown here.
> >>>
> >>>>
> >>>> On XXXX, you have XXXX standing in for more than one RFC-to-be
> >>>> which
> >> confuses.  The convention is to use XXXX for this I-D and then AAAA
> >> BBBB etc for any others such as the netconf I-D in this instance.
> >>>
> >>> Ah ok. In any case, we have now only XXXX for our RFC-to-be so
> >>> problem
> >> fixed.
> >>>>
> >>>> Two big issues, for me (perhaps not for others).  The convention
> >>>> with YANG
> >> is for each successive line to be indented two characters, you have
> >> four, which creates a lot of white space and pushes the text to the
> >> right hand margin.  I think that two characters is the default when
> >> you use pyang to format a YANG module.
> >>>
> >>> We can try to reduce it to two characters.
> >>>
> >>>>
> >>>> And references.  I have had to work harder than I want to to make
> >>>> sense of the IANA references.  I think you should have five
> >>>> separate references in the I-D for IANA for Transform Type 1
> >>>> Transform Type 3 Transform Type 4 Authentication Method Protocol
> >>>> Numbers and each reference in the I-D should have a URL pointing to
> >>>> the specific section of
> >> IANA web site.
> >>>
> >>> Ok, good. This follows what we thought.
> >>>
> >>>> In the YANG, it is harder to know what to do.  Those first three
> >>>> references
> >> are in the third tier i.e.
> >>>> Group - Internet Key Exchange V2 (IKEv2) Parameters Registry
> >>>> -Transform Attribute Types and then Type 1, 3, 4 as the third tier
> >>>> as I am calling it and I think that every reference in the YANG
> >>>> should give me all three tiers after IANA in that order perhaps
> >>>> IANA; IKEv2 Parameters; Transform Atribute Types; Transform Type 1
> >>>
> >>> Great. We also considered this as a possible solution after sending our e-
> mail.
> >> Let’s do it.
> >>>
> >>>> If the syntax needs tweeking, then the RFC Editor will do a good
> >>>> job of that
> >> but at present the references are inconsistent in which elements are
> >> specified in what order and that is something the RFC Editor probably
> cannot cope with.
> >>>> Authentication Method is a registry so that just needs Group name
> >>>> and
> >> Registry name after IANA.
> >>>
> >>> Ok, good.
> >>>>
> >>>> Some minor glitches.
> >>>> I-D appears twice in the body of the I-D - perhaps document or memo.
> >>>
> >>> Ok.
> >>>
> >>>> objetives/objectives/
> >>>
> >>> Fixed.
> >>>> end port number perhaps /must/MUST/
> >>>
> >>>> and YANG is very good at including such checks with a must ....
> >>>> 'If AEAD is used .. where? this occurs in several places and I
> >>>> think that you
> >> need to specify the leaf where AEAD will be specified or implied.
> >>>
> >>> Ok we have changed it to:
> >>>
> >>> If Authenticated Encryption with Associated Data (AEAD) is used
> >>> (leaf
> >>> esp-algorithms/encryption/algorithm-type)
> >>> this flag MUST be false."
> >>>
> >>>> And is it possible to make that a YANG 'must' statement - looking
> >>>> at the
> >> IKEv2 registries it is not obvious which are AEAD so that might be
> >> more complexity than it is worth.
> >>>> 'only available on linux kernels' Um implementation detail, you may
> >>>> get
> >> asked to remove that altogether or at least to a Informative Appendix
> >> - I would leave it in for now.
> >>>
> >>> Ok.
> >>>
> >>>> 'import ietf-i2nsf-ikec' the reference needs to be to a RFC and if
> >>>> it is not yet an RFC then RFC XXXX <title> in both Appendix B and C
> >>>
> >>> Yes, we have changed that to:
> >>>
> >>> RFC XXXX: Software-Defined Networking
> >>>                  (SDN)-based IPsec Flow Protection.
> >>>
> >>>> leaf-list pfs-groups could do with a reference - Transform Type 4?
> >>>
> >>> The leaf list is referring to type pfs-group and we have now
> >>>
> >>> typedef pfs-group {
> >>>               type uint16;
> >>>               description
> >>>                   "DH groups for IKE and IPsec SA rekey.";
> >>>               reference
> >>>                   "IANA; Internet Key Exchange V2 (IKEv2) Parameters;
> >>> 				Transform Atribute Types; Transform Type 4 -
> >>>                   Diffie-Hellman Group Transform IDs.
> >>> 				Section 3.3.2 in RFC 7296.";
> >>>           }
> >>>
> >>>
> >>>>
> >>>> I am still working my way through the YANG so may have some more
> >> comments tomorrow.
> >>>
> >>> Ok, do not worry we will work in -12 with these comments so far to
> >>> have a
> >> quick response. We can prepare a another version later with the rest of
> them.
> >>>
> >>> Thank you very much for your effort.
> >>>>
> >>>> Tom Petch
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>> We have realized that we missed to change this, even though we
> >>>>> discussed
> >> it. We will change it right away in the following way (bold):
> >>>>>
> >>>>> case rfc822-address-string {
> >>>>>        leaf rfc822-address-string {
> >>>>>             type string;
> >>>>>             description
> >>>>>                 "Specifies the identity as a
> >>>>>                  fully-qualified RFC5322 email
> >>>>>                  address string. An example is,
> >>>>>                  jsmith@xxxxxxxxxxx. The string
> >>>>>                  MUST NOT contain any
> >>>>>                  terminators e.g., NULL, CR,
> >>>>>                  etc.).";
> >>>>>              reference
> >>>>>                     "RFC 5322.";
> >>>>>        }
> >>>>> }
> >>>>>
> >>>>> Btw, we already used in the past “case rfc822-address-string” and
> >>>>> “leaf
> >> rfc822-address-string” since this is coming from IKEv2 standard. Do
> >> you think we should change that name as well?
> >>>>>
> >>>>>
> >>>>>>
> >>>>>> YANG module references IANA Protocol Numbers which is not in the
> >>>>>> I-D references
> >>>>>
> >>>>> We have included the following reference:
> >>>>>
> >>>>> [IANA-Protocols-Number]
> >>>>>                 Internet Assigned Numbers Authority (IANA), "Protocol
> >>>>>                 Numbers", January 2020.
> >>>>>
> >>>>>
> >>>>>>
> >>>>>> s.2 boiler plate is out of date
> >>>>>
> >>>>> What we see is the I-D has the second choice stated in
> >>>>> https://www.ietf.org/standards/ids/guidelines/
> >>>>>
> >>>>> This Internet-Draft is submitted in full conformance with the
> >>>>>      provisions of BCP 78 and BCP 79.
> >>>>>
> >>>>>      Internet-Drafts are working documents of the Internet Engineering
> >>>>>      Task Force (IETF).  Note that other groups may also distribute
> >>>>>      working documents as Internet-Drafts.  The list of current Internet-
> >>>>>      Drafts is at https://datatracker.ietf.org/drafts/current/.
> >>>>>
> >>>>>      Internet-Drafts are draft documents valid for a maximum of six
> months
> >>>>>      and may be updated, replaced, or obsoleted by other documents at
> any
> >>>>>      time.  It is inappropriate to use Internet-Drafts as reference
> >>>>>      material or to cite them other than as "work in progress."
> >>>>>
> >>>>> Could you refer what is out of date?
> >>>>>
> >>>>>>
> >>>>>> XXXX is standing in for more than one RFC
> >>>>>
> >>>>> Yes, XXXX has been used because we do not know the future number
> >> assigned to our I-D.
> >>>>>
> >>>>> Also we realized we also included this to refer to crypto-types
> >>>>> I-D but this
> >> has been solved now in a new version -12 that we are preparing to
> >> include your comments. We noticed we can replace the type of rw
> >> cert-data?, ca-data*, crl- data? for binary without any problem.
> >>>>>
> >>>>> |           |     +--rw cert-data?        binary
> >>>>> |           +--rw private-key?            binary
> >>>>> |           +--rw ca-data*                binary
> >>>>> |           +--rw crl-data?               binary
> >>>>>
> >>>>>>
> >>>>>> but the show stopper that makes a proper review of this too
> >>>>>> costly is the
> >> references.  Those to IANA of which there are several I want to
> >> pursue.  The I-D reference is to IKEv2 parameters. Sadly, this is a
> >> three tier structure and noone agrees on what to call the third tier
> >> so I will call it tier3 here.  Top level is Group, as per RFC8126,
> >> second level is Registry.  The I-D reference is to the Group only
> >> which is fine if the actual reference then specifies the Registry and
> >> Tier3 but they never do, usually just Tier3 e.g. Transform Type 3
> >> which makes for a lot of work for the reader, too much for this one.
> >> You have to go hunting in all the second level Registry until you can
> >> find a match for the Tier3 identifier. And there are no URL.  If you
> >> want an example that I find easy to use, go look at RFC8407 (as usual).
> >>>>>
> >>>>> You’re right. Could you point the exact part at RFC 8407 with that
> >> example? We would really appreciate it.
> >>>>>
> >>>>> On the other hand, would it be enough to include the URL for
> >>>>> Transform
> >> Type 3 https://www.iana.org/assignments/ikev2-parameters/ikev2-
> >> parameters.xhtml#ikev2-parameters-7 ?
> >>>>>
> >>>>> (Same for Transform Type 1, Transform Type 4)
> >>>>>
> >>>>>>
> >>>>>> The reference for import of i2nsf-ikec gives a YANG module name;
> >>>>>> this needs to be the name of the RFC to be
> >>>>>
> >>>>> Fixed.
> >>>>>
> >>>>> import ietf-i2nsf-ikec {
> >>>>>               prefix nsfikec;
> >>>>>               reference
> >>>>>                   "RFC XXXX: Software-Defined Networking
> >>>>>                  (SDN)-based IPsec Flow Protection."; }
> >>>>>
> >>>>> We still use XXXX because we do not know the number assigned to
> >>>>> the RFC
> >> to be.
> >>>>>
> >>>>>>
> >>>>>> The example IPv6 address in the YANG module has :0:0: which is
> >>>>>> usually
> >> just ::
> >>>>>
> >>>>> Fixed.
> >>>>>
> >>>>> If you have any further comments, please let us know so we can
> >>>>> include them in -12
> >>>>>
> >>>>> Best Regards.
> >>>>>>
> >>>>>> And I have some way to go still.
> >>>>>>
> >>>>>> Tom Petch
> >>>>>>
> >>>>>> On 22/10/2020 18:39, Rafa Marin-Lopez wrote:
> >>>>>>> Dear all:
> >>>>>>>
> >>>>>>> After receiving a suggestion to make things clearer in the
> >>>>>>> feature ikeless-
> >> notification description, we have just uploaded a new version -11
> >> with a minor change to add the following text:
> >>>>>>>
> >>>>>>> feature ikeless-notification {
> >>>>>>>               description
> >>>>>>>                   "This feature indicates that the server supports
> >>>>>>>                   generating notifications in the ikeless module.
> >>>>>>>
> >>>>>>>                   To ensure broader applicability of this module,
> >>>>>>>                   the notifications are marked as a feature.
> >>>>>>>                   For the implementation of ikeless case,
> >>>>>>>                   the NSF is expected to implement this
> >>>>>>>                   feature.";
> >>>>>>>           }
> >>>>>>>
> >>>>>>> Best Regards.
> >>>>>>>
> >>>>>>>> Inicio del mensaje reenviado:
> >>>>>>>>
> >>>>>>>> De: internet-drafts@xxxxxxxx
> >>>>>>>> Asunto: New Version Notification for
> >>>>>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
> >>>>>>>> Fecha: 22 de octubre de 2020, 15:32:50 CEST
> >>>>>>>> Para: "Fernando Pereniguez-Garcia"
> >>>>>>>> <fernando.pereniguez@xxxxxxxxxxx>, "Rafael Lopez" <rafa@xxxxx>,
> >>>>>>>> "Gabriel Lopez-Millan" <gabilm@xxxxx>, "Rafa Marin-Lopez"
> >>>>>>>> <rafa@xxxxx>
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> A new version of I-D,
> >>>>>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt
> >>>>>>>> has been successfully submitted by Rafa Marin-Lopez and posted
> >>>>>>>> to the IETF repository.
> >>>>>>>>
> >>>>>>>> Name:		draft-ietf-i2nsf-sdn-ipsec-flow-protection
> >>>>>>>> Revision:	11
> >>>>>>>> Title:		Software-Defined Networking (SDN)-based IPsec Flow
> >> Protection
> >>>>>>>> Document date:	2020-10-22
> >>>>>>>> Group:		i2nsf
> >>>>>>>> Pages:		92
> >>>>>>>> URL:            https://www.ietf.org/archive/id/draft-ietf-i2nsf-sdn-
> ipsec-
> >> flow-protection-11.txt
> >>>>>>>> Status:         https://datatracker.ietf.org/doc/draft-ietf-i2nsf-sdn-
> ipsec-
> >> flow-protection/
> >>>>>>>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-
> sdn-
> >> ipsec-flow-protection
> >>>>>>>> Htmlized:       https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-
> flow-
> >> protection-11
> >>>>>>>> Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-i2nsf-sdn-
> ipsec-
> >> flow-protection-11
> >>>>>>>>
> >>>>>>>> Abstract:
> >>>>>>>>     This document describes how to provide IPsec-based flow
> protection
> >>>>>>>>     (integrity and confidentiality) by means of an Interface to Network
> >>>>>>>>     Security Function (I2NSF) controller.  It considers two main well-
> >>>>>>>>     known scenarios in IPsec: (i) gateway-to-gateway and (ii) host-to-
> >>>>>>>>     host.  The service described in this document allows the
> >>>>>>>>     configuration and monitoring of IPsec Security Associations (SAs)
> >>>>>>>>     from a I2NSF Controller to one or several flow-based
> >>>>>>>> Network
> >> Security
> >>>>>>>>     Functions (NSFs) that rely on IPsec to protect data traffic.
> >>>>>>>>
> >>>>>>>>     The document focuses on the I2NSF NSF-facing interface by
> providing
> >>>>>>>>     YANG data models for configuring the IPsec databases (SPD,
> >>>>>>>> SAD,
> >> PAD)
> >>>>>>>>     and IKEv2.  This allows IPsec SA establishment with minimal
> >>>>>>>>     intervention by the network administrator.  It does not define any
> >>>>>>>>     new protocol.
> >>>>>>>>
> >>>>>>>>
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Please note that it may take a couple of minutes from the time
> >>>>>>>> of submission until the htmlized version and diff are available
> >>>>>>>> at
> >> tools.ietf.org.
> >>>>>>>>
> >>>>>>>> The IETF Secretariat
> >>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>> -------------------------------------------------------
> >>>>>>> Rafa Marin-Lopez, PhD
> >>>>>>> Dept. Information and Communications Engineering (DIIC) Faculty
> >>>>>>> of Computer Science-University of Murcia
> >>>>>>> 30100 Murcia - Spain
> >>>>>>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@xxxxx
> >>>>>>> -------------------------------------------------------
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>
> >>>>> -------------------------------------------------------
> >>>>> Rafa Marin-Lopez, PhD
> >>>>> Dept. Information and Communications Engineering (DIIC) Faculty of
> >>>>> Computer Science-University of Murcia
> >>>>> 30100 Murcia - Spain
> >>>>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@xxxxx
> >>>>> -------------------------------------------------------
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>
> >>> -------------------------------------------------------
> >>> Rafa Marin-Lopez, PhD
> >>> Dept. Information and Communications Engineering (DIIC) Faculty of
> >>> Computer Science-University of Murcia
> >>> 30100 Murcia - Spain
> >>> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@xxxxx
> >>> -------------------------------------------------------
> >>>
> >>>
> >>>
> >>>
> >>>
> >>
> >> --
> >> last-call mailing list
> >> last-call@xxxxxxxx
> >> https://www.ietf.org/mailman/listinfo/last-call
-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux