Re: [Last-Call] [IPsec] New Version Notification for draft-ietf-i2nsf-sdn-ipsec-flow-protection-11.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Tero!

> -----Original Message-----
> From: IPsec <ipsec-bounces@xxxxxxxx> On Behalf Of Tero Kivinen
> Sent: Friday, October 30, 2020 6:42 PM
> To: Roman Danyliw <rdd@xxxxxxxx>
> Cc: Fernando Pereniguez-Garcia <fernando.pereniguez@xxxxxxxxxxx>;
> i2nsf@xxxxxxxx; Gabriel Lopez <gabilm@xxxxx>; ynir.ietf@xxxxxxxxx;
> ipsec@xxxxxxxx; last-call@xxxxxxxx; Rafa Marin-Lopez <rafa@xxxxx>; tom petch
> <daedulus@xxxxxxxxxxxxx>
> Subject: Re: [IPsec] [Last-Call] New Version Notification for draft-ietf-i2nsf-sdn-
> ipsec-flow-protection-11.txt
> 

> Roman Danyliw writes:
> > > >> It seems to me that the IANA entries for IKEv2 are incomplete.
> > > >> RFC8247 does a fine job of specifying algorithms and adding
> > > >> information such as status (MUST/SHOULD+), IoT, AEAD and so on,
> > > >> information which is not present on IANA.  The policy for, e.g.
> > > >> Transform Type 1, is expert review and entries have been added
> > > >> via draft-smyslov-esp-gont but the IANA entries lack this
> > > >> information and, looking at the I-D, I see no such information
> > > >> (nor is there any reason for it to be there).  Yet
> > > >> draft-ietf-i2nsf-sdn... needs this information as references in the YANG
> module show.
> 
> I am lost what information is missing from the IANA registry. 

Thanks for the analysis and feedback.

I think the deep threading may have confused who said what.  The above snip and all of the snips below are from Tom's assessment of the IANA registry situation (https://mailarchive.ietf.org/arch/msg/last-call/Cg66LRwtJjhJ5zNe8AEBWqKDll0/ and https://mailarchive.ietf.org/arch/msg/last-call/MMO9NsRif_x1WkGbJFlgKiLOGYQ/) 

My feedback in the earlier in the part of the thread (https://mailarchive.ietf.org/arch/msg/last-call/vSU21Yqbczthq9Uii0N0roHQI7c/) was that RFC8247 is cited by draft-ietf-i2nsf-sdn-ipsec-flow-protection to describe implementation requirements (as represented in the YANG module) and that no IANA changes should be needed.

In a follow-on messages (https://mailarchive.ietf.org/arch/msg/last-call/7eC7LH9_EWHxkA22YbST6Ghc4tc/) which added ipsec@ietf, I was noting that IPSecme is the WG with expertise and scope  that is best positioned to discuss management of the IKE registries

Regards,
Roman

> The registry do
> include numbers from draft-smyslov-esp-gost document. The
> RFC8247 says:
> ----------------------------------------------------------------------
> 1.3.  Updating Algorithm Requirement Levels ...
>     .... As a result, any algorithm listed at the IKEv2
>    IANA registry not mentioned in this document MAY be implemented.
> ----------------------------------------------------------------------
> I.e., all algorithms not listed there are MAY to implement.
> 
> But I do not see any reason why the yang module should provide any other
> than pointer to the IANA registry, and the IANA registry already has pointer to
> the RFC8247 to indicate the requirement levels for algorithms.
> 
> > > >> It seems to me that this is a similar situation to that which the
> > > >> TLS WG found itself in and which led to a revision of the TLS
> > > >> IANA entries to provide what was needed via additional columns.
> 
> There was some requests to modify the IANA registry while we were publishing
> RFC 8247 and the WG decided against it, and instead decided to provide
> pointer to the RFC 8211 and RFC 8247 in the notes section.
> 
> The reason for that is that duplicating information always causes problems, and
> because there is no (public) history of the IANA registries, there is no way of
> finding out when and why specific change to the registry was done unless there
> happens to be RFC that actually did that change.
> 
> I myself as an IANA expert of those registries do think it is better that working
> group will do RFC that will update the levels, and that will leave audit trail and
> public working group mailing list discussion about the changes.
> 
> > > >> I think that the IANA pages for IKEv2 need revising so that that
> > > >> additional information that RFC8247 provides is required as
> > > >> additional columns in the IANA entries at least for Type 1, Type
> > > >> 2, Type 3, Type 4 and Authentication Method.
> 
> I fail to see why does that information need to be in the IANA registry? This is
> YANG model for IPsec, it should just refer to the IANA registry about the
> mapping from algorithms to numbers and other way around, but whether the
> algorithm is recommended or not, does not belong to the YANG model, as that
> is not something that can be modified by configuration or be part of running
> state.
> 
> This document seems to have wierd text in it:
> 
>       typedef encryption-algorithm-type {
>         type uint16;
>         description
>           "The encryption algorithm is specified with a 16-bit
>           number extracted from IANA Registry. The acceptable
>           values MUST follow the requirement levels for
>           encryption algorithms for ESP and IKEv2.";
> 
> I do not see what the last sentence of the text is trying to say? Does it mean
> that this yang model cannot be shown of running configuration where someone
> is using one the algorithms not considered safe anymore?
> In ietf we usually just try to say what implementors are implementing, we do
> not that often limit what adminstrators can configure. If the implementation
> happens to implement one of those weak ciphers for example for talking to one
> obsoleted old hardware that only supports them, then I do not see why this
> yang model should forbid showing running status of such configuration.
> 
> I think this document should just say that the algorithm numbers are from the
> IANA registry, and nothing more. There might be informal reference to the RFC
> 8221, and RFC 8247 but even that should not be needed, as anybody
> implementing IKEv2 or ESP will already follow those and only implement the
> algorithms from there that they seem proper. In some cases that selection
> might include algorithms which are on SHOULD NOT or even MUST NOT, if the
> backward compatibility to obsolete hardware is more important than
> conformance.
> 
> > > This I-D, as you quote, points to RFC8247 for guidance and that is
> > > fine. But security moves on and new algorithms will be needed and
> > > this I-D also points to the IANA registry, which is Expert Review,
> > > where new entries have been added already; and for those the IANA
> > > Registry gives no guidance and the I-D that IANA references for the
> > > new entries - written by the Expert Reviewer! - also gives no
> > > guidance. Over time we are likely to accrue algorithms with no
> > > guidance unless and until an RFC8247-bis appears or we require IANA
> > > to have columns for guidance. Currently the new algorithms are GOST
> > > and so perhaps of limited interest but on the TLS list I am always
> > > seeing new algorithms appear and there the new IANA entry is
> > > required to give guidance. My sense is that IKEv2 is a bit slower to
> > > take up new ones but, as with RFC8247, it does eventually.
> 
> The original cryptographic algorithm impelemtation requirements for ESP and
> AH was published as RFC4305 in 2007. It was replaced with
> RFC7321 in 2014, and that was replaced with RFC8221 in 2017. For IKEv2 we
> skipped the 2014 update, as that was not needed. We do have plans to keep
> that draft up to date, and update it when there is need for that, most likely in
> next 5 years or so, provided that implementation status of some of new
> algorithms progresses favorably.
> 
> > > I think that users need those extra columns that RFC8247 provides on
> > > the IANA website so that when new algorithms are added by Expert
> > > Review, then that guidance must be added as well. This is what the
> > > TLS WG came round to and I think that IKEv2 needs to do the same.
> 
> I as an Expert does not want to decide whether the individual request to add
> new 3rot13 cipher to the IANA registry should be MUST NOT, SHOULD NOT,
> MAY or what. If the field is in the IANA registry then whoever requests to add
> information to there can request whatever value they want for that field too.
> Of course as an IANA expert I can reject that by saying that 3rot13 is not MUST,
> but it is MUST NOT algorithm, and then we can have discussion about that.
> 
> I rather have that discussion in the working group when we are updating the
> requirements document next time. And as I said IANA registries do not have
> any (public) history, or any way of finding out why they got changed and who
> did the change. There has happened some changes in the registry where I as an
> IANA Expert was not aware of at all...
> 
> And if I need to find out when ENCR_MAGMA_MGM_KTREE was added or
> when some of those earlier algorithms was renamed, I need to go to my private
> mail archives.
> --
> kivinen@xxxxxx
> 
> _______________________________________________
> IPsec mailing list
> IPsec@xxxxxxxx
> https://www.ietf.org/mailman/listinfo/ipsec

-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call



[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux