Re: [6lo] Mirja Kühlewind's No Objection on draft-ietf-6lo-ap-nd-14: (with COMMENT)

"Mirja Kühlewind (IETF)" <ietf@kuehlewind.net> Fri, 31 January 2020 15:48 UTC

Return-Path: <ietf@kuehlewind.net>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 012891200FE; Fri, 31 Jan 2020 07:48:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0fjdZRDTyDlw; Fri, 31 Jan 2020 07:48:45 -0800 (PST)
Received: from wp513.webpack.hosteurope.de (wp513.webpack.hosteurope.de [IPv6:2a01:488:42:1000:50ed:8223::]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4B181200FD; Fri, 31 Jan 2020 07:48:44 -0800 (PST)
Received: from ip-109-40-128-251.web.vodafone.de ([109.40.128.251] helo=[100.116.240.107]); authenticated by wp513.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1ixYX7-0000HX-Kp; Fri, 31 Jan 2020 16:48:37 +0100
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (1.0)
X-Apple-Notify-Thread: NO
X-Universally-Unique-Identifier: 968AA00C-3C8F-469F-ACC5-5A0AECE7EADD
From: "\"Mirja Kühlewind (IETF)\"" <ietf@kuehlewind.net>
In-Reply-To: <MN2PR11MB3565FA312B1ADBECD0FB7FCBD8070@MN2PR11MB3565.namprd11.prod.outlook.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-6lo-ap-nd@ietf.org" <draft-ietf-6lo-ap-nd@ietf.org>, "6lo-chairs@ietf.org" <6lo-chairs@ietf.org>, "Shwetha Bhandari (shwethab)" <shwethab@cisco.com>, "6lo@ietf.org" <6lo@ietf.org>
Date: Fri, 31 Jan 2020 16:48:35 +0100
X-Apple-Message-Smime-Encrypt: NO
Message-Id: <2E152AC9-A67C-49DF-9AF9-A0E5F06944EC@kuehlewind.net>
References: <MN2PR11MB3565FA312B1ADBECD0FB7FCBD8070@MN2PR11MB3565.namprd11.prod.outlook.com>
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
X-Mailer: iPhone Mail (17C54)
X-bounce-key: webpack.hosteurope.de;ietf@kuehlewind.net;1580485725;b599740d;
X-HE-SMSGID: 1ixYX7-0000HX-Kp
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/Q7jXsq1wc0SOXfBJ-NGTH-9-gFo>
Subject: Re: [6lo] Mirja Kühlewind's No Objection on draft-ietf-6lo-ap-nd-14: (with COMMENT)
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Jan 2020 15:48:47 -0000

Hi Pascal,

This all looks good to me.

Thanks,
Mirja



> Am 31.01.2020 um 15:04 schrieb Pascal Thubert (pthubert) <pthubert@cisco.com>:
> 
> Hello Mirja:
> 
> Many thanks for your review : )
> 
> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> A couple of small comments:
>> 
>> 1) Sec 2.2: If actually all terms from all the RFC listed in section 2.2 are used,
>> all the reference would need to be normative. Maybe double-check this!
> 
> I went through that with Eric's review and some refs moved back and forth before I finally published 14.
> 
> I found that from that list the generic LLN discussion and the legacy IPv6 ND are not necessary to understand and implement this specification. The needed normative references are the 6LoWPAN ND and RFC 3971, and crypto references. I think we are OK now.
> 
> 
>> 2) Sec 3: I would have expected that section 3 says something about backward
>> compatibility (what if not all nodes in a network are updated?) and gives a
>> strong recommend to use this scheme (or even obsolete the old one?)
> 
> Right. What about adding:
> "
>   Section 5.3 of [RFC8505] introduces the ROVR as a generic object that
>   is designed for backward compatibility with the capability to
>   introduce new computation methods in the future.  Section 7.3
>   discusses collisions when heterogeneous methods to compute the ROVR
>   field coexist inside a same network.
> 
>   [RFC8505] was designed in preparation for this specification, which
>   is the RECOMMENDED method for building a ROVR field.
> 
> "
> 
>> 3) Nit sec 4.4: s/it an be found/it can be found/
> 
> Fixed
> 
>> 4) Sce 6: Use of normative language: s/The node may use a same Crypto-
>> ID/The node MAY use a same Crypto-ID/
> 
> done
> 
> 
>> 5) Security Consideration Section: Is there a new risk/possible attack because
>> computational complexity of the proposed scheme is higher than the one in
>> RFC8505? Could that be used as an attack against a central node? Would it be
>> necessary to rate limit requests somehow? Or is there already a rate limit
>> (that should be mentioned here)?
> 
> Actually the challenge is distributed at the edge of the network. That's a limit if the scheme that a compromised 6LR may admit an attacker.
> What about adding a section as follows in the security section:
> "
> 
> 7.6.  Compromised 6LR
> 
>   This specification distributes the challenge and its validation at
>   the edge of the network, between the 6LN and its 6LR.  The central
>   6LBR is offloaded, which avoids DOS attacks targeted at that central
>   entity.  This also saves back and forth exchanges across a
>   potentially large and constrained network.
> 
>   The downside is that the 6LBR needs to trust the 6LR for performing
>   the checking adequately, and the communication between the 6LR and
>   the 6LBR must be protected to avoid tempering with the result of the
>   test.
> 
>   If a 6LR is compromised, it may pretend that it owns any address and
>   defeat the protection.  It may also admit any rogue and let it take
>   ownership of any address in the network, provided that the 6LR knows
>   the ROVR field used by the real owner of the address.
> "
> 
> Again, many thanks Mirja. Please let me know if the above looks OK and I'll publish.
> 
> All the best,
> 
> Pascal
> 
>> 
>> 
>> _______________________________________________
>> 6lo mailing list
>> 6lo@ietf.org
>> https://www.ietf.org/mailman/listinfo/6lo