Re: [6lo] Benjamin Kaduk's No Record on draft-ietf-6lo-rfc6775-update-17: (with COMMENT)

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Wed, 04 April 2018 08:58 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CB7E1270A0; Wed, 4 Apr 2018 01:58:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9zE7GG3tFzLC; Wed, 4 Apr 2018 01:57:54 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2147126BF3; Wed, 4 Apr 2018 01:57:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=155387; q=dns/txt; s=iport; t=1522832273; x=1524041873; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=eSTdAPs03D0mb9zKVMezKNJlS2xsxfy0OzIJkqMFNTM=; b=McN95WvXS6zP4uyR0hZlidnJgFZ+wetKrNyo1K9M6soCpAFVluo1SqFM je6JJ5bqdojNAKvuDgfWUJwBFWaTAtUzcth7AHPs+dXFJicX2zT+Rt1Vs /nLQJv3SldciQXOtDI2zVgCmybVOg62Y+vlYNIla6LsdvFHJmmCo4idyP Q=;
X-Files: draft-ietf-6lo-rfc6775-update-18.txt : 107026
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ALBACzksRa/5ldJa1TAQYDDggDAQEBAQEBAQEBAQEBBwEBAQEBgxMEK2FvKAqDVZUIgXR1GoVif4wIgWYDCCOBNQGDKgIahC0hOBQBAgEBAQEBAQJrHAyFIgEBAQECARoBCARACQIHBQcCAgIBCBEBAwEBKwICAhkGERcGCAIEAQkEBQgGDYRaAw0ID6p+AoEsgWkzhw4NgSuCFg8FLoURfyR7gVQ/gQsBgghINIJPQgIBAgGBEQsBCAEHAQMBBgEDBAQbEAoFBgwPgjmCVAKHBBcHG4Q1gR2BfzOHTiwIAoMzgh6CTYJhM4J1gTgaIIMfglmDR4EQhyaBbzuDaYIdAhETAYEkATMhYT8BGAIPCHAVOoIzAQ8JghICAgEDFBFpAQIGgyyEKoUEOm8BEIsSAQENFwQDgQGBFwEB
X-IronPort-AV: E=Sophos;i="5.48,405,1517875200"; d="txt'?scan'208";a="93940208"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 Apr 2018 08:57:50 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id w348voVn007510 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 4 Apr 2018 08:57:50 GMT
Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Wed, 4 Apr 2018 03:57:49 -0500
Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1320.000; Wed, 4 Apr 2018 03:57:49 -0500
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: "draft-ietf-6lo-rfc6775-update@ietf.org" <draft-ietf-6lo-rfc6775-update@ietf.org>, Gabriel Montenegro <Gabriel.Montenegro@microsoft.com>, "6lo-chairs@ietf.org" <6lo-chairs@ietf.org>, "Gabriel.Montenegro@microsoft.com" <Gabriel.Montenegro@microsoft.com>, "6lo@ietf.org" <6lo@ietf.org>
Thread-Topic: Benjamin Kaduk's No Record on draft-ietf-6lo-rfc6775-update-17: (with COMMENT)
Thread-Index: AQHTy3kJySrcFYJc6Uaw395D9wZMJqPwRcyQ
Date: Wed, 04 Apr 2018 08:56:50 +0000
Deferred-Delivery: Wed, 4 Apr 2018 08:56:22 +0000
Message-ID: <3003c1cd6dea4a1bb962b9f5846740b5@XCH-RCD-001.cisco.com>
References: <152277987837.22799.12025647276093031910.idtracker@ietfa.amsl.com>
In-Reply-To: <152277987837.22799.12025647276093031910.idtracker@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.55.22.4]
Content-Type: multipart/mixed; boundary="_002_3003c1cd6dea4a1bb962b9f5846740b5XCHRCD001ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/oo00KwhXTD3mq524O52Fr-bkS8k>
Subject: Re: [6lo] Benjamin Kaduk's No Record on draft-ietf-6lo-rfc6775-update-17: (with COMMENT)
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Apr 2018 08:58:02 -0000

Hello Benjamin

Thanks a bunch for your review; I'll keep a note to improve the text on Nonce in AP ND. 

Please see below:

> -----Original Message-----
> From: Benjamin Kaduk <kaduk@mit.edu>
> Sent: mardi 3 avril 2018 20:25
> To: The IESG <iesg@ietf.org>
> Cc: draft-ietf-6lo-rfc6775-update@ietf.org; Gabriel Montenegro
> <Gabriel.Montenegro@microsoft.com>; 6lo-chairs@ietf.org;
> Gabriel.Montenegro@microsoft.com; 6lo@ietf.org
> Subject: Benjamin Kaduk's No Record on draft-ietf-6lo-rfc6775-update-17:
> (with COMMENT)
> 
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-6lo-rfc6775-update-17: No Record
> 
> When responding, please keep the subject line intact and reply to all email
> addresses included in the To and CC lines. (Feel free to cut this introductory
> paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-6lo-rfc6775-update/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Section 6.1 has:
> 
>    Registration Ownership Verifier (ROVR):  Enables the correlation
>                    between multiple attempts to register a same IPv6
>                    Address.  This can be a unique ID of the Registering
>                    Node, such as the EUI-64 address of an interface.
>                    This can also be a token obtained with cryptographic
>                    methods and used as proof of ownership of the
>                    registration.  [...]
> 
> I understand that the actual crypto is (currently) in draft-ietf-6lo-ap-nd, but
> from the point of view of this document, the ROVR token (or "crypto-ID" in
> the terminology of 6lo-ap-nd) behaves as a bearer token.  That is, I include it
> with my EARO and my registration request is authenticated and associated
> with that "identity"; there is not anything in this document that ties the
> crypto-ID to the EARO.  From a very quick read of the other document, it
> sounds like the 6LR can optionally request validation that the 6LN using the
> crypto-ID actually has control of the associated private key, and is expected to
> do so on the first exchange, and so arguably the transport key+LLA are what
> associates the crypto-ID with the EARO.
> 
[PT>] 
[PT>] This is correct. Note that the ROVR does not have to be cryptographic or to be used as proof of ownership. Only AP ND does that. The original RFC 6775 places an EUI 64 in that field, and expects well behaved devices that will have globally unique MAC addresses and will not  attempt to take over addresses.
The central registrar in the 6LBR ensures first come first serve for address ownership, and maintains a state that has the ROVR in it. In the case of RFC 6775, it is used for Duplicate Address Detection, a second registration with a different EUI 64 denotes a collision, and the second registration is rejected.


> The conclusion from the above would be that this sort of ROVR is not itself
> proof of ownership of anything, so it might be better to have text like "this
> can also be a token obtained with cryptographic methods which can be used
> in additional protocol exchanges to associate a cryptographic identity (key)
> with this registration".
[PT>] 
[PT>] Works for me. 
The proof of the link between the ROVR and the address is actually that the ROVR is written on the 6LBR registry at registration time. What's left to be done is prove the ownership of the ROVR itself. The new paragraph would read as
"
Registration Ownership Verifier (ROVR):
        Enables the correlation between multiple attempts to register a same
        IPv6 Address. The ROVR is stored in the 6LR and the 6LBR in the state
        associated to the registration.
        This can be a unique ID of the Registering Node, such as the EUI-64 
        address of an interface. This can also be a token obtained with 
        cryptographic methods which can be used in additional protocol exchanges
        to associate a cryptographic identity (key) with this registration
        to ensure that only the owner can modify it later.
        The scope of a ROVR is the registration of a particular 
        IPv6 Address and it cannot be used to correlate registrations of
        different addresses.
"


> 
> In several places in section 7 it is indicated that implementations that support
> this spec should always use the new data structures even when talking to
> RFC6775-only peers; this generally seems fine due to the way that reserved
> fields are used.  I was not entirely sure if the same holds for the use of new
> status codes in the EARO, though -- do things work out okay if (e.g.) "Moved"
> or "Removed" are interpreted as a generic error?
> 
[PT>] Yes. RFC 6775 section 8.2.5 has "In the case where the DAC indicates an error (the
   Status is non-zero), ..."

> In general the Security and Privacy Considerations seem well thought-out (in
> the model where Layer-2 security is already in place), thank you!   (Key
> distribution remains a hard problem, of course, and sharing such keys across
> groups does reduce the security properties of the system, but this is not the
> right place to go into detail on such issues.)
> 
[PT>] : )

> One final nit: what is the "port" involved in the Binding?  It does not sound
> like it is an IP port...
> 
[PT>] Changed to "a physical port on a switch". This would apply to  a node that uses a L3 switch as sleeping proxy. 

Many thanks Benjamin, in particular for going all the way to checking AP ND operation.
Considering the limited change, I'll keep rev_18 (current draft attached) a bit more before I publish if that's OK with you.

Take care,

Pascal