Re: [babel] Roman Danyliw's Discuss on draft-ietf-babel-dtls-07: (with DISCUSS and COMMENT)

David Schinazi <dschinazi.ietf@gmail.com> Fri, 09 August 2019 00:44 UTC

Return-Path: <dschinazi.ietf@gmail.com>
X-Original-To: babel@ietfa.amsl.com
Delivered-To: babel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64D2E12006A; Thu, 8 Aug 2019 17:44:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pB-2gevXBqJk; Thu, 8 Aug 2019 17:44:42 -0700 (PDT)
Received: from mail-lj1-x22c.google.com (mail-lj1-x22c.google.com [IPv6:2a00:1450:4864:20::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE4DA120025; Thu, 8 Aug 2019 17:44:41 -0700 (PDT)
Received: by mail-lj1-x22c.google.com with SMTP id m8so56961214lji.7; Thu, 08 Aug 2019 17:44:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XxJA3A2JrbP4vEtUlU2SHRGYda7FUlXMiBM7SzvIoxg=; b=Ccx5bjmrVvBwjQov9UBMKI5O1WpQ40DBEo0X9knMIf+Zhd04yr33oEO8dbXZ24hmbX brrjTwcPlfIKaKf8cPIEB2icb56sKLEDcFke6CjMX3Ut+HW7ux+pQCr+zu/Pjtc6NpRR 4ttijyhJ5cEBvhTbQ6AqaasfDYTVEgLAypXB/mZt7SPl59l5/G5Fb1oZ3ZNlnDNK+4rO A7HiI5UBUXMlEVmjIuMgWccHaxSd4/MGbDQtyTr9h4KXNeWvN/M/riCM6XQgJML0zPwJ EwgtCfvgDU93yU6xFFegsmG/sWrhG6SL+U0La0QQlIFE2fiJQLWKH3NsFlhA9AxRh5Ve PssQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XxJA3A2JrbP4vEtUlU2SHRGYda7FUlXMiBM7SzvIoxg=; b=AOlB12B+Jf+8RIgJ6CwDoo9bDpnQSXOGssPclQxYHfdhKPVxcM2kmwg7UOuvxIPkc7 MMg1gbIO9oGk5LkycW6J4aFJvbhxVJ71T9pHjC3u5+uT/WOBpUDgTSLFWcigSWgTOIYd VA1KQ3mwgga3MWph+30VgfRHX1jy5xAaaJtCMXnHEcoSb/QZqs669Vak5HOifTsGrRV1 RwynqF7DfJ6DAZHZNiYxUkxvskRYV2vU52O11SYQ1V1kEhBs7zsssZWgt0zjjmjIhmPk qI+eIkex3KmoYRNh/0hfbAVFNYEPPKTs+YTKbxPN7UtPjzp6VaWf12e1VptaUtIu4LI6 EmkA==
X-Gm-Message-State: APjAAAW0ihv3YHB7Kzqi+Z/pdbUL163l2QCfOyUe+NyKwuFjZcHGQBmi nZT7FM8souR/5kwC8XOSBXYC5X0JF1ZeZ+Dyzek=
X-Google-Smtp-Source: APXvYqxykFZpP58UxaX2zeIH3vxmZ+xsu6u60kZnc3M01tyxSW2NX/ON7MHmtm5TBDaV8+AGvVPvpM6UmXCaM57nO6g=
X-Received: by 2002:a2e:94cb:: with SMTP id r11mr9228088ljh.212.1565311479931; Thu, 08 Aug 2019 17:44:39 -0700 (PDT)
MIME-Version: 1.0
References: <156520596444.8244.649940515091541992.idtracker@ietfa.amsl.com>
In-Reply-To: <156520596444.8244.649940515091541992.idtracker@ietfa.amsl.com>
From: David Schinazi <dschinazi.ietf@gmail.com>
Date: Thu, 08 Aug 2019 17:44:29 -0700
Message-ID: <CAPDSy+5fTinvfPeLMkMOx31SwCL6_Wuzkqif0xGR=BTCPLvBYA@mail.gmail.com>
To: Roman Danyliw <rdd@cert.org>
Cc: The IESG <iesg@ietf.org>, draft-ietf-babel-dtls@ietf.org, Donald Eastlake <d3e3e3@gmail.com>, babel-chairs <babel-chairs@ietf.org>, Babel at IETF <babel@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b9671b058fa47ad0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/babel/pas7fIvLfifd8A30yDo6qfrq2s0>
Subject: Re: [babel] Roman Danyliw's Discuss on draft-ietf-babel-dtls-07: (with DISCUSS and COMMENT)
X-BeenThere: babel@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "A list for discussion of the Babel Routing Protocol." <babel.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/babel>, <mailto:babel-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/babel/>
List-Post: <mailto:babel@ietf.org>
List-Help: <mailto:babel-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/babel>, <mailto:babel-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Aug 2019 00:44:46 -0000

Thanks for your review Roman! We've made changes on our git repository
<https://github.com/jech/babel-drafts> and will submit a revised draft
shortly.

Detailed responses inline.

Thanks,
David

On Wed, Aug 7, 2019 at 12:26 PM Roman Danyliw via Datatracker <
noreply@ietf.org> wrote:

> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> (1) Section 1. These are different than the ones listed in Section 6 of
> draft-ietf-babel-rfc6126bis and Section 1 of draft-ietf-babel-dtls.  As
> DTLS
> and HMAC are mitigations for attacks in draft-ietf-babel-rfc6126bis, they
> really should be harmonized.
>

We've fleshed out the text in draft-ietf-babel-rfc6126bis and kept the
reference
in draft-ietf-babel-dtls.

(2) Section 2.1.  Per “Implementations MUST support authenticating peers
> against a local store of credentials”, what does that credentialing look
> like?
> Is it certificates, PSK, etc?  What validation procedure is being used for
> this
> authentication?
>

I'll respond to this point on Ben's DISCUSS since I think you're both asking
for the same thing.


> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> (3) Abstract.  Per “Babel does not contain any means … [to] protect
> messages”,
> be more precise in the definition of protect (i.e., integrity and
> confidentiality)
>

Agreed, fixed.


> (4) Section 1.2.  Per “A comparison of Babel security mechanisms and their
> applicability can be found in [RFC6126bis]”, where in
> draft-ietf-babel-rfc6126bis does this comparison occur.  The references to
> HMAC
> and TLS are in a single paragraph in in Section 6/Security Considerations
> which
> roughly reiterate the one sentence statements written here.
>

We've fleshed out the text in draft-ietf-babel-rfc6126bis and kept the
reference
in draft-ietf-babel-dtls.


> (5) Section 2.1.  Per “When a node receives a new DTLS connection, it MUST
> verify that the source IP address is an IPv6 link-local address …”, what
> happens if IPv4 is in use?
>

This was an oversight. The text now also discusses IPv4.


> (6) Section 2.1. Per “Nodes MUST only negotiate DTLS version 1.2 or
> higher”,
> this is stricter than RFC7525 cited in the Security Consideration later in
> the
> draft.  That’s fine, but please reiterate that in Section 5.
>

Done.

(7) Section 2.6  Suggest being clearer that this is a deployment not an
> implementation issue. s/Implementations MAY implement both Babel over
> DTLS and
> unprotected Babel./ /A node MAY run both Babel over DTLS and unprotected
> Babel./
>

Agreed. We added your new sentence but also kept the old one since both are
true.


> (8) Section 2.6, Per “However, accepting unprotected Babel packets … loses
> the
> security properties of Babel over DTLS”.  This seems misleading.  The
> security
> properties of “Babel over DTLS” as a protocol are stated in Section 1.2.
> In
> this section there is discussion of the security properties of the node
> (and
> the resulting neighbor table).  These are different.  The issue seems to be
> that a node is building a neighbor table with updates from sources which
> need
> to be trusted to different degrees.
>

Agreed. We've reworked that paragraph.


> (9) Section 5.  Per “Confidential interaction between two Babel peers
> requires
> Datagram Transport Layer Security (DTLS) with a cipher suite offering
> confidentiality protection.  The guidance given in [RFC7525] MUST be
> followed
> to avoid attacks on DTLS.”, the first sentence is true, but incomplete, in
> that
> we’d also want cipher suites with a strong key exchange algorithm, etc.
> Section 4.2 of RFC7525, which is cited as a MUST, provides a list of
> recommended ciphers suites.  Do we need this first sentence?
>

Fair enough, We've removed that sentence.

(10) Editorial
> -- Section 2.1.  Expand “IHU” on first use
>

Done

-- Section 3.  Nit. s/ciphers/ciphersuites/


Done