[dhcwg] AD review of draft-ietf-dhc-relay-agent-auth-01.txt

Thomas Narten <narten@us.ibm.com> Tue, 24 June 2003 18:22 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29779 for <dhcwg-archive@odin.ietf.org>; Tue, 24 Jun 2003 14:22:26 -0400 (EDT)
Received: (from exim@localhost) by www1.ietf.org (8.11.6/8.11.6) id h5OILwa28240 for dhcwg-archive@odin.ietf.org; Tue, 24 Jun 2003 14:21:58 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19UsQY-0007LP-MM for dhcwg-web-archive@optimus.ietf.org; Tue, 24 Jun 2003 14:21:58 -0400
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29690 for <dhcwg-web-archive@ietf.org>; Tue, 24 Jun 2003 14:21:55 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19UsPc-0007He-Pi; Tue, 24 Jun 2003 14:21:00 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19UsP3-0007Fb-0U for dhcwg@optimus.ietf.org; Tue, 24 Jun 2003 14:20:25 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29518 for <dhcwg@ietf.org>; Tue, 24 Jun 2003 14:20:22 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19UsP0-0005RU-00 for dhcwg@ietf.org; Tue, 24 Jun 2003 14:20:22 -0400
Received: from e33.co.us.ibm.com ([32.97.110.131]) by ietf-mx with esmtp (Exim 4.12) id 19UsOe-0005R3-00 for dhcwg@ietf.org; Tue, 24 Jun 2003 14:20:00 -0400
Received: from westrelay01.boulder.ibm.com (westrelay01.boulder.ibm.com [9.17.195.10]) by e33.co.us.ibm.com (8.12.9/8.12.2) with ESMTP id h5OIIDkj291348 for <dhcwg@ietf.org>; Tue, 24 Jun 2003 14:18:13 -0400
Received: from cichlid.adsl.duke.edu (sig-9-65-226-238.mts.ibm.com [9.65.226.238]) by westrelay01.boulder.ibm.com (8.12.9/NCO/VER6.5) with ESMTP id h5OIICGA098634 for <dhcwg@ietf.org>; Tue, 24 Jun 2003 12:18:13 -0600
Received: from cichlid.adsl.duke.edu (narten@localhost) by cichlid.adsl.duke.edu (8.11.6/8.9.3) with ESMTP id h5OIHGt11080 for <dhcwg@ietf.org>; Tue, 24 Jun 2003 14:17:16 -0400
Message-Id: <200306241817.h5OIHGt11080@cichlid.adsl.duke.edu>
To: dhcwg@ietf.org
Date: Tue, 24 Jun 2003 14:17:16 -0400
From: Thomas Narten <narten@us.ibm.com>
Subject: [dhcwg] AD review of draft-ietf-dhc-relay-agent-auth-01.txt
Sender: dhcwg-admin@ietf.org
Errors-To: dhcwg-admin@ietf.org
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Id: <dhcwg.ietf.org>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>

The WG has requested publication of this document as a PS. My review
comments:

High-level comments:

This document contains two logically separate documents, an
IPSec-based solution and one that uses the Relay Agent option. I think
it would be better to have the two approaches documented in separate
IDs (with a non-normative cross pointer to the other). This will help
in the future when it becomes time to advance (or retire) one of them,
etc. Plus, by being together, issues on one technique will block
publication of both schemes. I'll note that the description of the
IPSec approach is very skimpy. I predict that a review from an IPsec
person will request that more details be added...

Second, I'm confused about the Relay Indentifier field, when it is
needed (and why). It kind of seems to me that its needed to identify
which relay agent added a particular set of relay agent options, but
in that case, this isn't an authentication-specfic issue and would
perhaps better be handeled in a way that isn't specific to the
authentication suboption. (i.e, so it could also be used if the
authentication suboption is not present).

>    The Relay Identifier field is used by relay agents that do not set
>    giaddr, as described in RFC 3046 [2], Section 2.1.

I reread this section, and didn't feel like I completely understood...

There are times when a relay agent just adds more suboptions to an
existing relay-agent option, rather than appending a new set? That
makes it harder to identify who inserted what option... This is even
worse when one node signs (cryptographicall) information provided by
another, and the "trust" is not based on strong crypto...

>    selects an appropriate Replay Detection value.  The sender places its
>    identifier into the Relay ID field, if necessary, or sets the field
>    to all zeroes.  The sender sets the suboption length, places the

Why not just always include it, since the field is there anyway...
That would seem to simplify things...

Nits below.

>    and servers to autenticate the identity of the source and contents of

typo

>    Four bits are reserved for future use.  These bits SHOULD be set to
>    zero, and MUST be ignored when the suboption is processed.

Not quite true, as the integrity check includes them? Reword?

> 4.2 Replay Detection
> 
>    The replay-detection mechanism is based on the notion that a receiver
>    can determine whether or not a message has a valid replay token
>    value.  The default RDM, with value 1, specifies that the Replay
>    Detection field contains an increasing counter value.  The receiver
>    associates a replay counter with each sender, and rejects any message
>    containing an authentication suboption with a Replay Detection
>    counter value less than the last valid value.  DHCP servers MAY
>    identify relay agents by giaddr value or by other data in the message
>    (e.g.  data in other relay agent suboptions).  Relay agents identify
> 

less than, or less than or equal?

>    the its notion of the last valid replay counter value associated with

s/the its/its/

>    The Key ID exists only to allow the sender and receiver to specify a
>    shared secret in cases where more than one secret is in use among a
>    network's relays and DHCP servers.  The Key ID values are entirely a
>    matter of local configuration; they only need to be locally unique.
>    This specification does not define any semantics or impose any
>    requirements on this algorithm's Key ID values.

name space could be clearer. Would it be better to just say the
combination of relay id/key ID is unique?  or something else? Or is it
really intended that IDs are a flat space for the entire site? 

>    should expect an Authentication suboption.  The receiver MAY be
>    configured to drop incoming messages that do not contain a valid
>    relay agent information option and Authentication suboption.

better: MUST support configuration that allows ...

NOte: since the signature is at the end of the option, wouldn't it be
better to have the integrity check be performed up to the signature,
but exclude it? What is the value in setting it to zero an including
it in the check?

> Use of the authentication suboption SHOULD be disabled by default.

Seems unnecessary. How can the  suboption be used in the absence of
keying info, which needs to be manually configured?

> 4.7.1 Receiving Messages from Other Relay Agents
> 
>    There are network configurations in which one relay agent adds the
>    relay agent option, and then forwards the DHCP message to another
>    relay.  For example, a layer-2 switch might be directly connected to
>    a client, and it might forward messages to an aggregating router,
>    which sets giaddr and then forwards the message to a DHCP server.
>    When a DHCP relay which implements the Authentication suboption
>    receives a message, it MAY use the procedures in Section 4.6 to
>    verify the source of the message before forwarding it.

Example could be better. An L2 switch presumably is not a relay
agent...

Thomas

_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www1.ietf.org/mailman/listinfo/dhcwg