Re: [dhcwg] [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-dns-07

mohamed.boucadair@orange.com Thu, 09 February 2023 09:02 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: expand-draft-ietf-opsawg-add-encrypted-dns.all@virtual.ietf.org
Delivered-To: dhcwg@ietfa.amsl.com
Received: by ietfa.amsl.com (Postfix, from userid 65534) id EAD66C14F72F; Thu, 9 Feb 2023 01:02:25 -0800 (PST)
X-Original-To: xfilter-draft-ietf-opsawg-add-encrypted-dns.all@ietfa.amsl.com
Delivered-To: xfilter-draft-ietf-opsawg-add-encrypted-dns.all@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D9E13C14CE2B; Thu, 9 Feb 2023 01:02:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z_URLmr0uBuU; Thu, 9 Feb 2023 01:02:22 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.34]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA3DDC14F72F; Thu, 9 Feb 2023 01:02:21 -0800 (PST)
Received: from opfednr02.francetelecom.fr (unknown [xx.xx.xx.66]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr20.francetelecom.fr (ESMTP service) with ESMTPS id 4PC9qH6ZFHz1yHb; Thu, 9 Feb 2023 10:02:19 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1675933339; bh=/cmv9K4cATW5RyD1fB7cTklRQcGJXg3LHtPqUws7WP0=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=Xo9cZ34yfZ3ZmMLww7Xq09x190diEw8742Y4oC0m6+JKXjXX40nNvlZfN+c52d4Tj 5Al1R5LMuEMM/b2kSbahDoz08bkYIOD6K7I6ucwyj7PXXwb+fik0iM7LHDYXF4ixs0 sdvG/Q+RAlCZYariNM1O4c1VZJwFPrnQWLB+LSQ+/LH0gp/sAq2J+SFF7SXjcqNFZF u/k4ZRsgngVZPacqLJY4VWzSVqvV8PzLRYPcBPlMiXlI2Yax2ZPrVerVj6xpSHpn+Y HhKXd/EUQJuqonJkcSglD7un0lMY/j6NFXWNoGUM2TQzI8n5vX2yjPS77rSgckAYv2 grlXYifDMNPPg==
From: mohamed.boucadair@orange.com
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, Alan DeKok <aland@deployingradius.com>
CC: "draft-ietf-opsawg-add-encrypted-dns.all@ietf.org" <draft-ietf-opsawg-add-encrypted-dns.all@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-dns-07
Thread-Index: AdkTyYf4WW79bmtwQoGOi227i49tLgAA5RyACgBS4TAAJNutAA==
Content-Class:
Date: Thu, 09 Feb 2023 09:02:19 +0000
Message-ID: <9291_1675933339_63E4B69B_9291_403_1_66463ab113c04cc88d3446194c92971c@orange.com>
References: <BY5PR11MB4196E89DEC6393A84923CC17B5E59@BY5PR11MB4196.namprd11.prod.outlook.com> <EDA5C486-7261-4668-ABF0-83871D9E1E2B@deployingradius.com> <BY5PR11MB4196BB5D2805639398D344B5B5D89@BY5PR11MB4196.namprd11.prod.outlook.com>
In-Reply-To: <BY5PR11MB4196BB5D2805639398D344B5B5D89@BY5PR11MB4196.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-02-09T08:38:15Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=6ef5d0c6-0fe1-42ca-8bc0-6da73f4eb1ea; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.115.26.50]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Resent-From: alias-bounces@ietf.org
Resent-To: zhoutianran@huawei.com, aland@freeradius.org, henk.birkholz@sit.fraunhofer.de, mohamed.boucadair@orange.com, bevolz@gmail.com, warren@kumari.net, kondtir@gmail.com, jclarke@cisco.com, rwilton@cisco.com, dhcwg@ietf.org
Resent-Message-Id: <20230209090225.EAD66C14F72F@ietfa.amsl.com>
Resent-Date: Thu, 09 Feb 2023 01:02:25 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/Q1cuxksfTn9Hu8qtrGxzOJ9mwMI>
Subject: Re: [dhcwg] [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-dns-07
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Feb 2023 09:02:26 -0000

Hi Rob, all, 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Rob Wilton (rwilton) <rwilton@cisco.com>
> Envoyé : mercredi 8 février 2023 20:39
> À : Alan DeKok <aland@deployingradius.com>
> Cc : draft-ietf-opsawg-add-encrypted-dns.all@ietf.org;
> opsawg@ietf.org
> Objet : RE: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-
> dns-07
> 
> Hi Alan,
> 
> Sorry for the delay.  Please see inline ...
> 
> > -----Original Message-----
> > From: Alan DeKok <aland@deployingradius.com>
> > Sent: 19 December 2022 17:13
> > To: Rob Wilton (rwilton) <rwilton@cisco.com>
> > Cc: draft-ietf-opsawg-add-encrypted-dns.all@ietf.org;
> opsawg@ietf.org
> > Subject: Re: [OPSAWG] AD review of
> > draft-ietf-opsawg-add-encrypted-dns-07
> >
> > On Dec 19, 2022, at 11:53 AM, Rob Wilton (rwilton)
> > <rwilton=40cisco.com@dmarc.ietf.org> wrote:
> > > It isn't really clear to me why some of the registries are
> needed,
> > > specifically
> > the ones in 8.4.1 and 8.4.2.  Why not allow any v4 or v6 DHCP
> > attribute to be carried within the DHCPv6-Options or DHCPv4-
> Options field?
> >
> >   The original intent of the document was to define a limited
> set of
> > DHCP options which could be carried in RADIUS.  i.e. option X
> would
> > map to RADIUS attribute Y.  After some discussion, this was
> deemed to
> > be unworkable, and changed to the current method.
> >
> >   The previous limitations were still kept, however.
> >
> >   While it is useful, I could see issues with allowing any DHCP
> option
> > to be transported in RADIUS.  I'll have to dig deeper to get
> into details.
> [Rob Wilton (rwilton)]
> 
> Okay.
> 
> >
> > >
> > > (2) p 4, sec 3.  DHCP Options RADIUS Attributes
> > >
> > >   Absent any explicit configuration on the DHCP server, RADIUS
> supplied
> > >   data by means of DHCP*-Options Attributes take precedence
> over any
> > >   local configuration.
> > >
> > > This point may be worth discussing.  Naturally, I would
> explicit
> > > configuration
> > to a network device to generally take precedent over implicitly
> > learned configuration from the network.
> >
> >  I'm not sure which options are "implicitly learned" from the
> network.
> > One set is configured in the device, and another is configured
> on a
> > per-user / per- session basis.  This allows for sane defaults,
> with
> > specific over-rides where those are needed.
> >
> >   If the options configured on the device always take precedence
> over
> > the per- session options (via RADIUS), then there isn't much
> point in
> > sending per-session options.
> [Rob Wilton (rwilton)]
> To give a regular configuration example, if you were to enable the
> Ethernet auto-negotiation protocol but also explicitly configure
> an 10/100/1000 Ethernet interface to run at 100 Mb/s then I would
> expect the explicit client provided configuration to take
> precedence over negotiating the speed value.
> 
> It sounds like, in what you describe, the configuration is
> effectively hierarchical.  I.e., it is really because the RADIUS
> supplied configuration is more-specific that it takes precedence
> over the local configuration.  If so, that is expected, but I
> think that it would be helpful to clarify the description to make
> that clear.
> 

[Med] OK. We can make this change: 

OLD:
   Absent any explicit configuration on the DHCP server, RADIUS
   supplied data by means of DHCP*-Options Attributes take precedence
   over any local configuration.

NEW:
   RADIUS supplied data is specific configuration data that is
   returned as a function of authentication and authorization checks.
   As such, absent any explicit configuration on the DHCP server, RADIUS
   supplied data by means of DHCP*-Options Attributes take precedence
   over any local configuration.

> 
> >
> > > (3) p 6, sec 3.2.  DHCPv4-Options Attribute
> > >
> > >      Permitted DHCPv4 options in the DHCPv4-Options Attribute
> are
> > >      maintained by IANA in the registry created in Section
> 8.4.2.
> > >
> > > Comparing this text to the description for v6, this
> description is
> > > silent on
> > whether multiple instances of the same DHCPv4 option MAY be
> included.
> > Should that be specified here?
> >
> >   Likely, yes.  The RADIUS attributes are simply carrying DHCP
> > options, as if they were in a DHCP packet.  So all of the DHCP
> rules
> > about option handling should apply here.
> [Rob Wilton (rwilton)]
> Okay.
> 
> >
> > >
> > > (4) p 10, sec 7.  Table of Attributes
> > >
> > >   The following table provides a guide as what type of RADIUS
> packets
> > >   that may contain these attributes, and in what quantity.
> > >
> > > Am I right that this is just a duplication of what is
> described in
> > > section 3?  If
> > so, perhaps change "guide" to "informative guide" and include
> text to
> > refer back to the  canonical definition in section 3.
> >
> >   Sure.  This table is traditional in RADIUS RFCs, so the text
> here
> > mirrors previous RADIUS RFCs.
> [Rob Wilton (rwilton)]
> Okay.
> 
> 
> >
> > > (8) p 3, sec 3.  DHCP Options RADIUS Attributes
> > >
> > >   These attributes use the "Long Extended Type" format in
> order to
> > >   permit the transport of attributes encapsulating more than
> 253 octets
> > >   of data.  DHCP options that can be included in the DHCP*-
> Options
> > >   RADIUS attributes are limited by the maximum packet size of
> 4096
> > >   bytes.  In order to accommodate deployments with large
> options,
> > >   implementations are RECOMMENDED to support a packet size up
> to 65535
> > >   bytes.
> > >
> > > I didn't find this text clear.  E.g., limit is 4k but should
> support up to 64K.
> > Which implementations should support larger packet sizes?  Is
> this RADIUS
> > implementations?
> >
> >   It's a limitation of RADIUS.  Everything RADIUS has to support
> 4K packets.
> > Later RFCs allow for 64K packets.
> [Rob Wilton (rwilton)]
> 
> Okay.  If this will be obvious to everyone implementing/deploying
> RADIUS then fine, otherwise it might be worth including an
> informative reference to the RFC that increases the limit to 64K.
> 
> 

[Med] We do already have the following: 

   Note:  The 4096 bytes size limit was relaxed by other RFCs, e.g.,
      [RFC7499] and [RFC7930].

Do we need to say more? Thanks. 

> 
> >
> > >
> > > (9) p 5, sec 3.1.  DHCPv6-Options Attribute
> > >
> > >      This field contains a list of DHCPv6 options.  Multiple
> instances
> > >      of the same DHCPv6 option MAY be included.  Consistent
> with
> > >      Section 17 of [RFC7227], this document does not impose
> any option
> > >      order when multiple options are present.
> > >
> > > Is there any requirement to merge multiple instances of
> options together,
> > presumably they are logically just concatenated today.
> >
> >   The rules for DHCP options processing should apply.
> [Rob Wilton (rwilton)]
> 
> Okay.  Should that be stated here, or at least made consistent
> with the v4 description that has been updated to:
> 
> |      This field contains a list of DHCPv4 options.  Multiple
> instances
> |      of the same DHCPv4 option MAY be included, especially for
> |      concatenation-requiring options that exceed the maximum
> DHCPv4
> |      option size of 255 octets.  The mechanism specified in
> [RFC3396]
> |      MUST be used for splitting and concatenating the instances
> of a
> |      concatenation-requiring option.
> 

[Med] We can echo the relevant part from 8415 here:

OLD: 
      This field contains a list of DHCPv6 options.  Multiple instances
      of the same DHCPv6 option MAY be included.  Consistent with
      Section 17 of [RFC7227], this document does not impose any option
      order when multiple options are present.

NEW:
      This field contains a list of DHCPv6 options (Section 21 of
      [RFC8415]).  Multiple instances of the same DHCPv6 option MAY be
      included.  If an option appears multiple times, each instance is
      considered separate and the data areas of the options MUST NOT be
      concatenated or otherwise combined.  Consistent with Section 17 of
      [RFC7227], this document does not impose any option order when
      multiple options are present.

> 
> >
> > > (12) p 8, sec 5.  Applicability to Encrypted DNS Provisioning
> > >
> > >         Figure 1: An Example of RADIUS IPv6 Encrypted DNS
> Exchange
> > >
> > > As a minor comment, I wonder whether it would be helpful to
> also include
> > RADIUS client in the NAS box description?
> >
> >   Yes.
> >
> > >
> > > (13) p 12, sec 8.4.1.  DHCPv6
> > >
> > >   IANA is requested to create a new sub-registry entitled
> "DHCPv6
> > >   Options Permitted in the RADIUS DHCPv6-Options Attribute" in
> the
> > >   "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"
> registry
> > >   [DHCP-RADIUS].
> > >
> > > Do we need to define the definition of columns for this (and
> the v4
> > equivalent) registries.  E.g., do the values need to match
> another registry?
> >
> >   Perhaps just names?  It would be good to avoid duplicating
> multiple columns,
> > as they could get out of sync.
> 
> The changes that you have made for -08 for this seem fine.
> 
> Thanks,
> Rob
> 
> >
> >   Alan DeKok.


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.