Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18

Sheng Jiang <jiangsheng@huawei.com> Wed, 07 May 2014 01:15 UTC

Return-Path: <jiangsheng@huawei.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F9531A01DF for <dhcwg@ietfa.amsl.com>; Tue, 6 May 2014 18:15:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.852
X-Spam-Level:
X-Spam-Status: No, score=-4.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VqlU9p2PwjtJ for <dhcwg@ietfa.amsl.com>; Tue, 6 May 2014 18:15:40 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id DFF781A0220 for <dhcwg@ietf.org>; Tue, 6 May 2014 18:15:39 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BGL96704; Wed, 07 May 2014 01:15:35 +0000 (GMT)
Received: from LHREML403-HUB.china.huawei.com (10.201.5.217) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 7 May 2014 02:14:18 +0100
Received: from NKGEML410-HUB.china.huawei.com (10.98.56.41) by lhreml403-hub.china.huawei.com (10.201.5.217) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 7 May 2014 02:15:34 +0100
Received: from NKGEML512-MBX.china.huawei.com ([169.254.7.206]) by nkgeml410-hub.china.huawei.com ([10.98.56.41]) with mapi id 14.03.0158.001; Wed, 7 May 2014 09:15:23 +0800
From: Sheng Jiang <jiangsheng@huawei.com>
To: Ralph Droms <rdroms.ietf@gmail.com>, "Bernie Volz (volz)" <volz@cisco.com>
Thread-Topic: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18
Thread-Index: AQHPY9fqOkQX2Up+wk+VaPjsYGUK15sp5cSAgALR/YCAAAxhgIAGX9Jg///JsACAAC/igIABNuCw
Date: Wed, 07 May 2014 01:15:23 +0000
Message-ID: <5D36713D8A4E7348A7E10DF7437A4B923AE438BE@nkgeml512-mbx.china.huawei.com>
References: <535FEDAD.5010103@gmail.com> <CAJE_bqen37j5UCsKZj6syVyvk2Xed4V_xGp-t4xY8shjmS+H5g@mail.gmail.com> <489D13FBFA9B3E41812EA89F188F018E1B008430@xmb-rcd-x04.cisco.com> <4F2473AB-E8F7-4620-874C-3DCA59E70DE5@gmail.com> <5D36713D8A4E7348A7E10DF7437A4B923AE431FB@nkgeml512-mbx.china.huawei.com> <489D13FBFA9B3E41812EA89F188F018E1B00BAC1@xmb-rcd-x04.cisco.com> <9A6A9452-AF57-4EE1-9401-E0CE26922E6B@gmail.com>
In-Reply-To: <9A6A9452-AF57-4EE1-9401-E0CE26922E6B@gmail.com>
Accept-Language: en-GB, zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.111.98.145]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: http://mailarchive.ietf.org/arch/msg/dhcwg/WxJptE-TA986hRrxL6zORQ5F028
Cc: dhcwg <dhcwg@ietf.org>, 神明達哉 <jinmei@wide.ad.jp>
Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 May 2014 01:15:43 -0000

Hi, Bernie & Ralph,

We did realize the issues you mentioned. However, we thought they were not relevant. For three reasons, A, as protocol designing, there is no much we can do to shorten the DHCP message; B, most of issues are relevant with specific under-layer transmit mechanism, which is not specific for DHCPv6 protocol. It should be the implementation of under-layer transmit to make it work. C, most of issues exist in some specific deployment scenarios. They may not be the majority. They are deployment issues, rather than protocol design level issues.

For us, there is no much we could or should do in the document. It seems reasonable to give some deployment consideration in the document by just saying: SeDHCPv6 message is commonly large. IP fragments are highly possible. Hence, deployment of SeDHCPv6 should also consider the issues of IP fragment, PMTU, etc.

Regards,

Sheng

>-----Original Message-----
>From: Ralph Droms [mailto:rdroms.ietf@gmail.com]
>Sent: Tuesday, May 06, 2014 10:16 PM
>To: Sheng Jiang; Bernie Volz (volz)
>Cc: dhcwg; 神明達哉
>Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May
>18
>
>Sheng, Dacheng - Sorry, I missed you earlier response.
>
>There is no fundamental reason that fragmenting DHCPv6 traffic won't work,
>but, historically, DHCP fragmentation has been avoided and fragmentation is
>usually avoided in IPv6 traffic.
>
>I think Bernie has the right set of issues.  There may be more.
>
>- Ralph
>
>
>On May 6, 2014, at 7:24 AM 5/6/14, Bernie Volz (volz) <volz@cisco.com>
>wrote:
>
>> I suspect some of the issues here are:
>> 1. Because socket interfaces are typically used, how large a buffer should
>clients, relays, and servers support? (Yes, it is possible to ask the socket layer
>about how large a received packet is, but that requires two socket calls and I
>suspect is rarely done.)
>> 2. If packets do exceed the MTU of the interface, fragmentation is required.
>As this is link-local (at least for first hop), probably not a big issue but does
>require fragmentation support (again, probably not a big issue except if it was
>perhaps boot prom code - but why that would be using sedhcpv6 is unclear).
>Fragmentation for relay to server communication MIGHT be an issue if the
>traffic traverses firewalls?
>> 3. As PMTU is harder with UDP traffic, it isn't clear how the fragmentation
>MTU can easily be found. This may require clients, relays, and servers to
>support PMTU and be prepared for failures. Remember that with IPv6,
>fragmentation is done by the end points - not the intermediate hops.
>>
>> These issues aren't new, but they are more likely when sedhcpv6 is being
>used because we expect some of these options could be rather large (i.e.,
>carrying certificates) and thus more likely require fragmentation.
>>
>> - Bernie
>>
>> -----Original Message-----
>> From: dhcwg [mailto:dhcwg-bounces@ietf.org] On Behalf Of Sheng Jiang
>> Sent: Tuesday, May 06, 2014 3:00 AM
>> To: Ralph Droms; Bernie Volz (volz)
>> Cc: dhcwg; 神明達哉
>> Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by
>May 18
>>
>>> I would like to see some consideration of the total length of DHCPv6
>>> messages that use this security protocol included in the document.
>>
>> Hi, Ralph,
>>
>> We could give consideration of the total length of DHCPv6 messages in the
>current draft. The message length are variable because there are few variable
>field in the message, such as public key/certificate & signature, etc. We
>expect the length of the message should not exceed the maximum length of
>UDP packet.
>>
>> However, we do NOT see reasons why this would be a problem. Could
>please you share your concerns with us? So that, we can better address the
>consideration.
>>
>> Regards,
>>
>> Sheng + Dacheng
>>
>>> - Ralph
>>>
>>>>
>>>> If this work does advance, and there's sufficient interest, I could
>>>> well see
>>> someone proposing the same for DHCPv4.
>>>>
>>>> - Bernie
>>>>
>>>> -----Original Message-----
>>>> From: dhcwg [mailto:dhcwg-bounces@ietf.org] On Behalf Of ????
>>>> Sent: Wednesday, April 30, 2014 1:30 PM
>>>> To: Tomek Mrugalski
>>>> Cc: dhcwg
>>>> Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by
>>> May 18
>>>>
>>>> At Tue, 29 Apr 2014 20:21:33 +0200,
>>>> Tomek Mrugalski <tomasz.mrugalski@gmail.com> wrote:
>>>>
>>>>> Since we have upcoming holiday on May 1st (which happens to be a
>>>>> reason for extended weekend in many parts of Europe) and the topic
>>>>> in question is not trivial, this WGLC is a bit longer than usual.
>>>>>
>>>>> Please send your comments by May 18th 2014. If you do not feel this
>>>>> document should advance, please state your reasons why.
>>>>
>>>> I've read the document.  I don't have a particular opinion on whether
>>>> it
>>> should advance, mainly because I'm not a security expert.  I have some
>>> comments that may hopefully be useful, though:
>>>>
>>>> Some higher level points
>>>> - (maybe already discussed before but) the concept of using public
>>>> key  authentication in DHCP makes some sense to me, but I wonder why
>>>> we  are discussing this specifically for DHCPv6.  As far as I know
>>>> there's no such counterpart in DHCPv4 (the only related thing I can
>>>> google is draft-gupta-dhcp-auth-02.txt, which expired long ago), am
>>>> I correct?  If so, is that because *v4 is just too legacy and isn't
>>>> worth improvements anymore?  Or does that reflect some DHCP
>specific
>>>> points that make public key authentication not so viable?  If it's
>>>> the latter, doesn't it also apply to this proposal?
>>>>
>>>> - The description of the draft is a bit vague (which may have to be
>>>> clarified anyway), but if I understand it correctly, it assumes that
>>>> both clients (each of them) and servers maintain their pair of
>>>> public-private keys, and a client offers and uses its own key to
>>>> authenticate messages from the client to servers.  Is that correct?
>>>> If so, does this make sense?  My general understanding is that
>>>> authenticating DHCP messages from clients to server is not that
>>>> critical, and it's quite unlikely that servers maintain public keys
>>>> of all possible clients so the servers would have to rely on the
>>>> leap-of-faith model.  They then may have to worry about the
>>>> "resource exhaustion attacks" (although I'm not sure if this is a
>>>> big issue, see below).
>>>>
>>>> Other non editorial comments on the draft:
>>>> - Section 5.1:
>>>>  Public Key     A variable-length field containing public key. The
>>>>                 key MUST be represented as a lower-case
>>> hexadecimal
>>>>                 string with the most significant octet of the key
>>>>                 first. Typically, the length of a 2048-bit RSA
>>>>
>>>> Is there any specific reason it's represented as a string?  Not
>>>> necessarily bad, but I thought more common practice here is to
>>>> simply use the binary value of the key.  DHCP options in wire format
>>>> are not expected to be human readable anyway, so I don't see the
>>>> point for using a string here.
>>>>
>>>> - In Section 6.2:
>>>>
>>>>  On the recipient that supports the leap of faith model, the number of
>>>>  cached public keys or unverifiable certificates MUST be limited in
>>>>  order to protect against resource exhaustion attacks.  If the
>>>>
>>>> This is mainly concerned about servers, correct?  If so, I'm not
>>>> sure how severe this "attacks" are; DHCP servers generally need to
>>>> maintain some state for each client (unless that's stateless only
>>>> server) and would naturally already have some limitation on that
>>>> resource.  Shouldn't the general defense be enough for this
>>>> particular resource, too?  (But I was also not sure if it makes
>>>> sense to use (public key) authentication for messages from clients
>>>> in the first place; see higher-level discussions above)
>>>>
>>>> - Related, it seems some part of Section 6.2 is more specific for
>>>> clients and some other part is more specific to servers.  So it may
>>>> be helpful if we have separate subsections focusing on these
>>>> particular cases.  Just a suggestion.
>>>>
>>>> Editorial nits:
>>>> - Section 4.3
>>>>  they may fall back the unsecure model, if both client and server
>>>> s/fall back the/fall back to the/  (I found the missing 'to' of this
>>>> kind in several other places in  the draft)
>>>>
>>>> - Section 4.3
>>>>  whether to accept the messages.  If the client accept the unsecure
>>>>  messages from the DHCPv6 server.  The subsequent exchanges will be
>>> in
>>>>  unsecure model.
>>>> s/server.  The/server, the/
>>>>
>>>> - Section 4.3
>>>>  on the server policy.  If the server mandidates the authentication,
>>>> s/mandidates/mandates/
>>>>
>>>> - Section 6.1
>>>>  messages, MUST contain either a the Public Key or Certificate
>>>> option,  s/a the/the/ (?)
>>>>
>>>> - Section 6.2
>>>>  error status code, defined in Section 5.4, back to the client..
>>>> s/.././
>>>>
>>>> --
>>>> JINMEI, Tatuya
>>>>
>>>> _______________________________________________
>>>> dhcwg mailing list
>>>> dhcwg@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dhcwg
>>>>
>>>> _______________________________________________
>>>> dhcwg mailing list
>>>> dhcwg@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dhcwg
>>>
>>> _______________________________________________
>>> dhcwg mailing list
>>> dhcwg@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dhcwg
>> _______________________________________________
>> dhcwg mailing list
>> dhcwg@ietf.org
>> https://www.ietf.org/mailman/listinfo/dhcwg