Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17

Lishan Li <lilishan48@gmail.com> Fri, 04 November 2016 11:35 UTC

Return-Path: <lilishan48@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91B00129C29 for <dhcwg@ietfa.amsl.com>; Fri, 4 Nov 2016 04:35:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level:
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HF6duRjG1n_Q for <dhcwg@ietfa.amsl.com>; Fri, 4 Nov 2016 04:35:20 -0700 (PDT)
Received: from mail-qt0-x22b.google.com (mail-qt0-x22b.google.com [IPv6:2607:f8b0:400d:c0d::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F754129C22 for <dhcwg@ietf.org>; Fri, 4 Nov 2016 04:35:20 -0700 (PDT)
Received: by mail-qt0-x22b.google.com with SMTP id n6so46096955qtd.1 for <dhcwg@ietf.org>; Fri, 04 Nov 2016 04:35:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=5B/E6Cw8Jgr1EbmXHUiTxdQgnGV0JPy7MDlHrTb/gHE=; b=LJlm1rK3Ian3TfFaVyHCfrb1cdPOenK0f9RzjHbd0VjWrx0SQtGBWnxSCW/MplZpAE CkbZeI+igijzA/QgNQCbHPqPJqqJKdjkQWOYLQVzaX5R3s7RRiv+rZ+aPs7DYrDDSCu9 p+YdK+EfRu2AeUQF0P2scl0jJmmwI750fCTukB3O4VNdc4O4PeSx0m1bWi8aCcR7HLdX aX107y/YKCwNQ18t/CHpDIcPZtGA53aTpHVhD4mFL9tsrCXlA1pRAVCHPZlBJXF9UbWw 0yrRrIQVY2AI9OlTzthOCaBmXm0k5SiwrL9G8iDOzCpE4IDx9Dc4B6xisDGmWRzPgkoT rTfQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=5B/E6Cw8Jgr1EbmXHUiTxdQgnGV0JPy7MDlHrTb/gHE=; b=cA9HJKxAQO4xaMZLFeabB73aEbzi+VO0E4A7WyLqTmHhplYy0WIoKndOtShyPrQbRe WBXlRPBYb1ku0P6WFIe+0deOaW7BJjtvXXW05zgxcyGI6GmAimjFHKQ1g/gl0HI/RsPu z1a8QWv+Dbxt6WtFAkiKR98vaeJT6ms16gB7Yxpn7CWe/y7J1zqkvWAaidvjY2dNml4W GLdMhi5sZM2DPzZnAMv/yxa7m54u7z9VA1/yFpnIIsheqxkUEA1PasAbUhOARB0Rrok6 H5aAzZPI40rN2Q9QEusziFHg1JGw8K/2lUFm5Jix7v35FU9csHuQrtdeYgqr+oPWQQao fVdg==
X-Gm-Message-State: ABUngvcwkynh87PDBaEbb86MLfpli43hJbL9Obx0DeqFB3wlNiES9/gBBdlHR2sbowhG9empWxKtQ+LOfDG9oQ==
X-Received: by 10.237.58.161 with SMTP id o30mr13138610qte.3.1478259319382; Fri, 04 Nov 2016 04:35:19 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.237.62.242 with HTTP; Fri, 4 Nov 2016 04:35:18 -0700 (PDT)
In-Reply-To: <CAJE_bqegh1DfWjfK2BxeC_fWa0cEk-KJNP0AT-TQuEa39w_wVQ@mail.gmail.com>
References: <CAJE_bqebwr2WUUgaNgiYS4_8L77Gxj4Os+oPRG407B6ELMEhCQ@mail.gmail.com> <CAJ3w4Ndi5Gq63n5kZnanRhLM8nWE2wsWGh0kJJLJnq=VoXLuCg@mail.gmail.com> <CAJE_bqegh1DfWjfK2BxeC_fWa0cEk-KJNP0AT-TQuEa39w_wVQ@mail.gmail.com>
From: Lishan Li <lilishan48@gmail.com>
Date: Fri, 04 Nov 2016 19:35:18 +0800
Message-ID: <CAJ3w4NdM99nv4C19Xj=aosNme+_Ymyys=xQ3UWUfeZReZC4ckA@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Content-Type: multipart/alternative; boundary="001a11404abe9e2a4a05407811ce"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/_sdu91WnZRis1633GBrB5cxc2JI>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Nov 2016 11:35:22 -0000

2016-11-04 2:54 GMT+08:00 神明達哉 <jinmei@wide.ad.jp>:

> At Thu, 3 Nov 2016 16:36:46 +0800,
> Lishan Li <lilishan48@gmail.com> wrote:
>
> > > 2. Algorithm negotiation still doesn't make much sense to me.  I have
> > >    many questions and concerns related to this point, but instead of
> > >    raising each of these, I'd suggest one specific alternative to
> > >    consider: have the client send a list of supported algorithms in
> > >    the initial Information-Request, and let the server choose one set
> > >    of them and keep using the same set.  This way we don't have to
> > >    worry about an "algorithm not supported" error in the middle of a
> > >    DHCPv6 session (as a corollary, we don't have to worry about how to
> > >    return an encrypted reply when the client's preferred encryption
> > >    algorithm isn't supported by the server).  An obvious downside of
> > >    this is that it reveals some information of the client (the list of
> > >    supported/preferred algorithms), but IMO this is acceptable.
> > >
> > [LS]: In the current version, the server firstly sends a list of
> supported
> > algorithms through the Reply message. Then the client processes it
> > according to the following method:
> [...]
> > So it is not possible that the the server does not support the
> > acknowledged algorithms. So we also don't need to worry
> > about how to return an encrypted Reply when the client's
> > preferred encryption algorithm isn's supported by the server.
>
> One issue of this approach is that there's no way to recover from the
> situation where the client doesn't support any of the server-supported
> algorithms.

[LS]: For this situation, the client can sent the mandatory algorithms set
to the server.

Also, the server will have to include certificates of all
> the supported algorithms and signatures for all combinations of
> supported hash and signature algorithms as it doesn't know which of
> these works for the client.  This along with requiring the server
> to always include mandatory algorithms will make this approach
> workable, but it seemed to me to be unnecessarily wasteful and
> complicated.  Hence my suggestion.

[LS]: I don't think that the client/server need to contain all the
supported
algorithms. In default, all the servers and clients support the mandatory
encryption, signature, hash algorithms. So the client/server may just
need to contain the preferred algorithms and some of mandatory
algorithms. And Randy suggested us contain a list of algorithm, not
all the algorithm.

Besides, the current draft is not clear that the server needs to
> include all certificates and all combinations of signatures.  It's
> also awkward to mention the AlgorithmNotSupported status code if "it
> is not possible that the the server does not support the acknowledged
> algorithms".  So, whether or not my suggestion is adopted, the current
> version of draft has a lot of readability and technical issues (and so
> I think it's way far from being ready for a last call).  These are
> actually what I'd raise once I get to the point to discuss the content
> of the draft, but I wanted to address the higher level matters first.
>
[LS]: Maybe this version has some issues. I have submitted the xml/txt
files.
Could you please review the new version and modify it? I think that
we can discussed all the issues and move forward it as soon as possible.
And we can improve our efficiency in this way. Thanks a lot.

Best Regards,
Lishan