Re: [DMM] Alexey Melnikov's No Objection on draft-ietf-dmm-lma-controlled-mag-params-04: (with COMMENT)

"Sri Gundavelli (sgundave)" <sgundave@cisco.com> Tue, 16 May 2017 06:04 UTC

Return-Path: <sgundave@cisco.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B31561292D3; Mon, 15 May 2017 23:04:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level:
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9KeBKpM-TRLj; Mon, 15 May 2017 23:04:26 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6CCE129437; Mon, 15 May 2017 23:01:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4636; q=dns/txt; s=iport; t=1494914478; x=1496124078; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=TP3bd1Q2eka8+uEaokL4FI8RBFX9cTtOI3i+Wfm2VP4=; b=UVjjiskOPPQbW2Fi11TDpiNNH/nleqfkHNUeHhSXRuPoHBnlgl5DRTiZ TjVes4jSnSFAugiZ5zcyadWPT49yxiSRuWLRXMRyRxLGP2IOgx0i80sis RhBFPqu4QRArvd1+y7dS2xLXhRS2yzNa4LTl3AERLVPPD5Q5nPaQbR4a9 o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CYAAAdlRpZ/5pdJa1cGQEBAQEBAQEBAQEBBwEBAQEBg1WBbgeNfZFglXWCD4YkAoU5PxgBAgEBAQEBAQFrKIUYAQEBAQIBZxIQAgEIGC4yJQIEDgWKGgivDIsLAQEBAQEBAQECAQEBAQEBAQEBH4ZfhHmEY4VyAQSJRJRGAZMaggSFO4oslEIBHziBCnAVhT0cGYFKdodfgQ0BAQE
X-IronPort-AV: E=Sophos;i="5.38,348,1491264000"; d="scan'208";a="243687062"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 16 May 2017 06:01:05 +0000
Received: from XCH-RCD-017.cisco.com (xch-rcd-017.cisco.com [173.37.102.27]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id v4G615gd009512 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 16 May 2017 06:01:05 GMT
Received: from xch-aln-008.cisco.com (173.36.7.18) by XCH-RCD-017.cisco.com (173.37.102.27) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Tue, 16 May 2017 01:01:05 -0500
Received: from xch-aln-008.cisco.com ([173.36.7.18]) by XCH-ALN-008.cisco.com ([173.36.7.18]) with mapi id 15.00.1210.000; Tue, 16 May 2017 01:01:05 -0500
From: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
To: Ben Campbell <ben@nostrum.com>
CC: "Dhananjay Patki (dhpatki)" <dhpatki@cisco.com>, Alexey Melnikov <aamelnikov@fastmail.fm>, Dapeng Liu <max.ldp@alibaba-inc.com>, "dmm-chairs@ietf.org" <dmm-chairs@ietf.org>, The IESG <iesg@ietf.org>, "dmm@ietf.org" <dmm@ietf.org>, Mirja Kühlewind <ietf@kuehlewind.net>, "draft-ietf-dmm-lma-controlled-mag-params@ietf.org" <draft-ietf-dmm-lma-controlled-mag-params@ietf.org>
Thread-Topic: Alexey Melnikov's No Objection on draft-ietf-dmm-lma-controlled-mag-params-04: (with COMMENT)
Thread-Index: AQHSzgnN37QehpsweUyjU+wzoOPiQw==
Date: Tue, 16 May 2017 06:01:05 +0000
Message-ID: <D53FE017.2771C8%sgundave@cisco.com>
References: <149199352865.15645.2318473152126054699.idtracker@ietfa.amsl.com> <7D444A20-2C3B-46FE-BB25-79BE67018A8F@cisco.com> <646D4962-4826-450C-9F85-AFA4576C315A@nostrum.com> <D53E6302.276F94%sgundave@cisco.com> <90F78EB5-3E57-4D63-A971-CB3B5F66B128@nostrum.com>
In-Reply-To: <90F78EB5-3E57-4D63-A971-CB3B5F66B128@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.1.161129
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.32.246.211]
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <C260DED39D00F140A49834C8E81C9619@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmm/UhHkLW7SXYzaynmSkGM8EA6RCB4>
Subject: Re: [DMM] Alexey Melnikov's No Objection on draft-ietf-dmm-lma-controlled-mag-params-04: (with COMMENT)
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmm/>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 May 2017 06:04:28 -0000

Hi Ben,



On 5/15/17, 7:57 AM, "Ben Campbell" <ben@nostrum.com> wrote:

>
>> On May 14, 2017, at 9:57 PM, Sri Gundavelli (sgundave)
>><sgundave@cisco.com> wrote:
>> 
>> Hi Ben,
>> 
>> 
>>> Security Considerations: Seems like more is needed here. Do you mean to
>>> say that none of these parameters add any security considerations that
>>> were not there for existing headers? If that's the case, please say so,
>>> and why people believe that to be the case.
>> 
>> The option defined in this draft, ³LMA Controlled MAG Parameters² option
>> and its sub-options) are standard mobility options. The base
>>specification
>> (RFC5213) provides the security framework for carrying any mobility
>> options securely in the PMIPv6 signaling messages and hence does not
>> require any additional security consideration from the point of the
>> transport security. Now, with respect to the content carried in these
>> options and their privacy, these are configuration timers with no
>>privacy
>> tags. Exposing the content of these mobility options to an intruder does
>> not introduce any new security threats. Furthermore, the base PMIPv6
>> document specifies the use of IPSec for security the signaling message.
>> Operators can potentially use ESP with integrity and with privacy
>> protection for security the messages. So,  I tend to think the text in
>>the
>> security consideration and in conjunction with the text in RFC5213
>> adequately cover all the security aspects.
>
>It would help to summarize those thoughts in the draft.


Ack. Some additional text capturing the above comments can go into the
draft.


>
>But, you responded to my original comments, but not my latest from the
>most recent text version. In particular, the question: "Does the ability
>to change the re-registration and heartbeat frequencies fall sufficiently
>into those existing guidelines that nothing else needs to be said?” Do
>these really fit into the category of “standard mobility options” as
>contemplated by RFC 5213?


Yes, I do believe these options for indicating the registration/heartbeat
timers do fall under the category of “standard mobility options". Case and
Point, RFC5847 defines an option for carrying “RestartCounter” in a MIPv6
signaling message, which the protocol peer stores and uses that counter.
In this example and as well in the current draft, the information elements
carried in the option are in similar in nature, both are config parameters
and these are elements that have influence on the protocol state machine.
 

Regards
Sri


>
>Ben.
>
>
>> 
>> 
>> Regards
>> Sri
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> On 5/12/17, 3:11 PM, "Ben Campbell" <ben@nostrum.com> wrote:
>> 
>>> The latest attached version resolves my editorial comments. However, it
>>> does not resolve my one substantive comment.
>>> 
>>>> On May 9, 2017, at 11:09 AM, Dhananjay Patki (dhpatki)
>>>> <dhpatki@cisco.com> wrote:
>>>> 
>>>> ----------------------------------------------------------------------
>>>> Ben Campbell
>>>> ----------------------------------------------------------------------
>>>> 
>>>> Substantive:
>>>> 
>>>> Security Considerations: Seems like more is needed here. Do you mean
>>>>to
>>>> say that none of these parameters add any security considerations that
>>>> were not there for existing headers? If that's the case, please say
>>>>so,
>>>> and why people believe that to be the case.
>>> 
>>> The attached version modifies the text to say that the new parameters
>>> here inherit the guidelines from RFC5213.
>>> 
>>> My point was to say that this draft creates a way to send new kinds of
>>> options. Is the content of these new parameters similar enough to those
>>> from RFC 5213 that those guidelines still apply? Does the ability to
>>> change the re-registration and heartbeat frequencies fall sufficiently
>>> into those existing guidelines that nothing else needs to be said? If
>>>so,
>>> then it would be helpful to say that. But if those new capabilities are
>>> materially different than previous ones, then some text that describes
>>> how they are different, ways they could be abused, and any mechanisms
>>> that can mitigate that abuse.
>>> 
>>> For the record, I am not saying that I believe that these new
>>> capabilities create new vulnerabilities. But the security
>>>considerations
>>> should help the reader understand whether that is true or not.
>>> 
>>> Thanks!
>>> 
>>> Ben.
>>> 
>>> 
>> 
>