Re: [DMM] Alexey Melnikov's No Objection on draft-ietf-dmm-lma-controlled-mag-params-04: (with COMMENT)

Ben Campbell <ben@nostrum.com> Tue, 16 May 2017 15:56 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 088C5129434; Tue, 16 May 2017 08:56:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.879
X-Spam-Level:
X-Spam-Status: No, score=-1.879 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_QP_LONG_LINE=0.001, RP_MATCHES_RCVD=-0.001, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id olkh15yASuXv; Tue, 16 May 2017 08:56:07 -0700 (PDT)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C779127698; Tue, 16 May 2017 08:52:15 -0700 (PDT)
Received: from [10.0.2.234] (ip-72-232-239-173.texas.us.northamericancoax.com [173.239.232.72]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id v4GFq3SA032708 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 16 May 2017 10:52:05 -0500 (CDT) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host ip-72-232-239-173.texas.us.northamericancoax.com [173.239.232.72] claimed to be [10.0.2.234]
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (1.0)
From: Ben Campbell <ben@nostrum.com>
X-Mailer: iPad Mail (14E304)
In-Reply-To: <D53FE017.2771C8%sgundave@cisco.com>
Date: Tue, 16 May 2017 11:52:03 -0400
Cc: "Dhananjay Patki (dhpatki)" <dhpatki@cisco.com>, Alexey Melnikov <aamelnikov@fastmail.fm>, Dapeng Liu <max.ldp@alibaba-inc.com>, "dmm-chairs@ietf.org" <dmm-chairs@ietf.org>, The IESG <iesg@ietf.org>, "dmm@ietf.org" <dmm@ietf.org>, Mirja Kühlewind <ietf@kuehlewind.net>, "draft-ietf-dmm-lma-controlled-mag-params@ietf.org" <draft-ietf-dmm-lma-controlled-mag-params@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <747F0C6C-33CD-47A1-AE98-8FDA3DDB60CC@nostrum.com>
References: <149199352865.15645.2318473152126054699.idtracker@ietfa.amsl.com> <7D444A20-2C3B-46FE-BB25-79BE67018A8F@cisco.com> <646D4962-4826-450C-9F85-AFA4576C315A@nostrum.com> <D53E6302.276F94%sgundave@cisco.com> <90F78EB5-3E57-4D63-A971-CB3B5F66B128@nostrum.com> <D53FE017.2771C8%sgundave@cisco.com>
To: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmm/r-UT_6s8pk_mLYsScVld0MxPiv8>
Subject: Re: [DMM] Alexey Melnikov's No Objection on draft-ietf-dmm-lma-controlled-mag-params-04: (with COMMENT)
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmm/>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 May 2017 15:56:09 -0000


> On May 16, 2017, at 2:01 AM, Sri Gundavelli (sgundave) <sgundave@cisco.com> wrote:
> 
> Hi Ben,
> 
> 
> 
>> On 5/15/17, 7:57 AM, "Ben Campbell" <ben@nostrum.com> wrote:
>> 
>> 
>>> On May 14, 2017, at 9:57 PM, Sri Gundavelli (sgundave)
>>> <sgundave@cisco.com> wrote:
>>> 
>>> Hi Ben,
>>> 
>>> 
>>>> Security Considerations: Seems like more is needed here. Do you mean to
>>>> say that none of these parameters add any security considerations that
>>>> were not there for existing headers? If that's the case, please say so,
>>>> and why people believe that to be the case.
>>> 
>>> The option defined in this draft, ³LMA Controlled MAG Parameters² option
>>> and its sub-options) are standard mobility options. The base
>>> specification
>>> (RFC5213) provides the security framework for carrying any mobility
>>> options securely in the PMIPv6 signaling messages and hence does not
>>> require any additional security consideration from the point of the
>>> transport security. Now, with respect to the content carried in these
>>> options and their privacy, these are configuration timers with no
>>> privacy
>>> tags. Exposing the content of these mobility options to an intruder does
>>> not introduce any new security threats. Furthermore, the base PMIPv6
>>> document specifies the use of IPSec for security the signaling message.
>>> Operators can potentially use ESP with integrity and with privacy
>>> protection for security the messages. So,  I tend to think the text in
>>> the
>>> security consideration and in conjunction with the text in RFC5213
>>> adequately cover all the security aspects.
>> 
>> It would help to summarize those thoughts in the draft.
> 
> 
> Ack. Some additional text capturing the above comments can go into the
> draft.
> 
> 
>> 
>> But, you responded to my original comments, but not my latest from the
>> most recent text version. In particular, the question: "Does the ability
>> to change the re-registration and heartbeat frequencies fall sufficiently
>> into those existing guidelines that nothing else needs to be said?” Do
>> these really fit into the category of “standard mobility options” as
>> contemplated by RFC 5213?
> 
> 
> Yes, I do believe these options for indicating the registration/heartbeat
> timers do fall under the category of “standard mobility options". Case and
> Point, RFC5847 defines an option for carrying “RestartCounter” in a MIPv6
> signaling message, which the protocol peer stores and uses that counter.
> In this example and as well in the current draft, the information elements
> carried in the option are in similar in nature, both are config parameters
> and these are elements that have influence on the protocol state machine.

Thanks, that's helpful information. I think a sentence or two to that effect would be useful in the draft. It probably doesn't need as much detail as you gave here. I envision something to the effect of "The options defined in this draft allow the configuration of re-registration and heartbeat frequencies. These security considerations in [RFC5213] apply."

Thanks!

Ben.