Re: [Dots] AD review of draft-ietf-dots-signal-channel-25 (5th Part)

<mohamed.boucadair@orange.com> Thu, 17 January 2019 12:14 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8009D130F27; Thu, 17 Jan 2019 04:14:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kfmgrYu58koA; Thu, 17 Jan 2019 04:14:22 -0800 (PST)
Received: from orange.com (mta241.mail.business.static.orange.com [80.12.66.41]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B88F112950A; Thu, 17 Jan 2019 04:14:21 -0800 (PST)
Received: from opfedar05.francetelecom.fr (unknown [xx.xx.xx.7]) by opfedar27.francetelecom.fr (ESMTP service) with ESMTP id 43gNKm28t2z2y6V; Thu, 17 Jan 2019 13:14:20 +0100 (CET)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [xx.xx.31.61]) by opfedar05.francetelecom.fr (ESMTP service) with ESMTP id 43gNKm12L0z2xCR; Thu, 17 Jan 2019 13:14:20 +0100 (CET)
Received: from OPEXCAUBM7C.corporate.adroot.infra.ftgroup (10.114.13.32) by OPEXCLILM7E.corporate.adroot.infra.ftgroup (10.114.31.61) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 17 Jan 2019 13:14:19 +0100
Received: from OPEXCAUBMA2.corporate.adroot.infra.ftgroup ([fe80::e878:bd0:c89e:5b42]) by OPEXCAUBM7C.corporate.adroot.infra.ftgroup ([fe80::2c53:f99a:e2a9:19c6%21]) with mapi id 14.03.0415.000; Thu, 17 Jan 2019 13:14:19 +0100
From: mohamed.boucadair@orange.com
To: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>, Benjamin Kaduk <kaduk@mit.edu>, "draft-ietf-dots-signal-channel@ietf.org" <draft-ietf-dots-signal-channel@ietf.org>
CC: "dots@ietf.org" <dots@ietf.org>
Thread-Topic: AD review of draft-ietf-dots-signal-channel-25 (5th Part)
Thread-Index: AdSuMPs4z5rRJt5UT++zbKjLtGqWuAABJymgAAnDUxA=
Date: Thu, 17 Jan 2019 12:14:19 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B93302EA0919A@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <787AE7BB302AE849A7480A190F8B93302EA08D24@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <BYAPR16MB279051803A34079378C8327AEA830@BYAPR16MB2790.namprd16.prod.outlook.com>
In-Reply-To: <BYAPR16MB279051803A34079378C8327AEA830@BYAPR16MB2790.namprd16.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/LgaCz3rDQQJc5mCqrx32M5XQZ1U>
Subject: Re: [Dots] AD review of draft-ietf-dots-signal-channel-25 (5th Part)
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Jan 2019 12:14:25 -0000

Re-,

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Konda, Tirumaleswar Reddy [mailto:TirumaleswarReddy_Konda@McAfee.com]
> Envoyé : jeudi 17 janvier 2019 11:34
> À : BOUCADAIR Mohamed TGI/OLN; Benjamin Kaduk; draft-ietf-dots-signal-
> channel@ietf.org
> Cc : dots@ietf.org
> Objet : RE: AD review of draft-ietf-dots-signal-channel-25 (5th Part)
> 
> > -----Original Message-----
> > From: Dots <dots-bounces@ietf.org> On Behalf Of
> > mohamed.boucadair@orange.com
> > Sent: Thursday, January 17, 2019 12:21 PM
> > To: Benjamin Kaduk <kaduk@mit.edu>; draft-ietf-dots-signal-
> > channel@ietf.org
> > Cc: dots@ietf.org
> > Subject: Re: [Dots] AD review of draft-ietf-dots-signal-channel-25 (5th
> Part)
> >
> > This email originated from outside of the organization. Do not click links
> or
> > open attachments unless you recognize the sender and know the content is
> > safe.
> >
> > Hi Ben,
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De : Benjamin Kaduk [mailto:kaduk@mit.edu] Envoyé : mercredi 16
> > > janvier 2019 01:14 À : draft-ietf-dots-signal-channel@ietf.org
> > > Cc : dots@ietf.org
> > > Objet : AD review of draft-ietf-dots-signal-channel-25
> > >
> > > Section 7.2
> > >
> > > The TLS 1.3 handshake with 0-RTT diagram needs to be
> > > revisited/refreshed, as RFC 8446 does not look like that.
> > > Additionally, the usage of PSK as well as a certificate is not defined
> > > until draft-housley-tls-tls13-cert-with-extern-psk is published.
> > > I also note that in the diagram as presented, the client is not yet
> > > known to be authenticated when the server sends its initial (0.5-RTT)
> > > DOTS signal message.
> > >
> >
> > [Med] Noted. Thanks.
> 
> The DOTS signal channel draft is discussing PSK with (EC)DHE key
> establishment explained in RFC8446, and I don't see the need to refer to
> draft-housley-tls-tls13-cert-with-extern-psk-00.
> The 0-RTT diagram is a simplified version of 0-RTT just like the Figure 1 in
> https://tools.ietf.org/html/draft-ietf-quic-tls-17.
> 
> The only correction required to the diagram is end_of_early_data must be sent
> along with the client Finished message.
> 
> >
> > > Section 7.3
> > >
> > > This whole section seems to only be relevant for UDP usage, so
> > > probably the "If UDP is used" clause can be dropped and an
> > > introductory statement added earlier on.
> >
> > [Med] Will consider that.
> >
> > >
> > >                               Path MTU MUST be greater than or equal to
> > >    [CoAP message size + DTLS overhead of 13 octets + authentication
> > >    overhead of the negotiated DTLS cipher suite + block padding]
> > >    (Section 4.1.1.1 of [RFC6347]).  If the request size exceeds the path
> > >    MTU then the DOTS client MUST split the DOTS signal into separate
> > >    messages, for example the list of addresses in the 'target-prefix'
> > >    parameter could be split into multiple lists and each list conveyed
> > >    in a new PUT request.
> > >
> > > (DTLS 1.3 will have a short header for some packets, that is less than
> > > 13 octets.)
> >
> > [Med] The text is more about 1.2. We can add a 1.3 note if you think it is
> > useful for the discussion.
> 
> We should say "DTLS 1.2 overhead of 13 octets"
> In DTLS 1.3 DTLSCiphertext structure is variable length (full header is of
> size 6 octets).
> 
> >
> > >
> > > Section 8
> > >
> > > We've got some requirements in here about limiting behavior of
> > > clients/servers when talking to gateways; is knowing about the
> > > presence of a gateway something that's required to happen out of band
> > > or is there an in-band way to identify that the peer is a gateway?
> >
> > [Med] An agent does not necessary know that it peer is gateway. A gateway
> > is seen as a server for the client, and a client for a server.
> >
> > >
> > >    messages from an authorized DOTS gateway, thereby creating a two-link
> > >    chain of transitive authentication between the DOTS client and the
> > >    DOTS server.
> > >
> > > This seems to ignore the possibility of setups that include both
> > > client-domain and server-domain gateways.
> >
> > [Med] I updated the text to mention this is only an example.
> >
> > >
> > >                  DOTS client certificate validation MUST be performed as
> > >    per [RFC5280] and the DOTS client certificate MUST conform to the
> > >    [RFC5280] certificate profile.  [...]
> > >
> > > This seems to duplicate a requirement already stated in Section 7.1;
> > > it's probably best to only have normative language in one location,
> > > even if we need to mention the topic in multiple locations.
> > > Similarly for the mutual authentication requirement, which we
> > > duplicate in the second and fourth paragraphs of this section.
> >
> > [Med] Good point. Fixed.
> >
> > >
> > > If we don't want to use example.com vs. example.net as sample domains,
> > > we can also use whateverwewant.example, per RFC 6761.
> >
> > [Med] Will maintain the ones already in the draft. Thanks.
> >
> > >
> > > Section 9
> > >
> > > We should mention the media-type allocation in the top-level section.
> >
> > [Med] Will fix that.
> >
> > >
> > > "mappings to CBOR" feels confusing to me, since it leaves empty what
> > > we are mapping from.  Perhaps just talking about a registry of "CBOR
> > > map keys" would be better, both here and in the Section 9.3 intro.
> > >
> >
> > [Med] Unless there is an objection, I can use "CBOR Map Keys".
> 
> I don't see "CBOR Map Keys" defined or used anywhere in the draft.
> 

[Med] The proposal was to add it in -17. In my local copy I have implemented "CBOR Key Values". Better? 

> >
> > > Section 9.3
> > >
> > > I suggest being very explicit about whether new requests for
> > > registration should be directed to the mailing list or to IANA, as
> > > we've had some confusion about this elsewhere.
> > >
> > > The criteria used by the experts also just lists things they should
> > > consider, but does not provide full clarity on which answer to the
> > > question is more likely to be approved.  (And yes, I know that this
> > > text is largely copied from already published RFCs, but we can still
> > > do
> > > better.)
> >
> > [Med] Will check this.
> >
> > >
> > > Section 9.3.1
> > >
> > > If we want the value 0 to be reserved we need to say so.
> >
> > [Med] 0 is not part of the allocation range.
> >
> > > Do we want to say anything about the usage of negative integers as map
> > > keys?
> > >
> > > I suggest not mentioning the postal address, given the recent (e.g.)
> > > GDPR requirements.
> >
> > [Med] Good point. Done.
> >
> > >
> > > Section 9.3.2
> > >
> > > It may be worth mentioning Table 4 here as well.
> >
> > [Med] OK.
> >
> > >
> > > Section 9.5.1
> > >
> > > We need to specify which range of values we are asking for an
> > > allocation from.
> >
> > [Med] Added a mention to 0-255 range.
> 
> As per https://www.iana.org/assignments/cbor-tags/cbor-tags.xhtml the allowed
> range is 23-255.

[Med] Ben was referring to 9.5.1 which is now 9.4.1 in -26. So the range I indicated is the correct one. 

> 
> >
> > >
> > > Section 9.6.1
> > >
> > > As above, specify what range we're asking about.
> >
> > [Med] OK.
> 
> The range is already defined in section 9.6.1.1
> 

[Med] Ben was referring to 9.6.1 of -25, which is now 9.5.1 in -26. The comment from Ben is a valid one. 

> Cheers
> -Tiru
> 
> >
> > >
> > > I expect the current text to get some IESG (or directorate) feedback
> > > that the Data Item and Semantics descriptions are repetitive and banal.
> > >
> > > Section 9.7
> > >
> > > IIUC, IANA is going to ask if we want this module to be "maintained by
> > > IANA", so it would be good to have an answer ready even if we don't
> > > put it in the document text.
> >
> > [Med] This is discussed in -26.
> >
> > >
> > >    Rate-limiting DOTS requests, including those with new 'cuid' values,
> > >    from the same DOTS client defends against DoS attacks that would
> > >
> > > With respect to "new" 'cuid' values, is the server required to
> > > remember which ones it has seen in perpetuity, or can it time them out
> > > eventually?
> >
> > [Med] The attack vector is a DOTS client which changes frequently its cuid.
> > The DOTS server can set an interval in which the same client cannot present
> > a new cuid.
> >
> > >
> > > Section 10
> > >
> > > The security considerations seem to be taking a narrow focus on the
> > > requirements for and consequences of specific bits on the wire in the
> > > signal channel protocol.  I think it's appropriate to also include
> > > some high-level thoughts about the functional behavior of the
> > > protocol, allowing to signal that an attack is underway and trigger
> > > mitigation, increasing the availability of services, etc., and the
> > > risks that are posed by the protocol failing to work properly, whether
> > > that means letting attack traffic through or improperly blocking
> > > legitimate traffic.
> >
> > [Med] Would a pointer to the architecture/requirements I-Ds be sufficient
> to
> > cover to high-level aspects?
> >
> > >
> > > Section 13.1
> > >
> > > I think the IANA registries should be listed as Informational and not
> > > Normative references.
> > >
> >
> > [Med] Done.
> >
> > > Section 13.2
> > >
> > > Pending resolution of the question about using
> > > draft-ietf-core-yang-cbor rules or RFC7951+RFC7049, the
> > > draft-ietf-core-yang-cbor reference may need to be Normative.
> >
> > [Med] Please refer to my answer to that question. draft-ietf-core-yang-cbor
> is
> > informative.
> >
> > >
> > > Given that "URI" is a well-known abbreviation, we may be able to get
> > > away with not citing RFC 3986.  On the other hand, it's not causing
> > > any harm to leave it in...
> >
> > [Med] Will leave it.
> >
> > >
> > > RFC 4632 needs to be Normative, since we need to know CIDR to
> > > encode/decode target-prefixes.
> >
> > [Med] Works for me.
> >
> > >
> > > Similarly, I think that RFCs 6234
> >
> > [Med] This one is not listed as normative because other hash algos may be
> > used.
> >
> > , 7413
> > [Med] The support if TFO is not mandatory.
> >
> > , 7589
> > [Med] This is a MAY in the spec. It is just fine to leave it as
> informative..
> >
> > , 7918
> > [Med] Idem as TFO.
> >
> > , 7924
> > [Med] Idem as TFO.
> >
> > , and 7951
> > [Med] this one was not listed as normative because the document lists two
> > ways to do the mapping.
> >
> > > should also be Normative.
> > >
> > >
> > > -Ben
> >
> > _______________________________________________
> > Dots mailing list
> > Dots@ietf.org
> > https://www.ietf.org/mailman/listinfo/dots