[dtn] AD review of draft-ietf-dtn-tcpclv4-12

Magnus Westerlund <magnus.westerlund@ericsson.com> Thu, 01 August 2019 13:32 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAC04120170; Thu, 1 Aug 2019 06:32:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fDdT-C1LDlEb; Thu, 1 Aug 2019 06:32:04 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40080.outbound.protection.outlook.com [40.107.4.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72B4C12008B; Thu, 1 Aug 2019 06:31:59 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bskqGcSY39a09HlodBw/heCRC42tOmiSDfkOk6zoFIPH1qJfk4mnC5K40RopfjUweiLrHYS51nGrlyMAYR3CVRr58JtCwSzQz5v1neeY7dskNz0JPY19Vj2c9kF8U2ho5Zm8l6Z64euJm3+iLiR3f8SFTp0adx1t5wsJlzPPEwPhlp5YkRN4kuc/+lfm5AsW2FbvoIYZaMrQBAMeKGfyhg/ECJlimL7kksYSF+UZZlRQYNmcI2rZjFSkrigdouPsGdy3TGtHYQFnNaxdrNXFa0BxsalVfN1tPJ5MLl178gBWfBN85sZVzzKRcmStLd6cvso34vuSv6LxffbTaz8tdQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jhB9MFjP5JUlwgXT/XiBFrB27XSdxKzCsakfZZpGB54=; b=JaE01955vialWbWCpCN96ErQXg8NlK3aYbUsvlwAk4LtlZ1YBEv3GoDm5sKcmwZ0mpom3RP97DYIRJzG95L26D9cr6ONr6tkOcs2oVqwuKaZGshTXvggsXDjbKmQHne49zTlfNT3nk5m9zvxVAucv0g6jjXCrR62VDxAYLZJLAEzwoKx1fQ1HVjB8u+1SJu06+mqc3xUWQR+bsUhM4DjUs82r29rMnhaUWokjh+Pg8lKG6vvoibwCsO/d6M2GT5FOuftut6C0ngdsOoI/ZMpkbFiCZhv1PnSntCMZ2lyS4AxjjS/qwh7OhmeNnzJl9DUB3JQOwDPTS1HwHx9PahLhQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=ericsson.com;dmarc=pass action=none header.from=ericsson.com;dkim=pass header.d=ericsson.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jhB9MFjP5JUlwgXT/XiBFrB27XSdxKzCsakfZZpGB54=; b=HuChGHRUFhzpBqVV4DNmnLolYTxfABFkLe7w6pVnNprqCFrNV7M3wYNS+cj+IRepfRvSdFSZDn0y7ohUruHyDpwGe5j72bUI7HNFfU/4e0KbRI6eJvLo85virq4tnPe4m8mkZmHFi9MNykj6MYUtILdTU4aWUFfjYZF7Tj7CNI4=
Received: from HE1PR0701MB2522.eurprd07.prod.outlook.com (10.168.128.149) by HE1PR0701MB2444.eurprd07.prod.outlook.com (10.168.130.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2136.10; Thu, 1 Aug 2019 13:31:55 +0000
Received: from HE1PR0701MB2522.eurprd07.prod.outlook.com ([fe80::b9ec:6368:2a23:30fb]) by HE1PR0701MB2522.eurprd07.prod.outlook.com ([fe80::b9ec:6368:2a23:30fb%6]) with mapi id 15.20.2136.010; Thu, 1 Aug 2019 13:31:55 +0000
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
To: "dtn@ietf.org" <dtn@ietf.org>, "draft-ietf-dtn-tcpclv4@ietf.org" <draft-ietf-dtn-tcpclv4@ietf.org>
Thread-Topic: AD review of draft-ietf-dtn-tcpclv4-12
Thread-Index: AdVG21EHJDIckyVtR8mDiK6Q+2uHtg==
Date: Thu, 01 Aug 2019 13:31:55 +0000
Message-ID: <HE1PR0701MB2522C8240E7E28BFC11B80CD95DE0@HE1PR0701MB2522.eurprd07.prod.outlook.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=magnus.westerlund@ericsson.com;
x-originating-ip: [192.176.1.85]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 58eef75d-8f7d-42fc-4049-08d716849f29
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(49563074)(7193020); SRVR:HE1PR0701MB2444;
x-ms-traffictypediagnostic: HE1PR0701MB2444:
x-microsoft-antispam-prvs: <HE1PR0701MB24444CC4B5914866A10A390095DE0@HE1PR0701MB2444.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 01165471DB
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(366004)(396003)(346002)(136003)(39860400002)(15404003)(199004)(189003)(33656002)(2906002)(6506007)(476003)(66066001)(74316002)(186003)(316002)(450100002)(486006)(2501003)(5660300002)(44832011)(305945005)(14454004)(9686003)(478600001)(110136005)(3846002)(55016002)(81156014)(102836004)(26005)(8676002)(81166006)(8936002)(7736002)(66946007)(76116006)(25786009)(66556008)(71190400001)(66476007)(99286004)(68736007)(52536014)(64756008)(7696005)(14444005)(71200400001)(66446008)(99936001)(66616009)(86362001)(6436002)(256004)(53936002)(6116002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR0701MB2444; H:HE1PR0701MB2522.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: j0dIjGT/l2UsgMlje5sZ/7z3go+jxeDuB1iBpApaO3FAQhPcBEPmQL8pbwdO5tgCZPerf7iRT3ZBo75gf2CdtgdXFYqZldhWkR90bqh8RDFvpQkSouvNUBDnrBXcfMbIKqU7m+3qPxtj2g8Y4FEdxgV/f7DH6GRwYH5moZrk2PY7PIEbfu9GfODe/Go5PQLAqe9LSYWhCFUN/LELFqmVtj8uNJhRQpTKaIiM71IxzleIkoyd5bE6Z60JqiNgnJ6O6m2pb7DbfsRr+UFujGQG7c9Q2p0n7zLYozBx65kabVTtKQg354px9AWI79RKTECqwyCehCteVCMBD768gPga4M+Df5cP03JddHFRZjhyXXf44ZjLu69VTFUhw/shTBwSqsvyd/79Drr1wCnu2yZYshWEtg0VJe9sc5EKe6/HVOM=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_005E_01D5487E.3F0AA8C0"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 58eef75d-8f7d-42fc-4049-08d716849f29
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Aug 2019 13:31:55.7009 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: magnus.westerlund@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2444
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/nddVpcRROsBFuilH_p66bpIE2Go>
Subject: [dtn] AD review of draft-ietf-dtn-tcpclv4-12
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Aug 2019 13:32:08 -0000

Hi,

 

I have now performed my AD review of draft-ietf-dtn-tcpclv4-12. I think most
are minor comments, however the TLS and security related ones may be more
problematic to resolve. I will now be on vacation so you know you will not
receive any quick replies from me before the end of the month.

 

1.	Section 1: What are the applicability of TCPCLv4 to BPv6? I wonder
as RFC5050 is referenced. 


2.	Section 1.1: Session State Changed. Some editorial issues. Missing
":" initially. Then double ".." on Terminated. 


3.	Section 1.1: 
   Session Idle Changed  The TCPCL supports indication when the live/idle
sub-state changes.  This occurs only when the top-level session state is
Established.  Because TCPCL transmits serially over a TCP connection, it
suffers from "head of queue blocking" this indication provides information
about when a session is available for immediate transfer start.

So in which direction are this change indicated/reported, both or only in
one of them, or any as implied by Section 2.1's definition of Live Session? 


4.	Section 1.1: Transmission Intermediate Progress: Segment is not
defined prior to this. Maybe a forward pointe? Or should maybe the whole
subsection (1.1) be moved to after definitions? 


5.	Section 2: Is there a point to use the RFC 8174 language that makes
only capital words have special meaning? 


6.	Section 3.1: "One of these parameters is a singleton endpoint
identifier for each node (not the singleton Endpoint Identifier (EID) of any
application running on the node) to denote the bundle-layer identity of each
DTN node."

The above quote does imply something that at least BPBis isn't making clear
that a particular application agent would have its own EID. It is not clear
that there are a one-to-one relationship between bundle nodes and
application agents. Can you please clarify what the relationship is and lets
figure out if that needs to be clarified back to BPbis. 


7.	Section 3.1: "Bundle interleaving can be accomplished by
fragmentation at the BP layer or by establishing multiple TCPCL sessions
between the same peers."

Are there clear rules established for how many TCPCL sessions in parallel
that may be established? By the end of my reading this is unanswered. 


8.	Section 3.1: XFER_REFUSE does that indicate that the bundle has
already been received. How else does one separate other reasons for refusing
a bundle versus that one have received it prior?


9.	Section 3:1:    Once a session is established established, TCPCL is
a symmetric protocol between the peers. 
Double established


10.	Figure 4: "Close message" is this TCP level message, if that is the
case can that be clarified by prefix with TCP?


11.	Section 3.2: 
   Notes on Established Session states: 
      Session "Live" means transmitting or reeiving over a transfer
      stream.

      Session "Idle" means no transmission/reception over a transfer
      stream.

     Session "Closing" means no new transfers will be allowed.

Note that "Closing" is not used in Figure 4, it is called ending. Note
spelling error on "live" receving.


12.	Section 3.2: Figure 5 and 6 uses PCH without explanation. Figure 5
could probably also benefit by expanding CH as Contact Header.


13.	Figure 8 and 10: Uses [SESSTERM] is this the same as using the
SESS_TERM message, or some other procedure. Please clarify. 


14.	Section 3.3: "   Many other policies can be established in a TCPCL
network between these two extremes."

The list above includes three items, so the two extremes needs to be
enumerated. 


15.	Section 4.1: Can TCPCLv3 and TCPCLv4 coexist on Port 4556? Based on
9.1 the answer is yes, please clarify here.


16.	Section 4.1: "Therefore, the entity MUST retry the connection setup
no earlier than some delay time from the last attempt, and it SHOULD use a
(binary) exponential backoff mechanism to increase this delay in case of
repeated failures."

Any recommended upper limit for the backoff?


17.	Section 4.2:    Version:  A one-octet field value containing the
value 4 (current version of the protocol). 

I think the use of "the protocol" is unclear, maybe call it "the TCP
convergence layer". This to avoid confusion with BPv7. 


18.	Section 4.2: Please define how to set and ignore reserved bits in
the Flags field so that it may be extended in the future. 


19.	Section 4.3 and 4.4: Due to how the Contact Header relate to TLS
there is clear risk for a TLS stripping attack where the CAN_TLS flag is
cleared. I think there need to be some thought about mitigation of this
weakness. Depending on the expected mix of entities and their capabilities
one can either have policy for a deployment where one mandates TLS being
used, thus preventing the bid-down by not being according to policy. It is
more difficult to mitigate in a deployment where one have some entities that
doesn't support TLS, unless one can some way securely learn which entities
support it or not and thus can detect the manipulation. One can potentially
also first attempt to do a TLS handshake for the best version one supports.
Then run the CH inside the TLS to prevent TCPCL version and other flags to
be manipulated. But that doesn't solve the down-bid. I did note the
negotiation in Section 4.7 and the relation to Security Policy. Maybe the
solution is to write some text on the risk of TLS striping in Section 8 and
add forward pointers in 4.7 to that risk. 


20.	Section 4.4: Dealing with new TLS versions. BCP 195 does not appear
to me to define how to deal with newer versions. However, as TLS 1.3 already
exist I think this is from the start a relevant question. 


21.	Section 4.4: So what about entity authentication? Will the TCPCL
entity have a name / identity that can be authenticated so that one know
that one are talking to the right entity. And is the solution for this a
classical PKI, or something else? Also does the passive entity expect the
active (TLS client) to authenticate itself also? 


22.	Section 4.8: Please define how to set and ignore the reserved bits.


23.	Section 4.5: Based on that many later sections just refer to the
Message Header, shouldn't the section title for section 4.5 be Message
Header? Now the first mentioning of "Message Header" are in Figure 16's
title. 


24.	Section 6.1:
   After sending a SESS_TERM message, an entity MAY continue a possible
   in-progress transfer in either direction.  After sending a SESS_TERM
   message, an entity SHALL NOT begin any new outgoing transfer (i.e.
   send an XFER_SEGMENT message) for the remainder of the session.
   After receving a SESS_TERM message, an entity SHALL NOT accept any
   new incoming transfer for the remainder of the session. 

To me it seems that the above paragraph contains one contradiction. The
parenthesis in the second sentence (i.e. send an XFER_SEGMENT message)
appears to be false. Because as the beginning of the sentence implies that
it can't start a new transfer. However SESS_TERM is allowed to be inserted
in between XFER_SEGEMENT messages for a transfer ID, i.e.
XFER_SEGMENT(ID=7), SESS_TERM, XFER_SEGMENT(ID=7, end) is an allowed
sequence. Can you please clarify.


25.	Section 8. 
If this identifier is used outside of a TLS-secured session or 
   without further verification as a means to determine which bundles
   are transmitted over the session, then the node that has falsified
   its identity would be able to obtain bundles that it otherwise would
   not have.

I don't see how a entity could trust the in SESS_INIT provided EID more just
because it is in TLS unless there are some mechanism for binding the EID to
the TLS session endpoint (client or server). Some type of authentication is
needed to prove the identity. 


26.	Section 8.
Therefore, an entity SHALL NOT use the EID value of an
unsecured contact header to derive a peer node's identity unless it
   can corroborate it via other means.

The EID value is not part of the CH, only SESS_INIT. Is this a left over
from TCPCLv3 or earlier versions?


27.	Section 8. Needs text on  TLS stripping attack due to the optional
TLS usage.


28.	Section 9: "In this section, registration procedures are as defined
in [RFC8126]." . defined as in .


29.	Section 9: "Some of the registries below are created new for TCPCLv4
but share code values with TCPCLv3."

I don't think "share" is the right word here. Maybe "Some of the registries
have been defined as version specific to TCPCLv4, and imports some or all
codepoints from TCPCLv3."


30.	Section 9.3: Is RFC Required unnecessary strict? Considering the
quite large name space, I would think that specification required would be a
suitable policy? Just trying to understand what you think is gained by
having someone publish the extension as an RFC, in any stream including the
independent. 


31.	Section 9.4: Same question as for 30)


32.	Section 9.5: Here RFC required may be suitable. However, does it
make sense to allocate 2 or 4 points also here for Private/Experiments?


33.	Section 9.6: Here I would consider Expert Review with a
specification requirement. I also do not understand why so much is reserved,
a reason for that? 


34.	I would expect that the policy for 9.6-9.8 to be aligned so may
require change if change is decided on 33. 


35.	A big question I have after having read this document is how one
discover / determine the IP+port(s) to connect to for a given EID. Is this
currently completely deployment specific? And how bound is this to Bundle
routing? 

What may be missing is the section that tells the intended implementor that
in addition to follow this specification you do need a solution to the
following things, like for example authentication framework that allows one
to verify the TLS connects to EID mappings. Or an address resolution
protocol that maps EID to IP address and port pairs for cases when routing
simply give you Forward this bundle to EID using TCPCLv4. 

 

Cheers

 

Magnus Westerlund