[dtn] BPsec -22, Section 9.1

"R. Atkinson" <rja.lists@gmail.com> Fri, 07 August 2020 13:26 UTC

Return-Path: <rja.lists@gmail.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69B383A07E3 for <dtn@ietfa.amsl.com>; Fri, 7 Aug 2020 06:26:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0YCDHl8DKxg1 for <dtn@ietfa.amsl.com>; Fri, 7 Aug 2020 06:25:59 -0700 (PDT)
Received: from mail-qk1-x72b.google.com (mail-qk1-x72b.google.com [IPv6:2607:f8b0:4864:20::72b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 140A63A0745 for <dtn@ietf.org>; Fri, 7 Aug 2020 06:25:58 -0700 (PDT)
Received: by mail-qk1-x72b.google.com with SMTP id l6so1661220qkc.6 for <dtn@ietf.org>; Fri, 07 Aug 2020 06:25:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:content-transfer-encoding:mime-version:subject:date:references :to:in-reply-to:message-id; bh=0A7e0CMGhlWpefIops1F/4Z9lt8AYWsGKg8zf2vquAM=; b=ST5MGy8BuP5dG7Ov8kDM5SbiPe36OPwnC0mAfThcQWUTHhjspM/mjBWnMZqYiRu+Ya E32offEAltMP43g/R2DLMGiIH+rFFkMwlgeQpC8NUDBb/NEbFzmU1l6iIwpRBn1eh7wv V6Y9K234p5NG7OEoj/V4Yl6dIqyp/Lz50o4uEaJu93KpE2ZR1/UBBFDINxyc3b1CtFyT U2PJWdv37wOfGbpchK8ZCI0Md8Jpxl0/gmbL7+kXgrQkJwjkMX5X11rO9dIr5qp7WWx3 rvgK+wWzi9FJjCXBz9ckF/eDOgMCaZ4il2L8DjAT0EfWf3jqwJ6QVQvk792u8pdIdQ5m WoQg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:content-transfer-encoding:mime-version :subject:date:references:to:in-reply-to:message-id; bh=0A7e0CMGhlWpefIops1F/4Z9lt8AYWsGKg8zf2vquAM=; b=NwJpdSRNwde0BMQXphyqJ27FRde+LdPDB9NOFiLdLL7aV+3kmdq8AyJ+KMRRTUDRLT gE8wq5ZDwjJWbZGnFgGIdHstK4a28n4EH5cxPhxRdiuN4jcSge4s16M8K+hUA4fGncQF c0IcH1FrdLsDVYgTGtucB7N81cifsYeeQLYuXTuf3Dmy6YUvNlZPu4mYSlzQONlCTfA/ VXpixs7XdkZ2B4/DczDy83UIKRCdOfMDj539BlpFGyuulRGtFii6x8aWD37hUK8bY59l 8BhG+uR9VO9d36GKnNBJjVH6ed6X10aWOuriRSSmPwjKAu5VCdW3iwq7ms3JCokwSj/o 3+PQ==
X-Gm-Message-State: AOAM531Hp4eFgAMnwz1p6e0DPTXCLMYpa5PC6LiUrUNz2Igyd+a7+xJ6 jnEoM5RLRPp3Nb3PktrCJRELMrX6
X-Google-Smtp-Source: ABdhPJygy5x3fNJgJE5ycdAoNGUit0qNIjR40Xnr7rujerRD+5BHlJw1E6vKyuz+RVVRv1gZZhlATQ==
X-Received: by 2002:a37:a293:: with SMTP id l141mr13923309qke.222.1596806756284; Fri, 07 Aug 2020 06:25:56 -0700 (PDT)
Received: from [10.30.20.28] (pool-141-156-180-77.washdc.fios.verizon.net. [141.156.180.77]) by smtp.gmail.com with ESMTPSA id w58sm7966547qth.95.2020.08.07.06.25.55 for <dtn@ietf.org> (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 07 Aug 2020 06:25:55 -0700 (PDT)
From: "R. Atkinson" <rja.lists@gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.14\))
Date: Fri, 07 Aug 2020 09:25:55 -0400
References: <4da9776f577e4f09b5e8d248437e5f3a@jpl.nasa.gov> <EA340974-935B-4343-9E4B-4CC00040FB6A@gmail.com> <4fc0e08e4d704dd39f9a21d0f9cc897b@CD1-4BDAG04-P04.cdmail.common.airbusds.corp> <7346251025f862ceddcf53da571c4a88be261471.camel@gmail.com>
To: DTN WG <dtn@ietf.org>
In-Reply-To: <7346251025f862ceddcf53da571c4a88be261471.camel@gmail.com>
Message-Id: <DB221853-1E21-46E1-B4B8-AB29378CEBC5@gmail.com>
X-Mailer: Apple Mail (2.3445.104.14)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/gg_r3vOrO1hf3XVDXdM3LiAyjXM>
Subject: [dtn] BPsec -22, Section 9.1
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Aug 2020 13:26:00 -0000

All,

Some belated feedback on the BPsec -22 draft follows, organised by section/page.etc.

Section 9.1, page 34, 2nd paragraph, which begins “Implementations of BPsec MUST…"

I am open to wordsmithing, but I propose to replace that one paragraph with these 3 paragraphs.  I am using separate paragraphs to talk about separate concepts primarily for readability.

PROPOSED NEW TEXT:

  "To ensure interoperability among various implementations, all BPSec implementations
    MUST support at least the current IETF standards-track mandatory security context(s).  
    As of this writing, that BCP mandatory security context is specified in 
    [I-D.ietf-dtn-interop-sc], but the mandatory security context(s) might change 
    over time in accordance with usual IETF processes.  Such changes are likely to occur
    in future if/when flaws are discovered in the applicable cryptographic algorithms, 
    for example.

    "Additionally, BPsec implementations need to support the security contexts which 
     are specified and/or used by the BP networks in which they are deployed.  

   "If a node serves as a gateway amongst two or more networks, the BPSec
     implementation at that node needs to support the union of security contexts 
     mandated in those networks.”

REASONING:

An implementer of BPsec might or might not have any idea where his/her implementation might be deployed.  So the existing paragraph inadvertently requires an implementer to have knowledge which they very likely cannot have.

Extensive prior experience with IETF security protocols at various layers (e.g., IPsec tunnel-mode, IPsec transport-mode, TLS, routing protocol authentication) has consistently shown that at least one mandatory-to-implement security context needs to be specified.  As noted just above, an implementer might well not know where and how a BPsec implementation might be deployed in future.  So it is important to require implementation of at least one security context which will be common across all implementations.

Experience also has shown that over time the mandatory-to-implement security context will need to change.  The two most common reasons are (a) newly discovered flaw in a cryptographic algorithm (e.g., MD4, MD5, SHA) and (b) improved computational power making an existing algorithm computationally-feasible to attack (e.g., DES).

There is a practical requirement that implementations within a given network support whichever security context that network deploys and also that a gateway between networks support applicable security context(s).  However, those are not something which IETF reasonably can mandate, since an implementer can’t always know where a given BPsec implementation might be deployed in future.  IETF standards normally focus on implementations rather than on deployments.  Where IETF does focus on deployment matters, the usual approach is to publish a “Best Current Practice (BCP)” document rather than a “standard”.


QUESTION:

Should we maybe avoid mandating [ID.bpsec-interop-sc] above and instead re-word the text above to say "as per the latest IETF BCP specifying mandatory-to-implement BPsec security contexts" (and then create a 1 paragraph BCP that says ID.bpsec-interop-sc is the current mandatory-to-implement security context) ??

That would have the hassle of creating an additional (BCP) document now, but would avoid the future hassle of needing to deprecate the entire BPsec RFC ONLY because some other security context became the mandatory-to-implement security context.  If the BPsec protocol is fine, then it would be nice to be able to change mandatory-to-implement security contexts WITHOUT changing the BPsec protocol specification.  This type of thing has happened in the past with other IETF security protocols.


Feedback very welcome…


Thanks !