Re: [dtn] AD review of draft-ietf-dtn-bpsec-default-sc-02

Brian Sipos <BSipos@rkf-eng.com> Mon, 05 April 2021 15:36 UTC

Return-Path: <BSipos@rkf-eng.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A99CC3A1D2D for <dtn@ietfa.amsl.com>; Mon, 5 Apr 2021 08:36:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rkf-eng.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KbcdeCo2B9Hs for <dtn@ietfa.amsl.com>; Mon, 5 Apr 2021 08:36:36 -0700 (PDT)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2084.outbound.protection.outlook.com [40.107.237.84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B37113A1D2C for <dtn@ietf.org>; Mon, 5 Apr 2021 08:36:36 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SO6JzRTzDuH1rsND2PyzEuioPP1JOgN6JT/rXsHwiHTNZm4BFoiWR6VqqY3bIwXpDZTtX6I8Ry/WmgS0KKQdvs8G44CdhrfiYdpqdCqG3Pr0RQ8kQAlmdxl6lBLex5HWU5xmlBdoUdYrnVb0lSovVlW64BZJ+BqpjaEkFB4vKuaplXdE7uaMOnM7hXXA+wjSRSC+SsZ+EF78K95uNFF1LeGTNxRG/mZDV+2oFpV++OkbkcHMWuKDtu/zObsNyoqraVL8NBDQAvURsNlxTgox4CCbFwq4VExrJdEksVtY1tlAEvB30/wIRLbnWBe7tPx6trxD/Xv5CCov4nTaUaXQ6g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EBdY3tccwtrM2Uol+D952L+ypPUswrygsOSYsRt28Ws=; b=Cgaqz5QPlmBWjRCfgOIATkCe8bhEnvIRaMLyOD2lncG8tG0mKk5nsQWmF43Y6J7QuN57L3f5L3FvNlmf4MHX2Snv0iqu7LidjvsbDlDADfxVVI/KgY6LWSY+uZBSlXESUy2857oEN5ZIMxBGTfnPUaOwYjwPcMy3fFhUqdV+tuqQeGkUDHbICiBla3Xg3kfeB5SYPZbcEneAQD0EO4/NdRqJaU1DdEFKntRdXc6oknAr3e3/1qpxeVoUUfiL/fuVi+HE5EDE0lqrZ1xrZ8L4ubjTMR8Q22qkpoKOgk4AyNvJHCOMoumb148BR3wdedy1L/Tac0ygVbtxg7s+Gmck/w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=rkf-eng.com; dmarc=pass action=none header.from=rkf-eng.com; dkim=pass header.d=rkf-eng.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rkf-eng.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EBdY3tccwtrM2Uol+D952L+ypPUswrygsOSYsRt28Ws=; b=VQ4vsWWvXxuxP8z1il2OAym86BGqNMVDEfEgA0u7ZeCZVhWBqjnx6bSkfa+o7iTpX9BJEmIeJ22Pp4UBZwnYW3iztMBSg8Y5zUC+iME1Wl4ImzWLib0lYaoSKB8J9vtGAc496eJcKBQNDXUOucYJqYxrm2QRGhqwPxg4q2m7Ctw=
Received: from MN2PR13MB3567.namprd13.prod.outlook.com (2603:10b6:208:168::10) by MN2PR13MB3280.namprd13.prod.outlook.com (2603:10b6:208:13d::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.8; Mon, 5 Apr 2021 15:36:33 +0000
Received: from MN2PR13MB3567.namprd13.prod.outlook.com ([fe80::5db2:2ebc:2020:496f]) by MN2PR13MB3567.namprd13.prod.outlook.com ([fe80::5db2:2ebc:2020:496f%5]) with mapi id 15.20.4020.016; Mon, 5 Apr 2021 15:36:32 +0000
From: Brian Sipos <BSipos@rkf-eng.com>
To: Zaheduzzaman Sarker <zaheduzzaman.sarker=40ericsson.com@dmarc.ietf.org>, "Birrane, Edward J." <Edward.Birrane@jhuapl.edu>, "dtn@ietf.org" <dtn@ietf.org>
CC: Magnus Westerlund <magnus.westerlund@ericsson.com>
Thread-Topic: AD review of draft-ietf-dtn-bpsec-default-sc-02
Thread-Index: AQHXH1vax7LWSJVgGEW7LhnHV51gYaqaUmZQgAOJLQCAAGEvWg==
Date: Mon, 05 Apr 2021 15:36:32 +0000
Message-ID: <MN2PR13MB35671B34F8F0229BF7095C3B9F7C9@MN2PR13MB3567.namprd13.prod.outlook.com>
References: <EAF9AEEC-B28E-48AC-BE47-1DAD6FA3609B@ericsson.com> <7b1238eb22fa41cd826548c5a53f2e42@aplex01.dom1.jhuapl.edu>, <1663F867-DB26-4B00-B341-EAE4AB84D39B@ericsson.com>
In-Reply-To: <1663F867-DB26-4B00-B341-EAE4AB84D39B@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none; dmarc.ietf.org; dmarc=none action=none header.from=rkf-eng.com;
x-originating-ip: [96.241.16.84]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 798af28d-a9b6-4e87-2d84-08d8f848970f
x-ms-traffictypediagnostic: MN2PR13MB3280:
x-microsoft-antispam-prvs: <MN2PR13MB32801510E0C75700B91DAD079F779@MN2PR13MB3280.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: GKB67UF30flMQRITN0ZdimufrdOQmGf85Kw9o7pqhOvNDL61ZzhCgusyJlxzmlh+NB3OPL3b3Y8oyB0OtCP1KQrOrZUpck2P/HFepLp6SNsC/mwzR+KE4iWG+Q4pWfjLCl2csvp5KEhsL8Th22N4QQC/uyscO4nkeUHW1T2BGzbE8CbX1aV1gZpnb456hX6OfrhU1Oqd27GbAUzHsWdenXgnyJxj4VhpPrHFeRg8qsGVb6fM2TuojqZZ1LfZDmgHwm8xXMJ5467mkiqgXtwQUDAEHig5JkSpyv9VzsJ5bh9GaFgsCPn0e8np3Fj+GWWqUoiJkrzhaYY+fd1bIUL8l4glZx8CScumcSGKGuEZKNH76IAs2aopISZoSZ9ZooFrAJvXfsGSnF/nnzi7wBbkjfAmGQQlBgaXPmE3LKoNMRCm49r9ZC7vdyZYj4d1y0Bs2bON4D87xYA3H7VQMYB41Q6GWlK115kQoDkrhklGDXxwuOgDAY82n+VGcW3zR1Jah0pzCG/9ncveI1xHfOKH4/566I9KMIxh4VeDxqNnHYppTRrTKnq33bYGQqdt+AM/y5v0mrUqeCjLyqgZ41hPZojumIwSqTo2G52NB51hYENz2nv3C5c86HnflnjIiq2UlIgk2EsQWRl15jud8C4puwZ5g+mYT3l3/jn+/byrsce5PgLd4sW2uo7PaBadgi6EtoIIIXw6/jMuVGHN0U/A58E41sJe69h9Y+5MPG9DBq8=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR13MB3567.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39830400003)(376002)(396003)(136003)(366004)(346002)(8936002)(83380400001)(4326008)(8676002)(166002)(5660300002)(9686003)(186003)(76116006)(66476007)(66446008)(66556008)(64756008)(53546011)(316002)(66946007)(45080400002)(55016002)(966005)(19627235002)(33656002)(19627405001)(110136005)(478600001)(86362001)(38100700001)(7696005)(6506007)(71200400001)(2906002)(26005)(52536014); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR13MB35671B34F8F0229BF7095C3B9F7C9MN2PR13MB3567namp_"
MIME-Version: 1.0
X-OriginatorOrg: rkf-eng.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR13MB3567.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 798af28d-a9b6-4e87-2d84-08d8f848970f
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Apr 2021 15:36:32.6664 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4ed8b15b-911f-42bc-8524-d89148858535
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: U6czV1HoSYFqXQCmyPpEJ133p26at2XJxAkWyLyUOZN50tfRqPgEc1eMnaYJ8t6abtapXohymXtg2Myl31j2cw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR13MB3280
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/keNScf6YbOYOUZ06h1ByxR9baj4>
Subject: Re: [dtn] AD review of draft-ietf-dtn-bpsec-default-sc-02
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Apr 2021 15:36:42 -0000

Ed,
Regarding test vectors, I had prepared some similar short examples in [1] using the source in [2]. The only issue with these examples is that they are not yet updated to include the mandatory ASB Security Source field from BPSec -25, but that doesn't affect AAD or other example data. You're welcome to adapt any of those existing examples for the default contexts, they can be run from a local working copy as described in the top-level README.md file.

[1] https://www.ietf.org/archive/id/draft-bsipos-dtn-bpsec-cose-05.html#section-appendix.a
[2] https://github.com/BSipos-RKF/dtn-bpsec-cose/tree/main/src

________________________________
From: dtn <dtn-bounces@ietf.org> on behalf of Zaheduzzaman Sarker <zaheduzzaman.sarker=40ericsson.com@dmarc.ietf.org>
Sent: Wednesday, March 31, 2021 03:06
To: Birrane, Edward J. <Edward.Birrane@jhuapl.edu>; dtn@ietf.org <dtn@ietf.org>
Cc: Magnus Westerlund <magnus.westerlund@ericsson.com>
Subject: Re: [dtn] AD review of draft-ietf-dtn-bpsec-default-sc-02

Hi Edward,

Thanks for the update. The -03 version addresses most of the comments and concerns.

See my further comments inline below with [ZS].

BR
Zahed

On 2021-03-29, 05:43, "Birrane, Edward J." <Edward.Birrane@jhuapl.edu> wrote:


    > * It would be good for the user of this document to capture the reason
    > behind selecting HMAC-SHA and AES-GCM in respective overview section
    > (section 3.1 and section 4.1).

    C3: Agreed. I have added reasons for selection in 3.1 and 4.1 in the -03 version.

[ZS] Thanks, this is a good addition.

In section 4.1 :

The BCB-AES-GCM security context shall have the security context
           identifier specified in Section 5.1.

is this "shall" should be a "MUST" as described in Section 3.1?


    > * Section 3.3.2 and Section 3.5 :
    > It seems like some sort of key-id might be required to resolve
    > this. The BPsec does not define any generic key-id and it is neither defined
    > here. It might become an issue for interoperability.

    C5: Agreed this might become an issue for interoperability.  For example, if the policies for requiring security operations differ on different nodes there may be interop problems. Similarly, if the policies for key generation/communication differ on different nodes, there may be interop problems. The DTNWG consensus was this limitation is appropriate for now for this default security context and the DTN WG is looking to determine delay-tolerant key management strategies in the future.

[ZS] Ok,  is this consensus documented somewhere? Meeting notes or email thread or whatever?



    > * Section 4.3.2 :
    >      Does this "security policy" refers to local security policy?

    C15: Yes.  Security policy at the source, verifier, or acceptor is meant to imply the local security policy at the node.

[ZS] Ok, then clearly stating that helps. It was clearly mention in the other place(s).


    > * Section 6.3
    >
    >      To me this security considerations for fragmentation belongs to BPsec as
    > the main technical issues on fragmentation are described there.

    C17: I would support removing the fragmentation section from this document and including it in some other broader-scoped document on DTN security, though perhaps not the BPSec document itself because the issues with fragmentation can extend beyond the insertion and handling of security blocks.

[ZS] I don't think removing the fragmentation section from this document to some other document actually helps. This is a very important aspect of the security context and I think it is better to be decisive about it now. If moved to BPSec then other documents , specially security context documentation, can just refer to it. The question really is, where does it make more sense put there it is in line with the context of the content of the document? Right now I see that is BPsec.


    > I would also like to draw attention to the SECART review (Thanks to the
    > SECART team and Christian Huitema) proposing test vectors to mitigate
    > interoperability issue pointed out by the reviewer. This seems like a good
    > proposal to include in this specification.


    C18: Agreed and grateful for the review! As mentioned in my comments to the SECART review and similar to C17 above, I think that example encodings are a very useful concept, but would ultimately be useful at showing bundle structure and security block structure. Rather than repeating such encodings in all future security context documents, I propose the DTN WG consider the best way to produce this broader-scope documentation.

[ZS] I see the test vectors related to the applicability of the this document hence this need to be considered well. Failing to assure interoperability actually undermine the intention of this document, hence any tools to help achieving that goal is worth putting effort into. Also we need to make sure the test vector is actually usable by more than one implementation.  I would be happy if DTN WG comes up with a best way forward here.



_______________________________________________
dtn mailing list
dtn@ietf.org
https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fdtn&amp;data=04%7C01%7CBSipos%40rkf-eng.com%7Cb5e10d1118774035b60d08d8f413c262%7C4ed8b15b911f42bc8524d89148858535%7C1%7C0%7C637527713006290046%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=TtRtdmvpnNBjaaI8dyOQCrclfgLdhDP8BsjV2LnDUrQ%3D&amp;reserved=0