Re: [dtn] AD review of draft-ietf-dtn-bpsec-default-sc-02
"Birrane, Edward J." <Edward.Birrane@jhuapl.edu> Wed, 14 April 2021 12:39 UTC
Return-Path: <Edward.Birrane@jhuapl.edu>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BD923A0D00 for <dtn@ietfa.amsl.com>; Wed, 14 Apr 2021 05:39:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=jhuapl.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ryMu8xP3-GJn for <dtn@ietfa.amsl.com>; Wed, 14 Apr 2021 05:39:29 -0700 (PDT)
Received: from aplegw02.jhuapl.edu (aplegw02.jhuapl.edu [128.244.251.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 876273A0CFE for <dtn@ietf.org>; Wed, 14 Apr 2021 05:39:29 -0700 (PDT)
Received: from pps.filterd (aplegw02.jhuapl.edu [127.0.0.1]) by aplegw02.jhuapl.edu (8.16.0.43/8.16.0.43) with SMTP id 13ECXndd092755; Wed, 14 Apr 2021 08:39:26 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jhuapl.edu; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=JHUAPLDec2018; bh=F6m6YQFdGDYRlC0Eqy2P+wPL1rsKVOgmG/WcsJwER4Y=; b=lTmUlipmSQkr5DCOH1+JVaaSrMIj+d/hgStA9J9Z+Dz+avPf9Qj4ws82A9TI/y787Tzt QrlHek+EjqnokwChI3ms74PTqt5P98trgot2e9KFVCdDxPIB1VfjIPxsg+xOsLwgYMJt VI7y5MUQQyewfrW5Cj3h7SHLgrWJe5GxnXbHdXEsA27X9Rq2VJgc4TNYV9S2Q67ZC2XR WQxtPwxJQL2QhjhXEPKdcK797d/mNJKaELuhrOBQL0kvxX66eV/xix+PalB22rVeFXyb yKZlvpmd2fj4VafG+J2EkQWBUyqFv860tszRfNke2fvSvpMCexHAkBdYGY1fp+Xsiq+i NA==
Received: from aplex05.dom1.jhuapl.edu (aplex05.dom1.jhuapl.edu [128.244.198.135]) by aplegw02.jhuapl.edu with ESMTP id 37wdgd8xte-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 14 Apr 2021 08:39:26 -0400
X-CrossPremisesHeadersFilteredBySendConnector: aplex05.dom1.jhuapl.edu
Received: from aplex01.dom1.jhuapl.edu (128.244.198.5) by aplex05.dom1.jhuapl.edu (128.244.198.135) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 14 Apr 2021 08:39:25 -0400
Received: from aplex01.dom1.jhuapl.edu ([fe80::19f5:dcc5:c696:1a50]) by aplex01.dom1.jhuapl.edu ([fe80::19f5:dcc5:c696:1a50%25]) with mapi id 15.00.1497.012; Wed, 14 Apr 2021 08:39:25 -0400
From: "Birrane, Edward J." <Edward.Birrane@jhuapl.edu>
To: Rick Taylor <rick@tropicalstormsoftware.com>, "zaheduzzaman.sarker@ericsson.com" <zaheduzzaman.sarker@ericsson.com>, "dtn@ietf.org" <dtn@ietf.org>
CC: "magnus.westerlund@ericsson.com" <magnus.westerlund@ericsson.com>
Thread-Topic: AD review of draft-ietf-dtn-bpsec-default-sc-02
Thread-Index: AQHXH1vax7LWSJVgGEW7LhnHV51gYaqaUmZQgAOJLQCACcDOsIAD56AAgABZGoCACDoLcA==
Date: Wed, 14 Apr 2021 12:39:24 +0000
Message-ID: <20e4815e2e9e479c8d11f78695e4b05f@aplex01.dom1.jhuapl.edu>
References: <EAF9AEEC-B28E-48AC-BE47-1DAD6FA3609B@ericsson.com> <7b1238eb22fa41cd826548c5a53f2e42@aplex01.dom1.jhuapl.edu> <1663F867-DB26-4B00-B341-EAE4AB84D39B@ericsson.com> <38A5475DE83986499AEACD2CFAFC3F9801F5A55580@tss-server1.home.tropicalstormsoftware.com> <D0F15504-4889-4ADF-BD74-DFB82D1C4F6A@ericsson.com> <01fde9bd754f4578f6e81b10e8b22dea77de89c4.camel@tropicalstormsoftware.com>
In-Reply-To: <01fde9bd754f4578f6e81b10e8b22dea77de89c4.camel@tropicalstormsoftware.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [128.244.198.169]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OrganizationHeadersPreserved: aplex05.dom1.jhuapl.edu
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-04-14_07:2021-04-14, 2021-04-14 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/qYydwVBlCswF9Mqe3jC06oOknwg>
Subject: Re: [dtn] AD review of draft-ietf-dtn-bpsec-default-sc-02
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Apr 2021 12:39:34 -0000
Rick, Zahed, Yes, that works for me. My apologies that I did not see this comment before posting a -04. I am sure we will be producing a -05 in time and would include those statements in that version. -Ed --- Edward J. Birrane, III, Ph.D. Embedded Applications Group Supervisor Space Exploration Sector Johns Hopkins Applied Physics Laboratory (W) 443-778-7423 / (F) 443-228-3839 > -----Original Message----- > From: Rick Taylor <rick@tropicalstormsoftware.com> > Sent: Friday, April 09, 2021 4:00 AM > To: zaheduzzaman.sarker@ericsson.com; dtn@ietf.org; Birrane, Edward J. > <Edward.Birrane@jhuapl.edu> > Cc: magnus.westerlund@ericsson.com > Subject: [EXT] Re: AD review of draft-ietf-dtn-bpsec-default-sc-02 > > APL external email warning: Verify sender rick@tropicalstormsoftware.com > before clicking links or attachments > > Hi Zahed, > > Okay.. I agree there is value in recording that key management is a potential > source of complication, and the detail isn't covered in this document. > > @Ed: Does that work for you? > > Cheers, > > Rick > > > On Thu, 2021-04-08 at 23:40 +0000, Zaheduzzaman Sarker wrote: > > Hello Rick, > > > > Thanks for the pointers. I have skimmed through the IETF100 minutes > > but could not really find notes on key management discussion. I > > certainly found the decision behind separate sec context document. > > So, that was somewhat helpful to get the context. > > > > Now, if the WG has a consensus that "this limitation is appropriate > > for now > > > for this default security context and the DTN WG is looking to > > determine > > > delay-tolerant key management strategies in the future." As > > mentioned by Edward in his response. > > I think the bpsec-default-sc document should describe the potential > > issues due to lack of proper key management and explain why this > > limitation is OK for default security context. Basically recording > > that the WG is aware of issues and has well thought decision for > > default security context. > > > > > > BR > > Zahed > > > > On 2021-04-06, 16:08, "Rick Taylor" <rick@tropicalstormsoftware.com> > > wrote: > > > > Hi Zahed, > > > > Just as a bit of clarification to your point re Key Management. > > > > The working group has discussed key management a couple of times > > (IETF-100 in particular) and there is at least one proposed solution, > > however the rough consensus of the group is that this topic is tricky > > to get right in a couple of paragraphs in either BPSec or in this > > document (which we intend to be as short and simple as possible), and > > therefore it would be better to not attempt a lose definition before > > the WG has a firmer view on best practice, and have to update these > > documents. > > > > To that end, Key Management as a work item for the group is a firm > > proposal for the re-chartering, and there seems to be sufficient > > interest and excitement in the group to get it done. > > > > References: IETF-100 minutes and mailing list - I can't find a > > single obvious thread on the mailing list unfortunately. > > > > Cheers, > > > > Rick > > > > > -----Original Message----- > > > From: dtn [mailto:dtn-bounces@ietf.org] On Behalf Of > > Zaheduzzaman Sarker > > > Sent: 31 March 2021 08:07 > > > To: Birrane, Edward J.; dtn@ietf.org > > > Cc: Magnus Westerlund > > > Subject: Re: [dtn] AD review of draft-ietf-dtn-bpsec-default- > > sc-02 > > > > > > Hi Edward, > > > > > > Thanks for the update. The -03 version addresses most of the > > comments and > > > concerns. > > > > > > See my further comments inline below with [ZS]. > > > > > > BR > > > Zahed > > > > > > On 2021-03-29, 05:43, "Birrane, Edward J." > > <Edward.Birrane@jhuapl.edu> > > > wrote: > > > > > > > > > > * It would be good for the user of this document to > > capture the reason > > > > behind selecting HMAC-SHA and AES-GCM in respective > > overview section > > > > (section 3.1 and section 4.1). > > > > > > C3: Agreed. I have added reasons for selection in 3.1 and > > 4.1 in the -03 > > > version. > > > > > > [ZS] Thanks, this is a good addition. > > > > > > In section 4.1 : > > > > > > The BCB-AES-GCM security context shall have the security context > > > identifier specified in Section 5.1. > > > > > > is this "shall" should be a "MUST" as described in Section 3.1? > > > > > > > > > > * Section 3.3.2 and Section 3.5 : > > > > It seems like some sort of key-id might be required to > > resolve > > > > this. The BPsec does not define any generic key-id and it > > is neither > > > defined > > > > here. It might become an issue for interoperability. > > > > > > C5: Agreed this might become an issue for interoperability. > > For example, if > > > the policies for requiring security operations differ on > > different nodes there > > > may be interop problems. Similarly, if the policies for key > > > generation/communication differ on different nodes, there may be > > interop > > > problems. The DTNWG consensus was this limitation is appropriate > > for now > > > for this default security context and the DTN WG is looking to > > determine > > > delay-tolerant key management strategies in the future. > > > > > > [ZS] Ok, is this consensus documented somewhere? Meeting notes > > or email > > > thread or whatever? > > > > > > > > > > > > > * Section 4.3.2 : > > > > Does this "security policy" refers to local security > > policy? > > > > > > C15: Yes. Security policy at the source, verifier, or > > acceptor is meant to > > > imply the local security policy at the node. > > > > > > [ZS] Ok, then clearly stating that helps. It was clearly mention > > in the other > > > place(s). > > > > > > > > > > * Section 6.3 > > > > > > > > To me this security considerations for fragmentation > > belongs to BPsec > > > as > > > > the main technical issues on fragmentation are described > > there. > > > > > > C17: I would support removing the fragmentation section from > > this > > > document and including it in some other broader-scoped document > > on DTN > > > security, though perhaps not the BPSec document itself because > > the issues > > > with fragmentation can extend beyond the insertion and handling > > of security > > > blocks. > > > > > > [ZS] I don't think removing the fragmentation section from this > > document to > > > some other document actually helps. This is a very important > > aspect of the > > > security context and I think it is better to be decisive about > > it now. If moved > > > to BPSec then other documents , specially security context > > documentation, > > > can just refer to it. The question really is, where does it make > > more sense put > > > there it is in line with the context of the content of the > > document? Right now > > > I see that is BPsec. > > > > > > > > > > I would also like to draw attention to the SECART review > > (Thanks to the > > > > SECART team and Christian Huitema) proposing test vectors > > to mitigate > > > > interoperability issue pointed out by the reviewer. This > > seems like a good > > > > proposal to include in this specification. > > > > > > > > > C18: Agreed and grateful for the review! As mentioned in my > > comments to > > > the SECART review and similar to C17 above, I think that example > > encodings > > > are a very useful concept, but would ultimately be useful at > > showing bundle > > > structure and security block structure. Rather than repeating > > such encodings > > > in all future security context documents, I propose the DTN WG > > consider the > > > best way to produce this broader-scope documentation. > > > > > > [ZS] I see the test vectors related to the applicability of the > > this document > > > hence this need to be considered well. Failing to assure > > interoperability > > > actually undermine the intention of this document, hence any > > tools to help > > > achieving that goal is worth putting effort into. Also we need > > to make sure > > > the test vector is actually usable by more than one > > implementation. I would > > > be happy if DTN WG comes up with a best way forward here. > > > > > > > > > > > > _______________________________________________ > > > dtn mailing list > > > dtn@ietf.org > > > https://www.ietf.org/mailman/listinfo/dtn > >
- [dtn] AD review of draft-ietf-dtn-bpsec-default-s… Zaheduzzaman Sarker
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Birrane, Edward J.
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Zaheduzzaman Sarker
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Brian Sipos
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Rick Taylor
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Zaheduzzaman Sarker
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Rick Taylor
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Birrane, Edward J.
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Birrane, Edward J.
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Martin Duke
- Re: [dtn] AD review of draft-ietf-dtn-bpsec-defau… Mehmet Adalier
- Re: [dtn] [EXT] Re: AD review of draft-ietf-dtn-b… Birrane, Edward J.
- Re: [dtn] [EXT] Re: AD review of draft-ietf-dtn-b… R. Atkinson
- Re: [dtn] [EXT] Re: AD review of draft-ietf-dtn-b… Martin Duke
- Re: [dtn] [EXT] Re: AD review of draft-ietf-dtn-b… Birrane, Edward J.
- Re: [dtn] [EXT] Re: AD review of draft-ietf-dtn-b… Martin Duke
- Re: [dtn] [EXT] Re: AD review of draft-ietf-dtn-b… Birrane, Edward J.
- Re: [dtn] [EXT] Re: AD review of draft-ietf-dtn-b… Martin Duke
- Re: [dtn] [EXT] Re: AD review of draft-ietf-dtn-b… Zaheduzzaman Sarker