[dtn] AD review of draft-ietf-dtn-bpsec-default-sc-02

Zaheduzzaman Sarker <zaheduzzaman.sarker@ericsson.com> Mon, 22 March 2021 20:42 UTC

Return-Path: <zaheduzzaman.sarker@ericsson.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF7723A10BE for <dtn@ietfa.amsl.com>; Mon, 22 Mar 2021 13:42:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.452
X-Spam-Level:
X-Spam-Status: No, score=-0.452 tagged_above=-999 required=5 tests=[DKIMWL_WL_HIGH=-0.251, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QrEJVZcm2Xnw for <dtn@ietfa.amsl.com>; Mon, 22 Mar 2021 13:42:27 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-eopbgr140079.outbound.protection.outlook.com [40.107.14.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B4B33A10BC for <dtn@ietf.org>; Mon, 22 Mar 2021 13:42:26 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FzoPYGcS7OKCS3MX5OeoMrajCChYN/qAenXPMMN7A2rpAtU08SGHEzUAZIaQCyEm8fcPAUSK3KvW/S9v0TfcTxGOzpJyDIT++aINDyi1xLHXXO8YRbLa6qwQpl5eGs3qNNGEvOZket7vWUUnjWNJkDcnbOu0Wi0f2JCdWDRm40XZ2vAnlCivpslNZCVUzdTZRHJeV/m/KxHlrlpheJzKqvFERm92riYa9k4Yc9gm/zhS6w5NVCM3bGNmw70a9QhJlqrgJV5DqWFRjZMaK/6RajF5u2Yd12osNnW662OH4ZcI4HKpuXtMfKKIkFbl68cXbewgnCY2HaFwIaMpt+B/8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9Mz8HqlIKHqLt+x6ftkREh5UkZk2X3qWIUqOTZj2lig=; b=HSsrnOWVsQTtlIvXLwhJEEVQA1WcivV4E5o8F5zE9sdp1slfKdSdKtPHK4eXHrs+7MXIyGjVauJm49Cg1vLdzulJ0jU8WLknRxTExGwznaYDFrJVgmUUBBOLDX/syLAYw9tgWuI/SMMoQ312vMQ06RtU7D+gtuashj2STh3hUHIqYtexRMwapD5YWgqCaXeNBTY8waw2aPioIbbFa7LX/XMXF/abCpnwW2HwECzMiitvjLa/Lor+uHa6YmKGkmE4ZOmtVcLv3qLPZ2S0T55tpNru2TusA4Laq0dfmGArSKxQ0fZ0hO0tEtB4HV1gmp/CUeIq5iqg+ZfzLLSEMDM3ew==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9Mz8HqlIKHqLt+x6ftkREh5UkZk2X3qWIUqOTZj2lig=; b=UMi5Sp6AE2UV6AW1xW1CiumaqZTKlFYGiZh9aCCnvEns0oVMjcs6WzqjHAhbxjm5RorjN3K+0JrIxYTfmE4DlBFgq6bpj3cWJZhadxFpAMHoHSC4jgovP3jCkCCE5nY7Ic5TgvN/RMkwxZvr9cw4I+SqOQEKJbFNEXKjdsEgDrI=
Received: from HE1PR07MB4187.eurprd07.prod.outlook.com (2603:10a6:7:98::23) by HE1PR07MB3467.eurprd07.prod.outlook.com (2603:10a6:7:39::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.10; Mon, 22 Mar 2021 20:42:20 +0000
Received: from HE1PR07MB4187.eurprd07.prod.outlook.com ([fe80::9496:1cb2:ad7f:1c14]) by HE1PR07MB4187.eurprd07.prod.outlook.com ([fe80::9496:1cb2:ad7f:1c14%5]) with mapi id 15.20.3977.022; Mon, 22 Mar 2021 20:42:20 +0000
From: Zaheduzzaman Sarker <zaheduzzaman.sarker@ericsson.com>
To: "dtn@ietf.org" <dtn@ietf.org>
CC: Magnus Westerlund <magnus.westerlund@ericsson.com>
Thread-Topic: AD review of draft-ietf-dtn-bpsec-default-sc-02
Thread-Index: AQHXH1vax7LWSJVgGEW7LhnHV51gYQ==
Date: Mon, 22 Mar 2021 20:42:20 +0000
Message-ID: <EAF9AEEC-B28E-48AC-BE47-1DAD6FA3609B@ericsson.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.47.21031401
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [85.238.211.27]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b33f9e95-4572-42b8-f1ed-08d8ed72fd4c
x-ms-traffictypediagnostic: HE1PR07MB3467:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR07MB34679CBFA3E17BC0BAAF0C929F659@HE1PR07MB3467.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR07MB4187.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(136003)(366004)(376002)(39860400002)(346002)(186003)(8936002)(2906002)(44832011)(8676002)(6512007)(316002)(4326008)(86362001)(83380400001)(6486002)(107886003)(71200400001)(66946007)(26005)(66476007)(2616005)(478600001)(5660300002)(38100700001)(64756008)(76116006)(66446008)(66556008)(36756003)(6916009)(6506007)(33656002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <0ACFC170B3A703429B4175B51CB353F2@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR07MB4187.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b33f9e95-4572-42b8-f1ed-08d8ed72fd4c
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2021 20:42:20.3081 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 5WNyQ3LTYawOC1FadoJpHO1PZBccofAA+ZYsz4POk14on4oWh9/dUEPFP/pqPSK1iRtu7ac4T5kHYFtTIXGAXV4h1s72yX8o8ru3QB6ENJnLBvRYYPStcbQJpv+vOyYH
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3467
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/xQv7k3rhkA3kYdT7MvXLhISilLc>
Subject: [dtn] AD review of draft-ietf-dtn-bpsec-default-sc-02
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Mar 2021 20:42:32 -0000

Hi,

Thanks for the work done to specify the default security context for BPsec. As I understand this specification is important for interoperability of BPsec.

I found this document easy to read and carefully written. However, I have found number of cases those need clarifications and fix nits. Please see below –

* Abstract :
    The BPsec specification says -

  	"To ensure interoperability among various implementations, all BPSec
  	 implementations MUST support at least the current IETF standards-
   	track mandatory security context(s).  As of this writing, that BCP
   	mandatory security context is specified in
    	[I-D.ietf-dtn-bpsec-default-sc], but the mandatory security
    	context(s) might change over time in accordance with usual IETF
    	processes.  Such changes are likely to occur in the future if/when
   	flaws are discovered in the applicable cryptographic algorithms, for
    	example.".

   This makes the default SC is a MUST to implement for interoperability. However, the abstract writes

   	"These security contexts may be used for
   	both testing the interoperability of BPSec implementations and for
   	providing basic security operations when no other security contexts
   	are defined or otherwise required for a network. "

    I would suggest to replace "may be" with "intended to be".

* Terminology :
     Section 4.6 : please check in normative text are correctly following RFC8174.
     Section 6.1 : please check in normative text are correctly following RFC8174.

* It would be good for the user of this document to capture the reason behind selecting HMAC-SHA and AES-GCM in respective overview section (section 3.1 and section 4.1).

* Section 3.1 :
	These variants correspond
	to HMAC256-SHA256, HMAC384-SHA384, and HMAC512-SHA512 as defined in
	[RFC8152] Table 7: HMAC Algorithm Values.

      Names does not match table names in RFC8152. I understand it might be desirable to use the longer form that makes it clear that this is SHA256/384/512 version of HMAC. However, in that case I think an explicit mapping needs to occur in this document.

      Again the name does not match how it is written in section 3.1 and 3.3.1.

* Section 3.3.2 and Section 3.5 :
    I foresee some issues here about key management i.e., picking up the correct key. The assumption here is that the key management will able to figure out the correct key to be used. However, in many key management functions (BPsec does not specify any) one will derive specific keys, use them and replace them later. This means there are chances that different keys will be available over time in the nodes. How do you identify the correct key in such a scenario, especially when the key is derived from the material carried in the BIB?   It seems like some sort of key-id might be required to resolve this. The BPsec does not define any generic key-id and it is neither defined here. It might become an issue for interoperability.

* Section 3.3.3:
   Two aspects here -
    1. Why are so many bits used for flags? I tried to back track it to BPsec and BP documents but I am not sure I found what I was looking for.
    2. if the plan here is to assign in future (bits 8-15) then an procedure need to be in place to assign them (even in an abstract form). The future assignment will also impact 3.3.6 and 3.7 as the unknow bits will lead to failure as the flag value is part of the IPPT and receiver does not know what to add based on the bits. What is the thinking here?

* Section 3.3.4:
    I would suggest to add a reference to BPsec 3.1 here.
    Nit: ID 1 should have default value 6, or if the intention here is to use SHA256 then it should be 5 instead (as mentioned in the early SECART review).

* Section 3.6 :
     Is there any particular reason for defining the flag bits in the order  - primary block flag, target header flag and security header flag but for canonical form process the order is primary block flag, security header flag and target header flag?

    Nit: in the process description text "flag" is written in both uppercase and lower case.


* Section 3.7.1 :
	Any local flags used to generate the IPPT SHOULD be placed in the
     	 Integrity Scope flags security parameter for the BIB unless these
     	 flags are expected to be correctly configured at security
      	verifiers and acceptors in the network.

    I assume that security acceptor and verifiers will have to use the actual value provided in the Integrity scope flags unless they are correctly configured. This sounds like the local flags used to generate the IPPT MUST be placed in the Integrity Scope flags. Is there any reason why this is SHOULD not a MUST?

* Section 3.7.2 :
      This section should also say any error on verification should result in failure. Something similar to the text in the section 4.8.2

* Section 4 :
     Several of above mentioned issues are also applicable to subsections of section 4.

* Section 4.3.2 :

	When not provided, implementations SHOULD assume a value of 3
   	(indicating use of A256GCM), unless an alternate default is
   	established by security policy at the security source, verifier, or
   	acceptor of this integrity service.

     Does this "security policy" refers to local security policy?

* Section 5:
      As mentioned before registries for Scope flags will be necessary.

* Section 6.3

     To me this security considerations for fragmentation belongs to BPsec as the main technical issues on fragmentation are described there.


I would also like to draw attention to the SECART review (Thanks to the SECART team and Christian Huitema) proposing test vectors to mitigate interoperability issue pointed out by the reviewer. This seems like a good proposal to include in this specification.

Many thanks!!

Zahed