Re: [Gen-art] Gen-ART review of draft-ietf-mpls-gach-adv-06

Stewart Bryant <stbryant@cisco.com> Fri, 26 April 2013 17:44 UTC

Return-Path: <stbryant@cisco.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8AB3121F9841 for <gen-art@ietfa.amsl.com>; Fri, 26 Apr 2013 10:44:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level:
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k8f+Xn9wIkmt for <gen-art@ietfa.amsl.com>; Fri, 26 Apr 2013 10:44:22 -0700 (PDT)
Received: from ams-iport-2.cisco.com (ams-iport-2.cisco.com [144.254.224.141]) by ietfa.amsl.com (Postfix) with ESMTP id 58D0621F95EE for <gen-art@ietf.org>; Fri, 26 Apr 2013 10:44:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=19052; q=dns/txt; s=iport; t=1366998261; x=1368207861; h=message-id:date:from:reply-to:mime-version:to:cc:subject: references:in-reply-to; bh=WnALQ6KjODEQxO1l5v91EGPQ+q6LRoAQJ5xvD+MLkVg=; b=YxmH3VsShFx+M5l5Fr9syKWdFTR3Ga0U2mVNLtAPqkr0xEd2iUxflCZC 7MyQ6RQEpxDb1uRk1GD/kqAY2iS72P5y5/JsbKNsviIxnWfooqN3zjQp3 t9Fvj7GmWDnKm1ehoqbo54gyzy2oE3OgHd4+cjIwGmmtF+g4i6V+6L9yD 0=;
X-IronPort-AV: E=Sophos; i="4.87,559,1363132800"; d="scan'208,217"; a="82239975"
Received: from ams-core-4.cisco.com ([144.254.72.77]) by ams-iport-2.cisco.com with ESMTP; 26 Apr 2013 17:44:20 +0000
Received: from cisco.com (mrwint.cisco.com [64.103.70.36]) by ams-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id r3QHiIvM000411 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 26 Apr 2013 17:44:18 GMT
Received: from [IPv6:::1] (localhost [127.0.0.1]) by cisco.com (8.14.4+Sun/8.8.8) with ESMTP id r3QHiHix004724; Fri, 26 Apr 2013 18:44:17 +0100 (BST)
Message-ID: <517ABCF0.2080701@cisco.com>
Date: Fri, 26 Apr 2013 18:44:16 +0100
From: Stewart Bryant <stbryant@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:17.0) Gecko/20130328 Thunderbird/17.0.5
MIME-Version: 1.0
To: Martin Thomson <martin.thomson@gmail.com>
References: <CABkgnnW-53MVHZaW4QweqBjrPGCrP=fCNQ+LJdaG__ePh2tn1A@mail.gmail.com> <CABkgnnXOcDRkp=6e8aDdhTbk+s=hkR2wCkXoJcWGn8sjrRi2cg@mail.gmail.com>
In-Reply-To: <CABkgnnXOcDRkp=6e8aDdhTbk+s=hkR2wCkXoJcWGn8sjrRi2cg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------050306080307000809070800"
Cc: "Bocci, Matthew (Matthew)" <matthew.bocci@alcatel-lucent.com>, "gen-art@ietf.org" <gen-art@ietf.org>, danfrost@cisco.com, draft-ietf-mpls-gach-adv.all@tools.ietf.org, sec-ads@tools.ietf.org
Subject: Re: [Gen-art] Gen-ART review of draft-ietf-mpls-gach-adv-06
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: stbryant@cisco.com
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/gen-art>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Apr 2013 17:44:23 -0000

Including Sec ADs as this involves a change to the Authentication section.

Section 6.3 now says

The HMAC proceedure described in [RFC2104] is used to compute the hash.
The hash is computed over the entire GAP message as shown in Fig1.
The length of the Authentication Data field is always less than or equal
to the message digest size of the specific hash function that is being
used, however the implementer needs to consider that although this
decreases the size of the message, it results in a corresponding
reduction in the strength of the assurance provided.
Hash truncation is not RECOMMENDED.

I will address any other security issues in another editing pass and
respond to their Discuss email.


On 10/03/2013 17:52, Martin Thomson wrote:
> I sent the following review a few weeks back.  I just wanted to make 
> sure that it didn't get accidentally stored in /dev/null.
>
>
> On 15 February 2013 14:33, Martin Thomson <martin.thomson@gmail.com 
> <mailto:martin.thomson@gmail.com>> wrote:
>
>     I am the assigned Gen-ART reviewer for this draft. For background on
>     Gen-ART, please see the FAQ at
>
>     <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.
>
>     Please resolve these comments along with any other Last Call comments
>     you may receive.
>
>     Document: draft-ietf-mpls-gach-adv-06
>     Reviewer: Martin Thomson
>     Review Date: 2013-02-15
>     IETF LC End Date: 2013-02-27
>     IESG Telechat date: (if known)
>
>     Summary: The document is almost ready for publication as proposed
>     standard.  There is a major issue that should be easy to resolve.
>
>     Major issues:
>
>     Section 6.3 duplicates the description of HMAC provided in RFC 2104.
>     That is likely to cause a bug.
>
>     If you reference RFC 2104, then the only requirement is a clear
>     specification for what message is input to the HMAC.  Currently, this
>     is buried.  It is unclear if the input includes the G-ACh header
>     defined in RFC 5586 (it doesn't need to, but this needs to be made
>     explicit).
>
>     Filling the authentication part with 0x878FE1F3 seems unnecessary busy
>     work, but it's harmless as long as the hash function produces a
>     multiple of 32 bits of output.
>

All done please see above.
>
>
>     Minor issues:
>
>     To avoid forward compatibility issues, reserved fields should come
>     with guidance that says: "Implementations of this protocol version
>     MUST set reserved fields to all zero bits when sending and ignore any
>     value when receiving messages."
>
The following was added just before Fig 1

Implementations of this protocol version MUST set reserved fields in the
message formats that follow, to all zero bits when sending and ignore
any value when receiving messages.

I feel that we should just write an update to RFC2119 to automatically
include this or add it to the standard boiler plate.



>     In Section 4.4, how does the duration interact with the lifetime?
>     What happens when the duration is longer than lifetime such that the
>     TLV is expunged before the duration is up?
>
The TLV would be deleted (per procedure) at its death date, and
would not be sent again until at least duration has expired. This would
be silly if the receiver wanted that TLV, but entirely reasonable
if it dis not care about the TLV.

>
>     Section 5.2 states:
>        [...] If one
>        of the received TLV objects has the same Type as a previously
>        received TLV then the data from the new object SHALL replace
>     the data
>        associated with that Type unless the X specification dictates a
>        different behavior.
>
>     This leads to different retention characteristics depending on some
>     arbitrary application-specific requirements.  It also complicates
>     implementations.  Is there a strong motivation for the "unless the X
>     specification dictates a different behavior" part of this statement?
>
One can imagine alternative behaviors such as maintaining a list of
received values. Our goal was not to prejudge the application.

>
>     If this behaviour is desirable, a note regarding what happens to the
>     composed TLV when some of the values that contribute to it might
>     expire might be necessary.
>
The behaviour described is the action of the data and not of the TLV that
it arrived in, so I don't think the problem you refer to can occur.

>
>     Regarding the last paragraph of Section 6.3:
>               This also means that the use of hash functions with larger
>               output sizes will increase the size of the GAP message as
>               transmitted on the wire.
>
>     If you want to prevent hash truncation, then use 'MUST'.  Personally,
>     I see no reason to do so.  It's a good way to get smaller messages,
>     with a corresponding reduction in the strength of the assurance
>     provided.
>
Please see new text above.

>
>     Nits:
>
>     Section 3 could use some subheadings to aid navigation (and
>     referencing).
>
Done
>
>     Section 3 describes the size of fields only through ASCII-art.  It's a
>     fairly simple thing to add a bit count to the description of each
>     field.  That includes the reserved fields, which have no descriptions.
>
Done
>
>
>     I like the text in the editors note on page 8.  Why is it not the
>     actual text already?
>
That was a hang over from AD review that was already addressed in the
text. The note has been removed.
>
>
>     Sections 4.2 and 4.3 could probably use a note that notes that
>     retention of these TLVs doesn't make any sense.  These could be sent
>     with zero lifetime, except that if these are sent along with the
>     Source Address TLV, that's not possible... unless you send multiple
>     application data blocks for the same application.  Is that possible?
>
>
I have added the following text in each case:

It is not necessary to retain this TLV.

Thanks for the review

Stewart