Re: [Hipsec] Status of WG items

Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com> Fri, 21 September 2012 08:11 UTC

Return-Path: <gonzalo.camarillo@ericsson.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9CB421F86E3 for <hipsec@ietfa.amsl.com>; Fri, 21 Sep 2012 01:11:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.239
X-Spam-Level:
X-Spam-Status: No, score=-106.239 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, HELO_EQ_SE=0.35, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hUkVNHjOh00d for <hipsec@ietfa.amsl.com>; Fri, 21 Sep 2012 01:11:49 -0700 (PDT)
Received: from mailgw1.ericsson.se (mailgw1.ericsson.se [193.180.251.45]) by ietfa.amsl.com (Postfix) with ESMTP id 99E9E21F8694 for <hipsec@ietf.org>; Fri, 21 Sep 2012 01:11:48 -0700 (PDT)
X-AuditID: c1b4fb2d-b7fea6d000002ccb-71-505c214006ac
Received: from esessmw0247.eemea.ericsson.se (Unknown_Domain [153.88.253.125]) by mailgw1.ericsson.se (Symantec Mail Security) with SMTP id EB.EC.11467.0412C505; Fri, 21 Sep 2012 10:11:44 +0200 (CEST)
Received: from [131.160.36.124] (153.88.115.8) by esessmw0247.eemea.ericsson.se (153.88.115.94) with Microsoft SMTP Server id 8.3.264.1; Fri, 21 Sep 2012 10:11:44 +0200
Message-ID: <505C213F.6050701@ericsson.com>
Date: Fri, 21 Sep 2012 11:11:43 +0300
From: Gonzalo Camarillo <Gonzalo.Camarillo@ericsson.com>
User-Agent: Mozilla/5.0 (Windows NT 6.0; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
MIME-Version: 1.0
To: Julien Laganier <julien.ietf@gmail.com>
References: <4FE96F9F.3090800@ericsson.com> <758141CC3D829043A8C3164DD3D593EA1BD324E110@XCH-NW-16V.nw.nos.boeing.com> <4FEA1876.900@cs.rwth-aachen.de> <CAE_dhjveQ6WVVE3BVKk2txfBxNhfWvjbz+QVU2P919dNZ1WO4A@mail.gmail.com> <5012C05B.6080203@nomadiclab.com> <CAE_dhjufW+ic-VaBtqs787jK=xxy_XxnegpgGEtmpjZHsmJ4nA@mail.gmail.com>
In-Reply-To: <CAE_dhjufW+ic-VaBtqs787jK=xxy_XxnegpgGEtmpjZHsmJ4nA@mail.gmail.com>
X-Enigmail-Version: 1.4.4
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrKLMWRmVeSWpSXmKPExsUyM+Jvra6DYkyAwcw9RhZtb36xWUxdNJnZ 4svRacwOzB47Z91l91iy5CeTR+ei6ADmKC6blNSczLLUIn27BK6MVz03WAv2Cle0b+5hbWC8 yd/FyMkhIWAiseLwNRYIW0ziwr31bF2MXBxCAqcYJV58+MkK4axhlOiesZC9i5GDg1dAW2LV 1gqQBhYBVYkHU3azgdhsAhYSW27dBxskKhAscW7jNrA4r4CgxMmZT8DiIkCtpyY1gNnMAiES dzfcZwKxhQU0JK6/+QG16xCTxIG+LkaQXZwCgRK7J5ZAHCcp8WbyTahePYkpV1sYIWx5ie1v 5zCD2EJA85c/a2GZwCg0C8nqWUhaZiFpWcDIvIpRODcxMye93FAvtSgzubg4P0+vOHUTIzCo D275rbuD8dQ5kUOM0hwsSuK8XEn7/YUE0hNLUrNTUwtSi+KLSnNSiw8xMnFwSjUw2it4VZ0S aFO/63/7G4Nj0aqJ9/e2SWx95ZxfddNYxsjI9PHme8KFWs38TxbGit832cvf8K+gcs3EO7v8 9WdUJYuHvZtTV5HP+VzzrsmhFLm0h1O6Lf89OZepESro+jl9c3HuCr13HBv3WryXfDyrewfv RasVZioblVfpd9ZNYGNYkrW8f4KHEktxRqKhFnNRcSIAN7a+/zgCAAA=
Cc: "hipsec@ietf.org" <hipsec@ietf.org>
Subject: Re: [Hipsec] Status of WG items
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Sep 2012 08:11:50 -0000

Hi Julien,

my take on this is that we need to produce a standards-track document
specifying exactly that. This is what our charter says about it:

https://datatracker.ietf.org/wg/hip/charter/

> o Specify in a standards track RFC how to carry certificates in the
> base exchange. This was removed from the base HIP spec so that the
> mechanism is specified in a stand-alone spec.

Cheers,

Gonzalo

On 21/09/2012 2:49 AM, Julien Laganier wrote:
> On Fri, Jul 27, 2012 at 9:22 AM, Ari Keranen <ari.keranen@nomadiclab.com> wrote:
>> Hi Julien,
>>
>>
>> On 7/6/12 3:37 AM, Julien Laganier wrote:
>>>
>>> - 5203bis (registration) can IMHO be republished as is as I haven't
>>> seen any issue with the original version. If people agree I could
>>> republish it and we could WGLC it...
>>
>>
>> I posted some comments about 5203bis earlier this year but back then there
>> was no discussion regarding them. So, here goes again.
>>
>> Some of these have been discussed also earlier on this list (these relate to
>> requirements discovered with the native NAT traversal draft [1]), but I'll
>> have them all here for easier reference.
>>
>> Currently, the registrar has no way of indicating that it would otherwise
>> accept the registration, but it's currently running low on resources. For
>> this purpose, a failure type "Insufficient resources" could be added to the
>> "registration failure types".
>>
>> Registration using authentication with certificates could be part of the
>> registration RFC. Currently, only authentication with HI is defined, but
>> knowing all HIs beforehand is not practical in many cases.
>>
>> Text in section 3.2. of [1] could be used as a basis for this (just replace
>> "HIP' data relay" with "registrar"). Also, if this authentication mode is
>> added to the draft, failure type "Invalid certificate" should be added for
>> the failure case.
>>
>> Should we have these in the registration draft?
>>
>> [1] http://tools.ietf.org/html/draft-ietf-hip-native-nat-traversal
> 
> I was going to shamelessly copy/paste section 3.2 of [1] in the
> registration draft but I noticed that [1] actually has a normative
> dependency on RFC 6253 "Host Identity Protocol Certificates" which is
> Experimental. Thus adding the support for certificates to a standard
> track HIP registration would cause a so-called downref which could be
> problematic...
> 
> Gonzalo - what is your take on this?
> 
> --julien
>