Re: [Hipsec] review of RFC4423-bis

Robert Moskowitz <rgm@htt-consult.com> Thu, 27 September 2012 13:07 UTC

Return-Path: <rgm@htt-consult.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 577D321F8504 for <hipsec@ietfa.amsl.com>; Thu, 27 Sep 2012 06:07:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.562
X-Spam-Level:
X-Spam-Status: No, score=-2.562 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HzTIk-AoprsN for <hipsec@ietfa.amsl.com>; Thu, 27 Sep 2012 06:07:39 -0700 (PDT)
Received: from klovia.htt-consult.com (klovia.htt-consult.com [208.83.67.149]) by ietfa.amsl.com (Postfix) with ESMTP id 3F25A21F844F for <hipsec@ietf.org>; Thu, 27 Sep 2012 06:07:39 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by klovia.htt-consult.com (Postfix) with ESMTP id EFF9462A8C; Thu, 27 Sep 2012 13:07:10 +0000 (UTC)
X-Virus-Scanned: amavisd-new at localhost
Received: from klovia.htt-consult.com ([127.0.0.1]) by localhost (klovia.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ezoPmm7rBHp2; Thu, 27 Sep 2012 09:06:51 -0400 (EDT)
Received: from lx120e.htt-consult.com (nc4010.htt-consult.com [208.83.67.156]) (Authenticated sender: rgm@htt-consult.com) by klovia.htt-consult.com (Postfix) with ESMTPSA id 9877162A66; Thu, 27 Sep 2012 09:06:50 -0400 (EDT)
Message-ID: <50644F67.7060000@htt-consult.com>
Date: Thu, 27 Sep 2012 09:06:47 -0400
From: Robert Moskowitz <rgm@htt-consult.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:15.0) Gecko/20120827 Thunderbird/15.0
MIME-Version: 1.0
To: "Henderson, Thomas R" <thomas.r.henderson@boeing.com>
References: <758141CC3D829043A8C3164DD3D593EA2E4C38C07D@XCH-NW-16V.nw.nos.boeing.com>
In-Reply-To: <758141CC3D829043A8C3164DD3D593EA2E4C38C07D@XCH-NW-16V.nw.nos.boeing.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: HIP WG <hipsec@ietf.org>
Subject: Re: [Hipsec] review of RFC4423-bis
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Sep 2012 13:07:40 -0000

Great review.  Thank you.  Just some quick notes (Hoiidays through Oct 
11 and I only have a few work hours until then and I got kicked out of 
my office as it is also a guest room; working in my NOC).

On 09/27/2012 12:27 AM, Henderson, Thomas R wrote:
> I had another read through of http://datatracker.ietf.org/doc/draft-ietf-hip-rfc4423-bis/
>
> I think it is nearly ready to publish; the main substantive comments that I have are:
>
> 1) Section 13 (Changes from RFC 4423) is incomplete as written; it should either be completed or deleted

What did I miss?  :)  Problem is I did it after changes and I am not 
good at remembering all I changed :(  So if you can help me, great. If 
the concensus is to delete it, I gladly will.

>
> 2) it would be nice to describe how host identifiers are intended to be revoked/replaced over time.  However, the current text in Section 1 seems to be restrictive in this regard (more on this below).

Can add a few words here.  It is almost an anything goes within a 
framework.  A sensor will probably never get its HI revoked/replaced.  
Running out of counter is a good reason to r/r, or just on general 
principles.

>
> 3) it would be nice to go into a bit more detail of how HIP relates to multicast

And I am NOT well versed on multicast and would need help here. 
Basically we can have HIs for multicast, but what do we have in a 
multicast KMP?  I guess I should read the RFC again!

>
> Regarding whether it should be published as Informational or PS RFC, I don't have a strong opinion.  I guess I would lean towards Informational since it is not normative specification, but I would yield to whatever is best current practice in the IETF for documents such as these.

Same here.  These sorts of RFCs have traditionally been informational.  
Don't know what the current IESG position is.

>
> - Tom
>
> Detailed comments below:
>
>
> Section 1 (Introduction)
>
>> There is exactly one Host Identifier for each Host Identity.
> This document does not talk about replacing Host Identifiers over time; should it?  Also, couldn't multiple keys be associated with the same Identity (computing stack)?  I wonder whether this statement is too restrictive, especially since one can imagine times in which keys are replaced and two Host Identifiers may be active at the same time.
>
> Section 2 (Terminology)
>
>> (Public key)  Used as a publicly known identifier for cryptographic identity authentication.
> Does it need to be publicly known?  See later "Unpublished Host Identifier" definition.   Suggest "(typically publicly known)" instead.
>
> Section 3 (Background)
>
>> IP numbers
> suggest "IP addresses" instead (many places in this section)
>
> Section 4 (Host Identity namespace)
>
>> As will be specified in the Host Identity Protocol Base EXchange (BEX) [RFC5201-bis] specification
> Suggest instead:  "As specified in the Host Identity Protocol [RFC5201-bis] specification
>
> Section 4.1 (Host Identifiers)
>
>>     The actual Host Identities are never directly used in any Internet protocols.
> I believe that this should instead be Identifier (Identities are abstract).
>
> Section 4.2 (Host Identity Hash)
>
>> It is possible to for the two Hosts in the HIP exchange to use different hashes.
> Suggest "It is possible for the two hosts..."
>
> Section 4.3 (Host Identity Tag)
>
> s/perfers/prefers
>
> Section 5 (New stack architecture)
>
>> As discussed above, the IP addresses can be seen to be a confounding of routing direction vectors and interface names.
> Is it routing direction vectors, or endpoint (or stack) names?  Is "routing direction vector" terminology used elsewhere; if so, suggest to add a reference, if not, suggest to change to end-point names.
>
> Section 7 (HIP and ESP)
>
>> As adding a new naming layer allows one to potentially add a new forwarding layer (see Section 9, below), it is very important that the HIP provides mechanisms for middlebox authentication.
> Perhaps add reference to RFC 5207 here?
>
> s/consistant/consistent
>
>>   It should be noted that there are already BITW implementations.
> Perhaps a clarification here:  "It should be noted that there are already BITW implementations of HIP providing virtual private network (VPN) services."
>
> Section 10 (Multicast)
>
>>     Since its inception, a few studies have looked at how HIP might affect IP-layer or application-layer multicast.
> IMO, this section should be expanded with some more commentary about how HIP applies to multicast.  In particular, how amenable are multicast key management protocols and security associations to being able to leverage HIP?  Would HITs ever be put into source or destination address fields of multicast datagrams?
>
> Section 13 (Changes from RFC 4423)
>
> This section is not yet completed.  Either complete or delete.
>
> Section 14 (Security considerations)
>
>> There are more details on this process in the Host Identity Protocol under development.
> Suggest to strike "under development" since the HIP protocol has now been developed.
>
>> There has been no attempt to develop a secure method to issue the HIT revocation notice.
> This is no longer true due to draft-irtf-hiprg-revocation-05; suggest to rephrase.
>
>
>
>
>
>
>
> _______________________________________________
> Hipsec mailing list
> Hipsec@ietf.org
> https://www.ietf.org/mailman/listinfo/hipsec
>