Re: [Hipsec] WGLC: draft-ietf-hip-native-nat-traversal

Miika Komu <miika.komu@ericsson.com> Mon, 22 February 2016 15:30 UTC

Return-Path: <miika.komu@ericsson.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8178A1B36CD for <hipsec@ietfa.amsl.com>; Mon, 22 Feb 2016 07:30:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.5
X-Spam-Level:
X-Spam-Status: No, score=-2.5 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WI0BuyRCkVV2 for <hipsec@ietfa.amsl.com>; Mon, 22 Feb 2016 07:30:42 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B5611B36C5 for <hipsec@ietf.org>; Mon, 22 Feb 2016 07:30:41 -0800 (PST)
X-AuditID: c1b4fb30-f79a76d000000a93-6a-56cb299f795e
Received: from ESESSHC022.ericsson.se (Unknown_Domain [153.88.183.84]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id E0.4A.02707.F992BC65; Mon, 22 Feb 2016 16:30:39 +0100 (CET)
Received: from [153.88.190.38] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.86) with Microsoft SMTP Server id 14.3.248.2; Mon, 22 Feb 2016 16:30:38 +0100
To: Ari Keränen <ari.keranen@ericsson.com>, hipsec@ietf.org
References: <56AB5BCD.7060803@ericsson.com> <56BE47BE.9070406@ericsson.com> <56C32BCC.9070105@ericsson.com>
From: Miika Komu <miika.komu@ericsson.com>
Organization: Ericsson AB
Message-ID: <56CB299E.5030704@ericsson.com>
Date: Mon, 22 Feb 2016 17:30:38 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1
MIME-Version: 1.0
In-Reply-To: <56C32BCC.9070105@ericsson.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms060802000806050904010600"
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrPLMWRmVeSWpSXmKPExsUyM2J7iO58zdNhBq9OKlhMXTSZ2YHRY8mS n0wBjFFcNimpOZllqUX6dglcGTPvHGAq6CqtON9zl6mBsSWli5GTQ0LAROLgyYfsELaYxIV7 69m6GLk4hAQOM0pMbetjgnBWM0pce9jCDFIlLGAvcXLfLaAODg4RAT+Jv0clQcJCArkStz4u ZgGxmQXUJJb92MkEYrMJaEmsunMdrJVfQFJiQ8NuMJtXQFuiYeF7VhCbRUBVomXiDbB6UYEI icOdXewQNYISJ2c+AZvJKaAj8eLWcmaQe5gFuhkl/u7tYga5QUhAReLiseAJjIKzkLTMQlY2 C+wmW4k7c3dD2doSyxa+hrKtJWb8OsgGYStKTOl+yA5hm0q8PvqREcI2lli27i/bAkaOVYyi xanFSbnpRkZ6qUWZycXF+Xl6eaklmxiBUXFwy2+DHYwvnzseYhTgYFTi4TXgPBUmxJpYVlyZ e4hRBWjOow2rLzBKseTl56UqifDWSZ0OE+JNSaysSi3Kjy8qzUktPsQozcGiJM672nl9mJBA emJJanZqakFqEUyWiYNTqoGxLPT1+9sysSIdskuv9ppXluzz+Jo87ff/99MNMqYpOTFb2LhN SDn+7PMbRVvxtcrfrnvILjUQ2N8yVf96zK3au/5n5I49nvrnQmdheOf0g+YnVB5KMl4841Xd 06WR6N0a01V8PfPT6x9WS1budt/ttEqAkeuspPWkTduvxGRx3Z/A6hSz5464EktxRqKhFnNR cSIAUBide5ICAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/hipsec/QgnZiO4VIgRZKYszNODLpG0ndHQ>
Cc: Jan Melen <jan.melen@ericsson.com>
Subject: Re: [Hipsec] WGLC: draft-ietf-hip-native-nat-traversal
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Feb 2016 15:30:44 -0000

Hi Ari,

below is more detailed list of the nits and also some technical comments 
about the protocol.

On 02/16/2016 04:01 PM, Ari Keränen wrote:
> On 12/02/16 22:59, Miika Komu wrote:
>> Hi,
>>
>> On 01/29/2016 02:32 PM, Gonzalo Camarillo wrote:
>>> Hi,
>>>
>>> I would like to start a WGLC on the following draft. This WGLC will end
>>> on February 12th:
>>>
>>> https://datatracker.ietf.org/doc/draft-ietf-hip-native-nat-traversal/
>>>
>>> Please, send your comments to this list.
>>
>> in general, the draft should have a short intro to the NAT traversal
>> procedure and re-introduce some terms even though it all is specified in
>> RFC5770. This would make the draft a bit easier to read. I have also
>> some other nits which I'll send a bit later.
>
> Thanks for the review Miika! Also Petri commented along the same lines.
> We'll add some intro text to the draft to address this.

 > 2.  Terminology

I would repeat some of the terms used in RFC5770. Particularly these 
would be useful:

* relayed address
* server reflexive candidate
* relayed candidate
* mapped address

They are used the text and it would be nice to make the draft a bit more 
self-explanatory.

I would also suggest to explain the ICE term "permission" here.

 > 3.  Protocol Description

I would suggest to add a small intro here of the entire process 
(registration, discovery of relay, base exchange, hole punching, ESP). A 
picture similar to figure 1 in RFC5770 would be nice.

 > 3.1.  Relay Registration

 > Section 3.3 at [I-D.ietf-hip-rfc5203-bis]), and the relay has

at -> in

 > 3.2.  Forwarding Rules and Permissions
 >
 > Permissions are not required for the connectivity checks, but if a
 > relayed address is selected to be used for data, the registered host
 > MUST send an UPDATE message [RFC7401] with a PEER_PERMISSION
 > parameter (see Section 4.2) with the address of the peer and the
 > outbound and inbound SPI values the host is using with this peer.

PEER_PERMISSION is not a part of RFC5770, why is it introduced here?

The description is missing also the destination where this message is to 
be sent (it is the relay).

 > 3.3.  Relaying UDP Encapsulated Data and Control Packets

 > When a host wants to send a HIP control packet (such as a
 > connectivity check packet) to a peer via the data relay, it MUST add

* wants -> intends (machines don't have a will, at least yet :)
* it -> ambiguous, should be "the host"
* via the *peer's* data relay, right? I mean both hosts may have their 
own data relays.

 > send it to the data relay's address.  The data relay MUST send the

address of the data relay of the peer (right?)

 > When a host wants to send a UDP encapsulated ESP packet to a peer via
 > the data relay, it MUST have an active permission at the data relay
 > for the peer with the outbound SPI value it is using.

*peer* data relay

 > The host MUST send the UDP encapsulated ESP packet to the data 
relay's address.

What host? Whose data relay?

* wants -> intends
* peer's data relay (right? please correct twice)

The third ("If the data relay..."), fourth (When a host) and fifth 
("When the data relay...") paragraphs appear a bit of 
redundant/overlapping, perhaps it is better to merge them together.

Please state the owner of the data relay (i.e. registered host) in all 
cases. The data relay only relays data traffic to one way (to the 
registered host), right?

 > 3.4.  Candidate Gathering

 > Gathering of candidates MAY also be performed like specified in

like -> as

 > 3.7.  Connectivity Check Pacing Negotiation

 > the check pacing negotiation -> the connectivity check pacing negotiation

 > 3.8.  Connectivity Checks

 > [RFC5770] but instead of STUN packets, the connectivity checks are

..., but instead of STUN packets,,,

 > checklist and start check transactions every Ta milliseconds as long

..start *to* check..

 > The UPDATE packets that acknowledge a
 > connectivity check requests MUST be sent from the same address that
 > received the check and to the same address where the check was
 > received from.

it would be easier to read this in singular form rather than plural:

An/Any UPDATE packet that acknowledges a connectivity check request MUST 
originate from the same address that
was used to receive the check and destined to the same address where the 
check was
received from.

(please note that I changed the wording a bit)

 > The acknowledgment UPDATE packets MUST contain a MAPPED_ADDRESS
 > parameter with the port, protocol, and IP address of the address
 > where the connectivity check request was received from.

same here:

An/Any acknowledgment UPDATE packet MUST...

 > If the controlling host
 > does not have any data to send, it SHOULD send an ICMP echo request

ICMPv6 inside the tunnel - right?

 > using the nominated pair to signal to the controlled host that it can

... in order to signal ...

 > stop checks and start using the nominated pair.  When the controlled
 > host receives the first ESP packet, it MUST select that pair for use
 > and send back an ESP packet to acknowledge a working candidate pair.
 > If the controlled host does not have any data to send, it SHOULD send
 > an ICMP echo request.

ICMPv6 inside the tunnel?

 > If the connectivity checks failed the hosts SHOULD notify each other
 > about the failure with a CONNECTIVITY_CHECKS_FAILED Notify Message
 > Type [RFC5770].

... failed, the hosts SHOULD ...

It would also worthwhile to explain how the connectivity end in the case 
of success, maybe through an example.

 > 3.9.  NAT Keepalives

 > To keep the NAT bindings towards the HIP relay server and the HIP
 > data relay alive, if a registered host has not sent any data or
 > control messages to the relay for 15 seconds, it MUST send a HIP
 > NOTIFY packet to the relay.

When a registered host has not sent any data or control messages to the 
relay for 15 seconds,
it MUST send a HIP NOTIFY packet to the relay in order to keep the NAT 
bindings towards the HIP relay server and the HIP
data relay alive.

 > Likewise, if the host has not sent any
 > data to a host it has security association and has run connectivity

... to a *peer* host ...
... and with which it has run ...


 > checks with, it MUST send either a HIP NOTIFY packet or an ICMP echo
 > request using the same locators as the security association is using.

ICMPv6 inside the tunnel, right?

... security association is based on.

 > 3.10.  Handling Conflicting SPI Values

 > Since the HIP data relay determines from the SPI value to which peer
 > an ESP packet should be forwarded, the outbound SPI values need to be
 > unique for each relayed address registration.  Thus, if a registered
 > host detects that a peer would use an SPI value that is already used
 > with another peer via the relay, it MUST NOT select the relayed
 > address for use.

This is a bit confusing, do you mean inbound SPI values? Or from which 
viewpoint is this written?

 > However, a host with many peers MAY decrease the odds of a conflict
 > by registering more than one relayed address using different local
 > addresses.

local addresses? Do you mean in the case the host is multihomed? Or just 
by using different SPI values?

 > 4.1.  RELAYED_ADDRESS and MAPPED_ADDRESS Parameters

 > This document specifies only use of UDP relaying and...

... the use of ...

 > 4.2.  PEER_PERMISSION Parameter

 > The parameter is used for setting up and refreshing forwarding rules
 > and permissions at the data relay for data packets.

... and the permission for data packets at the data relay.

 > OSPI      the outbound SPI value the registered host is using for
 >           the peer with the Address and Port
 > ISPI      the inbound SPI value the registered host is using for
 >           the peer with the Address and Port

What happens if both of the end-host have their own data relays? Then I 
think the OSPI could be zero.

Why do you need to open both directions explicitly? I think the 
registered host should be allowed to send through the relay after 
successfuly data relay registration. So just opening the inbound 
direction should be sufficient and OSPI could be removed?

 > 4.3.  HIP Connectivity Check Packets

Why is the priority included separately in a new parameter since it was 
already exhanged in the locator?

 > 5.  Security Considerations

I didn't find the described issue from RFC5770, but I would add that 
you're talking about non-HIP aware firewalls. Also, the relay listens at 
a fixed port for registered clients, but it can decide about the port 
facing the peer host.