Re: [Hipsec] Magnus Westerlund's Discuss on draft-ietf-hip-native-nat-traversal-30: (with DISCUSS and COMMENT)

Miika Komu <miika.komu@ericsson.com> Thu, 02 April 2020 19:56 UTC

Return-Path: <miika.komu@ericsson.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E7373A12B9; Thu, 2 Apr 2020 12:56:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xSGG2dD9qmGZ; Thu, 2 Apr 2020 12:56:17 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00077.outbound.protection.outlook.com [40.107.0.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2320A3A12C7; Thu, 2 Apr 2020 12:56:14 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=E35yKceJoQoee7ac7PtqeGN+vff/PLFBa87jdRH9VQP0Oqukbk87c7pWqaOjxJ3Q+DnWwBDt2HLlxM5Y4Al3r7tfeAAK+Ir71ddbNKKrFLeiCU/PSbQ34+eqtkrhClu2CLNp4hrZJGtd3kWNAwMUimeSp5ucu/XWQRy4b/bC/EvhhBEJobYNNmIOS0pMuMgY2uJIElawaBQpLJ1aYj6pxNjGJe6cYTozy+auz5hnBIxynLCxoalpm42Q2elxakJlsWBnacVd7kaovdVlXCJS3Jv2N9mbfkn5OGBrGGvwPvZHVDXcnJpSguByy3HmbDQlpxOtXzTDFluDlB0c9N4XYw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=URylAVG6nLg9VYfDU2TnD/BjPW1doAGlsXh3Y8Gqoh4=; b=RDryT+2NYioUyHCKCfEVkqfJLSDFdN9rEMY88A3WEF4JFVcnYcd6yQ6dXksGouVcY/kl9ezIeRs/5WJ/OVF8NBUuq3Y4Z+PL0KfRAZt6dYVNW9EAW9RGgLNHkwJV5qQDXoYvSv/rtC2R2zHQRG/zIJqwc3ZT0U5N4JUqU2yTLG1jnJey8+qQxySxABH0J92RRQzK+suqUQUTS/yrbKwONWW8H1GrNqUA230BtXN3jGXcc5X+kxew2lBn35kbX8sP8V5RUeo+SjaWU+cuZgv8PHsIt/iPpZg7Yan1zBYt8a9ZlD29VcGMrOy3PXiTeGH56z8TshzDVzLQhBoL5EixNg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=URylAVG6nLg9VYfDU2TnD/BjPW1doAGlsXh3Y8Gqoh4=; b=tZbu6obeTsLD9fUDRFGQbO/NSkLIQku80QRvuPPK3PbxnKV7cdID9kMZbF1ByI8y5WNcHCJ72wMbZWycDjSlLhzBdty2J9vE6UR9Ki1tlVlsoucw2cAIIt1EzFLAT4d0P862rEPNJGvOu0ZVj26GrBrZ8DSEQtjJ8llgHsBiloU=
Received: from AM0PR07MB3876.eurprd07.prod.outlook.com (52.134.81.144) by AM0PR07MB4084.eurprd07.prod.outlook.com (52.134.81.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2878.13; Thu, 2 Apr 2020 19:56:13 +0000
Received: from AM0PR07MB3876.eurprd07.prod.outlook.com ([fe80::c93a:7b44:e182:cef6]) by AM0PR07MB3876.eurprd07.prod.outlook.com ([fe80::c93a:7b44:e182:cef6%6]) with mapi id 15.20.2878.014; Thu, 2 Apr 2020 19:56:12 +0000
From: Miika Komu <miika.komu@ericsson.com>
To: "iesg@ietf.org" <iesg@ietf.org>, Magnus Westerlund <magnus.westerlund@ericsson.com>
CC: "draft-ietf-hip-native-nat-traversal@ietf.org" <draft-ietf-hip-native-nat-traversal@ietf.org>, "hip-chairs@ietf.org" <hip-chairs@ietf.org>, Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>, "hipsec@ietf.org" <hipsec@ietf.org>
Thread-Topic: Magnus Westerlund's Discuss on draft-ietf-hip-native-nat-traversal-30: (with DISCUSS and COMMENT)
Thread-Index: AQHV8t5gg3Zvxq1PeEaWx2XZsfEZi6hma8SA
Date: Thu, 02 Apr 2020 19:56:12 +0000
Message-ID: <ef83276e8b16e138f08b19747c54977989bcc1d8.camel@ericsson.com>
References: <158340648969.14566.11476213026719970345@ietfa.amsl.com>
In-Reply-To: <158340648969.14566.11476213026719970345@ietfa.amsl.com>
Accept-Language: fi-FI, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Evolution 3.28.5-0ubuntu0.18.04.1
authentication-results: spf=none (sender IP is ) smtp.mailfrom=miika.komu@ericsson.com;
x-originating-ip: [88.148.205.35]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: eebf3147-8018-4680-dc15-08d7d73fe582
x-ms-traffictypediagnostic: AM0PR07MB4084:|AM0PR07MB4084:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <AM0PR07MB4084E9B2DAAB6FB8516A5BE2FCC60@AM0PR07MB4084.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0361212EA8
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR07MB3876.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(366004)(396003)(39860400002)(136003)(346002)(376002)(91956017)(54906003)(2906002)(81166006)(86362001)(66556008)(450100002)(4326008)(110136005)(64756008)(8676002)(6506007)(66476007)(5660300002)(44832011)(186003)(76116006)(8936002)(6512007)(2616005)(26005)(66446008)(81156014)(478600001)(30864003)(6636002)(66946007)(966005)(316002)(36756003)(6486002)(71200400001)(99106002); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: lKG4ka7pUVZ2FW1TR0DZj8Bh78/ycFM2I3C9vzG7klb2hTAmq486LRKjpG1nwf8U6RfwFdZ6fqYdhkQtXB2fm7Q+7LIzyt3U56g6RZl1K3y/7r0bE/sycKb9KBJoP+1/GooBN8LhSapZKnv/9Zkq8NQMbkSDW0CTZd8bKFLhCbkWa/jr1ydDrUxZr83wonxKgQMh2WujSH1NFbRZNC2DUXveVj72lVADG6e4yr5sMsL44zaUHpGbsaqeByLWpAUFblk/ajTINHod4LaBxsf3c0UeGh1NPGU0xm7NzTQjl2mTA8krUeMzQx/Ob9H6umPBPUFROu4vv4pRwCZPr3wsQTgmTuHNRxBJR85GFNX/xOOeVPZvI8G048EdFNAc4/1bc+zprW4YZRg78hoXuUHO0TAYoPDHl00DkYFd138de91wsIB+Jml3xZ8UVBzvwaoOr0XpcDUfoVbqDJT1hdEOyhyxtb1w/W5YnAECHSNZZR+doH3F4zYCDO/E21izgVdlw2/R7V5JLLhqkDVNv12X3PxiFs/DDNTUqu4QrHMnk0nONVjiFs5e1e2ATHm2oSig
x-ms-exchange-antispam-messagedata: 1DhVTJAk/ItTlkiuzkpJm1BVolqkyiNzCsdB+8UDD0sXJu+Rc/m+FUhRZgk+UpEsHz2u2lYVaBMImP7gaEVD8k8hT0Mw9L0k3QFuisxlIhVS9cpZfRrfB6zew6o53VxKs95LwEZDAPRTfIGfuvhb4Q==
Content-Type: text/plain; charset="utf-8"
Content-ID: <5CC64DD3063D81448B05D318004D6EDF@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: eebf3147-8018-4680-dc15-08d7d73fe582
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Apr 2020 19:56:12.8335 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 0q/vZCppR8BTuCtnhRkM4Wjr2GFECsKtA+wruoQ3ewPu+e1vOBA0sr0NClBV7g2eGMqA1AnYR7SE1dk1g1+eQQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB4084
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/jNWG-cS_sANtLNKOnmwzk1Tk2Q8>
Subject: Re: [Hipsec] Magnus Westerlund's Discuss on draft-ietf-hip-native-nat-traversal-30: (with DISCUSS and COMMENT)
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2020 19:56:26 -0000

Hi Magnus,

to, 2020-03-05 kello 03:08 -0800, Magnus Westerlund via Datatracker
kirjoitti:
> Magnus Westerlund has entered the following ballot position for
> draft-ietf-hip-native-nat-traversal-30: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut
> this
> introductory paragraph, however.)
> 
> 
> Please refer to 
> https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-hip-native-nat-traversal/
> 
> 
> 
> -------------------------------------------------------------------
> ---
> DISCUSS:
> -------------------------------------------------------------------
> ---
> 
> So I think the below are important things that needs to be discussed
> before
> proceeding. However, I might have missed things as I didn't have time
> to read
> the whole document in detail. Several of the issues are pieces for
> discussion
> to ensure that the right thing really is done.
> 
> 1. So this document recommends the usage of port 10500 as default
> listening
> port. A port registered by Ari and also used for RFC 5770. I get the
> impression
> that the port was registered separately from RFC 5770. So the port is
> assigned
> to Ari. Would Ari be willing to release the port for re-assignment to
> IESG
> control. RFC 6335 has the recommendation for ports for IETF protocols
> that the
> assignee is IESG and the contact chair@ietf.org. This to have the
> change
> control with IETF as body rather than with individuals.
> 
> If Ari agrees to this, I think it would be good to have the IANA
> section be
> updated to note the re-assignment and provide the necessary
> information.

This document reuses the same default UDP port number 10500 as
specified by Legacy ICE-HIP [RFC5770] for tunneling both HIP control
plane and data plane traffic.  The port was was registered 
separately for RFC5770 to co-author Ari Keranen but should now be re-
assigned for IESG control.  With the permission of Ari Keranen, the new
assignee is IESG and contact "chair@ietf.org".  In addition, IANA is
requested to add a reference to this document in the entry for UDP port
10500 in the Transport Protocol Port Number Registry.  The selection
between Legacy ICE-HIP and Native ICE-HIP mode is negotiated using
NAT_TRAVERSAL_MODE parameter during the base exchange.  By default,
hosts listen this port for incoming UDP datagrams and can use it also
for sending UDP datagrams.  Other emphemeral port numbers are
negotiated and utilized dynamically.

> 2. Secondly, as this solution is different from the RFC 5770 should
> this
> solution have a different service name? The reason I am asking is
> that it
> depends on how for example how an initiator determine which of the
> NAT
> traversal solution. If there is any intention to use DNS SRV for
> example
> different service name would make sense. This is primarily to verify
> that this
> has been considered.

I am not an expert on the topic but based on some discussions with some
colleagues, the SRV records seem to more suitable for infrastructure
discovery, not really for end-host discovery. Since you asked for this,
I wrote a new section in the appendix:

Appendix E.  DNS Considerations

[RFC5770] did not specify how an end-host can look up another end-
host via DNS and initiate an UDP-based HIP base exchange with it, so
this section makes an attempt to fill this gap.

[RFC8005] specifies how an HIP end-host and its Rendezvous server is
registered to DNS.  Essentially, the public key of the end-host is
stored as HI record and its Rendezvous Server as A or AAAA record.
This way, the Rendezvous Server can act as an intermediary for the
end-host and forward packets to it based on the DNS configuration.
Control Relay Server offers similar functionality as Rendezvous
Server, with the difference that the Control Relay Server forwards
all control messages, not just the first I1 message.

Prior to this document, the A and AAAA records in the DNS refer
either to the HIP end-host itself or a Rendezvous Server [RFC8005],
and control and data plane communication with the associated host has
been assumed to occur directly over IPv4 or IPv6.  However, this
specification extends the records to be used for UDP-based
communications.

Let us consider the case of a HIP Initiator with the default policy
to employ UDP encapsulation and the extensions defined in this
document.  The Initiator looks up the FQDN of a Responder, and
retrieves its HI, A and AAAA records.  Since the default policy is to
use UDP encapsulation, the Initiator MUST send the I1 message over
UDP to destination port 10500 (either over IPv4 in the case of a A
record or over IPv6 in the case of a AAAA record).  It MAY send an I1
message both with and without UDP encapsulation in parallel.  In the
case the Initiator receives R1 messages both with and without UDP
encapsulation from the Responder, the Initiator SHOULD ignore the R1
messages without UDP encapsulation.

The UDP encapsulated I1 packet could be received by three different
types of hosts:

1.  HIP Control Relay Server: in this case the A/AAAA records refers
    to a Control Relay Server, and it will forward the packet to the
    corresponding Control Relay Client based on the destination HIT
    in the I1 packet.

2.  HIP Responder supporting UDP encapsulation: in this case, the the
    A/AAAA records refers to the end-host.  Assuming the destination
    HIT belongs to the Responder, it receives and processes it
    according to the negotiated NAT traversal mechanism.  The support
    for the protocol defined in this document vs [RFC5770] is
    dynamically negotiated during the base exchange.  The details are
    specified in Section 4.3.

3.  HIP Rendezvous Server: this entity is not listening to UDP port
    10500, so it will drop the I1 message.

4.  HIP Responder not supporting UDP encapsulation: the targeted end-
       host is not listening to UDP port 10500, so it will drop the I1
       message.

The A/AAAA-record MUST NOT be configured to refer to a Data Relay
Server unless the host in question supports also Control Relay Server
functionality.

It also worth noting that SRV records are not employed in this
specification.  While they could be used for more flexible UDP port
selection, they are not suitable for end-host discovery but rather
would be more suitable for the discovery of HIP-specific
infrastructure.  Further extensions to this document may define SRV
records for Control and Data Relay Server discovery within a DNS
domain.

> 3. So I don't quite understand what the co-existance story are for
> the relay
> having an listener on port 10500? Is that port only used for
> UDP/HIPv1
> (RFC5770) and UDP/HIPv2 (This doc).

Yes (by relays or end-hosts)

> And the listening stack can determine which
> version is used to determine which of the protocol is run.

HIP version is in the header. If a middlebox or end-host does not
support the HIP version, it will respond to with an ICMP:

https://tools.ietf.org/html/rfc7401#section-5.4.1

Then there is RFC5770 vs "native NAT traversal" (this spec)
specification issues:

1. Client registration to a Relay:

- RELAY_UDP_HIP in both specs
- New RELAY_UDP_ESP service in Native NAT traversal


https://tools.ietf.org/html/draft-ietf-hip-native-nat-traversal-30#section-4.1

This is simple. The Relay Server offers services and the Client chooses
from them. The Control Relay Service is the same in both specs.

2. Base exchange between the actual end-hosts:

- NAT_TM: ICE-STUN-UDP (RFC5770) vs ICE-HIP-UDP (native NAT traversal) 


https://tools.ietf.org/html/draft-ietf-hip-native-nat-traversal-30#section-4.5
https://tools.ietf.org/html/rfc5770#section-4.3

The end-hosts negotiate RFC5770 vs native NAT traversal support during
the base exchange.

> And the issue with
> multiplexing is only existing for the ports that one gathers?

What do you exactly mean by this? Is there an issue between NAT
traversal versions? Or are you referring to:

6.4.  Demultiplexing Different HIP Associations

OR

4.12.3.  Handling Conflicting SPI Values (note two scenarios here)

...which both talk about multiplexing. The latter section deals with the new service added in this specification (Data Relay Service) and port gathering with that.

> Can you please
> add a paragraph or two somewhere in the document.

I can add some text if you can confirm if I have answered to the right
questions?

> I think it should be
> referenced by the port registration update.

This was handled already my response to question 1?

> 4. MTU impact of NAT traversal.
> 
> Section 5.1 states
> "It is worth noting that UDP encapsulation of HIP packets reduces the
>    Maximum Transfer Unit (MTU) size of the control plane by 12
> bytes."
> 
> There is also a similar text in Section 5.11:
> 
>    It is worth noting that UDP encapsulation of ESP reduces the MTU
> size
>    of data plane by 8 bytes.
> 
> I think the document needs a discussion and impact on MTU which this
> NAT
> traversal has on the HIP packets being sent. - First of all there
> appears to be
> more packet expansions happening in some cases, for example the
> RELAY_HMAC
> option expands packets on one leg. - Secondly, HIP requires IP
> fragementation
> support, however IP fragmentation through NAT is commonly not
> working. Thus an
> HIP packet being UDP encapsulated that results in packet exceeding
> MTU will
> likely end up in an MTU black hole on path.
> 
> The addition of the NAT traversal encapsulation actually increases
> the need for
> MTU discovery or care in MTU handling by the HIP initiator. I think
> there need
> to be discussion of that in the document.

I am stil iterating some text on this, I hope Jeff Ahrenholz can help
with this.

> -------------------------------------------------------------------
> ---
> COMMENT:
> -------------------------------------------------------------------
> ---
> 
> May I inquire about the reasoning why this document do not obsolete
> RFC 5770?

This was discussed earlier but the working group decided to keep both,
and let implementor's to choose between reusing existing STUN/TURN
infra (RFC5770) vs faster data plane (native NAT traversal).