[ippm] Re: Paul Wouters' Discuss on draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT)
Ruediger.Geib@telekom.de Fri, 08 August 2025 11:25 UTC
Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: ippm@mail2.ietf.org
Delivered-To: ippm@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id A4CC251A486C; Fri, 8 Aug 2025 04:25:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.795
X-Spam-Level:
X-Spam-Status: No, score=-2.795 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ub66LJR5J0YA; Fri, 8 Aug 2025 04:25:52 -0700 (PDT)
Received: from mailout11.telekom.de (mailout11.telekom.de [194.25.225.207]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id D339151A4864; Fri, 8 Aug 2025 04:25:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1754652352; x=1786188352; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=urpXQvdmu+w0ZtWawijI8uklpLtidvLFYgjMzgpsB3A=; b=Yx9nuajCxdYq6lgFXYouofUl8gx9yQnlqTz5bg+QDwZUGmgrzlXfwKo9 e4vXZ98RlHVOnIFuGZyZagB+oKIDTyrV45XFzoDkVMfQuOa1FdrgrURBG qhVrx6lIXJw/yyayjOgullVxh77rK7ZkD4urhQYK2zEMZpbh0yKSRa0gF 2CtSrsNLCETW+gy0IYDHMKjMiYA2rl/FYSKPN6E/4X26aPcOMFzi9bSqd EizN1l3YWJ/G8HthcQKdfgbj1ZbuvOFSEGk3gu4yieXgKBSpH3uKfuLE4 41B3rBSLb9ASFN2qkmcOQ6E5zeq/tBCt53c5loE/pBQsj+vNc4LjaEzSq w==;
Received: from qde8e4.de.t-internal.com ([10.171.255.33]) by MAILOUT11.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 08 Aug 2025 13:25:50 +0200
IronPort-SDR: 6895debe_DCCwLg/mZHASjs8xkRSGwQ13od8wb7hPCq3wpn3VgHNCbCU JgroPX9jEq4pXN1D/Chkgcvy+ltW+gScrvpnRqw==
X-IronPort-AV: E=Sophos;i="6.17,274,1747692000"; d="scan'208,217";a="1866719591"
X-MGA-submission: MDFqWtm79bCvjcyUpCNA3UBMiskY+WcLAQFgYvZHI/ZZk+ZKVbghLq31GYiod4/ea/8jQOZU5pRjFxuGT+joL8AdgF+I3DWAqSSujq/szPEN6wGHXsVMn9sH50NOABo3UGC3VBWHo+RxKiqj8G/uws8mHKgsIleiMcnIv5lTaXsuQQ==
Received: from he101416.emea1.cds.t-internal.com ([10.169.118.195]) by QDE8PP.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 08 Aug 2025 13:25:50 +0200
Received: from HE101419.emea1.cds.t-internal.com (10.169.118.196) by HE101416.emea1.cds.t-internal.com (10.169.118.195) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1748.26; Fri, 8 Aug 2025 13:25:49 +0200
Received: from HE102770.emea1.cds.t-internal.com (10.171.40.42) by HE101419.emea1.cds.t-internal.com (10.169.118.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1748.26 via Frontend Transport; Fri, 8 Aug 2025 13:25:49 +0200
Received: from BEUP281CU002.outbound.protection.outlook.com (40.93.77.4) by O365mail07.telekom.de (172.30.0.239) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1748.26; Fri, 8 Aug 2025 13:25:49 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=tW00+8u7pAJHP4r0S5ZyuFbpvx56XzvVzFKsssfGnShVCoS6M2jefiermGnu5+kx6vIQkk3ZSkkvk/G5DVbZkJgrwPAb2dzYxO4s5GQEm+kbu+cSQI54hpthro+zcfHKZOxLFr8QHPK0bl3nlY7M7nd6TeZBhNkBvzlrccyMaW0E+X6oOloF4uYgOnDhVJ51i3jpsUft4ufIyir6J48AKlbLIdjzUf0cFgKrYqji60YARjgVUK2QOgESpempqaq04d15L0+xWOK8jmAqh43GQXNvCNjtke2bcQqo8joTdZxHC90NPoCmjFdgmhA4PH9luAQN2MTZxvOWLys8lb6UNQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=urpXQvdmu+w0ZtWawijI8uklpLtidvLFYgjMzgpsB3A=; b=oJrGg1yafahqZvLNMUd29807odkr82HDWxElwflJ2m+m8g/RJrgZi4/BEE1Xfw4mIZ7sAc18lztru9NrZkUNHwbmA/qJ2WGmK1Wqk4Dgm2WtJEJS3ZiPTKxjW+p2jjk0ON/jUUDouQ4/sFmVBksRUynHrSkLqyg95mlc+PrUHXz3cWLkuNqi75FouumV44K9eOV07XBKd4E5Sk+MQRukMDtd1VIExU7SxXGTJa2UDrfEpP3c04EJjiTJZ6wcKKNML7LyUxizk5i9e+PuZxH1mCKekMzImb9hZRqJ1+LXmbzfRj64FXUs4T4fhWsUegj/n6XBoOelzkIRWpxV25MC3g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:57::6) by BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:57::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9009.18; Fri, 8 Aug 2025 11:25:46 +0000
Received: from BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM ([fe80::e80d:7e7e:b006:ea8a]) by BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM ([fe80::e80d:7e7e:b006:ea8a%7]) with mapi id 15.20.9009.017; Fri, 8 Aug 2025 11:25:46 +0000
From: Ruediger.Geib@telekom.de
To: paul.wouters@aiven.io, debcooley1@gmail.com
Thread-Topic: [ippm] Paul Wouters' Discuss on draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT)
Thread-Index: AQHb5U60GGgJSR/M40WQbATLTKCI8bQbpcOggDwVTwCAARlDYA==
Date: Fri, 08 Aug 2025 11:25:45 +0000
Message-ID: <BEZP281MB20071FEC15B99888C216369B9C2FA@BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM>
References: <175080039846.630107.8445994078350766610@dt-datatracker-6754d69b7c-p2xd7> <BEZP281MB200782FDA7F1B2426CD29AFE9C2CA@BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM> <CAGL5yWb_mhbTEOWHpRxFSL1D+OduZSBCQiptc-K=NwCiS48jpg@mail.gmail.com>
In-Reply-To: <CAGL5yWb_mhbTEOWHpRxFSL1D+OduZSBCQiptc-K=NwCiS48jpg@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BEZP281MB2007:EE_
x-ms-office365-filtering-correlation-id: 6908c583-5ad8-4088-ec69-08ddd66e519c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|4022899009|1580799027|13003099007|38070700018|8096899003;
x-microsoft-antispam-message-info: leHiV9oKIH2HoEMv4ecAFqx7gU/vw1QdnnL33upZpb3k35J2fKXIY+toE45l1wlVQbxa4/1o8KRm6DDUIemTrV8aqlhY1oeg7je/tDHWYxG5uY+RQPN3bmibLV36JZMlC17MUtul+BHP50qsA/Vet2gKmFZJhSgA+F0BgYIuCc8ZwBc1J0j4YGV0qBFVo75C64aXB7xjx05zIIacieTrxOFdy70Oz/KLPVCHuSD5o12lFJiW4ZItN1x1aysyBZCmYpjYhdmD+M94TQH22swT9si3niTSXQ9AGgp/vKccKxmU/0r/7zToTiV3EGBBsTA8fLcrS449Oj573EynBf6/i9Uf6nmF23+jCQ0N7jrgjd9E4U3v96EEEZuJ1ObT0IYoQvTProZQmSd23wulPwknYM1J2KYUVMyVM/XNxqWC7XGDK43B5bcmOVlL2aeqmlQMtP84hPEmBtlnRfWBSHmHwFWyzGkmW0yaXOqEtWPVCREzOtjjEKXjv3LS1HMEv8Og4Rx4PTmU9Ld0nv8RZ3qp+d3sUlmaO4p2nJJtYZvaAEfICmslQHSshlFOvpqjBVRRBm3cp6f8g72UdllZPjAle75GjpRQ1GclVhQVHI3YDpI74z0BbZQ+Jc9lPIaDqd+o2RCD/FfD3M0RM+z7M08cqQZAk4Gbmsj/UGEHA00H9GIKjyQZ8XlHoCIY1ZcqTt3lI6clVVSAuWzWA4RagnGwGoNEIiSBLgO3UZNmMFaMHR6CNE/YViFTfja6p3YwHpbQV7IMdAh9FWOU17/AZQGmb4YQ1dGSjaqBaeNXuUHQejNYvFvFcPPshILydLFjYDb/ksSdJv76P+unG9tTw4Icn/j97oteRtoBP6m34uyg3HmDRwP5sQCzb6dyZt3XGbGo2N+C6j7GlZljTPFftTDkrU+orH551wQF8uqpWDCaCc1ph08jPB8yvGT4YFmwpH83YMFOdPzAU5PJHXBDwYQzIBpfZZYXNpiVx1hhRutTjjiL/fmRRYvKr+SuHJ+w0MAM6UMCQ6imiullfg0ysIfP6L9xJc4F/NbgB21AR43TZ2ZL++KxRgN0ujmwFZ3431LT8haZDjCl6+eMIfaqRXZCkUc9HCJve6bfNIr1acqyKrBnqRfCe4oiaSa0Jy9AFMwIhuuSCiuZTgeI2ROea3mBH9PTzyLUU11H9KNKlyc2Zl2ix7rf1R7CpzEzq4Z4rFKKLIvvnlGGeA1CqezMNGw1CzpJXnhdRokBt3aqhvJEmwcpP/fXGh+BcjXAOURDXLovd5/AkXw+BamdAP1y7RW3gt9Mgow4au85g26iWYlqF26wkQ5fUaG6zL8JxBEBHTjkDEuZGlj1zBiix5oLvzmhGbx+zAJe/FYEd69Cf7PVv6RrZ9r2TCvTmSXBsRmAHq/+T6Cn+Qu6s2RukE0ajPaPplQg50sEJrdUcedIxt9jXyotYlYa7riGFtfzc9zWUe6JHlG1A0QcJI+q2EUOzhy0Zw==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(4022899009)(1580799027)(13003099007)(38070700018)(8096899003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BEZP281MB20071FEC15B99888C216369B9C2FABEZP281MB2007DEUP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BEZP281MB2007.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 6908c583-5ad8-4088-ec69-08ddd66e519c
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Aug 2025 11:25:46.0049 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Y8HeO4IzS016M64XmFnBdfrWFYxCtHUoBD4CuNk+qr/10wpHhf+/66oJ7xdxdPYKiy1I8P3ey0P8qIv4n+ZIQHYyEJY5nkpLIbRMUfTtbSM=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BEZP281MB2007
X-OriginatorOrg: telekom.de
Message-ID-Hash: 6GOC3BWFDKSSSL5OV7TVDHTPKLLNEILM
X-Message-ID-Hash: 6GOC3BWFDKSSSL5OV7TVDHTPKLLNEILM
X-MailFrom: Ruediger.Geib@telekom.de
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ippm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: draft-ietf-ippm-capacity-protocol@ietf.org, ippm-chairs@ietf.org, ippm@ietf.org, iesg@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [ippm] Re: Paul Wouters' Discuss on draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT)
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/7vGMeiv0vfeKFYt01OibHe2vKN4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Owner: <mailto:ippm-owner@ietf.org>
List-Post: <mailto:ippm@ietf.org>
List-Subscribe: <mailto:ippm-join@ietf.org>
List-Unsubscribe: <mailto:ippm-leave@ietf.org>
Hi Paul, the approach taken is a performance measurement protocol with added security features. The latter should find consent of the sec area. Part of our design: * One UDP port * One PDU type which is neither encrypted nor authenticated (it carries load with no information) Ok, where to go from there? * The authors, IPPM WG and OPS Area chairs prefer this work to reach RFC state. * No complete re-design of the protocol * Is there a way for sec area * to add security features, Authentication at least, to a communication as sketched above (one port, one unauthenticated PDU type)? * if that can’t be done for encryption, does a solution without encryption have consent of the sec area? * If that also can’t be done for Authentication, is that finding IESG consent (the authors would be disappointed, Authentication is required)? The security approach taken so far doesn’t find consent of the sec area (the authors don’t discuss the points you raise – we are no security experts). Is the sec area willing to provide the authors guidance on how to progress this protocol at this stage without a complete redesign? If a complete protocol redesign is the only option to add security features finding sec area consent, I’d suggest OPS area and SEC area to jointly specify a framework how to design performance measurement protocols with added security features (this order of priority – I don’t want exclude a secure protocol with added performance measurement features in general, if measurement precision isn’t impacted by the secure protocol). Hoping to get a blueprint for that motivated us to contact the sec area in 2022. That latter is a worst case, we hope to avoid. We’d still have to figure out, what to do if there’s no other option. Please let me know, if further details on the protocol were helpful for the sec design. Med is available for a conf call too. Would UTC 14.00-15.00 Monday to Thursday, that’s 9.00-10.00 EST and 16.00-17.00 CEST be suitable? If yes, please let me know, if you prefer a particular day. Otherwise, please change. Regards, Ruediger Von: Paul Wouters <paul.wouters@aiven.io> Gesendet: Donnerstag, 7. August 2025 19:44 An: Geib, Rüdiger <Ruediger.Geib@telekom.de>; Deb Cooley <debcooley1@gmail.com> Cc: draft-ietf-ippm-capacity-protocol@ietf.org; ippm-chairs@ietf.org; ippm@ietf.org; iesg@ietf.org Betreff: Re: [ippm] Paul Wouters' Discuss on draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT) On Thu, Aug 7, 2025 at 8:09 AM <Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>> wrote: Hi Ruediger, I am sorry the process has been long and frustrating so far. But there is still a lot of things that are not clear to us as SEC ADs. I am also seeing different emails bringing up new things, which complicates things as well. Hi Paul Thanks for your review. We'd like to focus on the DISCUSS raised by you by this exchange. You are asking, "Why is this protocol not using DTLS for its security features?" Authors: To our understanding, using DTLS for its security features requires the protocol to open two UDP ports: - one for the secure DTLS signaled PDUs - one for the Load PDUs which aren't protected. This is the first time I hear of the requirement of running encrypted and unencrypted streams over the same port. As far as we can see, this would require a re-design of the protocol. The protocol by now has reached IESG. First time, the authors have contacted security area and asked for guidance was 2022: https://mailarchive.ietf.org/arch/msg/ippm/LQxG-144USqSlwTHCZvFtW9wA08/ Reading through that thread, some of the issues that are bubbling up now were not clear to me (or Roman?) at the time. Note that a SecDir reviewer is also just one person with an opinion - it does not constitute a Security Area approval. Note that the above thread also states that data is "generated", leaving me confused as to why that needs to be encrypted or protected? Authors: We've made progress and tried to follow guidance of Brian Weiss on security. He asked us to present our approach to an appropriate security WG in 2024, when you were involved again (I post the header only, didn't pass lists): ------- From: Paul Wouters <paul.wouters@aiven.io<mailto:paul.wouters@aiven.io>> Sent: Dienstag, 2. Juli 2024 17:52 To: Geib, Rüdiger <Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>> Cc: debcooley1@gmail.com<mailto:debcooley1@gmail.com>; alexey.melnikov@isode.com<mailto:alexey.melnikov@isode.com>; nicholas.sullivan+ietf@gmail.com<mailto:nicholas.sullivan%2Bietf@gmail.com>; smyshsv@gmail.com<mailto:smyshsv@gmail.com>; lc9892@att.com<mailto:lc9892@att.com>; bew.stds@gmail.com<mailto:bew.stds@gmail.com>; tpauly=40apple.com@dmarc.ietf.org<mailto:40apple.com@dmarc.ietf.org>; marcus.ihlar@ericsson.com<mailto:marcus.ihlar@ericsson.com> Re: Request for a presentation slot in SAAG and CFRG, respectively we try to discourage presenting the same thing in two different meetings. it seems the CFRG slot would be a better fit ? It seemed based on the PDF attached at the time, you were writing your own encryption protocol. This is why I suggested to get feedback from CFRG. Based on https://datatracker.ietf.org/meeting/120/materials/minutes-120-cfrg-202407252000-00 you did get feedback but it got down deep to the crypto level. Did any followups happen on the CFRG mailing list? To me again this seems to suggest this protocol is not the place to invent its own cryptography. And again if this is generated synthetic data, I am still confused why it needs to be encrypted. Authors: We accept, that there are other security approaches. We looked for, received and followed early and ongoing guidance by the security area on one of these. The encryption approach pursued so far still isn't consented by the security area. The authors are not interested in a complete re-design of the protocol. Then how to make progress? I do not know how you can make progress. From a security point of view, specifying new protocols with the CBC cryptographic primitive is just not viable. Runing low level openssl crypto library calls as a protocol to security people is just unspeakable. It is just not done. Which is why we recommend DTLS. There was some confusion about that not being able to detect packet drops or duplications, but that got resolved during IETF-123 when I sent a message with an example of how an SCTP RFC required using DTLS with replay protection disabled. Now you raise a new problem of not wanting to redesign things on two ports. There is no security protocol that allows you to mix encrypted packets with cleartext packets in a single data stream. - wait for the security area to improve the security approach taken so far so that it can be implemented and finds consent by the security area? I do not think you should "wait for the security area to improve". Our objections are very fundamental cryptography concerns. For example, TLS 1.3 has disallowed all CBC algorithms and only allows AEAD algorithms. - drop encryption and just operate authentication? I think I still don't understand what the encryption of generated synthetic data is supposed to protect, so I cannot answer this question. I also do not understand what you mean with "authentication". Without encryption, what does authenticaction mean? It cannot be a few packet authentication exchange, followed by a stream of unencrypted data as the data would not be integrity protected either. And if you plan to integrity protect the data, you would run into similar issues as when you are encrypting the data. You would need to negotiate securely an integrity key that can be used for something like an HMAC style verification of data, but how would that work with mixing integrity protected data and unprotected data in the same stream? - in both cases, we'd ask you for a reference pointing to a load performance measurement protocol which operates by DTLS (either by a single UDP port only or using two UDP ports, one for signaling and one for measurement). If that's not feasible, we are happy to add text on such an improvement and ask you to provide it. Please talk to your WG chairs and AD. The Security ADs are not the ones that can be tasked to secure every protocol the IETF comes up with. An important constraint of a load measurement protocol: load measurement PDUs must be large. They mostly do not transport content or any kind of higher layer information - mostly bytes to create load and be dropped by the receiver. These packets are not encrypted, as in addition to inducing measurement errors / impacting precision of timestamps, encryption of meaningless information protects no protocol or communication, but induces processing requirements. Low end devices likely are not able to support such a protocol. I still do not understand why you are trying to encrypt these data streams of randomly generated data. Med suggested to have a conf-call, if this helps progressing issues. He's about to leave office for three weeks and I personally try to avoid Friday conf calls (I'm available until 11.00 UTC). Please suggest a way to proceed. I am available in various time slots in the next few weeks during EST business hours. Paul -----Ursprüngliche Nachricht----- Von: Paul Wouters via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>> Gesendet: Dienstag, 24. Juni 2025 23:27 An: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>> Cc: draft-ietf-ippm-capacity-protocol@ietf.org<mailto:draft-ietf-ippm-capacity-protocol@ietf.org>; ippm-chairs@ietf.org<mailto:ippm-chairs@ietf.org>; ippm@ietf.org<mailto:ippm@ietf.org> Betreff: [ippm] Paul Wouters' Discuss on draft-ietf-ippm-capacity-protocol-20: (with DISCUSS and COMMENT) <snip> ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- The main point of my DISCUSS is around the protocols authentication and encryption. It is a homegrown protocol, very restricted in cryptographic options, no ephemeral key exchange and unsafe use of PSK. Why is this protocol not using DTLS for its security features instead of inventing its own using low level openssl functions as a security protocol ? All of the Cryptogrpahic issues would go away, if you just optionally allow to use DTLS 1.2 or later. [Authors]: Duplicate Packets is one of the performance metrics captured. Earlier draft versions contained text: "The <DTLS> replay protection would remove duplicated packets and prevent transparent measurement of this impairment." --------------------- 1) secure hash algorithm The document claims a number of times that low power devices are an important use case. If so, AES-CMAC (RFC4494) would be more appropriate than HMAC-SHA256 ------------------- 2) using the KDF The KDF SHALL use the following parameters: [...] It should more clearly specify thow these parameters are used. One likely method is concatenation in the order of the listed parameters, but if so, it should clearly state this, eg KDF(Kin || Label || Context || r) and it should specify how to deal with input that is larger in size than the input of the KDF. The authUnixTime field serves as a nonce This KDF use is not safe against writing a brute force engine of captured traffic where the only unknown is the PreSharedKey. I think this could be cracked in realtime using something like https://hashcat.net/hashcat/ for every PSK under 16 characters. As PSK is "out of scope", it seriously runs the risk of going in the clear in email or a phone call with a low entropy phrase. ----------------- 3) auth and enc key generation Why are the authenticaion and encryption keys of a different length/strength ? This would make the resulting strength the least of the two, eg 128bit. It only costs 1 HMAC-SHA2 operation more (4 instead of 3) to get 256bit keys for both. Or, you could use AES-CCM / AES-GCM and use an AEAD when encryption is needed which requires 256bit (or you can pick/choose 128bit) Which brings me to another point, at this point CBC should really not be deployed for new protocols anymore. Please use AES-CCM or AES-GCM. Especially if low power devices are being targeted, using AES-CBC-SHA256 is far more expensive (and less secure) compared to AES-CCM/AES-GCM (and SHA256). Of course, this does require safe handling of the counters. ----------------- 4) encryption streams How are different streams using encryption? Same key? How is uniqueness in IV ensured? Or when switching to CCM/GCM, how are counters not re-used? ---------------- 5) random The sender SHALL populate the initVector field with a cryptographically random 16-octet Initialization Vector (IV), On low power devices, getting a good random source is not always easy either. This would be easier if one were to use an AEAD as well, and use the authUnixTime as a nonce with a proper counter instead of a random IV. For AES-CBC you would have to use an explicit IV (eg send it over the wire) to allow decrypting out of order packets (eg see RFC3602) which means generating randomness per packet. With AEAD you only need to guarantee uniqueness, not unpredictability (aka random). --------------- I also would think the protocol should not hardcode AES-CBC-SHA256, but use a registry similar to AlgID. --------------- AUTHMODE_3: Optional Encrypted mode You want to say: Optional Encrypted plus Authenticated Control and Data phase mode. --------------- Authentication and encryption methods and requirements steadily evolve. Alternate encryption and/or authentication modes provide for algorithm agility by defining a new Mode, whose support is indicated by an assigning a suitable "Test Setup PDU Authentication Mode Registry" value (see Section 11.3.4 ). But this registry only has different modes of using authentication or encryption. All the actual values for these (HMAC-SHA256 and AES-CBC) are hardcoded and implicit, so when one in the future would add something else (eg encryption with AES-CMAC and AES-CTR) the current naming does not work at all for this registry. ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Titel says: Test Protocol for One-way IP Capacity Measurement Abstract says: This document defines the UDP Speed Test Protocol for conducting RFC 9097 and other related measurements. The Introduction says: This document specifies the UDP Speed Test Protocol (UDPSTP) Can these terms be made consistent? [Authors] Title, CHANGE : UDP Speed Test Protocol for One-way IP Capacity Measurement We'd like to keep One-way IP Capacity Measurement in the Title, as 9097 specifies the latter. UDP Speed Test doesn't appear in 9097, however. ------------------- I am skeptical of the value of speed meassurements for anything using specific ports, as it is allows the network to treat these differently from "regular" traffic. Eg we commonly see "speedtest.net<http://speedtest.net/>" outperforming reality. I see it can still be useful in labs (but then I question the authentication/encryption parts being neccessary at all) [Authors]: Taking a consumer point of view, your analysis may be right in some cases (at least). The protocol has seen deployment by one large network provider for diagnostic purposes and it is preferred to TCP Speed Test by some diagnosis tools in wireless environments. ------------------ Test Setup Request and Response: If a server instance is identified with a host name that resolves to both IPv4/IPv6 addresses, it is recommended to use the first address returned in the name resolution response - regardless, whether it's IPv4 or IPv6. Thus, the decision on the preferred IP address family is left to the DNS operator. I don't understand this part. If the application sends out a query for AAAA before A, or A before AAAA, that will make a difference that is not "left to the DNS operator" at all. There is currently no way to ask for A + AAAA within the same DNS packet, but once it does (there are efforts on their way) then both would arrive at the same time in the same answer. [Authors] Could you suggest text to be added? Should it say, that only a single record (e.g. A or AAAA) should be queried? ------------------ The encrypted portion of each PDU SHALL contain the padding required I believe you mean "the cleartext to be encrypted shall be padded to ...." ? [Authors] Thanks, CHANGE: " The PDU's cleartext to be encrypted SHALL be padded to..." _______________________________________________ ippm mailing list -- ippm@ietf.org<mailto:ippm@ietf.org> To unsubscribe send an email to ippm-leave@ietf.org<mailto:ippm-leave@ietf.org>
- [ippm] Paul Wouters' Discuss on draft-ietf-ippm-c… Paul Wouters via Datatracker
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… mohamed.boucadair
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Paul Wouters
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Ruediger.Geib
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Paul Wouters
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Ruediger.Geib
- [ippm] Re: Paul Wouters' Discuss on draft-ietf-ip… Paul Wouters