Re: [ippm] WGLC on draft-ietf-ippm-ipsec-03

Kostas Pentikousis <k.pentikousis@eict.de> Mon, 14 July 2014 17:18 UTC

Return-Path: <k.pentikousis@eict.de>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1E951A0AE3 for <ippm@ietfa.amsl.com>; Mon, 14 Jul 2014 10:18:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.901
X-Spam-Level:
X-Spam-Status: No, score=-2.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X47DUNz2fjrc for <ippm@ietfa.amsl.com>; Mon, 14 Jul 2014 10:18:31 -0700 (PDT)
Received: from mx2.eict.de (mx2.eict.de [212.91.241.168]) by ietfa.amsl.com (Postfix) with ESMTP id E8D871A0AE9 for <ippm@ietf.org>; Mon, 14 Jul 2014 10:18:30 -0700 (PDT)
Received: by mx2.eict.de (Postfix, from userid 481) id D3FEF1FF5F; Mon, 14 Jul 2014 19:18:29 +0200 (CEST)
Received: from mail.eict.de (mx1 [172.16.6.1]) by mx2.eict.de (Postfix) with ESMTP id 0020D1FF52; Mon, 14 Jul 2014 19:18:28 +0200 (CEST)
Received: from sbs2008.eict.local (sbs2008.intern.eict.de [192.168.2.11]) by mail.eict.de (Postfix) with ESMTP id 925FD37825F; Mon, 14 Jul 2014 19:18:28 +0200 (CEST)
Received: from SBS2008.eict.local ([fe80::2051:ef24:c7c9:f298]) by SBS2008.eict.local ([fe80::2051:ef24:c7c9:f298%13]) with mapi; Mon, 14 Jul 2014 19:18:28 +0200
From: Kostas Pentikousis <k.pentikousis@eict.de>
To: Steve Baillargeon <steve.baillargeon@ericsson.com>, Brian Trammell <ietf@trammell.ch>, "ippm@ietf.org" <ippm@ietf.org>
Date: Mon, 14 Jul 2014 19:18:26 +0200
Thread-Topic: [ippm] WGLC on draft-ietf-ippm-ipsec-03
Thread-Index: AQHPj75vWlG8gyCu9kGHnYCBaKiwrJuCA6fggB3gDuA=
Message-ID: <0C7EDCF89AB9E2478B5D010026CFF4AEA10C619BC6@SBS2008.eict.local>
References: <0C7EDCF89AB9E2478B5D010026CFF4AEA10C4F1674@SBS2008.eict.local> <D9CA4F12-9EE0-4D3F-BB59-79B36343FD7F@trammell.ch> <DCF22B50497F7641B6DDD16ECC516F7F3F0AC0B3@eusaamb105.ericsson.se>
In-Reply-To: <DCF22B50497F7641B6DDD16ECC516F7F3F0AC0B3@eusaamb105.ericsson.se>
Accept-Language: en-US, de-DE
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US, de-DE
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/ippm/blt9CLulJFuLltBwTw90IfTcOPA
Cc: "draft-ietf-ippm-ipsec@tools.ietf.org" <draft-ietf-ippm-ipsec@tools.ietf.org>
Subject: Re: [ippm] WGLC on draft-ietf-ippm-ipsec-03
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jul 2014 17:18:34 -0000

Hi Steve, all,

| I support with the following comments:

Many thanks for the support, much appreciated. 


| - The tile of the draft is misleading. It should say something like
| O/TWAMP Shared Secret Key Feature

I think we discussed the title some time ago. Personally I would take a bit of an issue with changing the title so late in the process, but I have to agree that as the draft evolved since Orlando, the title didn't do so accordingly. We're open to suggestions, although I am not excited about the word "Feature" in an IETF RFC title :) Would something like "IKEv2-based Shared Secret Key for O/TWAMP", for example, be ok with you?


| - The use case in section 1 is not clear. It should indicate this mode
| is intended for protecting and exchanging OWAMP/TWAMP test protocol
| between two IKEv2 systems when OWAMP/TWAMP control/test traffic is not
| protected by IPSec

The document does focus on how to derive O/TWAMP Shared Secret Key from IKEv2 SA. As per earlier discussions in Berlin and Vancouver, I think we already agreed that this is orthogonal to whether the O/TWAMP control/test traffic is transferred inside the IPsec tunnel or not. The admin or operator policy could play a role, for example. Of course, one should avoid a so-to-speak "double security protection".


| - I personally think the most common case is to protect OWAMP/TWAMP
| control/test traffic with IPsec. It is important to highlight the
| benefits associated with this new mode versus the common
| unauthenticated O/TWAMP mode protected via AH or ESP.

I think we mostly agree on this. Would you be so kind to propose some text to add? I guess a few of sentences would suffice at this stage

 
| - in section 4.1 first sentence, the requirement level is ambiguous. I
| think it should say...the shared secret MUST be derived ...(as opposed
| to can). Same comment for the second paragraph, the word if should be
| replaced by when.

Sounds good; we will update the draft before the meeting. Thanks for this point.


| - end of section 4.1, the expected behavior when the IKEv2 SA is
| rekeyed is not clear. Same is true when the IKEv2 SA is deleted for
| whatever reasons. What should the O/TWAMP  part of the IKE system do
| when the IKE SA is rekeyed or deleted? Should it close its test
| sessions and setup new test sessions using the key associated with the
| newly established IKEv2 SA? Waiting for the lifetime to expire does not
| make sense. And if you do, what happens next?


I'm not sure about this, although we would be happy to integrate proposed text from your end. The shared secret key generated from the SA could continue to be used until the lifetime expiration. Do you see a need to rekey the shared secret key immediately after the IKEv2 SA is rekeyed?

| - section 4.2. Three (3) new TWAMP modes are not needed. One TWAMP mode
| called Shared Secret Key should be sufficient. This mode can then be
| used on conjunction with the authenticated, encrypted and mixed modes.
| Please do not use the X mode over IKEv2. The text "over" is always
| misleading.


I need to go back to my notes wrt the discussion we had earlier. If I recall correctly, extending the Modes values is advantageous if one considers backwards compatibility with existing O/TWAMP clients. The Set-Up-Response Message contains a mode value which indicates unauthenticated, authenticated or encrypted. In this case, the O/TWAMP server cannot obtain the information whether to derive shared secret key from an IKEv2 SA or not, if the modes value is not extended. The Set-Up-Response Message must signal this in conjunction with the mode. Since  there is no unused field in the Set-Up-Response Message, isn't it better to extend Modes?


Best regards,

Kostas and Emma