Re: [IPsec] Fwd: New Version Notification for draft-sprasad-ipsecme-labeled-ipsec-00.txt (fwd)

"Hu, Jun (Nokia - US/Mountain View)" <jun.hu@nokia.com> Wed, 07 March 2018 04:19 UTC

Return-Path: <jun.hu@nokia.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54858126DED for <ipsec@ietfa.amsl.com>; Tue, 6 Mar 2018 20:19:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level:
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gLPXLbwyLOoi for <ipsec@ietfa.amsl.com>; Tue, 6 Mar 2018 20:19:03 -0800 (PST)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0132.outbound.protection.outlook.com [104.47.0.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF2C3126DD9 for <ipsec@ietf.org>; Tue, 6 Mar 2018 20:19:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=CKPQHqUBuSBgXNh/aDJq6vUgRYoJivJFoJgEANocUkc=; b=aaV59qkkWQYElX8mK+7e+ItpRlULgjzDp0w43/mcuyo4jaPJ0KPOg75W2DEumhksLoy7nl07zzXOYu/vy7pXnllRrq6XjRsfEtHZyABcB9jFkDw1z8IupSRYcf+E30WLcThoyE/AX+VyN6jS59wVGva2MRgg0dcdbGzct0zEIVE=
Received: from AM4PR07MB3153.eurprd07.prod.outlook.com (10.171.188.142) by AM4PR07MB3298.eurprd07.prod.outlook.com (10.171.189.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.567.6; Wed, 7 Mar 2018 04:19:00 +0000
Received: from AM4PR07MB3153.eurprd07.prod.outlook.com ([fe80::296d:e6a1:bfb4:33e1]) by AM4PR07MB3153.eurprd07.prod.outlook.com ([fe80::296d:e6a1:bfb4:33e1%4]) with mapi id 15.20.0567.011; Wed, 7 Mar 2018 04:19:00 +0000
From: "Hu, Jun (Nokia - US/Mountain View)" <jun.hu@nokia.com>
To: Paul Wouters <paul@nohats.ca>
CC: "ipsec@ietf.org WG" <ipsec@ietf.org>, Sahana Prasad <sahana.prasad07@gmail.com>
Thread-Topic: [IPsec] Fwd: New Version Notification for draft-sprasad-ipsecme-labeled-ipsec-00.txt (fwd)
Thread-Index: AQHTtJeqhTVG2/q3s0KFzP/xTL/aWKPD2ouggAAqSoCAACVpAA==
Date: Wed, 07 Mar 2018 04:19:00 +0000
Message-ID: <AM4PR07MB315383951AFB18129703ABD395D80@AM4PR07MB3153.eurprd07.prod.outlook.com>
References: <alpine.LRH.2.21.1803051033400.28097@bofh.nohats.ca> <AM4PR07MB3153B78E7DD0C4DE89144F1595D90@AM4PR07MB3153.eurprd07.prod.outlook.com> <alpine.LRH.2.21.1803062039230.22758@bofh.nohats.ca>
In-Reply-To: <alpine.LRH.2.21.1803062039230.22758@bofh.nohats.ca>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [2601:646:8780:b0d4:c02f:3267:16e2:a8ce]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR07MB3298; 7:inTGBg8xihCNeZXjmi4tjdKKsGUlWTn9BS426NhZCFjWMe9c6JM6PCbkzmvvqUrhy1KpY07TQMESlh0g2CfNSDBAFJ5P8TJmXbJt8NjOni0+0TQL2CO4MCCdDPiTdb8FzJGyRBhtNFev2hLNzH2He2lyu4Iq2xPzHlXpYcKlSKH94aLFpgRoP3J+mum77EkF+vEhK/HhMXuLPUrnyvXTxzyM/0pMTidR2PFtin1OcEMgkDeW/8tP74KpASe6G6TC
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 3a851189-e5fc-4ac8-ea30-08d583e28d8f
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020); SRVR:AM4PR07MB3298;
x-ms-traffictypediagnostic: AM4PR07MB3298:
x-microsoft-antispam-prvs: <AM4PR07MB3298B98A823A9591D7406BB195D80@AM4PR07MB3298.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(192374486261705)(82608151540597)(85827821059158);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3231220)(11241501184)(806099)(944501244)(52105095)(3002001)(6055026)(6041288)(20161123564045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(6072148)(201708071742011); SRVR:AM4PR07MB3298; BCL:0; PCL:0; RULEID:; SRVR:AM4PR07MB3298;
x-forefront-prvs: 0604AFA86B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(39860400002)(39380400002)(346002)(376002)(366004)(13464003)(199004)(189003)(305945005)(74316002)(25786009)(39060400002)(229853002)(2950100002)(15650500001)(8936002)(5250100002)(97736004)(5660300001)(105586002)(81166006)(6346003)(106356001)(59450400001)(8676002)(6916009)(81156014)(14454004)(54906003)(186003)(4326008)(6506007)(2900100001)(102836004)(53546011)(6116002)(6436002)(3280700002)(76176011)(7696005)(316002)(68736007)(46003)(53936002)(7736002)(6246003)(86362001)(9686003)(3660700001)(478600001)(55016002)(99286004)(2906002)(33656002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM4PR07MB3298; H:AM4PR07MB3153.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jun.hu@nokia.com;
x-microsoft-antispam-message-info: EwpJFtfrBy/nHSfDT2LoPmqjG4Ju6WkOErZCec9fGIinjol7rAdBXpyzGiWQRyTUG9rLeMVhHXtbJ3tcvQxnq2em/mA5Bf/KhTzSnioP4zsOcJRLPWJBI1NANjSQ/7rMI0z2hpsc9Mu9vV/3wFQzONHjv9/u3+QaRIjxGY3oSNKfQ7h62OmCtM+NFOfomPpoC55AEh5HUp9W7ikMKSp5foLLZ8iWVZDfvuXefwlaVcl9nH7Ka5zYfOvoEMPmTcvVqr+ebdaVDTBIxepgfVtsl/BF2iPTqM1UDKqgjJgiYAQu5efn+PZyubkMK+bcE6+CtTuk2GELUj5+kVXEc7HeEUA/dOkQBSBjcOc0KiJ6ZznInRNKK3XKtmmsweSK0b3f
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3a851189-e5fc-4ac8-ea30-08d583e28d8f
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2018 04:19:00.2089 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR07MB3298
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/5d6rkLK7nrr6XTsCstTu0y07REk>
Subject: Re: [IPsec] Fwd: New Version Notification for draft-sprasad-ipsecme-labeled-ipsec-00.txt (fwd)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Mar 2018 04:19:05 -0000

> -----Original Message-----
> From: Paul Wouters [mailto:paul@nohats.ca]
> Sent: Tuesday, March 06, 2018 5:53 PM
> To: Hu, Jun (Nokia - US/Mountain View) <jun.hu@nokia.com>
> Cc: ipsec@ietf.org WG <ipsec@ietf.org>; Sahana Prasad
> <sahana.prasad07@gmail.com>
> Subject: RE: [IPsec] Fwd: New Version Notification for draft-sprasad-ipsecme-
> labeled-ipsec-00.txt (fwd)
> 
> On Tue, 6 Mar 2018, Hu, Jun (Nokia - US/Mountain View) wrote:
> 
> > Some initial questions/comments:
> > 1. security label is defined as opaque data in the draft, but then how
> > would narrowing work in an inter-op way with opaque data? Or should we
> > define the format for some common use cases (like security
> > enforcement, QoS ...) , and adding a sub-type in TS_SECLABEL
> 
> The idea was that people should be able to define this outside of IKE as they
> wish. And IKE just transports the label as-is. Of course, if IKE can interpret it to
> do something, then it can possibly do more, like narrowing.
> 
> I think usually the two endpoints will only have one type of SECLABEL, so the
> type is implicit to the IKE protocol. If you have different subtypes, then
> presumably if the subtype is wrong, you can't accept it, so the type is already
> known on both ends and doesn't need to have its own registry?
> 
[HJ] sound like you want to treat this as vendor specific, I am fine if for certain use case you don't want to include interpretation of SECLABLE in the draft;
But for certain common use case, like Qos (or service class), if we want implementation from different vendor to inter-op, we should define a clear format for it; either in this draft, or we could have separate draft to define use case ,format and narrowing rule;
That's why I think we could have a sub-type here, leave one value for vendor specific, but define some other sub-types for common use cases


> > 2. currently there are TSi (44) and TSr (45) payload, does it make sense to
> include TS_SECLABEL in either TSi or TSr? Is there semantic to have separate
> "initiator SECLABEL" and "responder SECLABEL"? Or does it make more sense
> to only allow single TS_SECLABEL per message/CHILD_SA, and create a new
> TS payload type , put TS_SECLABEL in it ?
> 
> That would be giving it another Payload Type. I think it is really a traffic
> selector type payload, and not a non-traffic-selector payload.
> 
> Even if it is true that the label on both ends have to always match.
> But that's kind of similar to address family always needing to match.
> 
> Although there might be a case where one end is allowed to send traffic with
> SECLABEL Foo, but not allowed to receive traffic with that label, where TSi
> could contain a TS_SECLABEL entry, and TSr would not.
> 
> Another case that probably needs some attention is when there is more then
> one TS_SECLABEL. Does it mean two different types of security labels are
> meant, and both have to match? Or is it okay to pick any one of the labels?
> 
[HJ] again, I think this depends on the use case of SECLABEL, in case of service class, single SECLABEL make sense, but for other cases, maybe two different label make sense 
> Paul