Re: [IPsec] Fwd: New Version Notification for draft-xu-risav-02.txt

Ben Schwartz <bemasc@google.com> Fri, 21 October 2022 20:58 UTC

Return-Path: <bemasc@google.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A158C152708 for <ipsec@ietfa.amsl.com>; Fri, 21 Oct 2022 13:58:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -22.607
X-Spam-Level:
X-Spam-Status: No, score=-22.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BHloVbqVjohk for <ipsec@ietfa.amsl.com>; Fri, 21 Oct 2022 13:58:12 -0700 (PDT)
Received: from mail-wr1-x42a.google.com (mail-wr1-x42a.google.com [IPv6:2a00:1450:4864:20::42a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 661F7C1522A2 for <ipsec@ietf.org>; Fri, 21 Oct 2022 13:58:06 -0700 (PDT)
Received: by mail-wr1-x42a.google.com with SMTP id bv10so6858353wrb.4 for <ipsec@ietf.org>; Fri, 21 Oct 2022 13:58:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=YNYngW+KF3UkwNEQ5ajquQ1Ic+eEiOcFfyjkY/nWqGs=; b=XllbYILlwr0L0EHAzFOlRQZDdIxh28UkE4PchRqY3Ox4dyZJMu4aePdpQ+Ysstg+j0 ofdpRSEI8df5B+assWZXLIR9/vEAZhHtff6HVwDIeHaTB4oy/pj9piEBQGn3vT70qHSB hCSNlQvQIO/AQv2346UCs4E2TquvH2n6Zsn5whp1oO6Iw2s17Fiw8v7+asmOEYVw1cql td09UBUv0/mApxsUgwcETDB3OPlmC7fv5mvSmHuJEC6b28PPJpHjNcXq+TKzKj8KRIb3 1ZXWJeAk0XaJvVIOA/aOrRf31pDw0xC7F//8695PRo3Hu9HoSQXsnEfRuxt9gbdHlghD JfVA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=YNYngW+KF3UkwNEQ5ajquQ1Ic+eEiOcFfyjkY/nWqGs=; b=CouVG2xvQtxEiTIAvw2akMjtGdkLtForGktYxrsRsDxy80N5OqnD+qrr/oOO6RwyJl zj5ypfkp+IBPqn1oqTolmCXpDavFSTLeO6oZcMchvbpZJ1iZXK5HFySwOuazXy/heuKI Q1tSC0qXTBatX5mK3Nx8KbL71Gm7kf3LdgT/idC5LC9ZEX9/hS0PaN1JC4dtVgSwFYz7 ZEmIPhHq2b2pY1fdSQwv/bHD204yl35/HL/raIRajvpjTEd0fZDKlVf22fMbXrBecyFr 4PArf/i+I2qiaQK8c78Y8awAFRlLV9ckKrpt5wm6ePWPyJ+N7X0SKJS2YSuBgMaif+6u E3Rg==
X-Gm-Message-State: ACrzQf3OWl1PujhURxSuGjbfGVmRDYfsoUTn5SZ6N9+F2qwxU7gyzV+q lJ52sn/zdXuMlptBjq9T+P3H/TDl4lui6G6YL09MidQw1jE=
X-Google-Smtp-Source: AMsMyM7VpzdLgJQ6i54BbDMeTHP1baOUYno8g/VOGROSgsDgVyW8vP4xNoxDnvrOodcrlC+tE5TWVPM5tMvXmBQxnkk=
X-Received: by 2002:adf:f491:0:b0:235:894e:8d6c with SMTP id l17-20020adff491000000b00235894e8d6cmr7393103wro.209.1666385884190; Fri, 21 Oct 2022 13:58:04 -0700 (PDT)
MIME-Version: 1.0
References: <166627504630.62717.5060565830910515294@ietfa.amsl.com> <CAHbrMsCZR6_a2QJmh5CWVPzhepbktFQmvWJAAVRBqEfbdELZKA@mail.gmail.com> <516851.1666381420@dyas>
In-Reply-To: <516851.1666381420@dyas>
From: Ben Schwartz <bemasc@google.com>
Date: Fri, 21 Oct 2022 16:57:51 -0400
Message-ID: <CAHbrMsBOO2DEafqVFJk-r98s1_XuVBaXrz5kz6GdB5ZW2ueMkA@mail.gmail.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: ipsec@ietf.org
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="000000000000b7921405eb91b27e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/GUod6RTG1Y9bE5HoZkBtID1LCac>
Subject: Re: [IPsec] Fwd: New Version Notification for draft-xu-risav-02.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2022 20:58:16 -0000

On Fri, Oct 21, 2022 at 3:43 PM Michael Richardson <mcr+ietf@sandelman.ca>
wrote:

>
> Ben Schwartz <bemasc=40google.com@dmarc.ietf.org> wrote:
>     > We've just put out an extensively revised version of our RISAV
> proposal
>     > (the I stands for IPsec).  We'd like to start getting feedback from
> the
>     > IPsec experts.  We're also hoping to present this idea and solicit
>     > feedback at IETF 115.
>
> Thanks.
> The question of what kind of tunnel or transport is a deep one, and whether
> or not to encapsulate the traffic within an IP header has significant
> architecture discussion.  Despite the experience of SR6 pushing through,
> I'm
> not convinced that 6man will buy your use case.


I'm aware that AH is not well-loved.  Certainly ESP (which is also allowed)
is easier to understand.

The real motivation to support AH in this draft comes down to MTU
overhead.  Going from 24 bytes of MTU loss to 73 bytes seems potentially
significant, especially because:

* The traffic volumes involved are potentially very large (ideally a
majority of "backbone" traffic)
* We don't have a way to measure MTU, leading to the risk that the inner
MTU could be <1280 (if the transit link has very small MTU, which I believe
is rare).  The larger the MTU loss, the more of a concern this is.

There are some interesting
> opportunities for privacy and defeating traffic analysis by adding an IP
> header.  The IPTFS work (now in the RFC-editors Q
> https://www.rfc-editor.org/current_queue.php#draft-ietf-ipsecme-iptfs )
> also offers some interesting opportunities.
>

Thanks for mentioning IPTFS.  I'll try to understand it...

    > This is an early stage proposal with a lot of open questions (many of
>     > which are noted in the draft), but the core idea is simple: use RPKI
> to
>     > bootstrap an authenticated IPsec association between the source and
>     > destination ASes of Internet traffic, so that inauthentic packets can
>     > be discarded before they reach their destination.
>
> But, what about: https://www.rfc-editor.org/rfc/rfc9255.html
> It seems like you are trying to use RPKI for something which the RPKI
> people
> don't want you do to.  (I mostly disagree, btw)
>

I actually think RISAV uses RPKI for exactly the thing that RFC 9255 wants:
directing IP packets to the corresponding AS number.

I see from the content in section 2.2 that you have an EE cert for the ACS.
> I'm a bit unclear about whether step 1 is already the RPKI, or some new
> process.
>

Yes, it's from the RPKI.

It seems that one would want many ACS systems. If successful, all of the
> traffic between AS A and B would go through, and that could easily exceed
> the
> bandwidth of a single system (or a single cluster).


Yes, I believe the ACS can probably be implemented as a global anycast, so
long as route flapping doesn't make IKEv2 impossible.

Since AS A/B may
> interconnect in many places, on many continents, they need many tunnels.
>

Maybe not.  A single shared secret between the two networks, known to all
their border routers, ought to be enough to encrypt and decrypt each
packet, and the packets can be routed however they are routed.

The draft notes some interesting questions about how sequence numbers work
in this situation.  The best solution I came up with was to put the source
IP into the "Additional Data" of the AEAD (or equivalent), but this seems
like it would need a new IKEv2 extension.


> I think that this invokes the entire MED debate in BGP4, which I'm really
> out-to-date on, but AFAIK, isn't solved.  Maybe adding IKEv2 provides
> opportunities to make better policy decisions.
>
> There are shades of RFC4322 in these ideas, but not the same.
>

More homework...

Also, if universally successful, does this suddenly change how the DFZ
> looks?
> Does it have to carry all of the routes to all of the places, or only the
> routes to the ACS/ASBR?
> Can you drop all IPv4 and just encapsulate to IPv6?
> Is there a win in simplifying silicon here?
>

If RISAV in tunnel mode were adopted universally, it would definitely
simplify routing.  That seems like a pretty silly hypothetical though.  The
whole point of RISAV is that it's highly incrementally deployable.  Even if
just two random ASes in the whole world turn it on, it should work for them
without any help from anyone else.

}4.1.  Transport Mode
> }
> }   To avoid conflict with other uses of IPsec, RISAV defines its own
> }   variant of the IPsec Authentication Header (AH).  The RISAV-AH header
> }   format is shown in Figure 2.
>
> This is really dumb. Don't do this.
> There are only conflicts because you think you are insert the header.
> You can't and you shouldn't.  You really should create a tunnel with AH.
>

Wait, what's a tunnel with AH?  I've heard of "ESP without encryption", but
I've never heard of "AH but it's a tunnel".


> AH has the advantage that everyone knows it's AH, so skipping the outer
> header and the AH means you can find the inner IP and do auditing or flow
> analysis on it.  Since you have to modify hardware to do something, you
> might
> as well do this.
>

I don't know what you're advising, but my main question is about the MTU
overhead.


> }7.3.  MTU
> }
> }      TODO: Figure out what to say about MTU, PMTUD, etc.  Perhaps an
> }      MTU probe is required after setup?  Or on an ongoing basis?
>
> The answer is probably to do IPTFS, but that is in conflict with using AH.
>

OK, will review IPTFS.