Re: [IPsec] AD review of draft-ietf-ipsecme-ipv6-ipv4-codes-04

mohamed.boucadair@orange.com Wed, 21 October 2020 08:31 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B0DC3A137A; Wed, 21 Oct 2020 01:31:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1jn6u4Mf4toB; Wed, 21 Oct 2020 01:31:07 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D859E3A1378; Wed, 21 Oct 2020 01:31:06 -0700 (PDT)
Received: from opfedar04.francetelecom.fr (unknown [xx.xx.xx.6]) by opfedar25.francetelecom.fr (ESMTP service) with ESMTP id 4CGNxP1WnCz8yMB; Wed, 21 Oct 2020 10:31:05 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1603269065; bh=8EEgKPAS/fA/NpSYromf3RsXTC+TQqZYneBkxk+Si3g=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=FhK0p5Y2bppkwEAxr+l0a+/ZHg5patfP8zCb69Vz9U1j1cSNL8oEXjadrXObJwD0U kXvjlqSW8JchXAwgpL5iYzOBDIEtGJ9S/SfyzoBbpZyrsK4+q5+jj8ASVD24zvJElX 4/j4qlLjCmYDJNMer0HLH7sdWQLichX6CuPe3Cdd8TZFnkcqCTtFF/dRGniyM2gY/o a6CGuBGr9qb7hJ/3eZlyb630Cun781zqMJ0rqiVtHaliWDkEz8hJYrtTpfPdR+YDtn LO+f1MHDyZwLnHaQizHoCxn793RSFzfXAHrkeCqmTEj34vCti7ytGeZJm1ieZZuyMZ JkbgpmVOAZjIA==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.89]) by opfedar04.francetelecom.fr (ESMTP service) with ESMTP id 4CGNxP0LM3z1xpZ; Wed, 21 Oct 2020 10:31:05 +0200 (CEST)
From: mohamed.boucadair@orange.com
To: Benjamin Kaduk <kaduk@mit.edu>, "draft-ietf-ipsecme-ipv6-ipv4-codes.all@ietf.org" <draft-ietf-ipsecme-ipv6-ipv4-codes.all@ietf.org>
CC: "ipsec@ietf.org" <ipsec@ietf.org>
Thread-Topic: AD review of draft-ietf-ipsecme-ipv6-ipv4-codes-04
Thread-Index: AQHWpxsmM6h8wTGDt0OBCAF0O7EDDamhml9Q
Date: Wed, 21 Oct 2020 08:31:04 +0000
Message-ID: <29839_1603269065_5F8FF1C9_29839_37_11_787AE7BB302AE849A7480A190F8B9330315642A2@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <20201020195628.GP39170@kduck.mit.edu>
In-Reply-To: <20201020195628.GP39170@kduck.mit.edu>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/QIjtlU6bdlLH7sNRFmgDX8FgExA>
Subject: Re: [IPsec] AD review of draft-ietf-ipsecme-ipv6-ipv4-codes-04
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Oct 2020 08:31:12 -0000

Hi Ben, 

Thank you for the review.

An updated version is available at: https://tools.ietf.org/html/draft-ietf-ipsecme-ipv6-ipv4-codes-05.  

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Benjamin Kaduk [mailto:kaduk@mit.edu]
> Envoyé : mardi 20 octobre 2020 21:56
> À : draft-ietf-ipsecme-ipv6-ipv4-codes.all@ietf.org
> Cc : ipsec@ietf.org
> Objet : AD review of draft-ietf-ipsecme-ipv6-ipv4-codes-04
> 
> Hi Med,
> 
> Not a whole lot to comment on here, but probably we should publish a
> new revisionn to tidy things up before asking for IETF LC.
> 
> Thanks,
> 
> Ben
> 
> %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
> %
> 
> We use the term "dual-stack" several times but it is not defined
> explicitly.  While this is certainly a common and fairly well-known
> concept, perhaps we should drop an "IPv6/IPv4" in somewhere (or add
> a reference?  I'm not sure what reference would be good, offhand).

[Med] Added text to explain this. 

> 
> There seem to be a few places where we use the phrase "status type"
> without preceding "notification"; would it make sense to normalize
> the language around "notification status type"?

[Med] Agree. Fixed. 

> 
> Section 3
> 
>    Section 3.15.4 of [RFC7296] defines a generic notification error
> type
>    that is related to a failure to handle an address assignment
> request.
>    That error type does not explicitly allow an initiator to
> determine
>    why a given address family is not assigned, nor whether it should
> try
>    using another address family.  INTERNAL_ADDRESS_FAILURE is a
> catch-
>    all error type when an address-related issue is encountered by an
>    IKEv2 responder.
> 
>    INTERNAL_ADDRESS_FAILURE does not provide sufficient hints to the
>    IKEv2 initiator to adjust its behavior.
> 
> I feel like we might also want to mention that (per 7296), "[t]he
> responder sends INTERNAL_ADDRESS_FAILURE only if no addresses can be
> assigned", and in many of the indicated use cases, the responder can
> successfully assign *one* address, just not the full requested set,
> so INTERNAL_ADDRESS_FAILURE is explicitly not useful.
> 

[Med] Tweaked that part to include the text you quoted. The explanation text covers this case as well.

> Section 5
> 
>    If the initiator is dual-stack, it MUST include both address
> families
>    in its request (absent explicit policy/configuration otherwise).
> 
> By "both address families" we mean "both the IP6_ALLOWED and
> IP4_ALLOWED notification status types"?  Or are we talking about
> something else, like a configuration payload?

[Med] This is typically INTERNAL_IP4_ADDRESS and INTERNAL_IP6_ADDRESS attributes. The attributes are not listed as I would like to cover (the experimental attribute) INTERNAL_IP6_PREFIX (or future attributes to achieve the same functionality).

Updated the text to point to Section 3.15 of 7296.  

> 
> It is perhaps surprising that we only impose the requirement for the
> initiator to send these notifications specifically on dual-stack
> initiators; a generic protocol update might typically impose a
> requirement to always send your capabilities, whether dual-stack or
> single-stack.

[Med] These notifications are not sent by the initiator. The default behaviour for a dual-stack initiator is to request both IPv4 and IPv6 connectivity. This behaviour can be restricted by policy. In such case, the initiator will only request the connectivity that adheres to its local policy (e.g., IPv6-only).

  In particular, the table seems to imply that the
> initiator will still send something to indicate the requested AF in
> the single-requested-AF case (which need not be dual-stack); is this
> something other than IP<N>_ALLOWED?

[Med] Yes. This is inferred from the INTERNAL_* attributes listed above. Added NEW text to make this clear. 

> 
>    If the initiator only receives one single notification
> IP4_ALLOWED or
>    IP6_ALLOWED from the responder, the initiator MUST NOT send a
> request
>    for an alternate address family not supported by the responder.
> 
> What is the scope of this "MUST NOT"?  Other CREATE_CHILD_SA on the
> same parent IKE SA?

[Med] Yes. Made this change: s/request/subsequent request. 

  Ever to the same responder?
> 
>    If a dual-stack initiator requests only an IPv6 prefix (or an
> IPv4
>    address) but only receives IP4_ALLOWED (or IP6_ALLOWED)
> notification
>    status type from the responder, the initiator MUST send a request
> for
>    IPv4 address(es) (or IPv6 prefix(es)).
> 
> [related to the earlier comment about only requiring dual-stack
> initiators to send, at the start of the section we said that a dual-
> stack initiator MUST include both address families...]

[Med] This is about covering the case where a policy is provided and the default behaviour is not followed. 

> 
> Section 6
> 
> I think a phrasing like "since the IPv4/IPv6 capabilities of a node
> are readily determined from the traffic it generates, this document
> does not introduce any new security considerations compared to the
> ones described in [RFC7296], which continue to apply" might be more
> conventional.  (I don't object to the current phrasing, though.)

[Med] I prefer yours. Fixed. Thanks. 


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.