Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

Paul Wouters <paul.wouters@aiven.io> Wed, 10 November 2021 00:20 UTC

Return-Path: <paul.wouters@aiven.io>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36DFC3A0CD4 for <ipsec@ietfa.amsl.com>; Tue, 9 Nov 2021 16:20:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aiven.io
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KaUmOAXXxYzj for <ipsec@ietfa.amsl.com>; Tue, 9 Nov 2021 16:20:18 -0800 (PST)
Received: from mail-ed1-x52f.google.com (mail-ed1-x52f.google.com [IPv6:2a00:1450:4864:20::52f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7538D3A0CD0 for <ipsec@ietf.org>; Tue, 9 Nov 2021 16:20:18 -0800 (PST)
Received: by mail-ed1-x52f.google.com with SMTP id ee33so3277347edb.8 for <ipsec@ietf.org>; Tue, 09 Nov 2021 16:20:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aiven.io; s=google; h=date:from:to:cc:subject:in-reply-to:message-id:references :mime-version; bh=s9nb4NNp5XcJUdMq47UVOs7rK3uWdTNejbbsCGtqW1A=; b=GyhaOR8nfTYGI/r90gb6cyevGYtqSjZ9owawqKCem3G+grgjMd26oFeX1hW2qOdEKX cUuI6WO8r4MwmVeGT4t0na1zLMja/5xcYrcF1Yb/XatFood8zZBxtUA3bZzIQP2NkpPa nkNhQZm8gDMMe4y97AoWmU+Ha2FymMd5hXuXs=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:mime-version; bh=s9nb4NNp5XcJUdMq47UVOs7rK3uWdTNejbbsCGtqW1A=; b=x6oWX4IIS0/uxDD6at2bI0BBJx+f5CLJZ/Luo+EUdZDpogrTpQHs9eLujYpT3Dmzup uEWvjSIc8wlv1FPHrGyjfEJuMWtzdKBPv7DvGmuNAYaEXQgJmWB0sLjrIIYNEzwiG0Ol 8BHkzQHCyUsuAf/H4Fq5XMSo1HHg/kLZxmkEn5Ydb2NnPoUt8IGmiT45tfaT8abFqkhR vQV99srK8uyMzSm5N16P8dcwUsr5MHaLmwQYjJwVdZ4F4JOUWyecy1FMrtHrbvkxHLkr jDHgtmjt58tAj2crlcMlRDEQdnKFL2JQn//YAmre65/aLWnozWYPVHs0n5T+01HJvSEV xgXA==
X-Gm-Message-State: AOAM532OU4qNSXvhwhJjzqx/oUNRwjbLcufqVXnVhgLo8VCNut9tsF9G j3PuPnUiIpGcfvSrx2WGZf1aDSl9InMf+9eQ8Kxo4g==
X-Google-Smtp-Source: ABdhPJxw1cSLl6sZlOlNsFe4dP1JsMwcN8e7qCQyJR1SFuPHa0OJFDY8SZWWzjbZ4xWSU/LuSyLdWw==
X-Received: by 2002:a05:6402:17c6:: with SMTP id s6mr16139806edy.11.1636503614680; Tue, 09 Nov 2021 16:20:14 -0800 (PST)
Received: from bofh.nohats.ca (bofh.nohats.ca. [193.110.157.194]) by smtp.gmail.com with ESMTPSA id e19sm3417911edu.47.2021.11.09.16.20.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Nov 2021 16:20:14 -0800 (PST)
Date: Tue, 09 Nov 2021 19:20:10 -0500
From: Paul Wouters <paul.wouters@aiven.io>
To: mohamed.boucadair@orange.com
cc: "ipsec@ietf.org" <ipsec@ietf.org>, "draft-btw-add-ipsecme-ike@ietf.org" <draft-btw-add-ipsecme-ike@ietf.org>, Tero Kivinen <kivinen@iki.fi>
In-Reply-To: <23906_1636459418_618A639A_23906_93_6_787AE7BB302AE849A7480A190F8B93303544C625@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Message-ID: <ee27dc52-b8a4-c926-ec0-d8479b3a285@nohats.ca>
References: <24969.12660.103330.619294@fireball.acr.fi> <ccdfdc-634-5989-839b-3cbd17e86d99@nohats.ca> <3996_1636386534_618946E6_3996_297_6_787AE7BB302AE849A7480A190F8B93303544BD42@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <88f8206a-6c2-5816-ada3-e8666ec05e38@nohats.ca> <23906_1636459418_618A639A_23906_93_6_787AE7BB302AE849A7480A190F8B93303544C625@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/SeLT93QhoFkn6AnQFe0MMSaIooQ>
Subject: Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Nov 2021 00:20:23 -0000

On Tue, 9 Nov 2021, mohamed.boucadair@orange.com wrote:

>> Note that what I said there was that you should not update the _mechanism_
>> of how CFG requests/responds are done. You should use the existing
>> mechanism with a new value, but use the same negotation mechanism.
>>
>> So the client sends FOO(x) and the server respones with FOO(y)
>>
>> x can be empty (eg the client has no previous notion or preference for
>> FOO. Or if it has one, it can suggest it. The server takes that value only
>> as a preference of the client, but the server is the one making the
>> ultimate decsion if it returns "x" or "y".
>>
>> So your draft should not say the initiator MUST send a zero size request
>> for FOO.
>
> [Med] We are not saying that in the draft.

Section 3.1 states:

o  Length (2 octets, unsigned integer) - Length of the data in
       octets.  In particular, this field is set to:

       *  0 if the Configuration payload has types CFG_REQUEST or
          CFG_ACK.


So it says for a CFG_REQUEST the length is 0.

> That is changing the mechanism.
>>
>> What I was saying in my last email was that making a protocol update where
>> a server receiving a INTERNAL_IP4_DNS may choose not to return any
>> INTERNAL_IP4_DNS is an update to the protocol that would require the
>> Updates: clause to warn implementers to read this document too, as it
>> updates older RFC text.
>
> [Med] OK.

But note that I rather that the responder just responds to the received
CFG requests with CFG replies it supports and has data for. So if the
client asks for INTERNAL_IP4_DNS and ENCDNS_IP4, the responder should
return both with values. I also think that in case the encrypted DNS
fails, it would be good for the IKEv2 client to have the INTERNAL_IP4_DNS
as fallback option. Say if the TLS fails for some reason (incompatible
algorithms, expired TLS certificate, DoH server down, etc)

>>> [Med] Older clients can always ask for INTERNAL_IP6_DNS or
>> INTERNAL_IP4_DNS. We will update the note to make this clearer.
>>
>> They can indeed. So I think you should just stick with the CFG
>> request/response semantics and not talk about omitting INTERNAL_IP*_DNS
>> replies if the client asks for those via CFG. This way, the ENC_DNS*
>> payloads are simply defined as new CFG options, and clients and servers
>> will do the right thing when encountering them. And it requires no
>> Updates: clause because it does not modify the behaviour with respect to
>> INTERNAL_IP*_DNS. You might want to say a client SHOULD prefer ENC_DNS*
>> servers over INTERNAL_IP*_DNS servers.
>
> [Med] That's one approach. The one we have in the draft is to enforce a policy at the responder side:
>
>      The behavior of the responder if it receives both ENCDNS_IP* and
>      INTERNAL_IP6_DNS (or INTERNAL_IP4_DNS) attributes is policy-based
>      and deployment-specific.  However, it is RECOMMENDED that if the
>      responder includes at least one ENCDNS_IP* attribute in the reply,
>      it should not include any of INTERNAL_IP4_DNS/INTERNAL_IP6_DNS
>      attributes.
>
> This policy allows for more control vs. providing both to the client + let the client decide.

The client can just omit asking for ENCDNS_IP* to get INTERNAL_IP*_DNS
anyway. I don't think the policy should be encoded in how we return
Configuration Payload information. If you want to convey policy, you
should make it part of the CFG payload.

> This is an item for discussion/agreement when the document is adopted. Point recorded. Thanks.

We don't need to wait for adoption to discuss this. Others can chime in any time :)

Paul