Re: [IPsec] Ben Campbell's Yes on draft-ietf-ipsecme-rfc7321bis-05: (with COMMENT)

<Paul.Koning@dell.com> Mon, 19 June 2017 15:41 UTC

Return-Path: <Paul.Koning@dell.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B93691293E1; Mon, 19 Jun 2017 08:41:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level:
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dell.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bXHxIbYgTroi; Mon, 19 Jun 2017 08:41:36 -0700 (PDT)
Received: from esa3.dell-outbound.iphmx.com (esa3.dell-outbound.iphmx.com [68.232.153.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6990D12F258; Mon, 19 Jun 2017 08:41:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dell.com; i=@dell.com; q=dns/txt; s=smtpout; t=1497886678; x=1529422678; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=b2UywURb8pjAcCP2e8ZaGpMfUDOhcglWdvWx/MeJzJM=; b=QNxB6hiTwwqWbK+4YuV2xNkFQnscIcyGcZXkTyY6fb+Ue/x5bkChknk8 VPsLKvgdPiNFV89PqnPy6FFeSXqtdmr3QsOHTWiZJPABHTZeQ4cWXSwIJ q+634HcShOWolWIbUBUSmBjCTjDTViyCThp3MQ71vbOjqid/J+q/I4wJz c=;
Received: from esa2.dell-outbound2.iphmx.com ([68.232.153.202]) by esa3.dell-outbound.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Jun 2017 10:37:55 -0500
From: Paul.Koning@dell.com
Received: from ausc60pc101.us.dell.com ([143.166.85.206]) by esa2.dell-outbound2.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Jun 2017 21:30:43 +0600
X-LoopCount0: from 10.0.2.213
X-IronPort-AV: E=Sophos;i="5.39,361,1493701200"; d="scan'208";a="1122191819"
To: ekr@rtfm.com
CC: paul@nohats.ca, draft-ietf-ipsecme-rfc7321bis@ietf.org, ben@nostrum.com, ipsecme-chairs@ietf.org, kivinen@iki.fi, ipsec@ietf.org, iesg@ietf.org, david.waltermire@nist.gov
Thread-Topic: [IPsec] Ben Campbell's Yes on draft-ietf-ipsecme-rfc7321bis-05: (with COMMENT)
Thread-Index: AQHS6Qq8cXwAfROIYUmdpSJAsUwYJKIsn+OAgAAGpwA=
Date: Mon, 19 Jun 2017 15:40:40 +0000
Message-ID: <C6AA68F9-D26C-4F24-80F0-D23602733CD9@dell.com>
References: <148962889979.14189.965850110922865986.idtracker@ietfa.amsl.com> <alpine.LRH.2.20.999.1703161300150.32675@bofh.nohats.ca> <22739.38728.808538.27709@fireball.acr.fi> <alpine.LRH.2.21.1706191026150.5777@bofh.nohats.ca> <CABcZeBM2ky_8fL9ya5bQfZy2L7NQCGyPQC6Y_FHDgCtBobF7nw@mail.gmail.com>
In-Reply-To: <CABcZeBM2ky_8fL9ya5bQfZy2L7NQCGyPQC6Y_FHDgCtBobF7nw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.177.49.166]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <0BDBF1AE62D91A45B01308E0838412D2@dell.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/dbdo4NbYXuwRoZ7prkV8r66XGtE>
Subject: Re: [IPsec] Ben Campbell's Yes on draft-ietf-ipsecme-rfc7321bis-05: (with COMMENT)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Jun 2017 15:41:39 -0000

> On Jun 19, 2017, at 11:16 AM, Eric Rescorla <ekr@rtfm.com> wrote:
> 
> 
> 
> On Mon, Jun 19, 2017 at 7:45 AM, Paul Wouters <paul@nohats.ca> wrote:
> 
> Paul Wouters writes:
> -3: I wonder why "... is not to be used..." is not "... MUST NOT be
> used...". But the section goes on to say if you do it anyway, you MUST
> NOT use certain cryptosuites. So, does "... is not to be used..." mean
> "SHOULD NOT"? Or is this one of those "MUST NOT BUT WE KNOW YOU WILL"
> sort of requirements?
> 
> It is indeed. I think a SHOULD NOT would actually be appropriate ?
> 
> We do not want to make the implementation of the manual keying MUST
> NOT, as it is still useful in testing and similar situations, but we
> do not want anybody using it in any real world use cases. As this
> document is mostly about the implementation and tries to stay out from
> the issues about what should be used (as explained in the 2nd
> paragraph of the section 1.3).

I still prefer MUST NOT.  

If we're goint to use SHOULD NOT, it needs to be accompanied by very explicit wording that directs test labs and authors of certification requirements documents that they are forbidden from having manual keying in their certification requirements.  We currently have the issue that some uninformed certification requirements documents do exactly this: force implementers to implement something we KNOW is wrong.  We end up writing stuff in the user manual along the lines of "NEVER use this option -- it exists only because of a certification requirement".  This is absurd, and it has to stop.


> ...
> NEW text:
> 
> 3.  Manual Keying
> 
> Manual Keying SHOULD NOT be used as it is inherently dangerous.
> Without any keying protocol, it does not offer Perfect Forward
> Secrecy ("PFS") protection. Without IKE, another entity needs to
> ensure refreshing of session keys, tracking SPI uniqueness and
> ensuring nonces or IVs are not used more then once. This document
> was written for deploying ESP/AH using IKE ([RFC7296]) and assumes
> that keying happens using IKE version 2 or higher.

That's ok so far as it goes, but I don't believe it is sufficient to correc the previous agency errors.

	paul