Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

mohamed.boucadair@orange.com Thu, 11 November 2021 09:12 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D2333A0898; Thu, 11 Nov 2021 01:12:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.089
X-Spam-Level:
X-Spam-Status: No, score=-2.089 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nXM0q02766de; Thu, 11 Nov 2021 01:12:04 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1554F3A0814; Thu, 11 Nov 2021 01:12:04 -0800 (PST)
Received: from opfedar00.francetelecom.fr (unknown [xx.xx.xx.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar20.francetelecom.fr (ESMTP service) with ESMTPS id 4HqbZV2WQZz8tHN; Thu, 11 Nov 2021 10:12:02 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1636621922; bh=MO/t+b/vzKsrUzwF9UWoBfm3Q/FoMatSg/FXzSkLqGc=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=s5zQZL2dkdR6ozEK0xzZQmdm6diZO3K3LPdR5NJBbvrwk/IJJF0/tKPHkiFLYo/ej ZchFiLi7VQI85U9ri0TR/horF36XlCQoFrAw+tWSEVzXZrtZq7z1CeLUNkM+H8mDzY k8bnJizmdai9MTkmzF+NI3ukd7B49MiCR9swHUzjwNk40fYLjocM/3oWFbTxt9nhQC 0HPc3/lmnunfSQjIAlJELad8U3AQ9AonxkeWzMPnwEAwNgM0zLxW3E2x76a8dndq5W Nc7q8OpqgAXrTciIMZw2eGNehMdWdWLG7W/kJsMpHld33MN0zHBWOZ1CYLFhMNgpmf rjxC/cW0DDNoA==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfedar00.francetelecom.fr (ESMTP service) with ESMTPS id 4HqbZV19XQzCqk7; Thu, 11 Nov 2021 10:12:02 +0100 (CET)
From: mohamed.boucadair@orange.com
To: Paul Wouters <paul@nohats.ca>
CC: Paul Wouters <paul.wouters@aiven.io>, "ipsec@ietf.org" <ipsec@ietf.org>, "draft-btw-add-ipsecme-ike@ietf.org" <draft-btw-add-ipsecme-ike@ietf.org>, Tero Kivinen <kivinen@iki.fi>
Thread-Topic: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
Thread-Index: AQHX1oGZi4Q33A1l1EiWwu9gm8dljKv+B2Bg
Date: Thu, 11 Nov 2021 09:12:00 +0000
Message-ID: <7799_1636621922_618CDE62_7799_274_1_787AE7BB302AE849A7480A190F8B93303544FB36@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <24969.12660.103330.619294@fireball.acr.fi> <ccdfdc-634-5989-839b-3cbd17e86d99@nohats.ca> <3996_1636386534_618946E6_3996_297_6_787AE7BB302AE849A7480A190F8B93303544BD42@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <88f8206a-6c2-5816-ada3-e8666ec05e38@nohats.ca> <23906_1636459418_618A639A_23906_93_6_787AE7BB302AE849A7480A190F8B93303544C625@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <ee27dc52-b8a4-c926-ec0-d8479b3a285@nohats.ca> <19332_1636529432_618B7518_19332_252_1_787AE7BB302AE849A7480A190F8B93303544E768@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <67dbbdea-5110-90d0-4f6d-df6147a2cf38@nohats.ca>
In-Reply-To: <67dbbdea-5110-90d0-4f6d-df6147a2cf38@nohats.ca>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_SetDate=2021-11-11T09:11:59Z; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Name=Orange_restricted_external.2; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=2
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/i4E7TyCHNBnTMFcn_gvF15IymEY>
Subject: Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Nov 2021 09:12:16 -0000

Hi Paul,

Please see inline. 

Cheers,
Med


Orange Restricted

> -----Message d'origine-----
> De : Paul Wouters <paul@nohats.ca>
> Envoyé : mercredi 10 novembre 2021 23:24
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
> Cc : Paul Wouters <paul.wouters@aiven.io>; ipsec@ietf.org; draft-btw-add-
> ipsecme-ike@ietf.org; Tero Kivinen <kivinen@iki.fi>
> Objet : Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
> 
> On Wed, 10 Nov 2021, mohamed.boucadair@orange.com wrote:
> 
> >>>> So the client sends FOO(x) and the server respones with FOO(y)
> >>>>
> >>>> x can be empty (eg the client has no previous notion or preference
> >>>> for FOO. Or if it has one, it can suggest it. The server takes that
> >>>> value only as a preference of the client, but the server is the one
> >>>> making the ultimate decsion if it returns "x" or "y".
> >>>>
> >>>> So your draft should not say the initiator MUST send a zero size
> >>>> request for FOO.
> >>>
> >>> [Med] We are not saying that in the draft.
> >>
> >> Section 3.1 states:
> >>
> >> o  Length (2 octets, unsigned integer) - Length of the data in
> >>        octets.  In particular, this field is set to:
> >>
> >>        *  0 if the Configuration payload has types CFG_REQUEST or
> >>           CFG_ACK.
> >>
> >>
> >> So it says for a CFG_REQUEST the length is 0.
> >
> > [Med] This is the length of the ENCDNS_IP* attribute. This is used in
> requests to indicate that the client is requesting this attribute.
> 
> https://datatracker.ietf.org/doc/html/rfc7296#section-3.15.1
> 
>     The CFG_REQUEST and CFG_REPLY pair allows an IKE endpoint to request
>     information from its peer.  If an attribute in the CFG_REQUEST
>     Configuration payload is not zero-length, it is taken as a suggestion
>     for that attribute.  The CFG_REPLY Configuration payload MAY return
>     that value, or a new one.  It MAY also add new attributes and not
>     include some requested ones.  Unrecognized or unsupported attributes
>     MUST be ignored in both requests and responses.
> 
> I see no reason why ENCDNS_IP* should do this differently from all the
> other CFG attributes, especially INTERNAL_IP*_DNS.
> 

[Med] Zero-length is allowed for other configuration attributes, e.g., 

   o  SUPPORTED_ATTRIBUTES - When used within a Request, this attribute
      MUST be zero-length and specifies a query to the responder to
      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
      reply back with all of the attributes that it supports.

It is also allowed for INTERNAL_IP*_DNS:  

   o  INTERNAL_IP4_ADDRESS, INTERNAL_IP6_ADDRESS - An address on the
      internal network, sometimes called a red node address or private
      address, and it MAY be a private address on the Internet.  In a
      request message, the address specified is a requested address (or
      a zero-length address if no specific address is requested).
      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

We didn't include a suggested ADN/@ in the proposed ENCDNS_IP* for the sake of simplicity. We are open to relax this if the WG sees so. 

> 
> >> But note that I rather that the responder just responds to the
> >> received CFG requests with CFG replies it supports and has data for.
> >> So if the client asks for INTERNAL_IP4_DNS and ENCDNS_IP4, the
> >> responder should return both with values. I also think that in case
> >> the encrypted DNS fails, it would be good for the IKEv2 client to
> >> have the INTERNAL_IP4_DNS as fallback option. Say if the TLS fails
> >> for some reason (incompatible algorithms, expired TLS certificate,
> >> DoH server down, etc)
> >
> > [Med] The current version allows somehow for this as the behavior is
> policy-based. However, I understand that you prefer to systematically
> return both and leave the client decide. I can live with this as well.
> 
> The policy can be enforced by not returning INTERNAL_IP*_DNS payloads in
> the CFG_REPLY. Although if the client did not ask for ENCDNS_IP* and the
> server does not return INTERNAL_IP*_DNS, the client would not be able to
> get functional DNS.
> 
> I still believe the CFG mechanism is to exchange network topology
> information, and not network policy. But you can (ab)use it for that if
> you want. The protocol allows it without requiring the change that you
> suggest that the sender MUST use 0 length. And this requirement would
> force your policy onto everyone else who would be happy to let the client
> suggest something (eg 8.8.8.8 or 9.9.9.9) and have the responder maybe
> accept those as trustworthy.
> 
> In short, if this document just defines standard CFG REQUEST/REPLY for
> ENCDNS_IP* with no additional restrictions, everyone's use case is
> supported AND you don't have to Update: RFC 7296 because no existing
> behaviour is changed.

[Med] I still don't see why you think the document updates RFC 7296.  

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.