Re: [IPsec] #123: Proposal to remove the IANA tables from IKEv2bis

Paul Hoffman <paul.hoffman@vpnc.org> Sun, 29 November 2009 21:39 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: ipsec@core3.amsl.com
Delivered-To: ipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3011D3A69E1 for <ipsec@core3.amsl.com>; Sun, 29 Nov 2009 13:39:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.014
X-Spam-Level:
X-Spam-Status: No, score=-6.014 tagged_above=-999 required=5 tests=[AWL=0.032, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kif16akW-4H6 for <ipsec@core3.amsl.com>; Sun, 29 Nov 2009 13:39:49 -0800 (PST)
Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) by core3.amsl.com (Postfix) with ESMTP id 6E6173A6927 for <ipsec@ietf.org>; Sun, 29 Nov 2009 13:39:49 -0800 (PST)
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id nATLdc8C073392 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 29 Nov 2009 14:39:39 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p0624083bc73897fc279e@[10.20.30.158]>
In-Reply-To: <9195EB81DDEB4A6996DDE00700C9552F@chichi>
References: <p06240847c730db1c447f@[10.20.30.158]><19211.60135.834509.954897@fireball. kivinen.iki.fi><p06240860c731c8863b5c@[10.20.30.158]><19213.9738.693741.41 0069@fireball.kivinen.iki.fi><p06240822c7330cac6ace@[10.20.30.158]><19214. 26055.878779.973603@fireball.kivinen.iki.fi><p06240844c7346684fbdb@[10.20. 30.158]><7F9A6D26EB51614FBF9F81C0DA4CFEC801BDF88E0341@il-ex01.ad.checkpoin t.com> <p06240846c734be628c3a@[10.20.30.158]> <4A045CD937B940C08E6E32600C6EA52C@trustworks.com> <p06240801c735ad418c80@[10.20.30.249]> <F9AA46BC1265480795DD6AF5BC41CED7@chichi> <p06240822c736eda4a971@[10.20.30.158]> <9195EB81DDEB4A6996DDE00700C9552F@chichi>
Date: Sun, 29 Nov 2009 13:39:36 -0800
To: Valery Smyslov <svanru@gmail.com>, IPsecme WG <ipsec@ietf.org>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset="us-ascii"
Subject: Re: [IPsec] #123: Proposal to remove the IANA tables from IKEv2bis
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Nov 2009 21:39:51 -0000

At 12:19 AM +0300 11/30/09, Valery Smyslov wrote:
>>>For someone, who spent quite a lot of time working in this area, it is not
>>>difficult fo figure out what is really important and what is not. But, I think,
>>>a newcomer could be confused by a long list of all possible numbers.
>>
>>This answer is inconsistent, and that's the crux of the issue I have with your
>>concern. We very much want developers to look at the IANA registry;
>>it's the only way for them to know definitively what values will cause
>>interoperability. Yet you say things like "a newcomer could be confused
>>by a long list of all possible numbers". You can't have it both ways.
>
>You probably speaks about "ideal" developers. I speak about real people.
>I've seen a few cases when people implemented a bunch of really
>unnecessary things just because "it was in standard".

We still agree, and your answer is still inconsistent. If you worry about those type of developers, then you must want to get rid of the IANA registry, because that is what is giving them the silly ideas.

>Currently exact groups for numbers 1, 2, 14, 15, 16, 17 and 16 are not defined in IANA.
>For me this is inconsistent. Either change two abovementioned lines to:
>
>1             768-Bit MODP Group                    [RFC4306]
>2             1024-Bit MODP Group                  [RFC4306]
>
>14           2048-Bit MODP Group                  [RFC3526]
>15           3072-Bit MODP Group                  [RFC3526]
>16           4096-Bit MODP Group                  [RFC3526]
>17           6144-Bit MODP Group                  [RFC3526]
>18           8192-Bit MODP Group                  [RFC3526]

Sorry, I misunderstood what you were saying. Yes, that is a good suggestion; I'll make it happen.

>>>EAP numbers listed in RFC4306 might also be changed in future,
>>>so from your logic it's better just to point to
>>>http://www.iana.org/assignments/eap-numbers, right?
>>
>>Yes, but *only* if the names and numbers we use in this document match those exactly
>>*and* the WG is willing to cede change control to the EAP methods we use to the IANA
>>registry that we do not have input to. So far, the WG hasn't said they want to do that,
>>so I don't presume to make that change.
>
>I fail to understand your logic here. You seem to want to have ability to change
>already assigned numbers in IKEv2 in the future (and for this purpose remove
>them from RFC), but at the same time you seem to presume  that other
>groups will not ever change their numbers.

I do not presume that. I presume that this WG is not concerned about it; otherwise, we would have created our own IANA registry for the EAP values we use. We didn't.

>I fail to understand how removing values from the RFC will help
>understanding the context for them.

The context for the values is "they are assigned and maintained by IANA". It is not "they came from this RFC". You may not like that, but that's how the IETF works.

>>>If you need extensions - go to IANA and look for added numbers,
>>>but core protocol must be implementable reading as few sources,
>>>as possible, preferrably one.
>>
>>Seriously: how hard is "two"? Any serious developer can go look at
>>a second URL to get the values.
>
>It's not hard, but what for? I see some drawbacks and I don't see
>how it will help interoperability.

Again: it helps interoperability if developers look in the IANA registry at the time of coding and see changes have been made to what they thought was true based only on reading an RFC.

>>>Tero's approach is a compromise. You will need the IANA only for
>>>few types of magic numbers, most of which don't affect protocol
>>>logic. I can leave with it.
>>
>>This seems inconsistent to me ("it's OK to need a second file for some things but not others").
>
>I didn't say I like it. I said I can bear it. Tero has suggested removing
>values for Transform IDs only. Those values mostly are "external" to
>IKEv2 logic, it just "transfers" them between network, policy module,
>ipsec module and crypto module. Theoretically they should not affect
>IKEv2 itself (*). That's why I can bear removing them.
>
>(*) Unfortunately, they do affect: AEAD algorithms require special
>handling in construction proposals. But this is another story.
>I've been thinking that introducing a new Transform type for
>AEAD algorithms instead of reusing Encryption Algorithm Transform
>would probably have made protocol simpler and cleaner, but that was that.

Your second paragraph is a shining example of why this should have been done in RFC 4306, and why we should not presume that what we do in IKEv2bis will be held constant.

>>>As far as I understand, in this case new RFC must be issued,
>>>which will obsolete current one, won't it? If so, no contradiction.
>>
>>That is not true. The new RFC can update just a portion of the old one.
>>That is how this is normally handled in the IETF.
>
>In any case base RFC will be updated. And the first thing one must do before
>implementing any protocol is to find most recent RFC for it, including
>all updates and erratas. This is natural way to go, and if one starts
>implementing old RFC, then even if you manage to force him to go
>to IANA for numbers, I doubt if he will get interoperable product.

The IANA registry lists the current RFCs. Do you not think that is enough clue?

--Paul Hoffman, Director
--VPN Consortium