Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike

mohamed.boucadair@orange.com Wed, 10 November 2021 07:30 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56E7E3A12F5; Tue, 9 Nov 2021 23:30:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KFXyh4_2kjfU; Tue, 9 Nov 2021 23:30:34 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C1C93A1336; Tue, 9 Nov 2021 23:30:34 -0800 (PST)
Received: from opfedar03.francetelecom.fr (unknown [xx.xx.xx.5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar21.francetelecom.fr (ESMTP service) with ESMTPS id 4HpxMr4FL8z7vFZ; Wed, 10 Nov 2021 08:30:32 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1636529432; bh=r71JKYb9Pv5kYsujI1jfyL37iAAqkpZN3aKuVMdOoJc=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=RUPwifUhHOh+aMv0NK1p0RFbouc3dIPzdJbdlIjQP57NG1/XL4V1+pLJZntDxKnib bxx+ICB3LWzTvk5yvcsUhxL8JEBgCKz3m+I4+8Uml7+JqWEGEhXJ51qGg9fmbk/Gtj tXK9MRIoOJXX7Pfzc36083icSVmG/Irc0+moymsVPEKobkGj15nA5pEeOejzC0qGQE VfT2eeQBbCZoxxhwZQm4REMBTU/URsm9ZW73uPJV0R4x7JeQf247yXuWE0f1QTzhrY iGrqHycVL4msV28/XOVhfM5a1XYDfT/i6QxAvC7sgum9mLjhVP+D/PaImQxAWJGZDD 1Y0Bpe1CbfTEA==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfedar03.francetelecom.fr (ESMTP service) with ESMTPS id 4HpxMr36bgzCqkS; Wed, 10 Nov 2021 08:30:32 +0100 (CET)
From: mohamed.boucadair@orange.com
To: Paul Wouters <paul.wouters@aiven.io>
CC: "ipsec@ietf.org" <ipsec@ietf.org>, "draft-btw-add-ipsecme-ike@ietf.org" <draft-btw-add-ipsecme-ike@ietf.org>, Tero Kivinen <kivinen@iki.fi>
Thread-Topic: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
Thread-Index: AQHX1ci8i4Q33A1l1EiWwu9gm8dljKv8WI0g
Content-Class:
Date: Wed, 10 Nov 2021 07:30:31 +0000
Message-ID: <19332_1636529432_618B7518_19332_252_1_787AE7BB302AE849A7480A190F8B93303544E768@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <24969.12660.103330.619294@fireball.acr.fi> <ccdfdc-634-5989-839b-3cbd17e86d99@nohats.ca> <3996_1636386534_618946E6_3996_297_6_787AE7BB302AE849A7480A190F8B93303544BD42@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <88f8206a-6c2-5816-ada3-e8666ec05e38@nohats.ca> <23906_1636459418_618A639A_23906_93_6_787AE7BB302AE849A7480A190F8B93303544C625@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <ee27dc52-b8a4-c926-ec0-d8479b3a285@nohats.ca>
In-Reply-To: <ee27dc52-b8a4-c926-ec0-d8479b3a285@nohats.ca>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2021-11-10T07:23:36Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=6748c2a7-d09d-4c2d-95bc-a7c795fcb350; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/ooCOJEUDJFu5f6ETCEfsn8BWgIY>
Subject: Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Nov 2021 07:30:40 -0000

Hi Paul, 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Paul Wouters <paul.wouters@aiven.io>
> Envoyé : mercredi 10 novembre 2021 01:20
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
> Cc : ipsec@ietf.org; draft-btw-add-ipsecme-ike@ietf.org; Tero Kivinen
> <kivinen@iki.fi>
> Objet : Re: [IPsec] WG Adoption call for draft-btw-add-ipsecme-ike
> 
> On Tue, 9 Nov 2021, mohamed.boucadair@orange.com wrote:
> 
> >> Note that what I said there was that you should not update the
> >> _mechanism_ of how CFG requests/responds are done. You should use the
> >> existing mechanism with a new value, but use the same negotation
> mechanism.
> >>
> >> So the client sends FOO(x) and the server respones with FOO(y)
> >>
> >> x can be empty (eg the client has no previous notion or preference
> >> for FOO. Or if it has one, it can suggest it. The server takes that
> >> value only as a preference of the client, but the server is the one
> >> making the ultimate decsion if it returns "x" or "y".
> >>
> >> So your draft should not say the initiator MUST send a zero size
> >> request for FOO.
> >
> > [Med] We are not saying that in the draft.
> 
> Section 3.1 states:
> 
> o  Length (2 octets, unsigned integer) - Length of the data in
>        octets.  In particular, this field is set to:
> 
>        *  0 if the Configuration payload has types CFG_REQUEST or
>           CFG_ACK.
> 
> 
> So it says for a CFG_REQUEST the length is 0.

[Med] This is the length of the ENCDNS_IP* attribute. This is used in requests to indicate that the client is requesting this attribute. 

> 
> > That is changing the mechanism.
> >>
> >> What I was saying in my last email was that making a protocol update
> >> where a server receiving a INTERNAL_IP4_DNS may choose not to return
> >> any INTERNAL_IP4_DNS is an update to the protocol that would require
> >> the
> >> Updates: clause to warn implementers to read this document too, as it
> >> updates older RFC text.
> >
> > [Med] OK.
> 
> But note that I rather that the responder just responds to the received
> CFG requests with CFG replies it supports and has data for. So if the
> client asks for INTERNAL_IP4_DNS and ENCDNS_IP4, the responder should
> return both with values. I also think that in case the encrypted DNS
> fails, it would be good for the IKEv2 client to have the INTERNAL_IP4_DNS
> as fallback option. Say if the TLS fails for some reason (incompatible
> algorithms, expired TLS certificate, DoH server down, etc)

[Med] The current version allows somehow for this as the behavior is policy-based. However, I understand that you prefer to systematically return both and leave the client decide. I can live with this as well.



_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.