Re: [IPsec] AD Review of draft-ietf-ipsecme-ikev2-auth-announce-04

Valery Smyslov <smyslov.ietf@gmail.com> Thu, 26 October 2023 15:50 UTC

Return-Path: <smyslov.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F74BC14CE2F for <ipsec@ietfa.amsl.com>; Thu, 26 Oct 2023 08:50:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.703
X-Spam-Level:
X-Spam-Status: No, score=-0.703 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_COMMENT_SAVED_URL=1.391, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_HTML_ATTACH=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X1AOHeqQ1O1J for <ipsec@ietfa.amsl.com>; Thu, 26 Oct 2023 08:50:34 -0700 (PDT)
Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [IPv6:2a00:1450:4864:20::12f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C993EC14CF1C for <ipsec@ietf.org>; Thu, 26 Oct 2023 08:50:33 -0700 (PDT)
Received: by mail-lf1-x12f.google.com with SMTP id 2adb3069b0e04-507cd62472dso2550068e87.0 for <ipsec@ietf.org>; Thu, 26 Oct 2023 08:50:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1698335432; x=1698940232; darn=ietf.org; h=content-language:thread-index:mime-version:message-id:date:subject :in-reply-to:references:to:from:from:to:cc:subject:date:message-id :reply-to; bh=i063BUY3GGm4nJh4nDTFYvMWOiGDMe0p0psSDK855EY=; b=dFbudfFM/MKJE25iagkkUzjuWUgNDgOWiUXuiqt60f0b/piXcxA7uYSREXNogOzkqi H3vlJ2hy/L3eQwjIXu73GrbJXdg5nEl0SkfYPgd1NV0JFPYjxbeDTCgHjy/vE/tN1r84 6D5TbDqcMhNuO8Ybmmj/PJ9uSErcSHiM+4DDbXMroIldJE942vQJoytnFa86TJkXSPbQ Z2yBit9t0k4h7e5uDwDePtUpBzpDvKeoqXqgxdjEZ2AcXaIemuMzyJFhlTT1Dnth+zEz gviTfFwZ6YBQeWdJMbWiY/OYw0/mObraKQ86NigTGu4XQW4xsoAIAOuTULFRHYOvAAv/ Opcg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698335432; x=1698940232; h=content-language:thread-index:mime-version:message-id:date:subject :in-reply-to:references:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=i063BUY3GGm4nJh4nDTFYvMWOiGDMe0p0psSDK855EY=; b=H287UJisIR1YXEw6tEuACjK6smDM1eqHNgbE9yXx+5G7+FEyBSGAFrk4rZhF7hHRrs /ZBIxc2f8fms508SMFuiTKRAAAVC+biTaC9glNv55wWr4VRhmjZF1tSoseGsqhSgNwqP MPfL0es715+f2l0gQj/ZEzh6QL7iomCqjsWRNDAbtQWOAElwTsryqfdgSabndml1x9xS nUd7qDTkuRVc4ZCskw3fKjR/jNYcQHyRRSstgMvsKOFP0S0G03+h1eo6EYWalCVvO3oF APFGXrvvL4+ggbBvIbpYj2yPYcOSKXDXGY2ruGziQ5HWqPbdbqvrZ9HncWmBUgwvkR+s a/6Q==
X-Gm-Message-State: AOJu0YyXF+B7w3K4oWkBwhi4IQ0xJE4HHA/jeeHkpmZuqY1yrOu+A1kW zsrTQZnB/MKGtAki8zsXCpWN01zQOhS7cQ==
X-Google-Smtp-Source: AGHT+IE45C1EV5MlW+3zMzmT/J+v5wDbkoZKC1iuV/yg9DiqtymIDLDS2ZiKbnttiQuNZTbQoRweKw==
X-Received: by 2002:a05:6512:3b98:b0:507:9ef4:8309 with SMTP id g24-20020a0565123b9800b005079ef48309mr37320lfv.25.1698335431108; Thu, 26 Oct 2023 08:50:31 -0700 (PDT)
Received: from buildpc ([93.188.44.204]) by smtp.gmail.com with ESMTPSA id c11-20020ac25f6b000000b00507fa091353sm1891844lfc.132.2023.10.26.08.50.30 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 26 Oct 2023 08:50:30 -0700 (PDT)
From: Valery Smyslov <smyslov.ietf@gmail.com>
To: 'Roman Danyliw' <rdd@cert.org>, ipsec@ietf.org
References: <BN2P110MB11076E4C10617CF7810E96DEDCDEA@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
In-Reply-To: <BN2P110MB11076E4C10617CF7810E96DEDCDEA@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
Date: Thu, 26 Oct 2023 18:50:33 +0300
Message-ID: <068901da0824$27c5a4c0$7750ee40$@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_068A_01DA083D.4D154DC0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQHSuksbIZnwtB/j9KuCauWvAtCPDLBq01Eg
Content-Language: ru
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/w8TYOgHS9Q9nI3ReChzRKg5Hx8k>
Subject: Re: [IPsec] AD Review of draft-ietf-ipsecme-ikev2-auth-announce-04
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Oct 2023 15:50:38 -0000

Hi Roman,

thank you for your review, please see inline.

> Hi!
> 
> I performed an AD review of draft-ietf-ipsecme-ikev2-auth-announce-04.  Thanks for the work on this
> document.  I have the following feedback:
> 
> 
> ** Section 3.1
> If the initiator is configured to use Extensible Authentication Protocol (EAP) for authentication in IKEv2
> (see Section 2.16 of [RFC7296]), then it SHOULD NOT send the SUPPORTED_AUTH_METHODS
> notification.
> 
> -- Since SHOULD NOT vs. MUST NOT is used, under what circumstances would it be appropriate to use
> EAP + SUPPORTED_AUTH_METHODS?

I was thinking that this might simplify implementations (initiator may always send this notify, responder will just ignore it).

But thinking more about this, I now understand, that this paragraph is incorrect and should be removed at all.
For the reason, that the sender of  SUPPORTED_AUTH_METHODS announces which auth methods it is ready
to accept as verifier, and in IKEv2 even in case of EAP the server (responder) always send AUTH payload
to authenticate itself to the initiator (which is done before the EAP starts). So, even in case of EAP
the initiator should verify the responder's identity using AUTH payload, thus sending SUPPORTED_AUTH_METHODS is OK.

> ** Section 3.2
> 
> If more authentication methods are defined in future, the corresponding documents must describe the
> semantics of the announcements for these methods.
> 
> -- Should this be a s/must/MUST?

With my understanding of using BCP14 language, these keywords are usually concerned
with protocols behavior. In this case the "must" is concerned with human (document authors) behavior :-)

That said, I understand that this may be interpreted differently, so if you think
"MUST" is more appropriate here than "must", I'll be happy to make the change.

> ** Section 3.2
> The blob always starts with an octet containing the length of the blob followed by an octet containing
> the authentication method. Authentication methods are represented as values from the "IKEv2
> Authentication Method" registry defined in [IKEV2-IANA].
> 
> -- The reference in [IKEV2-IANA] is incorrect.  It should be pointing to Parameter 12.
> 
> OLD
> [IKEV2-IANA]
>     IANA, "Internet Key Exchange Version 2 (IKEv2) Parameters",
> <http://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-7>.
> 
> NEW
> [IKEV2-IANA]  IANA, "Internet Key Exchange Version 2 (IKEv2) Parameters",
> <https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-12>

Fixed, thank you.

> ** Section 3.2.3.  Please provide a normative reference DER.  I believe it is:
> 
>    [X.690]    ITU-T Recommendation X.690 (2002) | ISO/IEC 8825-1:2002,
>               Information technology - ASN.1 encoding rules:
>               Specification of Basic Encoding Rules (BER), Canonical
>               Encoding Rules (CER) and Distinguished Encoding Rules
>               (DER).

Done (also added a reference to RFC 5280 for AlgorithmIdentifier, followed what is in RFC 7427).

> ** Section 5.  Please add the Security Considerations of the specifically negotiated auth methods apply.

This is not a negotiation, this is announcement, just to help the other side
to correctly choose among several possible methods. Since this is a hint,
implementations may use it as other hints that are already available 
(e.g. CAs from CERTREQ). Thus I'm not sure what specifically should be
added to the Security Considerations section. Do you have some proposed text?

> ** Section 6.  The “Notify Message Types - Status Types” registry has three fields.  Please formally say
> that this document should be the reference.

Done.

I also have off-the-list conversation with Daniel Van Geest, who made some good proposals,
which I would also like to include in the draft if the WG agrees.

1. Specify that auth announcements are included into the SUPPORTED_AUTH_METHODS notification
    in the order of their preferences for the sender. This doesn't break anything (the receiver is free to ignore the order), 
    but might help it to make the best choice.

2. Clarify that peers may send the SUPPORTED_AUTH_METHODS independently of whether it was received
    (this is not a negotiation). This is what actually the draft says now, just stress this for clarification.

3. Specify interaction with RFC 4739 (Multiple Authentication Exchanges in the Internet Key Exchange (IKEv2) Protocol).
    In particular. allow sending multiple SUPPORTED_AUTH_METHODS notifications in a message
    (also add a clarification that if multiple SUPPORTED_AUTH_METHODS notifications are included in a message
     and the receiver doesn't know why, the all included announcements form a single list).

Since the I-D submission is closed, the diff file is included with this message.

Regards,
Valery.

> Thanks,
> Roman
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec