Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]

Valery Smyslov <smyslov.ietf@gmail.com> Tue, 13 October 2020 07:23 UTC

Return-Path: <smyslov.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BACE3A0EC6; Tue, 13 Oct 2020 00:23:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tdqatxESI7fN; Tue, 13 Oct 2020 00:23:01 -0700 (PDT)
Received: from mail-ej1-x62c.google.com (mail-ej1-x62c.google.com [IPv6:2a00:1450:4864:20::62c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F0093A0EC3; Tue, 13 Oct 2020 00:23:01 -0700 (PDT)
Received: by mail-ej1-x62c.google.com with SMTP id u8so26817340ejg.1; Tue, 13 Oct 2020 00:23:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-transfer-encoding:thread-index :content-language; bh=BoKBsOJEjqbqvUd9vDm4Wz99b35O9hgBkWpuMePued0=; b=hAaEr1ELeO51r1h1bsp2NPWlU2h1bgJv8KhitWaWbHMO0UcjfDm3yE43hSdGNgSFr/ KrrNz0QD1w+Hze3ETWTDAn86qfTHjQYjrDkTUEZOhBr9zoS7iXn7sV1MY+zcjayNIDgJ Zo2lO9DiTxfOpprHVXBsBpRS2kx1WpL6BRfkHFhe4RrZtZnrrm9fAoW2N2U5iGkcd67c Jw/3J4AOej1oVCz61QyF+b3c3GflLs6VmDYFLWacY8u35YZiO7iMf1Xf8qkziJoEhf2L yy4XJaJyYgc0N/W2dyDlTDDdJBeGoW7Op74T3NUL6Drpc6GAhQn5hArGt7MG1b8Ga3Nd BUFQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date :message-id:mime-version:content-transfer-encoding:thread-index :content-language; bh=BoKBsOJEjqbqvUd9vDm4Wz99b35O9hgBkWpuMePued0=; b=NLMSSESADet6a/GJ7B593Jklc0Muc9wtE9QhyzYsuqZpZPJrgxIm4moCtdCRnuFOlj MoK6THDmdW6Aq/y5uumMAjfV1rRI+9pAOmqrU9T+IQa21vgXRCOkksTEfCfoNJzB35Q8 O8E1Yghust2WsRUIqoWSAldrm7j5PB+m+ahu4Jdh6JoUkcYT4v1DaCLovbFLJOMXf1eI eDfeYRmBbjXqag8fiYemjehSXx5piVsTt07PfymgmXwjASFlQglRAHoJIED5wzBzbEKT OJacFRIAF630hFGbAM46WoD2mOGCdf4zqCYRU1PpqsrUlLvM/egmGGmW/BOMFjgqd+jQ Es6w==
X-Gm-Message-State: AOAM533CS6ZOryx8WJivA7zbuvW4IgbDnZCax0Olp8gElXB3JlUSdzwx Vg84LTYzy07sOLhsBUi7UgbCmyioYKo=
X-Google-Smtp-Source: ABdhPJy3bcn2xjtiX5G50x67WwE8Bbmtpm4+PL1p1OGRhINiwozaLIKpGp8eTOktqt5VrnBDSWNnNg==
X-Received: by 2002:a17:906:6682:: with SMTP id z2mr33478243ejo.434.1602573779672; Tue, 13 Oct 2020 00:22:59 -0700 (PDT)
Received: from buildpc ([93.188.44.203]) by smtp.gmail.com with ESMTPSA id o3sm11781696edv.63.2020.10.13.00.22.58 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 13 Oct 2020 00:22:59 -0700 (PDT)
From: Valery Smyslov <smyslov.ietf@gmail.com>
To: 'Christian Hopps' <chopps@chopps.org>, ipsec@ietf.org
Cc: ipsecme-chairs@ietf.org
References: <160148315262.3746.2680691950315422865@ietfa.amsl.com> <27659521-C1B0-4F0E-A6CC-C6F4B8938FFE@chopps.org>
In-Reply-To: <27659521-C1B0-4F0E-A6CC-C6F4B8938FFE@chopps.org>
Date: Tue, 13 Oct 2020 10:22:58 +0300
Message-ID: <1ab401d6a131$ae279f30$0a76dd90$@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQLBR9Dg1QdoZI0c6Vo/AaLkIdpDHgLCxSxRp6m16bA=
Content-Language: ru
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/xQkj9He_wPR3omFZ_Y6WbMzCdR4>
Subject: Re: [IPsec] Update and WGLC request [Re: I-D Action: draft-ietf-ipsecme-iptfs-02.txt]
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Oct 2020 07:23:04 -0000

Hi Chris,

> Hi ipsecme and chairs,
> 
> This is a small update to the IPTFS draft which incorporates the last 2 changes that had been requested over
> the last year or so.
> 
> 1. As requested last year, it dispenses with the late-enabled functionality, replacing it with a SHOULD clause
> supporting receiving IPTFS encapsulated ESP payloads w/o extra configuration.

I prefer this functionality to be removed. Either you are doing classical tunnel/transport in the SA or you are doing IPTFS.
>From my understanding it's just another encapsulation mode. Otherwise we have the following problems:
- Since this functionality is optional its capability must be negotiated (or indicated by the peers) in IKEv2. 
   And negotiation of IPTFS features is already complex enough.
- It complicates processing in the kernel. E.g, it's not clear for me what "on receipt of the first IP-TFS payload" means.
   If packets are reordered in the network and the first received IPTFS packet is not the first sent IPTFS packet?
   What to do with the non-IPTFS packets sent before first IPTFS packet but received after it? And so on.
   IPTFS processing in the kernel is already quite complex, let's not introduce additional complexity.
- I see no value in this functionality apart from the debugging and I don't want debugging capability to 
   be present in the RFC, so that people, who really don't need it, implement it in
   their products introducing new bugs. You may argue, that you made it optional, but SHOULD is very close 
   to MUST and in addition making it optional only complicates negotiation of IPTFS.

So, please, remove it.

> 2. It highlights that one must send payloads that carry inner packet fragments using consecutive ESP
> sequence numbered packets (with a caveat for all pad payload insertion).

That's useful clarification, thanks.

Regards,
Valery.

> We feel the document is quite stable at this point and would thus like to ask for moving to WG Last Call.
> 
> Thanks,
> Chris.
> 
> > On Sep 30, 2020, at 12:25 PM, internet-drafts@ietf.org wrote:
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts directories.
> > This draft is a work item of the IP Security Maintenance and Extensions WG of the IETF.
> >
> >        Title           : IP Traffic Flow Security
> >        Author          : Christian Hopps
> > 	Filename        : draft-ietf-ipsecme-iptfs-02.txt
> > 	Pages           : 26
> > 	Date            : 2020-09-30
> >
> > Abstract:
> >   This document describes a mechanism to enhance IPsec traffic flow
> >   security by adding traffic flow confidentiality to encrypted IP
> >   encapsulated traffic.  Traffic flow confidentiality is provided by
> >   obscuring the size and frequency of IP traffic using a fixed-sized,
> >   constant-send-rate IPsec tunnel.  The solution allows for congestion
> >   control as well.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/
> >
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-02
> > https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-iptfs-02
> >
> > A diff from the previous version is available at:
> > https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-02
> >
> >
> > Please note that it may take a couple of minutes from the time of submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> >
> > _______________________________________________
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
> >