Re: [IPsec] TR: New Version Notification for draft-btw-add-ipsecme-ike-01.txt

mohamed.boucadair@orange.com Fri, 11 September 2020 07:14 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B3B43A092E; Fri, 11 Sep 2020 00:14:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8U6r7tEwpNnR; Fri, 11 Sep 2020 00:14:09 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.39]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B29A3A090D; Fri, 11 Sep 2020 00:14:09 -0700 (PDT)
Received: from opfedar05.francetelecom.fr (unknown [xx.xx.xx.7]) by opfedar20.francetelecom.fr (ESMTP service) with ESMTP id 4Bnn735hsmz8tc9; Fri, 11 Sep 2020 09:14:07 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1599808447; bh=YSWgWwUzDTlx0TyPPZNs56jbx+HCT6P7oF8yt+y40ew=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=t6lzJSDOPTelG8POlti3snt/e0rV/E7W3weC7LiOcSnr8wkAfsu6u4dOSgqvcW/OL YGDQbE9Cjf/O92+OtUXGEJ7UAkrti/dsQIoixadxKjUFaZm02/h8i4MPCVj2Alhok/ zssKz3y6w7cgcHfoxnT6oBgpDmkPOGMNV0oYwLg65v4Mm3RIceZRHeoKNYxBMMupR8 6OYopkf6IeD/NlQhJPwaJJX+6PJCR6LO4QeTxFh2jsN9d7xARqzDX7yoUk6Mg/3XT/ ltxDNo5qesW+VBwBoET9FZosiQYI3N9yLSUshMH2xDpifEa/eWAZ7c78ZGq25gB8ge jLe9Y/t+qbqeg==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.35]) by opfedar05.francetelecom.fr (ESMTP service) with ESMTP id 4Bnn734jQJz2xCK; Fri, 11 Sep 2020 09:14:07 +0200 (CEST)
From: mohamed.boucadair@orange.com
To: Paul Wouters <paul@nohats.ca>
CC: "ipsec@ietf.org" <ipsec@ietf.org>, "draft-btw-add-ipsecme-ike@ietf.org" <draft-btw-add-ipsecme-ike@ietf.org>
Thread-Topic: [IPsec] TR: New Version Notification for draft-btw-add-ipsecme-ike-01.txt
Thread-Index: AQHWhqEic1WOV2DGt0Gr5Z8wSgvWfKlh8lh6gAD3cfA=
Date: Fri, 11 Sep 2020 07:14:07 +0000
Message-ID: <24324_1599808447_5F5B23BF_24324_2_1_787AE7BB302AE849A7480A190F8B93303153EE6B@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <159965296544.28196.15433560776696094354@ietfa.amsl.com> <24155_1599723204_5F59D6C4_24155_339_53_787AE7BB302AE849A7480A190F8B93303153E1B7@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <alpine.LRH.2.23.451.2009101023040.1041967@bofh.nohats.ca>
In-Reply-To: <alpine.LRH.2.23.451.2009101023040.1041967@bofh.nohats.ca>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/xeWsDGlM1M2p2emk19uX-wtObPc>
Subject: Re: [IPsec] TR: New Version Notification for draft-btw-add-ipsecme-ike-01.txt
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Sep 2020 07:14:11 -0000

Hi Paul,

Thank you for the comments. 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Paul Wouters [mailto:paul@nohats.ca]
> Envoyé : jeudi 10 septembre 2020 16:37
> À : BOUCADAIR Mohamed TGI/OLN <mohamed.boucadair@orange.com>
> Cc : ipsec@ietf.org; draft-btw-add-ipsecme-ike@ietf.org
> Objet : Re: [IPsec] TR: New Version Notification for draft-btw-add-
> ipsecme-ike-01.txt
> 
> On Thu, 10 Sep 2020, mohamed.boucadair@orange.com wrote:
> 
> > We updated the draft to take into account the comments raised
> during the last IETF meeting. Instead of multiplexing the
> attributes, we simplified the design so that types are assigned to
> each encrypted DNS type (DoT, DoH, DoQ).
> 
> Why is this using a seperate CP payload type per encrypted DNS type?
> This means that for a DNS server supporting DoT, DoH and DoQ, it
> needs to send 3 separate payloads. Why not send 1 CP payload that
> contains a bitmask specifying which services it supports?

[Med] We used to have one single attribute that is used for all types (with a bitmask). We changed the design as we thought this will simplify the processing of the attributes and allow for more flexibility. 

This is also to echo this comment from Tero (https://www.ietf.org/proceedings/108/minutes/minutes-108-ipsecme-01.pdf):

"Tero: Add configuration attributes, less internal strucutre, more higher level structure"

> 
> The only reason I can think of for this choice is because these
> might be running on non-standard ports,

[Med] Customized port numbers can be accommodated with the single attribute (with bitmask) by retuning multiple instances of the attribute with distinct DNS types.   

The same reasoning applies if one want to terminate DoT/DoH/DoQ on distinct IP addres(es) or one want to use distinct authentication name for each encrypted DNS. 

In that approach, an implementation has to process both the attribute type and sub-type to decide what to do.  

With the sub-type removed, the processing is a little bit simplified. 

 but I think that reason is
> rather weak. DoT and DoQ will run on standard defines ports and

[Med] I tend to agree with you for DoT. 

For DoQ, the situation is a little bit different:
* There is no default port (yet).
* We added the port to the spec to address a comment we received from the authors of DoQ specification: Christian Huitema suggested to have the port configurable. 

> DoH's protocol aims at blending in as web traffic so it really is
> only getting deployed on port 443.

[Med] Fully agree. 

> 
> So if I build a single server that can do unencrypted and all
> encrypted flavours, I'd prefer to send and receive just 1 CP payload
> covering everything.

[Med] That was the reasoning we had in -00 and my favorite BTW but as an editor of the document I'm also hearing comments asking for more flexibility and simplicity:
* what if the servers terminates on distinct addresses?
* what if distinct authentication names are used?
* what if a non-default port is used?

I'm not sure we can reconcile the desire to return one CP payload vs. attribute simplicity for cases with customized config. 

> 
> We _could_ leave the port there for non-standard ports, but then we
> should add a specific port attribute for each bitmask entry. But
> honestly, the whole non-default port part seems like
> overengineering.
> 
> For those who care a lot about minimizing bytes exchanged over IKE,
> my above proposal would save a lot of bytes.
> 

[Med] Agree that it saves bytes for the single server case supporting all DNS types, but not if customized @/AND/port are used.   

> 
> I would also like to see more clarification about split-DNS and how
> a list of domains is conveyed via IKE as the only domains to be
> resolved via the given encrypted DNS servers.

[Med] We are relying upon RFC8598 as described in the draft:  

   If the IPsec connection is a split-tunnel configuration and the
   initiator negotiated INTERNAL_DNS_DOMAIN as per [RFC8598], the DNS
   client MUST resolve the internal names using ENCDNS_IP*_* DNS
   servers.

      Note: [RFC8598] requires INTERNAL_IP6_DNS (or INTERNAL_IP4_DNS)
      attribute to be mandatory present when INTERNAL_DNS_DOMAIN is
      included.  This specification relaxes that constraint in the
      presence of ENCDNS_IP*_* attributes.

Do you have in mind any specific point not covered in RFC8598 that we need to consider? 

> 
> I would like to see something in the Security Considerations about
> handing out well known non-VPN reachable encrypted DNS servers.  Eg
> I'd like to avoid that this document can instruct VPN users to use
> DoT at 8.8.8.8 if it is not going to offer a VPN that covers
> 8.8.8.8. If we don't do this, then VPN profiles might end up
> abusing/redirecting users without offering any actual VPN service -
> like overriding the system or application specific configuration
> without offering actual VPN servers to the user.
> 

[Med] This would apply for INTERNAL_IP*_DNS attributes as well. We can add a generic note. 

> I'm also considered about possive abuse by the specification of the
> authentication domain name. Eg a VPN provider setting up a tunnel
> covering 1.1.1.1 (dns.cloudflare.com) with an authentication name of
> "dns.google.com" and basically redirecting all 1.1.1.1 traffic over
> the VPN to 8.8.8.8.
> 

[Med] Not sure to get this one.

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.