Re: [lisp] Stephen Farrell's Discuss on draft-ietf-lisp-ddt-08: (with DISCUSS and COMMENT)

Anton Smirnov <asmirnov@cisco.com> Fri, 04 November 2016 18:23 UTC

Return-Path: <asmirnov@cisco.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2414B1295ED; Fri, 4 Nov 2016 11:23:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -16.019
X-Spam-Level:
X-Spam-Status: No, score=-16.019 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.497, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WC9KSsBpHXHF; Fri, 4 Nov 2016 11:23:35 -0700 (PDT)
Received: from aer-iport-4.cisco.com (aer-iport-4.cisco.com [173.38.203.54]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45AAA129608; Fri, 4 Nov 2016 11:23:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4261; q=dns/txt; s=iport; t=1478283814; x=1479493414; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=4DL0lb6SzpTw5Oz6GsQdjPNdqYYW5tiU/R17ULFfsFI=; b=Amh1b+SEkeQEttQ37/6/YM3QhGa6phNsG9hXIWYMG36uwOwOH+MZ97n9 rV0VOYMMOb2PF7b8iekoHs66+oW+de//d6F6/ZDjkmc37fRDY9Q4ice6F vE0s5VJwOEq6S2wel5ss0OqfHlGjYfqZMkFL+u8dfVvK9gjct8Tvd4JHe Y=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CAAQDx0BxY/xbLJq1dGQEBAQEBAQEBAQEBBwEBAQEBgy4BAQEBAXcqUo04lwCSN4IPgggohXsCglYUAQIBAQEBAQEBYiiEYgEBBCMVQRALGAICJgICVwYBDAgBAYhUDq8vjHQBAQEBAQEBAQEBAQEBAQEBAQEBARgFgQmFNoF9CIJQhBkRAYMgglwFiEuRWIY0igyBboRvgxiGFY0hhAQeN1kKCYNcgUY9NAGFCQ0XB4IPAQEB
X-IronPort-AV: E=Sophos;i="5.31,444,1473120000"; d="scan'208";a="649709402"
Received: from aer-iport-nat.cisco.com (HELO aer-core-3.cisco.com) ([173.38.203.22]) by aer-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 Nov 2016 18:23:31 +0000
Received: from [10.55.206.135] (ams-asmirnov-nitro6.cisco.com [10.55.206.135]) (authenticated bits=0) by aer-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id uA4INVCC003953 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Fri, 4 Nov 2016 18:23:31 GMT
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, The IESG <iesg@ietf.org>
References: <147757226834.24715.16366455756541086706.idtracker@ietfa.amsl.com> <74bb00ca-b694-95ea-48a8-4241e3eb7e38@cisco.com> <14cddbee-ebf4-6eeb-e772-4ef6f550f28b@cs.tcd.ie> <29496480-ebe1-2c3d-4ba5-2f814774f5f1@cisco.com> <70451832-0828-3108-9f9c-1c706eb1322d@cs.tcd.ie>
From: Anton Smirnov <asmirnov@cisco.com>
Organization: Cisco Systems
Message-ID: <014ec345-dcea-5a0f-8272-ebab9da3375d@cisco.com>
Date: Fri, 04 Nov 2016 19:23:26 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <70451832-0828-3108-9f9c-1c706eb1322d@cs.tcd.ie>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Authenticated-User: asmirnov
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/sm5_q-N4W0cxb4NAszZ91NRR9yI>
Cc: lisp-chairs@ietf.org, draft-ietf-lisp-ddt@ietf.org, lisp@ietf.org
Subject: Re: [lisp] Stephen Farrell's Discuss on draft-ietf-lisp-ddt-08: (with DISCUSS and COMMENT)
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Nov 2016 18:23:37 -0000

    Hi Stephen,

    OK, we will do it like this in the next revision of text.

Anton


On Friday 04 November 2016 17:27, Stephen Farrell wrote:
> Hiya,
>
> On 04/11/16 16:12, Anton Smirnov wrote:
>>     Hi Stephen,
>>
>>     will it be OK if we mark in the document security algorithm 1 as
>> reserved without even elaborating that it is/was RSA-SHA1 and the only
>> security algorithm specified in the RFC will be 2 == RSA-SHA256 ?
>>
>>     This will ensure that whoever is using algorithm 1 will not run into
>> compatibility issues but RSA-SHA1 will be clearly non-RFC-compliant.
> How about defining alg=1 as rsa-sha1 and marking that as
> deprecated with alg=2 as rsa-sha256 as the MUST implement?
> (I don't care myself if you have an IANA registry for those
> yet or not, doing it in text is fine.)
>
> S
>
>> Anton
>>
>> On Tuesday 01 November 2016 22:09, Stephen Farrell wrote:
>>> Hiya,
>>>
>>> On 01/11/16 18:51, Anton Smirnov wrote:
>>>>      Hello Stephen,
>>>>
>>>>      thanks for your comment.
>>>>
>>>>     Existing DDT implementations are already using RSA-SHA1, so we cannot
>>>> simply replace it with RSA-SHA256. But we should be able to add the
>>>> latter as another signing algorithm.
>>> Really? The sha-1 weaknesses for use in signatures were
>>> found and documented in an RFC in 2005. [1] We published
>>> an RFC attempting to tidy up remaining loose ends related
>>> to sha1 for signatures in 2011. [2] Asking for rsa-sha1 now
>>> is really very far behind the state of the art.
>>>
>>> But are you talking implementations or deployments here?
>>> If mostly the former then I think you ought remove rsa-sha1
>>> entirely and replace with rsa-sha256. That is a trivial
>>> code change and I can see no justification for not making
>>> that change.
>>>
>>> If you are talking about existing deployments please
>>> provide the argument as to why those are such that we
>>> should publish an RFC that calls for use of an obsolete
>>> signature algorithm 11 years after the initial crypto
>>> weaknesses were documented in the IETF. If there are good
>>> arguments for that a) I'll be surprised, and b) my plan
>>> would be to ask for advice from the security area - I
>>> don't think we've hit this case before where an experimental
>>> RFC wants to use such a thoroughly obsolete signature
>>> algorithm, one that would never be ok in a standards
>>> track RFC and one where it's really easy to do the right
>>> thing instead.
>>>
>>> Cheers,
>>> S.
>>>
>>> [1] https://tools.ietf.org/html/rfc4270
>>> [2] https://tools.ietf.org/html/rfc6194
>>>
>>>
>>>>      Authors will take in your comments in the next revision of the
>>>> draft.
>>>>
>>>> Anton
>>>>
>>>> On Thursday 27 October 2016 14:44, Stephen Farrell wrote:
>>>>> Stephen Farrell has entered the following ballot position for
>>>>> draft-ietf-lisp-ddt-08: Discuss
>>>>>
>>>>> When responding, please keep the subject line intact and reply to all
>>>>> email addresses included in the To and CC lines. (Feel free to cut this
>>>>> introductory paragraph, however.)
>>>>>
>>>>>
>>>>> Please refer to
>>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>>
>>>>>
>>>>> The document, along with other ballot positions, can be found here:
>>>>> https://datatracker.ietf.org/doc/draft-ietf-lisp-ddt/
>>>>>
>>>>>
>>>>>
>>>>> ----------------------------------------------------------------------
>>>>> DISCUSS:
>>>>> ----------------------------------------------------------------------
>>>>>
>>>>>
>>>>> 6.4.1: RSA-SHA1 is not the right choice today, shouldn't
>>>>> this be RSA-SHA256?
>>>>>
>>>>>
>>>>> ----------------------------------------------------------------------
>>>>> COMMENT:
>>>>> ----------------------------------------------------------------------
>>>>>
>>>>>
>>>>> - 6.4.1: Can you clarify what bits are signed? I'm not
>>>>> quite sure from the description given - you can have
>>>>> more than one signature but you say the the "entire
>>>>> record" is covered.
>>>>>
>>>>> - Section 8: Where's signature validation in the
>>>>> pseudo-code?
>>>>>
>>>>>