Re: [Lsr] New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt

Qin Wu <bill.wu@huawei.com> Mon, 27 August 2018 02:39 UTC

Return-Path: <bill.wu@huawei.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81B4C130E85 for <lsr@ietfa.amsl.com>; Sun, 26 Aug 2018 19:39:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SeffGfLISiA9 for <lsr@ietfa.amsl.com>; Sun, 26 Aug 2018 19:39:49 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAC4B130E7F for <lsr@ietf.org>; Sun, 26 Aug 2018 19:39:48 -0700 (PDT)
Received: from LHREML710-CAH.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 1C8F6B404F79A for <lsr@ietf.org>; Mon, 27 Aug 2018 03:39:45 +0100 (IST)
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by LHREML710-CAH.china.huawei.com (10.201.108.33) with Microsoft SMTP Server (TLS) id 14.3.399.0; Mon, 27 Aug 2018 03:39:45 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.79]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0399.000; Mon, 27 Aug 2018 10:39:41 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Acee Lindem (acee)" <acee@cisco.com>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
Thread-Index: AQHUO1Yg+5jLq2ECyU+LSXY1AXR5QKTONaOQgAC/qYCAAMkskIABAIgAgAIog2A=
Date: Mon, 27 Aug 2018 02:39:40 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9AFDA619@nkgeml513-mbx.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA9AFD7A4C@nkgeml513-mbx.china.huawei.com> <5111BA63-43CD-4341-BA11-E439A4C3E54F@cisco.com> <B8F9A780D330094D99AF023C5877DABA9AFD96DC@nkgeml513-mbx.china.huawei.com> <0A2BC8DB-CB49-4228-8BFA-A7378F828EAF@cisco.com>
In-Reply-To: <0A2BC8DB-CB49-4228-8BFA-A7378F828EAF@cisco.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.138.33.244]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/EVkgVGjPdhrXKtFHtbPsuGU9buE>
Subject: Re: [Lsr] New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Aug 2018 02:39:56 -0000

Agree, your proposal sounds reasonable to me. Thanks.

-Qin
-----邮件原件-----
发件人: Acee Lindem (acee) [mailto:acee@cisco.com] 
发送时间: 2018年8月26日 1:41
收件人: Qin Wu; lsr@ietf.org
主题: Re: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt

Hi Qin, 

I believe it is a significant security exposure to include the actual keys in IGPs. What I was suggesting was to include an identifier of the key to be used.

Thanks,
Acee

On 8/24/18, 10:56 PM, "Qin Wu" <bill.wu@huawei.com> wrote:

    Hi, Acee:
    -----邮件原件-----
    发件人: Acee Lindem (acee) [mailto:acee@cisco.com] 
    发送时间: 2018年8月24日 22:23
    收件人: Qin Wu; lsr@ietf.org
    主题: Re: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
    
    Hi Qin, 
    
    On 8/23/18, 11:03 PM, "Qin Wu" <bill.wu@huawei.com> wrote:
    
        Hi, Folks:
        draft-wu-pce-discovery-pceps-support-07 has been resubmitted to LSR as draft-wu-lsr-pce-discovery-security-support-00 based on Chairs' suggestion.
        https://tools.ietf.org/html/draft-wu-lsr-pce-discovery-security-support-00
        This draft define IGP extension for PCEP security support, 
        1.TCP AO which has been published as RFC5295.
        2.PCEP over TLS which has been published as RFC8253 recently.
        
        One issue raised by chair is shared key support for TCP-AO, how do you get shared key?
    
    I guess my point was is that if you are distributing shared keys, you probably know whether or not TCP-AO is supported. Having said that, possibly the draft should include some sort of key-id for TCP-AO or TLS usage. For example, the key-chain name from RFC 8177. We don't need to decide now. 
    
    [Qin]: RFC5088 " OSPF Protocol Extensions for PCE discovery" said:
    "
       PCE discovery information is, by nature, fairly static and does not
       change with PCE activity.  Changes in PCE discovery information may
       occur as a result of PCE configuration updates, PCE
       deployment/activation, PCE deactivation/suppression, or PCE failure.
       Hence, this information is not expected to change frequently.
    "
    So security capability as part of PCE discovery information should also be static. 
    
    RFC5926 section 3.1 said:
    "
    In TCP-AO's manual key mode, this is a key shared by both peers, entered via some interface to their
    respective configurations.  The Master_Key is used as the seed for the KDF.
    "
    My impression TCP-AO relies on manual installation for shared key. But TLS has key management protocol to exchange shared key,e.g., one defined in RFC4279.
    We can either negotiate shared key for TCP-AO in the PCE discovery phase or during PCE configuration phase. For TLS usage, this is not needed, in my opinion.
    To support shared key negotiation during PCE discovery phase, we need to define a IGP PCED Sub-TLV for TCP-AO, I am not sure this is allowed according to RFC5088,
    It looks this new IGP PCEP TLV is a companion Sub-TLV for PCE-CAP-FLAGS Sub-TLV. 
    If adding a new Sub-TLV is allowed, we can add algorithm identifier and key chain name,key identifier altogether.
    
    If negotiating shared key during PCE configuration phase, it is clearly beyond scope of this draft.
    Thanks,
    Acee 
    
    
        we believe to support TCP-AO, RFC5296 should also be implemented, which provide PSK and associated ciphersuit.
        Let us know if you have any other opinion?
        
        -Qin
        -----邮件原件-----
        发件人: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org] 
        发送时间: 2018年8月24日 10:57
        收件人: Daniel King; wangzitao; Dhruv Dhody; wangzitao; Diego R. Lopez; Diego Lopez; Qin Wu
        主题: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
        
        
        A new version of I-D, draft-wu-lsr-pce-discovery-security-support-00.txt
        has been successfully submitted by Qin Wu and posted to the IETF repository.
        
        Name:		draft-wu-lsr-pce-discovery-security-support
        Revision:	00
        Title:		IGP extension for PCEP security capability support in the PCE discovery
        Document date:	2018-08-23
        Group:		Individual Submission
        Pages:		6
        URL:            https://www.ietf.org/internet-drafts/draft-wu-lsr-pce-discovery-security-support-00.txt
        Status:         https://datatracker.ietf.org/doc/draft-wu-lsr-pce-discovery-security-support/
        Htmlized:       https://tools.ietf.org/html/draft-wu-lsr-pce-discovery-security-support-00
        Htmlized:       https://datatracker.ietf.org/doc/html/draft-wu-lsr-pce-discovery-security-support
        
        
        Abstract:
           When a Path Computation Element (PCE) is a Label Switching Router
           (LSR) participating in the Interior Gateway Protocol (IGP), or even a
           server participating in IGP, its presence and path computation
           capabilities can be advertised using IGP flooding.  The IGP
           extensions for PCE discovery (RFC 5088 and RFC 5089) define a method
           to advertise path computation capabilities using IGP flooding for
           OSPF and IS-IS respectively.  However these specifications lack a
           method to advertise PCEP security (e.g., Transport Layer
           Security(TLS),TCP Authentication Option (TCP-AO)) support capability.
        
           This document proposes new capability flag bits for PCE-CAP-FLAGS
           sub-TLV that can be announced as attribute in the IGP advertisement
           to distribute PCEP security support information.
        
                                                                                          
        
        
        Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.
        
        The IETF Secretariat