Re: [Lsr] New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt

Qin Wu <bill.wu@huawei.com> Sat, 25 August 2018 02:56 UTC

Return-Path: <bill.wu@huawei.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9B62130DF3 for <lsr@ietfa.amsl.com>; Fri, 24 Aug 2018 19:56:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WubuqcZx1NAu for <lsr@ietfa.amsl.com>; Fri, 24 Aug 2018 19:56:48 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3100B130DC3 for <lsr@ietf.org>; Fri, 24 Aug 2018 19:56:48 -0700 (PDT)
Received: from LHREML712-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id EB83F1F8AD7E2 for <lsr@ietf.org>; Sat, 25 Aug 2018 03:56:41 +0100 (IST)
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by LHREML712-CAH.china.huawei.com (10.201.108.35) with Microsoft SMTP Server (TLS) id 14.3.399.0; Sat, 25 Aug 2018 03:56:42 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.79]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0399.000; Sat, 25 Aug 2018 10:56:36 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Acee Lindem (acee)" <acee@cisco.com>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
Thread-Index: AQHUO1Yg+5jLq2ECyU+LSXY1AXR5QKTONaOQgAC/qYCAAMkskA==
Date: Sat, 25 Aug 2018 02:56:36 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9AFD96DC@nkgeml513-mbx.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA9AFD7A4C@nkgeml513-mbx.china.huawei.com> <5111BA63-43CD-4341-BA11-E439A4C3E54F@cisco.com>
In-Reply-To: <5111BA63-43CD-4341-BA11-E439A4C3E54F@cisco.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.138.33.244]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/I-hnpX9BigQnZbZhUrIyOFg0MdY>
Subject: Re: [Lsr] New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Aug 2018 02:56:51 -0000

Hi, Acee:
-----邮件原件-----
发件人: Acee Lindem (acee) [mailto:acee@cisco.com] 
发送时间: 2018年8月24日 22:23
收件人: Qin Wu; lsr@ietf.org
主题: Re: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt

Hi Qin, 

On 8/23/18, 11:03 PM, "Qin Wu" <bill.wu@huawei.com> wrote:

    Hi, Folks:
    draft-wu-pce-discovery-pceps-support-07 has been resubmitted to LSR as draft-wu-lsr-pce-discovery-security-support-00 based on Chairs' suggestion.
    https://tools.ietf.org/html/draft-wu-lsr-pce-discovery-security-support-00
    This draft define IGP extension for PCEP security support, 
    1.TCP AO which has been published as RFC5295.
    2.PCEP over TLS which has been published as RFC8253 recently.
    
    One issue raised by chair is shared key support for TCP-AO, how do you get shared key?

I guess my point was is that if you are distributing shared keys, you probably know whether or not TCP-AO is supported. Having said that, possibly the draft should include some sort of key-id for TCP-AO or TLS usage. For example, the key-chain name from RFC 8177. We don't need to decide now. 

[Qin]: RFC5088 " OSPF Protocol Extensions for PCE discovery" said:
"
   PCE discovery information is, by nature, fairly static and does not
   change with PCE activity.  Changes in PCE discovery information may
   occur as a result of PCE configuration updates, PCE
   deployment/activation, PCE deactivation/suppression, or PCE failure.
   Hence, this information is not expected to change frequently.
"
So security capability as part of PCE discovery information should also be static. 

RFC5926 section 3.1 said:
"
In TCP-AO's manual key mode, this is a key shared by both peers, entered via some interface to their
respective configurations.  The Master_Key is used as the seed for the KDF.
"
My impression TCP-AO relies on manual installation for shared key. But TLS has key management protocol to exchange shared key,e.g., one defined in RFC4279.
We can either negotiate shared key for TCP-AO in the PCE discovery phase or during PCE configuration phase. For TLS usage, this is not needed, in my opinion.
To support shared key negotiation during PCE discovery phase, we need to define a IGP PCED Sub-TLV for TCP-AO, I am not sure this is allowed according to RFC5088,
It looks this new IGP PCEP TLV is a companion Sub-TLV for PCE-CAP-FLAGS Sub-TLV. 
If adding a new Sub-TLV is allowed, we can add algorithm identifier and key chain name,key identifier altogether.

If negotiating shared key during PCE configuration phase, it is clearly beyond scope of this draft.
Thanks,
Acee 


    we believe to support TCP-AO, RFC5296 should also be implemented, which provide PSK and associated ciphersuit.
    Let us know if you have any other opinion?
    
    -Qin
    -----邮件原件-----
    发件人: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org] 
    发送时间: 2018年8月24日 10:57
    收件人: Daniel King; wangzitao; Dhruv Dhody; wangzitao; Diego R. Lopez; Diego Lopez; Qin Wu
    主题: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
    
    
    A new version of I-D, draft-wu-lsr-pce-discovery-security-support-00.txt
    has been successfully submitted by Qin Wu and posted to the IETF repository.
    
    Name:		draft-wu-lsr-pce-discovery-security-support
    Revision:	00
    Title:		IGP extension for PCEP security capability support in the PCE discovery
    Document date:	2018-08-23
    Group:		Individual Submission
    Pages:		6
    URL:            https://www.ietf.org/internet-drafts/draft-wu-lsr-pce-discovery-security-support-00.txt
    Status:         https://datatracker.ietf.org/doc/draft-wu-lsr-pce-discovery-security-support/
    Htmlized:       https://tools.ietf.org/html/draft-wu-lsr-pce-discovery-security-support-00
    Htmlized:       https://datatracker.ietf.org/doc/html/draft-wu-lsr-pce-discovery-security-support
    
    
    Abstract:
       When a Path Computation Element (PCE) is a Label Switching Router
       (LSR) participating in the Interior Gateway Protocol (IGP), or even a
       server participating in IGP, its presence and path computation
       capabilities can be advertised using IGP flooding.  The IGP
       extensions for PCE discovery (RFC 5088 and RFC 5089) define a method
       to advertise path computation capabilities using IGP flooding for
       OSPF and IS-IS respectively.  However these specifications lack a
       method to advertise PCEP security (e.g., Transport Layer
       Security(TLS),TCP Authentication Option (TCP-AO)) support capability.
    
       This document proposes new capability flag bits for PCE-CAP-FLAGS
       sub-TLV that can be announced as attribute in the IGP advertisement
       to distribute PCEP security support information.
    
                                                                                      
    
    
    Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.
    
    The IETF Secretariat