Re: [Lsr] New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt

"Acee Lindem (acee)" <acee@cisco.com> Sat, 25 August 2018 17:41 UTC

Return-Path: <acee@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69CF5130EDB for <lsr@ietfa.amsl.com>; Sat, 25 Aug 2018 10:41:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level:
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k6Q9lW4l_9NK for <lsr@ietfa.amsl.com>; Sat, 25 Aug 2018 10:41:27 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A084F130EDA for <lsr@ietf.org>; Sat, 25 Aug 2018 10:41:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8040; q=dns/txt; s=iport; t=1535218887; x=1536428487; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=uJ409mqbh+LcvD0PiAqhfZ4YajTS+VpCzbjTft7ydA0=; b=VFnyXYGEFddUi0gyXn1ShfxE9yCwEalVT19+pwlCpCrE+w69Adb0de9P 4WCK4LVUr86UFW9w2oEQ9Lr+HC7X8kqqnevcOE6DMojRxeaU2F8XG6Vvn r5Yp7GFmGSLi91taFJYYMiO00uIg0CgZ2EOhS4vbfLZ8du/s/aQzTvz5s 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AmAQCik4Fb/4ENJK1aGQEBAQEBAQEBAQEBAQcBAQEBAYNPZX8oCoNmiBCMI4Fog2KSaYF6CyWERwIXgnkhNBgBAgEBAgEBAm0cDIU4AwMjEUMSAgEGAg4MAiMDAgICMBQBEAIEARKDIQGCAQ+GM5tLgS6Ea4V3gQuISxeCAIERAScME4JMgxsBAQIBAYFHFoMBMYImAodsD4UhjhAJAoVXWok8F4E/SINqiFaLHIgFAhEUgSQdOIFScBUaSwGCPgmCHBcRiEiFPm8BC41cgRwBAQ
X-IronPort-AV: E=Sophos;i="5.53,287,1531785600"; d="scan'208";a="442952160"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Aug 2018 17:41:26 +0000
Received: from XCH-RTP-015.cisco.com (xch-rtp-015.cisco.com [64.101.220.155]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id w7PHfQfn022458 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 25 Aug 2018 17:41:26 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-015.cisco.com (64.101.220.155) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Sat, 25 Aug 2018 13:41:25 -0400
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1367.000; Sat, 25 Aug 2018 13:41:25 -0400
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Qin Wu <bill.wu@huawei.com>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
Thread-Index: AQHUO1Yg+5jLq2ECyU+LSXY1AXR5QKTONaOQgAC/qYCAAMkskIABAIgA
Date: Sat, 25 Aug 2018 17:41:25 +0000
Message-ID: <0A2BC8DB-CB49-4228-8BFA-A7378F828EAF@cisco.com>
References: <B8F9A780D330094D99AF023C5877DABA9AFD7A4C@nkgeml513-mbx.china.huawei.com> <5111BA63-43CD-4341-BA11-E439A4C3E54F@cisco.com> <B8F9A780D330094D99AF023C5877DABA9AFD96DC@nkgeml513-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA9AFD96DC@nkgeml513-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.204]
Content-Type: text/plain; charset="utf-8"
Content-ID: <4E70E6CC53A0C64F90914F4858AFD656@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.155, xch-rtp-015.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/gw6M1skPDCsNBiKUDmvCacBhuZw>
Subject: Re: [Lsr] New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Aug 2018 17:41:31 -0000

Hi Qin, 

I believe it is a significant security exposure to include the actual keys in IGPs. What I was suggesting was to include an identifier of the key to be used.

Thanks,
Acee

On 8/24/18, 10:56 PM, "Qin Wu" <bill.wu@huawei.com> wrote:

    Hi, Acee:
    -----邮件原件-----
    发件人: Acee Lindem (acee) [mailto:acee@cisco.com] 
    发送时间: 2018年8月24日 22:23
    收件人: Qin Wu; lsr@ietf.org
    主题: Re: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
    
    Hi Qin, 
    
    On 8/23/18, 11:03 PM, "Qin Wu" <bill.wu@huawei.com> wrote:
    
        Hi, Folks:
        draft-wu-pce-discovery-pceps-support-07 has been resubmitted to LSR as draft-wu-lsr-pce-discovery-security-support-00 based on Chairs' suggestion.
        https://tools.ietf.org/html/draft-wu-lsr-pce-discovery-security-support-00
        This draft define IGP extension for PCEP security support, 
        1.TCP AO which has been published as RFC5295.
        2.PCEP over TLS which has been published as RFC8253 recently.
        
        One issue raised by chair is shared key support for TCP-AO, how do you get shared key?
    
    I guess my point was is that if you are distributing shared keys, you probably know whether or not TCP-AO is supported. Having said that, possibly the draft should include some sort of key-id for TCP-AO or TLS usage. For example, the key-chain name from RFC 8177. We don't need to decide now. 
    
    [Qin]: RFC5088 " OSPF Protocol Extensions for PCE discovery" said:
    "
       PCE discovery information is, by nature, fairly static and does not
       change with PCE activity.  Changes in PCE discovery information may
       occur as a result of PCE configuration updates, PCE
       deployment/activation, PCE deactivation/suppression, or PCE failure.
       Hence, this information is not expected to change frequently.
    "
    So security capability as part of PCE discovery information should also be static. 
    
    RFC5926 section 3.1 said:
    "
    In TCP-AO's manual key mode, this is a key shared by both peers, entered via some interface to their
    respective configurations.  The Master_Key is used as the seed for the KDF.
    "
    My impression TCP-AO relies on manual installation for shared key. But TLS has key management protocol to exchange shared key,e.g., one defined in RFC4279.
    We can either negotiate shared key for TCP-AO in the PCE discovery phase or during PCE configuration phase. For TLS usage, this is not needed, in my opinion.
    To support shared key negotiation during PCE discovery phase, we need to define a IGP PCED Sub-TLV for TCP-AO, I am not sure this is allowed according to RFC5088,
    It looks this new IGP PCEP TLV is a companion Sub-TLV for PCE-CAP-FLAGS Sub-TLV. 
    If adding a new Sub-TLV is allowed, we can add algorithm identifier and key chain name,key identifier altogether.
    
    If negotiating shared key during PCE configuration phase, it is clearly beyond scope of this draft.
    Thanks,
    Acee 
    
    
        we believe to support TCP-AO, RFC5296 should also be implemented, which provide PSK and associated ciphersuit.
        Let us know if you have any other opinion?
        
        -Qin
        -----邮件原件-----
        发件人: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org] 
        发送时间: 2018年8月24日 10:57
        收件人: Daniel King; wangzitao; Dhruv Dhody; wangzitao; Diego R. Lopez; Diego Lopez; Qin Wu
        主题: New Version Notification for draft-wu-lsr-pce-discovery-security-support-00.txt
        
        
        A new version of I-D, draft-wu-lsr-pce-discovery-security-support-00.txt
        has been successfully submitted by Qin Wu and posted to the IETF repository.
        
        Name:		draft-wu-lsr-pce-discovery-security-support
        Revision:	00
        Title:		IGP extension for PCEP security capability support in the PCE discovery
        Document date:	2018-08-23
        Group:		Individual Submission
        Pages:		6
        URL:            https://www.ietf.org/internet-drafts/draft-wu-lsr-pce-discovery-security-support-00.txt
        Status:         https://datatracker.ietf.org/doc/draft-wu-lsr-pce-discovery-security-support/
        Htmlized:       https://tools.ietf.org/html/draft-wu-lsr-pce-discovery-security-support-00
        Htmlized:       https://datatracker.ietf.org/doc/html/draft-wu-lsr-pce-discovery-security-support
        
        
        Abstract:
           When a Path Computation Element (PCE) is a Label Switching Router
           (LSR) participating in the Interior Gateway Protocol (IGP), or even a
           server participating in IGP, its presence and path computation
           capabilities can be advertised using IGP flooding.  The IGP
           extensions for PCE discovery (RFC 5088 and RFC 5089) define a method
           to advertise path computation capabilities using IGP flooding for
           OSPF and IS-IS respectively.  However these specifications lack a
           method to advertise PCEP security (e.g., Transport Layer
           Security(TLS),TCP Authentication Option (TCP-AO)) support capability.
        
           This document proposes new capability flag bits for PCE-CAP-FLAGS
           sub-TLV that can be announced as attribute in the IGP advertisement
           to distribute PCEP security support information.
        
                                                                                          
        
        
        Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.
        
        The IETF Secretariat