Re: [MEXT] review of draft-bajko-mext-sod-01
Julien Laganier <julien.ietf@gmail.com> Wed, 09 February 2011 23:22 UTC
Return-Path: <julien.ietf@gmail.com>
X-Original-To: mext@core3.amsl.com
Delivered-To: mext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 5D5973A65A6 for <mext@core3.amsl.com>;
Wed, 9 Feb 2011 15:22:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.5
X-Spam-Level:
X-Spam-Status: No, score=-2.5 tagged_above=-999 required=5 tests=[AWL=-0.861,
BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ITIcSrG1iNwh for
<mext@core3.amsl.com>; Wed, 9 Feb 2011 15:22:30 -0800 (PST)
Received: from mail-fx0-f44.google.com (mail-fx0-f44.google.com
[209.85.161.44]) by core3.amsl.com (Postfix) with ESMTP id B614E3A67AC for
<mext@ietf.org>; Wed, 9 Feb 2011 15:22:29 -0800 (PST)
Received: by fxm9 with SMTP id 9so804522fxm.31 for <mext@ietf.org>;
Wed, 09 Feb 2011 15:22:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma;
h=domainkey-signature:mime-version:in-reply-to:references:date
:message-id:subject:from:to:cc:content-type :content-transfer-encoding;
bh=y7sThkexvWEeeRO7NTKknw+yZXpeWDGJsCTaUQhkZx4=;
b=nFTjOSqv0GbFRYxqJeMd29yg1FXzxRqYhWak/IQmy0L5DKfVmoMR8w1M5WdEMs22eM
ll4N/iesp3jgONjqY+zTzZaqY4A8rUCjTq/fcoY+uV7opQ2iEh3a5eOi49QfZSNN6xlW
r6zZK5ROuxgbxSfzZ1q3Q05XM8PIcVezfDNaM=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma;
h=mime-version:in-reply-to:references:date:message-id:subject:from:to
:cc:content-type:content-transfer-encoding;
b=ITGtMcBhJHdGEAua5HCjTgRr3FfEcMTsOW//xTU0aoLWNJWHOV+UlNXFPhHkTUQ0DA
V3wP0c8X7qFWm+PeuOqzgjJsPC7ZjXP/HzxenzjH95OYfAqI+WTolul6r5eQ4KcbgAv8
YRIAIx1gQiaTh94w84N7Of4NPUF0EDRQfM4VA=
MIME-Version: 1.0
Received: by 10.103.124.3 with SMTP id b3mr1012251mun.3.1297293759718;
Wed, 09 Feb 2011 15:22:39 -0800 (PST)
Received: by 10.103.221.9 with HTTP; Wed, 9 Feb 2011 15:22:39 -0800 (PST)
In-Reply-To: <680854867F7FD04BB9B06EB8ACA8D5AC05EFEE0A@XCH02DFW.rim.net>
References: <5ECC386B-CD36-45AE-943D-01F39264242D@gmail.com>
<680854867F7FD04BB9B06EB8ACA8D5AC05EFEE0A@XCH02DFW.rim.net>
Date: Wed, 9 Feb 2011 15:22:39 -0800
Message-ID: <AANLkTi=nK1hsmmMFj3+sDvY=Z+x1Os1fon_zB2pEnNrM@mail.gmail.com>
From: Julien Laganier <julien.ietf@gmail.com>
To: Stefano Faccin <sfaccin@rim.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
Cc: mext@ietf.org
Subject: Re: [MEXT] review of draft-bajko-mext-sod-01
X-BeenThere: mext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Mobile IPv6 EXTensions WG <mext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mext>,
<mailto:mext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mext>
List-Post: <mailto:mext@ietf.org>
List-Help: <mailto:mext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mext>,
<mailto:mext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Feb 2011 23:22:31 -0000
Hi Stefano, Thanks for the review! I am following up on your comments inline below: On Wed, Feb 9, 2011 at 2:43 PM, Stefano Faccin <sfaccin@rim.com> wrote: > Hello all, > I finally got to review the draft as promised in Beijing. It seems Jouni and I completed the review at the same time. I have not yet read all the replies. > > === Section 1: > > " As per the current specifications for MIP6 and DSMIP6, security of > the user plane traffic is optional. When the MN is attached to 3G/4G > network such as HSPA, LTE or EV-DO, the MN may not require security > for the user plane traffic since these networks already provide > ciphering over the air-interface and deploy hop-by-hop security, > which makes these networks secure. However the MN may attach to less > secure or unsecured accesses such as wireless lan (WLAN) or it may > roam in countries where the user may prefer the data between the MN > and the HA to be encrypted (even when using cellular accesses). > There is no solution in the protocol specification today which > provides the capability to trigger the security for the user plane > traffic on a need basis." > [Stefano] when the MN attaches in one of the scenarios indicated (either the MN is connecting over access technology/network that it does not consider secure or it is connecting through a network – e.g. roaming cellular network – that it does not consider secure), the MN knows this fact (i.e. that it is not secure). Further down in the draft this is stated also by the authors. Then, since the MN knows of the lack of security at attachment, why can't the MN decide to establish the user plane security right away upon establishment of the connection? The text in the introduction seems to imply than in such cases the MN would wait and then a new mechanism is needed. If the HA has an SPD entry for the user-plane traffic with action set to PROTECT, the MN will not be able to send cleartext user-plane packets when the access network it attached to is deemed secure and thus no user-plane confidentiality protection would be needed. Conversely, if the HA has an SPD entry for the user-plane traffic with action set to BYPASS, the MN will not be able to send IPsec protected user-plane packets when the access network it attached to is deemed insecure and thus user-plane confidentiality protection would be needed. Does the above manages to shed some light on why is the mechanism needed? > === Section 1 > > " The MIP6/DSMIP6 protocols only provide a means to secure the user > plane traffic but do not provide any mechanisms by which the > security is triggered as a result of mobility or the MN attaching > via different access networks." > > [Stefano] in my understanding, RFC4877 allows the MN to establish the security for the user plane traffic at any time (as the authors also state in section 2). What triggers the MN to do so is of course outside the scope of RFC4877, but it should be outside the scope of this draft also. If we don't consider what triggers the MN to establish the SA for the user plane, it seems to me that RF4877 is sufficient. Please note that as a example 3GPP has already adopted RFC4877 for securing the user plane on the S2c interface (DSMIPv6) where the MN or the HA at any time can establish a child SA for securing the user plane. That is to me clearly on-demand user plane security based on whatever criteria the MN and the HA implement to trigger the security establishment. Although it is true establishment of IPsec SAs affording confidentiality and/or integrity protection to user plane packets can be initiated by the MN at any time, establishment of these SAs is contingent to the IPsec SPD on both the MN and the HA specifying that such protection be afforded to user plane traffic. Further, in the presence of such SPD entries on the MN and HA, absence of the IPsec SAs means not that traffic will be past clear text. On the contrary, traffic will be buffered and/or discarded while the MN attempt to establish the IPsec SAs required as per the SPD. Conversely, in the absence of such SPD entries, the MN and HA will never attempt establishment of IPsec SAs affording protection to user plane packets. Further, if only the MN changes its SPD to require protection but the HA hasn't (based on the signaling hereby proposed), IKEv2 exchange will not lead to the HA accepting to establish such SAs. > === Section 2 > > " The MN has either a stored policy about trusted and untrusted access > networks or it may be provided with such information from policy > stores such as the ANDSF [23.402] or AAA server at the time of > network attachment." > > [Stefano] unfortunately I believe that quoting ANDSF as specified in 3GPP in 23.402 as the entity that may provide information to the MN on whether a network is trusted or untrusted is incorrect. 23.402 (and in particular the stage 3 in 24.302 and 24.312) do not contain such information that can be conveyed to the MN. Agree that in its current form the ANDSF takes no position on whether or not a network should be considered as trusted. This may change however, so maybe rewording into "[...] from extensions to policy stores such as the ANDSF [23.402] or AAA server at the time of network attachment." would ease your concern? Another thing I'd like to see reference in this draft is the possibility to use the presence or the absence of link layer confidentiality protection as an input to the MN requesting confidentiality protection. In wireless system, the first over-the-air hop is the most vulnerable to eavesdropping. > === Section 2 > > "An interface exists generally between the policy > store such as AAA or ANDSF and the Home Agent (HA)." > > [Stefano] I need to disagree with this statement, as indicated in Beijing. There is no interface in 3GPP defined between the ANDSF and the HA, therefore the statement is incorrect. > > === Section 2 > > "The MN or HA can determine when to use security for the user plane > traffic using static policies or dynamic policies which can be > obtained at the time of network attachment; or e.g. which are > provisioned and maintained on a smartcard (eg, a UICC or SIM). 3GPP > policy stores such as the ANDSF can also provide information about > the access networks to which an MN is attached. Location of the MN > can also be used as input. " > > [Stefano] for sake of clarity, can we say "3GPP > policy stores such as the ANDSF can also provide to the MN information about > the access networks to which an MN is attached " > > === Section 3 > > " This document proposes extensions to MIPv6/DSMIPv6 protocol, > allowing the MN to signal to the HA its preference for user plane > traffic security > " > > [Stefano] I am wondering why the MN needs to signal its preference. If the MN at any time wants to setup a child SA, why can’t the MN directly do it without indicating the preference? Hopefully I have managed to answer that question with my earlier comment on the need to have coordinated SPD on the MN and HA. Since IKE doesn't allow modification to the SPD, this has to be coordinated through MIPv6 signaling, > === Section 3 > > " and for the HA to override that preference based > on the policy settings. " > [Stefano] In the same way, if the MN at any time decides to establish an SA for the user plane, why can’t it do it based on RFC 4877, since the HA can accept it or deny the MN request anyway? > > > In general, I have the same concern expressed in Beijing as to how the HA knows whether an access is trusted/untrusted and whether there is the need for user plane security, and therefore how the HA can decide to trigger the security establishment in a meaningful/educated way. Trusted/untrusted is not just a decision based on the available encryption over the radio interface, but also a roaming agreement. E.g. a given WLAN can be trusted for one operator but untrusted for another one, and it could even be trusted for one user (e.g. a user that anyway knows it needs to run VPN to connect to the desired services) but untrusted for another one. The HA cannot know such information. In the case of 3GPP networks, as it was discussed in Beijing, the trusted/untrusted decision is performed either by the MN (based on preconfigured information) or by the AAA infrastructure that authenticates the MN access to the specific access network. Please note that such authentication is separate for the DSMIPv6 authentication in 3GPP, and that the trusted/untrusted decision performed during the first authentication is not stored and "remembered" so that it can be provided to the HA. Again, this were the comments I raised in Beijing. >From my side, I believe the main usecase is one in which the MN unilaterally decide whether to use encryption or not (based on L2 encryption being ON or OFF, and possibly whitelists pulled through ANDSF or other policy store extensions, or user preferences) and informs the HA about its choice so that the SPD are aligned on both sides, thus resulting in IKEv2 establishing or not the required IPsec SAs to afford protection to user plane packets. > Overall, as I expressed in Beijing, I am not sure I see the need for this solution and its applicability to e.g. 3GPP, as indicated in the draft. Perhaps I need to be further educated, but the draft at present does not clarify why an additional solution is needed. Hopefully I have clarified why I think this is useful. --julien
- [MEXT] review of draft-bajko-mext-sod-01 jouni korhonen
- Re: [MEXT] review of draft-bajko-mext-sod-01 Julien Laganier
- Re: [MEXT] review of draft-bajko-mext-sod-01 Basavaraj.Patil
- Re: [MEXT] review of draft-bajko-mext-sod-01 jouni korhonen
- Re: [MEXT] review of draft-bajko-mext-sod-01 Julien Laganier
- [MEXT] review of draft-bajko-mext-sod-01 Stefano Faccin
- Re: [MEXT] review of draft-bajko-mext-sod-01 jouni korhonen
- Re: [MEXT] review of draft-bajko-mext-sod-01 Julien Laganier
- Re: [MEXT] review of draft-bajko-mext-sod-01 Stefano Faccin
- Re: [MEXT] review of draft-bajko-mext-sod-01 Julien Laganier