Re: [MSEC] WGLC on draft-ietf-msec-gdoi-update-08

Sean Turner <turners@ieca.com> Mon, 18 April 2011 21:24 UTC

Return-Path: <turners@ieca.com>
X-Original-To: msec@ietfc.amsl.com
Delivered-To: msec@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 8A7D8E071C for <msec@ietfc.amsl.com>; Mon, 18 Apr 2011 14:24:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.165
X-Spam-Level:
X-Spam-Status: No, score=-102.165 tagged_above=-999 required=5 tests=[AWL=-0.167, BAYES_00=-2.599, J_CHICKENPOX_81=0.6, UNPARSEABLE_RELAY=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sNYIrXzxDAsu for <msec@ietfc.amsl.com>; Mon, 18 Apr 2011 14:24:55 -0700 (PDT)
Received: from nm14-vm0.bullet.mail.sp2.yahoo.com (nm14-vm0.bullet.mail.sp2.yahoo.com [98.139.91.246]) by ietfc.amsl.com (Postfix) with SMTP id 8EA99E069A for <msec@ietf.org>; Mon, 18 Apr 2011 14:24:52 -0700 (PDT)
Received: from [98.139.91.63] by nm14.bullet.mail.sp2.yahoo.com with NNFMP; 18 Apr 2011 21:24:49 -0000
Received: from [98.139.91.59] by tm3.bullet.mail.sp2.yahoo.com with NNFMP; 18 Apr 2011 21:24:49 -0000
Received: from [127.0.0.1] by omp1059.mail.sp2.yahoo.com with NNFMP; 18 Apr 2011 21:24:49 -0000
X-Yahoo-Newman-Id: 127864.93037.bm@omp1059.mail.sp2.yahoo.com
Received: (qmail 16811 invoked from network); 18 Apr 2011 21:24:49 -0000
Received: from thunderfish.local (turners@71.191.4.207 with plain) by smtp111.biz.mail.sp1.yahoo.com with SMTP; 18 Apr 2011 14:24:47 -0700 PDT
X-Yahoo-SMTP: ZrP3VLSswBDL75pF8ymZHDSu9B.vcMfDPgLJ
X-YMail-OSG: E39eAwkVM1kAl3Kl8wbES8T5NolMcCYrKGrhixWdJPrV0A7 fUVF4xSKewlmVX0OOiCxTu4KTRoqJ64gICRdjbkC0F7xb6YY_dqqY0uPBE8s .NZvtRmoGhJ0xFYFxDNXduqMZ4vwGYMOjW6dEXE8tMcc6DNYCOqqqBaEmqgG Xdyyylf1B7bsVj64LqFm2vrBmJ.6ga55ra7oAy2rSK6wZWoSh3gCFsd_Ng0p Dbn0iaDj6XI3SIR_5Lc03I0EFAgwLuThPD9.ZZp.UZpsTw.4oHxbrepQjDOm mzqfjDyfrLK3QVaz2pJAiQ9JDYoR7s0vPStJp6mkB_V09wnEN4Fa15Qc1OwU RaRj8boRhmld42X..lJGNOOuNE3_kKzblsrJ6SN.E
X-Yahoo-Newman-Property: ymail-3
Message-ID: <4DACAC1E.2060007@ieca.com>
Date: Mon, 18 Apr 2011 17:24:46 -0400
From: Sean Turner <turners@ieca.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.15) Gecko/20110303 Lightning/1.0b2 Thunderbird/3.1.9
MIME-Version: 1.0
To: Brian Weis <bew@cisco.com>
References: <4D94540D.1060605@inrialpes.fr> <4D975866.9070102@ieca.com> <EF45DD82-6C63-4520-90F7-B53C3D0A390B@cisco.com> <4DAC9D93.6070508@ieca.com> <55C09EDE-9F52-4F08-9B91-FB0BA5ADA882@cisco.com>
In-Reply-To: <55C09EDE-9F52-4F08-9B91-FB0BA5ADA882@cisco.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: msec@ietf.org
Subject: Re: [MSEC] WGLC on draft-ietf-msec-gdoi-update-08
X-BeenThere: msec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Multicast Security List <msec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/msec>, <mailto:msec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/msec>
List-Post: <mailto:msec@ietf.org>
List-Help: <mailto:msec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/msec>, <mailto:msec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2011 21:24:57 -0000

On 4/18/11 5:09 PM, Brian Weis wrote:
> Hi Sean,
>
> On Apr 18, 2011, at 1:22 PM, Sean Turner wrote:
>
>> Brian,
>>
>> The changes you suggest look okay to me.
>>
>> As for RSA-PSS, yes the current advice is that it's "better" BUT it requires some interesting things like:
>> - Parameters: With RSA v1.5 the parameters are NULL. With RSA-PSS they're are a bunch things you need to specify: hash algorithm, mask generation algorithm, salt length, and trailer field.
>
> Thanks for the clarification. But if there are "a bunch of things you need to specify", then to get an interoperable solution I guess we'd need to specify them. :-) If that's the case, I'd rather take it out (given the lack of current RSS-PSS usage).

To be fair there's a set of defaults defined in the standard so if you 
were going to add RSA-PSS then you'd need to point to those defaults. 
If nobody is asking for it though ....

> Thanks,
> Brian
>
>> - Certificate: Your certificate is going to be different because you need to carry these parameters.  Not sure any CA is actually issuing RSA-PSS certificates.
>>
>> I think people are just going to skip it and go straight to ECDSA.  I guess it's okay to leave it in there for completeness because there's no requirement to support it.
>>
>> I'll get on to the last sections today.
>>
>> spt
>>
>> On 4/18/11 1:14 PM, Brian Weis wrote:
>>> Hi Sean,
>>>
>>> Thanks for the comprehensive review ... good points, all. I've comments on a few of them inline below.
>>>
>>> On Apr 2, 2011, at 10:09 AM, Sean Turner wrote:
>>>
>>>> #1) Add "updates: 3547 (once approved)" to the header.  This will make it match the intro/abstract.  I can almost guarantee a discuss from somebody on this.
>>>>
>>>> #2) ISAKMP Phase 1 is described in Section 2.1 as "one such mechanism".  This isn't a MUST support.  As far as I can tell there isn't a MUST implement Phase 1 protocol (the protocols in Appendix A are also just examples).  But, to implement this document you've got to do things as described in RFC 2407-2409.  It seems like this doc and IKEv1 are pretty well intertwined.  And, the g-ikev2 draft doesn't use these formats it uses something else...Let's be clear about what it's being used with. It seems like this section ought to be changed as follows:
>>>>
>>>> OLD:
>>>>
>>>>   The following sections describe one such "phase 1" protocol.  Other
>>>>   protocols which may be potential "phase 1" protocols are described in
>>>>   Appendix A.  However, the use of the protocols listed there are not
>>>>   considered part of this document.
>>>>
>>>> 2.1.  ISAKMP Phase 1 protocol
>>>>
>>>>   This document defines how the ISAKMP phase 1 exchanges as defined in
>>>>   [RFC2409] can be used a "phase 1" protocol for GDOI.  The following
>>>>   sections define characteristics of the ISAKMP phase 1 protocols that
>>>>   are unique for these exchanges when used for GDOI.
>>>>
>>>>   Section 7.1 describes how the ISAKMP Phase 1 protocols meet the
>>>>   requirements of a GDOI "phase 1" protocol.
>>>>
>>>> NEW:
>>>>
>>>>   This document defines how the ISAKMP phase 1 exchanges as defined in
>>>>   [RFC2409] can be used a "phase 1" protocol for GDOI.  The following
>>>>   sections define characteristics of the ISAKMP phase 1 protocols that
>>>>   are unique for these exchanges when used for GDOI.
>>>>
>>>>   Section 7.1 describes how the ISAKMP Phase 1 protocols meet the
>>>>   requirements of a GDOI "phase 1" protocol.
>>>>
>>>>
>>>> Delete the 2.1 header and renumber 2.1.1 and 2.1.2 to 2.1 and 2.2, respectively.
>>>>
>>>> I would also delete Appendix A.  The currently proposed IKEv2 mechanism isn't reusing these fields and the KINK option never got defined.
>>>
>>> Removing this text in Section 2 and Appendix A make a lot of sense. The concerns that caused them to be added to RFC 3547 have probably dissolved.
>>>
>>>>
>>>> #3) Sec 3.2: r/Hashes are computed in the manner described within RFC 2409./Hashes are computed in the manner described within [RFC2409].
>>>>
>>>> #4) Sec 3.2: expand prf on first use.
>>>>
>>>> #5) Sec 3.3: 2 lower case "must" should they be "MUST"?
>>>>              1 lower case "should" should it be "SHOULD"?
>>>
>>> These need to be reworded for clarity.
>>>
>>> first must: "Before a GM contacts the GCKS, it must determine the group identifier and acceptable Phase 1 policy via an out-of-band method." This is less of a requirement than stating a pre-requisite. We propose replacing "must" with "needs to".
>>>
>>> second must/should: "If the SEQ payload is present, the sequence number in the SEQ payload must be checked against any previously received sequence number for this group. If it is less than the previously received number, it should be considered stale and ignored." The requirement is actually this: "If the SEQ payload is present, the sequence number included in the SEQ payload MUST be greater than any previously received sequence number. If it is less than the previously received number, it MUST be considered stale and ignored."
>>>
>>>>
>>>> #6) Sec 4.2: Something is wrong with this:
>>>>
>>>>   Flags MUST have the Encryption bit set according to [RFC2008, Section
>>>>   3.1].
>>>>
>>>> Maybe it should be:
>>>>
>>>>   Flags MUST have the Encryption bit set according to Section 3.1 of
>>>>   [RFC2408].
>>>>
>>>> #7) Sec 5: r/in accordance with RFC 2408./in accordance with [RFC2408].
>>>>
>>>> #8) Sec 5.1, 5.2: r/defined in RFC 2408./defined in [RFC2408].
>>>>
>>>> #9) Sec 5.2: This is difficult to parse:
>>>>
>>>>    The
>>>>    next payload MUST NOT be a SAK Payload or SAT Payload type, but the
>>>>    next non-Security Association type payload.
>>>>
>>>> Maybe it's supposed to be:
>>>>
>>>>    The
>>>>    next payload MUST NOT be a SAK Payload or SAT Payload type; it MUST
>>>>    be the
>>>>    next non-Security Association type payload.
>>>>
>>>> #9) Sec 5.2: r/Must/MUST   X4
>>>>
>>>> #10) Sec 5.2.1: r/SA Attributes payloads must be/SA Attributes payloads MUST be
>>>>
>>>> #11) Sec 5.3: r/Must/MUST X2
>>>>               r/should/SHOULD
>>>
>>> The "should" ought to be a "MUST" to ensure interoperability. "Value specifying a port associated with the source Id. A value of zero means that the SRC ID Port field MUST be ignored."
>>>
>>>>               r/must/MUST
>>>>
>>>> #12) Sec 5.3: What is the conformance requirement for the following:
>>>>
>>>>   Any or all attributes may be optional, depending on the group policy.
>>>
>>>>
>>>> #13) Sec 5.3.1:
>>>>
>>>> r/ attributes may be present / attributes MAY be present  or change to say they are OPTIONAL.
>>>>
>>>> r/attributes must/attributes MUST
>>>
>>> OK, some cleanup is in order. We propose removing heading 5.3.1 to make the attribute definition part of 5.3, which is more natural. Then there needs to be a description of what attributes are required, with the rest being OPTIONAL (i.e., included if the group policy has included it).
>>>
>>> How about:
>>>
>>>    o KEK Attributes -- Contains KEK policy attributes associated with
>>>     the group.  The following attributes may be present in a SAK Payload.
>>>     The attributes must follow the format defined in ISAKMP (Section 3.3
>>>     of [RFC2408]).  In the table, attributes that are defined as TV are
>>>     marked as Basic (B); attributes that are defined as TLV are marked as
>>>     Variable (V).
>>>
>>>
>>>                  ID Class                   Value    Type
>>>                  --------                   -----    ----
>>>                  RESERVED                     0
>>>                  KEK_MANAGEMENT_ALGORITHM     1        B
>>>                  KEK_ALGORITHM                2        B
>>>                  KEK_KEY_LENGTH               3        B
>>>                  KEK_KEY_LIFETIME             4        V
>>>                  SIG_HASH_ALGORITHM           5        B
>>>                  SIG_ALGORITHM                6        B
>>>                  SIG_KEY_LENGTH               7        B
>>>                  RESERVED                     8        B
>>>                  Standards Action            9-127
>>>                  Private Use               128-255
>>>                  Unassigned                256-32767
>>>
>>>     The KEK_ALGORITHM, SIG_ALGORITHM attributes MUST be included; others
>>>     are OPTIONAL, and included depending on group policy.  The
>>>     KEK_MANAGEMENT_ALGORITHM attribute MUST NOT be included in a
>>>     GROUPKEY-PULL message, and MUST be ignored if present.
>>>
>>>>
>>>> #14) Sec 5.3.1:
>>>>
>>>> The KEK_MANAGEMENT_ALGORITHM attribute may only be included in a
>>>>    GROUPKEY-PULL message.
>>>>
>>>> What happens if it's included in the PUSH message?
>>>
>>> See above.
>>>
>>>>
>>>> #15) Just noted to instances of GROUPKEY_.  Aren't they supposed to be GROUPKEY-*?
>>>>
>>>> #16) Sec 5.3.3.3: r/as recommended in/as defined in
>>>>
>>>> #17) Sec 5.3.6: Any reason not to point to FIPS 180-3?
>>>>
>>>> #18) Sec 5.3.6: r/and SIG_HASH_ALGORITHM is not required to be present in a SAK Payload/and SIG_HASH_ALGORITHM is OPTIONAL in a SAK Payload
>>>>
>>>> #19) Sec 5.3.7: Does anybody really want RSA-PSS?
>>>
>>> Not that we know of, but we thought this was esteemed to be better than PKCS 1.5 and so the protocol should support it. Is that not the current thinking?a
>>>
>>>>
>>>> #20) Sec 5.4: r/Must/MUST
>>>>               r/Section 3.3 of RFC 2408./Section 3.3 of [RFC2408].
>>>>
>>>> #21) Sec 5.4.1: r/ Section 4.2.1 of RFC 5374/Section 4.2.1 of [RFC5374]
>>>>                 r/should/SHOULD X2 ??
>>>
>>> The second should is advice. How does this sound? "The values of ATD and DTD are independent. However, the most effective policy will have the DTD value to be the larger value as this allows new SAs to be activated before older SAs are deactivated."
>>>
>>>> #22) Sec 5.5: r/Must/MUST
>>>>
>>>> #23) Sec 5.5.1: Protocol, SEC ID Port, DST ID Prot, DST ID Port bullets r/should/SHOULD ?
>>>
>>> These "should"s ought to be "MUST"s to ensure interoperability. E.g., "Value specifying a port associated with the source Id. A value of zero means that the SRC ID Port field MUST be ignored."
>>>>
>>>> #24) Sec 5.5.1: r/from RFC 2407/from [RFC2407]
>>>>                 r/[RFC2407],/[RFC2407]),
>>>>                 r/ESP must also/ESP MUST also
>>>>
>>>> #25) Sec 1.3: Add GSPD
>>>>
>>>> #26) Sec 5.5.1.1.1: r/ RFC 5374/[RFC5374]
>>>>
>>>> #27) Sec 5.5.1.1.1: r/must/MUST ?
>>>
>>> This is less of a requirement than an explanation. How about:
>>>
>>>     Applications use the extensions in [RFC5374] to copy the IP addresses
>>>     into the outer IP header when encapsulating an IP packet as an IPsec
>>>     tunnel mode packet.  This allows an IP multicast packet to continue
>>>     to be routed as a IP multicast packet.  This attribute also provides
>>>     the necessary policy so that the GDOI group member can appropriately
>>>     set up the GSPD.
>>>
>>>>
>>>> #28) Sec 5.5.1.1.1: In the following, is 2119 language needed:
>>>>
>>>>    SA TEK payload
>>>>    may be required in one or both directions.
>>>>
>>>> #29) Sec 5.5.2: r/All Security Protocols must provide/All Security Protocols MUST provide
>>>>
>>>> #30) Sec 5.6.1: r/The attributes must follow/The attributes MUST follow
>>>>                 r/At least one TEK must be/At least one TEK MUST be
>>>>
>>>> #31) Sec 5.6.1.2: r/to the member./to the GM.
>>>>
>>>> #32) Sec 5.6.2 and 5.6.3: r/The attributes must follow/The attributes MUST follow
>>>>
>>>> #33) Sec 5.6.3 and 5.6.3.1: r/there must be only/there MUST be only
>>>>
>>>> #34) Sec 5.6.3.1 and 5.6.3.2: r/Must/MUST
>>>>
>>>> #35) Sec 1.3: add SSIV
>>>>
>>>> #36) Sec 5.7: r/Must/MUST
>>>>               r/must/MUST X3
>>>>
>>>> #37) Sec 5.9: r/must be deleted, they must be/are to be deleted, they MUST be
>>>>
>>>> #38) Sec 10: References for 2403, 2404, 2407-2409, 3447, 4106, 4543, 4754, 4868, 5903 are normative according to the following: http://www.ietf.org/iesg/statement/normative-informative.html
>>>
>>> Thanks for the pointer to the definitive statement ... I'll re-evaluate all of the Informative references against it.
>>>
>>>>
>>>> Assuming you delete App A, remove references to 4330 and 5996.
>>>>
>>>> Please ensure the classification of the other references are in accordance with the IESG statement.  If you've got any questions, let me know.  I don't want to find out later that some informative reference to an informative RFC is actually a normative reference and we need to do a 2nd IETF LC to note the DOWNREF.
>>>>
>>>> I still need to finish Section 7 and 8.
>>>
>>> Looking forward to this review, thanks.
>>>
>>> Brian
>>>
>>>>
>>>> spt
>>>>
>>>>
>>>> On 3/31/11 12:14 PM, Vincent Roca wrote:
>>>>> Hello everybody,
>>>>>
>>>>> As you probably noticed the GDOI draft has been significantly
>>>>> updated WRT the previous 07 version. For details see:
>>>>>
>>>>> http://tools.ietf.org/rfcdiff?url2=draft-ietf-msec-gdoi-update-08.txt
>>>>>
>>>>> This situation motivates another WGLC. So please review
>>>>>
>>>>> draft-ietf-msec-gdoi-update-08
>>>>> http://datatracker.ietf.org/doc/draft-ietf-msec-gdoi-update/
>>>>>
>>>>> and send comments to the WG mailing list by April 18th.
>>>>> (NB: if ever this deadline is too close, then tell me...)
>>>>>
>>>>> Regards,
>>>>>
>>>>> Vincent
>>>>> _______________________________________________
>>>>> MSEC mailing list
>>>>> MSEC@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/msec
>>>>>
>>>> _______________________________________________
>>>> MSEC mailing list
>>>> MSEC@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/msec
>>>
>>>
>
>