Re: [netconf] 答复: I-D Action: draft-ietf-netconf-crypto-types-09.txt

Wang Haiguang <> Wed, 03 July 2019 10:17 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id AA7A6120735 for <>; Wed, 3 Jul 2019 03:17:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id Z0vMHQov8jj5 for <>; Wed, 3 Jul 2019 03:17:52 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 97E94120048 for <>; Wed, 3 Jul 2019 03:17:51 -0700 (PDT)
Received: from (unknown []) by Forcepoint Email with ESMTP id 0F7D08B4D44493F1BE11 for <>; Wed, 3 Jul 2019 11:17:50 +0100 (IST)
Received: from ( by ( with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 3 Jul 2019 11:17:49 +0100
Received: from ( by ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Wed, 3 Jul 2019 18:17:47 +0800
Received: from ([]) by ([]) with mapi id 15.01.1713.004; Wed, 3 Jul 2019 18:17:47 +0800
From: Wang Haiguang <>
To: "Xialiang (Frank, Network Standard & Patent Dept)" <>, Kent Watsen <>, Martin Bjorklund <>
CC: "" <>
Thread-Topic: [netconf] 答复: I-D Action: draft-ietf-netconf-crypto-types-09.txt
Thread-Index: AQHVLJsHRFibFILkQEuW7PJrMCJoSKa4rweQ
Date: Wed, 03 Jul 2019 10:17:47 +0000
Message-ID: <>
References: <> <> <> <> <> <>
In-Reply-To: <>
Accept-Language: en-SG, en-US
Content-Language: en-US
x-originating-ip: []
Content-Type: multipart/alternative; boundary="_000_20303ff0c07346c7ae7cf1200502ecfehuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <>
Subject: Re: [netconf] 答复: I-D Action: draft-ietf-netconf-crypto-types-09.txt
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 03 Jul 2019 10:17:55 -0000

Hi, all.

I have some comments regarding the management of crypto algorithms used by different protocols such as TLS, IPSec and SSL.

At the moment, different work group maintains own definitions regarding the crypto algorithms, including public key algorithms, key exchange algorithms, hash, mac, encryptions etc.
Each working group defined their own identifiers for crypto algorithms. In some group, crypto algorithms for authentication, encryption and key exchange etc. are defined separately while others may combined identifiers.
The current method requires additional efforts in each group for protocol development, and also in implementation and network management.

A better way could be that the IETF security group define a unified crypto algorithm identifiers and register them with IANA. These crypto algorithm identifiers can be shared among  different working groups in their future work.
The current draft-ietf-crypto-types provides valuable work the classification of crypto algorithms.

I think we should discuss this point and make a decision whether we should get IANA registration numbers for different crypto algorithms in the coming face-to-face meeting.

Best regards.


From: netconf [] On Behalf Of Xialiang (Frank, Network Standard & Patent Dept)
Sent: Thursday, June 27, 2019 11:47 AM
To: Kent Watsen <>; Martin Bjorklund <>
Subject: [netconf] 答复: I-D Action: draft-ietf-netconf-crypto-types-09.txt

Hi Martin, Kent and all,
Thanks for so productive discussion and clarification for our current problems and possible solution. And sorry for late response since I am out of office yesterday.

Let me give more information for better understanding the difficulties we are facing, and hopeful a direction worth for going to.

Please see inline:

发件人: Kent Watsen []
发送时间: 2019年6月27日 8:06
收件人: Martin Bjorklund <<>>
抄送: Xialiang (Frank, Network Standard & Patent Dept) <<>>;<>
主题: Re: [netconf] I-D Action: draft-ietf-netconf-crypto-types-09.txt

Hi Martin,

4) to enable the SSH and TLS models to use types defined in their
protocol specs, mapping tables were added to those drafts to map the
protocol-specific types to the generic crypto-types type.

So perhaps this is not the best solution?  The big set of types (in
crypto-types) will change over time, and the subsets used in various
applications will also change over time.  The best solution for such
sets in the IETF seems to be IANA registries, with corresponding
IANA-maintained YANG modules.

I'm hoping someone, perhaps my co-authors, can suggest a path forward.

[Frank]: We mainly reference to these 3 IANA registries for define our crypto types in draft:

1. which includes TLS 1.2 and TLS 1.3.

2., crypto algorithms guidance for ESP and AH, crypto algorithms guidance for IKEv2: the 2 drafts are the latest recommendations for crypto algos of IPsec, so we mainly reference the definition in them;

3., -- main SSH Spec, -- new RSA with SHA256 and SHA512 for its authentication function: also, the 2 drafts are the main resource we have referenced.

So, the above reference are all current input for the crypto type definition in the crypto types draft. Now, the 2 main difficulties for us are:

1.       For the above 3 protocols and their respective and different crypto algorithm definition in each IANA registries, should we align our yang model to all of them, or only one of them? If the former, we must deal with the problem that same crypto algo has different IANA number in different IANA registries?

2.       Considering TLS 1.2, which uses a combined way to represent different types of crypto into one IANA number (e.g., TLS_DHE_RSA_WITH_AES_128_GCM_SHA256). That is against our crypto type definition principle (IPsec and SSH are all aligned): atomic, which means we are currently define 7 categories of crypto type: Hash Algorithms, Asymmetric Key Algorithms, MAC Algorithms, Encryption Algorithms, Encryption and MAC Algorithms, Signature Algorithms and Key Exchange Algorithms. So, how should we map our crypto type definition back to TLS 1.2 IANA numbers?

After clarifying our problems, I want to ask if we can solve them by this way: we yang guys define a crypto type yang IANA registries, which can keep on being aligned with all the related protocols’ IANA registries, but have its own IANA number for each crypto algorithms. So, our draft just need to follow this IANA registries.

8) our efforts to normalize this may be futile, and yet we want to
support keystore.

Perhaps we can take a step back and define just the types we need
right now for keystore, in order to finish these drafts.  Then we (or
some other WG) can immediately start to work on an update to
crypto-types that would define more types for other purposes as well.

Maybe, depending on how that turns out, it may be trivial to extend the approach to cover everything.

[Frank]: based on my clarification above, even we have TLS and SSH now, we still have to deal with the aforementioned 2 difficulties. If so, why not do it right at start time?


Kent // contributor