Re: [OPSEC] Rtgdir last call review of draft-ietf-opsec-v6-24

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Thu, 01 April 2021 15:54 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06E943A199F; Thu, 1 Apr 2021 08:54:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.918
X-Spam-Level:
X-Spam-Status: No, score=-11.918 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=YRGNEMxD; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=LJI3iBHk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id owp90IC8OTM0; Thu, 1 Apr 2021 08:54:52 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03FC13A1999; Thu, 1 Apr 2021 08:54:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4446; q=dns/txt; s=iport; t=1617292492; x=1618502092; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=FlkuuY5MdKkfzn5Bpxa9uhcSSrfVK9YP8NwHMFCFSMI=; b=YRGNEMxDo+3JsfSL6pqCKFGVKXnRRTiZAiJfVsa9D7P22mYNG/ATjJAS jLvCA1ur7iRRm72Gfol2MsnRuqM8fkCCiUGhDgEjDDLu3YHB/chjoXhkX Kl/ylVimqhtyhCuItl1hhzAaPMjTJi8siaf6f87/lleMOjMLsSRtzUMA8 w=;
X-IPAS-Result: A0BbAwBP62VgmJpdJa1aHgEBCxIMQIMjUX5aNjEChECDSAOFOYhOA4orjwuBQoERA1QLAQEBDQEBKAoCBAEBhFACF4FkAiU4EwIDAQEBAwIDAQEBAQEFAQEBAgEGBBQBAQEBAQEBAYY2DYZEAQEBAQMjEQwBATcBCwQCAQgRAwECAwImAgICHxEUAQgIAgQBDQWCcQGCVQMvAQ6fbQKKH3eBMoMEAQEGhRQNC4ITCYEPKoJ2gnESPkiGSyYcgUlCgRInHIJZPoIeNwsCgSkBEgGDNzWCK4FPN4EoBFIjXRkIOQoEAgEXBgsZBQELkGKDWYt0mW5bCoMJiE+BEI1dBIUxAx+DS4E+iTmWJ5UQi2WDFo83IIRIAgICAgQFAg4BAQaBayFrcHAVZQGCPglHFwINjh8Zg1eFFIVFcwILKwIGAQkBAQMJfI1MAQE
IronPort-PHdr: A9a23:i2wGQRXG46twOVqGXkAiAQ5hhIHV8K0OAWYlgqEPgq9Scqml45XpN VDe4vMollLSQIHH8JpsgOvNuKemUmsFst6Ns3EHJZpLURJNycAbhBcpD8PND0rnZOXrYCo3E IUnNhdl8ni3PFITFJP4YFvf8Xaz9jUVXB74MFk9KuH8AIWHicOx2qi78IHSZAMdgj27bPtyI Ry6oB+XuNMRhN5pK706zV3CpX4bE9k=
IronPort-HdrOrdr: A9a23:NUADrqiJSsv3cekCmZQn8hjjIXBQX8tx3DAbvn1ZSRFFG/Gwv/ uF2NwGyB75jysQUnk8mdaGfJKNW2/Y6IQd2+gsFJ+Ydk3DtHGzJI9vqbHjzTrpBjHk+odmu5 tIW5NVTOf9BV0St6nHySGzGdo43Z2j+Kenme/Rwx5WPH5XQotLhj0JbTqzOEtwWQVAGN4YOf Onl4p6jhCnfmkaadn+I3EDUfTKqdGjruOZXTctARk75A6SyQ6y4LnhHBSCmjsYWTVDwbAtmF K10DDRzKOlrv2911vgx3behq4m2efJ5/liIIi3isYTIijxkQrAXuRccpCLoTxdmpDV1H8Ei9 /Jyi1QWvhby3SURW2tpAuo5g+I6kdT11bH6Xu1xUTuutb4QjVSMbsCuat8fgHC40Qt+PFQuZ g7pV6xjJZcARPekCmV3bGhPHsG+jvW0BgfuNUegHBFXYwVZKU5l/1jwGpuDJwCECjmgbpXdt VGMcDG6P5aNXOcYnzJ11MfuOCEY3UpEh+KBnUFo8yeugIm5UxR8k1w/r16ol4wsLYGD7VU7e XNNapl0JtUSNUNUK57DOAdBeOqF23kW3v3QSevCGWiMJtCF2PGqpbx7rlwzvqtYoY0wJw7n4 mEeE9EtFQ1Z1nlBaS1rdl22yGIZF/4cSXmy8lY6ZQ8kKb7XqDXPSqKT01rtMe8vfMFAIn+V+ yoMJxbR9/vRFGeXrph7knbYd1/OHMeWMoatpIQQFSVuP/GLYXsq6jVa/DWKL3xESs1W2/2D3 cZNQKDfflo3wSOYDvVkRLRU3TidgjU5pRrCpXX+OAV1cwMO+R3w1AooGX8wvvOBSxJs6Qwck c7CqjgiLmHqW6/+nuN621oPxFaH1tE+bmIaQIQmSY6d2fPNZoTsdSWfm5fmFGdIAVkcs/QGA lD41Jt+ay2KJSUzTs4C82uN3+bi3d7ngPNc74s3om4oev1cJIxCZgrHIZrEx/QKhBzkQF27H tYZBQcXU/ZHDP2gaCjhJgZbduvLeVUsUOOG4p5uHjfvUKTqYUTXXMdRSepStPSqx0pXSBoil p49LI/jLKMlS20E3Y2hP01PTR3GTmqKYMDKD7ARY1P3pj3ZQl7TA6x9E2noiB2XlCvymI/qS jKKzaOdfTCH1xH00oooprCwRdTbWWSf0V5d3Zgl5ZyfF625kpb4Kusere51XeXZx8kxOwQWQ u1Pwc6E0dJ28290gKTlXK5MUgegr8qPuDbEd0YAu7u83uwNYyFkrwHFfdI/JBjcMvjqPMPTP j3QX7mEBrlEe8znwSaqnE5URME20UMgLfm3gbo43O/22N6Cf3OIE5+T7VeON2E6XP4Lsz4n6 lRnJYwveGqNH/2ZcPDwabLbyRbIhe7mx/6c8g47ZRVt7k1rr19At3SVibJzmhO2FE7IN3vnE 0TBKR977apAP4iQ+UCPyZY9EEujtKBMQ8itRH3GPY3eRU1lGDAVun5q4bguP4qGAmMtQHwMV 6Q/2lU+OrERTKK0fofB7grKWpbZUAg4B1Zja2/XpyVDB/ve/BI/VK8PHP4arNbRaSfEbgbrx px4biz7qWqXju93BqVsSpwI6pI/WriXNi7BxiUH/VUt9O9IlaBj8KRkYeOpSayTSH+bUsWhY dILxNNKstCjyQvl40x3Gy5TLftrkcsjltZ5nVmmzfWq/+byXaeGVsDNwvTxohSV31UNHODiM ze6+iW1Hjn+lF+qNL+PVYVessLAsQaS4j8MjxnJscRtqO55qZHuFU2XD4+S2onzC3n1+xo3b 2lyOzfVu3rB3DvI08A81d+d/hJtz1ur3pBfci45Y+8ZQtSFvdgOYpL2rxr
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.81,296,1610409600"; d="scan'208";a="669599162"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 01 Apr 2021 15:54:50 +0000
Received: from mail.cisco.com (xbe-aln-001.cisco.com [173.36.7.16]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 131FsoiS014598 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 1 Apr 2021 15:54:50 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xbe-aln-001.cisco.com (173.36.7.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Thu, 1 Apr 2021 10:54:50 -0500
Received: from xfe-rcd-003.cisco.com (173.37.227.251) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 1 Apr 2021 11:54:41 -0400
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3 via Frontend Transport; Thu, 1 Apr 2021 10:54:41 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=StlLZrabauBawttOSY///HXeG1dD1HzzYxym7myfdAgEx+ByRutdyiafu6Z2nIQrFkTZW4IxEguMgmDL5wBhRlEloPzfDTAYsdYvZ8ZOwsvebv7eNLg04s6uAUFOyzS3Timc+zzN712+hCpKMVdoGPwpDM8kjnXORbzKCNS5YRMmUcYt9nKnr0PVCDMSgnczEXhiIa2NTG6j+TH5mXmiAdANMBAH/esELvnhg344x2mntsOEatK162hJyCr1M13F4IaDalBqwWU68tadHXJgRYQKZ960/OR1d/tM/+vVMm1rjyNR0lLOA18K8PJKY9UYl13FRhODtU6BI+I2E76rGA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FlkuuY5MdKkfzn5Bpxa9uhcSSrfVK9YP8NwHMFCFSMI=; b=OwLEP0g3C3qTFVU0eVPZcXYEymG5vv5vYVblIw3JwDR1SHT+Qzg8R3T5QSIR4VsDGU1YfTTJDcpRyjmjsYrlpmpXCKlRqFoVCfdA1YPvTLQVZ8f51ZkegaXXrirZbzhgksujXhfpCw+w6LN1ISX5Xy3sGkRZscqE0/akKhEDAHrrcXl8/ALvsZeqM4xIc6axnLnZjUBd0vhn9h3Qs8J7A5IlbgDlSw+RqVDFaVPcJekwZjrqjqmpc4AFjY9cVgSKqc1GHY6kSFHGzeohFeDkxOz29rDNVkDabGlF/x6fbKUL8aalh9jbaESvqHK5XDQ7uAPYkU0L1H9mfnzjOi3KfA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FlkuuY5MdKkfzn5Bpxa9uhcSSrfVK9YP8NwHMFCFSMI=; b=LJI3iBHk2V6K8J2sDl7m3g5BBT9/UqBJVqpLtsc+Noo7CVR2WtxngS63NiFwm1kCmrg6PLKWqSoGs8dXAw1P1vZcLb3siRwxxTLTBoxKB+LI273p+HkTM+3sqbeTOZ4DKjrzUHvBrjjokZvrgcXIE6XkbQSl34FkmIcabRJ3tic=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH0PR11MB4773.namprd11.prod.outlook.com (2603:10b6:510:33::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3999.27; Thu, 1 Apr 2021 15:54:40 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::dcdf:3910:b85d:6eba]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::dcdf:3910:b85d:6eba%7]) with mapi id 15.20.3999.028; Thu, 1 Apr 2021 15:54:40 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Acee Lindem (acee)" <acee@cisco.com>, "rtg-dir@ietf.org" <rtg-dir@ietf.org>
CC: "draft-ietf-opsec-v6.all@ietf.org" <draft-ietf-opsec-v6.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "opsec@ietf.org" <opsec@ietf.org>
Thread-Topic: Rtgdir last call review of draft-ietf-opsec-v6-24
Thread-Index: AQHXH++AzC/ke47HVkGH7xWxQ+OC0KqgAEyA
Date: Thu, 01 Apr 2021 15:54:40 +0000
Message-ID: <BEA27BD3-2B4B-4C62-8D7D-5AE9CC539991@cisco.com>
References: <161650914469.13419.16565124530354757829@ietfa.amsl.com>
In-Reply-To: <161650914469.13419.16565124530354757829@ietfa.amsl.com>
Accept-Language: fr-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.47.21031401
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2001:420:c0c1:36:2449:d67a:d536:56f7]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1a19ca78-63b7-463b-efba-08d8f52675b5
x-ms-traffictypediagnostic: PH0PR11MB4773:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <PH0PR11MB4773DED829FECDCDA5FF5E61A97B9@PH0PR11MB4773.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(366004)(396003)(39860400002)(376002)(136003)(2616005)(66446008)(66946007)(76116006)(91956017)(8676002)(66476007)(64756008)(66556008)(83380400001)(54906003)(110136005)(478600001)(86362001)(8936002)(316002)(6512007)(186003)(2906002)(53546011)(966005)(5660300002)(450100002)(38100700001)(6506007)(33656002)(4326008)(36756003)(6486002)(71200400001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <C587351BB9A7DA47A90AFF3233855880@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1a19ca78-63b7-463b-efba-08d8f52675b5
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Apr 2021 15:54:40.3712 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: sZ+Amvz8vCdZ+aa+aGwhuqPTX5sD4gvEbGVqk9WdrCyNujQcrM39Wo8KSN86PZHEojmg8u9SJqx7k+PFwDTglw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4773
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.16, xbe-aln-001.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/NaEe6ZPo8J2MMEqvaKwadhaJ68M>
Subject: Re: [OPSEC] Rtgdir last call review of draft-ietf-opsec-v6-24
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Apr 2021 15:54:57 -0000

Acee,

Big thank you on your nits review! As a non-English speaker, I always welcome (and learn from) such a detailed review. The just posted -25 has all the nits fixed (per your other email) and we took action on your two suggestions below.

BTW, we added a reference to RFC 8177 in section 2.5.3 'securing routing updates" as it seems more suitable.

Regards

-éric

PS: happy to have a April 1st I-D, which is NOT a joke ;-)



-----Original Message-----
From: Acee Lindem via Datatracker <noreply@ietf.org>
Reply-To: "Acee Lindem (acee)" <acee@cisco.com>
Date: Tuesday, 23 March 2021 at 15:19
To: "rtg-dir@ietf.org" <rtg-dir@ietf.org>
Cc: "draft-ietf-opsec-v6.all@ietf.org" <draft-ietf-opsec-v6.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "opsec@ietf.org" <opsec@ietf.org>
Subject: Rtgdir last call review of draft-ietf-opsec-v6-24
Resent-From: <alias-bounces@ietf.org>
Resent-To: Eric Vyncke <evyncke@cisco.com>, Kiran Kumar Chittimaneni <kk.chittimaneni@gmail.com>, Merike Kaeo <merike@doubleshotsecurity.com>, <erey@ernw.de>, <furry13@gmail.com>, Ron Bonica <rbonica@juniper.net>, <warren@kumari.net>, <rwilton@cisco.com>, Gyan Mishra <hayabusagsm@gmail.com>, <hayabusagsm@gmail.com>
Resent-Date: Tuesday, 23 March 2021 at 15:19

    Reviewer: Acee Lindem
    Review result: Has Nits

    Hello,

    I have been selected as the Routing Directorate reviewer for this draft.
    The Routing Directorate seeks to review all routing or routing-related
    drafts as they pass through IETF last call and IESG review, and
    sometimes on special request. The purpose of the review is to provide
    assistance to the Routing ADs. For more information about the Routing
    Directorate, please see  

      http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir

    Although these comments are primarily for the use of the Routing ADs,
    it would be helpful if you could consider them along with any other
    IETF Early Review/Last Call  comments that you receive, and strive to
    resolve them through discussion or by updating the draft.

    Document: draft-ietf-opsec-v6-24.txt
    Reviewer: Acee Lindem
    Review Date: 03/23/2021
    IETF LC End Date: Soon
    Intended Status:  Informational

    Summary: The document contains a lot of useful recommendations and
             references for Operational Security in IPv6 networks. Since
             the document has "Informational" status, none of the text is
             normative.

             The document is basically ready for publication. I have some
             nits attached and a have couple suggested references for
             IPv6 control plane security.

    Major Issues: None

    Minor Issues:

        1. Section 2.4 - Recommend implementation of key-chains and graceful
           key rollover as documented in section 2.2 of RFC 8177. This will
           avoid the disruptions during key rollover.

        2. Section 2.4 - Recommend implementation of SPF rate-limiting as
           documented in RFC 8541. This is in the context of OSPFv3 protocol
           specific mechanisms and the recommended rate-limiting.

    Nits: Will send diffs in separate message.