Re: [Pce] Ben Campbell's Discuss on draft-ietf-pce-pceps-15: (with DISCUSS and COMMENT)

Ben Campbell <ben@nostrum.com> Thu, 03 August 2017 15:26 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: pce@ietfa.amsl.com
Delivered-To: pce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30CF1132004; Thu, 3 Aug 2017 08:26:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.881
X-Spam-Level:
X-Spam-Status: No, score=-1.881 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sKVxv7ATku7V; Thu, 3 Aug 2017 08:26:51 -0700 (PDT)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB7D1132043; Thu, 3 Aug 2017 08:26:51 -0700 (PDT)
Received: from [10.0.1.63] (cpe-66-25-7-22.tx.res.rr.com [66.25.7.22]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id v73FQjCo088106 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 3 Aug 2017 10:26:46 -0500 (CDT) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-7-22.tx.res.rr.com [66.25.7.22] claimed to be [10.0.1.63]
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <23CE718903A838468A8B325B80962F9B8CB98665@blreml501-mbb>
Date: Thu, 03 Aug 2017 10:26:44 -0500
Cc: The IESG <iesg@ietf.org>, "cmargaria@juniper.net" <cmargaria@juniper.net>, "draft-ietf-pce-pceps@ietf.org" <draft-ietf-pce-pceps@ietf.org>, "pce@ietf.org" <pce@ietf.org>, "pce-chairs@ietf.org" <pce-chairs@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <E0C89DDB-F358-427F-92FC-F33C35012A0B@nostrum.com>
References: <150171415228.5759.6042228213633458080.idtracker@ietfa.amsl.com> <23CE718903A838468A8B325B80962F9B8CB98665@blreml501-mbb>
To: Dhruv Dhody <dhruv.dhody@huawei.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/st__91mEHRPPCX_Lt9XF2klHTDg>
Subject: Re: [Pce] Ben Campbell's Discuss on draft-ietf-pce-pceps-15: (with DISCUSS and COMMENT)
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Aug 2017 15:26:54 -0000

Thanks, please also see inline. I will remove sections that do not seem to need further comment.

> On Aug 3, 2017, at 8:35 AM, Dhruv Dhody <dhruv.dhody@huawei.com> wrote:
> 
> Hi Ben, 
> 
> Thanks for your review. See inline..
> 
>> -----Original Message-----
>> From: Pce [mailto:pce-bounces@ietf.org] On Behalf Of Ben Campbell
>> 

[…]

>> 
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>> 
>> -3.4, step 2: "Peer validation always SHOULD include a check on whether
>>   the locally configured expected DNS name or IP address of
>>   the peer that is contacted matches its presented
>>   certificate."
>> 
>> Why is that not a MUST? As it is, this need to at least discuss the risks
>> involved if you don't check the identity of the peer cert (here or in the
>> security considerations.)
>> 
> [[Dhruv Dhody]] Reworded to say - 
> 
>          +  Implementations MUST follow the rules and guidelines for
>             peer validation as defined in [RFC6125].  If an expected
>             DNS name or IP address for the peer is configured, then the
>             implementations MUST check them against the values in the
>             presented certificate.

Thanks, that would resolve my DISCUSS position.


>> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> Substantive:
>> 
>> - I share Warren's question about why you chose STARTTLS over a dedicated
>> port, especially since the 2nd to last paragraph in 3.2 goes out of its
>> way to mention that. What were the tradeoffs involved that made adding the
>> additional protocol machinery more attractive than allocating a port
>> number?
>> 
> [[Dhruv Dhody]] I have added this text - 
> 
>   This document uses the standard StartTLS procedure in PCEP, instead
>   of using a different port for the secured session.  This is done to
>   avoid requesting allocation of another port number for the PCEPS.
>   The StartTLS procedure makes more efficient use of scarce port
>   numbers and allow simpler configuration of PCEP.

That’s helpful, but it only shows the benefits side of the tradeoff. I assume people thought the additional protocol complexity was a reasonable cost to bear?


> 
>> - 3.2: "Implementations MUST support SHA-256 as defined by [SHS] as
>>          the hash algorithm for the fingerprint."
>> Do you really intend "MUST support" (meaning you have to be able to handle
>> sha-256, but could allow other hashes) vs "MUST use"?
>> 
> [[Dhruv Dhody]] Yes, additional hash algorithm MAY also be supported/used.
> 

Is there an expectation people will use multiple hash algorithms side-by-side? Or is this for purposes of hash agility?

>> - 3.5: "Implementations
>>   that want to support a wide variety of trust models SHOULD expose as
>>   many details of the presented certificate to the administrator as
>> possible
>>   so that the trust model can be implemented by the administrator."
>> "as much as possible" is pretty vague for the a 2119 SHOULD. Since the
>> following sentences also include a SHOULD along with considerably more
>> detail, I suggest dropping the SHOULD in this sentence, and leaving the
>> one in the following sentence.
>> 
> [[Dhruv Dhody]] Ack. 
> 
>> - 3.6: Is the exponential backoff requirement part of the procedures in
>> 5440?
>> The wording suggests that it is not. If so, it needs elaboration here.
>> 
> [[Dhruv Dhody]] It is part of RFC5440, text updated to - 
> 
>   The initiator SHOULD follow the procedure listed in [RFC5440] to
>   retry session setup as per the exponential back-off session
>   establishment retry procedure.
> 
>> Editorial:
>> 
>> - 3.2, paragraph 8: s/"... PCE MUST responds with..."/ "...PCE MUST
>> respond with..."
>> 
> [[Dhruv Dhody]] Ack
> 
>> - 3.4 : "Negotiation of mutual authentication is REQUIRED."
>> Does that mean that the peers must elect to use mutual authentication, or
>> that if they want to use it, they must agree to do so? (The pattern
>> persists throughout the section, but the meaning seems more obvious for
>> some of the
>> others.)
>> 
> [[Dhruv Dhody]] I am also not sure, this was added keeping RFC6614 as our reference. 
> Since TLS supports multiple authentication mode, this might be a say mutual as well as server-only authentication should be supported. But not sure about the word negotiation here. I think we can remove this statement, will do so once you confirm. he 

The important thing is that the intent of the WG is clear. Do you mean to say that the working group intended to allow both server-only and mutual authentication, or do you mean to say the working group did not think about it?

[…]
Thanks!

Ben.