Re: [pim] Stephen Farrell's Discuss on draft-ietf-pim-rfc4601bis-05: (with DISCUSS)

"Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net> Wed, 05 August 2015 15:45 UTC

Return-Path: <zzhang@juniper.net>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFF151B30BD; Wed, 5 Aug 2015 08:45:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Prxk386ut2dB; Wed, 5 Aug 2015 08:45:28 -0700 (PDT)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0113.outbound.protection.outlook.com [65.55.169.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8C211B309F; Wed, 5 Aug 2015 08:45:26 -0700 (PDT)
Received: from BLUPR0501MB1715.namprd05.prod.outlook.com (10.163.120.18) by BLUPR0501MB1715.namprd05.prod.outlook.com (10.163.120.18) with Microsoft SMTP Server (TLS) id 15.1.225.19; Wed, 5 Aug 2015 15:45:24 +0000
Received: from BLUPR0501MB1715.namprd05.prod.outlook.com ([10.163.120.18]) by BLUPR0501MB1715.namprd05.prod.outlook.com ([10.163.120.18]) with mapi id 15.01.0225.018; Wed, 5 Aug 2015 15:45:24 +0000
From: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>
To: Brian Haberman <brian@innovationslab.net>, Stephen Farrell <stephen.farrell@cs.tcd.ie>, The IESG <iesg@ietf.org>
Thread-Topic: [pim] Stephen Farrell's Discuss on draft-ietf-pim-rfc4601bis-05: (with DISCUSS)
Thread-Index: AQHQl7UWRndHMWnbGkm+VLVIeVYnjJ2OUUmAgAAIdgCAAAMJAIBvngVg
Date: Wed, 05 Aug 2015 15:45:24 +0000
Message-ID: <BLUPR0501MB1715466EBEE96784D6B042DDD4750@BLUPR0501MB1715.namprd05.prod.outlook.com>
References: <20150526130833.24322.71081.idtracker@ietfa.amsl.com> <5564833F.6060004@innovationslab.net> <55648A58.30002@cs.tcd.ie> <55648CE4.9030307@innovationslab.net>
In-Reply-To: <55648CE4.9030307@innovationslab.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=zzhang@juniper.net;
x-originating-ip: [66.129.232.2]
x-microsoft-exchange-diagnostics: 1; BLUPR0501MB1715; 5:PnuP5Irqt36VIxm6zk0BqvGazGkCDWLZxzJsuBAPHG49Jtt4IgFMqQTAScroZnxKuA49ZRYefVLn5aA6DKhYCuchQ8P4SZt+ngDgmkJCZFjBRGqlg+W08K7R3+4BH43QTKoXuyLWrnHjyeDsMm5h8A==; 24:ZRGYAMI3Le94EppvOgj1yMmeovOv4foZzzP0hWXygTKWaCImnn+AOc+Pmcnrx0itf/7W6geH2sDhyxHpvpFh2RVx/5qEUstal9OAqZKj8wc=; 20:M8LD1xZe/qGyBH8jS3rZC2S30nth+BwtQJoO39wlccn/EaTXqOb3/9gVq0kAj2YeBIp/FopDma93TTMnHLrkYA==
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BLUPR0501MB1715;
x-microsoft-antispam-prvs: <BLUPR0501MB17155206083C3E0604139BA9D4750@BLUPR0501MB1715.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(5005006)(3002001); SRVR:BLUPR0501MB1715; BCL:0; PCL:0; RULEID:; SRVR:BLUPR0501MB1715;
x-forefront-prvs: 06592CCE58
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(24454002)(13464003)(189002)(199003)(52044002)(377454003)(479174004)(54356999)(2900100001)(4001540100001)(76576001)(19580405001)(68736005)(5001830100001)(2656002)(50986999)(81156007)(77096005)(102836002)(86362001)(2950100001)(92566002)(74316001)(122556002)(101416001)(87936001)(230783001)(77156002)(40100003)(62966003)(10400500002)(33656002)(46102003)(76176999)(106356001)(93886004)(5002640100001)(5001960100002)(5003600100002)(5001860100001)(15975445007)(189998001)(19580395003)(64706001)(106116001)(66066001)(99286002)(105586002)(97736004)(5001770100001); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR0501MB1715; H:BLUPR0501MB1715.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Aug 2015 15:45:24.6130 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0501MB1715
Archived-At: <http://mailarchive.ietf.org/arch/msg/pim/P8Q4_6q-6lPRC46KaauJ0R_2EcI>
Cc: "draft-ietf-pim-rfc4601bis@ietf.org" <draft-ietf-pim-rfc4601bis@ietf.org>, "pim-chairs@ietf.org" <pim-chairs@ietf.org>, "pim@ietf.org" <pim@ietf.org>
Subject: Re: [pim] Stephen Farrell's Discuss on draft-ietf-pim-rfc4601bis-05: (with DISCUSS)
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Aug 2015 15:45:31 -0000

Stephen, Brian, 

Based on my understanding of the discussions, I'm proposing the following new text for section 6.3:

6.3.  Authentication

   This document refers to RFC 5796 [8], which specifies mechanisms to
   authenticate PIM-SM link-local messages using the IP security
   (IPsec) Encapsulating Security Payload (ESP) or (optionally) the
   Authentication Header (AH). It also points out that non-link-local
   PIM-SM messages (i.e., Register and Register-Stop messages) can be
   secured by normal unicast IPsec Security Association (SA) between
   two communicants.

We have not posted a new version yet, but want to see if the above is reasonable.

For comparison, the text in -05 revision is:

   RFC 4601 mandates the use of IPsec to ensure authentication of the
   link-local messages in PIM-SM. The description of authentication
   using IPsec has been removed due to lack of sufficient implementation
   and deployment experience. RFC 5796 [8] specifies mechanisms to
   authenticate the PIM-SM link-local messages using the IP security
   (IPsec) Encapsulating Security Payload (ESP) or (optionally) the
   Authentication Header (AH). It specifies optional mechanisms to
   provide confidentiality using the ESP. The reader is referred to RFC
   5796 [8] for detailed discussion of authentication using IPsec.

Thanks!
Jeffrey

> -----Original Message-----
> From: Brian Haberman [mailto:brian@innovationslab.net]
> Sent: Tuesday, May 26, 2015 11:10 AM
> To: Stephen Farrell <stephen.farrell@cs.tcd.ie>; The IESG <iesg@ietf.org>
> Cc: draft-ietf-pim-rfc4601bis@ietf.org; pim-chairs@ietf.org; pim@ietf.org
> Subject: Re: [pim] Stephen Farrell's Discuss on draft-ietf-pim-rfc4601bis-
> 05: (with DISCUSS)
> 
> Hi Stephen,
> 
> On 5/26/15 10:59 AM, Stephen Farrell wrote:
> >
> >
> > On 26/05/15 15:29, Brian Haberman wrote:
> >> Hi Stephen,
> >>
> >> On 5/26/15 9:08 AM, Stephen Farrell wrote:
> >>> Stephen Farrell has entered the following ballot position for
> >>> draft-ietf-pim-rfc4601bis-05: Discuss
> >>>
> >>> When responding, please keep the subject line intact and reply to all
> >>> email addresses included in the To and CC lines. (Feel free to cut
> this
> >>> introductory paragraph, however.)
> >>>
> >>>
> >>> Please refer to https://www.ietf.org/iesg/statement/discuss-
> criteria.html
> >>> for more information about IESG DISCUSS and COMMENT positions.
> >>>
> >>>
> >>> The document, along with other ballot positions, can be found here:
> >>> https://datatracker.ietf.org/doc/draft-ietf-pim-rfc4601bis/
> >>>
> >>>
> >>>
> >>> ----------------------------------------------------------------------
> >>> DISCUSS:
> >>> ----------------------------------------------------------------------
> >>>
> >>>
> >>>
> >>> 4601 used IPsec AH for it's MTI security. This removes that and
> >>> points at 5796 which defines how to use ESP for link local
> >>> addresses and with manual keying. That raises one technical
> >>> question and two ickky process questions. The ickky process
> >>> questions are probably best discussed between the IESG at least
> >>> initially in case we don't need to bother the authors/wg with
> >>> 'em.
> >>>
> >>> (1) I'd like to check that 5796 defines a way in which one can
> >>> secure all PIM messages that are defined here in 4601bis (should
> >>> one want to do that). If there are cases where PIM-SM can be
> >>> used and where there is no well defined security then I think
> >>> that would be a problem. And I think maybe there are such cases.
> >>> Am I wrong? If not, then how does one secure those?
> >>
> >> 5796 focuses on the link-local messages (i.e., directly-connected
> >> peers), but does say
> >>
> >>    Securing the unicast messages can be achieved by the use of a normal
> >>    unicast IPsec Security Association (SA) between the two communicants.
> >>
> >> The above refers to the set of PIM messages that are not sent as
> >> link-local.  My opinion is that this is sufficient given the uses of
> PIM
> >> as defined in 4601.
> >
> > Hmm. So you're saying that the way to secure PIM-SM is to have a set
> > of unicast IPsec SAs that cover all of the routers in the MC group?
> > That seems a bit odd doesn't it?
> 
> These are just PIM control messages (Register and Register-Stop) and
> what you describe is exactly what you would have to do in the case of
> 4601.  All other PIM control messages are covered by 5796.  So, No, this
> does not seem odd to me.
> 
> >
> >>> (2) Is it ok for an IS to depend on a PS for it's MTI security
> >>> mechanism? (I think it is, but yeah, someone else might not.)
> >>
> >> I don't see why not.
> >
> > I agree I think, but would like to check if that's an IESG opinion
> > or just you and me. (Can be done on the call.)
> 
> Sounds good.
> 
> >
> >>
> >>>
> >>> (3) Is it ok for an IS to not conform to BCP107? (I think it
> >>> depends, and I'm not sure in this case.)
> >>
> >> I am not sure how BCP 107 relates since it discusses Guidelines for
> >> Cryptographic Key Management and the crypto stuff is now referred to
> via
> >> 5796.
> >
> > Abstract of 5796 says it only supports manual keying. BCP107 says
> > you have to define automated keying (with some exceptions into which
> > PIM-SM doesn't fit). Those do seem to be in conflict I think.
> 
> Right, but 5796 is not going to IS.
> 
> Regards,
> Brian
>