Re: [pim] Stephen Farrell's Discuss on draft-ietf-pim-rfc4601bis-05: (with DISCUSS)

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 12 August 2015 13:43 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 705971B2DE6; Wed, 12 Aug 2015 06:43:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level:
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZVrT8T819els; Wed, 12 Aug 2015 06:43:30 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 909781B2DD9; Wed, 12 Aug 2015 06:43:26 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id ECE3BBE58; Wed, 12 Aug 2015 14:43:24 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9_L7sNUj83Hz; Wed, 12 Aug 2015 14:43:24 +0100 (IST)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 7EA60BE53; Wed, 12 Aug 2015 14:43:24 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1439387004; bh=Mi6/yfRgeyk46vOWpknyqk5yxcvLGN4AQTUgJ/fbGIk=; h=Date:From:To:CC:Subject:References:In-Reply-To:From; b=fb1/a3Fdw0TcxdXPc9feOnuUSaGv69Yprl4l/qCz3XmW5z3yvWEVu/QjXWboXDw6P KE65or813N7Z5wnnnVasO6YPw1cTPFGW0xqpY3KWoqNrFcMk95GJIWmUXC6y+z7i98 NwOZyLNRpntjMN3YVDvZZBSoEjQHjq6ZswAYKzY0=
Message-ID: <55CB4D7C.20703@cs.tcd.ie>
Date: Wed, 12 Aug 2015 14:43:24 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.8.0
MIME-Version: 1.0
To: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>, Brian Haberman <brian@innovationslab.net>, The IESG <iesg@ietf.org>
References: <20150526130833.24322.71081.idtracker@ietfa.amsl.com> <5564833F.6060004@innovationslab.net> <55648A58.30002@cs.tcd.ie> <55648CE4.9030307@innovationslab.net> <BLUPR0501MB1715466EBEE96784D6B042DDD4750@BLUPR0501MB1715.namprd05.prod.outlook.com>
In-Reply-To: <BLUPR0501MB1715466EBEE96784D6B042DDD4750@BLUPR0501MB1715.namprd05.prod.outlook.com>
OpenPGP: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/pim/oby_wSOSOyAkFxJUHSJXmlUBKYo>
Cc: "draft-ietf-pim-rfc4601bis@ietf.org" <draft-ietf-pim-rfc4601bis@ietf.org>, "pim-chairs@ietf.org" <pim-chairs@ietf.org>, "pim@ietf.org" <pim@ietf.org>
Subject: Re: [pim] Stephen Farrell's Discuss on draft-ietf-pim-rfc4601bis-05: (with DISCUSS)
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Aug 2015 13:43:33 -0000

Hiya,

Sorry for the slow response,

On 05/08/15 16:45, Jeffrey (Zhaohui) Zhang wrote:
> Stephen, Brian, 
> 
> Based on my understanding of the discussions, I'm proposing the following new text for section 6.3:
> 
> 6.3.  Authentication
> 
>    This document refers to RFC 5796 [8], which specifies mechanisms to
>    authenticate PIM-SM link-local messages using the IP security
>    (IPsec) Encapsulating Security Payload (ESP) or (optionally) the
>    Authentication Header (AH). It also points out that non-link-local
>    PIM-SM messages (i.e., Register and Register-Stop messages) can be
>    secured by normal unicast IPsec Security Association (SA) between
>    two communicants.
> 
> We have not posted a new version yet, but want to see if the above is reasonable.

So I'm not sure. I've looked back at the earlier mail a bit and
and at 5796.

Can you describe to me how it's feasible to use IPsec like this
and not end up being insecure? If that can be done in a short
paragraph then including that paragraph here would seem like
the thing to do. (Or if the text needed is in 5796 and/or other
places then just pointing at those would be fine.)

The particular issue that I'm not clear on is how key management
for those unicast SAs can scale and also how the manual key
management for link-local stuff works in practice.

If might help if someone can point at an example setup for
PIM-SM that secures all the relevant messages and says which
nodes share what keys etc. I don't know if such a document
exists but if it did (in any accessible format) I think it'd
help me understand that this change is ok. Note: I'm not asking
that that be included in 4601bis, I just think it might help
the discussion along quicker.

Thanks,
S.





> 
> For comparison, the text in -05 revision is:
> 
>    RFC 4601 mandates the use of IPsec to ensure authentication of the
>    link-local messages in PIM-SM. The description of authentication
>    using IPsec has been removed due to lack of sufficient implementation
>    and deployment experience. RFC 5796 [8] specifies mechanisms to
>    authenticate the PIM-SM link-local messages using the IP security
>    (IPsec) Encapsulating Security Payload (ESP) or (optionally) the
>    Authentication Header (AH). It specifies optional mechanisms to
>    provide confidentiality using the ESP. The reader is referred to RFC
>    5796 [8] for detailed discussion of authentication using IPsec.
> 
> Thanks!
> Jeffrey
> 
>> -----Original Message-----
>> From: Brian Haberman [mailto:brian@innovationslab.net]
>> Sent: Tuesday, May 26, 2015 11:10 AM
>> To: Stephen Farrell <stephen.farrell@cs.tcd.ie>; The IESG <iesg@ietf.org>
>> Cc: draft-ietf-pim-rfc4601bis@ietf.org; pim-chairs@ietf.org; pim@ietf.org
>> Subject: Re: [pim] Stephen Farrell's Discuss on draft-ietf-pim-rfc4601bis-
>> 05: (with DISCUSS)
>>
>> Hi Stephen,
>>
>> On 5/26/15 10:59 AM, Stephen Farrell wrote:
>>>
>>>
>>> On 26/05/15 15:29, Brian Haberman wrote:
>>>> Hi Stephen,
>>>>
>>>> On 5/26/15 9:08 AM, Stephen Farrell wrote:
>>>>> Stephen Farrell has entered the following ballot position for
>>>>> draft-ietf-pim-rfc4601bis-05: Discuss
>>>>>
>>>>> When responding, please keep the subject line intact and reply to all
>>>>> email addresses included in the To and CC lines. (Feel free to cut
>> this
>>>>> introductory paragraph, however.)
>>>>>
>>>>>
>>>>> Please refer to https://www.ietf.org/iesg/statement/discuss-
>> criteria.html
>>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>>
>>>>>
>>>>> The document, along with other ballot positions, can be found here:
>>>>> https://datatracker.ietf.org/doc/draft-ietf-pim-rfc4601bis/
>>>>>
>>>>>
>>>>>
>>>>> ----------------------------------------------------------------------
>>>>> DISCUSS:
>>>>> ----------------------------------------------------------------------
>>>>>
>>>>>
>>>>>
>>>>> 4601 used IPsec AH for it's MTI security. This removes that and
>>>>> points at 5796 which defines how to use ESP for link local
>>>>> addresses and with manual keying. That raises one technical
>>>>> question and two ickky process questions. The ickky process
>>>>> questions are probably best discussed between the IESG at least
>>>>> initially in case we don't need to bother the authors/wg with
>>>>> 'em.
>>>>>
>>>>> (1) I'd like to check that 5796 defines a way in which one can
>>>>> secure all PIM messages that are defined here in 4601bis (should
>>>>> one want to do that). If there are cases where PIM-SM can be
>>>>> used and where there is no well defined security then I think
>>>>> that would be a problem. And I think maybe there are such cases.
>>>>> Am I wrong? If not, then how does one secure those?
>>>>
>>>> 5796 focuses on the link-local messages (i.e., directly-connected
>>>> peers), but does say
>>>>
>>>>    Securing the unicast messages can be achieved by the use of a normal
>>>>    unicast IPsec Security Association (SA) between the two communicants.
>>>>
>>>> The above refers to the set of PIM messages that are not sent as
>>>> link-local.  My opinion is that this is sufficient given the uses of
>> PIM
>>>> as defined in 4601.
>>>
>>> Hmm. So you're saying that the way to secure PIM-SM is to have a set
>>> of unicast IPsec SAs that cover all of the routers in the MC group?
>>> That seems a bit odd doesn't it?
>>
>> These are just PIM control messages (Register and Register-Stop) and
>> what you describe is exactly what you would have to do in the case of
>> 4601.  All other PIM control messages are covered by 5796.  So, No, this
>> does not seem odd to me.
>>
>>>
>>>>> (2) Is it ok for an IS to depend on a PS for it's MTI security
>>>>> mechanism? (I think it is, but yeah, someone else might not.)
>>>>
>>>> I don't see why not.
>>>
>>> I agree I think, but would like to check if that's an IESG opinion
>>> or just you and me. (Can be done on the call.)
>>
>> Sounds good.
>>
>>>
>>>>
>>>>>
>>>>> (3) Is it ok for an IS to not conform to BCP107? (I think it
>>>>> depends, and I'm not sure in this case.)
>>>>
>>>> I am not sure how BCP 107 relates since it discusses Guidelines for
>>>> Cryptographic Key Management and the crypto stuff is now referred to
>> via
>>>> 5796.
>>>
>>> Abstract of 5796 says it only supports manual keying. BCP107 says
>>> you have to define automated keying (with some exceptions into which
>>> PIM-SM doesn't fit). Those do seem to be in conflict I think.
>>
>> Right, but 5796 is not going to IS.
>>
>> Regards,
>> Brian
>>
>