Re: [secdir] SECDIR review of draft-ietf-lisp-crypto-07

Dino Farinacci <> Mon, 26 September 2016 16:47 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id EFABC12B251; Mon, 26 Sep 2016 09:47:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id RQ8LAqB-4nPR; Mon, 26 Sep 2016 09:47:21 -0700 (PDT)
Received: from ( [IPv6:2607:f8b0:400e:c03::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 2FB1312B24C; Mon, 26 Sep 2016 09:47:21 -0700 (PDT)
Received: by with SMTP id oz2so64713788pac.2; Mon, 26 Sep 2016 09:47:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20120113; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=1Mn8y/78xbf+oJtg+UAgfllVH9jF9AZUYVfAywy+hxI=; b=yBuMxl+RA4Zs6fp43ZDb5U4ysVxJuVHGvN0+w96TssF0xkGISv86VmYWsNoLksCnE+ xD8wJU6Vraxj6Lcu3iRU1EixGAWaOfA+5PbXlDVG4+7Omqyqe7XykjGM/Guk1XbBB4VF 0K7BrReRh7O/Y4ihIeceVga3LBi9TFjQM8yoTG0gJqylIKIucsMBsu1vQ5F+pMCa7CnL jcoAeXkSVOpsfl605+r82oCipIDhkLo1msLeNEP+X4XukRdMbgA0XEcHZ33XYZz89WhP hEnF6bgoACXhoUfp4vZnMOBMsK6z0seWkACutJ7YsD4FcNUeQHDHCCs2IJMkAQxE1eY8 pnYg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=1Mn8y/78xbf+oJtg+UAgfllVH9jF9AZUYVfAywy+hxI=; b=H/YXaixiHGLYOfNoFMTIAvJEGOdI+TQdY0+ufm9H0h0vQqvZjbB//bile375qokdRT kYZ8k06jcCQ99/IWgqeVW2aCffXjb0NgkNhKsW5cwdZWLEqVRIc4+hnpQWPOVAHwUUAj QII4wmTHlH+unfeLxS8NW0e47/nb+1F4UBS+ZDKLm0SYosrvW47VAgBecO1x1stpkeVH 9tYwtNN21ZgLXyDGptHTcLQqM0BMiHFcBhPxPCMSez8NeTWUrUDaZaY+PqAKcw47jYik BY9Sxw0WYEUXVUubt1qu5+jLUMlHBeryWBiC3UDLWUjIF3NVdS4gMS0pz4TD6kHHqcLG LTJQ==
X-Gm-Message-State: AE9vXwP0APFr30f/K159b31mksjeinX4Y+TlgkQJdqfr0mEs+i2SZZL1vxI8kyZwYFIhhA==
X-Received: by with SMTP id aj10mr40794298pad.124.1474908440804; Mon, 26 Sep 2016 09:47:20 -0700 (PDT)
Received: from [] ( []) by with ESMTPSA id i8sm32457074paw.25.2016. (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 26 Sep 2016 09:47:20 -0700 (PDT)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <>
In-Reply-To: <>
Date: Mon, 26 Sep 2016 09:47:29 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <> <> <> <> <>
To: Brian Weis <>
X-Mailer: Apple Mail (2.3124)
Archived-At: <>
Cc: "" <>, "" <>, "" <>
Subject: Re: [secdir] SECDIR review of draft-ietf-lisp-crypto-07
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 26 Sep 2016 16:47:23 -0000

Chris, if you are fine with Brian’s response, I can post the -08. Please ack. Thanks.


> On Sep 25, 2016, at 8:11 PM, Brian Weis (bew) <> wrote:
> Hi Chris, 
> Thanks for the review. I’ve added one comment below.
>> On Sep 25, 2016, at 6:27 PM, Chris Lonvick <> wrote:
>> Hi Dino,
>> On 9/25/16 4:37 PM, Dino Farinacci wrote:
>>>>> I don't follow LISP so I'm not sure if there is an actual mechanism for a device receiving a map request packet to decline an offered cipher suite. If there is, I didn't see it explained in the
>>> Yes, there is. If the Map-Reply this is returned contains no Security LCAF that means to the ITR that it either needs to go unencrypted encapsulating packets to the ETR or try another cipher text.
>>>>>>> draft. You should address this in a future draft. This will be needed for when new cipher suites are
>>> Understand the need. We intentionally wanted to support this.
>>>>>>> added and a receiving device does not have the capability to handle the new cipher suite, or the case where an old cipher suite has been administratively disabled; like if it's been compromised and shouldn't be used. There are several ways to do this.
>>> We have this in section x of the draft. Is it not sufficient?
>>>   If an ITR, PITR, or RTR sends a Map-Request with the Security Type
>>>   LCAF included and the ETR or RTR does not want to have encapsulated
>>>   traffic encrypted, they will return a Map-Reply with no RLOC records
>>>   encoded with the Security Type LCAF.  This signals to the ITR, PITR
>>>   or RTR not to encrypt traffic (it cannot encrypt traffic anyways
>>>   since no ETR public-key was returned).
>> That text just says that if the cipher suite is declined then there will be no encryption. I was interpreting that to mean that the receiver just isn't going to accept any attempt at encryption. If it's just meant to be for that particular cipher suit then you'll need to add a line to that paragraph to say that the ITR, PITR, or RTR can attempt a different cipher suite if it is administratively configured to do so. However, that could get to be very inefficient if the ITR has to make 6 attempts before understanding that the ETR just isn't going to accept any encryption request - if it's so configured, or if it just doesn't support the feature whatsoever. So even if you allow the sender to make offer after offer, it would still be a good idea to have a way for the receiver to entirely decline encrypting packets from the sender.
>> But, with all that being said, I'm figuring that we're getting outside the intent of your experimental specification. When you do get around to getting this onto a standards track, then you should make some decisions around how to convey capabilities between the sender and receiver so they can quickly and efficiently figure out what's going to work, or if it's just not, rather than making one offer after another. TLS and SSH have ways for a sender to offer a list from which the receiver can choose, if you're looking for examples. Another way is for the sender to proffer a version number which is associated with a select group of capabilities. From that, the receiver can make a choice, or efficiently decline all.
> Thanks for the suggestions. In this effort we were intentionally avoiding the complexities and added security analysis requirements of a multiple round-trip method capabilities negotiation such as TLS. But maybe a capabilities declaration more along the lines of the version number you suggest might be appropriate.  I agree that at such time as the protocol was prepared for standards-track that this would be important to add.
> Thanks,
> Brian
>> Best regards,
>> Chris
> -- 
> Brian Weis
> Security, CSG, Cisco Systems
> Telephone: +1 408 526 4796
> Email: