Re: [secdir] secdir review of draft-ietf-lisp-lcaf-15

Dino Farinacci <> Tue, 27 September 2016 16:50 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 50A7A12B2A9; Tue, 27 Sep 2016 09:50:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id mxaNouL9TxZJ; Tue, 27 Sep 2016 09:50:16 -0700 (PDT)
Received: from ( [IPv6:2607:f8b0:400e:c00::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 6B4A012B2C5; Tue, 27 Sep 2016 09:50:16 -0700 (PDT)
Received: by with SMTP id q2so7582616pfj.3; Tue, 27 Sep 2016 09:50:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20120113; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=zTGFkHhPF74XIDSCJHKy9Z80Dk8F86Ry3bQlqFK9XBQ=; b=T5z/7rTiCKuN8L/Z5Scd3MEZft2NASC5ymRnn9xYe0eVjkdxDxjJxN1EDc77hakovr to2eyR3/vNCLastW/PvgZyjWP6nQvMA5kFmlhiaKgulFXTkrKNFvujTlbURTeaRwV3Kw dhk2awtKyZ540G1KAtScGOHwfQYTXLpVW1DGuZuAYHUHGlhzJ1r2F/Q3cSkEalNODV84 +S4v1MrF1VmXB4jyzy5zU7qYfww1EUdgCxITEAbmV2X985HxT5zVUxrKmvCxfHTuf4Yi iWmWKL4ZvKraFtYI4Kthjo1hdFOnRYbU+qTCunnoMKvnquKwSSjkLRuxIHatH3L/DnCV VxgQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=zTGFkHhPF74XIDSCJHKy9Z80Dk8F86Ry3bQlqFK9XBQ=; b=B+V6l6fKt805RtAIbiEDvTyb9kXqVy51XFUdF/FEEmf5ZYknukQqFwMNez9d2UcR99 awgU0gPoa0wvYHWyL9w0nhKmcXAr8z6lWIU8lVs1wsd1JO03kGTY2lGY1pJpK2CKkfc7 3H32z+wgaGmgGjkxT27dk1LvsuZMhfpJrOyfqYeA3Scz65fCg0pJiTcfA+0jvYzT5QvS xPTaJDAHpf26cxXEhFZhJ1CJdKnVE3TyMbwlv3tOz0vRcBH4VWgTjjGZakD/xVmg7RSZ c9HhKDoDMEyuLEYZZiNBPTyniBNaS6W+CuBDXG6uFUnQwN3DrfOztq+3fSqH9zg92Tpb 5NPg==
X-Gm-Message-State: AE9vXwMeJjLBEuYe++jaHN0TRMM1rqrOyg6ZZIZ3OZQBaTntjK73k/Dq/GPbenGcllT2OQ==
X-Received: by with SMTP id w184mr49179749pfb.120.1474995015988; Tue, 27 Sep 2016 09:50:15 -0700 (PDT)
Received: from [] ( []) by with ESMTPSA id ah5sm6197408pad.30.2016. (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 27 Sep 2016 09:50:15 -0700 (PDT)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <>
In-Reply-To: <>
Date: Tue, 27 Sep 2016 09:50:16 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <> <> <> <>
To: David Mandelberg <>
X-Mailer: Apple Mail (2.3124)
Archived-At: <>
Cc: The IESG <>,,
Subject: Re: [secdir] secdir review of draft-ietf-lisp-lcaf-15
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 27 Sep 2016 16:50:18 -0000

David, any response. Thanks.


> On Sep 26, 2016, at 9:43 AM, Dino Farinacci <> wrote:
>> On 09/25/2016 06:15 PM, Dino Farinacci wrote:
>>>> I found one issue in various parts of the document (described below),
>>>> but I'm not sure it's relevant to security. If it is, then I think this
>>>> document is Almost Ready. If not, then I think this document is Ready
>>>> With Nits.
>>>> There are multiple places in the document where it's possible to encode
>>>> semantically equivalent information in multiple ways, despite the word
>>>> "canonical" being in the title of the document. Is there anything that
>>>> relies on these addresses being canonical for security purposes?
>>> No not for security purposes. There are multiple ways because we allow some nesting of information as well as allow for compatibility for older implementations that can’t parse some AFIs and LCAFs but is required to parse the AFI-List LCAF type.
>> Ok, then I think it needs to be made clear in the security
>> considerations that this format cannot be relied on to have no more than
>> one representation for the same information.
> Sorry, I am not following your point. The nesting procuedure of LCAFs allow the same type of address to be expressed multiple ways. I can’t tell from your commentary if this is a good thing for security or a bad thing. So please provide some suggested text on what you would like to see in the Security Considerations section.
>> IESG: This means that I think this document is Ready With Nits.
>>>> Multiple places in the document (sections 4.1, 4.5, and 4.8) specify
>>>> mask lengths, but do not specify that the masked out bits MUST be set to
>>>> zero.
>>> Hmm, by definition, a mask-length of say 24 if a mask of 0xffffff00. And in 4.1:
>>> IID mask-len:  if the AFI is set to 0, then this format is not
>>>     encoding an extended EID-prefix but rather an instance-ID range
>>>     where the 'IID mask-len' indicates the number of high-order bits
>>>     used in the Instance ID field for the range.
>>> It is clear that the high-order bits are used that cover the mask-length and the low-order bits are ignored. Is this not clear to you?
>> That part is clear to me. I just meant that the document as written
>> appears to allow to be equivalent to If the
> I will make this more clear. I added some text.
>>> Section 6 (Security Considerations): There is no discussion of these
>>>> addresses being canonical, and what other systems might or might not
>>>> rely on these addresses being canonical.
>>> In this respect “canonical” is relative to how LISP defines to encode both simple AFI encoded addresses or more complex/flexible addresses that accompany information.
>> Ok. I interpreted canonical to be a security property of the addresses,
>> i.e., that if two addresses are not bytewise equal, then they must not
>> have the same meaning. If that's not what you meant by canonical, then I
>> think the security considerations should say that, so that nobody tries
>> to rely on that property in the future.
> Canonical in this spec means semantically canonical. That is the following two IP addresses are equal:
> AFI=1,
> AFI=LCAF, lcaf-type=AFI-list, AFI=1,
>>> Section 4.7: The Key Algorithm description doesn't point to a registry
>>>> of valid values or otherwise say how to interpret values in that field.
>>> We have put that in a use-case document. This Security Key LCAF is used by 2 use-cases. It is used for LISP-DDT and for lisp-crypto. In the lisp-crypto document we have a registry for cipher suites used.
>> Should this document reference one or both of those documents?
> I added text to reference the two documents that use this Security Key LCAF Type.
> I’ll post a new draft when you get me some text for the Security Considerations section. Thanks!
> Dino
>> -- 
>> David Eric Mandelberg / dseomn