Re: [secdir] [Detnet] Secdir last call review of draft-ietf-detnet-ip-05

Lou Berger <lberger@labn.net> Tue, 17 March 2020 12:31 UTC

Return-Path: <lberger@labn.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5F483A1E1C for <secdir@ietfa.amsl.com>; Tue, 17 Mar 2020 05:31:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.362
X-Spam-Level:
X-Spam-Status: No, score=-3.362 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-1.463, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5UEGS1995b_J for <secdir@ietfa.amsl.com>; Tue, 17 Mar 2020 05:31:51 -0700 (PDT)
Received: from gproxy6-pub.mail.unifiedlayer.com (gproxy6-pub.mail.unifiedlayer.com [67.222.39.168]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 756873A1E1E for <secdir@ietf.org>; Tue, 17 Mar 2020 05:31:50 -0700 (PDT)
Received: from cmgw15.unifiedlayer.com (unknown [10.9.0.15]) by gproxy6.mail.unifiedlayer.com (Postfix) with ESMTP id 503B91E0894 for <secdir@ietf.org>; Tue, 17 Mar 2020 06:31:45 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id EBNpjQFDorO3uEBNpjArN9; Tue, 17 Mar 2020 06:31:45 -0600
X-Authority-Reason: nr=8
X-Authority-Analysis: v=2.3 cv=O+YXQi1W c=1 sm=1 tr=0 a=h1BC+oY+fLhyFmnTBx92Jg==:117 a=h1BC+oY+fLhyFmnTBx92Jg==:17 a=dLZJa+xiwSxG16/P+YVxDGlgEgI=:19 a=jpOVt7BSZ2e4Z31A5e1TngXxSK0=:19 a=IkcTkHD0fZMA:10:nop_charset_1 a=SS2py6AdgQ4A:10:nop_rcvd_month_year a=Vy_oeq2dmq0A:10:endurance_base64_authed_username_1 a=DTyjI2X_OpCmv7G-di0A:9 a=QEXdDO2ut3YA:10:nop_charset_2
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version :Date:Message-ID:From:References:Cc:To:Subject:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=IVV7oHsZue2yDbp/7uz4KoY88qVAwCgcSStXw/NNe/E=; b=VUK34qvu5TZQauvJQeNUHoifuQ bTiYT/cDfpVvffUPDduJCeEjvqjgXFrxpJJ062WkxgYxBN9DrBria51BXEQhiFHU18sYGlCpflVVe o99zMTvH11FBtjfks31nINokF;
Received: from pool-72-66-11-201.washdc.fios.verizon.net ([72.66.11.201]:55932 helo=fs2.dc.labn.net) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92) (envelope-from <lberger@labn.net>) id 1jEBNo-003mra-U9; Tue, 17 Mar 2020 06:31:44 -0600
To: Tero Kivinen <kivinen@iki.fi>
Cc: draft-ietf-detnet-ip.all@ietf.org, detnet@ietf.org, last-call@ietf.org, secdir@ietf.org
References: <158406212471.18347.14473548719649982992@ietfa.amsl.com> <57456b4d-79a4-191a-8e25-7a2d2157f5d8@labn.net> <24176.45003.478503.30942@fireball.acr.fi>
From: Lou Berger <lberger@labn.net>
Openpgp: preference=signencrypt
Autocrypt: addr=lberger@labn.net; prefer-encrypt=mutual; keydata= mQENBERW5dYBCAC1Bjgr/mVovBhi1rbqkowJShVtvLitNEGOTd6RtmwO7FPebg61J9+kRFTz 1wt869yiAjtQO1EtQs26QFTH5ZDZJU/LDAOzxTi12mpBic+AWI8W0yrB1C+KOZ0gw2p7Vnfj EKc3ohwkCICHTnZ3blO8Mslb4qHGxDm7Uy3luRjvH1ZDifuZvfFHcHVw2dJyGwLg2MhXCqpo OyUqFN0tlGqz1TOCAy3/IMG6OdNK27DGF5+vJyIqek/2xkIVDOLgzVCek3dARLqPP37W1Lx2 uXJUsgcJ7t7om5AEV2LTFrafvAvJbKLT9RZ0fgF4LXeRTIVlFXKkvYJFgygW+r4JCTvHABEB AAG0HUxvdSBCZXJnZXIgPGxiZXJnZXJAbGFibi5uZXQ+iQGHBBABAgBxBQJEVuXyMBSAAAAA ACAAB3ByZWZlcnJlZC1lbWFpbC1lbmNvZGluZ0BwZ3AuY29tcGdwbWltZQcLCQgHAwIKAhkB GRhsZGFwOi8va2V5c2VydmVyLnBncC5jb20FGwMAAAADFgIBBR4BAAAABBUICQoACgkQgbLN W8HBX9eB9QgAl8/lFnNh43at51P//sRX8cDg33C/biok8st8Fff0Y/6p+6HkYKQcxiuZuOLr HHtBFxTdMGfFrlJIFob/N6m92CwVwoTRZu8QIe68DLewd+72PIEzvlSy/iTq3e91XqfGWCE7 oqw7H/weJJlB7yzPWXra/BwgPD+WkTxUiKeG2F2HzBTQfBQ6VpHiMqW6AL0jcCh/Drya93ZA aAdWfW2ywVPqIKETZIk04SBsZCw9WESB2If/NqeZu/DNwBg4FsXCrfp3WfMSTkYmfT3zcU11 MpKcv20YUpG8Jf9lyMY1DgMHHdpUHdjo/fuLz4aVSQvt8EygRSzCxGWOWb89bUosAbkBDQRE VuXXAQgApBEy7m0+xMm4SEcQtFi/UQQqjVOllc2227M1ypbcEMRa46Tq6p0P5QBM9C9pxjAl tyI2m3hzvBxBJNnjknXTp875DGyj/yDwj9VeA18Tj9q6PRsJIxAnGKBgWO0yGdZLpsp0AN5n kMamxdVFGYojzUiwkPBayST6sEUp33o4xHsx99TA2bFxZRj6k0igWgdrPVq4qeEgD1l7Cl3f pj96owzm+7wecswAts2b545gfR4/V/Vx3VUebETR/LwMDecXokP5fiDAIRHhEUi/+FXcwg6w 6jtPilFcJ64HJP6P81OUdfeMDUxvSmbeRqXaZrbRN+hF6XfWODTKepsqPaX8TQARAQABiQEi BBgBAgAMBQJEVuXXBRsMAAAAAAoJEIGyzVvBwV/XUcMH/2eB6dvsP52su9KgaDHqsgPbxF21 AQL9oDCheN+AJKD3Eouj/d/MbQdsp/M/pjgTAqB3G4/rtoyJw+BDjnvZwdUe4HQ656IPZOub e10sOgq1taJQZtQIl+mWKURMGlIihScYeuGfi/1RzMqXeCcFW63n5POVG55FzU8B7DBwQ2oJ Zy7NL0YVbT0ROXGson6WHLhzGnVP8CjHq5TN5co/FH/2BntaQIdSaOmTqN+vy38KkRsYa3cx k9eTbP99ypebZclmw6kxlOZGl9DBp4qNkTn/7LgQ7iZNVyESs9rSE7hQXnmfM+C+TCpeZo62 8AwC5SYEqa5YlkpgsP0NIEMAIoU=
Message-ID: <b7330969-cd2f-9414-4641-7b0b1b8ed490@labn.net>
Date: Tue, 17 Mar 2020 08:31:43 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0
MIME-Version: 1.0
In-Reply-To: <24176.45003.478503.30942@fireball.acr.fi>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 72.66.11.201
X-Source-L: No
X-Exim-ID: 1jEBNo-003mra-U9
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: pool-72-66-11-201.washdc.fios.verizon.net (fs2.dc.labn.net) [72.66.11.201]:55932
X-Source-Auth: lberger@labn.net
X-Email-Count: 9
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/UVuF8cog9NSqCuH6OjqnrHT9kUw>
Subject: Re: [secdir] [Detnet] Secdir last call review of draft-ietf-detnet-ip-05
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Mar 2020 12:32:08 -0000

Thanks again Tero.

I've made the changes in a PR to the document git repo and they will be
in the post LC update version.

Lou

On 3/17/20 7:08 AM, Tero Kivinen wrote:
> Lou Berger writes:
>>> In section 5.1.2.2 it says that SPI field of the ESP and AH is
>>> used, but in case the IPsec is configured to use UDP encapsulation
>>> (rfc3948, i.e., UDP destination port is 4500) there is different
>>> location for the SPI. Should this document also dig SPI out from
>>> the UDP encapsulated ESP/AH?
>>
>> no.  I'll add qualifications that this applies when the "IPv4 Protocol 
>> and IPv6 Next Header Fields" are set to AH and ESP. specifically:
>>
>>               The rules defined in this section only apply when the
>>                IPv4 Protocol or IPv6 Next Header Field contains the IANA
>>                defined value for AH or ESP.
>>
>>
>>> There is also
>>> wrapped ESP (rfc5840) with bit different format, i.e., having wrapped ESP
>>> header before the normal ESP header. Should this be included also?
>>
>> This was not discussed in the working group -- so a really great point 
>> to raise in this review.  Thank you!
>>
>> As it has it's own protocol number, it would be not too hard to add.  
>> That said, there's no reason it couldn't be added later and no one in 
>> the working group raised it.  What do you think, is it important to add 
>> it now.
> 
> If you are not concerned UDP encapsulated IPsec, then I think you can
> ignore the Wrapped ESP too. I have not seen wrapped ESP in any real
> use, compared to the UDP encapsulated IPsec, which is very commonly
> used.
> 
> Wrapped ESP was meanly meant for enterprice use cases where they want
> authentication only, but no encryption, as they do want to look inside
> the packets.
> 
> UDP encapsulated IPsec is used when there is NATs in play, i.e., most
> of the IPsec traffic from roadwarriors, i.e. laptops in hotels etc.
>