Re: [secdir] SECDIR review of draft-ietf-lisp-crypto-07

Dino Farinacci <> Tue, 27 September 2016 16:49 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id E2F7912B2C0; Tue, 27 Sep 2016 09:49:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id V-nOz4c_ats7; Tue, 27 Sep 2016 09:49:25 -0700 (PDT)
Received: from ( [IPv6:2607:f8b0:400e:c00::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 25A6912B0CE; Tue, 27 Sep 2016 09:49:25 -0700 (PDT)
Received: by with SMTP id 21so7619035pfy.0; Tue, 27 Sep 2016 09:49:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20120113; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=Pgen7EjXhmgIQWGKlSlzyKGgTJGiDYK8/Hvv0iP/1Fg=; b=ys+2qszSQ6BFt2iGQujyGjVzH8we0F+l7If7m2ebE5zHlJq4RGMO9nDPqGNzF+4xCX jwUB7qsV9Zg8bMtLvBKXvtOxhMUx4+uaZBygy/4EYidTOgDd+qxX3tN6qquE/QMjEiTv SUdneXh+MEK4uiPF+awCHKceRGY0eYAEpPq+MsWRTo9Hdexd0kLj/xAFJ/Z5v04IPeJS 6y4zvAppt2VSaZPw4A8AB7EFSyhpl/JY+TR9WF67pjC8tRlULtF/YElVenXnIlhGXexy LGh9lKkC2Cr++aYMiI7uhi2GeD+VJKbGbQalLh9rAaLI4f4eDCW+S1gHL7+X6+Afqiyo wzcw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=Pgen7EjXhmgIQWGKlSlzyKGgTJGiDYK8/Hvv0iP/1Fg=; b=EKLfqFeQGZ0qZfnCCZITYiNn/TpWiXNho5Tu/KIZqWh26PPO4CRXlLbzjN9NCMyQn2 2NRULNKu+G5kx101jCoJhPx2dbPP4WN7KG2fWbNMtNYty+TA0K5y1DfpUej3eydwUATu RNSLW6Q5mrS9iTelqOyNdf9icv496IbhLjrOc7UjYEhSrkUBmwBRGTv8qRPtxlDZky93 KdXv4ppZZTfDax92GFShlcSwOBSa4HNqSWSM0cjyweuVasPizyBBOZZAEcWKtCYy92n5 1shalZn8npLqKW7gvY55RLWS3x2VGMATwLnoKeIg7WNuJ/zFuEGBG8mn7wlETLUsHE/1 kvRw==
X-Gm-Message-State: AE9vXwNGgIMRe9PdyaiC+jEh2nnjRSV3x7tadLqaY6Iqiob5TXVzvyeoJT+j8eovOFC+Xg==
X-Received: by with SMTP id d65mr48943537pfg.112.1474994964746; Tue, 27 Sep 2016 09:49:24 -0700 (PDT)
Received: from [] ( []) by with ESMTPSA id ah5sm6197408pad.30.2016. (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 27 Sep 2016 09:49:24 -0700 (PDT)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <>
In-Reply-To: <>
Date: Tue, 27 Sep 2016 09:49:24 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <> <> <> <> <> <>
To: Brian Weis <>
X-Mailer: Apple Mail (2.3124)
Archived-At: <>
Cc: "" <>, "" <>, "" <>
Subject: Re: [secdir] SECDIR review of draft-ietf-lisp-crypto-07
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 27 Sep 2016 16:49:27 -0000

Chris, is it okay to post draft-ietf-lisp-crypto-08?


> On Sep 26, 2016, at 9:47 AM, Dino Farinacci <> wrote:
> Chris, if you are fine with Brian’s response, I can post the -08. Please ack. Thanks.
> Dino
>> On Sep 25, 2016, at 8:11 PM, Brian Weis (bew) <> wrote:
>> Hi Chris, 
>> Thanks for the review. I’ve added one comment below.
>>> On Sep 25, 2016, at 6:27 PM, Chris Lonvick <> wrote:
>>> Hi Dino,
>>> On 9/25/16 4:37 PM, Dino Farinacci wrote:
>>>>>> I don't follow LISP so I'm not sure if there is an actual mechanism for a device receiving a map request packet to decline an offered cipher suite. If there is, I didn't see it explained in the
>>>> Yes, there is. If the Map-Reply this is returned contains no Security LCAF that means to the ITR that it either needs to go unencrypted encapsulating packets to the ETR or try another cipher text.
>>>>>>>> draft. You should address this in a future draft. This will be needed for when new cipher suites are
>>>> Understand the need. We intentionally wanted to support this.
>>>>>>>> added and a receiving device does not have the capability to handle the new cipher suite, or the case where an old cipher suite has been administratively disabled; like if it's been compromised and shouldn't be used. There are several ways to do this.
>>>> We have this in section x of the draft. Is it not sufficient?
>>>>  If an ITR, PITR, or RTR sends a Map-Request with the Security Type
>>>>  LCAF included and the ETR or RTR does not want to have encapsulated
>>>>  traffic encrypted, they will return a Map-Reply with no RLOC records
>>>>  encoded with the Security Type LCAF.  This signals to the ITR, PITR
>>>>  or RTR not to encrypt traffic (it cannot encrypt traffic anyways
>>>>  since no ETR public-key was returned).
>>> That text just says that if the cipher suite is declined then there will be no encryption. I was interpreting that to mean that the receiver just isn't going to accept any attempt at encryption. If it's just meant to be for that particular cipher suit then you'll need to add a line to that paragraph to say that the ITR, PITR, or RTR can attempt a different cipher suite if it is administratively configured to do so. However, that could get to be very inefficient if the ITR has to make 6 attempts before understanding that the ETR just isn't going to accept any encryption request - if it's so configured, or if it just doesn't support the feature whatsoever. So even if you allow the sender to make offer after offer, it would still be a good idea to have a way for the receiver to entirely decline encrypting packets from the sender.
>>> But, with all that being said, I'm figuring that we're getting outside the intent of your experimental specification. When you do get around to getting this onto a standards track, then you should make some decisions around how to convey capabilities between the sender and receiver so they can quickly and efficiently figure out what's going to work, or if it's just not, rather than making one offer after another. TLS and SSH have ways for a sender to offer a list from which the receiver can choose, if you're looking for examples. Another way is for the sender to proffer a version number which is associated with a select group of capabilities. From that, the receiver can make a choice, or efficiently decline all.
>> Thanks for the suggestions. In this effort we were intentionally avoiding the complexities and added security analysis requirements of a multiple round-trip method capabilities negotiation such as TLS. But maybe a capabilities declaration more along the lines of the version number you suggest might be appropriate.  I agree that at such time as the protocol was prepared for standards-track that this would be important to add.
>> Thanks,
>> Brian
>>> Best regards,
>>> Chris
>> -- 
>> Brian Weis
>> Security, CSG, Cisco Systems
>> Telephone: +1 408 526 4796
>> Email: