Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)

mohamed.boucadair@orange.com Tue, 13 July 2021 06:14 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7219E3A18DD; Mon, 12 Jul 2021 23:14:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 81lQ9F_bSAUJ; Mon, 12 Jul 2021 23:14:17 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2842B3A18DB; Mon, 12 Jul 2021 23:14:17 -0700 (PDT)
Received: from opfedar06.francetelecom.fr (unknown [xx.xx.xx.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar22.francetelecom.fr (ESMTP service) with ESMTPS id 4GP9MC0SRpz302N; Tue, 13 Jul 2021 08:14:15 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1626156855; bh=qgnrCqpuftU2owxmjh1FkXOz1Ys0CIweSRJhVcBaXHk=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=BKdFJMPxfC+QO/DjTiXhlUsM+LvzQuWLzmQsAqRRDilfOAu19VDcgquzS8LcHKNqY bw310bljcohIzAHSLSL2r9iWEAUnPPjdeUAxp+27d+2ZmAWLG3hBRW/8nal5GKSRwB 1Q34kXdizfzuPHLOHVKNawfDeWZvWtxSdPyZoNri2byz8YhMfty26d//zFTbzskE9P tWpORRupweCB8DBLJaOqwO7A9KmzGNgDTTMDkkWxe/dbWTRfkV82l0JONSvZZD4Lt/ 8OvJOFTcZB7Dhx69UUo1nJvA3XzUJ6ZZ+b4Xl4d8JfzP1JKowcxS2hm60R4k0EJrzB VSBW/Sx5oEWxA==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfedar06.francetelecom.fr (ESMTP service) with ESMTPS id 4GP9MB64RHz3wbZ; Tue, 13 Jul 2021 08:14:14 +0200 (CEST)
From: mohamed.boucadair@orange.com
To: Alvaro Retana <aretana.ietf@gmail.com>, The IESG <iesg@ietf.org>
CC: "sfc@ietf.org" <sfc@ietf.org>, "gregimirsky@gmail.com" <gregimirsky@gmail.com>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "draft-ietf-sfc-nsh-integrity@ietf.org" <draft-ietf-sfc-nsh-integrity@ietf.org>
Thread-Topic: Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)
Thread-Index: AQHXd1pSBYVDUSV5zUqytv6A0CnmKatAbHHA
Date: Tue, 13 Jul 2021 06:14:13 +0000
Message-ID: <32760_1626156854_60ED2F36_32760_382_1_787AE7BB302AE849A7480A190F8B9330353BE24E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <162611498183.7775.3562397379733537345@ietfa.amsl.com> <23837_1626115941_60EC8F65_23837_478_1_787AE7BB302AE849A7480A190F8B9330353BD8C2@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CAMMESsx0ARXu2gpDT0MDxWT8ZPCZ8p97mcS43usAvPz=79vbiA@mail.gmail.com> <13781_1626118873_60EC9AD9_13781_9_1_787AE7BB302AE849A7480A190F8B9330353BDA95@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CAMMESsynLzx9mj_cCnjtbrjUa_UCtOhpRKQKTh3uuomJ7xfYJw@mail.gmail.com>
In-Reply-To: <CAMMESsynLzx9mj_cCnjtbrjUa_UCtOhpRKQKTh3uuomJ7xfYJw@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/1IqS_vNkWewkOq9xmoPmu_oxg4I>
Subject: Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jul 2021 06:14:23 -0000

Hi Alvaro, 

Sure. I made the changes that you can track at: https://tinyurl.com/nsh-integrity-latest 

* Added a pointer to 8.2 where the transport security is discussed
* added an explicit mention of the third option that refers to this I-D

We may tweak this a little more. 

Cheers,
Med

> -----Message d'origine-----
> De : Alvaro Retana [mailto:aretana.ietf@gmail.com]
> Envoyé : lundi 12 juillet 2021 22:13
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>; The
> IESG <iesg@ietf.org>
> Cc : sfc@ietf.org; gregimirsky@gmail.com; sfc-chairs@ietf.org;
> draft-ietf-sfc-nsh-integrity@ietf.org
> Objet : RE: Alvaro Retana's No Objection on draft-ietf-sfc-nsh-
> integrity-06: (with COMMENT)
> 
> On July 12, 2021 at 3:41:13 PM, mohamed.boucadair@orange.com
> (mohamed.boucadair@orange.com (mailto:mohamed.boucadair@orange.com))
> wrote:
> 
> 
> ...
> > > The outcome is that the requirements in rfc8300 would result in
> not
> > > using this specification.
> > >
> >
> > [Med] Not sure about this given that RFC8300 says the following:
> >
> > NSH itself does not mandate protocol-specific integrity
> protection.
> > However, if an operator deems protection is required, several
> options
> > are viable:
> >
> > 1. SFF/SF NSH verification
> > ...
> > 2. Transport Security
> > ...
> > 3. NSH Variable Header-Based Integrity
> >
> > Lastly, NSH MD Type 2 provides, via variable-length headers, the
> > ability to append cryptographic integrity protection to the NSH
> > packet. The implementation of such a scheme is outside the scope
> of
> > this document.
> >
> > The I-D is basically the third option.
> 
> Ok.  Please make it extra obvious that this is the case -- using the
> same words would be ideal.
> 
> 
> §8.2.2 (Confidentiality) is a lot less clear.
> 
> 
> Even though I still think that a formal Update to rfc8300 is the
> right thing to do, I would be very happy if there was (at least)
> some additional text included to clarify the expected relationship
> between the 2 documents.
> 
> Thanks!
> 
> Alvaro.
> 
> 
> 
> > > > I know that we can interpret the update as "amends", but
> unless
> > > > I'm mistaken there is no formal IETF consensus on this.
> > >
> > > True.
> > >
> > > Without at least some text explaining the relationship between
> the
> > > requirements in this document and how they may be considered
> instead
> > > of the ones in rfc8300, I don't think this document is complete.
> For
> > > better or worse, the only tool we have right now to make that
> link
> > > clear is the Updates tag.
> > >
> > >
> > > Thanks!
> > >
> > > Alvaro.

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.