Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-nsh-integrity-06: (with DISCUSS and COMMENT)

tirumal reddy <kondtir@gmail.com> Tue, 14 September 2021 04:37 UTC

Return-Path: <kondtir@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15CD63A0DC7; Mon, 13 Sep 2021 21:37:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VjaRtkrbrbPS; Mon, 13 Sep 2021 21:37:25 -0700 (PDT)
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com [IPv6:2a00:1450:4864:20::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B31D63A0DC0; Mon, 13 Sep 2021 21:37:21 -0700 (PDT)
Received: by mail-lj1-x22f.google.com with SMTP id g14so21316836ljk.5; Mon, 13 Sep 2021 21:37:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wtOy1v6uI2nKvXrgI75HJyXUiH14CntWNIUV9fCzTH4=; b=AK5w/46EbN+FreY8/4UezzSWRtX+kcRs8zx8//yi/m6teKKiYpxUm34tCSFZsO995u TITsZ0vl2OkIxj9VtgFCDYMPFa0DJmXvxXSIpbT3jEoeBxrHULrJHgt7b2jR1mWajrqU /DqX4LhtnY9xz+zy8ggUIc8NE4heqJOR7EzhWZgTXFZAImfFS0tlUXZFv5zogcIOxO5M fh/kgelM3yqgcbnl1NREjQge4Qcdt97HDO/s6q+AlEWbodjtvg2jOZ97GNsc+v9AJ8gk aKNnfMhvrHJgNiUhfSpfjIZ0RDFDmlAhK6VlMmncEij1dilqvMxdJIugls/SwLIjhwWV rT6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wtOy1v6uI2nKvXrgI75HJyXUiH14CntWNIUV9fCzTH4=; b=b/8ZHdA6K4HptkasZnReZYs8Cmqc0YThW6Xz5fjAj2IaPd4q/2KFQomLa3rxmblkfo l/3uh4AtTG4RVU+ShZl+JNu+KXrSEoirkEvob1gpBwtpYB04508/Dl9brEPCtwXTWa3w cTwZNkzko177JPdrjym1py91KCrUMYFd/AumYr0BXWt4H3Jk9WNqxnC9w4YDRM5UH8h9 J9uhxcU7Q7Qkn2Pl12oQeCpEE/AA1vPzgJTJ3IqjolxGm9e8lfNv+oqUfH1Bm4kkYMaO X9Ei93v3254yDjzYgv7oqldekFBttWDvh4dUwKUc7/IJIEyr9Gtq9WK4qgiPelycuh7/ cqjw==
X-Gm-Message-State: AOAM533s42TRIiaRTRNC+dAsaX2z8/RHpfAWrfSbmRp5ySj6j3ohovzD CIbcbL6IyQDc3EQMxTJgJByTydq4HDcK37OOKSI=
X-Google-Smtp-Source: ABdhPJzdItvHqZ6fKWCHsg4dTmyPrE6ZM9kP+S0c0UP3ziSLQFTGR3gTszmTa6c6DR/XXhN/j3/sKMXZb8+pVfS6pnI=
X-Received: by 2002:a2e:461a:: with SMTP id t26mr11860503lja.147.1631594234586; Mon, 13 Sep 2021 21:37:14 -0700 (PDT)
MIME-Version: 1.0
References: <162617866082.13596.2398814614966286542@ietfa.amsl.com> <15473_1626195281_60EDC551_15473_51_1_787AE7BB302AE849A7480A190F8B9330353BE8EC@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <94FF1F19-7004-42C5-8560-C99A2FEEF71A@cisco.com> <CAFpG3gfrDC67OhKLmLEWkmH1E3ResxsOouHwxjCgVDwBk7N3OQ@mail.gmail.com> <31B62CC4-2F26-4452-9DD6-511A376CDEFA@cisco.com>
In-Reply-To: <31B62CC4-2F26-4452-9DD6-511A376CDEFA@cisco.com>
From: tirumal reddy <kondtir@gmail.com>
Date: Tue, 14 Sep 2021 10:07:03 +0530
Message-ID: <CAFpG3geodcVWkOMQiw_60Ov9-UMw=+QV81jTP8BYBPqO3xCoGA@mail.gmail.com>
To: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
Cc: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "Vigoureux, Martin (Nokia - FR/Paris-Saclay)" <martin.vigoureux@nokia.com>, The IESG <iesg@ietf.org>, "draft-ietf-sfc-nsh-integrity@ietf.org" <draft-ietf-sfc-nsh-integrity@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "gregimirsky@gmail.com" <gregimirsky@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000c529e005cbed2263"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/9kbzms6OZm_byfPChSIyjZLexLM>
Subject: Re: [sfc] =?utf-8?q?=C3=89ric_Vyncke=27s_Discuss_on_draft-ietf-sfc-n?= =?utf-8?q?sh-integrity-06=3A_=28with_DISCUSS_and_COMMENT=29?=
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Sep 2021 04:37:31 -0000

Thanks Eric for reviewing the revised draft and clearing the DISCUSS.
Thanks a lot to Martin for following up with you.

Cheers,
-Tiru

On Mon, 13 Sept 2021 at 19:20, Eric Vyncke (evyncke) <evyncke@cisco.com>
wrote:

> Hello Tiru,
>
>
>
> Your proposed text indeed addresses my remaining issue.
>
>
>
> I am clearing my DISCUSS in the coming minutes as Med also addressed
> earlier my other DISCUSS points.
>
>
>
> Regards and sorry for belated reply,
>
>
>
> -éric
>
>
>
> PS: your reply was lost in the ‘fury’ ot the IETF week, sorry about that
> and please thank your AD, Martin Vigoureux, for sending me today a gentle
> nudge...
>
> PS2: if IESG members do not respond, then ALWAYS feel free to send a
> reminder as we are mere overloaded human beings :-)
>
>
>
> *From: *tirumal reddy <kondtir@gmail.com>
> *Date: *Wednesday, 14 July 2021 at 13:58
> *To: *Eric Vyncke <evyncke@cisco.com>
> *Cc: *"mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>om>, The
> IESG <iesg@ietf.org>rg>, "draft-ietf-sfc-nsh-integrity@ietf.org" <
> draft-ietf-sfc-nsh-integrity@ietf.org>gt;, "sfc-chairs@ietf.org" <
> sfc-chairs@ietf.org>gt;, "sfc@ietf.org" <sfc@ietf.org>rg>, "
> gregimirsky@gmail.com" <gregimirsky@gmail.com>
> *Subject: *Re: Éric Vyncke's Discuss on draft-ietf-sfc-nsh-integrity-06:
> (with DISCUSS and COMMENT)
>
>
>
> Hi Eric,
>
>
>
> We will update text in Section 7.2 as follows to address the comment :
>
>
>
> The NSH imposer sets the MAC field to zero and then computes the message
> integrity for the target NSH data (depending on the integrity protection
> scope discussed in Section 5) using MAC_KEY and HMAC algorithm. It then
> inserts the computed digest in the MAC field in the "MAC and Encrypted
> Metadata" Context Header.
>
>
>
> Cheers,
>
> -Tiru
>
>
>
> On Wed, 14 Jul 2021 at 16:42, Eric Vyncke (evyncke) <evyncke@cisco.com>
> wrote:
>
> Hello Med,
>
> Thank you for your prompt reply.
>
> See below for EV>, still holding my DISCUSS mainly around the "how to
> compute the MAC as it includes the MAC field itself"
>
> Regards
>
> -éric
>
> -----Original Message-----
> From: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
> Date: Tuesday, 13 July 2021 at 18:54
> To: Eric Vyncke <evyncke@cisco.com>om>, The IESG <iesg@ietf.org>
> Cc: "draft-ietf-sfc-nsh-integrity@ietf.org" <
> draft-ietf-sfc-nsh-integrity@ietf.org>gt;, "sfc-chairs@ietf.org" <
> sfc-chairs@ietf.org>gt;, "sfc@ietf.org" <sfc@ietf.org>rg>, "
> gregimirsky@gmail.com" <gregimirsky@gmail.com>
> Subject: RE: Éric Vyncke's Discuss on draft-ietf-sfc-nsh-integrity-06:
> (with DISCUSS and COMMENT)
>
>     Hi Eric,
>
>     Thank you for the review.
>
>     Please see inline.
>
>     Cheers,
>     Med
>
>     > -----Message d'origine-----
>     > De : Éric Vyncke via Datatracker [mailto:noreply@ietf.org]
>     > Envoyé : mardi 13 juillet 2021 14:18
>     > À : The IESG <iesg@ietf.org>
>     > Cc : draft-ietf-sfc-nsh-integrity@ietf.org; sfc-chairs@ietf.org;
>     > sfc@ietf.org; gregimirsky@gmail.com; gregimirsky@gmail.com
>     > Objet : Éric Vyncke's Discuss on draft-ietf-sfc-nsh-integrity-06:
>     > (with DISCUSS and COMMENT)
>     >
>     > Éric Vyncke has entered the following ballot position for
>     > draft-ietf-sfc-nsh-integrity-06: Discuss
>     >
>     > When responding, please keep the subject line intact and reply to
>     > all email addresses included in the To and CC lines. (Feel free to
>     > cut this introductory paragraph, however.)
>     >
>     >
>     > Please refer to https://www.ietf.org/iesg/statement/discuss-
>     > criteria.html
>     > for more information about DISCUSS and COMMENT positions.
>     >
>     >
>     > The document, along with other ballot positions, can be found here:
>     > https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-integrity/
>     >
>     >
>     >
>     > --------------------------------------------------------------------
>     > --
>     > DISCUSS:
>     > --------------------------------------------------------------------
>     > --
>     >
>     > Thank you for the work put into this document.
>     >
>     > Special thanks to Greg Mirsky for his shepherding especially about
>     > his summary of the WG consensus.
>     >
>     > Please find below some blocking DISCUSS point (which should be easy
>     > to fix), some non-blocking COMMENT points (but replies would be
>     > appreciated), and one nit.
>     >
>     > I hope that this helps to improve the document,
>     >
>     > Regards,
>     >
>     > -éric
>     >
>     > == DISCUSS ==
>     >
>     > I failed to spot the order of the operations for the integrity and
>     > confidentiality operations, e.g., I did not find on what the HMAC is
>     > computed:
>     > in the unencrypted or encrypted field ?
>
>     [Med] Isn't this covered by this text:
>
>        Using the secret key (K) and authenticated encryption algorithm, the
>        NSH imposer encrypts the Context Headers (as set, for example, in
>        Section 3), computes the message integrity for the target NSH data,
>        and inserts the resulting payload in the "MAC and Encrypted
> Metadata"
>        Context Header (Section 5).  The entire Context Header carrying a
>        privacy-sensitive metadata is encrypted (that is, including the MD
>        Class, Type, Length, and associated metadata of each Context
> Header).
>
> EV> the text could be made clearer by using "then" rather than simple ","
> EV> but I STRONGLY suggest to move this explanation earlier at the very
> beginning of section 7 (or 7.1) and not like now in section 7.3
> EV> BTW, this is indeed the expected order to avoid DoS
>
>     >
>     > -- Section 5.1 --
>     > What is the unit of "key length", I assume a length expressed in
>     > octets but it is not specified.
>
>     [Med] Yes. Fixed. Thank you for catching this.
>
> EV> __
>
>     >
>     > -- Section 7.2 --
>     > What is the "A" used in the HMAC computation ?
>
>     [Med] This is: Additional Authenticated Data (A) (mentioned in 4.2).
>
> EV> fair enough, suggest to write that the terminology of section 4.2 is
> used there.
>     >
>     > The formula specifies HMAC-SHA-256-128() but what if another HMAC is
>     > used ?
>
>     [Med] Please note that the text says: "can be illustrated as
> follows:".
>
>     That is for illustration purposes.
>
> EV> could also be made more obvious with " The Message Authentication Code
> (T) computation process for additional authentication text (A) with
> HMAC-SHA-256-128() can be illustrated as follows:"
>
>     > Section 7.3 use MAC() which is more flexible.
>     >
>     > As the MAC field is included in the integrity protected header,
>     > please specify the value of this field when computing the HMAC (I
>     > assume 0 but let's be clear)
>
> EV> still waiting for an answer on this issue (so keeping my DISCUSS
> ballot)
>
>     >
>     > -- Section 7.5 --
>     > What is the expected behavior when a NSH does not contain a "MAC and
>     > Encrypted Metadata" Context Header ? §1 hints to packet drop ?
>     > Should there be a local policy for this case ?
>
>     [Med] This is covered here:
>
>        It MUST log an error at least once per the
>        SPI for which the "MAC and Encrypted Metadata" Context Header is
>        missing.
>
> EV> honestly, not clear from the text. Please consider adding "In this
> case, it MUST..."
>
>     >
>     >
>     > --------------------------------------------------------------------
>     > --
>     > COMMENT:
>     > --------------------------------------------------------------------
>     > --
>     >
>     >
>     > I second Alvaro's and Lars' point about formally updating RFC 8300.
>     >
>     > Quite often in the text "privacy-sensitive metadata" is used but
>     > encryption is not only required for privacy but also to protect
>     > operational data from attackers (i.e., not linked to privacy), is
>     > there a real need to qualify "metadata" with "privacy-sensitive",
>     > i.e., "confidential metadata" may be more appropriate ?
>
>     [Med] We use this term because we can easily argue why we included
> statement such as:
>
>      " In an SFC-enabled domain where the above attacks are possible, (1)
>        NSH data MUST be integrity-protected and replay-protected, and (2)
>        privacy-sensitive NSH metadata MUST be encrypted for confidentiality
>        preservation purposes."
>
>     Other types can be encrypted as per:
>
>        Classifier(s), NSH-aware SFs, and SFC proxies are instructed with
> the
>        set of Context Headers (privacy-sensitive metadata, typically) that
>        must be encrypted.
>
> EV> let's say that we disagree __ but this is non-blocking anyway
>
>     >
>     > -- Section 4.1.1 --
>     > The use of 'metadata' (notably in table 1) for 'context headers' is
>     > confusing for a first-time reader. Any chance to be consistent and
>     > only use 'context headers' ?
>
>     [Med] Will see how to make this better, but please that we do have the
> following before table 1:
>
>     "Context Header(s): Carries metadata..."
>
>     >
>     > -- Section 4.2 --
>     > At first reading, I am confused by the use of the word 'secret key'
>     > for what appears to be a 'shared key'. Or is this 'secret key' never
>     > shared and simply used to generate the secondary keys, which are
>     > then shared ? Even if discussed later, some early explanations would
>     > be welcome.
>
>     [Med] We are using similar wording as in RFC7518.
>
> EV> I fail to see this wording in RFC 7518
>
>     >
>     > -- Section 5.1 --
>     > Is there a good reason why the field name "key length" is not "key
>     > ID length" ?
>
>     [Med] Only for esthetic matters of the figures. Can fix that if you
> prefer.
>
>     |Key ID Length| vs | Key Length |
>
> EV> this would be clearer IMHO but editorial hence non-blocking
>
>     >
>     > I also find very strange to define "Length: variable" as the header
>     > field itself as a fixed length, simply state "unsigned integer".
>
>     [Med] We are echoing Section 2.5.1 of RFC8300.
>
> EV> like above, I fail to see this similarity in the section 2.5.1 of RFC
> 8300 "Indicates the length of the variable-length metadata, in bytes."
>     >
>     > As timestamp can include fractions of second, which is a good thing,
>     > then please reword "expressed in seconds relative" to indicate that
>     > fraction of second is included.
>
>     [Med] OK.
>
>     >
>     > The 32-bit epoch will wrap around in 2036, should this I-D already
>     > consider what to do at that moment ?
>
>     [Med] Hmm. We say that it wraps in 2106 :-)
>
> EV> I should have spot the different epoch ;-)
>
>     >
>     > -- Section 8 --
>     > Indeed MTU is always an interesting 'problem' but how is this
>     > extension different than plain NSH ? The NSH neither increases nor
>     > decreases on the fly with this document.
>
>     [Med] It varies as we can add/strip context headers as the packet
> progress in the service chain.
>
> EV> Amazing that this was accepted by the IESG in RFC 8300 years ago...
> when net-pgm RFC had to remove the header insertion.
>
>     >
>     > == NITS ==
>     >
>     > -- Section 3 --
>     > Should 'figure 1' be 'table 1' per consistency with section 4.1.1 ?
>
>     [Med] It should. Will be fixed. Thanks.
>
>     >
>     >
>
>
>
> _________________________________________________________________________________________________________________________
>
>     Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
>     pas etre diffuses, exploites ou copies sans autorisation. Si vous avez
> recu ce message par erreur, veuillez le signaler
>     a l'expediteur et le detruire ainsi que les pieces jointes. Les
> messages electroniques etant susceptibles d'alteration,
>     Orange decline toute responsabilite si ce message a ete altere,
> deforme ou falsifie. Merci.
>
>     This message and its attachments may contain confidential or
> privileged information that may be protected by law;
>     they should not be distributed, used or copied without authorisation.
>     If you have received this email in error, please notify the sender and
> delete this message and its attachments.
>     As emails may be altered, Orange is not liable for messages that have
> been modified, changed or falsified.
>     Thank you.
>
>