Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-nsh-integrity-06: (with DISCUSS and COMMENT)
tirumal reddy <kondtir@gmail.com> Tue, 14 September 2021 04:37 UTC
Return-Path: <kondtir@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 15CD63A0DC7;
Mon, 13 Sep 2021 21:37:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001,
URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id VjaRtkrbrbPS; Mon, 13 Sep 2021 21:37:25 -0700 (PDT)
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com
[IPv6:2a00:1450:4864:20::22f])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id B31D63A0DC0;
Mon, 13 Sep 2021 21:37:21 -0700 (PDT)
Received: by mail-lj1-x22f.google.com with SMTP id g14so21316836ljk.5;
Mon, 13 Sep 2021 21:37:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=mime-version:references:in-reply-to:from:date:message-id:subject:to
:cc; bh=wtOy1v6uI2nKvXrgI75HJyXUiH14CntWNIUV9fCzTH4=;
b=AK5w/46EbN+FreY8/4UezzSWRtX+kcRs8zx8//yi/m6teKKiYpxUm34tCSFZsO995u
TITsZ0vl2OkIxj9VtgFCDYMPFa0DJmXvxXSIpbT3jEoeBxrHULrJHgt7b2jR1mWajrqU
/DqX4LhtnY9xz+zy8ggUIc8NE4heqJOR7EzhWZgTXFZAImfFS0tlUXZFv5zogcIOxO5M
fh/kgelM3yqgcbnl1NREjQge4Qcdt97HDO/s6q+AlEWbodjtvg2jOZ97GNsc+v9AJ8gk
aKNnfMhvrHJgNiUhfSpfjIZ0RDFDmlAhK6VlMmncEij1dilqvMxdJIugls/SwLIjhwWV
rT6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to:cc;
bh=wtOy1v6uI2nKvXrgI75HJyXUiH14CntWNIUV9fCzTH4=;
b=b/8ZHdA6K4HptkasZnReZYs8Cmqc0YThW6Xz5fjAj2IaPd4q/2KFQomLa3rxmblkfo
l/3uh4AtTG4RVU+ShZl+JNu+KXrSEoirkEvob1gpBwtpYB04508/Dl9brEPCtwXTWa3w
cTwZNkzko177JPdrjym1py91KCrUMYFd/AumYr0BXWt4H3Jk9WNqxnC9w4YDRM5UH8h9
J9uhxcU7Q7Qkn2Pl12oQeCpEE/AA1vPzgJTJ3IqjolxGm9e8lfNv+oqUfH1Bm4kkYMaO
X9Ei93v3254yDjzYgv7oqldekFBttWDvh4dUwKUc7/IJIEyr9Gtq9WK4qgiPelycuh7/
cqjw==
X-Gm-Message-State: AOAM533s42TRIiaRTRNC+dAsaX2z8/RHpfAWrfSbmRp5ySj6j3ohovzD
CIbcbL6IyQDc3EQMxTJgJByTydq4HDcK37OOKSI=
X-Google-Smtp-Source: ABdhPJzdItvHqZ6fKWCHsg4dTmyPrE6ZM9kP+S0c0UP3ziSLQFTGR3gTszmTa6c6DR/XXhN/j3/sKMXZb8+pVfS6pnI=
X-Received: by 2002:a2e:461a:: with SMTP id t26mr11860503lja.147.1631594234586;
Mon, 13 Sep 2021 21:37:14 -0700 (PDT)
MIME-Version: 1.0
References: <162617866082.13596.2398814614966286542@ietfa.amsl.com>
<15473_1626195281_60EDC551_15473_51_1_787AE7BB302AE849A7480A190F8B9330353BE8EC@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
<94FF1F19-7004-42C5-8560-C99A2FEEF71A@cisco.com>
<CAFpG3gfrDC67OhKLmLEWkmH1E3ResxsOouHwxjCgVDwBk7N3OQ@mail.gmail.com>
<31B62CC4-2F26-4452-9DD6-511A376CDEFA@cisco.com>
In-Reply-To: <31B62CC4-2F26-4452-9DD6-511A376CDEFA@cisco.com>
From: tirumal reddy <kondtir@gmail.com>
Date: Tue, 14 Sep 2021 10:07:03 +0530
Message-ID: <CAFpG3geodcVWkOMQiw_60Ov9-UMw=+QV81jTP8BYBPqO3xCoGA@mail.gmail.com>
To: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
Cc: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>,
"Vigoureux, Martin (Nokia - FR/Paris-Saclay)" <martin.vigoureux@nokia.com>,
The IESG <iesg@ietf.org>, "draft-ietf-sfc-nsh-integrity@ietf.org"
<draft-ietf-sfc-nsh-integrity@ietf.org>,
"sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>,
"gregimirsky@gmail.com" <gregimirsky@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000c529e005cbed2263"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/9kbzms6OZm_byfPChSIyjZLexLM>
Subject: Re: [sfc]
=?utf-8?q?=C3=89ric_Vyncke=27s_Discuss_on_draft-ietf-sfc-n?=
=?utf-8?q?sh-integrity-06=3A_=28with_DISCUSS_and_COMMENT=29?=
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>,
<mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>,
<mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Sep 2021 04:37:31 -0000
Thanks Eric for reviewing the revised draft and clearing the DISCUSS. Thanks a lot to Martin for following up with you. Cheers, -Tiru On Mon, 13 Sept 2021 at 19:20, Eric Vyncke (evyncke) <evyncke@cisco.com> wrote: > Hello Tiru, > > > > Your proposed text indeed addresses my remaining issue. > > > > I am clearing my DISCUSS in the coming minutes as Med also addressed > earlier my other DISCUSS points. > > > > Regards and sorry for belated reply, > > > > -éric > > > > PS: your reply was lost in the ‘fury’ ot the IETF week, sorry about that > and please thank your AD, Martin Vigoureux, for sending me today a gentle > nudge... > > PS2: if IESG members do not respond, then ALWAYS feel free to send a > reminder as we are mere overloaded human beings :-) > > > > *From: *tirumal reddy <kondtir@gmail.com> > *Date: *Wednesday, 14 July 2021 at 13:58 > *To: *Eric Vyncke <evyncke@cisco.com> > *Cc: *"mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>om>, The > IESG <iesg@ietf.org>rg>, "draft-ietf-sfc-nsh-integrity@ietf.org" < > draft-ietf-sfc-nsh-integrity@ietf.org>gt;, "sfc-chairs@ietf.org" < > sfc-chairs@ietf.org>gt;, "sfc@ietf.org" <sfc@ietf.org>rg>, " > gregimirsky@gmail.com" <gregimirsky@gmail.com> > *Subject: *Re: Éric Vyncke's Discuss on draft-ietf-sfc-nsh-integrity-06: > (with DISCUSS and COMMENT) > > > > Hi Eric, > > > > We will update text in Section 7.2 as follows to address the comment : > > > > The NSH imposer sets the MAC field to zero and then computes the message > integrity for the target NSH data (depending on the integrity protection > scope discussed in Section 5) using MAC_KEY and HMAC algorithm. It then > inserts the computed digest in the MAC field in the "MAC and Encrypted > Metadata" Context Header. > > > > Cheers, > > -Tiru > > > > On Wed, 14 Jul 2021 at 16:42, Eric Vyncke (evyncke) <evyncke@cisco.com> > wrote: > > Hello Med, > > Thank you for your prompt reply. > > See below for EV>, still holding my DISCUSS mainly around the "how to > compute the MAC as it includes the MAC field itself" > > Regards > > -éric > > -----Original Message----- > From: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com> > Date: Tuesday, 13 July 2021 at 18:54 > To: Eric Vyncke <evyncke@cisco.com>om>, The IESG <iesg@ietf.org> > Cc: "draft-ietf-sfc-nsh-integrity@ietf.org" < > draft-ietf-sfc-nsh-integrity@ietf.org>gt;, "sfc-chairs@ietf.org" < > sfc-chairs@ietf.org>gt;, "sfc@ietf.org" <sfc@ietf.org>rg>, " > gregimirsky@gmail.com" <gregimirsky@gmail.com> > Subject: RE: Éric Vyncke's Discuss on draft-ietf-sfc-nsh-integrity-06: > (with DISCUSS and COMMENT) > > Hi Eric, > > Thank you for the review. > > Please see inline. > > Cheers, > Med > > > -----Message d'origine----- > > De : Éric Vyncke via Datatracker [mailto:noreply@ietf.org] > > Envoyé : mardi 13 juillet 2021 14:18 > > À : The IESG <iesg@ietf.org> > > Cc : draft-ietf-sfc-nsh-integrity@ietf.org; sfc-chairs@ietf.org; > > sfc@ietf.org; gregimirsky@gmail.com; gregimirsky@gmail.com > > Objet : Éric Vyncke's Discuss on draft-ietf-sfc-nsh-integrity-06: > > (with DISCUSS and COMMENT) > > > > Éric Vyncke has entered the following ballot position for > > draft-ietf-sfc-nsh-integrity-06: Discuss > > > > When responding, please keep the subject line intact and reply to > > all email addresses included in the To and CC lines. (Feel free to > > cut this introductory paragraph, however.) > > > > > > Please refer to https://www.ietf.org/iesg/statement/discuss- > > criteria.html > > for more information about DISCUSS and COMMENT positions. > > > > > > The document, along with other ballot positions, can be found here: > > https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-integrity/ > > > > > > > > -------------------------------------------------------------------- > > -- > > DISCUSS: > > -------------------------------------------------------------------- > > -- > > > > Thank you for the work put into this document. > > > > Special thanks to Greg Mirsky for his shepherding especially about > > his summary of the WG consensus. > > > > Please find below some blocking DISCUSS point (which should be easy > > to fix), some non-blocking COMMENT points (but replies would be > > appreciated), and one nit. > > > > I hope that this helps to improve the document, > > > > Regards, > > > > -éric > > > > == DISCUSS == > > > > I failed to spot the order of the operations for the integrity and > > confidentiality operations, e.g., I did not find on what the HMAC is > > computed: > > in the unencrypted or encrypted field ? > > [Med] Isn't this covered by this text: > > Using the secret key (K) and authenticated encryption algorithm, the > NSH imposer encrypts the Context Headers (as set, for example, in > Section 3), computes the message integrity for the target NSH data, > and inserts the resulting payload in the "MAC and Encrypted > Metadata" > Context Header (Section 5). The entire Context Header carrying a > privacy-sensitive metadata is encrypted (that is, including the MD > Class, Type, Length, and associated metadata of each Context > Header). > > EV> the text could be made clearer by using "then" rather than simple "," > EV> but I STRONGLY suggest to move this explanation earlier at the very > beginning of section 7 (or 7.1) and not like now in section 7.3 > EV> BTW, this is indeed the expected order to avoid DoS > > > > > -- Section 5.1 -- > > What is the unit of "key length", I assume a length expressed in > > octets but it is not specified. > > [Med] Yes. Fixed. Thank you for catching this. > > EV> __ > > > > > -- Section 7.2 -- > > What is the "A" used in the HMAC computation ? > > [Med] This is: Additional Authenticated Data (A) (mentioned in 4.2). > > EV> fair enough, suggest to write that the terminology of section 4.2 is > used there. > > > > The formula specifies HMAC-SHA-256-128() but what if another HMAC is > > used ? > > [Med] Please note that the text says: "can be illustrated as > follows:". > > That is for illustration purposes. > > EV> could also be made more obvious with " The Message Authentication Code > (T) computation process for additional authentication text (A) with > HMAC-SHA-256-128() can be illustrated as follows:" > > > Section 7.3 use MAC() which is more flexible. > > > > As the MAC field is included in the integrity protected header, > > please specify the value of this field when computing the HMAC (I > > assume 0 but let's be clear) > > EV> still waiting for an answer on this issue (so keeping my DISCUSS > ballot) > > > > > -- Section 7.5 -- > > What is the expected behavior when a NSH does not contain a "MAC and > > Encrypted Metadata" Context Header ? §1 hints to packet drop ? > > Should there be a local policy for this case ? > > [Med] This is covered here: > > It MUST log an error at least once per the > SPI for which the "MAC and Encrypted Metadata" Context Header is > missing. > > EV> honestly, not clear from the text. Please consider adding "In this > case, it MUST..." > > > > > > > -------------------------------------------------------------------- > > -- > > COMMENT: > > -------------------------------------------------------------------- > > -- > > > > > > I second Alvaro's and Lars' point about formally updating RFC 8300. > > > > Quite often in the text "privacy-sensitive metadata" is used but > > encryption is not only required for privacy but also to protect > > operational data from attackers (i.e., not linked to privacy), is > > there a real need to qualify "metadata" with "privacy-sensitive", > > i.e., "confidential metadata" may be more appropriate ? > > [Med] We use this term because we can easily argue why we included > statement such as: > > " In an SFC-enabled domain where the above attacks are possible, (1) > NSH data MUST be integrity-protected and replay-protected, and (2) > privacy-sensitive NSH metadata MUST be encrypted for confidentiality > preservation purposes." > > Other types can be encrypted as per: > > Classifier(s), NSH-aware SFs, and SFC proxies are instructed with > the > set of Context Headers (privacy-sensitive metadata, typically) that > must be encrypted. > > EV> let's say that we disagree __ but this is non-blocking anyway > > > > > -- Section 4.1.1 -- > > The use of 'metadata' (notably in table 1) for 'context headers' is > > confusing for a first-time reader. Any chance to be consistent and > > only use 'context headers' ? > > [Med] Will see how to make this better, but please that we do have the > following before table 1: > > "Context Header(s): Carries metadata..." > > > > > -- Section 4.2 -- > > At first reading, I am confused by the use of the word 'secret key' > > for what appears to be a 'shared key'. Or is this 'secret key' never > > shared and simply used to generate the secondary keys, which are > > then shared ? Even if discussed later, some early explanations would > > be welcome. > > [Med] We are using similar wording as in RFC7518. > > EV> I fail to see this wording in RFC 7518 > > > > > -- Section 5.1 -- > > Is there a good reason why the field name "key length" is not "key > > ID length" ? > > [Med] Only for esthetic matters of the figures. Can fix that if you > prefer. > > |Key ID Length| vs | Key Length | > > EV> this would be clearer IMHO but editorial hence non-blocking > > > > > I also find very strange to define "Length: variable" as the header > > field itself as a fixed length, simply state "unsigned integer". > > [Med] We are echoing Section 2.5.1 of RFC8300. > > EV> like above, I fail to see this similarity in the section 2.5.1 of RFC > 8300 "Indicates the length of the variable-length metadata, in bytes." > > > > As timestamp can include fractions of second, which is a good thing, > > then please reword "expressed in seconds relative" to indicate that > > fraction of second is included. > > [Med] OK. > > > > > The 32-bit epoch will wrap around in 2036, should this I-D already > > consider what to do at that moment ? > > [Med] Hmm. We say that it wraps in 2106 :-) > > EV> I should have spot the different epoch ;-) > > > > > -- Section 8 -- > > Indeed MTU is always an interesting 'problem' but how is this > > extension different than plain NSH ? The NSH neither increases nor > > decreases on the fly with this document. > > [Med] It varies as we can add/strip context headers as the packet > progress in the service chain. > > EV> Amazing that this was accepted by the IESG in RFC 8300 years ago... > when net-pgm RFC had to remove the header insertion. > > > > > == NITS == > > > > -- Section 3 -- > > Should 'figure 1' be 'table 1' per consistency with section 4.1.1 ? > > [Med] It should. Will be fixed. Thanks. > > > > > > > > > _________________________________________________________________________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations > confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez > recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les > messages electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, > deforme ou falsifie. Merci. > > This message and its attachments may contain confidential or > privileged information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and > delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have > been modified, changed or falsified. > Thank you. > >
- [sfc] Éric Vyncke's Discuss on draft-ietf-sfc-nsh… Éric Vyncke via Datatracker
- Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc… mohamed.boucadair
- Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc… Eric Vyncke (evyncke)
- Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc… tirumal reddy
- Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc… mohamed.boucadair
- Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc… Eric Vyncke (evyncke)
- Re: [sfc] Éric Vyncke's Discuss on draft-ietf-sfc… tirumal reddy