Re: [sfc] Opsdir last call review of draft-ietf-sfc-nsh-integrity-05
Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> Fri, 02 July 2021 06:49 UTC
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id B927C3A1079;
Thu, 1 Jul 2021 23:49:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.4
X-Spam-Level:
X-Spam-Status: No, score=-2.4 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1,
MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_LOW=-0.7,
RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key)
reason="fail (body has been altered)"
header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id s1SN2q0GxYqA; Thu, 1 Jul 2021 23:49:51 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
(mail-eopbgr60040.outbound.protection.outlook.com [40.107.6.40])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 6DF853A1078;
Thu, 1 Jul 2021 23:49:50 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=F2S6NSnDYDm8EHaFkpAW7yTLmtM3nHdEnzvxHl8DaC2URjTnQTVQnqtonIKk/4MUIoi8yHJSz5ryBWvk48aBO8YE16/rhpnfE1mzJgQUc9SvTt998EGdpMCVlzRtjVUJYIRdEC8ZzbWHC2zwcoPd62fIzN0bu919/MJ4NU4ToY+ZB5ZpS3eHhywwEFkGUFF1HBu8UQFTpmQ0DPvBO9va8A0pj0xR3yC2P6h8T8WnZdBgKL3GogRDenEeyassVYsoVZZFYJ4T3R0FF0UgGepXWL6PPLkDRp48aJqKkIQtRws1GmP3fI5DgGzRUzl0vnBFtn2XnXeM63S+30z9tkImBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=OuGZgrxnOoe+D6/8frfKqIteVSftFuUgV4uU2J+NvGk=;
b=i5PnahyrVxx22RJ7ZFeq/IDO9a+pEa4iiK4b0+OW2th8n4vSPXi5GEEWBO0A1HQLKtvpGG+B4zxsMQu0ur3e+XoYrBbesCJpvacvQJqA4+f6PJX3wqKn8dvjBK4ozvcD4YDHk3KScaQLA/yFvB1rSxLN4WHIv+dh+nBzBVHajYM2KY/CfyjEHbOoQB/I+EAIHCe0STk6HONxjXRh2j3NwRrPPCpa8RWgOulMTxaadYM7QcAMgiLDSpHn1heBQnWnFoQSA0+QUL4ICY1X3Fey1bPTmzJjA2hfdxuspTKmA6TYY+NhGyB7wlpkL3KKKDkWmSqSmyZ8Cqeo73BZikYvrA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
smtp.mailfrom=jacobs-university.de; dmarc=pass action=none
header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de;
arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=jacobsuniversity.onmicrosoft.com;
s=selector2-jacobsuniversity-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=OuGZgrxnOoe+D6/8frfKqIteVSftFuUgV4uU2J+NvGk=;
b=HUbX5xlkER17wff5OIXw5uha4NcMoZWB5mXIflKeOyFOUeCXg3kLN+dUrRtlpFf2f7V63p3Zq3bsWv6TyRE0KkBM2KBkQazZwWP5CJZZAnFlBbxsm3K1YhqDtzGRbU1C2j/3EDWCNqrtiOl1UZp9kDc1FFtbwqRtWrvDcpF0Wd0=
Authentication-Results: orange.com; dkim=none (message not signed)
header.d=none;orange.com; dmarc=none action=none
header.from=jacobs-university.de;
Received: from AM0P190MB0641.EURP190.PROD.OUTLOOK.COM (2603:10a6:208:194::23)
by AM9P190MB1569.EURP190.PROD.OUTLOOK.COM (2603:10a6:20b:3e7::18)
with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.23; Fri, 2 Jul
2021 06:49:48 +0000
Received: from AM0P190MB0641.EURP190.PROD.OUTLOOK.COM
([fe80::fd93:9b33:ac92:ea58]) by AM0P190MB0641.EURP190.PROD.OUTLOOK.COM
([fe80::fd93:9b33:ac92:ea58%8]) with mapi id 15.20.4264.027; Fri, 2 Jul 2021
06:49:48 +0000
Date: Fri, 2 Jul 2021 08:49:44 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: mohamed.boucadair@orange.com
Cc: "ops-dir@ietf.org" <ops-dir@ietf.org>,
"draft-ietf-sfc-nsh-integrity.all@ietf.org"
<draft-ietf-sfc-nsh-integrity.all@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Message-ID: <20210702064944.a7k5tu6q4uwrvvol@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: mohamed.boucadair@orange.com,
"ops-dir@ietf.org" <ops-dir@ietf.org>,
"draft-ietf-sfc-nsh-integrity.all@ietf.org"
<draft-ietf-sfc-nsh-integrity.all@ietf.org>,
"sfc@ietf.org" <sfc@ietf.org>
References: <162460909273.657.16151989326348143956@ietfa.amsl.com>
<9774_1624614936_60D5A818_9774_471_2_787AE7BB302AE849A7480A190F8B9330353B0E12@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
<24262_1625202611_60DE9FB3_24262_195_1_787AE7BB302AE849A7480A190F8B9330353B4F52@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <24262_1625202611_60DE9FB3_24262_195_1_787AE7BB302AE849A7480A190F8B9330353B4F52@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
X-Originating-IP: [212.201.44.244]
X-ClientProxiedBy: FR3P281CA0023.DEUP281.PROD.OUTLOOK.COM
(2603:10a6:d10:1c::7) To AM0P190MB0641.EURP190.PROD.OUTLOOK.COM
(2603:10a6:208:194::23)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from localhost (212.201.44.244) by
FR3P281CA0023.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:1c::7) with Microsoft
SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.4308.8 via Frontend Transport; Fri, 2 Jul 2021 06:49:47 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5b3f0aaf-5a64-49d5-a908-08d93d25955b
X-MS-TrafficTypeDiagnostic: AM9P190MB1569:
X-MS-Exchange-Transport-Forked: True
X-Microsoft-Antispam-PRVS: <AM9P190MB1569EAF835BAE252340E84D9DE1F9@AM9P190MB1569.EURP190.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM;
H:AM0P190MB0641.EURP190.PROD.OUTLOOK.COM; PTR:; CAT:NONE;
SFS:(346002)(396003)(366004)(39850400004)(376002)(136003)(3450700001)(66574015)(54906003)(83380400001)(26005)(6496006)(186003)(52116002)(16526019)(4326008)(956004)(2906002)(6486002)(66556008)(5660300002)(966005)(316002)(1076003)(478600001)(66946007)(8676002)(6916009)(786003)(66476007)(8936002)(38350700002)(6666004)(86362001)(38100700002);
DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?iso-8859-1?Q?GE3jt8gY/qyAQk4H6qFbkqYGg/xeIEA7f5S/mn141Nf2WtsRK1JfWkVFA/?=
=?iso-8859-1?Q?PfDIkUpFZCPrPxBKtUjjrGY+GqrgbTS0MS8+ffie47OLyN7QYgqdPMJ+Cg?=
=?iso-8859-1?Q?bjDXmPJ4N8SoQ6ijTPx7c162YEF0WeHGJH5z9oBrHW5081ZS4wMIJ/yapf?=
=?iso-8859-1?Q?1VQxxrejkSS+FS3K0UzpnA9nB6N70VHu5LAUe36nsXj3NwXerR7Rr0KJPg?=
=?iso-8859-1?Q?EdZzBZ6jCpLZIHVpjZHIAQDsMC2MXlMq5A6s6HkBG7TkkYzVVJ9GxZslQx?=
=?iso-8859-1?Q?Jh524g9tWfmQ4JT/NGJH1hFsA84c3etuytQP0kxLDKT+59Oiq8cW5kngMQ?=
=?iso-8859-1?Q?3lXifQji7PoN/HZaxUkR5csT8u8boRWWV2jDi74D8tvN4SRk2U0ZDiAt/I?=
=?iso-8859-1?Q?vsZD3+vf3GnnzO4L5jHL0lL8z7MoRgCwLyvcXVeCr26MrisGB754ZhKzGv?=
=?iso-8859-1?Q?x9+KNi3j+wYCEXKys+wilN+6VRpsPK7iik0xmkDhvr40/i0hbSl1WehoAn?=
=?iso-8859-1?Q?4krsGPVgJCl1VEnl6i2I2hDfHeZPsPV/HNjCd/sVJX36b97z7U2DqMPmKx?=
=?iso-8859-1?Q?Outq55xGAv1QbES95dNp8mODMcyHUpmbfU8DoXScJ0YoQmkhRygLRtZQXd?=
=?iso-8859-1?Q?t1LJPZavXEHiHYAVMxYML4g0VwgB8Uvgf06qhSZTg+3kV7b0pA++SAUkxi?=
=?iso-8859-1?Q?aNGftvyKUo54d9aaWkiITLMXgsQM1ycdU9LmruXPPka1JNdZEocR8LbVPp?=
=?iso-8859-1?Q?bAqqgKjFMP4ff6P920iW85o8r5gLOvvMBELS+0ZuSY2zbQ7pO6Gvt05nc4?=
=?iso-8859-1?Q?MtHtWGTnaY0pI64MsvUs2q4oUjSrxV8Wu54CPpXwFV8U7ZT5sRqhPTOiqs?=
=?iso-8859-1?Q?w92JSnF8fhg7eIZrzHwlB7r8vFaA+mNn1O3beQzTPZGFCFAI9CehPKoE32?=
=?iso-8859-1?Q?pYAuSMEXMTOd3wy/vaTwo5jgFaNFoC7cYWaG6oMPj2/QAT0hRwyJjWgHSf?=
=?iso-8859-1?Q?0k977Q6nK6K7U6SPa3VTUa2KQKOhulSD2mJaOTuLpPmnD1dTzvYWHTRUj2?=
=?iso-8859-1?Q?CUCMt2whH/7tk2Zh04H/QLNytEFBhMsWdyP5nqDODk46Q/WMsnjEst3+vX?=
=?iso-8859-1?Q?rSTDsy7Dd3XbSKR3JduJEBiYs0owfuJLkngkICEt+H1A8LouMGI3GNOddg?=
=?iso-8859-1?Q?VLg9B8G+0/I1tnEvEw5YP32SDjCSIAzj1NEam57p5DE/OFuyupeebOMsYd?=
=?iso-8859-1?Q?zDe4IWPLerIIce1Zoor6Top1g6h8YLAhLXGWJWUMwxZwrdv4MYC+R/KpFy?=
=?iso-8859-1?Q?WGxPEnlr75Vgzzp7RrTWu1RkkbPUGbgUeXENMRYoI/h/aMpnShYhjp43r7?=
=?iso-8859-1?Q?NxvsPNQ0dk?=
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 5b3f0aaf-5a64-49d5-a908-08d93d25955b
X-MS-Exchange-CrossTenant-AuthSource: AM0P190MB0641.EURP190.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Jul 2021 06:49:48.0513 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HX84VUVfWSI/Cbhol7mDwGbtLnBrr3bNMUmzySm1HbKILErlG47gQesU3972xct7icKEij+q441gkXAraeamDKMUvvSvDVPz5lFA7Gi7ypk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9P190MB1569
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/saKI-aKFzzCPbmO2ldGqvVPVo2s>
Subject: Re: [sfc] Opsdir last call review of draft-ietf-sfc-nsh-integrity-05
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>,
<mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>,
<mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Jul 2021 06:49:57 -0000
Med, looks good, thanks for taking my comments into account. /js On Fri, Jul 02, 2021 at 05:10:10AM +0000, mohamed.boucadair@orange.com wrote: > Hi Jürgen, > > FYI, the changes are now implemented in the public version: > https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-nsh-integrity-06 > > Cheers, > Med > > > -----Message d'origine----- > > De : mohamed.boucadair@orange.com > > [mailto:mohamed.boucadair@orange.com] > > Envoyé : vendredi 25 juin 2021 11:56 > > À : Jürgen Schönwälder <j.schoenwaelder@jacobs-university.de>de>; ops- > > dir@ietf.org > > Cc : draft-ietf-sfc-nsh-integrity.all@ietf.org; last-call@ietf.org; > > sfc@ietf.org > > Objet : RE: Opsdir last call review of draft-ietf-sfc-nsh-integrity- > > 05 > > > > Hi Jürgen, > > > > Thank you for the review. You can track the changes at: > > https://tinyurl.com/nsh-integrity-latest > > > > Please see inline. > > > > Cheers, > > Med > > > > > -----Message d'origine----- > > > De : Jürgen Schönwälder via Datatracker [mailto:noreply@ietf.org] > > > Envoyé : vendredi 25 juin 2021 10:18 À : ops-dir@ietf.org Cc : > > > draft-ietf-sfc-nsh-integrity.all@ietf.org; last-call@ietf.org; > > > sfc@ietf.org Objet : Opsdir last call review of > > > draft-ietf-sfc-nsh-integrity-05 > > > > > > Reviewer: Jürgen Schönwälder > > > Review result: Has Issues > > > > > > The document is very well written and organized, thanks for that. > > I > > > have some comments and a few nits. The issues I have a minor, I > > think > > > the document overall is in a good shape. > > > > > > - From an operational perspective, I very much appreciate that > > there > > > is some text discussing error and failure reporting and that > > there > > > are some MTU configuration guidelines. > > > > > > - The document claims: > > > > > > As depicted in Table 1, SFFs are not involved in data > > encryption. > > > This document enforces this design approach by encrypting > > Context > > > Headers with keys that are not supplied to SFFs, thus > > enforcing > > > this > > > limitation by protocol (rather than requirements language). > > > > > > I am a bit puzzled about this statement since a protocol > > definition > > > at the end is just some form of requirements language. > > > > [Med] FWIW, that sentence was drawn compared to an alternative > > design we considered in the past (use of AEAD which relies upon a > > single key for both encryption and integrity) and for which we > > indicated the following at that time: > > > > In order to avoid the overhead of multiple authentication tags > > and > > multiple keys, and to prevent SFFs from acquiring the secret > > key > > to decrypt the metadata, the recommendation is not to > > integrity > > protect the base header. Such approach does not require to > > recompute the MAC each time TTL is decremented by an SFF. As > > a > > reminder, an SFF is not supposed to act on the metadata or > > look > > into the content of the metadata. > > > > We were concerned with relying on the requirement language (mainly > > the last sentence) for the correct protocol behavior. We changed the > > design so that the limitation is imposed by the protocol: use > > distinct keys for encryption (ENC_KEY) and integrity (MAC_KEY). > > > > We do have the following: > > > > The other advantage is > > that SFFs do not have access to the ENC_KEY and cannot act on the > > encrypted Context Headers and, only in case of the second level > > of > > assurance, SFFs do have access to the MAC_KEY. Similarly, an > > NSH- > > aware SF or SFC Proxy not allowed to decrypt the Context Headers > > will > > not have access to the ENC_KEY. > > > > but ... > > > > Well, > > > putting > > > that remark aside, I do not really see anything in the > > specification > > > that ensures that SFFs won't get the keys. We also read: > > > > > > [...] Encryption keying material is only provided to > > > these SFC data plane elements. > > > > > > Well, the specification is actually silent about how keys are > > > distributed. Section 4.4. says: > > > > > > The procedure for the allocation/provisioning of secret keys > > (K) > > > and > > > authenticated encryption algorithm or MAC_KEY and HMAC > > algorithm > > > is > > > outside the scope of this specification. As such, this > > > specification > > > does not mandate the support of any specific mechanism. > > > > > > To me, it seems the claims made in section 4.4. do not really > > hold. > > > > [Med] ... I agree that we still depend on the provisioning. Removed > > that sentence. > > > > > > > > - In section 6, you picked as the epoch 1970-01-01T00:00Z while > > NTP > > > uses the epoch 1900-01-01T00:00Z. This leads to rollovers in the > > > year 2106 for your timestamps while the NTP rollover would be in > > > 2036. Given that you use an NTP compatible format and a > > different > > > epoch, I think this deserves to be spelled out explicitly so > > that > > > people understand that they have to do conversions. > > > > > > (Alternatively, you could adopt the epoch NTP is using and the > > need > > > for conversions goes away at the price of an earlier rollover.) > > > > > > Anyway, what I am saying is that if you pick a different epoch, > > I > > > suggest to spell this out explicitly and to not rely on > > > implementers to discover this. > > > > > > > [Med] Fair point. Added a note. > > > > > Minor nits: > > > > > > - In section 5.2, it should say: > > > > > > OLD > > > > > > In reference to Figure 5 > > > > > > NEW > > > > > > In reference to Figure 7 > > > > > > > [Med] For both 5.1 and 5.2 we provide a reference to the figure with > > the format of the context header (i.e., Figure 5). Figures 6/7 cover > > the NSH header and so on. > > > > > - In section 7.3, I suggest this change to make it clear again to > > the > > > reader what K is: > > > > > > OLD > > > > > > Using K and > > > > > > NEW > > > > > > Using the secret key K and > > > > [Med] Fixed. Thanks. > > > > > > ____________________________________________________________________ > > _____________________________________________________ > > > > Ce message et ses pieces jointes peuvent contenir des informations > > confidentielles ou privilegiees et ne doivent donc pas etre > > diffuses, exploites ou copies sans autorisation. Si vous avez recu > > ce message par erreur, veuillez le signaler a l'expediteur et le > > detruire ainsi que les pieces jointes. Les messages electroniques > > etant susceptibles d'alteration, Orange decline toute responsabilite > > si ce message a ete altere, deforme ou falsifie. Merci. > > > > This message and its attachments may contain confidential or > > privileged information that may be protected by law; they should not > > be distributed, used or copied without authorisation. > > If you have received this email in error, please notify the sender > > and delete this message and its attachments. > > As emails may be altered, Orange is not liable for messages that > > have been modified, changed or falsified. > > Thank you. > > > _________________________________________________________________________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. > > This message and its attachments may contain confidential or privileged information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. > Thank you. > -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 <https://www.jacobs-university.de/>
- [sfc] Opsdir last call review of draft-ietf-sfc-n… Jürgen Schönwälder via Datatracker
- Re: [sfc] Opsdir last call review of draft-ietf-s… mohamed.boucadair
- Re: [sfc] Opsdir last call review of draft-ietf-s… mohamed.boucadair
- Re: [sfc] Opsdir last call review of draft-ietf-s… Juergen Schoenwaelder