Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)

mohamed.boucadair@orange.com Thu, 15 July 2021 15:32 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01BEB3A0D35; Thu, 15 Jul 2021 08:32:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.798
X-Spam-Level:
X-Spam-Status: No, score=-2.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IRztOjvqxn86; Thu, 15 Jul 2021 08:32:15 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B3153A0D2F; Thu, 15 Jul 2021 08:32:15 -0700 (PDT)
Received: from opfednr03.francetelecom.fr (unknown [xx.xx.xx.67]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr26.francetelecom.fr (ESMTP service) with ESMTPS id 4GQdf50nYbzywy; Thu, 15 Jul 2021 17:32:13 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1626363133; bh=2az5uWyGKxgKfWuoz1MK8XUuLKXTP8pfp+bAfeT0PbU=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=OSZZNXuMsOSV8J538NLz7hw+mAXR6N0VJwrkE0yhx0fCidfNHp0kNhNQd+OaDHWTD Ara8B72GzddMsUKgsMc+jhUSq8z+WxufCpKCA2RAP05Kks4mtFpufPYGfDq6DUD4Fr UPnGjnUWv/PziYulOXqsiBRUZyAujaftn/l43vDOJrk/NWjP2AjAxR0w2nl2X8KZ+v mrZyAGKFF24vRNIRpX1vaGNvKLOkqGIQFFZk6W8nj/4byIa7zKYPs6qvzL8bGhAm5k yyAk+QFz3YFhBaFGKuGeagSantN/VCHnSOUY17G54ee3kR5t5xkDSbrVkCBEajuI+A V2d5DVy0ONnfg==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfednr03.francetelecom.fr (ESMTP service) with ESMTPS id 4GQdf464pCzDq7V; Thu, 15 Jul 2021 17:32:12 +0200 (CEST)
From: mohamed.boucadair@orange.com
To: "Murray S. Kucherawy" <superuser@gmail.com>, Joel Halpern Direct <jmh.direct@joelhalpern.com>
CC: Alvaro Retana <aretana.ietf@gmail.com>, The IESG <iesg@ietf.org>, Greg Mirsky <gregimirsky@gmail.com>, "draft-ietf-sfc-nsh-integrity@ietf.org" <draft-ietf-sfc-nsh-integrity@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>
Thread-Topic: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)
Thread-Index: AQHXeYy13mq47xriWUaqlKnv0XS0nqtEKCkg
Date: Thu, 15 Jul 2021 15:32:11 +0000
Message-ID: <31750_1626363132_60F054FC_31750_329_1_787AE7BB302AE849A7480A190F8B9330353BF9E9@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <162611498183.7775.3562397379733537345@ietfa.amsl.com> <f5961690-4496-7f85-74ca-f3705d5a1c2e@joelhalpern.com> <CAMMESszF+jc7WKkAwmzAFs0A7bsDqXJKA3p5+cyexdU3fvNnDQ@mail.gmail.com> <1a5ae768-bf12-6d94-819c-7923e1f816ee@joelhalpern.com> <CAL0qLwbb4L5LrtMNokzkWTag+oZTs6hFbBtbfCnthO-m_cpfiA@mail.gmail.com> <758d4dcf-5cdb-e493-a6bc-554024be6b62@joelhalpern.com> <CAL0qLwaH0L=gmbRj6n6okwvNjTdQYHJKvOZ2+6j+s7eHoqgaUA@mail.gmail.com>
In-Reply-To: <CAL0qLwaH0L=gmbRj6n6okwvNjTdQYHJKvOZ2+6j+s7eHoqgaUA@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B9330353BF9E9OPEXCAUBMA2corp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/xGZKmVCqke5hewJWokz5_icMkYE>
Subject: Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jul 2021 15:32:21 -0000

Re-,

Please see inline.

Cheers,
Med

De : Murray S. Kucherawy [mailto:superuser@gmail.com]
Envoyé : jeudi 15 juillet 2021 17:18
À : Joel Halpern Direct <jmh.direct@joelhalpern.com>
Cc : Alvaro Retana <aretana.ietf@gmail.com>; The IESG <iesg@ietf.org>; Greg Mirsky <gregimirsky@gmail.com>; draft-ietf-sfc-nsh-integrity@ietf.org; Service Function Chaining IETF list <sfc@ietf.org>
Objet : Re: [sfc] Alvaro Retana's No Objection on draft-ietf-sfc-nsh-integrity-06: (with COMMENT)

On Thu, Jul 15, 2021 at 7:47 AM Joel Halpern Direct <jmh.direct@joelhalpern.com<mailto:jmh.direct@joelhalpern.com>> wrote:
Given that the WG intent was that this be an optional extension, can you
please suggest how we clarify that?

It's obvious from this discussion that that was the WG intent, but is it also your view that this WG intent was made clear in the document?  That was certainly not my impression, and I infer from the number of ballot comments that that's not a singular view, though certainly that might be more obvious to someone directly involved in this space.

How about this, or something like it, in your Abstract:
CURRENT:

   This specification adds integrity protection directly to the Network

   Service Header (NSH) used for Service Function Chaining (SFC).  Also,

   this specification allows to encrypt sensitive metadata that is

   carried in the NSH.

NEW 1:
   This specification adds optional integrity protection directly to the Network

   Service Header (NSH) used for Service Function Chaining (SFC).  Also,

   this specification allows to encrypt sensitive metadata that is

   carried in the NSH.

NEW 2:
   This specification presents an optional method to add
   integrity protection directly to the Network

   Service Header (NSH) used for Service Function Chaining (SFC).



[Med] I like this one. Thanks.



  Also,

   this specification allows to encrypt sensitive metadata that is

   carried in the NSH.

...and in Section 1:

CURRENT:
   This specification fills that gap.  Concretely, this document adds

   integrity protection and optional encryption of sensitive metadata

   directly to the NSH [...]

[Med] For this one, I think this is already covered by the text proposed to Alvaro. The NEW text can be seen at: https://tinyurl.com/nsh-integrity-latest
   This specification fills that gap for SFC (that is, define the "NSH
   Variable Header-Based Integrity" option mentioned in Section 8.2.1 of
                                    ^^^^^^
   [RFC8300]).



NEW:
   This specification presents an optional extension that fills that gap.
   Concretely, this document adds optional

   integrity protection and encryption of sensitive metadata

   directly to the NSH [...]

-MSK

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.