Re: [tcpm] [Last-Call] Last Call: <draft-ietf-tcpm-ao-test-vectors-04.txt> (TCP-AO Test Vectors) to Informational RFC

"touch@strayalpha.com" <touch@strayalpha.com> Wed, 19 January 2022 16:30 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7319A3A12B9; Wed, 19 Jan 2022 08:30:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.318
X-Spam-Level:
X-Spam-Status: No, score=-6.318 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LOf2oZ45Acua; Wed, 19 Jan 2022 08:30:37 -0800 (PST)
Received: from server217-1.web-hosting.com (server217-1.web-hosting.com [198.54.114.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10EE63A12B5; Wed, 19 Jan 2022 08:30:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=ytO0uF0FNAuHQw+v7LhAYep10vX1agZO8F66Fi4zCw8=; b=0TA3eKevbY5Dop+oldnAfKxAQs 2xb+diEkG8rBPLfH0GrSAiTR1PnMVe6t2m1no2FITNQzePuiC6BinS8RtKhSp3EIqPXwUBywEDtnl W/SeSFjIP1FjOZGXQRniF+6BJOPIqoW4CUHryZumMG2sKimEeTrtsxti60S+LnJ0/iKG7BIUhLgdA o0beTCMvNeCZyLo5yctRYwb5zwIAPTj+VgQy99jko7tcGJaIZGrjHz/EX4KQa+STMLFBh1XaWdx6Y wAry12lB666t3xt+8VcELBTiSItqMlNO96z92XUpA8xqGn/ngfZLUkb9ljmPNbj71jkH+wFJn0Fkg py5lc4ig==;
Received: from cpe-172-114-237-88.socal.res.rr.com ([172.114.237.88]:60763 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <touch@strayalpha.com>) id 1nADqx-00AjzT-CK; Wed, 19 Jan 2022 11:30:36 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_804991E4-7B81-4140-88C5-E5B0B1ADAF37"
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.40.0.1.81\))
From: "touch@strayalpha.com" <touch@strayalpha.com>
In-Reply-To: <5270D4B5-4E42-4A40-9DC2-7ADEDB8D25CE@vigilsec.com>
Date: Wed, 19 Jan 2022 08:30:26 -0800
Cc: Last Call <last-call@ietf.org>, tcpm IETF list <tcpm@ietf.org>, draft-ietf-tcpm-ao-test-vectors@ietf.org, tcpm-chairs@ietf.org
Message-Id: <3C8B9681-9195-47AF-B309-8A02A4421463@strayalpha.com>
References: <164253655880.26635.5149440454996391703@ietfa.amsl.com> <5270D4B5-4E42-4A40-9DC2-7ADEDB8D25CE@vigilsec.com>
To: Russ Housley <housley@vigilsec.com>
X-Mailer: Apple Mail (2.3693.40.0.1.81)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/1WqAlmaxHk1N3ltuPpvjNR9SzsU>
Subject: Re: [tcpm] [Last-Call] Last Call: <draft-ietf-tcpm-ao-test-vectors-04.txt> (TCP-AO Test Vectors) to Informational RFC
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jan 2022 16:30:42 -0000

Hi, Russ,

Point taken; we were a bit to colloquial in referring to SHA1 and AES rather than the specific versions form the origin RFCs. That will be updated after I see what other LC comments roll in.

Joe

—
Joe Touch, temporal epistemologist
www.strayalpha.com

> On Jan 18, 2022, at 1:16 PM, Russ Housley <housley@vigilsec.com> wrote:
> 
> 
> The introduction of the document begins:
> 
>   This document provides test vectors to validate the correct
>   implementation of the TCP Authentication Option (TCP-AO) [RFC5925]
>   and its mandatory cryptographic algorithms defined in [RFC5926].
> 
> I expected to see discussion of the algorithms that are in the table of contents in RFC 5926.  However, these algorithm names are not used.  Using different algorithm name add confusion.
> 
> For the Key Derivation Functions (KDFs), please use the names in RFC 5926: KDF_HMAC_SHA1and KDF_AES_128_CMAC.
> 
> For the MAC Algorithms, please use the names in RFC 5926: HMAC-SHA-1-96 and AES-128-CMAC-96.
> 
> Thank for you consideration,
>  Russ
> 
> 
>> On Jan 18, 2022, at 3:09 PM, The IESG <iesg-secretary@ietf.org> wrote:
>> 
>> 
>> The IESG has received a request from the TCP Maintenance and Minor Extensions
>> WG (tcpm) to consider the following document: - 'TCP-AO Test Vectors'
>> <draft-ietf-tcpm-ao-test-vectors-04.txt> as Informational RFC
>> 
>> The IESG plans to make a decision in the next few weeks, and solicits final
>> comments on this action. Please send substantive comments to the
>> last-call@ietf.org mailing lists by 2022-02-01. Exceptionally, comments may
>> be sent to iesg@ietf.org instead. In either case, please retain the beginning
>> of the Subject line to allow automated sorting.
>> 
>> Abstract
>> 
>> 
>>  This document provides test vectors to validate implementations of
>>  the two mandatory authentication algorithms specified for the TCP
>>  Authentication Option over both IPv4 and IPv6. This includes
>>  validation of the key derivation function (KDF) based on a set of
>>  test connection parameters as well as validation of the message
>>  authentication code (MAC). Vectors are provided for both currently
>>  required pairs of KDF and MAC algorithms: one based on SHA-1 and the
>>  other on AES-128. The vectors also validate both whole TCP segments
>>  as well as segments whose options are excluded for middlebox
>>  traversal.
> 
> -- 
> last-call mailing list
> last-call@ietf.org
> https://www.ietf.org/mailman/listinfo/last-call