Re: [tcpm] [Last-Call] Last Call: <draft-ietf-tcpm-ao-test-vectors-04.txt> (TCP-AO Test Vectors) to Informational RFC

"touch@strayalpha.com" <touch@strayalpha.com> Sat, 22 January 2022 06:05 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC5383A23BC; Fri, 21 Jan 2022 22:05:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.317
X-Spam-Level:
X-Spam-Status: No, score=-1.317 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bBdCCC94cItl; Fri, 21 Jan 2022 22:05:49 -0800 (PST)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07B8B3A23B9; Fri, 21 Jan 2022 22:05:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=LsBgpvo1F/DTMVrVwO/gQnPI1vJ7/CdmxIyVKK5rdJU=; b=Z/+xKD5siIId38M2NIphAjNy0t roxnSKtkimnYchdLiazYXzdGG0I/QK+PNRSrnDOfy2QMZbUoQattfXrEBKPcbAg4ncSQOI9Kj0b6q CPnZU8+jR24kbepolgp3jJHjee+3ODH8OruNKcNbOyCO7hli5y9Aq9uhEu+bvQ2YYrrg5p1cKDb9E sk5SNDLe3QkidY2AdLw+IRqzX2PodQ8mw7Dy9QIWxtgjKmBdIffSNLdy3o/fYSOyaq/I6vzpBBIW+ ANT2W5phGq1P/WyZak75k/6nnvASECI64/XDwFLMY6IBQMWtbSFKpshR/3in5jyfg9mIw+XflJXUf djJI7/Bg==;
Received: from cpe-172-114-237-88.socal.res.rr.com ([172.114.237.88]:49500 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <touch@strayalpha.com>) id 1nB9Wy-009qZx-5J; Sat, 22 Jan 2022 01:05:48 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_93B50C91-8EA2-48EE-AEDB-8C741B396D8D"
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.40.0.1.81\))
From: "touch@strayalpha.com" <touch@strayalpha.com>
In-Reply-To: <3C8B9681-9195-47AF-B309-8A02A4421463@strayalpha.com>
Date: Fri, 21 Jan 2022 22:05:43 -0800
Cc: Last Call <last-call@ietf.org>, tcpm IETF list <tcpm@ietf.org>, draft-ietf-tcpm-ao-test-vectors@ietf.org, tcpm-chairs@ietf.org
Message-Id: <CD44CEBE-988B-42FB-9157-2E753CD18BD9@strayalpha.com>
References: <164253655880.26635.5149440454996391703@ietfa.amsl.com> <5270D4B5-4E42-4A40-9DC2-7ADEDB8D25CE@vigilsec.com> <3C8B9681-9195-47AF-B309-8A02A4421463@strayalpha.com>
To: Russ Housley <housley@vigilsec.com>
X-Mailer: Apple Mail (2.3693.40.0.1.81)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/kuXXtjywWL7GB_zbzdaKLcjSUpg>
Subject: Re: [tcpm] [Last-Call] Last Call: <draft-ietf-tcpm-ao-test-vectors-04.txt> (TCP-AO Test Vectors) to Informational RFC
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Jan 2022 06:05:54 -0000

PS - update just posted.

Further comments should reference v. 05 if possible.

Joe
—
Joe Touch, temporal epistemologist
www.strayalpha.com

> On Jan 19, 2022, at 8:30 AM, touch@strayalpha.com wrote:
> 
> Hi, Russ,
> 
> Point taken; we were a bit to colloquial in referring to SHA1 and AES rather than the specific versions form the origin RFCs. That will be updated after I see what other LC comments roll in.
> 
> Joe
> 
> —
> Joe Touch, temporal epistemologist
> www.strayalpha.com <http://www.strayalpha.com/>
> 
>> On Jan 18, 2022, at 1:16 PM, Russ Housley <housley@vigilsec.com <mailto:housley@vigilsec.com>> wrote:
>> 
>> 
>> The introduction of the document begins:
>> 
>>   This document provides test vectors to validate the correct
>>   implementation of the TCP Authentication Option (TCP-AO) [RFC5925]
>>   and its mandatory cryptographic algorithms defined in [RFC5926].
>> 
>> I expected to see discussion of the algorithms that are in the table of contents in RFC 5926.  However, these algorithm names are not used.  Using different algorithm name add confusion.
>> 
>> For the Key Derivation Functions (KDFs), please use the names in RFC 5926: KDF_HMAC_SHA1and KDF_AES_128_CMAC.
>> 
>> For the MAC Algorithms, please use the names in RFC 5926: HMAC-SHA-1-96 and AES-128-CMAC-96.
>> 
>> Thank for you consideration,
>>  Russ
>> 
>> 
>>> On Jan 18, 2022, at 3:09 PM, The IESG <iesg-secretary@ietf.org <mailto:iesg-secretary@ietf.org>> wrote:
>>> 
>>> 
>>> The IESG has received a request from the TCP Maintenance and Minor Extensions
>>> WG (tcpm) to consider the following document: - 'TCP-AO Test Vectors'
>>> <draft-ietf-tcpm-ao-test-vectors-04.txt> as Informational RFC
>>> 
>>> The IESG plans to make a decision in the next few weeks, and solicits final
>>> comments on this action. Please send substantive comments to the
>>> last-call@ietf.org <mailto:last-call@ietf.org> mailing lists by 2022-02-01. Exceptionally, comments may
>>> be sent to iesg@ietf.org <mailto:iesg@ietf.org> instead. In either case, please retain the beginning
>>> of the Subject line to allow automated sorting.
>>> 
>>> Abstract
>>> 
>>> 
>>>  This document provides test vectors to validate implementations of
>>>  the two mandatory authentication algorithms specified for the TCP
>>>  Authentication Option over both IPv4 and IPv6. This includes
>>>  validation of the key derivation function (KDF) based on a set of
>>>  test connection parameters as well as validation of the message
>>>  authentication code (MAC). Vectors are provided for both currently
>>>  required pairs of KDF and MAC algorithms: one based on SHA-1 and the
>>>  other on AES-128. The vectors also validate both whole TCP segments
>>>  as well as segments whose options are excluded for middlebox
>>>  traversal.
>> 
>> -- 
>> last-call mailing list
>> last-call@ietf.org <mailto:last-call@ietf.org>
>> https://www.ietf.org/mailman/listinfo/last-call
>