Re: [Tsv-art] Tsvart last call review of draft-ietf-bfd-multipoint-16

Greg Mirsky <gregimirsky@gmail.com> Mon, 04 June 2018 20:36 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 651A1130DC0; Mon, 4 Jun 2018 13:36:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mJvA-hvokEBQ; Mon, 4 Jun 2018 13:36:51 -0700 (PDT)
Received: from mail-lf0-x22f.google.com (mail-lf0-x22f.google.com [IPv6:2a00:1450:4010:c07::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEE26130DE1; Mon, 4 Jun 2018 13:36:50 -0700 (PDT)
Received: by mail-lf0-x22f.google.com with SMTP id i83-v6so22606lfh.5; Mon, 04 Jun 2018 13:36:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=HZLmakq6BCQfnwRSCYAvFHI150/5UXepZM1wwBF5b7Y=; b=AqyU3uHQaJMuZu/tzzZPjtO5dsd9aqwQUnEp9t3gIagCYGaqkJ9hY3tHugwUfF2Ozc Pr9jRlUbVg3XP1hHItz18Yg3txoURLij8sZs06zWqFlgWRKECdfGtyX8ROvLM/wYPWjn cd+YmxiDv6iquDx7rSwbBhUK2cnf1mlO6tPC56b1hiPImuhoy+NEZ7nImPG2tdTZ1kwB Aob2zM+6YvKO2LrxT3xpTgrNSdTXfZpSshxnGdifpzgTPJQoGiX2i42uK3BNS0oH/vx2 DDE5kqvJc21V3gCpb2J2+o569YeyiFJQzpMN52+V2DozXa4GfXsef/BdBMZpvweFFuz8 l09A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=HZLmakq6BCQfnwRSCYAvFHI150/5UXepZM1wwBF5b7Y=; b=DQN8M9YGiWRYNfku/OG23PSKbwJtWzmnn7sjtYTd1hr4RkqCBHUlu6g9QA+29wPKyQ D5+DfUNb/xPvAvueH0NfbtHDmr0oBVeMKqufHNfLrtf+ql0kXMDhVjcGvEBbcnD8X3Yp j0q0AV7fbsBYu54C/Xg0mISGJEQ9pCvpwjx2+qRmwkLw4fEsW2mHPmwGs38ae3XsvIQ0 IOGolOPiSgodxehg9JPAQ9Z3J0W830X+elzZWxLNxgXNU59k7KXGVm6vKRKzl+RCMQId PtwanEDZMx6lHvH5EWUylunLE1nuXs137/mAM4aCyHepzdgKg9fI64ckb4EbT6H24MjL /c8A==
X-Gm-Message-State: ALKqPwfotlZ8ZYxhfMSKSWwL82dMrE9sGY3gQQ3isOLQ16F02oSMAfhM JM/Q6sYoZ+ySVOHDb0iJfdOXKsJH+IFxWgMGnWg=
X-Google-Smtp-Source: ADUXVKL5GG8TNTxq4t10DoFBXJH1dri+KvW7xe8AsGhJfhGynHMtZ9qAuAkcsNQ007rY2skDuN4pBCN6t4cxQ4hlbU0=
X-Received: by 2002:a2e:878f:: with SMTP id n15-v6mr9561091lji.69.1528144608909; Mon, 04 Jun 2018 13:36:48 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a2e:6e08:0:0:0:0:0 with HTTP; Mon, 4 Jun 2018 13:36:48 -0700 (PDT)
In-Reply-To: <CAKKJt-dpbeyw=0LvY_btG0bavAV1eq3DKJbuGoSX4u5dHLe0vw@mail.gmail.com>
References: <152694840016.8083.12174100605609215107@ietfa.amsl.com> <CA+RyBmVmsFxmiDTLLS5Jz+q_Fgb3O7QcsbMJwFUxbh-+9XxYWQ@mail.gmail.com> <1afa9af2-9fce-1588-ca09-cd39f1122688@bobbriscoe.net> <CAKKJt-dpbeyw=0LvY_btG0bavAV1eq3DKJbuGoSX4u5dHLe0vw@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Mon, 04 Jun 2018 13:36:48 -0700
Message-ID: <CA+RyBmXAakg8KT0AH5FWe473xYn7RxT5ShC1XOJzFDnM+X3mOw@mail.gmail.com>
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Cc: Bob Briscoe <ietf@bobbriscoe.net>, draft-ietf-bfd-multipoint.all@ietf.org, tsv-art@ietf.org, rtg-bfd@ietf.org, IETF list <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000945c3a056dd6e473"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/tok8MOVwNcP2aZ4EsImkjMAhYcA>
Subject: Re: [Tsv-art] Tsvart last call review of draft-ietf-bfd-multipoint-16
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jun 2018 20:36:54 -0000

Hi Spencer,
many thanks for the most helpful suggestion. I will use it with a minor
modification:

s/multipath/multipoint/.


Regards,
Greg

On Tue, May 29, 2018 at 10:05 AM, Spencer Dawkins at IETF <
spencerdawkins.ietf@gmail.com> wrote:

> Mirja and I do read these reviews, but don't usually comment on them while
> the authors and reviewers are still chatting. But, on one point ...
>
> On Tue, May 29, 2018 at 5:23 AM Bob Briscoe <ietf@bobbriscoe.net> wrote:
>
>> Greg,
>>
>> On 26/05/18 20:49, Greg Mirsky wrote:
>>
>
> [snip]
>
>> NEW TEXT:
>>
>>    Use of shared keys to authenticate BFD Control packet in multipoint
>>    scenarios is limited because tail can spoof the head from the
>>    viewpoint of the other tails.  Thus, if shared keys are used, all
>>    tails MUST be trusted not to spoof the head.
>>
>> [BB]: Normally a MUST is applied to implementations. It would be rather
>> odd to require users/operators to satisfy a spec requirement, particularly
>> requiring them to trust each other. I think this should be written as an
>> applicability statement not a normative requirement.
>>
>
> Bob is formally correct here, but it may be useful for me to say that I do
> see "requirements" language used to provide guidance about security and
> about operational considerations (as here).
>
> If I understand Bob's suggestion to be something like
>
> NEW
>
>    Shared keys in multipath scenarios allow any tail to spoof
>    the head from the viewpoint of any other tail. For this reason,
>    using shared keys to authenticate BFD Control packets in multipoint
>    scenarios is a significant security exposure unless all tails can
>    be trusted not to spoof the head.
>
> that would also work.
>
> "Do the right thing", of course.
>
> Spencer
>
>
>