Re: [tsvwg] DTLS 1.3 over SCTP
Michael Tuexen <michael.tuexen@lurchi.franken.de> Thu, 20 July 2023 10:08 UTC
Return-Path: <michael.tuexen@lurchi.franken.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3254C15107B for <tsvwg@ietfa.amsl.com>; Thu, 20 Jul 2023 03:08:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MJ7mXD1lYC_b for <tsvwg@ietfa.amsl.com>; Thu, 20 Jul 2023 03:08:12 -0700 (PDT)
Received: from drew.franken.de (mail-n.franken.de [193.175.24.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00950C14CF13 for <tsvwg@ietf.org>; Thu, 20 Jul 2023 03:08:09 -0700 (PDT)
Received: from smtpclient.apple (unknown [IPv6:2a02:8109:1140:c3d:cc18:5b80:7f4b:c6bf]) (Authenticated sender: lurchi) by mail-n.franken.de (Postfix) with ESMTPSA id 30A5E772BEC2B; Thu, 20 Jul 2023 12:08:07 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.600.7\))
From: Michael Tuexen <michael.tuexen@lurchi.franken.de>
In-Reply-To: <DU0PR07MB89709FCAFC87C38CA3E4DE01953EA@DU0PR07MB8970.eurprd07.prod.outlook.com>
Date: Thu, 20 Jul 2023 12:08:06 +0200
Cc: tsvwg IETF list <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <EAEEDC36-1F64-4EC4-9853-2DC287B0E03A@lurchi.franken.de>
References: <0C990143-D450-4288-9390-E06D3469FF1D@lurchi.franken.de> <DU0PR07MB8970107616BF8A5E9D05AF939534A@DU0PR07MB8970.eurprd07.prod.outlook.com> <25FD6896-90BA-4298-A5BE-DDD869A71C37@lurchi.franken.de> <DU0PR07MB897089C304314A47B606EB82953BA@DU0PR07MB8970.eurprd07.prod.outlook.com> <6D224418-07D8-467E-A67D-A40B223207EB@lurchi.franken.de> <DU0PR07MB89707C2F5AB007DFE223408E953BA@DU0PR07MB8970.eurprd07.prod.outlook.com> <67272CCD-05F0-4A33-86F6-F1409EC57553@lurchi.franken.de> <DU0PR07MB8970BFB3F0428E800AD946DA9538A@DU0PR07MB8970.eurprd07.prod.outlook.com> <77ADFC10-34B8-4A08-88FF-AA097548CF08@lurchi.franken.de> <DU0PR07MB8970D921C1E8ABCFDC4708809538A@DU0PR07MB8970.eurprd07.prod.outlook.com> <09D661BA-88E1-4D04-AC48-EF1A67611434@lurchi.franken.de> <DU0PR07MB89709FCAFC87C38CA3E4DE01953EA@DU0PR07MB8970.eurprd07.prod.outlook.com>
To: Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3731.600.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/6t9fRa13tPf18KREpDpf7MFjvGw>
Subject: Re: [tsvwg] DTLS 1.3 over SCTP
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2023 10:08:14 -0000
> On 20. Jul 2023, at 11:44, Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org> wrote: > > Hi Michael, > Please see inline. > From: Michael Tuexen <Michael.Tuexen@lurchi.franken.de> > Date: Wednesday, 19 July 2023 at 11:58 > To: Magnus Westerlund <magnus.westerlund@ericsson.com> > Cc: tsvwg IETF list <tsvwg@ietf.org> > Subject: Re: [tsvwg] DTLS 1.3 over SCTP > > On 18. Jul 2023, at 16:58, Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org> wrote: > > > > Hi, > > > > > MW: Sorry, I think you need expand on your reasoning here. We are working on an integration of a security solution with a transport protocol. This requires combing the security mechanism with the transport protocol such that both the desired security properties and the transport protocol functionality is fulfilled. In this case 3GPP’s applications using SCTP are such that we have security requirements that exists in other works like IPsec but haven’t been in the forefront in other work such as QUIC, HTTP and DTLS. > > > > My point was that the usage policies are not limited to SCTP, but to a use of (D)TLS on long living connections. > > This is not related to a specific transport protocol. > > MW: Yes, I think it would be good look into addressing this within TLS, but I don’t see that being resolved in a time frame that makes it possible to delivery anything to 3GPP within the current release, maybe not even the next. So I don’t see this being the solution in the near time. It might be a solution for the future if needed. > > Unfortunately I'm not aware with 3GPP timing. Could you state that in years or so? Also do > these milestones refer to the time when specifications should be ready or implementations > should be ready? > MW: So Rel 18 stage 3 closes at the end of this year. (Stage 3 is detailed technical specification.) If we have a draft for SCTP in DTLS that meets 3GPP requirements and are far along in the process it can be adopted into a specification as place holder, and then be updated in later change request (CR) to the final RFC number later. This to indicate that this is what you need to implement towards. However, as this is a critical bug fix that will likely affect the older specifications all the way back to Rel 15, which is when RFC 6083 was introduced into 3GPP TS 33.501 it can be done at any time. But we want to get this done as soon as possible as not having a solution delays the implementation and deployment of this security feature. OK, thanks for the clarification. Since Rel 15 sounds older than Rel 18, does this mean that RFC 6083 is deployed? Are you aware of any implementations? > > > > Repeating a question: Why can't we use SCTP over DTLS? It supports arbitrary large messages, you can control the DTLS properties. > > The only thing missing (from what I see) is the support of multihoming and dynamic reconfiguration. That isn't that hard. > > Then you can use multiple DTLS connections to get multihoming and change them over time to get the properties of renegotiation > > back. It would even run over UDP allowing legacy NAT traversal. > > > > So there are multiple reasons for this that I so far thought about: > > • Multihoming support which may require a coordination layer for handling the multiple DTLS connections. Multihoming is in use by some that deploy SCTP for the relevant 3GPP solutions. There appear to be some complex protocol interactions here when it comes to path handling. Basically each path would need its own DTLS connection, and you need machinery to establish it and how it interacts with the SCTP stack. For example these DTLS connections need to exist per tuple pairs, not only SCTP notation of path of destinations. > > I agree that you need multiple DTLS connections when using multihoming. I don't see the point regarding tuple pairs. > That is up to the configuration. > MW: So this is a critique against the SCTP spec that I have, in that it actually don’t track paths as defined by source and destination, it only tracks destination. For a DTLS connection to function well and avoid any reordering issue, I strongly believe that one needs one DTLS connection per source + destination pair. Our implementation do track paths in this way, but if it required to define a usage of DTLS you are lacking a term in the SCTP spec to reference for what it is. When running SCTP over DTLS, SCTP doesn't see the IP addresses anymore. You can establish any number of DTLS connections, like a full mesh, and SCTP would just use them. At least in the way SCTP over DTLS is implemented in the userland stack of the BSD stack. > > • It will require a completely different change to 3GPP, which might be possible, but it comes to agree to IP/UDP/DTLS/SCTP and the configuration of that rather than how SCTP is configured. These applications are interoperability points, which requires not only a solution for configuring, but also to figure out which of the multiple solutions one would run. This compared to DTLS for SCTP that would be negotiated in-band and possibly compared against policy configuration. > > I don't understand this. I thought that the IETF has to come up with a solution fulfilling > the requirements of 3GPP and then 3GPP will specify interfaces based on this. So why is > negotiation necessary? Why are there multiple protocol stacks being used? > MW: The issue is that 3GPP already have defined the interfaces, these are interfaces that in some cases have existed a long time. Thus, you need an easy upgrade path from what existed before and what you are going to use. One reasons RFC 6083 was chosen was that you easily could start using it in some nodes and have those that have been upgraded negotiate usage of DTLS when it was possible. Then when you have upgraded a set of nodes and see that it works then you apply to policy that it shall be required to use DTLS among those nodes. Thus RFC 6083 didn’t have widespread impact on the management system in 3GPP. Your proposal for running DTLS under SCTP will create need for other mechanism and thus have more widespread impact on the system when it comes to deploying this. You would need some happy eyeballing approach... > I should also point out that many of the SCTP using interfaces are what we usually refer to as multi-vendor interfaces, i.e. interfaces where one expects that implementations from Ericsson, Nokia, Huawei, Samsung etc will need to communicate and interop. Deploying changes to intra vendor interfaces, i.e. interfaces where an Ericsson implementation would talk to an Ericsson implementation are simpler. There can then also be vendor specific configuration options to handle cases like this. OK. > > > • There would still be a need for a solution for replacing the DTLS connections that encapsulate the SCTP packets. The re-authentication and rekeying problem would not be solved. > It does solve this. You can bring up and down DTLS connections as you want. Dynamic address reconfiguration > will take care of this. > MW: Well, that is if you support dynamic address reconfiguration. Which to my understanding there are no requirement to support for 3GPP implementation. Thus, it is yet another thing that would need to be changed in the 3GPP system. To summarize for us as a vendor an issue is that DTLS under SCTP has much That is true. However, it is a very old extension. Open Source implementations support this, although it is not enabled when used in a Telco environment. Not sure about proprietary implementations. Best regards Michael > more wide spread impact on more nodes and functions in the system than just the SCTP using interface nodes. Cheers > Magnus
- [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Claudio Porfiri
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Claudio Porfiri
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Claudio Porfiri
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Claudio Porfiri
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Magnus Westerlund
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Magnus Westerlund
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Magnus Westerlund
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Magnus Westerlund
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Magnus Westerlund
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen
- Re: [tsvwg] DTLS 1.3 over SCTP Magnus Westerlund
- Re: [tsvwg] DTLS 1.3 over SCTP Michael Tuexen