Re: [tsvwg] DTLS 1.3 over SCTP

Michael Tuexen <Michael.Tuexen@lurchi.franken.de> Wed, 19 July 2023 09:57 UTC

Return-Path: <Michael.Tuexen@lurchi.franken.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC1DAC14CE45 for <tsvwg@ietfa.amsl.com>; Wed, 19 Jul 2023 02:57:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.898
X-Spam-Level:
X-Spam-Status: No, score=-6.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dcGPIL_AwC0K for <tsvwg@ietfa.amsl.com>; Wed, 19 Jul 2023 02:57:52 -0700 (PDT)
Received: from drew.franken.de (mail-n.franken.de [193.175.24.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17AE6C15107F for <tsvwg@ietf.org>; Wed, 19 Jul 2023 02:57:50 -0700 (PDT)
Received: from smtpclient.apple (unknown [IPv6:2a00:20:704c:4016:9db5:c202:3f8c:b14f]) (Authenticated sender: lurchi) by mail-n.franken.de (Postfix) with ESMTPSA id 9DE9782CBC323; Wed, 19 Jul 2023 11:57:38 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.600.7\))
From: Michael Tuexen <Michael.Tuexen@lurchi.franken.de>
In-Reply-To: <DU0PR07MB8970D921C1E8ABCFDC4708809538A@DU0PR07MB8970.eurprd07.prod.outlook.com>
Date: Wed, 19 Jul 2023 11:57:37 +0200
Cc: tsvwg IETF list <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <09D661BA-88E1-4D04-AC48-EF1A67611434@lurchi.franken.de>
References: <0C990143-D450-4288-9390-E06D3469FF1D@lurchi.franken.de> <DU0PR07MB8970107616BF8A5E9D05AF939534A@DU0PR07MB8970.eurprd07.prod.outlook.com> <25FD6896-90BA-4298-A5BE-DDD869A71C37@lurchi.franken.de> <DU0PR07MB897089C304314A47B606EB82953BA@DU0PR07MB8970.eurprd07.prod.outlook.com> <6D224418-07D8-467E-A67D-A40B223207EB@lurchi.franken.de> <DU0PR07MB89707C2F5AB007DFE223408E953BA@DU0PR07MB8970.eurprd07.prod.outlook.com> <67272CCD-05F0-4A33-86F6-F1409EC57553@lurchi.franken.de> <DU0PR07MB8970BFB3F0428E800AD946DA9538A@DU0PR07MB8970.eurprd07.prod.outlook.com> <77ADFC10-34B8-4A08-88FF-AA097548CF08@lurchi.franken.de> <DU0PR07MB8970D921C1E8ABCFDC4708809538A@DU0PR07MB8970.eurprd07.prod.outlook.com>
To: Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3731.600.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/bfR2rLBG0fbxgOZskSvCVWE3WUM>
Subject: Re: [tsvwg] DTLS 1.3 over SCTP
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2023 09:57:56 -0000

> On 18. Jul 2023, at 16:58, Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org> wrote:
> 
> Hi,
> 
> > MW: Sorry, I think you need expand on your reasoning here. We are working on an integration of a security solution with a transport protocol. This requires combing the security mechanism with the transport protocol such that both the desired security properties and the transport protocol functionality is fulfilled. In this case 3GPP’s applications using SCTP are such that we have security requirements that exists in other works like IPsec but haven’t been in the forefront in other work such as QUIC, HTTP and DTLS.   
> 
> My point was that the usage policies are not limited to SCTP, but to a use of (D)TLS on long living connections.
> This is not related to a specific transport protocol.
> MW: Yes, I think it would be good look into addressing this within TLS, but I don’t see that being resolved in a time frame that makes it possible to delivery anything to 3GPP within the current release, maybe not even the next. So I don’t see this being the solution in the near time. It might be a solution for the future if needed.
Unfortunately I'm not aware with 3GPP timing. Could you state that in years or so? Also do
these milestones refer to the time when specifications should be ready or implementations
should be ready?
>  
> Repeating a question: Why can't we use SCTP over DTLS? It supports arbitrary large messages, you can control the DTLS properties.
> The only thing missing (from what I see) is the support of multihoming and dynamic reconfiguration. That isn't that hard.
> Then you can use multiple DTLS connections to get multihoming and change them over time to get the properties of renegotiation
> back. It would even run over UDP allowing legacy NAT traversal.
> 
> So there are multiple reasons for this that I so far thought about:
>     • Multihoming support which may require a coordination layer for handling the multiple DTLS connections. Multihoming is in use by some that deploy SCTP for the relevant 3GPP solutions. There appear to be some complex protocol interactions here when it comes to path handling. Basically each path would need its own DTLS connection, and you need machinery to establish it and how it interacts with the SCTP stack. For example these DTLS connections need to exist per tuple pairs, not only SCTP notation of path of destinations. 
I agree that you need multiple DTLS connections when using multihoming. I don't see the point regarding tuple pairs.
That is up to the configuration.
>     • It will require a completely different change to 3GPP, which might be possible, but it comes to agree to IP/UDP/DTLS/SCTP and the configuration of that rather than how SCTP is configured. These applications are interoperability points, which requires not only a solution for configuring, but also to figure out which of the multiple solutions one would run. This compared to DTLS for SCTP that would be negotiated in-band and possibly compared against policy configuration.
I don't understand this. I thought that the IETF has to come up with a solution fulfilling
the requirements of 3GPP and then 3GPP will specify interfaces based on this. So why is
negotiation necessary? Why are there multiple protocol stacks being used?

>     • There would still be a need for a solution for replacing the DTLS connections that encapsulate the SCTP packets. The re-authentication and rekeying problem would not be solved.
It does solve this. You can bring up and down DTLS connections as you want. Dynamic address reconfiguration
will take care of this.

Best regards
Michael
> It is interesting question but which appears to have its set of challenges. I will continue to pursue a DTLS for SCTP solution based on either of the two proposals we have put on the table that do fulfill the 3GPP requirements.
> Cheers
> Magnus