Re: [tsvwg] New Version Notification for draft-nagesh-sctp-auth-4895bis-00.txt

Maksim Proshin <maksim.proshin@mera.com> Sat, 16 November 2019 14:50 UTC

Return-Path: <maksim.proshin@mera.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 35266120164 for <tsvwg@ietfa.amsl.com>; Sat, 16 Nov 2019 06:50:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XxDjKkd9u12O for <tsvwg@ietfa.amsl.com>; Sat, 16 Nov 2019 06:50:34 -0800 (PST)
Received: from mail.mera.com (mail.mera.com [188.40.162.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AA0412012D for <tsvwg@ietf.org>; Sat, 16 Nov 2019 06:50:34 -0800 (PST)
Received: from mera-exch2.mera.com ([188.130.168.212] helo=mera-exch.mera.com) by mail.mera.com with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (envelope-from <maksim.proshin@mera.com>) id 1iVz1P-0001pE-84; Sat, 16 Nov 2019 14:25:55 +0000
Received: from mera-exch3.mera.com (2001:67c:2344:100::23) by mera-exch2.mera.com (2001:67c:2344:100::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1591.10; Sat, 16 Nov 2019 17:25:53 +0300
Received: from mera-exch3.mera.com ([fe80::14f2:6b98:ed28:64d3]) by mera-exch3.mera.com ([fe80::14f2:6b98:ed28:64d3%6]) with mapi id 15.01.1591.017; Sat, 16 Nov 2019 17:25:53 +0300
From: Maksim Proshin <maksim.proshin@mera.com>
To: Nagesh shamnur <nagesh.shamnur@huawei.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
CC: Ashutosh prakash <ashutosh.prakash@huawei.com>
Thread-Topic: [tsvwg] New Version Notification for draft-nagesh-sctp-auth-4895bis-00.txt
Thread-Index: AQHVmJeCh+Me9GTVnEyHiP3QTRyNxKeHLppwgAHIJICABNzVqw==
Date: Sat, 16 Nov 2019 14:25:53 +0000
Message-ID: <c056641a760944fcb8323bf728778e0c@mera.com>
References: <8d7a543d6cd94e56b75fa0e7601b7e97@huawei.com> <CA+-pjPyx-oEdt+OgaGnD7CrQ-MXng_Q-CFb1m0HJ-NXPy0GqKQ@mail.gmail.com> <f0532d96568e4a2fba6972321ee0e256@mera.com>, <048052c340d84ece8028709795af362a@huawei.com>
In-Reply-To: <048052c340d84ece8028709795af362a@huawei.com>
Accept-Language: en-GB, ru-RU, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.31.209.18]
x-inside-org: True
Content-Type: multipart/alternative; boundary="_000_c056641a760944fcb8323bf728778e0cmeracom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/ckXfEcG9i0f-vnIrmubBIir_pdI>
Subject: Re: [tsvwg] New Version Notification for draft-nagesh-sctp-auth-4895bis-00.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Nov 2019 14:50:39 -0000

Hi Nagesh,


I still have the same concerns so please see my clatifications below inline.


BR, Maxim


________________________________
From: Nagesh shamnur <nagesh.shamnur@huawei.com>
Sent: 13 November 2019 17:17
To: Maksim Proshin; tsvwg@ietf.org
Cc: Ashutosh prakash
Subject: RE: [tsvwg] New Version Notification for draft-nagesh-sctp-auth-4895bis-00.txt


Dear Maksim,

                Thanks for reviewing the draft and sharing your perspective. Kindly find my reply inline.



Regards,

Nagesh S



From: Maksim Proshin [mailto:maksim.proshin@mera.com]
Sent: 13 November 2019 18:37
To: Nagesh shamnur <nagesh.shamnur@huawei.com>; tsvwg@ietf.org
Cc: Ashutosh prakash <ashutosh.prakash@huawei.com>
Subject: RE: [tsvwg] New Version Notification for draft-nagesh-sctp-auth-4895bis-00.txt



Hi Nagesh,

I went through your draft and have a few comments.

As far as I understood there are only two technical issues that you want to address in the bis document:

1.       Negotiation procedure.
You’re right saying that some SCTP implementations rely on RFC 5061 instead of the negotiation mechanism prescribed by RFC 4895. Considering that RFC 4895 was published earlier than RFC 5061 and it clearly describes how the AUTH extension should be negotiated, I would say that this is an implementation bug in those SCTPs rather than the specification bug.
Moreover, I think that your proposal with “The supported Extensions parameter as defined in RFC 5061 section 4.2.7 MUST be exchanged” is even worse as it may lead to interoperability issues with old implementations which follow RFC 4895 only. If you really want to improve it, I would clarify that both mechanisms may be used to enable the extension. This is how some implementations do it today. Anyway, not sure that such improvement would require the bis document. In my view an errata should be enough here.

[Nagesh]: Major implementations such as lksctp on receiving side mandatorily expects this parameter to be present in the request which actually is not correct. Several attempts in the past to correct this issue in lksctp was rejected and the Michael Tuxen, has replied saying that this parameter should have been present in the request message at the first place which I am quoting here. Moreover, sending this parameter mandatorily would not break the interoperability with old implementations confirming to RFC 4895 only since the supported extension parameter is of type 0x8008 with upper 2 bits as 10. Receiving node will ignore supported extension parameter and continue processing without any error.

“Hi Vlad,



the EXTENSIONS parameter should have been there right from the

beginning....

”

https://sourceforge.net/p/lksctp/mailman/message/20743069/

[Maxim] First of all, I don't really like that you refer to only a part of Michael's response. In his response he also clearly responded that RFC4895 has no requirement on EXTENSIONS and thus lksctp doesn't follow the RFC. Your reasoning is based on a fact that this problem was not fixed in lksctp (even though the problem is known for years) which forces other implementations to also enable SCTP-AUTH through EXTENSIONS. Now you propose to fix the RFC instead. Is it a right approach?

Then in my view the only way to really improve the situation is to allow both mechanisms as some SCTP implementations already do it today. I want to avoid the situation when after the update some SCTP implementations will stop to accept the existing mechanism of RFC4895 which will result in exactly the same situation as you describe with lksctp. I'm sure it will take years untill all deployments are aligned with the new mechanism and during that time preiod there might be negotiation issues of SCTP-AUTH. Do you really want to bring it? I guess no, so the improvement should consider that any of the mechanisms must be accepted.


2.       Unsupported HMAC Identifier Error Cause.
I don’t see the use case where it could be used. The RFC clearly specifies that ERROR with such cause should be sent in response to the AUTH chunk which includes only one HMAC id. There is also MUST in the negotiation procedure which secures that at least one HMAC id will be supported. In which case there is a need to report multiple errors?
I also wonder how existing implementations will react on multiple unsupported ids as they expect just one id today, so it’s also a potential issue. If there is really such case, I would send multiple ERRORs back which is then aligned with RFC 4895. Have you checked it with lksctp or any other implementations? Why do you think it’s so important to address this improvement and especially as the bis?

[Nagesh]: This is added keeping extensibility in mind. Current RFC supports only SHA-1 and SHA-256, but in reality there are lot many variants of SHA which is available and being used SHA-224, SHA-256, SHA-384, SHA-512. Sender supports all these variants and what if receiver supports only SHA-256. With the new packet format, receiver will be better equipped to respond in the single message which is not supported rather than sending multiple error message which involves multiple RTTs.

[Maxim] I understand your improvement but I don't see your use case. Following RFC4895 SCTP will never report multiple such errors. Is it something that potentially will be inroduced in the future and you don't know the use case yet? If you know it, can you describe it exactly? Again, to introduce such change, we should be sure that it doesn't bring any issue. I don't know how all existing SCTP implementations would react on multiple Ids in the error cause.


The rest of your changes are clarifications or editorial changes in my view. Have I missed something?

[Nagesh]: The key issue which draft is trying to address is, anomaly with respect to AUTH negotiation procedure. When the client supports AUTH but server doesn’t support it, with existing implementation, client continues to send the data chunk with AUTH chunk and server continuously discards the packet resulting in not a single byte of data exchanged between the SCTP applications. Draft address this issue on how handle such a scenario.

I am also attaching the list of issues which I had earlier reported in the mailing list which covers all the issues which I am trying to address in this draft. I am attaching the link to it for your kind reference.

https://mailarchive.ietf.org/arch/msg/tsvwg/uBVvpLq8JfctCpPT1IoFtgH6eps

The only real problem that I see today in RFC 4895 is “The HMAC algorithm based on SHA-1 MUST be supported…”. That algorithm is not recommended anymore and I would remove all MUSTs towards it. However, I would publish an errata on this instead of the bis.

BR, Maxim

---------- Forwarded message ---------
From: Nagesh shamnur <nagesh.shamnur@huawei.com<mailto:nagesh.shamnur@huawei.com>>
Date: Mon, Nov 4, 2019 at 4:03 PM
Subject: Re: [tsvwg] New Version Notification for draft-nagesh-sctp-auth-4895bis-00.txt
To: tsvwg@ietf.org<mailto:tsvwg@ietf.org> <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>
Cc: Ashutosh prakash <ashutosh.prakash@huawei.com<mailto:ashutosh.prakash@huawei.com>>



Dear TSVWG members,

                With this draft I want to highlight one key issue with AUTH 4895 RFC which doesn’t address the scenario in which one of the communicating peer doesn’t support AUTH feature. Apart from this key issue to also addresses many other issues (both technical and editorial). I would like to present the same in upcoming IETF 106 Singapore meeting.  Request members to review the same and provide me with your valuable comments.



Regards,

Nagesh S



From: Nagesh shamnur
Sent: 23 July 2019 11:58
To: 'tsvwg@ietf.org<mailto:tsvwg@ietf.org>' <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>
Cc: Ashutosh prakash <ashutosh.prakash@huawei.com<mailto:ashutosh.prakash@huawei.com>>
Subject: Fwd: New Version Notification for draft-nagesh-sctp-auth-4895bis-00.txt



Dear Chairs & Members,

                As per the points which I had posted earlier on mailing list regarding the issues/enhancements that needs to be done to SCTP Auth RFC 4895, I have put across all of them in the draft and is available as per the announcement mail below. Request all to provide review and provide your valuable comments and feedback.



Regards,

Nagesh S





---------- Forwarded message ---------
From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: Mon, 22 Jul 2019 at 15:14
Subject: New Version Notification for draft-nagesh-sctp-auth-4895bis-00.txt
To: Nagesh Shamnur <nagesh.shamnur@gmail.com<mailto:nagesh.shamnur@gmail.com>>



A new version of I-D, draft-nagesh-sctp-auth-4895bis-00.txt
has been successfully submitted by Nagesh Shamnur and posted to the
IETF repository.

Name:           draft-nagesh-sctp-auth-4895bis
Revision:       00
Title:          Authenticated Chunks for the Stream Control Transmission Protocol (SCTP) bis
Document date:  2019-07-21
Group:          Individual Submission
Pages:          20
URL:            https://www.ietf.org/internet-drafts/draft-nagesh-sctp-auth-4895bis-00.txt
Status:         https://datatracker.ietf.org/doc/draft-nagesh-sctp-auth-4895bis/
Htmlized:       https://tools.ietf.org/html/draft-nagesh-sctp-auth-4895bis-00
Htmlized:       https://datatracker.ietf.org/doc/html/draft-nagesh-sctp-auth-4895bis


Abstract:
   This document obsoletes RFC4895 if approved.  This document describes
   a new chunk type, several parameters, and procedures for the Stream
   Control Transmission Protocol (SCTP).  This new chunk type can be
   used to authenticate SCTP chunks by using shared keys between the
   sender and receiver.  The new parameters are used to establish the
   shared keys.

   This document describes the limitations with the current SCTP AUTH
   RFC4895 and thus enhances the document to resolve such ambiguities
   and thus strengthen the overall AUTH procedure.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org<http://tools.ietf.org>.

The IETF Secretariat