Re: AD review: draft-ietf-tsvwg-rsvp-security-groupkeying-09

Michael Behringer <mbehring@cisco.com> Fri, 24 June 2011 12:20 UTC

Return-Path: <mbehring@cisco.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FA8311E80B5 for <tsvwg@ietfa.amsl.com>; Fri, 24 Jun 2011 05:20:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.416
X-Spam-Level:
X-Spam-Status: No, score=-10.416 tagged_above=-999 required=5 tests=[AWL=0.183, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NBlDyXnQcGm4 for <tsvwg@ietfa.amsl.com>; Fri, 24 Jun 2011 05:20:58 -0700 (PDT)
Received: from ams-iport-2.cisco.com (ams-iport-2.cisco.com [144.254.224.141]) by ietfa.amsl.com (Postfix) with ESMTP id BB92411E80A8 for <tsvwg@ietf.org>; Fri, 24 Jun 2011 05:20:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=mbehring@cisco.com; l=8046; q=dns/txt; s=iport; t=1308918057; x=1310127657; h=message-id:date:from:mime-version:to:cc:subject: references:in-reply-to:content-transfer-encoding; bh=6xXrgXVeTO51uLoEORODfpH4YEFLkQeFEU9IjEAxbWw=; b=UJcVrqmLrCSMdtdhotHr6kqSJGrQyuPYSq6CqECmo3m38QpMZN1Da9I1 8Z+rRwQTdV79LJLOUJAMVC7ZyIe9ViZ2pckuBVrIsvs89XOtrXkojzkGq QerV3w+2QSrvBhwHgaeWOZt3MkshuDGf1Lw0d+1PNS+QIEAGnolnguW2H I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av8EAMmABE6Q/khL/2dsb2JhbABFBwanNXeIc6NRnheDIBmCdASRe4RoCYsj
X-IronPort-AV: E=Sophos;i="4.65,419,1304294400"; d="scan'208";a="38861603"
Received: from ams-core-2.cisco.com ([144.254.72.75]) by ams-iport-2.cisco.com with ESMTP; 24 Jun 2011 12:20:53 +0000
Received: from xbh-ams-101.cisco.com (xbh-ams-101.cisco.com [144.254.74.71]) by ams-core-2.cisco.com (8.14.3/8.14.3) with ESMTP id p5OCKrer021035; Fri, 24 Jun 2011 12:20:53 GMT
Received: from xfe-ams-101.cisco.com ([144.254.231.93]) by xbh-ams-101.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 24 Jun 2011 14:20:53 +0200
Received: from [10.55.194.28] ([10.55.194.28]) by xfe-ams-101.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 24 Jun 2011 14:20:52 +0200
Message-ID: <4E048123.9040709@cisco.com>
Date: Fri, 24 Jun 2011 14:20:51 +0200
From: Michael Behringer <mbehring@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.18) Gecko/20110616 Thunderbird/3.1.11
MIME-Version: 1.0
To: David Harrington <ietfdbh@comcast.net>
Subject: Re: AD review: draft-ietf-tsvwg-rsvp-security-groupkeying-09
References: <C6268D671DD04FA7BDADBA8212CACB88@davidPC>
In-Reply-To: <C6268D671DD04FA7BDADBA8212CACB88@davidPC>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 24 Jun 2011 12:20:52.0327 (UTC) FILETIME=[28BC0F70:01CC3269]
Cc: draft-ietf-tsvwg-rsvp-security-groupkeying@tools.ietf.org, tsvwg@ietf.org
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tsvwg>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jun 2011 12:20:59 -0000

Thank you David for your AD review. In version 10 (just posted) we 
address your comments. The IDnits check shows no issues. We believe that 
the document is now ready for publication.

Thanks for your help!
Michael


On 19/04/2011 23:21, David Harrington wrote:
> Hi,
>
> I have performed an AD review of this document.
>
> Overall, I found the content of this document well written, but have a
> few concerns.
> I believe these should be fairly easy to resolve.
>
> -- Technical and Process concerns:
> 1) section 2 last paragraph
> "... the RSVP router that
>     receives the Path message will be able to authenticate it
>     successfully using the group key."
> It is important to be consistent in specifying what is being
> authenticated. Here "it" appears to refer to a message. Earlier text
> in section 2 says "If a group key is used, the authentication
> granularity becomes group membership of devices, not (individual) peer
> authentication between devices", which seems to indicate a device (or
> peer) is being authenticated (or a group of devices).
>
> 2) I am concerned with the number of "should" and "should not"
> recommendations, using non-RFC2119 keywords in an Informational
> document. This feels like you are trying to define a standard or BCP
> without using the standards track process. I think the usage of
> "should" should be eliminated from an Informational document.
>
> 3) Has the WG explicitly discussed acceptability of the IPR terms
> related to this document? The RAND terms apply for compliance to the
> standard, but this is not being submitted as a standards-track
> document. As noted in 2), there are a number of shoulds in this
> Informational document. The terms in the IPR declaration do not seem
> to provide non-assert status for implementing an Informational
> document. Has the WG discussed this?
>
> Comments (mainly suggestions for improving the text):
> 1) The text is made much harder to read because there are a bunch of
> unnecesary lead-in phrases. You do not need a lead-in phrase for most
> sentences.
> Sentences that start with "Note that" generally don't need the "Note
> that".
> Sentences that start with "This implies that" generally don't need the
> "This implies that".
> Sentences that start with "We observe that" generally don't need the
> "We observe that".
> Sentences that start with "As observed in the security considerations
> section of RFCXXXX," generally don't need the introductory lead-in,
> just a simple reference after the stated content.
>
> These superfluous phrases obscure the real content of the text.
>
> 2) [I-D.weis-gdoi-mac-tek] is referenced informationally. I generally
> prefer to avoid referencing IDs; they are an unstable thing to
> reference, and can delay document publication.
>
> 3) The next-to-last paragraph of section2 (starting with "This means
> that") could benefit from rephrasing. The first sentence seems to
> belong to the preceding paragraph (the challenge), while the rest of
> this paragraph is about the impact of handshakes. I think the
> paragraph could be more succinct:
> OLD:
>   Section 4.3 of [RFC2747] states that "... the
>     receiver MAY initiate an integrity handshake with the sender."  We
>     note that if this handshake is taking place, it can be used to
>     determine the identity of the next RSVP hop.  In this case,
> non-RSVP
>     hops can be traversed also using per interface or per neighbor
> keys.
> NEW:
>   Section 4.3 of [RFC2747] states that "... the
>     receiver MAY initiate an integrity handshake with the sender."
> Non-RSVP hops can be traversed more easily using per interface or per
> neighbor keys if an integrity handshake is used to determine the
> identity of the next RSVP hop.
>
> (The ease is impacted; are the security properties impacted at all?)
>
> 4) section 3.1 defines "security domain". I think the definition is
> not clear and unambiguous. I think if you are going to define a term,
> it should not be buried in the fourth sentence of a paragraph. Put it
> in a terminology section, and make sure it is clear and unambiguous.
> If the term is already clearly defined in another document, please
> reference the normative document.
>
> 5) please ask the RFC editor whether they would prefer that "per
> interface" and "per neighbor" be hyphenated.
>
> 6) "per interface" should be "Per interface" when it starts a
> sentence.
>
> 7) please run id-nits and correct the problems it finds. I ran it and
> it complains about copyright year, lack of an RFC2119 reference, and
> the IPR disclaimer. Some complaints are caused by crossing a year-end
> during processing and are easy fixes.
>
> 8) I found section 3.1 a bit confusing on first read. The problem is
> the repetition using different words:
> "However, when the
>     interface is multipoint, all RSVP speakers on a given subnet have
> to
>     share the same key in this model.  This makes it unsuitable for
>     deployment scenarios where nodes from different security domains
> are
>     present on a subnet"
> and
> "As mentioned above, per interface keys are only
>     applicable when all the nodes reachable on the specific interface
>     belong to the same security domain."
> and
> "Again, interface
>     level keys can be deployed safely only when all the reachable
>     neighbors on the interface belong to the same security domain."
>
> What happens if interpretatiosn of the wording differ because your
> wording differs? State it once clearly, so you don't have to keep
> repeating it in different language.
>
> 9) s/We observe that, alternatively, in some
>     environments, //
>
> 10) The sentence starting "Group keying may allow" might be better as
> the start of the next paragraph.
>
> 11) section 5.2
> OLD:
> In its Security Considerations section,
>     [RFC4875] points out that RSVP message integrity mechanisms for
> hop-
>     by-hop RSVP signaling apply to the hop-by-hop P2MP RSVP-TE
> signaling.
> Suggested:
>     RSVP message integrity mechanisms for hop-
>     by-hop RSVP signaling apply to the hop-by-hop P2MP RSVP-TE
> signaling
>     (see [RFC4875] Security Considerations).
>
> 12) s/In turn, we observe that the analyses in this document of keying
>     methods apply equally to P2MP RSVP-TE for the hop-by-hop signaling.
> /analyses in this document apply to P2MP RSVP-TE hop-by-hop
> signaling./
>
> But after cutting away the excess words, does this sentence actually
> say anything?
>
> Is it the analyses in this document that apply to P2MP signalling, or
> is it the RSVP integrity mechanism that applies?
> Or are you saying that the analysis of keying methods for RSVP apply
> to the keying for P2MP signalling?
>
> 13) "We note that the observation in Section 3.1 of this
>     document about use of group keying for protection of non-hop-by-hop
>     messages apply to protection of non-hop-by-hop signaling for LSP
>     Hierarchy and P2MP RSVP- TE."
>
> What does this sentence actually say? Please be clear and unambiguous
> in your wording.
>
> Let me see if I can understand what you are trying to say here.
> a) section 3.1 discusses per-interface and per-neighbor keying, not
> group keying. and doesn't even mention non-hop-by-hop messages.
> b) If I assume you meant 3.2, not 3.1, then I find that 3.2 says "As
> discussed in Section 2, group keying can be used in the presence of
> non-RSVP hops."
> So to understand 5.2, I should read 3.2, which says I should read
> section 2.
>
> and the message is ... "group keying can simplify protection of
> non-hop-by-hop signaling for LSP Hierarchy and P2MP RSVP- TE."
> Is that what you are trying to say?
>
> 14) please expand all acronyms on first usage.
>
>
> David Harrington
> Director, IETF Transport Area
> ietfdbh@comcast.net (preferred for ietf)
> dbharrington@huaweisymantec.com
> +1 603 828 1401 (cell)
>
>
>